No abstract available.
Proceeding Downloads
Research on Application of Information Management Technology in Computer Big Data System
In the context of the important data era, information data has increased, and information processing and storage have become more extensive. People's requirements for computer information processing technology continue to increase, and security issues ...
Automatic Data-Driven Agriculture System for Hydroponic Farming
Until 2050, global urbanization will increase to 2.4 billion cities and towns. As the population grows, so does the consumption of fruits and vegetables. There will be a need for agricultural land and water resources. Nowadays, hydroponics is gaining ...
Data Model For Bigdata System For Multimedia
Big Data systems are characterized by the processing of data that is created in real time, has a different complexity, is variable and diverse and, most importantly, is huge. They require the application of innovative technologies, tools and methods in ...
A Path of Roses and Financial Literacy: Exploring the Usability of UK's Digital Banking Services to Improve Younger Adult Adoption
Digital retail banking is a prominent method for customers to interact with their banks. However, over the last decade the banking industry has experienced a slowing of digital retail banking adoption rates worldwide, especially in younger adults. ...
A Simulation for Forecasting Compute Resource Usage
The usage of compute resources by data processing jobs may change over time, requiring careful resource planning when an organization operates these resources itself in an on-premise private cloud. Ideally, the currently available resources always match ...
Movilizer Application with Genre and Rating Classification Using NW-KNN Method
Information about movies can be easily seen in cyberspace. However, not all film sites present relevant and accurate information as examples of high rating films but have bad comments. In addition, there is a review that has not been accompanied by ...
Customer Journey Mapping of a Public Mobile Application: The Case Study of a State Electricity Enterprise
Although electricity enterprises are state-owned and are often monopolies, they face a number of challenges to remain competitive for enhance customer satisfaction. In turn, a number of state electricity enterprises have developed public mobile ...
Hospital Volunteer Management Process Digitalization Through Service Design: Design Decision and Implementation
In the context of healthcare, volunteers play an important role in improving the patient's experience and lowering the operational cost. However, the process which facilitate their management is reported to be problematic. In this research, we have ...
Research on Key Technologies of Software Configuration Management in Development of Large-scale Software System
Software configuration management is a technology throughout the whole software life cycle. Its main function is to control software changes in the software life cycle and reduce the impact of various changes. With the increasing complexity of software ...
SlowFast Convolution LSTM Networks for Dynamic Gesture Recognition
Computer vision-based gesture recognition is gradually becoming a popular research direction in the field of human-computer interaction (HCI). However, there are various challenges in the extraction of gesture features, such as complex backgrounds, ...
Video Surveillance System for Helmet Recognition Based on SSD Target Detection Algorithm
Video surveillance technology is derived from a branch of artificial intelligence. It can have a computer to automatically analyze the video image source, identify and extract useful key information from it, and automatically control the machine to ...
Detection of humans in drone images for search and rescue operations
Object detection has solved many problems in different applications like monitoring security, search and rescue operations, semantic segmentation, autonomous driving and so on. Despite this huge success rate in normal ground captured images, it is ...
Image Saliency Detection via Multi-Feature and Manifold-Space Ranking
In this paper, we propose an image saliency detection method by using multi-feature and manifold-space ranking. Basically, the proposed method extracts the color-histogram feature to obtain the fine information of the image, and the color-mean feature ...
Generative Image Inpainting for Large-Scale Edge Area
In recent years, applying deep learning to computer vision is a very popular research direction, and a number of models with amazing effects have appeared. Deep learning-based approaches for end-to-end image inpainting have shown promise results. Recent ...
Affine Transform for Skew Correction Based on Generative Adversarial Network Method for Multi-Camera Person Re-Identification
In intelligent video surveillance system, person re-identification is a key technology. In order to address the problem, the decrease in performance of person Re-Id lead by the skew pedestrian images, this paper proposes the affine transform for skew ...
An Improved Method of Dynamic Path Modification for Nonholonomic Mobile Robot
The TEB (timed elastic band) algorithm optimizes the path generated by the global planner to obtain a time-optimal trajectory that can avoid obstacles and satisfy the kinematics and dynamics constraints of the robots. In TEB algorithm, backward is often ...
Web Mining in e-Procurement: A Case Study in Indonesia
E-procurement is an electronic procurement system that became a key factor required to manage financial aspect of a country with appropriate controls and protected by legal policies. The Presidential Regulation in Indonesia expect all government ...
The Performance Mapping for The Viewpoint of Hate-speech on YouTube in Millenials (A Case Study of Students in A Private University)
Nowadays, in the era of social media, YouTube started to be booming as one. For the platform is presenting videos, viewers might get involved in feelings and mind. Like other social media, YouTube enables people to interact with each other. As they ...
A Novel Feature Selection Approach based on Binary Particle Swarm Optimization and Ensemble Learning for Heterogeneous Defect Prediction
Software defect prediction is an integral part of the software development process. Defect prediction helps focus on the grey areas beforehand, thus saving the considerable amount of money that is otherwise wasted in finding and fixing the faults once ...
Application and Research Of Mapping Function Method In Radar Target Positioning System
In the radar positioning system, the unevenness of the atmospheric medium causes the deflection of the electromagnetic wave in the propagation process, which reduces the positioning accuracy of the radar, so it is necessary to correct the atmospheric ...
Sequence Analysis and Generation of Filipino Ethnic Textile Patterns using Finite Automata
The study presents an analysis and generation of pattern sequences acquired from northern Luzon ethnic textiles. The textile sample images were collected, analyzed, and processed into a grayscale raster shapes. The analyzed data for pattern sequences ...
The Effect of Online Learning Effectiveness Against Student Achievement Motivation (Case Study of Online Learning Student at Bina Nusantara University)
Nowadays, the world mark by the development of information technology that has made humans enter the big data era. The Big data era has changed various areas of life, including education. E-learning is a learning model where its implementation is ...
Index Terms
- Proceedings of the 2021 3rd Asia Pacific Information Technology Conference