Word embedding vectorization is more efficient than Bag-of-Word in word vector size. Word embedding also overcomes the
loss of information related to sentence context, word order, and semantic relationships between words in sentences. Several…
FAQ is an important part of a system because it is used to make it easier for users to solve problems faced by users. Some FAQ
systems have even started using Chatbot technology to make it easier for users. Chatbots have been widely used as a…
The results of the test using 5 data of malaria parasite test imagery found that image 1 has an average accuracy value of the
energy of 0.55627, homogeneity average of 0.8371, PSNR of 6.1336db, and MSE of 0.24358. Image 2 has an average energy…
Data transfer across numerous platforms has increased dramatically due to the enormous number of visitors or users of the
present e-commerce platform. With the rise of increasingly massive data, consumers are finding it challenging to obtain the…
Higher education institutions store data keep growing every year. The data has important information, but it still not optimized
into knowledge. Data Mining (DM) can be used to process existing data in universities in order to obtain knowledge that…
Class imbalance is a serious problem that disrupts the process of semantic segmentation of satellite imagery in urban areas in
Earth remote sensing. Due to the large objects dominating the segmentation process, small object are consequently…
Data security is an infrastructure designed to protect and secure data from unauthorized access, data manipulation,
malfunction, destruction, and inappropriate data disclosure. Currently, organizations widely use data transfer to validate and…
Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations
between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack,…
The researchers conducted data simulation experiments, but they did so unstructured in determining the number of neurons in
the hidden layer in the Artificial Neural Network Back-Propagation architecture. The researchers also used a general…
The sturdy and reliable payment system is one of the most important systems in the digitalization era, especially in the pandemic
COVID-19 period. As part of Critical Infrastructure Information (CII), a strategy to protect the payment system is…