39 research outputs found

    Word Sequential Using Deep LSTM And Matrix Factorization To Handle Rating Sparse Data For E-Commerce Recommender System

    Get PDF
    Recommender systems are essential engines to deliver product recommendations for e-commerce businesses. Successful adoption of recommender systems could significantly influence the growth of marketing targets. Collaborative filtering is a type of recommender system model that uses customers' activities in the past, such as ratings. Unfortunately, the number of ratings collected from customers is sparse, amounting to less than 4%. The latent factor model is a kind of collaborative filtering that involves matrix factorization to generate rating predictions. However, using only matrix factorization would result in an inaccurate recommendation. Several models include product review documents to increase the effectiveness of their rating prediction. Most of them use methods such as TF-IDF and LDA to interpret product review documents. However, traditional models such as LDA and TF-IDF face some shortcomings, in that they show a less contextual understanding of the document. This research integrated matrix factorization and novel models to interpret and understand product review documents using LSTM and word embedding. According to the experiment report, this model significantly outperformed the traditional latent factor model by more than 16% on an average and achieved 1% on an average based on RMSE evaluation metrics, compared to the previous best performance. Contextual insight of the product review document is an important aspect to improve performance in a sparse rating matrix. In the future work, generating contextual insight using bidirectional word sequential is required to increase the performance of e-commerce recommender systems with sparse data issues

    Creating SME’s Business Aplication Using Microsoft Office 2007

    Get PDF
    1. Pengenalan Microsoft Office 2007 mengandungi 5 program utama: • Word; digunakan untuk mengatur dan mengendalikan perkataan, ayat dan perenggan. • Excel; digunakan untuk mengatur dan mengendalikan angka. • PowerPoint; digunakan untuk mengatur dan mengendalikan teks dan gambar untuk membuat pameran slaid. • Access; digunakan untuk mengatur dan mengendalikan data. • Outlook; digunakan untuk mengatur maklumat peribadi, seperti alamat e-mel dan nombor telefon. Walaupun setiap program Office 2007 digunakan untuk mengendalikan jenis-jenis data yang berlainan, tetapi secara keseluruhannya, kaedah pengendalian program tersebut adalah hampir sama. Pada awalnya kita dikehendaki untuk memasukkan data ke dalam program Office 2007 sama ada dengan cara menaip menggunakan papan kekunci atau memuatkan data daripada fail yang lain. Seterusnya, kita haruslah memberitahu program cara-cara untuk memanupulasikan data. Akhir sekali, kita dikehendaki untuk menyimpan data dalam bentuk fail. Seluruh program office 2007 mempunyai jenis perintah (command) yang hampir serupa. Oleh itu menggunakan perisian ini adalah amat mudah

    Classification Techniques In Blood Donors Sector – A Survey

    Get PDF
    This paper focuses on the classification and the recent trends associated with it. It presents a survey of the classification system and clarifies how classification and data mining are related both to each other. Classification is arranging the blood donor dataset into the predefined group and helpful to predict group membership for data instances. This enables users to search target donors become easier because the blood stocks always required replacing expired stocks after a certain period and useful in emergency demands such as surgery and blood transfusion. This paper has also sought to identify the research area in classification to fulfill gaps where further work can be carried on

    BERT based named entity recognition for automated hadith narrator identification

    Get PDF
    Hadith serves as a second source of Islamic law for Muslims worldwide, especially in Indonesia, which has the world's most significant Muslim population of 228.68 million people. However, not all Hadith texts have been certified and approved for use, and several falsified Hadiths make it challenging to distinguish between authentic and fabricated Hadiths. In terms of Hadith science, determining the authenticity of a Hadith can be accomplished by examining its Sanad and Matn. Sanad is an essential aspect of the Hadith because it indicates the chain of the Narrator who transmits the Hadith. The research reported in this paper provides an advanced Natural Language Processing (NLP) technique for identifying and authenticating the Narrator of Hadith as a part of Sanad, utilizing Named Entity Recognition (NER) to address the necessity of authenticating the Hadith. The NER technique described in the research adds an extra feed-forward classifier to the last layer of the pre-trained BERT model. In the testing process using Cahya/bert-base-indonesian-1.5G, the proposed solution received an overall F1-score of 99.63 percent. On the Hadith Narrator Identification using other Hadith passages, the final examination yielded a 98.27 percent F1-score

    Enhancing Solutions Of Capacity Vehicle Routing Problem Based On An Improvement Ant Colony System Algorithm

    Get PDF
    The Vehicle Routing Problem (VRP) is a famous routing issue and combinatorial optimization problem. It serves an important task in logistics and supply procession administration appropriate toward its wide applications in transport, product delivery, and services. VRP is one of the major important issues have no perfect solutions yet. Several authors over the last only some decades have recognized many types of research and used several algorithms with various methods to solve it. In this work the problem of the VRP work is described as follows: the vehicles which are used for transportation products toward instance place. Each vehicle begins from a major area at various times every day. The capacitated vehicle routing problem (CVRP) is described as toward service a set of delivery customers by means of well-known demands, the aim of CVRP is toward giving every vehicle with a series of delivers so with the purpose of each and every one of customers are serviced, and the cost of traveling for vehicles are decreased. The paper aims to discover an optimal route for VRP by using Improvement Ant Colony System Algorithm (IACS). Optimal routes are founded based on to decrease the distance and the time for each and every one route which directs to quickest the moving of customers to their locations, also based on developing the CVRP model for optimizing the routing issues. The IACS method has been mostly considered recently for handling several combinatorial optimization issues. In this paper, the IACS has been introduced for solving the CVRP. A wide numerical experiment has been performed on benchmark issues available in recent work. The results have been shown the IACS algorithm is better when compared to conventional metaheuristic methods for handling CVRP

    Dance Gesture Recognition Using Space Component And Effort Component Of Laban Movement Analysis

    Get PDF
    Dance is a collection of gestures that have many meanings. Dance is a culture that is owned by every country whose every movement has beauty or meaning contained in the dance movement. One obstacle in the development of dance is to recognize dance moves. In the process of recognizing dance movements one of them is information technology by recording motion data using the Kinect sensor, where the results of the recording will produce a motion data format with the Biovision Hierarchy (BVH) file format. BVH motion data have position compositions (x, y, z). The results of the existing dance motion record will be extracted features using Laban Movement Analysis (LMA), where the LMA has four main components namely Body, Shape, Space, and Effort. After extracting the features, quantization, normalization, and classification will be performed. Using Hidden Markov Model (HMM). In this study using two LMA components, namely Space and Effort in extracting features in motion recognition patterns. From the results of the test and the resulting accuracy is approaching 99% for dance motion data

    A Localised Cloud Detection and Masking Method Using Spectral Analysis

    Get PDF
    In satellite remote sensing, cloud blocks surface or near surface information. The aim of this study is to investigate the spectral properties of cloud and to carry out cloud detection and masking over Malaysia based on spectral analysis. A cloud detection and masking method tuned to tropical conditions have been developed based on spectral of MODIS (Moderate Resolution Imaging Spectroradiometer) data. Thresholds were applied to three sets of spectral measurements, i.e. reflective bands, thermal bands and brightness temperature difference of thermal bands. The results show that the method was able to detect clouds over Malaysia effectively

    Temporal Changes in Urban Green Space based on Normalized Difference Vegetation Index

    Get PDF
    This study identifies land use changes in the metropolitan region of Klang-Langat Valley focusing on urban sprawl and green space. A technique called Normalized Difference Vegetation Index (NDVI) is used to quantify temporal urban green space dynamics. All districts in the valley recorded a marked increase in urban area, but decreased in agriculture and forest areas. Result of vegetation index analysis showed that NDVI increases for water body, bare soil, and built-up area category for as much as 16.98% from 1998 to 2001, but during the same period vegetation experience a decrease of 22.25%

    Information And Communication Technology (ICT) Procurement Process: Knowledge Gaps In The Pre-Tender Process

    Get PDF
    Analyses of unsuccessful purchases of ICT systems, from challenged implementations are contributed to multiple parties in the equation—the groups in government agencies and the private vendors, inevitably view this process from their respective angles and perspectives. The government as a contractor seeks to hire the most effective vendor that a given budget will allow, while the vendor seeks to secure the best price possible for the delivered services. The vendor will be versed in technical concepts and lingo that may not be clear to a governmental agency negotiating a contract. Likewise, the agency groups in this setting would likely not have knowledge of ICT technical procedures and concepts that might be equally new to certain groups within the agencies. As a result, the gap in the field of knowledge within these groups are discovered and can be understood as a vital component in these procedures, but one that is frequently beset by multiple potential barriers. This study discloses that ICT vendors’ participation in pre-tender planning phases would unravel the inadequacy of most business and technical reports and provide accurate assessments of organizational adequate needs. Hence, significantly reducing challenged ICT implementations

    Internet Of Things Architecture:Current Challenges And Future Direction Of Research

    Get PDF
    The Internet of Things (IoT) is a new paradigm that can enable collecting and exchanging data that have never been attainable before.It able to communicate and report user’s information in a more secure way.The reports of Cisco analysts estimate that the IoT will have more than 50 billion of smart sensors and other smart devices or gadgets,all connecting and communicating real time data on the internet by 2020.This will provide deeper insights with data analytics using the IoT paradigm to establish new business,enhance productivity and efficiency,and develop innovative revenue streams.Furthermore,the IoT architecture may combine features and technologies suggested by various methodologies.Since,this architecture is designed where the digital and real worlds are integrating and interacting constantly,various technologies are merged together to form IoT,such as; sensing technologies,pervasive computing,ubiquitous computing,internet protocols,smart objects,embedded parts,etc.When a regular device utilizes intelligent agents,it becomes a smart object.In this way,it is not only used to gather the environment information or interact with the physical world,yet more than that,it must be interconnected with various network devices to exchange and communicate data over the internet. Therefore,the significant measure of available data which is produced by the immense number of interconnected devices will offer opportunities to generate information that will deliver significant benefits to the economy, environment,individuals,and society.In this paper,we present past,current,and future direction of IoT.This paper provides overview and clear examination of the IoT architecture paradigm with the description of its fundamental requirements along with the implementation challenges and future directions.Thus,it will open issues that will face the IoT by new world generation
    corecore