Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)最新文献

筛选
英文 中文
Netiquette concept at the assessment of college student social competence with TOPSIS method 网络礼仪概念在大学生社交能力评价中的应用
Rianto Rianto, S. Mulyani
{"title":"Netiquette concept at the assessment of college student social competence with TOPSIS method","authors":"Rianto Rianto, S. Mulyani","doi":"10.28989/compiler.v10i2.1114","DOIUrl":"https://doi.org/10.28989/compiler.v10i2.1114","url":null,"abstract":"Social competence of students college is important during the process of implementing the practicum, from social competence we can find out capable the students are in several ways such as the ability to collaborate, speak in forums, reduce social conflicts in the environment, make a network and much more. In this study, it provides a model solution for assessing social competence in students college when carrying out practicum. The purpose of the study was to develop an assessment model by measuring students' social competence during the implementation of the practicum. The number of correspondents in the study was 78 students taken from the number of practicum students in Aerospace Engineering. The data analysis technique uses the TOPSIS method, where the results of this study will obtain the best ranking of 78 KP students who have the highest social competence value. The model of the assessment can be used by lecturers of the Aerospace Engineering, Adisutjipto Aerospace Technology Institute during the practicum process or after. With this assessment model, the advantages of the Adisutjipto Aerospace Technology Institute can synergize in creating graduates with a global and humanistic character.","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83395549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of fake shallots using website-based haar-like features algorithm 基于haar-like feature算法的假葱检测
Bambang Agus Setyawan, Mutaqin Akbar
{"title":"Detection of fake shallots using website-based haar-like features algorithm","authors":"Bambang Agus Setyawan, Mutaqin Akbar","doi":"10.28989/compiler.v10i2.978","DOIUrl":"https://doi.org/10.28989/compiler.v10i2.978","url":null,"abstract":"Shallots is commonly used as essential cooking spices or complement seasoning. The high market demand for this commodity has triggered some people to counterfeit it. They mix the shallots with defective products of onions to get more benefits. It urges to provide a system that can help people to distinguish whether the shallot is original or fake. This research aims to provides an object recognition system for fake shallots utilizing the Haar-Like Feature algorithm. It used the cascade training data set of 59 positive images and 150 negative images with 50 comparison images. The identification process of the shallots was through the haar-cascade process, integrated image, adaptive boosting, cascade classifier, and local binary pattern histogram. This system was made based on the Django website using the python programming language. The test was conducted 30 times on Brebes shallots mixed with Mumbai's mini onions in a single and mixture test method. The test obtained an average percentage of 69.2% for the object recognition of Mumbai's mini onions.","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"82 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83529791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STERILIZER CHAMBER DESIGN WITH TELEGRAM-BASED INTERNET OF THINGS (IoT) APPLICATIONS 灭菌室设计与基于电报的物联网(IoT)应用
Nurwijayanti Kusumaningrum, Reza Ananda
{"title":"STERILIZER CHAMBER DESIGN WITH TELEGRAM-BASED INTERNET OF THINGS (IoT) APPLICATIONS","authors":"Nurwijayanti Kusumaningrum, Reza Ananda","doi":"10.28989/compiler.v10i2.1111","DOIUrl":"https://doi.org/10.28989/compiler.v10i2.1111","url":null,"abstract":"","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"192 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73753755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Social Network Analysis: Identifying Influencers in The COVID-19 Vaccination Discussion on Twitter 社交网络分析:识别推特上COVID-19疫苗接种讨论中的影响者
Muhammad Habibi, Puji Winar Cahyo
{"title":"A Social Network Analysis: Identifying Influencers in The COVID-19 Vaccination Discussion on Twitter","authors":"Muhammad Habibi, Puji Winar Cahyo","doi":"10.28989/compiler.v10i2.1074","DOIUrl":"https://doi.org/10.28989/compiler.v10i2.1074","url":null,"abstract":"Social media analytics, especially Twitter, has experienced significant growth over the last few years. The data generated by Twitter provides valuable information to many stakeholders regarding user behavior, preferences, tastes, and characteristics. The presence of influencers on social media can invite interaction with other users. An influencer can affect the speed of spreading information on social media. This study looks at the influence of influencers and information dissemination channels on Twitter data related to COVID-19 vaccination in Indonesia as one of the hot Twitter discussion trends. This study applies Social Network Analysis (SNA) as a theoretical and methodological framework to show that interactions between users have differences on the network when the analyzed tweets are divided into mention and retweet networks. This study found that the key accounts in disseminating information related to Covid-19 vaccination were dominated by official accounts of government organizations and online news portals. The official Twitter account of government organizations turns out to have an essential role in disseminating information related to COVID-19 vaccination, namely the @KemenkesRI account belonging to the Ministry of Health of the Republic of Indonesia and the @Puspen_TNI account belonging to the TNI Information Center.","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"09 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86174101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
VIRTUAL MUSEUM TOUR IN WASAKA BANJARMASIN TO INTRODUCE THE COLLECTION OF LEADERS AND LOCAL HEROES BASED ON MOBILE AUGMENTED REALITY TECHNOLOGY IN THE NEW NORMAL ERA 在wasaka banjarmasin的虚拟博物馆之旅,介绍新常态时代基于移动增强现实技术的领袖和当地英雄收藏品
A. A. Syahidi, S. Subandi, Adistya Nadia Azura, Ida Hastuti
{"title":"VIRTUAL MUSEUM TOUR IN WASAKA BANJARMASIN TO INTRODUCE THE COLLECTION OF LEADERS AND LOCAL HEROES BASED ON MOBILE AUGMENTED REALITY TECHNOLOGY IN THE NEW NORMAL ERA","authors":"A. A. Syahidi, S. Subandi, Adistya Nadia Azura, Ida Hastuti","doi":"10.28989/COMPILER.V10I1.864","DOIUrl":"https://doi.org/10.28989/COMPILER.V10I1.864","url":null,"abstract":"Wasaka Museum is one of the museums in Banjarmasin City. However, the information obtained by visitors at this time is only from short writings near the object of the image, and museum guards cannot accompany visitors to get around. Furthermore, the interest of museum visitors has also decreased due to the unavailability of adequate information, minimal services, and the impact of the COVID-19 pandemic. The purpose of this research is to develop applications using Mobile Augmented Reality Technology as a means of promotion, trying to attract visitors with AR interaction treats, and the form of virtual museum tours. The methodology used is the Agile Development Method with the type of Extreme Programming (XP). Then the A/B Testing Method is used to select the user interface design. Marker-Based Tracking is a method of detecting markers so that 3D objects can appear. The conclusion is that the selected interface design is design B with a percentage of 76.9%, all the features in the application have functioned very well, and the results of the usability evaluation with a percentage of 83.33% have an excellent predicate which means that they can be recommended for further use at the Wasaka Museum Banjarmasin. in the New Normal Era.","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88462659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fish detection using morphological approach based-on k-means segmentation 基于k-均值分割的形态学方法的鱼类检测
S. Saifullah, A. P. Suryotomo, B. Yuwono
{"title":"Fish detection using morphological approach based-on k-means segmentation","authors":"S. Saifullah, A. P. Suryotomo, B. Yuwono","doi":"10.28989/compiler.v10i1.946","DOIUrl":"https://doi.org/10.28989/compiler.v10i1.946","url":null,"abstract":"Image segmentation is a concept that is often used for object detection. This detection has difficulty detecting objects with backgrounds that have many colors and even have a color similar to the object being detected. This study aims to detect fish using segmentation, namely segmenting fish images using k-means clustering. The segmentation process is processed by improving the image first. The initial process is preprocessing to improve the image. Preprocessing is done twice, before segmentation using k-means and after. Preprocessing stage 1 using resize and reshape. Whereas after k-means is the contrast-limited adaptive histogram equalization. Preprocessing results are segmented using k-means clustering. The K-means concept classifies images using segments between the object and the background (using k = 8). The final step is the morphological process with open and close operations to obtain fish contours using black and white images based on grayscale images from color images. Based on the experimental results, the process can run well, with the ssim value close to 1, which means that image information does not change. Processed objects provide a clear picture of fish objects so that this k-means segmentation can help detect fish objects.","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"63 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86031965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis of Marketplace Conversation Trends on Twitter Platform Using K-Means 基于K-Means的Twitter平台市场对话趋势分析
Ulil Amri Nasron, Muhammad Habibi
{"title":"Analysis of Marketplace Conversation Trends on Twitter Platform Using K-Means","authors":"Ulil Amri Nasron, Muhammad Habibi","doi":"10.28989/compiler.v9i1.579","DOIUrl":"https://doi.org/10.28989/compiler.v9i1.579","url":null,"abstract":"Businesses began to shift from the marketing process that used to use conventional media to switch to using the internet and social media. This is because the cost of marketing using the internet and social media is cheaper than using conventional media. The problem that is often faced by businesspeople when marketing on social media is that they rarely see a marketplace that is becoming a trend and is being discussed by consumers on social media, so the marketing process is carried out less than the maximum. This study aims to analyze conversation trends related to the marketplace on the Twitter platform. The method used in this study is the K-Means Clustering method. Based on the results of the study found that the application of the K-Means Clustering method can produce sufficient information as a basis for consideration of businesspeople in choosing a marketplace. Marketplace trend analysis results show that Shopee, Lazada, and Tokopedia are highly discussed marketplaces on Twitter.","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75395475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modification of Vigenere Algorithm and One Time Pad Using Rivest Code 6 (RC6) Key Expansion 利用Rivest Code 6 (RC6)密钥扩展改进Vigenere算法和一次性填充
Arif Budiman, Paradise Paradise
{"title":"Modification of Vigenere Algorithm and One Time Pad Using Rivest Code 6 (RC6) Key Expansion","authors":"Arif Budiman, Paradise Paradise","doi":"10.28989/compiler.v8i2.481","DOIUrl":"https://doi.org/10.28989/compiler.v8i2.481","url":null,"abstract":"Information technology that is increasingly developing today must be balanced with the similarity of information data. Information security is obtained by applying cryptographic techniques, Vigenere Cipher is a key symmetry algorithm that uses a substitution technique that uses two letters encoding the original message. Vigenere cipher has a weakness because it uses short keywords and its use will be repeated. In this study, we will discuss the modification of the vigenere cipher algorithm and one time pad by adding a key elongation process as done in the RC6 algorithm. The results of the study will produce new variations in data security by combining the vigenere cipher algorithm and vernam cipher with key expansion algorithm RC6","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"155 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75745649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VLAN Wireless Performance Analysis Of Central Access Point Management Topology According to the IEEE 802.11 Standard 基于IEEE 802.11标准的中心接入点管理拓扑的VLAN无线性能分析
A. Wicaksono, Chanief Budi Setiawan
{"title":"VLAN Wireless Performance Analysis Of Central Access Point Management Topology According to the IEEE 802.11 Standard","authors":"A. Wicaksono, Chanief Budi Setiawan","doi":"10.28989/compiler.v8i2.525","DOIUrl":"https://doi.org/10.28989/compiler.v8i2.525","url":null,"abstract":"Wireless network distribution is the right solution to disseminate network services in places and areas that are difficult to reach by cable networks. The effort to add a number of access points is intended to increase the coverage area of a network service so that the signal coverage can be even and broad . The development and improvement of wireless network users have made management and user management activities not easy, because of the way wireless technology works in the operational delivery of its packages, sorting and dividing the packages into 3 parts. Among them are packaged in the form of management, control, and data. Whereas if the management prioritizes data without considering management and control, the emergence of vulnerability in network distribution activities will occur when users are increasingly populated . To facilitate the flexibility and mobility of centralized wireless network users, this study utilizes VLANs that will be implemented at OSI Layer 2 to facilitate the classification of user-profiles, subnetting, securing, and roaming features between access point devices and their users. This research in its testing uses QoS parameters that refer to ITU G.165 / G.168 to monitor the quality of services provided. The parameters used in the measurement of interconnection include Throughput, Packet Loss Ratio, Latency, Jitter, and Delay. If the test is declared successful and complete, it is continued by analyzing and evaluating the results of the study in the hope that the system will successfully cluster the users based on the user characteristic dataset","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"247 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73643868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of Combination Knowledge Acquisition of Haar Training for Object Detection on the Viola Jones Method 基于Viola Jones方法的目标检测Haar训练组合知识获取分析
Haruno Sajati, Anggraini Kusumaningrum, Nur Hanifah
{"title":"Analysis of Combination Knowledge Acquisition of Haar Training for Object Detection on the Viola Jones Method","authors":"Haruno Sajati, Anggraini Kusumaningrum, Nur Hanifah","doi":"10.28989/compiler.v8i2.538","DOIUrl":"https://doi.org/10.28989/compiler.v8i2.538","url":null,"abstract":"Viola Jones method uses the file classifier to object detection. The training process to create object classifier file requires very high computer resources and time which is directly proportional to the amount of training data. The amount of training data determines the accuracy of object detection. The long training process is caused because the computer has low specifications and the distribution of Haartraining files will speed up the process of vector file formation, minimize errors when cutting Haar features on positive objects and also minimize errors that occur during the training process. The problems that arise next are how to overcome this so that a better knowledge is obtained. This study provides analysis results of the process of merging knowledge acquisition and its effect on the accuracy of object detection using the Viola-Jones method with the final result undetected object decrease 52.62% and object detected increase 23.78 %","PeriodicalId":93739,"journal":{"name":"Compiler construction : ... International Conference, CC ... : proceedings. CC (Conference)","volume":"131 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79081660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信