Human resources (HRs) performance appraisal is one of several parts of HRs planning. It plays the imperative role to encourage HRs to have a good spirit and become correctly loyal to institution. The major objective o...
详细信息
Facial recognition as of biometric authentication used in the field of security, military, finance and daily use is become a trend or famous, because of its natural and not intrusive nature. Many methods for face reco...
详细信息
Next-Generation Sequencing (NGS)-based genomics data have a huge potential to be used in transcriptomic profiling of Nasopharyngeal Carcinoma (NPC) to study the biosynthesis mechanism behind it. The high dimensionalit...
Next-Generation Sequencing (NGS)-based genomics data have a huge potential to be used in transcriptomic profiling of Nasopharyngeal Carcinoma (NPC) to study the biosynthesis mechanism behind it. The high dimensionality of NGS data is the main challenge in performing the data analysis to extract useful information. In this workflow pipeline, memory-efficient Linux-based software such as HISAT2 and HTSeq are utilized to process the raw NGS data. Furthermore, Differential Expression Gene (DEG) list can be obtained by performing advanced analysis to the aligned Ribonucleic Acid (RNA) sequence using the edgeR protocol. This DEG list is one of the main inputs of biological pathway analysis that can be done in DAVID and PANTHER web-based software. Both tools generate a different pathway result related to inflammation.
There are many object-oriented software quality measurement techniques. One of them is CK metric. This paper utilizes CK metrics to measure qualities per version of an open source software namely Statcato. Measurement...
详细信息
Face recognition is a widely utilized biometric method due to its natural and non-intrusive approach. Recently, deep learning networks using Triplet Loss have become a common framework for person identification and ve...
详细信息
Face recognition is a widely utilized biometric method due to its natural and non-intrusive approach. Recently, deep learning networks using Triplet Loss have become a common framework for person identification and verification. In this paper, we present a new method on how to select appropriate hard-negatives for training using Triplet Loss. We show that, by incorporating pairs which would otherwise have been discarded yields better accuracy and performance. We also applied Adaptive Moment Estimation algorithm to mitigate the risk of early convergence due to the additional hard-negative pairs. In LFW verification benchmark, we managed to achieve an accuracy of 0.955 and AUC of 0.989 as opposed to 0.929 and 0.973 in the original OpenFace.
Social media is a platform to share information that is very liked by everyone nowadays because some of the facilities that make it easier for us to communicate with each other, share documents, chat and even create a...
详细信息
Social media is a platform to share information that is very liked by everyone nowadays because some of the facilities that make it easier for us to communicate with each other, share documents, chat and even create a community. In addition, we can also analyze the content of social media by using several methods in data mining, so that we can get new the information to support decision making that can bring benefits to individuals and companies. The purpose of this research, to create a business intelligence dashboard to observe the performance of each Topic or channel of news posted to social media accounts such as Facebook and Twitter. Topical performance in social media is the number of Topics in articles posted to social media getting like, share, comment etc. To be able to know the Topic of a news post in social media, used some text classification techniques such as Naive Bayes, SVM and Decision Tree. The comparative results of the algorithms are taken which has the best accuracy of SVM for subsequent implementation in the data warehouse. Meanwhile, the business intelligence dashboard data source will be sourced from the data warehouses that have been made before.
Information as a service (IAS) allows any applications to access all types of information thru using the application interface. A service based on everything or 'anything as a service' or 'everything as a ...
详细信息
Text mining is a process to extract data based on text. The source of text mining should be coming from social media users' activities; e.g. posting, fans page, group, hashtag, tweet, etc. As raw data and informat...
Text mining is a process to extract data based on text. The source of text mining should be coming from social media users' activities; e.g. posting, fans page, group, hashtag, tweet, etc. As raw data and information, the text mining sources are able to be gold information to be operated for academic analyzing purposes. This paper proposes the Python-based model to scrape text from Twitter user's tweets and then analyze them to see the commerce and tax-income potency in purposely Indonesia. The mathematical and statistical methods are technically operated. The constructed model finally exhibited. Also, the information on sale-behavior and tax-income forecasts are able to be portrayed.
After Large-Scale Social Restriction (PSBB) established in Jakarta, a change of air quality was indicated by the citizens. Representatives of Indonesia's Agency for Meteorology, Climatology, and Geophysics (BMKG) ...
After Large-Scale Social Restriction (PSBB) established in Jakarta, a change of air quality was indicated by the citizens. Representatives of Indonesia's Agency for Meteorology, Climatology, and Geophysics (BMKG) supported as the fact that mobility of Jakarta's citizen and commuters were reduced. With utilizing Weather Data Acquisition System managed by BMKG, this research compared fluctuations of Jakarta's air quality during two periods of time: Pre-PSBB and During-PSBB. This study proved that Jakarta's air quality has positively improved compared to the previous year, although in the lower range of unhealthy level.
Halstead Complexity Measures is a software metrics introducted by Maurice Howard Halstead in 1977. This metrics used to identify measurable properties of the code and relation between them. Several measures can be cal...
详细信息
暂无评论