In daily banking customer queues, unknown waiting-time could lower customer experience. Little’s Law formula in Queue Theory provides a generic formula for waiting-time, but it cannot be implemented directly to give ...
详细信息
In daily banking customer queues, unknown waiting-time could lower customer experience. Little’s Law formula in Queue Theory provides a generic formula for waiting-time, but it cannot be implemented directly to give finite wait-time estimation in real-life. This study aims to investigate predictive variables that explain waiting-time duration. This paper uses Fast Artificial Neural Network engine to implement Artificial Neural Networks method. To train Artificial Neural Networks, Resilient Propagation was used. Time-series approach and structural approach for input neuron was compared. Average duration from previous interval and number of server was proposed to increase structural variable like Queue Length and Head of Line Duration estimator variable. To determine the best configuration for number of neuron in input and hidden layer, experimental method was used. The results of this study show that structural approach provides better estimation than time-series approach. Furthermore, modified helper variable combination provides a more refined result.
Facial recognition as of biometric authentication used in the field of security, military, finance and daily use is become a trend or famous, because of its natural and not intrusive nature. Many methods for face reco...
详细信息
In Law Number 24 Year 2007 concerning Disaster Management, it is stated that the central government and regional governments are responsible for implementing disaster management, with an emphasis on preparedness and m...
In Law Number 24 Year 2007 concerning Disaster Management, it is stated that the central government and regional governments are responsible for implementing disaster management, with an emphasis on preparedness and mitigation in dealing with natural disasters, as well as based on the provisions of article 1 of Presidential Regulation No. 46 of 2008 concerning the National Council on Climate Change that climate change is a change in average conditions of climate and / or climate diversity from one period of time to another as a result of human activity. However, the socialization of these two matters is not regulated in existing laws and regulations, so that the information dissemination plan and dissemination of the information must be carried out to the community itself. In line with developments in technology and information systems that have entered the era of media convergence, the acceleration of the process of spreading government programs can also be done by using this technology. The SECI method model (Socialization, Externalization, Combination, Internalization) was developed through implementation based on the 'Knowledge Management System Cycle' theory, so that a knowledge management system was formed. The results of research on community preparedness in the application of Knowledge Management Systems (KMS) for natural disaster preparedness and mitigation can be used to support the dissemination and dissemination of disaster management mitigation, global warming, and community-based climate change, including performance measurement of success.
The concept of smart building includes the optimization of energy usage in a building. One of the possible solutions for this is to adaptively adjust appliances utilization according to activity level in the building....
The concept of smart building includes the optimization of energy usage in a building. One of the possible solutions for this is to adaptively adjust appliances utilization according to activity level in the building. Thus, an intelligent activity estimation system needs to be developed. However, massive annotated dataset is necessary to train the system. Therefore, we propose a system that enables rapid data annotation to collect the massive dataset. With the proposed system, an image can be annotated within 4.8 seconds in average.
There are many object-oriented software quality measurement techniques. One of them is CK metric. This paper utilizes CK metrics to measure qualities per version of an open source software namely Statcato. Measurement...
详细信息
The use of user telemetry to gather player behavioral data on video games can be very beneficial to game developers with a certain business model. With the help of user telemetry in game development, it can provide ac...
The use of user telemetry to gather player behavioral data on video games can be very beneficial to game developers with a certain business model. With the help of user telemetry in game development, it can provide access to data on user behavior from installed game clients platform such as Steam. These behavioral data can be used to find out the Steam user behavioral patterns on playtime distributions that can be studied by developers in order to have a deeper understanding of the behaviors of their players. In this study, the data are clustered using the k-prototypes algorithm, a combination of k-means and k-modes algorithm that can be used to cluster mixed attributes. The result shows that the clusters represent the types and preferences of the players.
Ecology is a branch of biology that studies the interaction and relationship between organisms and their environment. Abundance, distribution of organisms and patterns of biodiversity are great interests for many ecol...
详细信息
Artificial Bee Colony (ABC) is one of good heuristic intelligent algorithm to solve optimization problem including clustering. Generally, the heuristic algorithm will take the high computation time to solve optimizati...
详细信息
Every enterprise stores and operates its transactions confidentially, therefore it has to encrypt the transaction to protect it from data intruders. Technically, most encryption processes are ranging from hundreds of ...
Every enterprise stores and operates its transactions confidentially, therefore it has to encrypt the transaction to protect it from data intruders. Technically, most encryption processes are ranging from hundreds of milliseconds. If there is a lot of encrypting process, then the performance will be getting bottleneck and the transaction's speed is being slowed down. In this paper, a promising scheme by adding GZIP compression on the former RSA encryption method to increase speed is proposed; thus every transaction is going to require less times, therefore the number of failed transactions or requests will be reduced. Hence, this way makes the transaction easier for customers to do. The result of little experimental test shows that using XOR to stream cipher-text to replace the absent of padding into specific bytes shows a lot of performance increase resulting other factors such as availability also affected without sacrificing the security level.
Halstead Complexity Measures is a software metrics introducted by Maurice Howard Halstead in 1977. This metrics used to identify measurable properties of the code and relation between them. Several measures can be cal...
详细信息
暂无评论