IJCT - Volume 5, Issue 4 / July - August 2018
S.No
|
Title/Author Name
|
Serial No
|
|
1 |
Comparison Analysis of Fuzzy Mamdani and Sugeno Methods for the Detection of Flooded Vulnerable Areas: A Case Study of Pringsewu Sub-district
- Agustinus Eko Setiawan, Ratnasari, Anita Triana
10.29126/23942231/IJCT-V5I4P1
Abstract
Vulnerability is a situation or condition that can reduce the ability of communities to prepare themselves for hazards or disaster threats. The purpose of knowing vulnerability is to reduce the negative impacts caused by disaster. So, the problem formulation in this research is about the comparison between fuzzy mamdani method with fuzzy sugeno method to detect flood prone area in Pringsewu Sub-district. The prototype that can determine flood prone areas, is still on construction in Pringsewu Sub-district. This prototype can reduce flood risk both through physical development as well as awareness and capacity building for disaster. This research yields the conclusion that is safe, vulnerable and flood. For the calculation begins by specifying the fuzzy set of each variable, the formation of fuzzy rules (implications), the composition of rules using MAX function, and also affirmation (defuzzification). While the prototype begins using Graphic User Interface, then complete the code on the Matlab R2013a software so the vulnerability detection design can work well. After the prototype of flood vulnerability detection was successfully made, the monographic data of Pringsewu Sub-district could be input into the prototype. Next will be processes using the Fuzzy Inference System method that has been entered into the prototype, then the result will appear. At the end of Mamdani method, it has 70% accuracy value while Sugeno method has 48.33% accuracy value. So from this result, we know that Mamdani method has better accuracy than Sugeno method. Keyword: Disaster, Flood, Fuzzy mamdani, Fuzzy Sugeno, Matlab, Graphic User Interface. Agustinus Eko Setiawan, Ratnasari, Anita Triana " Comparison Analysis of Fuzzy Mamdani and Sugeno Methods for the Detection of Flooded Vulnerable Areas: A Case Study of Pringsewu Sub-district " Vol. 5 - Issue 4 (01 - 09) - July - August 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I4P1 |
|
2 |
Index Application of Community Satisfaction on Community Services Understanding Case Study of Population and Civil Registration of DKI Jakarta Province
- Yudo Devianto, Saruni Dwiasnati
10.29126/23942231/IJCT-V5I4P2
Abstract
Based on the research we did before, in the research using microcontroller tool as a tool, the research we titled "Decision Making Approach Index Public Satisfaction With Exponential Comparison Method (MPE) On Community Service Unit With Microcontroller Tool As A Survey Tool". In previous research applications were developed desktop-based and using survey aids. This advanced research aims to replace previous applications for the better, and plans will be made web-based applications and also change the hardware of the survey tools into applications. This research was conducted at the civil service unit of civil service and civil registration of DKI Jakarta province, in this research involving some actions using certain method and approach. Collection of data sources at research sites using Field Research. The results of data collection are analyzed to conclude the condition of business process in the field by using qualitative method. The results are presented in the form of this research report by using descriptive method. The results of this study are expected to provide information about the quality of performance and used as a reference to improve the quality of performance of the community service unit, and can be used also by agencies that have the same problems. Keyword: Decision Making Approach Public Satisfaction Index, Community Service Unit, Performance Quality, Exponential Comparison Method, MPE. Yudo Devianto, Saruni Dwiasnati " Index Application of Community Satisfaction on Community Services Understanding Case Study of Population and Civil Registration of DKI Jakarta Province " Vol. 5 - Issue 4 (10 - 17) - July - August 2018, International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I4P2 |
|
3 |
A Systematic Literature Review of Web Content Management System Implementation
- Sarwati Rahayu
10.29126/23942231/IJCT-V5I4P3
Abstract
Prior to the development of content management system (CMS) it is important to conduct a systematic literature review (SLR) study to investigate the development of research on content management system (CMS). There are many research have been done regarding content management system, especially web content management system (Web CMS). One of the methods that can be used for systematic literature review (SLR) is the Preferred Reporting Items for Systematic Reviews and Meta-analyses (PRISMA). As the result, we classified Web CMS development into four domain classifications: general, medical, education, culture and business. First, CMS in general domain presented by Makitalo et al. (2011) conducted research regarding the nature of Web CMS. Swierad, Zabierowski, &Napieralski (2009) works presented universal editorial content management system. Liu et al. (2010) delivered and grouped the features of CMS into four groups, including website, resource management, user and rights management and personal information management. Second, CMS in education domain presented by many researchers, i.e. Rivera et al. (2010) proposed WikiDIS project, Staccini et al. (2007) purposed CMS built-in Dublin Core metadata, Reddig et al. (2008) designed CMS usability oriented, Xiang (2008) proposed CMS for student records, Zhang et al. (2010) delivered the Web CMS for education, Doinea et al. (2010) presented the design, architecture and implementation of the content management system named WeLearn, and Kurilovas (2009) proposed Learning (Content) Management Systems (LMSs). Third, in medical domain, CMS has been developed by Krechel et al. (2006) and Masud et al. (2012)[1][1][1][1][1][1]. Fourth, Sookhanaphibarn&Thawonmas (2009) designed Content Management System (CMS) for arranging digital information in museums. Fifth, Nordheim&Paivarinta (2004) explores the concept of customization related to ECM system and its role in the requirements definition phase of such development initiatives. Keyword: systematic literature review, content management system Sarwati Rahayu " A Systematic Literature Review of Web Content Management System Implementation " Vol. 5 - Issue 4 (18 - 25) - July - August 2018, International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I4P3 |
|
4 |
Modelling Business Activities of Small and Medium Enterprises Using Soft System Methodology
- Sarwati Rahayu
10.29126/23942231/IJCT-V5I4P4
Abstract
Indonesia is a country with a high growth population rate. This condition encourages Indonesian government to provide and facilitate enough jobs for all Indonesian people. This problem can be tackled by supporting Indonesia people to build small and medium enterprises known as Small Medium Enterprises (SMEs). From the survey results, the type of business classified SMEs amounted to 53.82 million of the total business in Indonesia.One of alternatives to support SMEs in order to promote and sell product is information technology development including plan, policy and infrastructure. However, to develop information technology (IT) in order to support SMEs activities must be planned based on real business process. This research is aimed to model business activities of SMEs in Indonesia by using soft system methodology (SSM). As the result, factory or manufacture, small medium enterprises and costumers are main actors involved to business activities. The result of this research can be used as basic to make plan, policy and infrastructure of technology to support small medium enterprises (SMEs) in Indonesia. Keyword: Soft system methodology, small medium enterprises, conceptual model Sarwati Rahayu " Modelling Business Activities of Small and Medium Enterprises Using Soft System Methodology " Vol. 5 - Issue 4 (26 - 31) - July - August 2018, International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I4P4 |
|
5 |
Decision Support System Determination Of Business Location (Cake Shop) Using Ahp And Topsis Method
- Didik Wiguna, Muhammad Ramdhan, Sonny Nugroho Aji, Andi Moch Januriana
10.29126/23942231/IJCT-V5I4P5
Abstract
The application of information technology can provide the best alternative solution to consider the criteria of the alternatives. Criteria that become general reference of research is distance, location of road, wide, price, social economy. AHP-TOPSIS method is expected to provide an alternative solution in determining the right location. The AHP method is used to generate the weighted value of the criterion, while the TOPSIS method is used to generate an alternate ranking sequence. This study has 8 criteria, and the result of this research is a prototype system that displays the order of rankings based on positive ideal values and alternative negative alternatives. This study recommends the order of 1 to 5 on the accuracy of ranking rankings. Keyword: criterion, alternative, weight, AHP, TOPSIS. Didik Wiguna, Muhammad Ramdhan, Sonny Nugroho Aji, Andi Moch Januriana " Decision Support System Determination Of Business Location (Cake Shop) Using Ahp And Topsis Method " Vol. 5 - Issue 4 (32 - 36) - July - August 2018, International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I4P5 |
|
6 |
Application Of E-Business On The Application Of Corporate Social Responsibility (CSR) Data Processing
- Yudo Devianto, Saruni Dwiasnati
10.29126/23942231/IJCT-V5I4P6
Abstract
Based on our previous meetings, in the meeting we listened to the presentation of their difficulties in processing the Corporate Social Responsibility (CSR) data, because all this time the data they obtained was paper print out data. And they want an application that can facilitate them in managing the data, for that we intend to conduct research to be able to produce an application that can bridge between the CSR provider and the agency. The difficulty in processing the data obtained and the absence of an application that can help in processing the data. Making Fund Processing and Reporting Applications for Corporate Social Responsibility (CSR), which is expected to provide convenience and speed in processing these data. The type of research that we use is applied research (Applied Research), because the results of the research can be directly used / applied to solve the problems faced. Based on the research that has been done, it can be concluded that this research runs well in applying the E-Business concept in data processing applications for Corporate Social Responsibility (CSR), and the application can be used to process CSR data, and the application can still be developed to be better. Keyword: Web Applications, Corporate Social Responsibility, Web, CSR, E-Business. Yudo Devianto, Saruni Dwiasnati " Application Of E-Business On The Application Of Corporate Social Responsibility (CSR) Data Processing " Vol. 5 - Issue 4 (37 - 44) - July - August 2018, International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I4P6 |
|
7 |
Priority Based Scheduling In Cloud Computing Based On Task - Aware Technique
- Jeevithra.R, Karthikeyan.T
10.29126/23942231/IJCT-V5I4P7
Abstract
Cloud computing is an internet-based computing where resources, software and information are provided to computers on-demand, like a public utility. It is emerging as a platform for sharing resources like infrastructure, software and various applications. The majority of cloud computing infrastructure consists of reliable services delivered through data centers. Modern data centers, operating under the cloud computing model are hosting a variety of applications ranging from those that run for a few seconds to those that run for longer periods of time. When a job is submitted to the clouds, it is partitioned into several tasks. Scheduling a set of tasks in is one of the traditional challenges in parallel and distributed computing. It is very important to decide the order in which these tasks should be executed in order to increase the overall efficiency. Task scheduling is a key process for assigning the requests to resources in an efficient way considering cloud characteristics. Proper scheduling can have significant impact on the performance of the system. In this thesis work a task level scheduling approach has been proposed which prioritize the tasks to reduce the execution time, waiting time and response time. The simulator CloudSim has been used to validate the Proposed algorithm. Jeevithra.R, Karthikeyan.T " Priority Based Scheduling In Cloud Computing Based On Task – Aware Technique " Vol. 5 - Issue 4 (45 - 51) - July - August 2018, International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I4P7 |
|
8 |
Identification With Expression Levels Related To Breast Cancer Prognosis Using Datamining Techniques
- A.Ramya, G.Silambarasan
10.29126/23942231/IJCT-V5I4P8
Abstract
Providing clinical predictions for cancer patients by analyzing their genetic make-up is a difficult and very important issue. With the target of identifying genes more interrelated with the diagnosis of breast cancer, we used data mining techniques to study the gene expression values of breast cancer patients with known clinical outcome. Focus of our work was the creation of a arrangement model to be used in the clinical practice to support therapy prescription. We randomly subdivided a gene expression dataset of 112 samples into a training set to learn the model and a test set to validate the model and assess its performance. We evaluated several learning algorithms in their not weighted and weighted form, which we distinct to take into account the different clinical importance of false positive and false negative classifications. To develop in used the results, these final, especially when used in their combined form, appear to provide better executions of the results. Keyword: : Data Mining, Gene expression; Breast Cancer Prognosis A.Ramya, G.Silambarasan " Identification With Expression Levels Related To Breast Cancer Prognosis Using Datamining Techniques " Vol. 5 - Issue 4 (52 - 58) - July - August 2018, International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I4P8 |
|
9 |
Word Arrangement Model With Opinion Words And Reviews
- G.Raja Raja Cholan, S.Gayathri
10.29126/23942231/IJCT-V5I4P9
Abstract
A graph-based co-ranking criterion is utilized to calculate the arrogance of each applicant. The applicants with greater assurance are produced as viewpoint objectives or viewpoint terms. In comparison to previous techniques centered on the closest next-door neighbour guidelines, our design catches viewpoint interaction more precisely, especially for long-span interaction. In this paper suggests a novel strategy centered on the partially supervised positioning design, which regards determining viewpoint interaction as a positioning process. In comparison to the traditional not being watched positioning design, the suggested design acquires better perfection because of the usage of limited guidance. In comparison to syntax-based techniques, our term positioning design successfully relieves the side effects of parsing errors when dealing with casual on the internet text messages. Additionally, when calculating applicant assurance, we punish higher-degree vertices in our graph-based co-ranking criteria to decrease the probability of error generation. Our trial outcomes on three corpora with different sizes and languages show that our strategy successfully outperforms state-of-the-art techniques. Exploration viewpoint objectives and viewpoint terms on the internet reviews are important tasks for fine-grained viewpoint mining, the key component of which involves discovering viewpoint interaction among terms. Exploration the viewpoint interaction between viewpoint objectives and viewpoint terms was the key to combined removal. To this end, the most adopted techniques have been nearest-neighbor guidelines and syntactic styles. To improve the performance of these techniques, we can specially design beautiful, high-precision styles. However, with an increase in corpus size, this strategy is likely to miss more items and has lower recall. We propose a method centered on a monolingual Word positioning design (WAM). A viewpoint target can find its corresponding modifier through term positioning. Additionally, the WAM can incorporate several user-friendly factors, such as term co-occurrence wavelengths and term positions, into a specific design for showing the viewpoint interaction among terms. Thus, we expect to obtain more precise outcomes on viewpoint relation identification. Keyword: : Word point, data mining, WAM. G.Raja Raja Cholan, S.Gayathri " Word Arrangement Model With Opinion Words And Reviews " Vol. 5 - Issue 4 (59 - 63) - July - August 2018, International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I4P9 |
|
10 |
Development Medium Access Control Using Resource Manager
- P.Karthik, G.Saranya
10.29126/23942231/IJCT-V5I4P10
Abstract
Video communication over wireless networks is an increasing technology in a wide range of important applications. In order to reduce the image data traffic, video compression is general employed in a video codec. There are some video compression standards such as H.263, H.264 and MPEG4. Among these standards, H.264 has more advanced compression methods than the MPEG-4 compression, having significant improvements in coding efficiency, error robustness and network friendliness, meeting the growing demands for video compression application in embedded system. In order to realize wireless communication over short distances in embedded system, Bluetooth and WiFi are two main technologies to choice recently. Bluetooth is reported to be more power competent than WiFi. Video transmission over Bluetooth is still a expensive research ideas. Currently, the Bluetooth v4.2 Specification is released on December 2014. But target at very poor power applications running off a think up cell, which is inapt for wireless video transmission. Bluetooth v3.0+HS (High-Speed) Specification is released on 21 April 2009. It supports theoretical data transfer speeds of up to 24 Mbit/s, of which the high data rate traffic is carried over a collocated 802.11 link and consumes more energy. in embedded system is proposed in the paper. In order to solve the problem that H.264 variable bit rate (VBR) in video transmission is untrustworthy and Bluetooth channel is instable, it adopts store manager (RM) to control video transmission, which analyzes the condition of Bluetooth, and uses a method of traffic credits and a buffer to smooth the video output traffic and to partially eliminate the peaking of the video stream transmitted in Bluetooth channel. P.Karthik, G.Saranya " Development Medium Access Control Using Resource Manager " Vol. 5 - Issue 4 (64 - 69) - July - August 2018, International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I4P10 |
|
11 |
Predictive Scrutiny and Acquaintance based Network Analysis by Sentiment of Opinions with Supervised Learning Algorithms in Social Media
- K.C. Anju, N. Rojaramani
10.29126/23942231/IJCT-V5I4P11
Abstract
A In this paper meet some problem in current Social Networks is to assign users the influence to manage the messages posted on their private space to avert that unnecessary content. The unwanted data may contain political, In social media our account is hacked with unknown person and they post fake news, for avoiding this can use a method of text analysis with based on our interest and about us, careers and before posted posts, categorized the words in black list and white list using this method 90% white list included message is post, otherwise a Onetime Password (OTP) send to the email and check the person is right person., as opposed to database applications, which use very structured data. In the implementation section use a college website and make department wise posts are posted by comparing the words with which department is posted check with dictionary of that subject, e.g. It can check the post from physics department, tokenized the post and based on that tokens that all tokens compared with physics dictionary, 90% tokens from physics that will be posted, like this method all department posts are checked and make black list and white list and checked. Through the sentiment analysis the comments posted by the users are analyzed by two categories like black list and white list. Then it checks with IP section for the first time login verification to check whether authorized person login or hacker hacks any information. Keyword: : Social Network, Private Space, Text Analysis, One time Password (OTP), tokenized Post, Sentiment Analysis, Signup Verification. K.C. Anju, N. Rojaramani " Predictive Scrutiny and Acquaintance based Network Analysis by Sentiment of Opinions with Supervised Learning Algorithms in Social Media " Vol. 5 - Issue 4 (70 - 77) - July - August 2018, International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I4P11 |
|
12 |
Traffical User Control System
- P.Sakila, J.Iswarya
10.29126/23942231/IJCT-V5I4P12
Abstract
In this paper meet some problem in current Social Networks is to assign users the influence to manage the messages posted on their private space to avert that unnecessary content. The unwanted data may contain political, In social media our account is hacked with unknown person and they post fake news, for avoiding this can use a method of text analysis with based on our interest and about us, careers and before posted posts, categorized the words in black list and white list using this method 90% white list included message is post, otherwise a Onetime Password (OTP) send to the email and check the person is right person., as opposed to database applications, which use very structured data. In the implementation section use a college website and make department wise posts are posted by comparing the words with which department is posted check with dictionary of that subject, e.g. It can check the post from physics department, tokenized the post and based on that tokens that all tokens compared with physics dictionary, 90% tokens from physics that will be posted, like this method all department posts are checked and make black list and white list and checked. Through the sentiment analysis the comments posted by the users are analyzed by two categories like black list and white list. Then it checks with IP section for the first time login verification to check whether authorized person login or hacker hacks any information. Keyword: : Social Network, Private Space, Text Analysis, One time Password (OTP), tokenized Post, Sentiment Analysis, Signup Verification. P.Sakila, J.Iswarya " Traffical User Control System " Vol. 5 - Issue 4 (78 - 80) - July - August 2018, International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I4P12 |
|
13 |
Quality Assessment of Soil Moisture Observation by Support Vector Machine and Particle Swarm Optimization Algorithm with Environment Prediction
- P.Karthik, R.Mani
10.29126/23942231/IJCT-V5I4P13
Abstract
This project present a survey of the experiential literature on the effects of typical weather change and weather circumstances on the convey sector. in spite of mixed confirmation on numerous issues, several pattern can be observed. On a worldwide scale particularly shifts in sightseeing and undeveloped production due to augmented temperatures may lead to shifts in passenger and shipment transport. Weather change connected shifts in weather patterns power also cause communications disruptions. Clear patterns are that rainfall affects road safety by increasing accident frequency but declining sternness. Precipitation also amplify overcrowding, especially during peak hours. Additionally, an improved frequency of low water levels may drastically increase costs of inland watercourse transport. In ill feeling of this future, the net impact of climate change on prevalent costs of the various transport modes is uncertain and hazy, with a probable exception for Inland River bring. Keyword: :Climate Change and Weather Condition, Transport, Infrastructure Disruptions, Weather Patterns, Uncertain Transport. P.Karthik, R.Mani " Quality Assessment of Soil Moisture Observation by Support Vector Machine and Particle Swarm Optimization Algorithm with Environment Prediction " Vol. 5 - Issue 4 (81 - 86) - July - August 2018, International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I4P13 |
|
14 |
Web-Based Medical Decision Support Systems For Three-Way Medical Decision Making With Game-Theoretic Rough Sets
- G.Gayathri, R.Kiruthika
10.29126/23942231/IJCT-V5I4P14
Abstract
The extend the GTRS model to analyze uncertainty involved in medical decision making. Experimental results with aGTRS-overall quality based on medical fitness process in the medical field, as well as other fields. It is hoped that the incorporation of a GTRS component in WMDSS will enrich and enhance its decision-making capabilities. We focus on decision making Web-based medical decision support systems (WMDSS). Indecision is a grave factor that affects decision making and reasoning in the health check field. A some way decision-making approach is an effective and better preference to lessen the effects of indistinctness. Mainly, the option of putting off decision is added in this approach that provides the flexibility to further examine and investigate the uncertain and hesitant cases. The game-theoretic rough set (GTRS) model is a recent progress in rough sets that can be used to settle on the three rough set regions in the probabilistic rough sets skeleton by influential pair of thresholds. Keyword: :GTRS, WMDSS. G.Gayathri, R.Kiruthika " Web-Based Medical Decision Support Systems For Three-Way Medical Decision Making With Game-Theoretic Rough Sets " Vol. 5 - Issue 4 (87 - 91) - July - August 2018, International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I4P14 |
|