Results (241)
Search Parameters:
Section: cisDilated Fully Convolutional Neural Network for Depth Estimation from a Single Image
Depth prediction plays a key role in understanding a 3D scene. Several techniques have been developed throughout the years, among which Convolutional Neural Network has recently achieved state-of-the-art performance on estimating depth from a single image. However, traditional CNNs suffer from the lower resolution and information loss caused by the pooling layers. And oversized parameters…
Read MoreNode-Node Data Exchange in IoT Devices Using Twofish and DHE
Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…
Read MoreAn Improved Approach for QoS Based Web Services Selection Using Clustering
With the rising number of web services created to build complex business processes, selecting the appropriate web service from a large number of web services respond to the same client request with the same functionality are developed independently but with different quality of service (QoS) attributes. From this point, there are many approaches to web…
Read MoreDevelopment and Improvement of Web Services Selections using Immigrants Scheme of Multi-Objective Genetic Algorithm
Quality of service is a significant part of formulating a composing of web services to satisfy the user’s request, especially when several services exist and have been implemented in the same field and functionality. The selection process of web services among many options can be taken based on the quality of service considerations, fitness parameters,…
Read MoreFactors Affecting Behavioural Intention to Shop in Self-Service Retail Case Study: JD.ID X Mart
This paper aims to measure the acceptance level of Indonesian customers to JD.ID X retail and to reveal the driving factors of behavioral intention to shop at the retail. JD.ID X is new retail that implements a new shopping technology called Just walk-out technology (JWOT) also known as retail without a cashier. JWOT is one…
Read MoreBlockchain Technology-Based Good Distribution Practice Model of Pharmacy Industry in Indonesia
Distribution is the main activity in integrated product supply chain management. In the pharmaceutical industry, the process of drug distribution is important because of the handling, storage, and distribution of medicinal products with good standards and quality. The problem that occurs in the pharmaceutical industry is the circulation of counterfeit drugs by related parties, for…
Read MoreCategorization of RDF Data Management Systems
The wide acceptance of the semantic web language RDF for ontologies creation in various application fields has led to the emergence of numerous RDF data processing solutions, the so-called triplestores, for the storage of RDF data and its querying using the RDF query language SPARQL. Such solutions are however developed under various perspectives and on…
Read MoreA Large Empirical Study on Automatically Classifying Software Maintainability Concerns from Issue Summaries
Software maintenance contributes the majority of software system life cycle costs. However, existing approaches with automated code analysis are limited by accuracy and scope. Using human-assessed methods or implementing quality standards are more comprehensive alternatives, but they are much more costly for smaller organizations, especially in open- source software projects. Instead, bugs are generally used…
Read MoreAnalyzing the Adoption of E-payment Services in Smart Cities using Demographic Analytics: The Case of Dubai
This paper is an extension of previous research that has been done on factors affecting digital payment adoption in the UAE. This study focuses on analyzing which relevant demographic factors affect new e-payment technologies, mainly in the smart city Dubai, with more complexities and dynamics of variables that affect users’ behavior toward adopting new technologies.…
Read MoreChallenges in IoT Technology Adoption into Information System Security Management of Smart Cities: A Review
Sustainable urban development and utilization of Internet of Things (IoT) technology is driving cities globally to evolve into Smart Cities (SC). The power of IoT services and applications will enable public agencies to provide personalized services to the citizens and inevitably improves their much-needed quality of life. However, although the use of IoT technology proves…
Read MoreRecording of Academic Transcript Data to Prevent the Forgery based on Blockchain Technology
Diploma certificate and transcript forgery is a serious issue in education. The government is still finding the best way to prevent and minimize this issue in the future. The diploma certificate and transcript are very easy to duplicate, not only from third parties. Even the university can easily produce a fake diploma certification and transcript…
Read MoreWireless Sensor Networks Simulation Model to Compute Verification Time in Terms of Groups for Massive Crowd
Everyone needs fast response or output against its request or need. Therefore, technologies are used to make the processing fast and accurate according to our needs. But in some situations, still we need to do more. Especially, when we need to process a massive or huge crowd of people in limited time frame such as…
Read MoreAn algorithm for Peruvian counterfeit Banknote Detection based on Digital Image Processing and SVM
In this work we propose an algorithm for Peruvian counterfeit banknotes detection. Our algorithm operates in banknotes with 50, 100 and 200 soles denominations that were manufactured from 2009 onwards. This algorithm offers an automatic diagnosis based on digital image processing and support vector machines (SVM). Current Peruvian counterfeit detection systems are specially designed to…
Read MoreAn Operational Responsibility and Task Monitoring Method: A Data Breach Case Study
As a result of digitalization, services become highly dependent on information systems thus increasing the criticality of security management. However, with system complexity and the involvement of more human resources, it becomes more arduous to monitor and track tasks and responsibilities. This creates a lack of visibility hindering decision making. To support operational monitoring, we…
Read MoreSimulating Get-Understand-Share-Connect Model using Process Mining
This paper presents the method of simulating the personal knowledge management (PKM) processes, based on Get-Understand-Share-Connect (GUSC) Model, using real event logs data from an online learning platform. The method used in here is process discovery and conformance, which are the process mining techniques. Having the model proven at granular level of multi-agent system, this…
Read MoreMobile Application Design for Student Learning
The research objectives were to identify, analyze needs, as well as designing a mobile application for student online learning at PT. Ruang Raya Indonesia, particularly in the process of working on tasks assigned by the teacher. The methods used in this research are data collection method using Slovin theory, systems analysis by focusing on the…
Read MoreBlockchain Technology for Tracing Drug with a Multichain Platform: Simulation Method
This study builds the implementation of the traceability process by conducting simulation tests using business process simulations with the implementation of blockchain technology to track drugs. This research focus involved stakeholders, including the pharmaceutical industry, pharmaceutical wholesalers (distributors/wholesalers), health services (drug stores, hospitals), consumers. Simulation methods are used to describe the distribution and traceability of…
Read MoreRecording of Student Attendance with Blockchain Technology to Avoid Fake Presence Data in Teaching Learning Process
University operational activities are a routine part of university operations and supervisory control and monitoring function. The low controlling and monitoring of operational activities can cause irrelevance in the teaching and learning process. A graduate may have a graduation document but has never attended the teaching and learning process. An official institution can issue this…
Read MoreLearning Path Recommendation using Hybrid Particle Swarm Optimization
Revised Bloom’s Taxonomy (RBT) is proposed in general to look more forward in responding to the demands of the developing educational community, including how students develop and learn and how teachers prepare Learning Objects (LO). The variety of characteristics of students’ abilities in a class has always been a problem that is often faced by…
Read MoreEnterprise Resource Planning Readiness Assessment for Determining the Maturity Level of ERP Implementation in the Industry in Indonesia
The textile industry is one of the prioritized industries, because it contributes to the country’s foreign exchange, absorbs a large number of workers, and fulfills the need for national clothing. To increase work efficiency and productivity, the textile industry must use ERP. However, ERP implementation still has a relatively high failure rate. ERP readiness assessment…
Read MoreTechnological Stages of Schwartz Cylinder’s Computer and Mathematics Design using Intelligent System Support
In this paper, one of the “problem zones” in mathematics concerned with the surface area of three-dimensional bodies is presented by computer and mathematical modeling with synergetic effects using intelligent system support. The problems of personal self-organization and technological stages of student’s research activity in the process of modern achievements in science adaptation in teaching…
Read MoreA Case Study to Enhance Student Support Initiatives Through Forecasting Student Success in Higher-Education
Enrolment figures have been expanding in South African institutions of higher-learning, however, the expansion has not been accompanied by a proportional increase in the percent- age of enrolled learners completing their degrees. In a recent undergraduate-cohort-studies report, the DHET highlight the low percentage of students completing their degrees in the allotted time, having remained between…
Read MorePredicting Student Academic Performance Using Data Mining Techniques
There is a crisis in basic education during this pandemic which affected everyone worldwide, we see that teaching and learning have gone online which has effected student performance. Student’s academic performance needs to be predicted to help an instructor identify struggling students more easily and giving teachers a proactive chance to come up with supplementary…
Read MoreThe Role of RFID in Green IoT: A Survey on Technologies, Challenges and a Way Forward
The Internet of Things (IoT) is a technology that enables communication between everyday life using different sensor actuators that work together to identify, capture, and distribute critical data from the planet. Massive machines and devices are therefore linked and communicate with them. The use of resources in this area presents new challenges for this technology.…
Read MoreStandardized UCI-EGO Dataset for Evaluating 3D Hand Pose Estimation on the Point Cloud
To evaluate and compare methods in computer vision, scientists must use a benchmark dataset and unified sets of measurements. The UCI-EGO dataset is a standard benchmark dataset for evaluating Hand Pose Estimation (HPE) on depth images. To build robotic arms that perform complex operations such as human hands, the poses of the human hand need…
Read More
