Students can use social media such as Twitter for online learning (E-Learning). This study aims to analyse an accuracy for the sentiments of students about E-Learning who use Indonesian on Twitter social media both po...
Students can use social media such as Twitter for online learning (E-Learning). This study aims to analyse an accuracy for the sentiments of students about E-Learning who use Indonesian on Twitter social media both positive and negative opinions. The algorithms used are Naive Bayes (NB). Then to optimize the accuracy of the calculation results, the Particle Swarm Optimization (NB-PSO) approach is used. In order to optimize accurate results, this study uses three experimental sequences (scenario 1, scenario 2, and scenario 2) for both NB and NB-PSO algorithms. Each scenario uses different positive and negative comments. The results of the experiment show that in scenario 1 an increase in accuracy is 10.00% for NB-PSO. Scenario 2 there is an increase in accuracy of 13.33% on NB-PSO. Meanwhile, in scenario 3 an increase in accuracy is 27.22% for NB-PSO. These results prove that the accuracy of NB-PSO is better than NB for all scenarios.
Sign Language Recognition is a breakthrough for helping deaf-mute people and has been researched for many years. Unfortunately, every research has its own limitations and are still unable to be used commercially. Some...
详细信息
Sign Language Recognition is a breakthrough for helping deaf-mute people and has been researched for many years. Unfortunately, every research has its own limitations and are still unable to be used commercially. Some of the researches have known to be successful for recognizing sign language, but require an expensive cost to be commercialized. Nowadays, researchers have gotten more attention for developing Sign Language Recognition that can be used commercially. Researchers do their researches in various ways. It starts from the data acquisition methods. The data acquisition method varies because of the cost needed for a good device, but cheap method is needed for the Sign Language Recognition System to be commercialized. The methods used in developing Sign Language Recognition are also varied between researchers. Each method has its own strength compare to other methods and researchers are still using different methods in developing their own Sign Language Recognition. Each method also has its own limitations compared to other methods. The aim of this paper is to review the sign language recognition approaches and find the best method that has been used by researchers. Hence other researchers can get more information about the methods used and could develop better Sign Language Application Systems in the future.
Currently the development of digital technology has advanced very rapidly, as well as data storage and data transfer. As the development of information technology and the use of data that increasingly large, it will b...
详细信息
Currently the development of digital technology has advanced very rapidly, as well as data storage and data transfer. As the development of information technology and the use of data that increasingly large, it will be a main factor that affects to the company’s business. The amount of data that must be processed both at headquarters and other branch offices make the process of data exchange become the main issue in term of speed and delay. Due to data exchange being a top priority in the company, often the WAN network bandwidth used by the file system, email system, proxy, web system becomes peak or full during peak hours thus slowing down accessing file or email system. One method to reduce bandwidth usage is almost full is to use WAN Optimization tools. WAN Optimization has several functions, including Data Streamlining, Transport Streamlining, and Application Streamlining. The purpose of this study is to analyze performance network when WAN optimization was applied in the system. Data is taken from simulated file transfers conducted several days and at different hours. Data were analyzed using Wireshark tools and calculation formula. The results can be seen if there is a significant increasing performance, delay become better from 287 ms to 0.604 ms for file size 93 MB and jitter increased 12.4% better. It can be concluded that with the optimization of WAN, the process of data transfer becomes more efficient both in bandwidth and time during working hours.
Searching for data or documents that are always a necessity in the world of education, work, research an others requires convenience so that time efficiency occurs. This is supported by the emergence of various Inform...
Searching for data or documents that are always a necessity in the world of education, work, research an others requires convenience so that time efficiency occurs. This is supported by the emergence of various Information Retrieval system applications, one of which is cata, which is built on the Java programming language and applies the Generalized Vector Space Model method which can search based on similar keywords. Other facilities need to be developed, one of which is by applying the stemmer porter algorithm applied to the WTS (Web Tokenization Stemming) web which is built with the laravel framework that can search data or documents simply by typing the basic words so that searches are easier and faster.
This paper studies non-parametric time-series approach to electric load in national holiday seasons based on historical hourly data in state electric company of Indonesia consisting of historical data of the Northern ...
详细信息
This study aims to apply data mining techniques with cluster analysis on stock data registered in LQ45 in Indonesia Stock Exchange. The cluster analysis used in this method is k-means algorithm, the data in this resea...
详细信息
This paper presents the development air quality monitoring system for indoor workplace that send measurement CO, CO2, PM2.5, temperature and humidity and send it via IEEE 802.11 b/g wireless communication. The problem...
This paper presents the development air quality monitoring system for indoor workplace that send measurement CO, CO2, PM2.5, temperature and humidity and send it via IEEE 802.11 b/g wireless communication. The problem is many sensor node for indoor air quality should not always send data to server in normal situation. It could spend power consumption and the data would send it periodically. Although the data send periodically, the sensor must handle emergency situation like fire. The results show that with controlled transmission interval not only spend power consumption but the device also good respond in emergency situation and user could monitor air quality remotely via web application.
This paper proposes a service desk to handle two important issues in financial company using the Information Technology Infrastructure Library (ITIL) Framework, i.e. Single Point of Contact (SPOC) and Service Level Ag...
This paper proposes a service desk to handle two important issues in financial company using the Information Technology Infrastructure Library (ITIL) Framework, i.e. Single Point of Contact (SPOC) and Service Level Agreement (SLA) issues. SPOC is a gateway to information needs of both users and company staff, particularly the IT staff, while SLA defines the responsibilities of the parties where such services work and provides coverage for services provided to the client to achieve client satisfaction. The service desk is built by focusing in service operation. A service desk has been successfully built in this study to make user's problem controllable. The result also shows that the user's problem can be solved faster in many cases.
Application architecture and information technology systems in the company should be able to support the company’s policy that leads to their alignment with the business objectives. The alignment of the implementatio...
Application architecture and information technology systems in the company should be able to support the company’s policy that leads to their alignment with the business objectives. The alignment of the implementation of information technology systems to the needs and goals of the organization will be able to be answered by taking into account the integration in the development, so that the gap of these two things can be minimized. As a company engaged in IT consulting, project management system is one form of application systems that support core business objective of the company: to produce high-quality software. Nevertheless, the project management system should be able to work together with other supporting information systems, so that the flow of information within the company can run effectively. To achieve these objectives, required the analysis and design of an integrated system, which can be achieved through a service-oriented architecture based system. which includes the stages of requirements and analysis, design and development, and the last is the IT operations. The final result expected is the design of the service-oriented architecture based project management system which built through top-down approach that focuses on improving the effectiveness of business process.
The plagiarism has many forms, not only copy paste but include changing passive become active voice, or paraphrasing without appropriate acknowledgment. It happens on all language include Indonesian Language. There ar...
The plagiarism has many forms, not only copy paste but include changing passive become active voice, or paraphrasing without appropriate acknowledgment. It happens on all language include Indonesian Language. There are many previous research that related with plagiarism detection in Indonesian Language with different method. But there are still some part that still has opportunity to improve. This research proposed the solution that can improve the plagiarism detection technique that can detect not only copy paste form but more advance than that. The proposed solution is using Winnowing with some addition process in pre-processing stage. With stemming processing in Indonesian Language and generate fingerprint in parallel processing that can saving time processing and produce the plagiarism result on the suspected document.
暂无评论