PC computer is a flexible electronic device and can receive and process data quickly and accurately, and can also store data for a long time. There is a time when the PC hardware is damaged. So that it annoys the user...
PC computer is a flexible electronic device and can receive and process data quickly and accurately, and can also store data for a long time. There is a time when the PC hardware is damaged. So that it annoys the user. In connection with the problems that occur, the researchers aim to build an Expert System application to diagnose damage to PC computers using the Certainty Factor method by using Visual Studio 2010 applications and using Microsoft Access 2013 as a database. Applications that are built can be an alternative in knowing the type of damage and provide alternative solutions in handling damage to PC computer hardware.
Photocopying machines are machines that make paper copies of documents and other visual images quickly and cheaply. PT. TRITANU has a copy machine product, such as the Fotocpy Sharp machine Type B201D. The rapid devel...
Photocopying machines are machines that make paper copies of documents and other visual images quickly and cheaply. PT. TRITANU has a copy machine product, such as the Fotocpy Sharp machine Type B201D. The rapid development of photocopying technology at this time can be seen that adult photocopying machines are now not only operating copier but can scan, print, and even fax. The rapid development of photocopying technology does not necessarily provide complete convenience to users. This can be seen from the high cost of consultation in the event of damage to the photocopy machine, requiring time to check the damaged machine, and not to mention other procedures in the repair that exist at PT. TRANANU. So from to provide solutions to these problems, the researchers made an Expert System for Handling Print Results Problems on Sharp Photocopying Machines Type B201D Using the Certainty Factor Method. System testing shows that the system is able to diagnose damage to the B201D copy machine based on the symptoms in the printout, even though these symptoms contain uncertainty. The results of the diagnosis are accompanied by Certainty Factor values that indicate the level of truth, accuracy of possible damage to the B201D copy machine.
Companies, agencies and individuals currently use social media as a means of communication and business facilities, because through social media the staffs can connect globally in expressing ideas, feelings or emotion...
详细信息
In analyzing the benefits of infrastructure development, several rules of economics and feasibility studies for infrastructure development are used, namely aspects of benefits, effectiveness and efficiency. These rule...
In analyzing the benefits of infrastructure development, several rules of economics and feasibility studies for infrastructure development are used, namely aspects of benefits, effectiveness and efficiency. These rules are applied to the results of the benefits data when infrastructure development is carried out in the first year and the results of the benefits data are processed using mamdani fuzzy logic reasoning which consists of 2 inference processes. In processing fuzzy input data produces output from the inference process which is then classified in 5 feasibility conditions, namely, low, normal, high, very high and not feasible which is used as a support facility in making infrastructure development decisions.
Digital Dictionary of computer and Network Engineering can be used in the learning process of computer and nerwork enginering students. Dictionaries are generally book-shaped is hard to carry because of their thick an...
Digital Dictionary of computer and Network Engineering can be used in the learning process of computer and nerwork enginering students. Dictionaries are generally book-shaped is hard to carry because of their thick and heavy, now can be accessed anywhere by development of web technology. Digital dictionaries can be accessed through computers, laptops dan cellphones, this is make student easily in learning process. The digital dictionary can not only be used by students of computer and network engineering, but can also by general public, as long as you have an internet connection, anyone can be use this digital dictionaries. The main process in this digital dictionary is the search process. Binary search algorithm used in the search process of binary search algoritm. Binary search algoritm search is applied to word search in this digital dictionary, because this algoritm is intended for sequintal data. Program language that will be used to build this digital dictionary is PHP and MySQL.
Generating membership function fuzzy for Fuzzy system is important to representative of the problem. Some research generating a membership function automatic had done and still have a problem to generate procces in ma...
Generating membership function fuzzy for Fuzzy system is important to representative of the problem. Some research generating a membership function automatic had done and still have a problem to generate procces in max iterasi, so that this research will generating membership function fuzzy otomatic used genetic algorithm by analysing the cross over point.
Companies, agencies and individuals currently use social media as a means of communication and business facilities, because through social media the staffs can connect globally in expressing ideas, feelings or emotion...
详细信息
ISBN:
(纸本)9781538639481
Companies, agencies and individuals currently use social media as a means of communication and business facilities, because through social media the staffs can connect globally in expressing ideas, feelings or emotions. However, social media users need to be aware of the security risk to their organization. In this paper, we present a perception of the risks, benefits, and strategies of social media applications developed from societies that use social media in the company by discussing existing regulations and how they apply to the use of social media by companies/institutions also to overcome this challenge. From this research, a solution is made for companies whose security rules are being used by the public. This regulatory framework can serve as a basis for establishing company internal policies for the use of social media by its employees. With the creation of policies that are the result of this study, companies that have the maximum ability in the field of information technology.
暂无评论