Vol 6 No 3 (2022)

Dublin Core

Title

Vol 6 No 3 (2022)

Collection Items

The Accuracy Comparison Between Word2Vec and FastText On <br /><br />
Sentiment Analysis of Hotel Reviews
Word embedding vectorization is more efficient than Bag-of-Word in word vector size. Word embedding also overcomes the
loss of information related to sentence context, word order, and semantic relationships between words in sentences. Several…

Implementation of the Conversational Hybrid Design Model to Improve <br /><br />
Usability in the FAQ
FAQ is an important part of a system because it is used to make it easier for users to solve problems faced by users. Some FAQ
systems have even started using Chatbot technology to make it easier for users. Chatbots have been widely used as a…

Identification of Malaria Parasite Patterns With Gray Level Co-Occurance <br /><br />
Matrix Algorithm (GLCM)
The results of the test using 5 data of malaria parasite test imagery found that image 1 has an average accuracy value of the
energy of 0.55627, homogeneity average of 0.8371, PSNR of 6.1336db, and MSE of 0.24358. Image 2 has an average energy…

Content Based VGG16 Image Extraction Recommendation
Data transfer across numerous platforms has increased dramatically due to the enormous number of visitors or users of the
present e-commerce platform. With the rise of increasingly massive data, consumers are finding it challenging to obtain the…

Educational Data Mining Using Cluster Analysis Methods and Decision <br /><br />
Trees based on Log Mining
Higher education institutions store data keep growing every year. The data has important information, but it still not optimized
into knowledge. Data Mining (DM) can be used to process existing data in universities in order to obtain knowledge that…

Segmentation of Small Objects in Satellite Imagery Using Dense U-Net in <br /><br />
Massachusetts Buildings Dataset
Class imbalance is a serious problem that disrupts the process of semantic segmentation of satellite imagery in urban areas in
Earth remote sensing. Due to the large objects dominating the segmentation process, small object are consequently…

A Security Framework for Secure Host-to-Host Environments
Data security is an infrastructure designed to protect and secure data from unauthorized access, data manipulation,
malfunction, destruction, and inappropriate data disclosure. Currently, organizations widely use data transfer to validate and…

Implementation of CNN-MLP and CNN-LSTM for MitM Attack <br /><br />
Detection System
Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations
between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack,…

The Formula Study in Determining the Best Number of Neurons in Neural <br /><br />
Network Backpropagation Architecture with Three Hidden Layers
The researchers conducted data simulation experiments, but they did so unstructured in determining the number of neurons in
the hidden layer in the Artificial Neural Network Back-Propagation architecture. The researchers also used a general…

Interdependency and Priority of Critical Infrastructure Information<br /><br />
(Case Study: Indonesia Payment System)
The sturdy and reliable payment system is one of the most important systems in the digitalization era, especially in the pandemic
COVID-19 period. As part of Critical Infrastructure Information (CII), a strategy to protect the payment system is…
View all 19 items

Collection Tree