16 research outputs found

    Comparison Learning Model AIR and TAI Combined With Cognitive Conflict Strategy Againts Active Learning and Concept Understanding

    Get PDF
    Abstract:  There are several problems in the learning process of Basic Electricity and Electronics at SMK Negeri 8 Malang, including: (1) When learning takes place students do not pay attention and listen to the teacher when delivering material, (2) The teacher does not focus on learning activities to students, (3) Students are less active in asking and expressing his opinion about the material that has been taught. This study uses a variety of learning models and methods that can improve students' learning activeness and conceptual understanding, namely the Auditory, Intellectual, Repetition (AIR) learning model and the Team Assisted Individualization (TAI) learning model, each of which is combined with cognitive conflict strategies. The research design used a quasi experimental design with a non-equivalent control group design type. The data analysis technique consisted of normality test, homogeneity test, two mean similarity test, and hypothesis testing. The conclusion of this study is that the AIR learning model combined with cognitive conflict strategies is superior to the TAI learning model combined with cognitive conflict strategie

    Home Energy Security Prototype using Microcontroller Based on Fingerprint Sensor

    Get PDF
    The globalization era brings rapid development in technology.The human need for speed and easiness pushed them toinnovate, such as in the security field. Initially, the securitysystem was conducted manually and impractical compared tonowadays system. A security technology that is developed wasbiometric application, particularly fingerprint. Fingerprintbasedsecurity became a reliable enough system because of itsaccuracy level, safe, secure, and comfortable to be used ashousing security system identification. This research aimed todevelop a security system based on fingerprint biometric takenfrom previous researches by optimizing and upgrading theprevious weaknesses. This security system could be a solutionto a robbery that used Arduino UNO Atmega328P CH340 R3Board Micro USB port. The inputs were fingerprint sensor, 4x5keypad, and magnetic sensor, whereas the outputs were 12 Vsolenoid, 16x2 LCD, GSM SIM800L module, LED, andbuzzer. The advantage of this security system was its ability togive a danger sign in the form of noise when the systemdetected the wrong fingerprint or when it detects a forcedopening. The system would call the homeowner then. Otherthan that, this system notified the homeowner of all of theactivities through SMS so that it can be used as a long-distanceobservation. This system was completed with a push button toopen the door from the inside. The maximum fingerprints thatcould be stored were four users and one admin. The admin’sjob was to add/delete fingerprints, replace the home owner’sphone number, and change the system’s PIN. The resultsshowed that the fingerprint sensor read the prints in a relativelyfast time of 1.136 seconds. The average duration that wasneeded to send an SMS was 69 seconds while through call was3.2 seconds

    Journal Classification Using Cosine Similarity Method on Title and Abstract with Frequency-Based Stopword Removal 

    Get PDF
    Classification of economic journal articles has been done using the VSM (Vector Space Model) approach and the Cosine Similarity method. The results of previous studies are considered to be less optimal because Stopword Removal was carried out by using a dictionary of basic words (tuning). Therefore, the omitted words limited to only basic words. This study shows the improved performance accuracy of the Cosine Similarity method using frequency-based Stopword Removal. The reason is because the term with a certain frequency is assumed to be an insignificant word and will give less relevant results. Performance testing of the Cosine Similarity method that had been added to frequency-based Stopword Removal was done by using K-fold Cross Validation. The method performance produced accuracy value for 64.28%, precision for 64.76 %, and recall for 65.26%. The execution time after pre-processing was 0, 05033 second

    Penghapusan Kolom dan Baris Pertama pada Matriks Distance Untuk Optimasi Spell Checker Damerau-Levenshtein Distance

    Get PDF
    Damerau-Levenshtein Distance menentukan jarak atau jumlah minimum operasi yang dibutuhkan untuk mengubah satu string menjadi string lain, di mana operasi yang digunakan untuk menentukan tingkat kemiripian antar String adalah insertion, deletion, substitution dan transposition. Algoritma ini sendiri dapat juga digunakan untuk mengoreksi kesalahan kata. Namun, Algoritma Damerau-Levenshtein Distance mempunyai kelemahan, yaitu waktu pemrosesan yang lama. Pada perhitungan jarak antara dua string dengan algoritma Damerau-Levenshtein, setiap huruf dari kedua string akan dibandingkan dengan membuat matriks distance. Karena Kamus Bahasa Indonesia memiliki lebih dari 30.000 kata dasar, operasi perhitungan jarak akan dilakukan lebih dari 30.000 kali untuk setiap kesalahan. Penelitian ini mengusulkan peningkatan untuk mempersingkat waktu pemrosesan algoritma Damerau-Levenshtein dengan mengurangi baris dan kolom matriks distance. Hasil akhir yang diharapkan dari penelitian ini adalah waktu pemrosesan menjadi lebih cepat tanpa harus mengorbankan akurasi

    Generating Javanese Stopwords List using K-means Clustering Algorithm

    Get PDF
    Stopword removal necessary in Information Retrieval. It can remove frequently appeared and general words to reduce memory storage. The algorithm eliminates each word that is precisely the same as the word in the stopword list. However, generating the list could be time-consuming. The words in a specific language and domain must be collected and validated by specialists. This research aims to develop a new way to generate a stop word list using the K-means Clustering method. The proposed approach groups words based on their frequency. The confusion matrix calculates the difference between the findings with a valid stopword list created by a Javanese linguist. The accuracy of the proposed method is 78.28% (K=7). The result shows that the generation of Javanese stopword lists using a clustering method is reliable

    Opinion Analysis for Emotional Classification on Emoji Tweets using the NaĂŻve Bayes Algorithm

    Get PDF
    Opinion Analysis is a research study needed to social media, since the content could become a trending topic and has a significant impact on social life. One of the social media that have a big contribution to cyberspace and information development is Twitter. In the Twitter application, users can insert images that represent emotions, facial expressions, or icons. Emoji is a graphic symbol in the form of an image to express a thing, with the Emoji, a text can be read and understood according to its meaning because the image represents it. Of the several things that have been mentioned then, the researchers conducted research on the classification of tweet content based on the use of Emojis. This study aims to determine the emotional uses of Twitter in one period. Every tweet on the Twitter timeline, which contains both text and Emojis, will be classified according to several categories. The algorithm used was NaĂŻve Bayes. It calculated the probability of Emoji tweet to obtain the text classification with Emojis. The results of the classification of emotions are grouped with three categories, namely "angry," "joy," and "sad," it showed that the category "joy" had become the emotional trend of Twitter users where Emojis (x1f60a) dominate the most. Meanwhile, the accuracy of the algorithm used to reach 90% with a 70:30 holdout technique

    Stemming javanese affix words using nazief and adriani modifications

    Get PDF
    Stemming is the process of finding a basic word with several stages of affix removal. The main reason for stemming is to check spelling and machine translation and to support the effectiveness of the retrieval process. This study uses the Nazief and Adriani algorithm for stemming Javanese-influenced words. The first step taken is data collection and making a basic word dictionary. Then do the stemming process. Before stemming, modifications are made to the rules. The rules of the Nazief and Adriani algorithm, which are based on the morphology rules of the Indonesian language, are modified to suit the morphological rules of the Javanese language. Of the 366 words that were tested, it produced 351 correct basic words and 15 basic words that experienced errors. The results show that this algorithm can be used for stemming Javanese with an accuracy value of 95.9%

    Exploration of genetic network programming with two-stage reinforcement learning for mobile robot

    Get PDF
    This paper observes the exploration of Genetic Network Programming Two-Stage Reinforcement Learning for mobile robot navigation. The proposed method aims to observe its exploration when inexperienced environments used in the implementation. In order to deal with this situation, individuals are trained firstly in the training phase, that is, they learn the environment with ϵ-greedy policy and learning rate α parameters. Here, two cases are studied, i.e., case A for low exploration and case B for high exploration. In the implementation, the individuals implemented to get experience and learn a new environment on-line. Then, the performance of learning processes are observed due to the environmental changes
    corecore