Ruji P. Medina

Orcid: 0000-0003-1649-4634

Affiliations:
  • Technological Institute of the Philippines, Quezon City, Philippines


According to our database1, Ruji P. Medina authored at least 61 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Time Series Forecasting of HIV/AIDS in the Philippines Using Deep Learning: Does COVID-19 Epidemic Matter?
CoRR, 2024

2023
Twitter Sentiment Analysis with Maximum Entropy and Naive Bayes Using N -gram Approach.
Proceedings of the International Conference on Information Management and Technology, 2023

COVID-19 Outbreaks Effect on Air Quality Index: Evidence from Enhanced Artificial Neural Network.
Proceedings of the 8th International Conference on Computer and Communication Systems, 2023

2021
Multilayer Security for Facial Authentication to Secure Text Files.
Proceedings of the Intelligent Systems and Applications, 2021

2020
Self-Organizing Map with Nguyen-Widrow Initialization Algorithm for groundwater Vulnerability Assessment.
Int. J. Comput., 2020

Internet Security Awareness of Filipinos: A Survey Paper.
CoRR, 2020

Cryptographic Randomness Test of the Modified Hashing Function of SHA256 to Address Length Extension Attack.
Proceedings of the ICCBN 2020: 8th International Conference on Communications and Broadband Networking, 2020

Cryptanalysis of the Modified SHA256.
Proceedings of the HPCCT & BDAI 2020: 4th High Performance Computing and Cluster Technologies Conference & 3rd International Conference on Big Data and Artificial Intelligence, 2020

LSB Substitution Image Steganography Based on Randomized Pixel Selection and One-Time Pad Encryption.
Proceedings of the BDSIC 2020: 2nd International Conference on Big-data Service and Intelligent Computation, 2020

Fuzzy Rule Based Inference System in Patient Diagnosis of Breast Tumor in Fine Needle Aspiration.
Proceedings of the BDET 2020: 2nd International Conference on Big Data Engineering and Technology, 2020

Extended PrefixSpan for Efficient Sequential Pattern Mining in a Game-based Learning Environment.
Proceedings of the APIT 2020: 2nd Asia Pacific Information Technology Conference, 2020

2019
A Distance-Based Data-Mule Scheduling Technique for Lesser Nodal Delay in Wireless Sensor Network.
Int. J. Commun. Networks Inf. Secur., 2019

Modifying Bit-Level Data Compression Scheme based on Adaptive Hamming Code Data Compression Algorithm.
Proceedings of the International Conference on Multimedia Analysis and Pattern Recognition, 2019

Implementation and Performance Assessment of Enhanced RC5 Cryptosystem Applied to Different File Types.
Proceedings of the 9th IEEE International Conference on System Engineering and Technology, 2019

Solving Dietary Planning Problem using Particle Swarm Optimization with Genetic Operators.
Proceedings of the 3rd International Conference on Machine Learning and Soft Computing, 2019

Implementation of Enhanced MD5 Algorithm using SSL to Ensure Data Integrity.
Proceedings of the 3rd International Conference on Machine Learning and Soft Computing, 2019

Aggregating Filter Feature Selection Methods to Enhance Multiclass Text Classification.
Proceedings of the ICIT 2019, 2019

Applying Modified SHA256 on Blockchain using Challenge Response and Off-chain Signatures Patterns.
Proceedings of the 3rd International Conference on Graphics and Signal Processing, 2019

Multidimensional key RC6 algorithm.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

An XBOX-based key generation technique for vigenere algorithm.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

Multi-class Document Classification Using Improved Word Embeddings.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019

A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019

Handling Imbalanced Data through Affinity Propagation and SMOTE.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019

Enhancing Feed-Forward Neural Network in Image Classification.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019

A Secure Key Scheduling Operation for International Data Encryption Algorithm using Serpent Key Schedule Operation.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019

Filter Selection Methods for Multiclass Classification.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019

A Modified Least Significant Bit Randomized Embedding Method based on Image Partitioning and Columnar Transposition with Encryption.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019

Relocating Local Outliers Produced by Partitioning Methods.
Proceedings of the 2nd International Conference on Computing and Big Data, 2019

Centroid 360: An Enhanced Centroid Initialization Method for K Means Algorithm.
Proceedings of the 2nd International Conference on Data Science and Information Technology, 2019

Performance Analysis of the Modified Generated S-Box for Advanced Encryption Standards.
Proceedings of the 2nd International Conference on Data Science and Information Technology, 2019

A Secure Image Encryption Architecture Based on Pseudorandom Number Generator and Chaotic Logistic Map.
Proceedings of the 2nd International Conference on Data Science and Information Technology, 2019

ERC5a - An Enhanced RC5 Algorithm on Bit Propagation in the Encryption Function.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

An Enhanced Recommendation Algorithm Based on Modified User-Based Collaborative Filtering.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

Application of the Modified Imputation Method to Missing Data to Increase Classification Performance.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

Fuzzy decision tree for breast cancer prediction.
Proceedings of the AISS 2019: 2019 International Conference on Advanced Information Science and System, 2019

A correlation analysis of the sentiment analysis scores and numerical ratings of the students in the faculty evaluation.
Proceedings of the 2nd International Conference on Artificial Intelligence and Pattern Recognition, 2019

2018
Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm.
Int. J. Commun. Networks Inf. Secur., 2018

Bandwidth Allocation Mechanism based on Users' Web Usage Patterns for Campus Networks.
Int. J. Commun. Networks Inf. Secur., 2018

A New Approach in Expanding the Hash Size of MD5.
Int. J. Commun. Networks Inf. Secur., 2018

A Hybrid Prediction Model Integrating a Modified Genetic Algorithm to K-means Segmentation and C4.5.
Proceedings of the TENCON 2018, 2018

Classification of Plant Seedling Images Using Deep Learning.
Proceedings of the TENCON 2018, 2018

A Novel Learning Rate Decay Function of Kohonen Self-Organizing Maps Using the Exponential Decay Average Rate of Change for Image Clustering.
Proceedings of the 2nd International Conference on Natural Language Processing and Information Retrieval, 2018

Automated Teller Machines Location's Information Retrieval Search Engine Using Suffix Tree Clustering Technique.
Proceedings of the 2nd International Conference on Natural Language Processing and Information Retrieval, 2018

A Novel Feature Hashing With Efficient Collision Resolution for Bag-of-Words Representation of Text Data.
Proceedings of the 2nd International Conference on Natural Language Processing and Information Retrieval, 2018

Implementation of GA-Based Feature Selection in the Classification and Mapping of Disaster-Related Tweets.
Proceedings of the 2nd International Conference on Natural Language Processing and Information Retrieval, 2018

An Adequate Dietary Planning Model Using Particle Swarm Optimization.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2018

Inverse Ant Algorithm.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2018

Enhanced Satellite Imaging Algorithm Classifier using Convolutional Neural modified Support Vector Machine (CNMSVM).
Proceedings of the 2nd International Conference on Video and Image Processing, 2018

Enhancing Inverse Ant Algorithm using Path Elimination Rules.
Proceedings of the VII International Conference on Network, Communication and Computing, 2018

A Modified Approach of Blowfish Algorithm Based On S-Box Permutation using Shuffle Algorithm.
Proceedings of the VII International Conference on Network, Communication and Computing, 2018

A New Advanced Encryption Standard-Butterfly Effect in Protecting Image of Copyright Piracy.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018

An MD5-Hirose Hashing Algorithm for Digital Image Watermarking.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018

Using a Modified Approach of Blowfish Algorithm for Data Security in Cloud Computing.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018

ICD-9 Tagging of Clinical Notes Using Topical Word Embedding.
Proceedings of the 2018 International Conference on Internet and e-Business, 2018

A hybrid approach towards improved artificial neural network training for short-term load forecasting.
Proceedings of the 2018 International Conference on Data Science and Information Technology, 2018

Application of enhanced expectation maximization (EnEM) algorithm for image segmentation.
Proceedings of the 2018 International Conference on Data Science and Information Technology, 2018

Enhanced RC6 permutation-diffusion operation for image encryption.
Proceedings of the 2018 International Conference on Data Science and Information Technology, 2018

Towards academic affect modeling through experimental hybrid gesture recognition algorithm.
Proceedings of the 2018 International Conference on Data Science and Information Technology, 2018

2017
A Unique One-Time Password Table Sequence Pattern Authentication: Application to Bicol University Union of Federated Faculty Association, Inc. (BUUFFAI) eVoting System.
CoRR, 2017

Towards enhanced hierarchical attention networks in ICD-9 tagging of clinical notes.
Proceedings of the 3rd International Conference on Communication and Information Processing, 2017


  Loading...