multidisciplinary collaboration between public health, system engineering, and UX is able to generate a solution in healthcare problem like stunting. The principle of Agile UX gathers requirements to generate an appli...
详细信息
ISBN:
(纸本)9781665476652
multidisciplinary collaboration between public health, system engineering, and UX is able to generate a solution in healthcare problem like stunting. The principle of Agile UX gathers requirements to generate an application design. Currently, various website and mobile applications are available to be utilized for stunting research. StuntingDB is one of many web-based applications that specialized in stunting data management. The application required several types of users to operate hierarchically. This research focused on Public Health Officers’ workflow that require a solution to in the form of assessment module for stunting DBMS by using Agile UX principle. The method collaborates agile team and UX team to solve Public Health Officer's difficulty in changing stunting status at pre-saved child patient's profile. Collaboration of both agile team and UX team successfully proposed an application design that system design.
Companies or organizations usually use key performance indicators (KPI) as indicators to determine their performance. The company's performance achievements are reflected in the set indicators that will describe t...
Companies or organizations usually use key performance indicators (KPI) as indicators to determine their performance. The company's performance achievements are reflected in the set indicators that will describe the overall performance, as well as higher education institutions can also set key performance indicators, to see their performance achievements. The use of e-learning as a tool to support teaching and learning processes to be more effective and efficient is an example of which performance needs to be measured. This article discusses how the process of developing key performance indicators is carried out through the stages of designing questionnaires and distributing questionnaires to students, data is processed using the method of factor analysis to obtain the main indicators determining performance and the method of regression analysis is also used to build performance models. obtain KPI determinants, and then develop KPI models. The results show that there are indicators of sharing knowledge, managing knowledge, understanding knowledge, and utilization knowledge as performance measurement indicators.
This research raises problems among Baitul Mal aid recipients regarding aid to micro businesses. The process of assisting is an important activity to develop micro-businesses so that they can continue to operate and d...
This research raises problems among Baitul Mal aid recipients regarding aid to micro businesses. The process of assisting is an important activity to develop micro-businesses so that they can continue to operate and develop. Selection is also needed to prevent aid from being distributed incorrectly. Therefore, the proposed solution is to utilize data mining techniques, especially classification methods (clustering) to identify potential aid recipients who truly deserve to receive aid. This research also uses the Principal Component Analysis (PCA) method to reduce attribute dimensions in the dataset to increase the accuracy of the classification process. By optimizing the classification process through appropriate attribute reduction, this research is expected to make a positive contribution to increasing the efficiency and accuracy of credit risk assessment in the banking sector. The results of this research are: accuracy after the dataset has been reduced by 2 (two) attributes has a higher value when compared to the dataset that has not been reduced, this happens because the attribute reduction process is carried out to reduce attributes that are not or less relevant. So it can be said that the reduction process influences the accuracy of the C5.0 algorithm classification results.
Since the RSA algorithm is no longer secure and a lot of research has been done to break down RSA security, it is necessary to do research by making a combination of modifications of RSA algorithms, in this case using...
Since the RSA algorithm is no longer secure and a lot of research has been done to break down RSA security, it is necessary to do research by making a combination of modifications of RSA algorithms, in this case using enhanced RSA using fake modules, with RCCM (RC4 Chaotic Map) algorithms to produce a Hybrid Cryptosystem that is expected to be able to improve the security of secret messages. The combination process is done by encrypting the messages using the RCCM algorithm first, then the messages that have been encrypted back in the encryption using the enhanced RSA algorithm with fake modules. So the security of messages has been improved. As for the results of this study, the key generation process is automatically generated which produces keystream for RCCM and fake public key and fake private key for enhanced RSA. In addition, what distinguishes enhanced RSA from ordinary RSA is the use of four primes p, q, r, and s. as well as the application of chaotic maps to RCCM gives the advantage of the unnecessary use of generating keys manually. With these keys, the process of encryption and decryption can be carried out to generate a secret message. In addition, the program resulting from this research applies the kraitchik factorization algorithm as a medium of attack against the key. The conclusion of this study is that by doing a hybrid cryptosystem enhanced RSA and RCCM can be safer due to the occurrence of double encryption processes. In addition, an enhanced RSA algorithm determines a fake module where the value of X is a prime number so that if attacked using a kraitchik factorization algorithm it is difficult to find a factorization of X values that corresponds to the number of p, q, r, and s.
Sarcasm is the use of words usually used to either mock or annoy someone, or for humorous purposes. Sarcasm is largely used in social networks and microblogging websites, where people mock or censure in a way that mak...
详细信息
Indonesia had been suffered by earthquake and tsunami for many centuries. Since many lives have taken by tsunami strikes, alert and response system are very important as important part of Disaster Risk Reduction, espe...
详细信息
Relationship with customers is one of the most crucial factors in business continuity and development. Many current businesses have started delving into Customer Relationship Management (CRM) to establish and maintain...
Relationship with customers is one of the most crucial factors in business continuity and development. Many current businesses have started delving into Customer Relationship Management (CRM) to establish and maintain their sales and customer relationships. This research was conducted on one retail company that implements CRM but experiencing a gap in their unit sales performance between their targeted sales and the realization. This study aims to analyze the gaps causing factors using Factor Analysis Method, constructing a suitable regression model, and proposing the company's necessary strategy. The research was conducted quantitatively using a questionnaire from 264 respondents. The result of this study showed that there are five causing factors which are CRM Reliability, Underutilization of CRM, CRM Capability, CRM Unpreparedness, and Customer Relation Quality, as well as forming a regression model of the company's CRM performance.
This study aims to determine the effect of business strategy on the quality of accounting information, to determine the effect of leadership style on the quality of accounting information and to determine the effect o...
详细信息
This study aims to assist resource management and the project controller at Port Harbor Company. Port Harbor Company is an IT Consulting. Problems that often occur in IT Consulting are related to the project cost, res...
详细信息
Any form of communication that expresses hatred, prejudice, or hostility toward a particular individual or group of people based on attributes such as their race, religion, ethnicity, nationality, gender, sexual orien...
Any form of communication that expresses hatred, prejudice, or hostility toward a particular individual or group of people based on attributes such as their race, religion, ethnicity, nationality, gender, sexual orientation, disability, or other protected characteristics is considered hate speech. Hate speech can be verbal, written, or symbolic. Hate speech can take many forms, and it often involves derogatory language, offensive stereotypes, or the incitement of violence or discrimination against the targeted individuals or groups. The content of hate speech is easy found in forum or discussion in social media include twitter. Twitter is a microblogging-based virtual entertainment where clients can peruse and compose text called tweets or tweets. This exploration executes order of disdain discourse in media Twitter utilizing IndoBERT. IndoBERT is the Indonesian form of BERT model utilizing over 220M words. It was a Convolutional Neural Network-based algorithm that had been modified. Th highlight extraction in Transformer isn’t finished by convolution utilizing a part like CNN, however includes an encoder and decoder. The outcome demonstrates IndoBERT’s excellent ability to categorize hate speech.
暂无评论