This paper presents the application program of fingerprint detection using wavelet transform for authentication. Fingerprints are obtained from the site of crime, old documents and excavated things. This paper propose...
详细信息
ISBN:
(纸本)9781509041060
This paper presents the application program of fingerprint detection using wavelet transform for authentication. Fingerprints are obtained from the site of crime, old documents and excavated things. This paper proposes a fingerprint recognition technique based on wavelet-based texture pattern recognition method. By collecting incomplete fingerprints of 2 people with 6 images each. The original seven of uncompleted fingerprint images were undetected and only one was detected. After enhancing image quality using wavelet transform method, it was found that those of seven images were completed. The comparison method was a matching technique. This work focuses on the ability of the program and knowledge of image processing by studying algorithms of image processing. In design algorithm process, different technique enhancements were employed as well as the study of different of filters and algorithms based on existing research results from literature.
Any form of communication that expresses hatred, prejudice, or hostility toward a particular individual or group of people based on attributes such as their race, religion, ethnicity, nationality, gender, sexual orien...
Any form of communication that expresses hatred, prejudice, or hostility toward a particular individual or group of people based on attributes such as their race, religion, ethnicity, nationality, gender, sexual orientation, disability, or other protected characteristics is considered hate speech. Hate speech can be verbal, written, or symbolic. Hate speech can take many forms, and it often involves derogatory language, offensive stereotypes, or the incitement of violence or discrimination against the targeted individuals or groups. The content of hate speech is easy found in forum or discussion in social media include twitter. Twitter is a microblogging-based virtual entertainment where clients can peruse and compose text called tweets or tweets. This exploration executes order of disdain discourse in media Twitter utilizing IndoBERT. IndoBERT is the Indonesian form of BERT model utilizing over 220M words. It was a Convolutional Neural Network-based algorithm that had been modified. Th highlight extraction in Transformer isn’t finished by convolution utilizing a part like CNN, however includes an encoder and decoder. The outcome demonstrates IndoBERT’s excellent ability to categorize hate speech.
Every organization must ensure that information assets are protected and information security system has been implemented well. PT. IndoDev Niaga Internet is a provider of business solutions applications and implement...
Every organization must ensure that information assets are protected and information security system has been implemented well. PT. IndoDev Niaga Internet is a provider of business solutions applications and implementation services that include application Human Resource Information System (HRIS) and Enterprise Resource Planning (ERP). In order to ensure the security of the information, then in 2015 PT. IndoDev Niaga Internet implement ISO 27001: 2013. Through the implementation of ISO 27001: 2013, it is expected that information can be properly maintained, which in turn will affect the business continuity. Companies need to know the extent to which the process has been applied and what actions can be done to improve the performance of the application of ISO 27001: 2013. Factor analysis was conducted first to determine the factors that affect to the information security. After the factors that affect to the information security known, then observation and interview conducted to gather data about PT. IndoDev Niaga Internet ISO 27001:2013 implementation according to the factors that affect. And then recommendation and corrective action developed using gap analysis method. The most influential factor to the security of customer information PT. IndoDev Niaga Internet is a factor access control and security operations. For the audit results IS027001: 2013 from the aspect of access control, they found 11 check items that fit into the category of NC (Non-Conformance) of 33 check items in which 9 of them in the category of major and two remaining categories minor, while for operations security aspects of the 12 check items, found 5 that goes into the category of NC (Non-Conformance) and everything was included into the category of minor.
Five states of butterfly metamorphoses in its lifecycle naturally inspire algorithm creation. A simple butterfly lifecycle algorithm (BLCA) was successfully created by imitating a real butterfly lifecycle in five stag...
Five states of butterfly metamorphoses in its lifecycle naturally inspire algorithm creation. A simple butterfly lifecycle algorithm (BLCA) was successfully created by imitating a real butterfly lifecycle in five stages study; preliminary analysis, literature review, input-process-output analysis, logic analysis, and algorithm construction. The algorithm was represented thru activity diagram, pseudo-code, and class diagram. The dummy case of measuring company growth performance used to experimentally test the algorithm.
This research is ongoing research into the student learning process which aims to develop artificial intelligence-based technology to calculate essay exam scores automatically, based on the textual proximity of studen...
This research is ongoing research into the student learning process which aims to develop artificial intelligence-based technology to calculate essay exam scores automatically, based on the textual proximity of students' answers to the answer key. This research uses an approach based on natural language processing (NLP) and text analysis. Feature extraction was carried out using the BERT model and similarity comparison using the Cosine distance method. Model evaluation was carried out using sensitivity and specificity tests. The model evaluation results show a sensitivity of 98.21%, which means this assessment model is able to detect positive cases well.
The Regional Archives and Library Office of Badung Regency must optimize the services provided in order to achieve excellent service quality. In its implementation, the office encountered difficulties in prioritizing ...
The Regional Archives and Library Office of Badung Regency must optimize the services provided in order to achieve excellent service quality. In its implementation, the office encountered difficulties in prioritizing aspects of services that require optimization. The purpose of this study was to design a Center for the Study of Evaluation-University of California in Los Angeles (CSE-UCLA) evaluation model using Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) and Analytical Hierarchy Process (AHP) to provide recommendations on which aspects of services need to be optimized. The research method used stages that included problem identification, problem formulation, literature review, data collection, data analysis, design, and conclusions. The TOPSIS and AHP methods had the ability to rank a variety of aspects in the CSE-UCLA model. Aspect with the lowest ranking was considered as the aspect that is prioritized for optimization. That aspects used five service criteria: tangible, reliability, assurance, responsiveness, and empathy, all of which were classified in the 'benefit' category. Each criterion had a value of 0.200, 0.200, 0.200, 0.200, 0.200 for the weight values for system assessment, program planning, program implementation, and program improvement, while for program certification: 0.556, 0.111, 0.111, 0.111, 0.111, respectively.
Flood disaster happens periodically in Jakarta. One opportunity that can be maximized to mitigate it is control management of the Manggarai water gate (MWG). The MWG itself is placed in the Ciliwung river in one distr...
Flood disaster happens periodically in Jakarta. One opportunity that can be maximized to mitigate it is control management of the Manggarai water gate (MWG). The MWG itself is placed in the Ciliwung river in one district of the capital Jakarta. It has a vital role to minimize the impact of flood disasters in Jakarta. The study is a further version of previous research indeveloping a water-flow-like algorithm (WFA) based decision support model (DSM) to mitigate the impact of flood disasters. Theconstructed DSM is practically functioned to control the operation of opening/closing the MWG. The DSM was constructed by combining the previous WFA model with the concept of fuzzy logic (FL). The constructed model is called Fuzzy-WFA (FWFA) ecological DSM (ecoDSM); as it considers several aspects of ecology, e.g. river condition, weather situation, and flood itself. By building the FWFA-ecoDSM, the value of uncertainty can be converted to become crisp logic that is easier to understand. At the end of this research, the FWFA-ecoDSM was implemented in more detail compared with the previous one by producing the decimal numbers with 3 until 6 numbers behind the point; exclusively, in predicting the water level status, where the status used todecide the opening/closing level decision for opening or closing the MWG.
The Constitutional Court of The Republic of Indonesia is an institution which has authority to judge and examine constitutions. In this institution, each component has responsibility to manage their own finance and bu...
The Constitutional Court of The Republic of Indonesia is an institution which has authority to judge and examine constitutions. In this institution, each component has responsibility to manage their own finance and budgeting. Based on this case, they need a solution to summarize the amount and absorption of the budget in every component. This paper proposes a solution to design a data warehouse model to process and analyse the down payment administration data. The nine steps design methodology for developing data warehouse is implemented in this work. This paper aims to bring some benefit for The Constitutional Court, especially in form of information about down payment absorption for every component each year. The result is presented in form of pdf report and informative dashboard using data warehouse tools.
There is a need to produce more crop plants to meet the future global demand. However, the climate change has affected the global crop yield. Consequently, finding an alternative approach to improve crop yield becomes...
There is a need to produce more crop plants to meet the future global demand. However, the climate change has affected the global crop yield. Consequently, finding an alternative approach to improve crop yield becomes essential. The development of sequencing techniques, as well as information technologies, have enabled us to perform genome data mining. Using genome data mining approach, it is possible to identify or discover a protein which has a particular characteristic. This study aims to identify a protein, which could potentially improve crop yield, using genome data mining approach. D1 protein was used as the target, as this protein is highly involved in photosynthesis. Then, protein sequences of various crop plants were collected from biological database. After conducting data trimming and filtering, sequence analysis was performed. The analysis was used to construct phylogenetic tree and create a 3D protein model. Sequence analysis displayed variation in amino acid sequence in D1 protein. Protein modelling located the variations, which scattered within D1 protein. Furthermore, we highlighted the amino acid residues that are the targets for genetic engineering. The research findings may provide a reference to improve crop production through genome mining approach.
The plagiarism has many forms, not only copy paste but include changing passive become active voice, or paraphrasing without appropriate acknowledgment. It happens on all language include Indonesian Language. There ar...
The plagiarism has many forms, not only copy paste but include changing passive become active voice, or paraphrasing without appropriate acknowledgment. It happens on all language include Indonesian Language. There are many previous research that related with plagiarism detection in Indonesian Language with different method. But there are still some part that still has opportunity to improve. This research proposed the solution that can improve the plagiarism detection technique that can detect not only copy paste form but more advance than that. The proposed solution is using Winnowing with some addition process in pre-processing stage. With stemming processing in Indonesian Language and generate fingerprint in parallel processing that can saving time processing and produce the plagiarism result on the suspected document.
暂无评论