Attribution of cybercrimes is significant in limiting the rate of crime as well as in preparing the required level of response. Motivated by this significance, we introduce a level-based approach for achieving attribu...
详细信息
Along with the rapid development of multimedia and information technology in the recent years, a large number of photos and videos can be easily created and distributed by each and every member of our society. Some of...
Along with the rapid development of multimedia and information technology in the recent years, a large number of photos and videos can be easily created and distributed by each and every member of our society. Some of these images are genuine, while some others have gone through modifications. Although the creation and posting of edited photographs in media are basically not prohibited, it becomes a problem when they are used improperly. Until now, the common practice in Indonesia when assessing whether an image has been modified or is original is still heavily dependent on human expert assessment that could be subjective. This research offers an alternative solution that is objective by developing a systematic image analysis method for distinguishing between original and modified image. The method utilizes high-level feature, namely the metadata of the image file, to differentiate between original and modified image. A prototype system was implemented in Visual Basic as a desktop application. The application used MS Windows GDI+. This prototype application can be used as a reliable and faster means to assist in fake image detection. However, as metadata-based analysis only detects whether a photograph has possibly been edited and it does not show which part of the photograph has been manipulated, future work includes development of pixel-based analysis approach.
Imparting real world experiences in a software verification and validation (SV&V) course is often a challenge due to the lack of effective active learning tools. This pedagogical requirement is important because g...
Corruption is an extraordinary crime and must be eradicated not only as fast as possible, but also as efficient and as effective as possible as it hinders the process of achieving sustainable economy. In current moder...
Corruption is an extraordinary crime and must be eradicated not only as fast as possible, but also as efficient and as effective as possible as it hinders the process of achieving sustainable economy. In current modern society, information technology exists as a multidisciplinary tool to solve lingering problems that could not be solved by traditional efforts. This paper aims to provide knowledge regarding identified efforts to fight corruption specifically in Indonesia region. Systematic Literature Review (SLR) methodology is used as the methodology, and Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) flow is used as framework to identify relevant records. Scopus database is used as data source. A total of 10 records are labelled as relevant to this research, and the findings are synthesized. It was found from the records that the main areas of interest for ICT research for corruption prevention in Indonesia are (1) information transparency, (2) operational enhancement, (3) success evaluation, (4) security and fraud, and (4) decision support. The findings are expected to assist future research in term of providing valuable insights on corruption prevention using ICT in Indonesia.
Cox's proportional hazard (CPH) model is a statistical technique that captures the interaction between a set of risk factors and an effect variable. While the CPH model is popular in survival analysis, Bayesian ne...
详细信息
Cox's proportional hazard (CPH) model is a statistical technique that captures the interaction between a set of risk factors and an effect variable. While the CPH model is popular in survival analysis, Bayesian networks offer an attractive alternative that is intuitive, general, theoretically sound, and avoids CPH model's restrictive assumptions. Existing CPH models are a great source of existing knowledge that can be reused in Bayesian networks. The main problem with applying Bayesian networks to survival analysis is their exponential growth in complexity as the number of risk factors increases. It is not uncommon to see complex CPH models with as many as 20 risk factors. Our paper focuses on making large survival analysis models derived from the CPH model tractable in Bayesian networks. We evaluate the effect of two complexity reduction techniques: (1) parent divorcing, and (2) removing less important risk factors based on the accuracy of the resulting models. 2016 Microtome Publishing. All rights reserved.
This paper describes our work on mining pollutant data to assess air quality in urban areas. Notable aspects of this work are that we mine social media and structured data in a domain-specific context, incorporate com...
详细信息
There can be no debate that information Mining Projects cause processing tools to arise with the sole purpose of converting available organization data into useful knowledge on account of decision-making. Considering ...
详细信息
Lembaga Alkitab Indonesia (LAI or Indonesia Bible Society) is a nonprofit corporation that supports churches, organizations and Christians in Indonesia for the provision of the Bible and its parts. One of the faciliti...
详细信息
ISBN:
(纸本)9781509020348
Lembaga Alkitab Indonesia (LAI or Indonesia Bible Society) is a nonprofit corporation that supports churches, organizations and Christians in Indonesia for the provision of the Bible and its parts. One of the facilities provided by LAI is the Biblical Library. The problem that faced is the library management is still done manually. This research aims to design and build a web-based information system that could facilitate Biblical library management system LAI Jakarta in managing the collection, circulation, membership and online visitor access. The method that used is the Software Development Life Cycle (SDLC) with implementation stages that using the programming Hypertext Preprocessor (PHP) and storage of data using MySQL and Apache as the web server.
Business Intelligence (BI) and Data Analytics applications depend on an effective ETL (Extract, Transform and Load) process . This paper presents an approach and a Rapid Application Development (RAD) tool to increase ...
详细信息
ISBN:
(纸本)9788576693178
Business Intelligence (BI) and Data Analytics applications depend on an effective ETL (Extract, Transform and Load) process . This paper presents an approach and a Rapid Application Development (RAD) tool to increase efficiency and effectiveness of ETL programs development and maintenance. Furthermore, it is also described a controlled experiment conducted in industry to carefully evaluated the efficiency and effectiveness of the tool. The results indicate that our approach can indeed be used as method aimed at improving and speed up ETL process maintenance.
This paper presents an approach to automate the selection and execution of previously indentified test cases for loading procedures in Business Intelligence (BI) environments based on Data Warehouse (DW). To verify an...
详细信息
ISBN:
(纸本)189170639X
This paper presents an approach to automate the selection and execution of previously indentified test cases for loading procedures in Business Intelligence (BI) environments based on Data Warehouse (DW). To verify and validate the approach, a unit test framework was developed. The overall goal is achieve data quality improvement. The specific aim is reduce test effort and, consequently, promote test activities in data warehousing process. A controlled experiment evaluation was carried out to investigate the adequacy of the proposed method for data warehouse procedures development. The results of the experiment show that our approach clearly reduces test effort when compared with manual execution of test cases.
暂无评论