Flood disaster happens periodically in Jakarta. One opportunity that can be maximized to mitigate it is control management of the Manggarai water gate (MWG). The MWG itself is placed in the Ciliwung river in one distr...
Flood disaster happens periodically in Jakarta. One opportunity that can be maximized to mitigate it is control management of the Manggarai water gate (MWG). The MWG itself is placed in the Ciliwung river in one district of the capital Jakarta. It has a vital role to minimize the impact of flood disasters in Jakarta. The study is a further version of previous research indeveloping a water-flow-like algorithm (WFA) based decision support model (DSM) to mitigate the impact of flood disasters. Theconstructed DSM is practically functioned to control the operation of opening/closing the MWG. The DSM was constructed by combining the previous WFA model with the concept of fuzzy logic (FL). The constructed model is called Fuzzy-WFA (FWFA) ecological DSM (ecoDSM); as it considers several aspects of ecology, e.g. river condition, weather situation, and flood itself. By building the FWFA-ecoDSM, the value of uncertainty can be converted to become crisp logic that is easier to understand. At the end of this research, the FWFA-ecoDSM was implemented in more detail compared with the previous one by producing the decimal numbers with 3 until 6 numbers behind the point; exclusively, in predicting the water level status, where the status used todecide the opening/closing level decision for opening or closing the MWG.
—Machine learning has endless applications in the health care industry. White blood cell classification is one of the interesting and promising area of research. The classification of the white blood cells plays an i...
详细信息
In the digital and Internet era, companies are racing to profile their target users based on their online activities. One of the reliable sources is the news articles they read that can represent their interests. Howe...
详细信息
In the digital and Internet era, companies are racing to profile their target users based on their online activities. One of the reliable sources is the news articles they read that can represent their interests. However, extracting latent information from the news articles is not an easy task for a human. In this paper, we introduced a practical model to automatically extract latent information from news articles with pre-determined topics. Our proposed model used unsupervised learning, thus alleviating the need for humans to label news items manually. Doc2vec was used to generate word vectors for each article. Afterward, a spectral clustering algorithm was applied to group the data based on the similarity. A supervised Long Short Term Memory (LSTM) model was built to compare the clustering performance. The best 1, best 3, and best 5 scores were used to evaluate our model. The result showed that our model could not outperformed LSTM model for the best 1 score. However, the best 5 score result indicated that our model was sufficiently robust to cluster the articles based on topic similarity. Additionally, the proposed unsupervised model was implemented in both an on-premise server, and a cloud server. Surprisingly, our proposed method could run faster in the cloud server despite its less number of CPU cores.
The lowest time search in the dataset that E. Taillard utilized employs a heuristic approach based on tabu search techniques to get the predicted solution. Glover’s study gives a broad description of tabu search, whi...
The lowest time search in the dataset that E. Taillard utilized employs a heuristic approach based on tabu search techniques to get the predicted solution. Glover’s study gives a broad description of tabu search, which is commonly encountered in Taillard’s job shop scheduling difficulties and Widmer et al.’s flow shop sorting challenges. Although tabu search is relatively simple to use and typically yields excellent results, it takes a long time to complete. In this research a hybrid ACO and PSO was carried out to minimize makespan in the Job Shop Scheduling Problem which was used as sourced from benchmark data which is secondary data obtained from E. Taillard “Benchmarks for basic scheduling problems” which consists of job shop matrix data (job × machine) measuring 4 × 4, 5 × 5, 7 × 7, 10 × 10, 15 × 15, 20 × 20, 30 × 15, 30 × 20, 50 × 15 and 50 × 20. Hybrid is carried out by calculating the Pbest value, namely the process position of each job on the machine to get the best solution using the PSO algorithm. Next, calculate the Gbest (Global best) value for the position of each job on the best machine on the entire machine using the PSO algorithm and initialize the ACO parameters using the PBest and Gbest values. The results of research on datasets with sizes 10×10, 15×15, 20×20, 30×15, 30×20, 50×15 and 50×20 produce smaller makespan compared to the lower bound on the dataset with an average minimum makespan improvement value of 1.184.
Support Vector Regression (SVR) is often used in forecasting. Adjustment of parameters in the SVR affects the results of forecasting. This study aims to analyze the SVR method that is optimized using Harris Hawks Opti...
详细信息
Support Vector Regression (SVR) is often used in forecasting. Adjustment of parameters in the SVR affects the results of forecasting. This study aims to analyze the SVR method that is optimized using Harris Hawks Optimization (HHO), hereinafter referred to as HHO-SVR. The HHO-SVR was evaluated using five benchmark datasets to determine the performance of this method. The HHO process is also compared based on the type of kernel and other metaheuristic algorithms. The results showed that the HHO-SVR has almost the same performance as other methods but is less efficient in terms of time. In addition, the type of kernel also affects the process and results.
SARS CoV-2 is a fascinating topic to investigate, especially in Indonesia and Malaysia, which share similar racial demographics. However, statistical analysis of information on the SARS CoV-2 from a database, especial...
SARS CoV-2 is a fascinating topic to investigate, especially in Indonesia and Malaysia, which share similar racial demographics. However, statistical analysis of information on the SARS CoV-2 from a database, especially GISAID, does not contain specific customizations related to virus comparisons between selected countries. Therefore, the researchers conducted statistical analysis and data visualization using the Python programming language to describe and investigate SARS CoV-2 Indonesia and Malaysia from the GISAID database. SARS CoV-2 metadata from Indonesia (N=117) and Malaysia (N=250), which were gathered during 2020, were compared. This comparison was aimed to investigate the discrepancies of COVID-19 cases in closely related populations. Firstly, data visualization was conducted using the Python Matplotlib library to create bar charts for clades and mutation comparison. Additionally, a series of boxplots were generated to show age discrepancies stratified by gender. Furthermore, the statistical tests showed that only the dominant Malaysian (G and O) clades were found to be significantly different compared to Indonesian cases (p-value=0.016). The proportion of two major mutations (G614D and NSP12 P323L) were also significantly different in the two countries caused by the dominant clade differences (p-value=0.007). Lastly, the differences in the age distribution of COVID-19 cases between the two countries were significant only in the male group (p-value=0.017).
This paper proposes a new method based on the Apriori algorithm and deep learning technology to improve the flexibility of hardware deployment and to analyze hardware usage reliability for VM. This method can signific...
详细信息
N4-methylcytosine (4mC) is a modified form of cytosine found in DNA, contributing to epigenetic regulation. It exists in various genomes, including the Rosaceae family encompassing significant fruit crops like apples,...
详细信息
As the latest technology, IoT is growing rapidly in the communications environment, enabling it to communicate with other devices such as sensors and radio frequency identification (RFID) devices. This research aimed ...
As the latest technology, IoT is growing rapidly in the communications environment, enabling it to communicate with other devices such as sensors and radio frequency identification (RFID) devices. This research aimed to provide an overview of cybersecurity that will form the basis for future technological developments. This research applied a systematic mapping study as the methodological approach. Based on the chosen search strategy, 29 articles were selected for a closer examination. This research reveals cybersecurity attacks on the IoT, particularly RFID and WSN technologies, which are the basic technologies for the development of the IoT. It is found that RFID requires access control to prevent attackers from misusing information and that key management must be compatible with WSN technology to predict attackers.
暂无评论