Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1351 - 1380 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Xiphias: Using A Multidimensional Approach Towards Creating Meaningful Gamification-Based Badge Mechanics, Jonathan D.L Casano, Jenilyn L. Agapito, Nicole Ann F. Tolosa Jan 2021

Xiphias: Using A Multidimensional Approach Towards Creating Meaningful Gamification-Based Badge Mechanics, Jonathan D.L Casano, Jenilyn L. Agapito, Nicole Ann F. Tolosa

Department of Information Systems & Computer Science Faculty Publications

This paper shows the design and initial testing of three new Xiphias Badges --Presence; Mastery; and Antifragility – based on the merging of the salient features from James Clear’s Behavior Change model (2016); Johann Hari’s Lost Connections model (2018); and Jordan Peterson’s recent interpretation of the Big Five model of Personality Traits (2007). This multidimensional approach is an attempt to cater to the multidimensionality of a user and aims to be a more universal gamification approach that taps into internal motivations. The badge mechanics were tested on 69 undergraduate students using a Low-Fidelity Gamified Tracker. The results of a survey …


Comparison Of English Comprehension Among Students From Different Backgrounds Using A Narrative-Centered Digital Game, May Marie P. Talandron-Felipe, Kent Levi A. Bonifacio, Gladys S. Ayunar, Ma. Mercedes T. Rodrigo Jan 2021

Comparison Of English Comprehension Among Students From Different Backgrounds Using A Narrative-Centered Digital Game, May Marie P. Talandron-Felipe, Kent Levi A. Bonifacio, Gladys S. Ayunar, Ma. Mercedes T. Rodrigo

Department of Information Systems & Computer Science Faculty Publications

This paper reports the continuation of the field testing of a narrative-centered digital game for English comprehension called Learning Likha: Rangers to the Rescue (LLRR) with a two-fold goal: first, identify the differences in terms of usage, attitudes towards, and perceptions of the English language between students from southern Philippines and the National Capital Region, and second, to determine how the LLRR in-game performance, post-test comprehension scores, engagement, and motivation of students differ between the groups. The participants who are grade school students from a province in southern Philippines answered questionnaires about their attitude towards and perception of English, played …


For People And Planet: Teachers’ Evaluation Of An Educational Mobile Game And Resource Pack, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Janina Carla M. Castro, Abigail Marie T. Favis, Ingrid Yvonne Herras, Francesco U. Amante, Hakeem Jimenez, Juan Carlo F. Mallari, Kevin Arnel C. Mora, Walfrido David A. Diy, Jaclyn Ting Ting M. Lim, Ma. Assunta C. Cuyegkeng Jan 2021

For People And Planet: Teachers’ Evaluation Of An Educational Mobile Game And Resource Pack, Ma. Mercedes T. Rodrigo, Johanna Marion R. Torres, Janina Carla M. Castro, Abigail Marie T. Favis, Ingrid Yvonne Herras, Francesco U. Amante, Hakeem Jimenez, Juan Carlo F. Mallari, Kevin Arnel C. Mora, Walfrido David A. Diy, Jaclyn Ting Ting M. Lim, Ma. Assunta C. Cuyegkeng

Department of Information Systems & Computer Science Faculty Publications

For People and Planet: An SDG Adventure refers to a freely available Android-based narrative adventure game and teacher resource pack that helps learners see the United Nations Sustainable Development Goals (SDGs) in their day-to-day lives. In this paper, we describe the results of an evaluation of both the game and the resource pack by eight (8) middle school teachers. After playing the game and reading the resource pack, teachers gave their feedback about what they liked best and least about the materials, how they could use these resources for their classes, and how these resources could be improved further. Overall, …


Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes Jan 2021

Enterprise Social Network Systems Implementation Model For Knowledge Sharing Among Supply Chain It Professionals, Edgardo Luis Velez-Mandes

CCE Theses and Dissertations

With the increased use of social network technologies in organizational environments, there is a need to understand how these technologies facilitate organizational knowledge management, particularly knowledge sharing. Prior research has focused on the relationship between knowledge management and enterprise social networking systems (ESNS), but little research has been conducted relating to how organizations implement and use ESNS for knowledge sharing. The goal was to construct and validate internally a model that offers guidance for the successful implementation and use of ESNS for knowledge sharing and building successful virtual communities of practice (vCoPs) among IT supply chain professionals in a healthcare …


Unsupervised Representation Learning By Predicting Random Distances, Hu Wang, Guansong Pang, Chunhua Shen, Congbo Ma Jan 2021

Unsupervised Representation Learning By Predicting Random Distances, Hu Wang, Guansong Pang, Chunhua Shen, Congbo Ma

Research Collection School Of Computing and Information Systems

Deep neural networks have gained great success in a broad range of tasks due to its remarkable capability to learn semantically rich features from high-dimensional data. However, they often require large-scale labelled data to successfully learn such features, which significantly hinders their adaption in unsupervised learning tasks, such as anomaly detection and clustering, and limits their applications to critical domains where obtaining massive labelled data is prohibitively expensive. To enable unsupervised learning on those domains, in this work we propose to learn features without using any labelled data by training neural networks to predict data distances in a randomly projected …


Learning Adl Daily Routines With Spatiotemporal Neural Networks, Shan Gao, Ah-Hwee Tan, Rossi Setchi Jan 2021

Learning Adl Daily Routines With Spatiotemporal Neural Networks, Shan Gao, Ah-Hwee Tan, Rossi Setchi

Research Collection School Of Computing and Information Systems

The activities of daily living (ADLs) refer to the activities performed by individuals on a daily basis and are the indicators of a person’s habits, lifestyle, and wellbeing. Learning an individual’s ADL daily routines has significant value in the healthcare domain. Specifically, ADL recognition and inter-ADL pattern learning problems have been studied extensively in the past couple of decades. However, discovering the patterns performed in a day and clustering them into ADL daily routines has been a relatively unexplored research area. In this paper, a self-organizing neural network model, called the Spatiotemporal ADL Adaptive Resonance Theory (STADLART), is proposed for …


Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin Jan 2021

Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin

Engineering Management & Systems Engineering Faculty Publications

In the modern acquisition, it is unrealistic to consider single entities as producing and delivering a product independently. Acquisitions usually take place through supply networks. Resiliency, efficiency, and effectiveness of supply networks directly contribute to the acquisition system's resiliency, efficiency, and effectiveness. All the involved firms form a part of a supply network essential to producing the product or service. The decision-makers have to look for new methodologies for supply chain management. Blockchain technology introduces new methods of decentralization and delegation of services, which can transform supply chains and result in a more resilient, efficient, and effective supply chain. This …


A Blockchain-Enabled Model To Enhance Disaster Aids Network Resilience, Farinaz Sabz Ali Pour, Paul Niculescu-Mizil Gheorghe Jan 2021

A Blockchain-Enabled Model To Enhance Disaster Aids Network Resilience, Farinaz Sabz Ali Pour, Paul Niculescu-Mizil Gheorghe

Engineering Management & Systems Engineering Faculty Publications

The disaster area is a true dynamic environment. Lack of accurate information from the affected area create several challenges in distributing the supplies. The success of a disaster response network is based on collaboration, coordination, sovereignty, and equality in relief distribution. Therefore, a trust-based dynamic communication system is required to facilitate the interactions, enhance the knowledge for the relief operation, prioritize, and coordinate the goods distribution. One of the promising innovative technologies is blockchain technology which enables transparent, secure, and real-time information exchange and automation through smart contracts in a distributed technological ecosystem. This study aims to analyze the application …


Interactive Agent-Based Simulation For Experimentation: A Case Study With Cooperatve Game Theory, Andrew J. Collins, Sheida Etemadidavan Jan 2021

Interactive Agent-Based Simulation For Experimentation: A Case Study With Cooperatve Game Theory, Andrew J. Collins, Sheida Etemadidavan

Engineering Management & Systems Engineering Faculty Publications

Incorporating human behavior is a current challenge for agent-based modeling and simulation (ABMS). Human behavior includes many different aspects depending on the scenario considered. The scenario context of this paper is strategic coalition formation, which is traditionally modeled using cooperative game theory, but we use ABMS instead; as such, it needs to be validated. One approach to validation is to compare the recorded behavior of humans to what was observed in our simulation. We suggest that using an interactive simulation is a good approach to collecting the necessary human behavior data because the humans would be playing in precisely the …


Automatic Metadata Extraction Incorporating Visual Features From Scanned Electronic Theses And Dissertations, Muntabir Hasan Choudhury, Himarsha R. Jayanetti, Jian Wu, William A. Ingram, Edward A. Fox Jan 2021

Automatic Metadata Extraction Incorporating Visual Features From Scanned Electronic Theses And Dissertations, Muntabir Hasan Choudhury, Himarsha R. Jayanetti, Jian Wu, William A. Ingram, Edward A. Fox

Computer Science Faculty Publications

Electronic Theses and Dissertations (ETDs) contain domain knowledge that can be used for many digital library tasks, such as analyzing citation networks and predicting research trends. Automatic metadata extraction is important to build scalable digital library search engines. Most existing methods are designed for born-digital documents, so they often fail to extract metadata from scanned documents such as ETDs. Traditional sequence tagging methods mainly rely on text-based features. In this paper, we propose a conditional random field (CRF) model that combines text-based and visual features. To verify the robustness of our model, we extended an existing corpus and created a …


Attribute-Aware Pedestrian Detection In A Crowd, Jialiang Zhang, Lixiang Lin, Jianke Zhu, Yang Li, Yun-Chen Chen, Yao Hu, Steven C. H. Hoi Jan 2021

Attribute-Aware Pedestrian Detection In A Crowd, Jialiang Zhang, Lixiang Lin, Jianke Zhu, Yang Li, Yun-Chen Chen, Yao Hu, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

Pedestrian detection is an initial step to perform outdoor scene analysis, which plays an essential role in many real-world applications. Although having enjoyed the merits of deep learning frameworks from the generic object detectors, pedestrian detection is still a very challenging task due to heavy occlusions, and highly crowded group. Generally, the conventional detectors are unable to differentiate individuals from each other effectively under such a dense environment. To tackle this critical problem, we propose an attribute-aware pedestrian detector to explicitly model people's semantic attributes in a high-level feature detection fashion. Besides the typical semantic features, center position, target's scale, …


Creators And Backers In Rewards-Based Crowdfunding: Will Incentive Misalignment Affect Kickstarter's Sustainability?, Michael Wessel, Rob Gleasure, Robert John Kauffman Jan 2021

Creators And Backers In Rewards-Based Crowdfunding: Will Incentive Misalignment Affect Kickstarter's Sustainability?, Michael Wessel, Rob Gleasure, Robert John Kauffman

Research Collection School Of Computing and Information Systems

Incentive misalignment in rewards-based crowd-funding occurs because creators may benefit disproportionately from fundraising, while backers may benefit disproportionately from the quality of project deliverables. The resulting principal-agent relationship means backers rely on campaign information to identify signs of moral hazard, adverse selection, and risk attitude asymmetry. We analyze campaign information related to fundraising, and compare how different information affects eventual backer satisfaction, based on an extensive dataset from Kickstarter. The data analysis uses a multi-model comparison to reveal similarities and contrasts in the estimated drivers of dependent variables that capture different outcomes in Kickstarter’s funding campaigns, using a linear probability …


Understanding The Impact Of Encrypted Dns On Internet Censorship, Lin Jin, Shuai Hao, Haining Wang, Chase Cotton Jan 2021

Understanding The Impact Of Encrypted Dns On Internet Censorship, Lin Jin, Shuai Hao, Haining Wang, Chase Cotton

Computer Science Faculty Publications

DNS traffic is transmitted in plaintext, resulting in privacy leakage. To combat this problem, secure protocols have been used to encrypt DNS messages. Existing studies have investigated the performance overhead and privacy benefits of encrypted DNS communications, yet little has been done from the perspective of censorship. In this paper, we study the impact of the encrypted DNS on Internet censorship in two aspects. On one hand, we explore the severity of DNS manipulation, which could be leveraged for Internet censorship, given the use of encrypted DNS resolvers. In particular, we perform 7.4 million DNS lookup measurements on 3,813 DoT …


Ranked List Fusion And Re-Ranking With Pre-Trained Transformers For Arqmath Lab, Shaurya Rohatgi, Jian Wu, C. Lee Giles Jan 2021

Ranked List Fusion And Re-Ranking With Pre-Trained Transformers For Arqmath Lab, Shaurya Rohatgi, Jian Wu, C. Lee Giles

Computer Science Faculty Publications

This paper elaborates on our submission to the ARQMath track at CLEF 2021. For our submission this year we use a collection of methods to retrieve and re-rank the answers in Math Stack Exchange in addition to our two-stage model which was comparable to the best model last year in terms of NDCG’. We also provide a detailed analysis of what the transformers are learning and why is it hard to train a math language model using transformers. This year’s submission to Task-1 includes summarizing long question-answer pairs to augment and index documents, using byte-pair encoding to tokenize formula and …


Single And Differential Morph Attack Detection, Baaria Chaudhary Jan 2021

Single And Differential Morph Attack Detection, Baaria Chaudhary

Graduate Theses, Dissertations, and Problem Reports

Face recognition systems operate on the assumption that a person's face serves as the unique link to their identity. In this thesis, we explore the problem of morph attacks, which have become a viable threat to face verification scenarios precisely because of their inherent ability to break this unique link. A morph attack occurs when two people who share similar facial features morph their faces together such that the resulting face image is recognized as either of two contributing individuals. Morphs inherit enough visual features from both individuals that both humans and automatic algorithms confuse them. The contributions of this …


A Continual Deepfake Detection Benchmark: Dataset, Methods, And Essentials, Chuqiao Li, Zhiwu Huang, Danda Pani Paudel, Yabin Wang, Mohamad Shahbazi, Xiaopeng Hong, Van Gool Luc Jan 2021

A Continual Deepfake Detection Benchmark: Dataset, Methods, And Essentials, Chuqiao Li, Zhiwu Huang, Danda Pani Paudel, Yabin Wang, Mohamad Shahbazi, Xiaopeng Hong, Van Gool Luc

Research Collection School Of Computing and Information Systems

There have been emerging a number of benchmarks and techniques for the detection of deepfakes. However, very few works study the detection of incrementally appearing deepfakes in the real-world scenarios. To simulate the wild scenes, this paper suggests a continual deepfake detection benchmark (CDDB) over a new collection of deepfakes from both known and unknown generative models. The suggested CDDB designs multiple evaluations on the detection over easy, hard, and long sequence of deepfake tasks, with a set of appropriate measures. In addition, we exploit multiple approaches to adapt multiclass incremental learning methods, commonly used in the continual visual recognition, …


Why My Code Summarization Model Does Not Work: Code Comment Improvement With Category Prediction, Qiuyuan Chen, Xin Xia, Han Hu, David Lo, Shanping Li Jan 2021

Why My Code Summarization Model Does Not Work: Code Comment Improvement With Category Prediction, Qiuyuan Chen, Xin Xia, Han Hu, David Lo, Shanping Li

Research Collection School Of Computing and Information Systems

Code summarization aims at generating a code comment given a block of source code and it is normally performed by training machine learning algorithms on existing code block-comment pairs. Code comments in practice have different intentions. For example, some code comments might explain how the methods work, while others explain why some methods are written. Previous works have shown that a relationship exists between a code block and the category of a comment associated with it. In this article, we aim to investigate to which extent we can exploit this relationship to improve code summarization performance. We first classify comments …


Technical Q8a Site Answer Recommendation Via Question Boosting, Zhipeng Gao, Xin Xia, David Lo, John Grundy Jan 2021

Technical Q8a Site Answer Recommendation Via Question Boosting, Zhipeng Gao, Xin Xia, David Lo, John Grundy

Research Collection School Of Computing and Information Systems

Software developers have heavily used online question and answer platforms to seek help to solve their technical problems. However, a major problem with these technical Q&A sites is "answer hungriness" i.e., a large number of questions remain unanswered or unresolved, and users have to wait for a long time or painstakingly go through the provided answers with various levels of quality. To alleviate this time-consuming problem, we propose a novel DeepAns neural network-based approach to identify the most relevant answer among a set of answer candidates. Our approach follows a three-stage process: question boosting, label establishment, and answer recommendation. Given …


Do Blockchain And Iot Architecture Create Informedness To Support Provenance Tracking In The Product Lifecycle?, Somnath Mazumdar, Thomas Jensen, Raghava Rao Mukkamala, Robert John Kauffman, Jan Damsgaard Jan 2021

Do Blockchain And Iot Architecture Create Informedness To Support Provenance Tracking In The Product Lifecycle?, Somnath Mazumdar, Thomas Jensen, Raghava Rao Mukkamala, Robert John Kauffman, Jan Damsgaard

Research Collection School Of Computing and Information Systems

Consumers often lack information about the origin and provenance of the products they buy. They may ask: Is a food product truly organic? Or, what is the origin of the gemstone in the ring I purchased? They also may have sustainability concerns about the footprint of a product at the end of its life. Producers and sellers, meanwhile, wish to know how longitudinal tracking of the provenance of products and their components can boost their sales prices and after-market value, and re- veal new business opportunities. We focus on how the product lifecycle (PLC) can be leveraged to track information …


Analyzing Tweets On New Norm: Work From Home During Covid-19 Outbreak, Swapna Gottipati, Kyong Jin Shim, Hui Hian Teo, Karthik Nityanand, Shreyansh Shivam Jan 2021

Analyzing Tweets On New Norm: Work From Home During Covid-19 Outbreak, Swapna Gottipati, Kyong Jin Shim, Hui Hian Teo, Karthik Nityanand, Shreyansh Shivam

Research Collection School Of Computing and Information Systems

The COVID-19 pandemic triggered a large-scale work-from-home trend globally in recent months. In this paper, we study the phenomenon of “work-from-home” (WFH) by performing social listening. We propose an analytics pipeline designed to crawl social media data and perform text mining analyzes on textual data from tweets scrapped based on hashtags related to WFH in COVID-19 situation. We apply text mining and NLP techniques to analyze the tweets for extracting the WFH themes and sentiments (positive and negative). Our Twitter theme analysis adds further value by summarizing the common key topics, allowing employers to gain more insights on areas of …


Chronic Customers Or Increased Awareness? The Dynamics Of Social Media Customer Service, Shujing Sun, Yang Gao, Huaxia Rui Jan 2021

Chronic Customers Or Increased Awareness? The Dynamics Of Social Media Customer Service, Shujing Sun, Yang Gao, Huaxia Rui

Research Collection School Of Computing and Information Systems

Despite that social media has become a promising alternative to traditional call centers, managers hesitate to fully harness its power because they worry that active service intervention may encourage excessive use of the channel by disgruntled customers. This paper sheds light on such a concern by examining the dynamics between brand-level customer complaints and service interventions on social media. Using details of customer-brand interactions of 40 airlines on Twitter, we find that more service interventions indeed cause more customer complaints, accounting for the online customer population and service quality. However, the increased complaints are primarily driven by the awareness enhancement …


Proxy-Free Privacy-Preserving Task Matching With Efficient Revocation In Crowdsourcing, Jiangang Shu, Kan Yang, Xiaohua Jia, Ximeng Liu, Cong Wang, Robert H. Deng Jan 2021

Proxy-Free Privacy-Preserving Task Matching With Efficient Revocation In Crowdsourcing, Jiangang Shu, Kan Yang, Xiaohua Jia, Ximeng Liu, Cong Wang, Robert H. Deng

Research Collection School Of Computing and Information Systems

Task matching in crowdsourcing has been extensively explored with the increasing popularity of crowdsourcing. However, privacy of tasks and workers is usually ignored in most of exiting solutions. In this paper, we study the problem of privacy-preserving task matching for crowdsourcing with multiple requesters and multiple workers. Instead of utilizing proxy re-encryption, we propose a proxy-free task matching scheme for multi-requester/multi-worker crowdsourcing, which achieves task-worker matching over encrypted data with scalability and non-interaction. We further design two different mechanisms for worker revocation including ServerLocal Revocation (SLR) and Global Revocation (GR), which realize efficient worker revocation with minimal overhead on the …


Drone-Assisted Emergency Communications, Di Wu Dec 2020

Drone-Assisted Emergency Communications, Di Wu

Dissertations

Drone-mounted base stations (DBSs) have been proposed to extend coverage and improve communications between mobile users (MUs) and their corresponding macro base stations (MBSs). Different from the base stations on the ground, DBSs can flexibly fly over and close to MUs to establish a better vantage for communications. Thus, the pathloss between a DBS and an MU can be much smaller than that between the MU and MBS. In addition, by hovering in the air, the DBS can likely establish a Line-of-Sight link to the MBS. DBSs can be leveraged to recover communications in a large natural disaster struck area …


Supporting User Interaction And Social Relationship Formation In A Collaborative Online Shopping Context, Yu Xu Dec 2020

Supporting User Interaction And Social Relationship Formation In A Collaborative Online Shopping Context, Yu Xu

Dissertations

The combination of online shopping and social media allow people with similar shopping interests and experiences to share, comment, and discuss about shopping from anywhere and at any time, which also leads to the emergence of online shopping communities. Today, more people turn to online platforms to share their opinions about products, solicit various opinions from their friends, family members, and other customers, and have fun through interactions with others with similar interests. This dissertation explores how collaborative online shopping presents itself as a context and platform for users' interpersonal interactions and social relationship formation through a series of studies. …


Optimalisasi Media Penyimpanan Pada Sistem Inventori Stok Barang Untuk Pt. Multi Usaha Sejahtera Jaya Menggunakan Metode Goldbach Codes, Angga Debby Frayudha, Siti Purwanti Dec 2020

Optimalisasi Media Penyimpanan Pada Sistem Inventori Stok Barang Untuk Pt. Multi Usaha Sejahtera Jaya Menggunakan Metode Goldbach Codes, Angga Debby Frayudha, Siti Purwanti

Elinvo (Electronics, Informatics, and Vocational Education)

Pengelolaan data secara konvensional, baik manual pada buku maupun penggunaan aplikasi pengolah data (kata atau angka) dinilai masih memiliki keterbatasan terutama dalam hal keterjangkauan akses dan pengelolaan. Sistem informasi inventori mampu menyajikan pengelolaan data berupa informasi-informasi yang dibutuhkan untuk produktivitas tempat usaha sesuai karakteristik pengguna informasi pada tempat usaha tersebut. Lebih lanjut untuk proses transmisi data yang lebih baik, diperlukan optimalisasi media penyimpanan melalui teknik kompresi data tertentu. Salah satu algoritma kompresi data teks yang memiliki keunggulan pada optimalisasi ukuran hasil kompresi adalah Goldbach Codes. Artikel ini mendeskripsikan pengembangan sistem pengelolaan inventori dengan kemampuan dapat menyimpan maupun mengubah data stok …


Pengembangan Sistem Informasi Pemasaran Produk Pertanian Berbasis Website, Veronika Asri Tandirerung, Syahrul Syahrul, Achmad Padil Dec 2020

Pengembangan Sistem Informasi Pemasaran Produk Pertanian Berbasis Website, Veronika Asri Tandirerung, Syahrul Syahrul, Achmad Padil

Elinvo (Electronics, Informatics, and Vocational Education)

Pengembangan sistem informasi pemasaran produk pertanian (SIPTANI) dibutuhkan untuk membantu para petani dalam memasarkan produk-produk pertanian khususnya di era pandemic Covid-19. Penelitian ini merupakan penelitian pengembangan sistem dengan model pengembangan prototype dengan studi kelayakan menggunakan standar ISO 9126. Data penelitian diperoleh dari hasil observasi dan pengisian kuesioner oleh responden. Hasil pengujian aplikasi diperoleh dengan menganalisis aspek-aspek pada functional suitability, usability, compatibility, dan portability. Pada aspek functional suitability berada pada kategori layak diterima. Pada aspek usability, kategori sangat setuju memiliki dengan persentase 90%, sehingga aplikasi dinyatakan layak dan ditanggapi baik oleh pengguna. Pada aspek compatibility, sistem pemasaran pertanian ini dapat …


Penerapan Model Utaut 2 Untuk Mengetahui Faktor-Faktor Yang Memengaruhi Penggunaan Siortu, Nur Azmi Ainul Bashir Dec 2020

Penerapan Model Utaut 2 Untuk Mengetahui Faktor-Faktor Yang Memengaruhi Penggunaan Siortu, Nur Azmi Ainul Bashir

Elinvo (Electronics, Informatics, and Vocational Education)

Layanan sistem informasi akademik untuk orang tua (SIORTU) telah banyak diterapkan di kampus-kampus, salah satunya adalah Universitas Islam Indonesia (UII). Nama resmi SIORTU UII yaitu UNISYS untuk orang tua. Belum banyak orang tua atau wali mahasiswa yang menggunakan SIORTU. Tercatat hanya 7.361 akun SIORTU yang aktif pada rentang April 2018 s.d Maret 2019. Jumlah tersebut hanya 36.68% dari jumlah akun yang disediakan untuk orang tua mahasiswa angkatan 2015-2018 yaitu 20.068 akun. Penelitian ini merupakan pengembangan penelitian yang telah dilakukan sebelumnya. Penelitian ini merupakan penelitian kuantitatif. Data yang dianalisis diperoleh dari data penelitian yang dikembangkan. Tujuan penelitian ini adalah mengetahui pengaruh …


Penggunaan Analytical Hierarchy Process (Ahp) Pada Penentuan Prioritas Supplier Food Chemical Di Pt. Garuda Hidrotive Internasional, Nehemia Hadiwijaya, Jenie Sundari Dec 2020

Penggunaan Analytical Hierarchy Process (Ahp) Pada Penentuan Prioritas Supplier Food Chemical Di Pt. Garuda Hidrotive Internasional, Nehemia Hadiwijaya, Jenie Sundari

Elinvo (Electronics, Informatics, and Vocational Education)

Abstract-Supplier selection is one of the important things in purchasing activities for companies. Supplier selection is a multi-criteria problem which includes quantitative and qualitative factors. One method that can be used for supplier selection is the AHP (Analytical Hierarchy Process) method. The problems that will be discussed in this study are: (1) how is the order of priority criteria and sub-criteria in the selection of suppliers at PT Garuda Hidrotive International? (2) which supplier / supplier should PT Garuda Hidrotive International choose based on the AHP method? The sampling technique uses judgment sampling because the AHP method requires dependence on …


Traversal Struktur Data Bipartite Graph Dalam Graph Database Menggunakan Depth-First Search, Pradana Setialana, Muhammad Nurwidya Ardiansyah Dec 2020

Traversal Struktur Data Bipartite Graph Dalam Graph Database Menggunakan Depth-First Search, Pradana Setialana, Muhammad Nurwidya Ardiansyah

Elinvo (Electronics, Informatics, and Vocational Education)

Bipartite graph merupakan satu bentuk graph yang dapat digunakan dalam membentuk sebuah strukur data yang saling berelasi namun memiliki karakteristik dengan dua jenis node yang berbeda seperti data hubungan keluarga atau data pohon keluarga. Dalam menyimpan struktur data bipartite graph ke sebuah database dapat digunakan graph database dengan konsep dimana node saling saling terhubung dengan node lainnya. Bipartite graph yang dikombinasikan dengan graph database menghasilkan solusi yang tepat dalam menyimpan data berelasi dengan dua jenis node yang berbeda. Namun dalam solusi tersebut menimbulkan permasalahan baru mengenai pencarian atau penelusuran (traversal) terhadap data yang terdapat dalam struktur data tersebut. Tujuan dari …


Cat Tracks – Tracking Wildlife Through Crowdsourcing Using Firebase, Tracy Ho Dec 2020

Cat Tracks – Tracking Wildlife Through Crowdsourcing Using Firebase, Tracy Ho

Master's Projects

Many mountain lions are killed in the state of California every year from roadkill. To reduce these numbers, it is important that a system be built to track where these mountain lions have been around. One such system could be built using the platform-as-a-service, Firebase. Firebase is a platform service that collects and manages data that comes in through a mobile application. For the development of cross-platform mobile applications, Flutter is used as a toolkit for developers for both iOS and Android. This entire system, Cat Tracks is proposed as a crowdsource platform to track wildlife, with the current focus …