Artificial Bee Colony (ABC) is one of good heuristic intelligent algorithm to solve optimization problem including clustering. Generally, the heuristic algorithm will take the high computation time to solve optimizati...
详细信息
Understanding the reliability of engineering methods is crucial for its adoption and deployment. This research focuses on the reliability of the Power Spectral Density (PSD) method via the use of the F statistic for d...
Understanding the reliability of engineering methods is crucial for its adoption and deployment. This research focuses on the reliability of the Power Spectral Density (PSD) method via the use of the F statistic for damage detection. To the author best knowledge, the method is rather classic but its realibility has not been discussed in the context of a large data size. Priory, the research anticipates that the accuracy is a function of the damage level. In this study, we evaluate 3500 cases with five levels of structural integrity, namely, healthy condition and damaged conditions with 1%, 5%, 10%, and 20% damage levels. The dataset is established via a numerical analysis of a seven degree-of-freedom system loaded with a concentrated dynamic force with random magnitude. A spring on the system is reduced in its stiffness to simulate damages. Our significant findings are the following: it is challenging for the PSD-based method to differentiate the healthy condition from the damaged conditions when the damage level is small. However, the reliability is high at 95% probability when the structural integrity has dropped by five percent.
Inserting data into digital media tends to change the large size of the media cover file, this is because the inserted pixel has a different size from the insertion value, i.e. with a larger or smaller value, for exam...
Inserting data into digital media tends to change the large size of the media cover file, this is because the inserted pixel has a different size from the insertion value, i.e. with a larger or smaller value, for example a pixel value of 10 is inserted with larger or smaller data from the value 10. So that the pixel value is getting further from the value of 10, this causes the value of Mean Squared Error (MSE) of the media of the cover (cover) to become larger. In this study, the selection of pixels in the image is in accordance with the value of the insertion data as the insertion place with the Genetic algorithm (GA). Insertion of data on selected pixels using the GA algorithm is performed using the Modified Least Significant Bit (MLSB) algorithm at the position of the least significant bits. To find out the reliability of the proposed algorithm, the data insertion experiment was carried out by comparing the conventional LSB algorithm with the proposed algorithm where the results obtained a significant MSE value, i.e. the average MSE value of the LSB algorithm was 20.54 and the proposed algorithm was 7.12.
For damage detection, this research article discusses an easy-to-compute damage index derived from the governing dynamic of the structure that has potential practical application in Structural Health Monitoring (SHM)....
For damage detection, this research article discusses an easy-to-compute damage index derived from the governing dynamic of the structure that has potential practical application in Structural Health Monitoring (SHM). The research uses simplified structural models to explore the sensitivity of the index to damages, to compare the index performance with a traditional but popular damage detection method, and to understand the local/global predictive capability of the index. The research uses two simple models, namely, single- and two-degree-of-freedom systems. The results suggest that the damage index is local, that can only monitor damages occurring near the points of measurements, but it is sensitive to damages, unlike the natural frequency, which is global but less sensitive.
The success of learning in a classroom that uses supporting media demands lecturer activity. The level of activity of lecturers in class and using learning media such as Smart lecturer can be measured using a fuzzy lo...
The success of learning in a classroom that uses supporting media demands lecturer activity. The level of activity of lecturers in class and using learning media such as Smart lecturer can be measured using a fuzzy logic approach. This study aims to measure the level of active lecturers using the approach, namely: Mamdani and Sugeno method. Stages of lecturer activity measurement by forming a fuzzy set, composition rules as many as 24 rules and the defuzzification process using the centroid method that produces the level of activity of each is low, medium and high. Based on 173 lecturer activity data, the results of the Mamdani method indicates low 66%, medium 31%, and high 3%. While the Sugeno method produces a level of activity low 75%, moderate 17%, and high 8%. Therefore, Mamdani method is more suitable for the calculation because the spread of results is relatively evenly distributed at each level.
The purpose of this study is to look for factors, indicators, and build a model of readiness for effective and efficient implementation in order to answer the problems that arise at PT XYZ related to the readiness of ...
The purpose of this study is to look for factors, indicators, and build a model of readiness for effective and efficient implementation in order to answer the problems that arise at PT XYZ related to the readiness of Customer Relationship Management (CRM) implementation. The research method used is the method of collecting data by observing, interviewing, and distributing questionnaires to respondents using the CRM Value Chain theory as a conceptual framework and the research method used in this research is factor analysis to process data obtained from questionnaires. In this study managed to get new factors along with the constituent indicators of these factors as well as an ideal readiness model. It can be concluded that factors related to the readiness of implementing Customer Relationship Management among others are Customer Service Information, Customer Relations Value, Lack of Service and Communication.
Breast cancer is one of the deadliest cancer for female nowadays. Despite of the rapid advancement in medical image analysis with the rise of deep learning, development of breast cancer detection system is limited due...
详细信息
Breast cancer is one of the deadliest cancer for female nowadays. Despite of the rapid advancement in medical image analysis with the rise of deep learning, development of breast cancer detection system is limited due to relatively small size of the publicly available mammogram dataset. In this paper, we discover an effective configuration for transfer learning from Chest X-Ray pre-trained Convolutional Neural Network to overcome the small-size mammogram dataset problem. We found that the best configuration achieve 90.38% validation accuracy for modified.
EBITDA is a measure of a company's financial performance. It can determine the direction of business decisions for the organization, can be used to analyze and compare profitability among companies. By its linear ...
详细信息
EBITDA is a measure of a company's financial performance. It can determine the direction of business decisions for the organization, can be used to analyze and compare profitability among companies. By its linear and non-linear combination, appropriate forecasting technique must be determined. The aim of this paper is to propose a methodology for forecasting EBITDA. We propose a three-steps methodology which is composed of data preparation, forecasting model comparison and evaluation steps. The results from using 10 years monthly data of the Provincial Waterworks Authority (PWA) reveal that the best model is ARIMA-ANN hybrid model. Thus, this model can be used to forecast the other time series data such as Selling Expenses, Operating Expense, General and Administrative Expenses in the future.
One main cause of inaccurate forecasts is that data may contain noises and outliers. In the case of the Provincial Waterworks Authority (PWA), the inaccuracy of analyzing and forecasting the number of water users is d...
详细信息
One main cause of inaccurate forecasts is that data may contain noises and outliers. In the case of the Provincial Waterworks Authority (PWA), the inaccuracy of analyzing and forecasting the number of water users is due to outliers contained in data sources. Some branches of PWA collected errors such as the very high or very low number of water users. This has a direct impact on the quality and reliability of the predictive accuracy output. The removal of the “outliers” is thus critical for accurate interpretation of the data. The purpose of this paper is to detect outliers in water consumption time series data. We examined two techniques: (1) a method based on autoregressive integrated moving average (ARIMA) time series modeling and (2) median absolute deviation (MAD). A clustering technique (K-Mean) is used as a pre-processing step in order to identify appropriate parameters for the two outliers detection techniques. The results showed that, with the precise parameter values obtained from K-Mean, both ARIMA and MAD performed very well on water consumption time series data. The two techniques are able to generate high sensitivity and specificity outputs.
Information technology enables for new way of commerce, which is a commerce activities through online media (e-commerce). Security becomes an important issue in online-system, because such system is accessible by anyo...
详细信息
Information technology enables for new way of commerce, which is a commerce activities through online media (e-commerce). Security becomes an important issue in online-system, because such system is accessible by anyone through the global network -internet. Security in terms of confidentiality, integrity, and availability becomes goals that must be achieved by any system generally, and commerce system especially, because this kind of system contains many sensitive data like customer data and transaction data. SQL Injection is a vulnerability and threat, with the most occurrence in a web based system. In this research we evaluate and analyze source code against SQL injection, and we use regular expression and escape string to prevent the SQL injection. The results of this study are findings of system vulnerability against SQL injection, which are proven by the ability to get data from database, with SQL injection techniques. System vulnerabilities were analyzed, in order to design and implement the solution for it. The solutions then tested, to validate that it has proven effectively fix the vulnerabilities, and can prevent the exploitation by SQL injection. In the end, the conclusion is that initially the system is vulnerable against SQL injection, but then the solution that being implemented has proven effectively fix the issue.
暂无评论