Dynamic programming is a fundamental algorithm that can be found in our daily lives easily. One of the dynamic programming algorithm implementations consists of solving the 0/1 knapsack problem. A 0/1 knapsack problem...
Dynamic programming is a fundamental algorithm that can be found in our daily lives easily. One of the dynamic programming algorithm implementations consists of solving the 0/1 knapsack problem. A 0/1 knapsack problem can be seen from industrial production cost. It is prevalent that a production cost has to be as efficient as possible, but the expectation is to get the proceeds of the products higher. Thus, the dynamic programming algorithm can be implemented to solve the diverse knapsack problem, one of which is the 0/1 knapsack problem, which would be the main focus of this paper. The implementation was implemented using C language. This paper was created as an early implementation algorithm using a Dynamic program algorithm applied to an Automatic Identification System (AIS) dataset.
Students can use social media such as Twitter for online learning (E-Learning). This study aims to analyse an accuracy for the sentiments of students about E-Learning who use Indonesian on Twitter social media both po...
Students can use social media such as Twitter for online learning (E-Learning). This study aims to analyse an accuracy for the sentiments of students about E-Learning who use Indonesian on Twitter social media both positive and negative opinions. The algorithms used are Naive Bayes (NB). Then to optimize the accuracy of the calculation results, the Particle Swarm Optimization (NB-PSO) approach is used. In order to optimize accurate results, this study uses three experimental sequences (scenario 1, scenario 2, and scenario 2) for both NB and NB-PSO algorithms. Each scenario uses different positive and negative comments. The results of the experiment show that in scenario 1 an increase in accuracy is 10.00% for NB-PSO. Scenario 2 there is an increase in accuracy of 13.33% on NB-PSO. Meanwhile, in scenario 3 an increase in accuracy is 27.22% for NB-PSO. These results prove that the accuracy of NB-PSO is better than NB for all scenarios.
Nowadays, schools are trying to insert knowledge and learning about sustainability issues and environmental conservation in the academic context from an early age. It is also observed the use of information technology...
详细信息
ISBN:
(数字)9781665462808
ISBN:
(纸本)9781665462815
Nowadays, schools are trying to insert knowledge and learning about sustainability issues and environmental conservation in the academic context from an early age. It is also observed the use of information technology with new didactic and ludic resources that can encourage elementary and high school students to obtain knowledge about sustainability. To this end, this research presents some results using Educational Robotics, Gestalt, and information technology, which students received from a Brazilian public elementary school. In this study, after attending workshops on sustainability, the students developed robotic resources to help them with sustainability-related knowledge. The resources were tested according to their objectives: a mobile robot that recognizes the food and shows its footprint and a box with gas sensors to identify if food is in consumable condition or should be recycled. The experiment was very successful and is in a continuous application phase.
In its development, information technology has become an important in people's everyday lives. Security and confidentiality of the data on computer networks today become a very important issue and continues to gro...
In its development, information technology has become an important in people's everyday lives. Security and confidentiality of the data on computer networks today become a very important issue and continues to grow. Some of the cases relating to computer network security today become a job that requires handling fee and security has been tremendous. Vital systems, such as the defense system, the banking system, the hospital system, and other systems, requires such a high level of security. This is mainly due to the advancement of the field of computer networks with the concept of open system so that anyone, anywhere and at any time, have the opportunity to access these vital areas. To maintain the security and confidentiality of messages, data, or information in a computer network would require some encryption to create messages, data, or information that is not read or understood by any person, except for eligible recipients.
Currently, the growth of information and technology is rapid. It makes a lot of things in various fields including education becoming more effective and efficient. In education, one of its implementation which is a ga...
详细信息
ISBN:
(数字)9781728126654
ISBN:
(纸本)9781728126661
Currently, the growth of information and technology is rapid. It makes a lot of things in various fields including education becoming more effective and efficient. In education, one of its implementation which is a game is proven to be a useful tool to support conventional teaching methods and bring a more natural understanding of learning materials. Moreover, as a product of the popular culture in modern society, video game mirrors the general culture practice in real life and reflects it via its own culture inside the game. This makes a video game can give a contribution to the social construction of reality as it affects the player's view towards learning in real life and vice versa. From there, we see that there is an opportunity for learning about religion to be supported by its utilization to provide an interactive and fun learning experience. In this paper, we discuss how a video game is implemented to support religious learning. The game was developed with the scrum method where we surveyed to gather the user requirements before the design step. The game design was made by using the use case diagram and storyboard, and it was built using Unity version 2017.3.0f3.
SARS CoV-2 is a fascinating topic to investigate, especially in Indonesia and Malaysia, which share similar racial demographics. However, statistical analysis of information on the SARS CoV-2 from a database, especial...
SARS CoV-2 is a fascinating topic to investigate, especially in Indonesia and Malaysia, which share similar racial demographics. However, statistical analysis of information on the SARS CoV-2 from a database, especially GISAID, does not contain specific customizations related to virus comparisons between selected countries. Therefore, the researchers conducted statistical analysis and data visualization using the Python programming language to describe and investigate SARS CoV-2 Indonesia and Malaysia from the GISAID database. SARS CoV-2 metadata from Indonesia (N=117) and Malaysia (N=250), which were gathered during 2020, were compared. This comparison was aimed to investigate the discrepancies of COVID-19 cases in closely related populations. Firstly, data visualization was conducted using the Python Matplotlib library to create bar charts for clades and mutation comparison. Additionally, a series of boxplots were generated to show age discrepancies stratified by gender. Furthermore, the statistical tests showed that only the dominant Malaysian (G and O) clades were found to be significantly different compared to Indonesian cases (p-value=0.016). The proportion of two major mutations (G614D and NSP12 P323L) were also significantly different in the two countries caused by the dominant clade differences (p-value=0.007). Lastly, the differences in the age distribution of COVID-19 cases between the two countries were significant only in the male group (p-value=0.017).
It is an urgent need to find an objective way to estimate the degree of fatigue of employees. In this study, we designed a monitoring and estimation system for the degree of fatigue. This paper explains a long-term pe...
详细信息
It is an urgent need to find an objective way to estimate the degree of fatigue of employees. In this study, we designed a monitoring and estimation system for the degree of fatigue. This paper explains a long-term pedaling experiment that we use it to explore the possibility to use only the time sequence data of head movement during pedaling to estimate the fatigue. While we show the possibility for this through experimental data, it is clear that we need to collect more data to establish an estimation method.
This study aims to find articles and clauses from the 1945 Constitution (UUD 1945) using the Vector Space Model method that calculates the similarity of many documents. One document is represented by one clause from e...
This study aims to find articles and clauses from the 1945 Constitution (UUD 1945) using the Vector Space Model method that calculates the similarity of many documents. One document is represented by one clause from each article of the 1945 Constitution. The next step is pre-processing by deleting unnecessary words (stopwords) and changing it into basic words (stemmer) in the Indonesian language. Each document will be indexed to speed up query and simplify the weighting. Words weighting in documents is performed using the TF-IDF (Term Frequency-Inverse Document Frequency) algorithm by calculating the frequency of words in documents and all documents. The document search results will be presented in the ranking with the largest number of scoring appears at the top (descend sorting). The word search in this system more or less takes 90-100 milliseconds in 73 documents.
The purpose of this study is to help small clubs from Italian Serie A in finding the minimum targets to avoid relegation into Serie B competition (below Serie A league). Relegation will reduce the club's income fr...
The purpose of this study is to help small clubs from Italian Serie A in finding the minimum targets to avoid relegation into Serie B competition (below Serie A league). Relegation will reduce the club's income from TV revenues and the decline of enthusiastic supporters. Based on the data from the final standings (seasons 2006 until 2018), this can be explained by the Decision Tree method using the C4.5 algorithm. The methods used in this study are data collection, data pre-processing, model proposal, model testing, and model validation. In this study, it is expected that the value of accuracy exceeds 85% to achieve a proper classification.
Attendance, presence, or attendance recording is very important for every lecture, office or other organizational activities. Currently, recording student attendance activities at Mercu Buana University is by calling ...
Attendance, presence, or attendance recording is very important for every lecture, office or other organizational activities. Currently, recording student attendance activities at Mercu Buana University is by calling one by one the students by the lecturer, then the lecturer signs attendance on the special application form for lecturers that have been provided. For this reason, it is necessary to design a database to create the database. The analysis used is SWOT to compare between Gaudy Booch and Ivan Jacobson methods. This comparison is used to find out which method is appropriate in implementing a better database. Based on the database design that is made to further facilitate archiving of attendance, increase data efficiency. From the results of the research with class diagram description objects, the class diagram and database model that we use is from Ivar Jacobson, because it shows how actors from class diagrams point to Object-Oriented Software Engineering that has advantages that are easy to learn and have notation simpler.
暂无评论