Supplier evaluation has a crucial role in maintaining efficiency in the food industry supply chain. Machine learning approaches can be employed to formulate models aimed at analyzing and evaluating supplier performanc...
详细信息
Supplier evaluation has a crucial role in maintaining efficiency in the food industry supply chain. Machine learning approaches can be employed to formulate models aimed at analyzing and evaluating supplier performance. Previous research has successfully designed decision tree and neural network models for assessing suppliers in the food industry with accuracies of 84.2% and 92.8% separately. Recognizing the opportunity to improve the model's performance, this study aims to advancing the machine learning models accuracy for analyzing and evaluating suppliers in the food industry. Two main models are proposed to enhance model accuracy: ensemble methods and support vector machine. This research has successfully designed a supplier evaluation model and demonstrated that the ensemble method - gradient boosting model outperforms other ensemble methods and support vector machine which is achieved a accuracy of 93.6% on a cross-validation dataset. The development of a dashboard is required to implement the supplier evaluation model using machine learning, facilitating decision-makers in evaluating and controlling supplier performance.
The development of the internet is getting faster, participating in encouraging the emergence of new and innovative information. In filtering the various information that appears, we need a recommended system to perfo...
详细信息
Sleep is the natural state of relaxation for human being. Sleep quality is an essential yet frequently neglected aspect of sleep in general. Sleep quality is essential because it allows the body to rest...
详细信息
Sleep is the natural state of relaxation for human being. Sleep quality is an essential yet frequently neglected aspect of sleep in general. Sleep quality is essential because it allows the body to restore itself and prepare for the next day. The standard method for evaluating sleep quality was subjective evaluation. Actigraphy devices, which can measure the sleep cycle, are now widely available. This study developed a method using Fuzzy Logic and an actigraphy device to measure and classify sleep quality. The fuzzy logic method was developed in several stages, which are determining the sleep quality measurement parameters, constructing the fuzzy set for each input variable, and developing the fuzzy rules. To evaluate the proposed fuzzy model, five individuals were invited to participate in the experiment and required to complete the PSQI subjective sleep questionnaire. The evaluation result shows that our proposed Fuzzy model achieves lower error compared to the existing method.
Many individuals now trade online utilizing trading software in the digital world. Binomo is one of Indonesia's most popular trading platforms. This is because some influencers made several promises to Binomo cust...
详细信息
Many individuals now trade online utilizing trading software in the digital world. Binomo is one of Indonesia's most popular trading platforms. This is because some influencers made several promises to Binomo customers. Since many customers were deceived, this case became quite popular. This study was executed to see how Indonesians felt about the Binomo application after the case went viral. The solution taken was in the form of sentiment analysis because there had been no previous research on sentiment analysis that discussed the Binomo case. The data was scanned using Netlytic tools, a cloud-based text and social network analyzer capable of identifying any talks on social media sites such as Twitter. The sentiment analysis of Binomo trading tweets by using the Multi-Perspective Question Answering lexicon utilized the KNIME tool. But unfortunately, the accuracy of sentiment analysis results is low. Furthermore, the Support Vector Machine technique is also being conducted. The Term Frequency-Inverse Document Frequency method is applied to perform feature extraction whilst the chi-square approach is utilized to identify features that are thought to be useful for inclusion in the classification process and to exclude features that are irrelevant to the target class. The obtained accuracy is 86%. The study proposes that words from the algorithm's outputs can be utilized to improve the quality of sentiment analysis using the lexicon. As an outcome of the algorithm, positive and negative terms are added to the lexicon, increasing the accuracy of sentiment analysis using the new vocabulary from 58.984% to 71.146%.
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. ...
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. This study explores IDOR vulnerabilities found within Android APIs, intending to clarify their inception while evaluating their implications for application security. This study combined the qualitative and quantitative approaches. Insights were obtained from an actual penetration test on an Android app into the primary reasons for IDOR vulnerabilities, underscoring insufficient input validation and weak authorization methods. We stress the frequent occurrence of IDOR vulnerabilities in the OWASP Top 10 API vulnerability list, highlighting the necessity to prioritize them in security evaluations. There are mitigation recommendations available for developers, which recognize its limitations involving a possibly small and homogeneous selection of tested Android applications, the testing environment that could cause some inaccuracies, and the impact of time constraints. Additionally, the study noted insufficient threat modeling and root cause analysis, affecting its generalizability and real-world relevance. However, comprehending and controlling IDOR dangers can enhance Android API security, protect user data, and bolster application resilience.
Centralized machine learning algorithms in vehicular networks face privacy and resource constraints. Federated Learning (FL) addresses these by enabling collaborative model training without sharing raw data. To incent...
详细信息
To accurately assess the dynamic impact of a company’s activities on its Environmental, Social, and Governance (ESG) scores, we have initiated a series of shared tasks, named ML-ESG. These tasks adhere to the MSCI gu...
详细信息
Bacteria are microscopic organisms that can be found in many environments. They are abundant and have many roles in our life. Studying bacteria is essential so that we can identify the bacteria that are needed for man...
详细信息
computer vision has been used in many areas such as medical, transportation, military, geography, etc. The fast development of sensor devices inside camera and satellite provides not only red-greed-blue (RGB) images b...
详细信息
Solar energy is one of the most abundant sources of renewable energy in Indonesia. Solar energy is now typically harnessed using solar panels, but the low efficiency of photovoltaic cells requires the development of o...
Solar energy is one of the most abundant sources of renewable energy in Indonesia. Solar energy is now typically harnessed using solar panels, but the low efficiency of photovoltaic cells requires the development of other alternatives. The heliostat is a sunlight directing device with mirrors that can be used in a concentrated solar power system. Current heliostats require high capital investment due to their large frames and expensive components. This research was undertaken to develop a lower cost heliostat using a smaller frame, ESP32 microcontroller, servo motor and low-cost components. The position of the sun can be determined using an algorithm based on the National Oceanic and Atmospheric Administration (NOAA) solar calculator, and the mirror is moved to maintain the sun's reflection on a target. The result of this research is a set of heliostat prototypes consisting of the frame and control system. Tests were carried out to test the performance of the designed heliostat and it was found that the heliostat has an accuracy of about 60 cm and can raise temperatures up to 3.41°C. The conclusion is that the heliostat can be used in a concentrated solar power system to heat boilers in solar power towers.
暂无评论