Claim Missing Document
Check
Articles

Found 5 Documents
Search

The Performance of Boolean Retrieval and Vector Space Model in Textual Information Retrieval Yulianto, Budi; Budiharto, Widodo; Kartowisastro, Iman Herwidiana
CommIT (Communication and Information Technology) Journal Vol 11, No 1 (2017): CommIT Vol. 11 No. 1 Tahun 2017
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v11i1.2108

Abstract

Boolean Retrieval (BR) and Vector Space Model (VSM) are very popular methods in information retrieval for creating an inverted index and querying terms. BR method searches the exact results of the textual information retrieval without ranking the results. VSM method searches and ranks the results. This study empirically compares the two methods. The research utilizes a sample of the corpus data obtained from Reuters. The experimental results show that the required times to produce an inverted index by the two methods are nearly the same. However, a difference exists on the querying index. The results also show that the numberof generated indexes, the sizes of the generated files, and the duration of reading and searching an index are proportional with the file number in the corpus and thefile size.
Sistem Kontrol Akses Berbasis Real Time Face Recognition dan Gender Information Nurmala, Putri; Gazali, Wikaria; Budiharto, Widodo
ComTech: Computer, Mathematics and Engineering Applications Vol 6, No 2 (2015): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v6i2.2264

Abstract

Face recognition and gender information is a computer application for automatically identifying or verifying a person's face from a camera to capture a person's face. It is usually used in access control systemsand it can be compared to other biometrics such as finger print identification system or iris. Many of face recognition algorithms have been developed in recent years. Face recognition system and gender information inthis system based on the Principal Component Analysis method (PCA). Computational method has a simple and fast compared with the use of the method requires a lot of learning, such as artificial neural network. In thisaccess control system, relay used and Arduino controller. In this essay focuses on face recognition and gender - based information in real time using the method of Principal Component Analysis ( PCA ). The result achievedfrom the application design is the identification of a person’s face with gender using PCA. The results achieved by the application is face recognition system using PCA can obtain good results the 85 % success rate in face recognition with face images that have been tested by a few people and a fairly high degree of accuracy.
Implementasi dan Evaluasi Penerapan Globus Toolkit untuk Aplikasi Grid Computing Budiharto, Widodo
ComTech: Computer, Mathematics and Engineering Applications Vol 3, No 1 (2012): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v3i1.2469

Abstract

Grid computing is a distributed computing technology that utilizes resources connected through a free computer network, yet coordinated with a specific mechanism. The development of grid computing infrastructure is not easy because it takes skill and experience in the installation and configuration of both Linux-based and open source program. In this study, the author built a grid computing infrastructure based on Debian 4, and used Globus Toolkit 4.1.2 on three computers. The WSRF technology was tried to run as an indication that the grid infrastructure has been successfully built. Based on some experiments in this study, grid computing can run well on the three computers with a user interface of web-based grid system using the UCLA Grid Portal. Overall the system runs fine, but it requires high experiences and comprehensions upon the Linux operating systems as well as computer networks in the installation process.
Online Training for Face Recognition System Using Improved PCA Budiharto, Widodo
ComTech: Computer, Mathematics and Engineering Applications Vol 2, No 2 (2011): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v2i2.2952

Abstract

The variation in illumination is one of the main challenging problem for face recognition. It has been proven that in face recognition, differences caused by illumination variations are more significant than differences between individuals. Recognizing face reliably across changes in pose and illumination using PCA has proved to be a much harder problem because eigenfaces method comparing the intensity of the pixel. To solve this problem, this research proposes an online face recognition system using improved PCA for a service robot in indoor environment based on stereo vision. Tested images are improved by generating random values for varying the intensity of face images. A program for online training is also developed where the tested images are captured real-time from camera. Varying illumination in tested images will increase the accuracy using ITS face database which its accuracy is 95.5 %, higher than ATT face database?s as 95.4% and Indian face database?s as 72%. The results from this experiment are still evaluated to be improved in the future.
Dispute on Security Framework Model of MFCC Mixed Methods in Speech Recognition System  Pratiwi, Heni Ispur; Kartowisastro, Iman Herwidiana; Soewito, Benfano; Budiharto, Widodo
Journal of Applied Data Sciences Vol 6, No 3: September 2025
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v6i3.689

Abstract

An audio recording system device has unprecedented activities of its authorized users which in a particular way cause vulnerability to the system. It starts to get into a fuzzy condition and deteriorate the system sensitivity in detecting unauthorized access to pass through, then the system inclination may occur. One case is when separate users picked speech voices with similar keywords to set their usernames or password. Moreover, when users are siblings or twins that could have merely similar voices.  Troublesome of this situation leads to a less sensitive manner of a security system, and in some situations, the system could operate blocking authorized users themselves to get access. This paper defines a proposed method to resolve the situation by combining Mel Frequency Cepstral Coefficient with other methodologies, which have been implemented for many other research’ specific objectives as well. This paper displays to prove its combination with an interval scoring in Fuzzy Relation complements a resolution to tackle the security of fuzzy issues mentioned. The Mel Scale has its capacity of delivering extractions output from audio input data, it is called as spectral centroids which refer to humans’ voices or an individual's voice features. Some spectral centroids get merely similar results due to those inclinations mentioned. This paper exposes Fuzzy Relation method to fit the need of verification procedures thorough its interval scale on any fuzzy features. The objective of verification procedure is to gain consistency measured scales, and security warrant remains valid. The inhouse experiments served to give user A of [0.49, 1.18] interval, user B of [0.76,1.07] interval, and user C of [0.44,0.95] interval, and those interval numbers are proposed to cap other login users accounts unto theirs.