This research contributes to data collection for Indonesian Language conversation corpus or dataset collected from conversation in the movies through 1961 subtitles with 1678320 unique words. The dataset collected thu...
详细信息
This research contributes to data collection for Indonesian Language conversation corpus or dataset collected from conversation in the movies through 1961 subtitles with 1678320 unique words. The dataset collected thus trained with deep learning algorithm, a dual encoder Recurrent Neural Network (RNN), Long-Short Term Memory (LSTM) with Attention mechanism with the best result was 2.37% unknown words, loss rate was 1.66, and perplexity of 4.96, trained with vocabulary size of 24000. The dataset could be used for many machine (deep) learning for Natural Language Processing Problem in Indonesian Language, while the pre-trained model can be integrated into several system such as agent-based system, be they a chat-bot or an Embodied Conversational Agent (ECA). For future work, more data will be collected not only from the movie conversation but also natural human-human conversation in Indonesian Language.
Insurance company are certainly has a rich of data from their business process. One of the data is related to business process sales. From this sales data can be used to analyze the condition of a company whether the ...
Insurance company are certainly has a rich of data from their business process. One of the data is related to business process sales. From this sales data can be used to analyze the condition of a company whether the condition of the company is in a good condition or not. The purpose of this research is to develop a technique to analyze this data from the company. The method used to implement the data analysis in this paper is to design a data warehouse. Use ninestep methodology as the method for design data warehouse and Pentaho as a tool for ETL (Extract, Transform, Load), OLAP analysis and reporting data, the results of this research concluded that the implementation of data warehouse for perform data analysis and reporting better and more effective.
Wireless technology gradual growth in the latest years has facilitated it to bridge its applications operated extensively in many types of industry. Wireless sensor network (WSN) technology brings several benefits ove...
详细信息
Wireless technology gradual growth in the latest years has facilitated it to bridge its applications operated extensively in many types of industry. Wireless sensor network (WSN) technology brings several benefits over traditional wired technology by reason of the lower cost, immense flexibility escalation, and scalability which is able to be obtained from the old-style one. However, in its application WSN still experience some constraints on resource limitations in the form: processor, memory and energy, and any more challenges that related to availability, reliability and security. Based on its benefits, limitation, and challenges, and also three systematic stages, the review study was performed. The result of study was portrayed in this paper. It is regarding investigation result of hybrid cryptography (HC, as one of defense methods) realized for WSN to methodically increase the security level and decrease the resources usage. The result concluded that HC was proven in escalating the security defense level and downgrading the resources use on WSN compared to symmetric and asymmetric algorithms.
One of the purposes of playing a game is for entertainment. However, some games have multipurpose, not only for fun but also for research. The goals of this research are design game with motion gesture which can measu...
详细信息
ISBN:
(纸本)9781538673201;9781538673195
One of the purposes of playing a game is for entertainment. However, some games have multipurpose, not only for fun but also for research. The goals of this research are design game with motion gesture which can measure kinesthetic learning style. The user can move their hands as interaction control, replacing old navigation. Data is collected by distributing questionnaire and game score to participants. Analysis data uses index learning styles and pearson correlation. It concluded that using motion gesture game for measure method learning style can help to measure a kinesthetic player. The final result expected in this research is to help other researchers in game or learning styles.
Document management system makes user to access information anytime and anywhere. The purpose of this research is to analyze what variables have impact on the intention to use of document management system. To achieve...
详细信息
Document management system makes user to access information anytime and anywhere. The purpose of this research is to analyze what variables have impact on the intention to use of document management system. To achieve the objectives conducted by identification problem on the research model developed from the model of Technology Acceptance Model and Unified Theory of Acceptance and Use of Technology to the use of document management system. Furthermore, the data obtained from the respondents tested outer model, inner model test, hypothesis test and to produce a comprehensive analysis will be conducted Importance Performance Analysis. This research will result in a comprehensive analysis and able to provide recommendations and solutions for improvement from the implementation DMS has been done earlier.
Numerous ransomware attack was launched at May 2017 since it become emerge as trending for new cybercrime business source income model. The attack to several Big Data Architecture causing problem to over 150 countries...
详细信息
Numerous ransomware attack was launched at May 2017 since it become emerge as trending for new cybercrime business source income model. The attack to several Big Data Architecture causing problem to over 150 countries. Meanwhile, the research on prevention idea of this attack method are still under struggle. This make ransomware becoming a serious and growing cyber issue. In spite of that, the objective of this paper is to share the application ideas from crypto-ransomware attack method toward future prevention mechanism application to make the Big Data Architecture more immune from future ransomware attack. The method used in this paper is systematic-review. The result is application prevention mechanism named as SeCBD which abbreviation for “Secure Big Data”. The application idea that result from the systematic review (SeCBD) concludes that most of crypto-ransomware still have chance to disabled, detected, or prevented.
This paper studies non-parametric time-series approach to electric load in national holiday seasons based on historical hourly data in state electric company of Indonesia consisting of historical data of the Northern ...
详细信息
One challenge in learning programming either by self-learning or in the classroom is the lack of interactive learning content. For teachers, authoring tool is a solution that can help them in designing materials with ...
详细信息
One challenge in learning programming either by self-learning or in the classroom is the lack of interactive learning content. For teachers, authoring tool is a solution that can help them in designing materials with interactive video. For students, interactive learning materials will certainly increase interest and understanding of the material. Goal of this research is to build an authoring tool for producing interactive video to be run on the browser. The methodology used was the RUP (Rational Unified Process) which consists of Inception, Elaboration, Construction, and Transition phases. Result of this study is an authoring tool application for designing and producing interactive video and generating it to HTML5 platform. Conclusions obtained are the authoring tool can help teachers to design teaching materials in the form of interactive video, and use it in teaching and learning process to increase students understanding of material.
作者:
F FiosCharacter Building Development Centre
Computer Science Department School of Computer Science Bina Nusantara University Jl. Kemanggisan Ilir III No. 45 Palmerah Jakarta Barat Indonesia
The environmental crisis that hit the global world has threatened the future of the human being and all living in the world. The root of the environmental crisis today that is due because of the 'human factors'...
The environmental crisis that hit the global world has threatened the future of the human being and all living in the world. The root of the environmental crisis today that is due because of the 'human factors'. Human mindset embodied in various forms of exploitation of the natural act of damaging our environment tragically. Understand anthropocentrism is so permeated human thought patterns stimulate human passion to continue to exploit nature without human arbitrarily. Natural objectified and regarded as a place to suck it for the benefit of human. And nature environment needs to be protected by human as moral person. One way to protect nature is not a great design technology, but change the mind set of people from anthropocentric paradigm to eco centrism awareness in order to protect the environment entity. The purpose of this study is to build a construction of ecological thinking to support environmental protection efforts. Using reflection methods especially deconstruction of Derrida, continuously critical of anthropocentrism is a must as one way to protect the environment in theoretical thinking frame. Through this frame of thinking, it can have constructed the concept of ecological awareness for protecting environment and the good condition to the earth and all reality of life. This concept is useful for enriching theoretical thinking to protect the environment.
Nowadays, there are many efforts in building intelligent humanoid robot and adding advanced ability such as Blind Speech Separation (BSS). BSS is a problem of separation of several speech signals in a real world from ...
详细信息
Nowadays, there are many efforts in building intelligent humanoid robot and adding advanced ability such as Blind Speech Separation (BSS). BSS is a problem of separation of several speech signals in a real world from mono or stereo audio record. In this research, we implement BSP system using DUET algorithm which allow to separate any number of sources by using only stereo (two) mixtures. The DUET (Degenerate Unmixing Estimation Technique) algorithm replaces our previous FastICA (Fast Independent Component Analysis) method only success in simulation but failed in the implementation. The main problem of FastICA is that it assumes instantaneous mixing without time delay in the recording process. To deals with audio record in the presence of inevitable time delays, it has to be replaced with DUET algorithm to separate well in real time. Finally, the DUET algorithm is implemented to humanoid robot which is developed using Raspberry Pi and equipped with RaspPi Cam to detect human face. Furthermore, the Cirrus Logic Audio Card is stacked to Raspberry Pi in order to record stereo audio. In our experiments, there are three controlled variables to evaluate algorithm performance, that is: distance, number of sources, and subject’s name. Robot will record stereo audio for four seconds after face is detected by system. The recording is then separated by DUET algorithm and produce two source estimations with average computation time 1.8 seconds. With Google API, the recognition accuracy of separated speech is varying between 40%-70%.
暂无评论