Design teaching which is part of the system development life cycle, both information systems and application systems is very important to be taught, learned and understood in the informatics engineering study program....
详细信息
Database lectures in the informatics engineering study program teach the life cycle of database system development, both in terms of concepts, utilization, administration to database application systems to be studied,...
详细信息
Design teaching which is part of the system development life cycle, both information systems and application systems is very important to be taught, learned and understood in the informatics engineering study program....
Design teaching which is part of the system development life cycle, both information systems and application systems is very important to be taught, learned and understood in the informatics engineering study program. System design teaching in private universities in Indonesia whose students are very diverse in terms of abilities and skills require teaching materials, lecture strategies, quality of lecturers and facilities that must also be able to adapt to the challenges and complexity in teaching. The study of system design teaching uses Hevner's information systems research framework which includes the steps of constructing artifacts in the form of constructs, models, methods, instances and evaluation of artifacts using case study in informaticsengineering lecture. The use of the framework is intended to support business strategies and processes in studyprograms and to ensure the relevance of research. The result of research is a model and evaluation of the model. First, this research will produce a system design teaching model that can be used as a reference in the informatics engineering study program to produce graduates with good literacy, skills using the stages of system design, understanding user needs and system design capabilities. Second, evaluating the model that has been built by applying it to the case study on human computer interaction lecture and measuring the results of lectures to improve the quality of lecture material, teaching and students.
Database lectures in the informatics engineering study program teach the life cycle of database system development, both in terms of concepts, utilization, administration to database application systems to be studied,...
Database lectures in the informatics engineering study program teach the life cycle of database system development, both in terms of concepts, utilization, administration to database application systems to be studied, practiced and understood by students. Database teaching in the informaticsengineering department of a private university with very diverse student participants, the ability to master computer and information technology and skills requires teaching material, lecturing strategies, lecturer quality, and facilities must also be able to adjust toward challenges, concept development, and database technology. This database design research model used Hevner's information systems research framework, starting with reference research, database lecture analysis, rigor and research relevance. This research covered the steps of constructing artifacts in the form of constructs, models, methods, instantiation, and evaluation of artifacts. The use of the framework intended to support business strategies and processes in studyprograms and ensure the relevance of research. The benefits of this research will produce a database lecture model that can be used as a reference and lecture development in the informatics engineering study program. Reference to produce graduates with understanding and skills in database design, the use of Database Management System (DBMS), the ability in administration and professional capability in the database field. This research will be relevant to the studyprogram environment as well as scientific benefits in research and database teaching.
This study aims to design an assessment instrument to assess students' cognition in computer networking lessons. The design and design of the test instrument followed the ADDIE model, from the analysis stage to de...
详细信息
In 2022, Indonesia initiated a pilot project to transition from liquid petroleum gas (LPG) stoves to induction stoves, targeting 8.2 million households by 2025. While LPG is considered a clean cooking fuel by the Worl...
详细信息
3D human pose estimation (HPE) has improved significantly through Graph Convolutional Networks (GCNs), which effectively model body part ***, GCNs have limitations, including uniform feature transformations across nod...
详细信息
Corrosion poses a significant challenge in industries due to material degradation and high maintenance costs, making effective inhibitors essential. Recent studies suggest expired pharmaceuticals as alternative corros...
详细信息
Ornamental fish are a type of fish that live in freshwater or seawater habitats and are typically maintained for aesthetic purposes, often in ornamental ponds or as household pets. The diversity of colors, shapes, and...
详细信息
ISBN:
(数字)9798331504120
ISBN:
(纸本)9798331504137
Ornamental fish are a type of fish that live in freshwater or seawater habitats and are typically maintained for aesthetic purposes, often in ornamental ponds or as household pets. The diversity of colors, shapes, and patterns observed in ornamental fish presents a challenge in their classification. Therefore, a method capable of accurately recognizing the visual characteristics of these fish is required. The objective of this study is to evaluate the performance of two Convolutional Neural Network (CNN) architectures, specifically VGG-16 and U-Net, using five distinct types of ornamental fish, namely Angel Fish, Betta Fish, Clown Fish, Gold Fish, and Guppy Fish. The dataset comprises 3.240 images that have been processed using TensorFlow and Keras on Google Collaboratory. The results demonstrated that U-Net demonstrated superior performance in segmentation, with an Average Intersection over Union (IoU) of 58.91 % and an Average Dice Coefficient of 73.72%. In contrast, VGG-16 exhibited signs of overfitting, as evidenced by lower evaluation metrics. To enhance the efficacy of the transfer learning model, further optimization is recommended.
The increasing prevalence of deep hoaxes, such as fake news and phishing schemes, poses a significant threat to cybersecurity, undermining trust and spreading misinformation. In Indonesia, surveys indicate that more t...
详细信息
暂无评论