Many individuals now trade online utilizing trading software in the digital world. Binomo is one of Indonesia's most popular trading platforms. This is because some influencers made several promises to Binomo cust...
详细信息
Many individuals now trade online utilizing trading software in the digital world. Binomo is one of Indonesia's most popular trading platforms. This is because some influencers made several promises to Binomo customers. Since many customers were deceived, this case became quite popular. This study was executed to see how Indonesians felt about the Binomo application after the case went viral. The solution taken was in the form of sentiment analysis because there had been no previous research on sentiment analysis that discussed the Binomo case. The data was scanned using Netlytic tools, a cloud-based text and social network analyzer capable of identifying any talks on social media sites such as Twitter. The sentiment analysis of Binomo trading tweets by using the Multi-Perspective Question Answering lexicon utilized the KNIME tool. But unfortunately, the accuracy of sentiment analysis results is low. Furthermore, the Support Vector Machine technique is also being conducted. The Term Frequency-Inverse Document Frequency method is applied to perform feature extraction whilst the chi-square approach is utilized to identify features that are thought to be useful for inclusion in the classification process and to exclude features that are irrelevant to the target class. The obtained accuracy is 86%. The study proposes that words from the algorithm's outputs can be utilized to improve the quality of sentiment analysis using the lexicon. As an outcome of the algorithm, positive and negative terms are added to the lexicon, increasing the accuracy of sentiment analysis using the new vocabulary from 58.984% to 71.146%.
Many pregnant women still do not want to check their pregnancy to recognize the signs of high-risk pregnant women. High-risk pregnancies refer to abundant women with several risky conditions requiring special care dur...
详细信息
Environmental awareness has recently emerged as one of the most crucial topics. As a result, various groups advocate for these technologies and research ways to promote their usage in various contexts. This study exam...
详细信息
This study addresses the Testing Facility Location with Constrained Queue Time Problem. This optimization problem focuses on determining the best places to deploy testing sites and their available testers for infectio...
详细信息
ISBN:
(数字)9798331534202
ISBN:
(纸本)9798331534219
This study addresses the Testing Facility Location with Constrained Queue Time Problem. This optimization problem focuses on determining the best places to deploy testing sites and their available testers for infectious diseases, while constraining the maximum time in the queue with a given probability. An integer programming model is introduced and applied to the three biggest counties, in terms of population, of Florida, United States. Moreover, the Monte Carlo method is used to evaluate the model's output, aiming to check if the queueing time constraint is being satisfied. Through the experiments, a testing facility deployment plan can be determined for each county and further validated by the simulation. The results show that the solutions returned by the model behaved successfully when submitted to the Monte Carlo method, not exceeding the time in the queue in more than the predefined probability.
This study examines the mapping of research data on digital technology in the field of health education using bibliometric analysis method. Data was collected by identifying keywords in the Scopus database and sorting...
详细信息
To address the limitations of typical coil detection systems and enhance the performance of traditional magnetic field imaging (MFI) systems, we propose a MFI system that uses a 4×4 array of anisotropic magnetore...
详细信息
In general, public or private organizations or companies have used information-based technology as a support to improve business performance to be more effective and efficient in order to achieve a company’s business...
详细信息
In general, public or private organizations or companies have used information-based technology as a support to improve business performance to be more effective and efficient in order to achieve a company’s business goals. Given the large contribution of information technology in the application of hotel applications as a supporting information system, it is a vital system that must avoid risks that can hinder and cause harm to the hotel management business processes. Therefore, it is necessary to carry out risk management using the COBIT 5 framework to manage possible risks that may occur based on the APO12 (Manage Risk) domain. From the evaluation results of the data obtained through observation and interviews as well as the calculation of the results of the questionnaire based on 6 APO12 subdomains, the results of the risk management level capability assessment in hotel applications are still at level 3 or have reached the level of established process with the target to be achieved at level 4 resulting in a gap of 1 level. Based on the results obtained, it is necessary to propose recommendations that can be used by hotels in improving the application of information technology risk management so that in the future it can achieve the expected target level so that the APO12 level of capability can increase and become more optimal.
With the rapid development of technology, the use of social media by the public, especially among young people, is increasing. One of the social media platforms currently used by young people is the TikTok application...
详细信息
ISBN:
(数字)9798350390025
ISBN:
(纸本)9798350390032
With the rapid development of technology, the use of social media by the public, especially among young people, is increasing. One of the social media platforms currently used by young people is the TikTok application. It is a video-based TikTok feature accompanied by music, writing, and pictures that are considered attractive, so teenagers like it to show their existence and self-disclosure. Therefore, this study aims to examine the intention of users to disclose their privacy. As the basis of the theory, this study deployed the privacy calculus theory, where the perceived benefits and perceived risks play crucial roles in the intention to disclose their privacy. The study successfully collected 369 responses. The empirical findings indicated that only the relationship between Perceived Personalization (PP) and Perceived Risk (PR) was not supported. However, all the remaining hypotheses were supported. These findings emphasize how several complicated variables influence social media users' intentions to disclose their privacy. When people feel in control of their privacy settings and see significant benefits, they are more likely to divulge personal information; nevertheless, perceived risks can greatly discourage users.
We say that a sequence a1 · · · a2t of integers is repetitive if ai = ai+t for every i ∈ {1, ..., t}. A walk in a graph G is a sequence v1 · · · vr of vertices of G in which vivi+1 ∈ E(...
暂无评论