8 research outputs found

    Quality Translation Enhancement Using Sequence Knowledge and Pruning in Statistical Machine Translation

    Get PDF
    Machine translation has two important parts, a learning process which followed by a translation process. Unfortunately, most of the translation process requires complex operations and in-depth knowledge of the languages in order to give a good quality translation. This study proposes a better approach, which does not require in-depth knowledge of the linguistic properties of the languages, but it produces a good quality translation. This study evaluated 28 different parameters in IRSTLM language modeling, which resulting 270 millions experiments, and proposes a sequence evaluation mechanism based on a maximum evaluation of each parameter in producing a good quality translation based on NIST and BLEU. The parallel corpus and statistical machine learning for English and Bahasa Indonesia were used in this study. The pruning process, user interface, and the personalization of translation have a very important role in implementing of this machine translation. The result is quite promising. It shows that pruning process increases of the translation process time. The particular sequence knowledge/value parameter in translation process has a better performance than the other method using in-depth linguistic knowledge approaches. All these processes, including the process of parsing from a stand-alone mode to an online mode, are also discussed in detail

    TOWARD THE RECOGNITION OF USER ACTIVITY BASED ON USER LOCATION IN UBIQUITOUS COMPUTING ENVIRONMENTS

    No full text
    Human Activity is not a well defined concept in Ubiquitous Computing discipline because human activity is very complex and the computer environment is very limited in capturing user activity. However, user activity is an essential ingredient for the determination of appropriate response from Intelligent Environment in order to provide appropriate services with or without explicit commands. This paper describes an approach to the determination and recognition of user activity based on user location. The characterisation of user activities can be deduced from sensor activities based on the scalable distribution of context location information. This approach does not require users to label their activities

    Framework for Domain Name System Security Extensions (DNSSEC) to support the IPv6 infrastructure

    Get PDF
    The major problem in DNS as originally specified in RFC 1035 is that it does not offer any form of security and it is vulnerable to spoofing, man-in-the-middle and cache poisoning attacks. This kind of attacks can compromise all communications to the host that initiate any connection that requires address translation. The threats from a certain attack on DNS are common and although several tools or devices have been introduced, it still needs to have a better solution in overcoming the issues. At the same time, there are several factors that preventing a widespread implementation of the DNSSEC, such as security testing, performance evaluation and used functionality testing. This paper proposed a framework and an implementation of DNSSEC on IPv6 environment based on the specifications for iDNSSEC on RFC 4033, 4044 and 4055. This implementation of the DNSSEC framework on IPv6 environment provides origin authentication of DNS data, data integrity, and authenticated denial of existence to protect the internet infrastructure further from malicious attacks. The prototype functionality and security testing and the performance evaluation are also presented in this paper

    User-centered web development for GMI alumni website

    No full text
    Internet has become an influential tool to the society nowadays. In addition, the World Wide Web (WWW)technology is an appropriate partner with the internet that brings pleasant facility in order to facilitate people's daily lives. However, recent situation is changing whereby the primary concern is more on developing usable website to ensure user's satisfaction. Several researches have built website or product by employing user-centered design process to ascertain that it meets users' needs. Some of the studies also attempted in evaluating the end-product with the purpose to observe the usability. Common process in user-centered design methodology consists of requirements gathering, needs assessment, design for solution and usability assessment. This is an iterative process until the end-user satisfies with the developed product. In this study, a framework is proposed to be applied in redesigning usable GMI alumni website. Second objective of this research is to gain feedback from client and users for the purpose of web usability evaluation by using fuzzy conjoint analysis

    Teachers' perspectives and practices in applying technology to enhance learning in the classroom

    No full text
    Over the past decade, teachers are becoming more familiar with the use of Information Communication Technology (ICT) in the classrooms. Many studies have shown the benefits of using ICT in classrooms. However, there are evidence that the ICT reform efforts have failed because the teacher's beliefs, skills, and attitudes were never taken into consideration. Studies shows that most research only focuses on students' opinion towards ICT. Besides that, this study tries to investigate the teachers' perspectives and practices towards the use of ICT in the classrooms. A survey was conducted to collect the data. Using a revised expectancy- value theory called the Technology Implementation Questionnaire (TIQ), a questionnaire was administered to 20 elementary teachers from the public schools sector in Depok, West Java. The findings revealed that there are teachers with more than 10 years of teaching experience but never got any formal training on using ICT. Overall, the teachers have a positive perspective towards applying ICT in their classrooms, even though they lack of technical support from the schools and lack of ICT proficiency

    ANU-MIMO: A community wireless network infrastructure for remote populations

    No full text
    Large-scale, scalable, distributed, decentralised MIMO (SDD-MIMO) [1] can be deployed to extend existing broadband infrastructure to remote communities. The network complements existing back-haul networks by providing an omnidirectional broadband service to a large and scalable number of distant users distributed over a very large area. The Indonesian archipelago poses some challenging scenarios with its mountainous landscapes and some 18000 islands, often trans-oceanic and separated beyond horizon. In this paper, we propose SDD-MIMO as a solution for many of these difficult scenarios and present simulations for two representative examples.The authors would like to acknowledge the financial support of the Research School of Physics and Engineering at the Australian National University and the hospitality of the organisers of the ICCED conference

    DESIGN AND OPERATION OF FACE MILLING CUTTERS WITH BODY FITTED WITH DAMPING RINGS MADE OF COMPOSITE MATERIAL

    No full text
    A mathematical model describing the process of a strength analysis of a combination body of the milling has been developed with the use of experimental data on the physical and mechanical characteristics of the offered high-damping composite materials; the dynamic and operational characteristics of the milling cutter developed have been determined. The roughness of the machined surfaces has been decreased by 16 to 38%, the capacity of semi-finish and finish face milling has been increased. The milling cutter has been introduced at "Splav" State Scientific-Production Plant (Tula)Available from VNTIC / VNTIC - Scientific & Technical Information Centre of RussiaSIGLERURussian Federatio
    corecore