Data Envelopment Analysis (DEA) is one method that is often used in the benchmarking process. The benchmarking process with DEA is often faced with problems where there is a Decision Making Unit (DMU) both Input and O...
Data Envelopment Analysis (DEA) is one method that is often used in the benchmarking process. The benchmarking process with DEA is often faced with problems where there is a Decision Making Unit (DMU) both Input and Output which is not in the form of qualitative data but in the form of qualitative data. Qualitative data requires an assessment from the appraiser so that it can become quantitative data. This study will use the Fuzzy Simple Additive Weighting method to convert qualitative data into quantitative. The results of this study will produce a model that integrates DEA with Fuzzy Simple Additive Weighting.
作者:
Pandapotan SiagianSindak HutaurukInstitut Teknologi Del
Faculty of Informatics and Electrical Engineering Computer Engineering Study Program Jl. Sisingamangaraja Sitoluama Toba Samosir Sumatera Utara 22381 Indonesia Universitas HKBP Nommensen
Faculty of Electrical Engineering Jl. Sutomo No.1 Medan North Sumatera 2018 Indonesia
Mobile devices are becoming an indispensable part of daily lives. This system has been developed interactive android application to assist and provide the support helps people such as blind and other physically limite...
Mobile devices are becoming an indispensable part of daily lives. This system has been developed interactive android application to assist and provide the support helps people such as blind and other physically limited people who face. They will be done for outgoing calling to his family and also the area around them. Speech recognition is technology that uses desired equipment and a service which can be controlled through voice of the android smart phone. An Artificial Neural Network (ANN) is an information processing paradigm that is inspired by the way biological nervous systems, such as the brain, process information. The device proposed here is an interactive android platform, which is capable of recognizing spoken words. We propose to developed interactive android application and also added some features which are currently available in android based smartphones such as attending for a line calling feature and out-going calling feature, over the voice commands which can run on the tablet or any android based phone. Speech recognition have a data set to translate between users' descriptions and the labels in the database, which has entries on the speech recognition (sounds and patterns) that make up the sound.
There are several ways to deal with security issues of confidential data sent via the internet, including using cryptographic techniques and steganography. Steganography is the science and art of concealing informatio...
There are several ways to deal with security issues of confidential data sent via the internet, including using cryptographic techniques and steganography. Steganography is the science and art of concealing information / messages in a media in such a way that its existence is not detected by other parties who are not entitled to the information. Instead, cryptography disguises the meaning of a message, but does not hide that there is a message because the file looks suspicious. The Steganography technique used here was End Of File (EOF). The EOF technique described how to add data or files at the end of the image file. For this technique, the size of data or files that will be hidden could be larger than the size of the image file. The hidden data will be inserted at the end of the file so that it will not affect the image. This steganography application is also equipped with a cryptographic function Data Encryption Standard (DES) at the time of insertion of data that functions as a generator code and encrypts data, so that the security of a data in the file is more protected and protected from those who are not entitled to know the data.
Cryptography is the science and art of maintaining the security of messages when messages are sent from one place to another. One of the ways securing the form of text message information is by the encryption process ...
Cryptography is the science and art of maintaining the security of messages when messages are sent from one place to another. One of the ways securing the form of text message information is by the encryption process using the Vigenere Cipher algorithm and utilizing the One Time Pad (OTP) algorithm as a key generator, where the message will be random when it is opened. The message encryption process used the vigenere cipher algorithm while OTP is used to secure the key with the same formula. After this research has been done, an application was designed to secure text messages by converting the text message into a random message so that the message was unreadable due to a secret message that could not be known by others. The results achieved can secure an encrypted message that cannot be reopened and if those messages were reopened, they must be decrypted.
Despite substantial declines since 2000, lower respiratory infections (LRIs), diarrhoeal diseases, and malaria remain among the leading causes of nonfatal and fatal disease burden for children under 5 years of age (un...
详细信息
The scoreboard is designed and made for a universal use that can be used in matches in some sports such as basketball, futsal, ping pong, badminton, and others. The scoreboard is designed and made based on the needs o...
The scoreboard is designed and made for a universal use that can be used in matches in some sports such as basketball, futsal, ping pong, badminton, and others. The scoreboard is designed and made based on the needs of several sports in the Student Activity Unit at HKBP Nommensen University which can be easily moved. Scores displayed on the scoreboard is not only the result of the game but also displayed time in the countdown. This scoreboard can be operated by using a cable and can also without using a cable by using a mobile phone through communication using bluetooth. This scoreboard is based on a microcontroller and uses backup power through rechargeable batteries that can be automatically charged. In trials in several games, this tool works well with a few drawbacks in case of a match that takes more than 100 minutes because the time display can only display a maximum time of 99 minutes.
The security of information in this global era is increasingly becoming a vital need in various aspects of life. An information will have a higher value when it comes to aspects of business decisions. This study prese...
The security of information in this global era is increasingly becoming a vital need in various aspects of life. An information will have a higher value when it comes to aspects of business decisions. This study presents a learning application to explain how to secure data using cryptographic techniques. This study aims to design a prototype learning application of cryptographic techniques using algorithm RC4 method. Based on the results of data analysis and after completing the design of RC4 algorithm cryptographic learning software, the authors found this software shows every step and stages of the processes (data input process (Plaintext or Ciphertext string), Key padding process (U), formation process in S-Box table, the Key-Flow formation process (K-keystream), encryption process and decryption process) contained in RC4 algorithm cryptography, so it can help understanding or learning work procedures of algorithms in the cryptographic method. Microsoft Visual Basic 2008 is an IDE (Integrated Development Environment) application that is used to create and develop software. In this application there were various features that facilitate programming such as compilation, debugging, project settings, designing and editing visual interfaces, and so on.
The first evidence for the Higgs boson decay to a Z boson and a photon is presented, with a statistical significance of 3.4 standard deviations. The result is derived from a combined analysis of the searches performed...
详细信息
The first evidence for the Higgs boson decay to a Z boson and a photon is presented, with a statistical significance of 3.4 standard deviations. The result is derived from a combined analysis of the searches performed by the ATLAS and CMS Collaborations with proton-proton collision datasets collected at the CERN Large Hadron Collider (LHC) from 2015 to 2018. These correspond to integrated luminosities of around 140 fb−1 for each experiment, at a center-of-mass energy of 13 TeV. The measured signal yield is 2.2±0.7 times the standard model prediction, and agrees with the theoretical expectation within 1.9 standard deviations.
暂无评论