The Faculty of computer Science, Universitas Brawijaya (Filkom UB) is committed to providing quality services for the users especially internal and external stakeholders, one of which is through the HaloFilkom service...
详细信息
ISBN:
(数字)9798350379914
ISBN:
(纸本)9798350379921
The Faculty of computer Science, Universitas Brawijaya (Filkom UB) is committed to providing quality services for the users especially internal and external stakeholders, one of which is through the HaloFilkom service. HaloFilkom services have limitations in terms of time. HaloFilkom services are not available 24 hours due to limited working hours. Questions asked by users are not answered directly. This weakness in the HaloFilkom system can be overcome by using a chatbot system. Chatbot is an interactive system that works with natural human language and can work 24 hours. Thus, the current study explores the basic chatbot model by classifying the Q&A in the closed domain knowledge. The dataset in this research is in the form of pairs of questions and answers regarding various topics at the Filkom UB. The knowledge is preprocessed using text preprocessing which includes case folding, tokenization, padding, and tensorization. One of the chatbot models is a generative model. Creating a generative chatbot model can be done using the Seq2Seq model mechanism which consists of an encoder and decoder. The model created consists of four different architectures, namely a model with an LSTM encoder without attention and with attention and a BiLSTM model encoder without attention and with attention. Hyperparameter tuning was conducted to obtain the best hyperparameter combination. The experiment results show the best hyperparameter combination obtained is hidden size 448, drop out rate 0.5, learning rate 0.001, batch size 64, and teacher force 0. The model with the best loss is obtained with a BiLSTM encoder architecture without an attention mechanism with a train loss of 0.120. The model with the highest BLEU Score was obtained by a model with a BiLSTM encoder architecture without an attention mechanism with a BLEU Score of 0.8587 on the training data. Testing using prompt testing obtained an average BLEU Score of 0.3745 on the BiLSTM encoder without an attention mechanism mo
The Network Data Analytics Function (NWDAF) within the 5G core is not an inherent feature of open-source 5G cores, making its implementation necessary based on provider demands. However, for those seeking to integrate...
详细信息
About 10% individuals with visual impairment also use wheelchair, which makes them difficult to ambulate into a room that can only be distinguished by text independently. One thing that could be a solution is to imple...
详细信息
ISBN:
(数字)9798350381764
ISBN:
(纸本)9798350381771
About 10% individuals with visual impairment also use wheelchair, which makes them difficult to ambulate into a room that can only be distinguished by text independently. One thing that could be a solution is to implement a room nameplate recognition system on autonomous smart wheelchairs so that it can ambulate the user to the dedicated room autonomously. We proposed a lightweight YOLOv5-based method to detect room nameplates that is more suitable for embedded devices such as smart wheelchair. We improved YOLOv5 with ghost module and coordinate attention to reduce model complexity while still maintain the detection accuracy. Using room nameplate images data that has been collected by our self, the proposed method has 29 % less parameter with about the same accuracy as the original YOLOv5. With a low complexity of object detection model, our study may be utilized for room nameplate recognition system on smart wheelchair.
Service composition in Internet of Things (SCIoT), as an emerging topic in service computing, aims to select optimal services to complete user requests according to various user requirements such as minimizing energy ...
详细信息
Existing simulations of terrorist attacks do not consider individual *** overcome this lim-itation,we propose a framework to model heterogeneous behavior of individuals during terrorist *** constructed an emotional mo...
详细信息
Existing simulations of terrorist attacks do not consider individual *** overcome this lim-itation,we propose a framework to model heterogeneous behavior of individuals during terrorist *** constructed an emotional model that integrated personality and visual perception for *** emotional model was then integrated with pedestrian relationship networks to establish a decision-making model that sup-ported pedestrians’altruistic behaviors.A mapping model has been developed to correlate antisocial personality traits with attack strategies employed by *** demonstrate that the proposed algorithm can generate practical heterogeneous behaviors that align with existing psychological research findings.
Currently, the number of COVID-19 patients in Indonesia has not shown a significant decline. One of the reasons is the difficulty of analyzing medical record data of COVID-19 patients. The analysis becomes difficult b...
详细信息
Since deep learning models are usually deployed in non-stationary environments, it is imperative to improve their robustness to out-of-distribution (OOD) data. A common approach to mitigate distribution shift is to re...
ISBN:
(纸本)9798331314385
Since deep learning models are usually deployed in non-stationary environments, it is imperative to improve their robustness to out-of-distribution (OOD) data. A common approach to mitigate distribution shift is to regularize internal representations or predictors learned from in-distribution (ID) data to be domain invariant. Past studies have primarily learned pairwise invariances, ignoring the intrinsic structure and high-order dependencies of the data. Unlike machines, humans recognize objects by first dividing them into major components and then identifying the topological relation of these components. Motivated by this, we propose Reconstruct and Match (REMA), a general learning framework for object recognition tasks to endow deep models with the capability of capturing the topological homogeneity of objects without human prior knowledge or fine-grained annotations. To identify major components from objects, REMA introduces a selective slot-based reconstruction module to dynamically map dense pixels into a sparse and discrete set of slot vectors in an unsupervised manner. Then, to model high-order dependencies among these components, we propose a hypergraph-based relational reasoning module that models the intricate relations of nodes (slots) with structural constraints. Experiments on standard benchmarks show that REMA outperforms state-of-the-art methods in OOD generalization and test-time adaptation settings.
Throughout the last few decades, Nature-Inspired Algorithms (NIA) have become very popular in solving real-world problems by getting inspiration from nature. This work suggests the Modified Donkey and Smuggler Optimiz...
详细信息
Providing accurate and actionable advice about phishing emails is challenging. The majority of advice is generic and hard to implement. Phishing emails that pass through filters and land in user inboxes are usually so...
详细信息
In modern agriculture, the capability to promptly detect and respond to specific events is crucial. This study centres on the transformative potential of TinyML for enhancing event detection in Smart Agriculture, part...
详细信息
暂无评论