7 research outputs found

    Indonesian news classification application with named entity recognition approach

    Get PDF
    Nowadays, many netizens search for news via search engines with countless amounts of information, so it is increasingly difficult to determine when the number of news articles that appear changes very quickly and dynamically. Thus, it is necessary to process the extraction of news information to display the core information of the news. Problems arise, especially in Indonesian, which has a structure of various noun phrase entities with shallow parsing or grammatical induction. Named Entity Recognition (NER) has the opportunity to overcome this because it can extract news entities in depth, starting from proper nouns in text documents containing information search, machine translation, answering questions, and automatic summarization. This study aims to apply NER in Indonesian language news classification. This study uses Design-Based Research whose process includes (1) pre-implementation, (2) design, (3) implementation and revision, and finally, (4) reflection and evaluation. This application was developed on the platform python, streamlit, BeautifulSoup, gnews, and spacy library. The results of application accuracy testing have an F1-score value of 89.69% for all entities consisting of place, figure, day, date, and organization

    Impact of big data congestion in IT: an adaptive knowledge-based bayesian network

    Get PDF
    Recent progress on real-time systems are growing high in information technology which is showing importance in every single innovative field. Different applications in IT simultaneously produce the enormous measure of information that should be taken care of. In this paper, a novel algorithm of adaptive knowledge-based Bayesian network is proposed to deal with the impact of big data congestion in decision processing. A Bayesian system show is utilized to oversee learning arrangement toward all path for the basic leadership process. Information of Bayesian systems is routinely discharged as an ideal arrangement, where the examination work is to find a development that misuses a measurably inspired score. By and large, available information apparatuses manage this ideal arrangement by methods for normal hunt strategies. As it required enormous measure of information space, along these lines it is a tedious method that ought to be stayed away from. The circumstance ends up unequivocal once huge information include in hunting down ideal arrangement. A calculation is acquainted with achieve quicker preparing of ideal arrangement by constraining the pursuit information space. The proposed algorithm consists of recursive calculation intthe inquiry space. The outcome demonstrates that the ideal component of the proposed algorithm can deal with enormous information by processing time, and a higher level of expectation rates

    System Dynamic Analysis of the Fleet Availability and Reliability Influence on the Lead Time of the Delivery Order Process

    Get PDF
    The inventory replenishment process in the warehouse becomes difficult if there is uncertainty. It can cause warehouse performance not to be as expected. The warehouse is an important part of the supply chain subsystem, which smooths the flow of goods from upstream to downstream throughout the system. This paper uses system dynamics modeling to analyze the replenishment of raw materials where there is randomness in availability and reliability and their effects on the delivery lead time of the fleet. The model obtained is much simpler but more robust when compared to the analytical-mathematical model or the discrete-events simulation. Tests on the model show that the model can behave as it should logically. Several experiments were conducted to see how fleet availability's reliability can affect the delay in receiving or delivery lead time. One interesting thing revealed is that reliability does not have to be 100%, but there is a certain minimum threshold for the system to perform well. This is different from availability, which must be 100%

    Post Acceptance Model for Online Teleconsultation services: An Empirical Study in Malaysia

    Get PDF
    open access journalMost nations across the world are actively pursuing equal access to healthcare services. Teleconsultation technology is a substantial improvement in terms of an effective framework for the provision of healthcare services. However, a lack of understanding of people’s willingness towards the use of this technology has been observed. The goal of this study is to investigate the factors affecting the post-acceptance of teleconsultation services in Malaysia. This study developed a theoretical model which involves the combination of the second generation of Unified Theory of Acceptance and Use of Technology (UTAUT2) and Expectation Confirmation Theory (ECT), with the inclusion of several other constructs. An online survey was used to collect data from 154 university students and partial least squares (PLS) approach was used for data analysis. The research findings indicate that confirmation, performance, effort expectancy, usefulness, and satisfaction were the key factors that affect the post-acceptance of teleconsultation services. Furthermore, actual use, ease of use, technology readiness, and facilitating conditions did not impact participants' post intention in the continuous usage of teleconsultation facilities

    Conceptual Model for Automating GDPR Compliance Verification Using Natural Language Approach

    No full text
    Most mobile apps require regular access to sensitive personal information. Regulators are increasingly demanding mobile app makers disclose privacy policies that detail what users’ data is gathered and used. Compliance with data privacy and protection regulations must be monitored to reduce legal penalties that may come from unexpected data breaches. Checking and verifying The General Data Protection Regulation (GDPR) Compliance is quite a challenging issue. In this paper, we propose, an extension to be added to the automated GDPR compliance verification tool. This extension shows how the questions about the compliance of mobile applications might be answered based on GDPR standards. The implementation phases of the extension are explained. It includes query processing, document retrieval, passage retrieval, and answer extraction. This paper provides mobile application developers with a better technique of how to monitor users' compliance with mobile application privacy policies

    Cybersecurity Risk Assessment Approach for Malaysian Organizations: Malaysian Universities as Case Study

    No full text
    Malaysian organizations are following different methods for cybersecurity risk assessment such as Control Objectives for Information and Related Technologies (COBIT) and International Organization for Standardization (ISO) 27001. The higher education institutions in Malaysia are facing the same difficulties as different standards and approaches are used to evaluate the cybersecurity risk of their institutions. So, there is a lack of a cybersecurity risk assessment approach that takes Malaysian and international standards into consideration. This paper aims to develop a cybersecurity risk assessment approach for higher education institutions in Malaysia. The methodology of conducting this research is qualitative research using a case study. The framework has considered international cybersecurity standards such as the Holistic cybersecurity maturity assessment framework (HCYMAF) and local cybersecurity standards such as National Cyber Security Agency (NACSA) and the Malaysia Cyber Security Strategy (MCSS). In addition, a measurable instrument to assess cybersecurity risk has been proposed. The subject-matter expert can apply this approach to assess their organization's cybersecurity maturity and risk. The findings of this study shall be useful in overcoming the drawbacks of employing non-standard procedures in such evaluations, resulting in more accurate and reliable evaluation outcomes

    System dynamic analysis of the fleet availability and reliability influence on the lead time of the delivery order process

    No full text
    The inventory replenishment process in the warehouse becomes difficult if there is uncertainty. It can cause warehouse performance not to be as expected. The warehouse is an important part of the supply chain subsystem, which smooths the flow of goods from upstream to downstream throughout the system. This paper uses system dynamics modeling to analyze the replenishment of raw materials where there is randomness in availability and reliability and their effects on the delivery lead time of the fleet
    corecore