Document details
8 of 22
Machine learning: Fisher fund classification using neural network and particle swarm optimization
(Conference Paper), ,
Master's Dept. of Information System, Diponegoro University, Semarang, Indonesia Department of Physics, Diponegoro University, Semarang, Indonesia
Department of Informatics, Diponegoro University, Semarang, Indonesia
Abstract
Assistance fishery can increase the income of fishermen and contribute to the country. Required classification awarding kind of help to improve the utilization of fund. In this research the ML to learn the features in a dataset of combinations Fishermen Card database and data Monitoring and Evaluation fisheries fund. ML process performed by NN MLP models combined with PSO with performance models such as Precision qualitative reached 0.75, sensitivity is reduced to 0.44, with the quantitative achievements reached 0.66 Accuracy and Error 0.34 with network model and small parameters. © 2018 IEEE.
SciVal Topic Prominence
Topic:
Prominence percentile: 98.158
Author keywords
Fishers Fund Classification Machine Learning Multilayer Perceptron Neural Network Particle Swarm Optimization
Indexed keywords
Engineering controlled terms:
Fisheries Learning systems Swarm intelligence
Engineering uncontrolled terms
Data monitoring MLP model Multi-layer perceptron neural networks Network modeling Neural network and particle swarm optimizations Performance Model
Engineering main heading:
Particle swarm optimization (PSO)
◅ Back to results ◅ Previous Next ▻
Export
Download
Print
E-mail
Save to PDF⋆
Add to List More...▻
View at Publisher
2018 International Conference on Information and Communications Technology, ICOIACT 2018 Volume 2018-January, 26 April 2018, Pages 315-320
1st International Conference on Information and Communications Technology, ICOIACT 2018;
Grand ZuriYogyakarta; Indonesia; 6 March 2018 through 7 March 2018; Category numberCFP18L86-ART; Code 136213
Tindi, A.P.a Gernowo, R.b Nurhayati, O.D.c
a b c
View references (16)
Forecasting | Finance | Scoring models
PlumX Metrics Usage, Captures, Mentions, Social Media and Citations beyond Scopus.
Metrics
Cited by 0 documents
Inform me when this document is cited in Scopus:
Related documents
, ,
(2019) 2019 IEEE International Conference on System, Computation, Automation and Networking, ICSCAN 2019
, ,
(2018) Proceedings of the International Conference on Inventive Communication and Computational Technologies, ICICCT 2018
, ,
(2017) Proceedings of the 29th Chinese Control and Decision Conference, CCDC 2017
❓ View all metrics ▻
Set citation alert ▻
▻ Set citation feed
Review of credit card fraud detection techniques Shah, V. Shah, P. Shetty, H.
Fall Detection System Using Artificial Neural Network Purushothaman, A. Vineetha, K.V. Kurup, D.G.
Discrimination and
compensation of abnormal values of magnetic flux leakage in oil pipeline based on BP neural network
Jiang, L. Liu, J. Zhang, H.
View all related documents based
Brought to you by Universitas Diponegoro
Search Sources Lists SciVal ↗ Create account Sign in
References (16)
Fishing, J.
Technical assistance facility fishing fishing at the directorate general of TA. 2016 (2016) The Ministry of Maritime Affairs and Fisheries
Fishing, L.Ka.S.
(2016) Report Distribution, Monitoring, and Evaluation Help Fishermen Fishing District Kepl. Sangihe 2016
Arnawa, I.K., Purnama, I.B., Mekse, G., Arisena, K.
Impact assistance facility fishing fishermen against increased revenue in gianyar bali province (2016) J. Manaj. Agribusiness IPB, 4 (1), pp. 47-55.
Pakpahan, H.T., Lumintang, R., Susanto, D.
The relationship between work motivation and behavior of fishermen in the fishery business (2006) J. Penyul. 2006 Inst. Pertan. Bogor, 2 (1), pp. 26-34.
Rasmussen, Williams
(2006) Gaussian Processes for Machine Learning, 14 (2), pp. 69-106. .
Chandiok, A., Chaturvedi, D.K.
(2015) 2015 IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions, WCI 2015, art. no. 7495529. .
ISBN: 978-146738215-1 doi: 10.1109/WCI.2015.7495529
Wang, L., Chen, Y., Zhao, Y., Meng, Q., Zhang, Y.
(2016) Proceedings - 2016 8th International Conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2016, 1, art. no. 7783661, pp. 497-500. .
ISBN: 978-150900768-4 doi: 10.1109/IHMSC.2016.165 ISBN: 978-153860954-5
Source Type: Conference Proceeding Original language: English
DOI: 10.1109/ICOIACT.2018.8350787 Document Type: Conference Paper Sponsors: GIT Solution,Time Excelindo
Publisher: Institute of Electrical and Electronics Engineers Inc.
▻ View in search results format All Export
Print
E-mail
Save to PDF Create bibliography1
2
3
4
5
Cited 185 times
6
Machine learning techniques for cognitive decision making
Cited 2 times
View at Publisher
7
Credit management based on improved BP neural network
Cited 4 times
View at Publisher
Find more related documents in Scopus based on:
▻
Authors Keywords ▻
Akhtar, M., Hannan, M.A., Basri, H.
(2015) 2015 IEEE International Conference on Smart Instrumentation, Measurement and Applications, ICSIMA 2015, art. no. 7559025. .
ISBN: 978-146737255-8
doi: 10.1109/ICSIMA.2015.7559025
Hajare, P.R., Bawane, N.G.
Feed forward neural network optimization by particle swarm intelligence (2015) 2015 7th Int. Conf. Emerg. Trends Eng. Technol. © 2015 IEEE
Yaram, S.
(2016) Proceedings of the 2016 International Conference on Data Science and Engineering, ICDSE 2016, art.
no. 7823950. .
ISBN: 978-150901280-0
doi: 10.1109/ICDSE.2016.7823950
Harrou, F., Zerrouki, N., Sun, Y., Houacine, A.
(2016) Proceedings of 2016 8th International Conference on Modelling, Identification and Control, ICMIC 2016, art. no. 7804269, pp. 1060-1064. .
ISBN: 978-095671576-0
doi: 10.1109/ICMIC.2016.7804269
Dadula, C.P., Dadios, E.P.
(2015) 8th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management, HNICEM 2015, art. no. 7393221.
.
ISBN: 978-150900359-4
doi: 10.1109/HNICEM.2015.7393221
Ghobadi, F., Rohani, M.
Cost-sensitive modeling of credit card fraud using neural network strategy (2016) IEEE 2016 ICSPIS, pp. 8-10. .
8
Particle swarm optimization modeling for solid waste collection problem with constraints
Cited 4 times
View at Publisher
9
10
Machine learning algorithms for document clustering and fraud detection
Cited 8 times
View at Publisher
11
Statistical control chart and neural network classification for improving human fall detection
Cited 4 times
View at Publisher
12
Neural network classification for detecting abnormal events in a public transport vehicle
Cited 3 times
View at Publisher
13
Cited 2 times
8 of 22 Yamasaki, T., Honma, T., Aizawa, K.
(2017) Proceedings - 2017 IEEE 3rd International Conference on Multimedia Big Data, BigMM 2017, art. no.
7966719, pp. 70-73. .
ISBN: 978-150906549-3 doi: 10.1109/BigMM.2017.69
Alam, M.N., Das, B., Pant, V.
(2015) Electric Power Systems Research, 128, art. no. 4368, pp. 39-52. . doi: 10.1016/j.epsr.2015.06.018
Chhachhiya, D., Sharma, A., Gupta, M.
(2017) Proceedings of the 7th International Conference Confluence 2017 on Cloud Computing, Data Science and Engineering, art. no. 7943123, pp. 52-57. .
ISBN: 978-150903518-2
doi: 10.1109/CONFLUENCE.2017.7943123
© Copyright 2018 Elsevier B.V., All rights reserved.
14
Efficient Optimization of Convolutional Neural Networks Using Particle Swarm Optimization
Cited 12 times
View at Publisher
15
A comparative study of metaheuristic optimization approaches for directional overcurrent relays coordination
Cited 85 times
View at Publisher
16
Designing optimal architecture of neural network with particle swarm optimization techniques specifically for educational dataset
Cited 9 times
View at Publisher
◅ Back to results ◅ Previous Next ▻ Top of page
About Scopus
What is Scopus Content coverage Scopus blog Scopus API Privacy matters
Language
⽇本語に切り替える 切换到简体中文 切換到繁體中文 Русский язык
Customer Service
Help Contact us
Copyright © . All rights reserved. Scopus® is a registered trademark of Elsevier B.V.
We use cookies to help provide and enhance our service and tailor content. By continuing, you agree to the .
Terms and conditions ↗ Privacy policy ↗
↗ Elsevier B.V
use of cookies
16)41%6-21%/21*)4)1')211*240%6-21%1(20071-'%6-215")',12/2+:"622.3/%')
%4', -1$2+:%.%46%1(21)5-%
'%6%/2+170&)4 "
!
23:4-+,6 %1( )34-16 )40-55-21 &564%'6-1+ -5 3)40-66)( 9-6, '4)(-6 62 6,) 5274') -&4%4-)5 %4) 3)40-66)( 62 3,262'23: &):21( 6,) /-0-6 2* #! '23:4-+,6 /%9 *24 34-8%6) 75) 2* 3%64215 6,25) %46-'/)5 -1 6,-5 82/70) 6,%6 '%44: % '2() %6 6,) &26620 2* 6,) *-456 3%+) 3428-()( 6,) 3)4'23: *)) -1(-'%6)( -1 6,) '2() -5 3%-( 6,427+, 23:4-+,6 /)%4%1') )16)4 25)922( 4-8) %18)45 24 26,)4 '23:-1+ 4)34-16 24 4)37&/-'%6-21 3)40-55-21 94-6) 62 23:4-+,65%1%+)43)4%6-215)16)42)5%1)-5'%6%9%://4-+,654)5)48)(23:4-+,6; &:
&##*#/%#+!#,$+1#))'%#+1601#*0#!&+,),%602 '.2'1,20-)1$,/*$,/'++,31',+0&0)'"1&#$,2+"1',+$,/1&#
/-'"%/,41&,$1&#+$,/*1',+'+1&#$212/#'++,31',+&#-2/-,0#,$1 '01,-/,*,1#"'0!200',+
+"'+1#/!1',+*,+%!"#*'!0/#0#/!&#/0+"-/,$#00',+)0'+1&#$'#)",$'+$,/*1',++"1#!&+,),%'#0+1&'0
!,+$#/#+!#1&,/16-#01&14#%,1!*#$/,*012"#+1!"#*'+"%,3#/+*#+1#"##-)61&+(1&,/0
$,/1&#'/-/1'!'-1',++"&'%&!,+1/' 21',+'+1&'0!,+$#/#+!#
&#*#,$ --,/12+'1'#0+"&))#+%#0,++1#))'%#+1601#*0212/#++,31',+
 &#)",+/!& '+/+"2/',%6(/1+",+#0'
&'0!,+$#/#+!#-/,3'"#0+'+1#/+1',+)$,/2*$,/1&#-/#0#+11',++"0&,4!0#,$/#!#+1"3+!#0,+3/',20 0-#!10,$2 '.2'1,201#!&+,),%614'))/#$)#!11#,$1&#/1,$1&#*#1&,"0'+3,)3'+%1&#,/6)%,/'1&*+2*#/'!) 0'*2)1',+#//,/+"2+!#/1'+16+)60'0+",/+,3#)--)'!1',+,$+#4-/,!#00'+%1#!&+'.2#0'+#+%'+##/'+%0!'#+!#
+",1&#/"'0!'-)'+#0/#)1#"1,2 '.2'1,20!,*-21'+%+1&'0!,+$#/#+!#0#3#/)1,-'!0,+1�-#!'$'!1&#*#0$,/
'+1#+0'3#"'0!200',+0/#)0,-)++#"!!,/"'+%1,1&#/#0,$'+1#/#01
#4,2)")'(#1,#51#+",2/%/1'12"#1,1&##!&+'!)/,%/*,**'11##1&1&0 ##+/#3'#4#"1&#--#/0+"
!,+"2!1#"3#/6'+1#/#01'+%!,+$#/#+!#-/,%/*04#))01&#'+3'1#"+"-)#+/60-#(#/0
'+))64#4,2)")'(#1,1&+(1##/'+%!,**'11##*#* #/01&#!,+$#/#+!#!&'/*+1&#,/%+'7'+%!,**'11##1&#
12"#+1/+!&,$+'3#/0'10*'(,*,%6(/1+"1&#$'++!')02--,/1$/,*1&#!,+$#/#+!#0-,+0,/01&1
!,+"2!1#"1!!#00,$
&#"'1,/,$
#//6&62' ,4,+'3#/0'10*'(,*,%6(/1
28%261%,%2-%0-0 2-:)67-8-)/2-/%0%0%=7-% %0%=7-%
3,(%(0))%7-( 2-:)67-8-986%%0%=7-% %0%=7-%
%6,%2%(-0 278-898)3*2*361%8-32)',2303+= %/-78%2
3,()01=&(!%,%& 2-:)67-8-92977)-222%0%=7-% %0%=7-%
370-2%&(90%1-( 2-:)67-8-%0%=7-%%,%2+ %0%=7-%
3,%2-&9%/%6 2-:)67-8-%0%=7-%%,%2+ %0%=7-%
%43(,-6',%6.)) 77%12-:)67-8=-0',%6 2(-%
91%62-(- 2-:)67-8=3*1-/31#3+=%/%68% 2(32)7-%
-8)2(6%+6%;%0 %.-:%2(,-639(=3+-/- -7,;%:-(=%0%=%,34%0 2(-%
%:-(+9786-%;%2 7-%2-:)67-8= %-;%2
3,(,%-690/,;%2,1%( 2-:)67-8-92977)-222%0%=7-% %0%=7-%
%:),,1%(- 2-:)67-8=3*30)(3
%27336,1)( 278-898)3*2*361%8-32)',2303+= %/-78%2
(,1)( 2-:)67-8-%0%=7-%%,%2+ %0%=7-%
-',)0)0&%23 30=8)',2-'278-898)3*
3683 3689+%0
%&%0,%.- -+)6-%2)*)2')'%()1= -+)6
,%.-8,0- 300)+)3*2+-2))6-2+,)22%- 2(-%
&(90%,1%207);%6- 2-:)67-8-%0%=7-%%,%2+ %0%=7-%
2%7073&), #%6139/2-:)67-8= 36(%2
,%2-6-%81%283 2-:)67-8%71-/31#3+=%/%68% 2(32)7-%
%/9=%7%/% 3/=3)863430-8%22-:)67-8= %4%2
3-',-7%8%2- %2/%-2-:)67-8= %4%2
,1%(7,%6- %(.%,%(%2-:)67-8= 2(32)7-%
)(-%=9 %143)62%2-:)67-8= 2(32)7-%
>->90>->%2 2-:)67-8-)/2303+-%0%=7-% %0%=7-%
>6))2>1%2 2-:)67-8-986%%0%=7-% %0%=7-%
3,%1%(%(6% $%=)(2-:)67-8= 2-8)(6%&1-6%8)7
70-2%%,%691 2-:)67-8-%0%=7-%%&%, %0%=7-%
-2%=%/%-6%+- 2-:)67-8=3*92) 2(-%
989+92+%=94%8- (%=%2%2-:)67-8= 2(32)7-%
3&)68-9/+,%- 2-:)67-8=3*%'%9 %'%3
%.)2(6%344%2% 2-:)67-8=3*)<%7%8%22832-3
2(6%9(- 31498)6'-)2') 2(32)7-%
-2%3 %6&-2278-898)3*)',2303+=,)2>,)26%(9%8)
',330 ,-2%
0)77%2(63%66)+% 8%0=
%6-%,-%6%%7',)6% 8%0=
932+,)2 0)'86-'%02+-2))6-2+%#),2-:)67-8= %-;%2
%-,)2,)2 ")',2303+= %-;%2
,31%7,)2 -8=2-:)67-8=32(32 2-8)(-2+(316)%8
6-8%-2 )-)2,)2 7-94-2+2-:)67-8=3*'-)2')%2()',2303+= %-;%2
!-',-%2,98-1%7/90 -2+32+/9872-:)67-8=3*)',2303+=,32&96- ,%-0%2(
31)2-'3-932>3 )8;36/)%796)1)28%2(32-836-2+%40)7
8%0=
)28,-0/91%6 9&9622-:)67-8=
/,1%(%,0%2 2-:)67-8%71-/31#3+=%/%68% 2(32)7-%
6-78%%1%=%28- 2-:)67-8%71-/31#3+=%/%68% 2(32)7-%
2(6)%7);%0( !)7)%6',1& )61%2=
,1)(39-/ %0-*362-%278-898)3*)',2303+=
0&%29:)6(-)6 )286)%8-32%089()74%8-%0)7 6%2') 3,%1)(0;)/)-0 %'908=3*0)'8632-'2+-2))6-2+)239*-%2-:)67-8= +=48
)6(%62%;%2 2-:)67-8-%0%=7-%%,%2+ %0%=7-%
36-/38%2- )%',:-%8-32-1-8)( %4%2
,1%(%.%6 -2%97%28%6%2-:)67-8= 2(32)7-%
3(6-+3%0'@3 )',2-7',)2-:)67-8?8%-7)670%98)62 )61%2=
-%209-+-)66%6- 2-:)67-8=3*%61% 8%0=
,31%7%88%9(,30- 2-:)67-8%770%12(32)7-% 2(32)7-%
0-6)>%,%7)14396 2-:)67-8=3*440-)('-)2')%2()',2303+= 6%2
%>:%22(6)-,)36+,-9 30-8),2-'%2-:)67-8=3*9',%6)78 31%2-%
%:-)63>%0:)> 2-:)67-(%(-+9)0)62%2()>()0',) 4%-2 378%1**)2(-%1>%, 2-:)67-8-)/2-/%0%0%=7-%)0%/% %0%=7-%
=)32+.92%2 36)%2-:)67-8= 36)%
-,9-%2 2-:)67-8=3*-',-+%2
)2+%2792 2-:)67-8%7908-1)(-%97%28%6% 2(32)7-%
%2-/%47%6% 2-:)67-8=3*);398,!%0)7%8 9786%0-%
%6-&%&9 -0%2- 2(-%
7;%(-%7=-1371% 2-:)67-8%7-%9 2(32)7-%
9,)2+%; %0%=7-%
%1%28=3)2(6%28363 278-898)/2303+-)4909,34)1&)6 2(32)7-%
3&)683%6037)66)6%%6% %8-32%030=8)',2-'',330 '9%(36
322=-(%=%8 2-:)67-8%7#3+=%/%68% 2(32)7-%
%2-%0337,=%6 36)%2-:)67-8= 36)%
-%2+9%2+ $,).-%2+2-:)67-8=3*)',2303+= ,-2%
9690>>%88=71%-0 2-:)67-8-92977)-222%0%=7-% %0%=7-%
9690-71%71%-0 2-:)67-8-%0%=7-%)60-7 %0%=7-%
%1/91%6%+%2%8,%2 %2%/-%11%0300)+)3*687%2('-)2') 2(-%
6-,%28%-2 %-4962+-2))6-2+300)+))7)%6',)286) 2(-%
9,%11%()61%2
%1%09((-2 2-:)67-8-)/2-/%0%0%=7-%)0%/% %0%=7-%
692%2% )286)*36):)0341)28(:%2')(31498-2+ 2(-%
-%3-%2+ ,)-8=2-:)67-8=3*);#36/
%7%2%,8%2 2-:)67-8-%0%=7-%%,%2+ %0%=7-%
-8)7,%00) 2(-%
-637,-%1%&) -*92-:)67-8= %4%2
3/6%8-7%87-/%7 36;)+-%22-:)67-8=3*'-)2')%2()',2303+= 36;%=
3,%11%(,%0-0=)61%2= 70%1-'>%(2-:)67-8=,31)-26%2', 6%2
$%,))6,%2 )'896)6,%2%3362-:)67-8= *+,%2-78%2
%7%20-,%88%/ 278-898)3*2*361%8-32)',2303+= %/-78%2
6%:))2,)8,%:%8, %9%6(-%31192-8=300)+)
9/96337,-.- 3/=330=8)',2-'2-:)67-8= %4%2
-1-86-3739/3439037 2-:)67-8=3*%86%7 6))')
6-72%;%8-6-72%;%8- #3+=%/%68% 2(32)7-%
%/)7,91%6 %8-32%0278-898)3*)',2-'%0)%',)676%-2-2+
)7)%6', 2(-%
972%;-972%;- 2-:)67-8= 2(32)7-%
976-2-976-2- #3+=%/%68%2-:)67-8= 2(32)7-%
9&%+97%90%2%9791% 92%(%61%2-:)67-8= 2(32)7-%
61-2%;- %7%29((-22-:)67-8= 2(32)7-%
!)2,)/)32+ 2-:)67-8=3*%0%=% %0%=7-%
96=%(-4986%-%;%8-1)2% -2%97%28%6%2-:)67-8= 2(32)7-%
-2%;%8--2%;%8- 2-:)67-8%7(%=%2% 2(32)7-%
37-436-2'> 2-:)67-8=3*40-8 63%8-%
%:)037/38 ;%27)%2-:)67-8= 2-8)(-2+(316)%8 6-8%-2
1,%%9*-598,*- 2-:)67-8%7#3+=%/%68% 2(32)7-%
#37-%(79 !-(=%8%1%2-:)67-8= 2(32)7-%
%,(-2%,&33& 832=633/2-:)67-8=
962-%,19( 28)62%8-32%070%1-'2-:)67-8=%0%=7-% %0%=7-%
0-%5397- 2-:)67-8=3*)86% 36(%2
%6-1-2 3+36+6-'90896%02-:)67-8= 2(32)7-%
6-8%);-%6-=%1 2-:)67-8%72(32)7-% 2(32)7-%
%:-(%68-231)> %60372-:)67-8=3*%(6-( 4%-2
-8%0-=)>,9=): 2-:)67-8-%0%=7-%%,%2+ 2(32)7-%
-*8%,9((-2-*8%,9((-2 =-%,9%0%2-:)67-8= 2(32)7-%
#37,-,-63->3+9',- =97,92-:)67-8= %4%2
,1)(3&%7,7,)6 ,)2-:)67-8=3*9))270%2( 9786%0-%
%1%09(-23,%1%(#973* 2-:)67-8-)/2303+-%0%=7-% %0%=7-%
3>0-2%3,%1)( 2-:)67-8-%0%=7-%%,%2+ %0%=7-%
)=)(%,%2(3,%11%(-
$-%&%6- 6-.)2-:)67-8=3*178)6(%1 ,))8,)60%2(7
3,%1)(3,%6%1 -762-:)67-8=36'-)2')%2()',230+= +=48
3,(%*->3,(%77-2 2-:)67-8-%0%=7-%%,%2+ %0%=7-%
3,(%2-*3,(%10- 2-:)67-8-)/2303+- %0%=7-%
3,(->%13,1%(%,%6 2-:)67-8-%0%=7-%%,%2+ %0%=7-%
=%232(%0 2(-%2278-898)3*)',2303+=,%6%+496 2(-%
0%,-19&%6%/0- 2-:)67-8-%0%=7-%%,%2+ %0%=7-%
16-89/,)6.)) ',3303*0)'8632-'2+-2))6-2+ 2(-%
=-&6%,%-1 2-:)67-8-%-27%0%=7-% %0%=7-%
%7-19((-2 278-898)*362*3'311)7)%6', -2+%436)
763%7-6- 2-:)67-8=3*1-/31#3+=%/%68% 2(32)7-%
,%,%>-6 2-:)67-8=3*)7,%;%6 %/-78%2
3269()))8-734%/90 -2+32+/987278-898)3*)',2303+=%(/6%&%2+ ,%-0%2(
9+ 908-1)(-%2-:)67-8= %0%=7-%
3/!,=+ 908-1)(-%2-:)67-8= %0%=7-%
(76-+%(- 2-:)67-8-)/2303+-%0%=7-% %0%=7-%
9>)0-8%+%(-6%2 2-:)67-8-%0%=7-%)60-7 %0%=7-%
8797,-9231) =383278-898)3*)',2303+= %4%2
-8-7,.,% ,%2(-+%6,2-:)67-8=3,%0-92.%& 2(-%
0/)60->/%2 )0'9/2-:)67-8= 96/)=
)26=%0-8 )86%,6-78-%22-:)67-8= 2(32)7-%
%)=92%6/ ,92+2+2-:)67-8= 36)%
,%,6-0%6913 2-:)67-8-)/2-/%0%0%=7-%)0%/% 2(32)7-%
3%2)6(%2% )0/312-:)67-8= 2(32)7-%
-6%26))3//9096- ,6- -7,292+-2))6-2+300)+)*36!31)2 2(-%
6%&%,%6%2 %(%2%4%00)278-898)3*)',2303+=%2('-)2') 2(-%
)()6%19(=%2%28% 2-:)67-8-)/2-/%0%0%=7-%)0%/% %0%=7-%
2%2(6%7%( 36436%8-32 %4%2
6%7%22%:)2/%8)7%2 (,-=%1%%2300)+)3*2+-2))6-2+3796 2(-%
6-6-=%1&3(3 2-:)67-8%7%(.%,%(% 2(32)7-%
)>%9092+%2 2-:)67-8%7%(.%,%(% 2(32)7-%
%96-(,-962313 278-8983*)',2303+=)4909,34)1&)6 2(32)7-%
-0%974-8%7%6- 2-:)67-8%7#3+=%/%68% 2(32)7-%
#9%2732+-%3 8,032)278-898)3*)',2303+= 6)0%2(
%7-896)7,- 2-:)67-8=3*6%(*36( 2-8)(-2+(316)%8
6-8%-2
0-%*-)- 2-:)67-8=3*)',2303+==(2)= 9786%0-%
%62-%,-1 2-:)67-8-)/2-/%0%0%=7-%)0%/% %0%=7-%
)1%2891%6%8, %8%327908%2'=)6:-')7 2(-%
.-8)((= 3/-%
6-')2%908 278-898-2)7)0)'31)0)'319(%6-7 6%2')
%+97-28=%62% )4909,34)1&)6278-898)3*)',2303+= 2(32)7-%
-132-)86331%23 2-:)67-8=3*%430-)()6-'3 8%0=
#%28-971%;%8- )0/312-:)67-8= 2(32)7-%
39%6-%&-6-2 )7)%6',2' %4%2
%-=%2%-=3( ,32%)22-:)67-8= ,%-0%2(
1-%0%1%, )&)0%7%6)82-:)67-8= 2(32)7-%
%=%28%1%6/%6 -.%=% -88%0%278-898)3*)',2303+= 2(-%
-=%2%683%623 278-898)/2303+-)4909,34)1&)6 2(32)7-%
-8,-0)=7,%8,-=%2%6%=%2%2 -8=2-:)67-8=3*32(32 2-8)(-2+(316)%8 6-8%-2
-%2%;-86- 2(32)7-%
391=%)2 2-:)67-8=3*%0'988%30/%8% 2(-%
2-2(-8%)48-%6-2- 2-:)6-78%790%;%61%2 2(32)7-%
1)0)66%8 0+)6-%
!%;%2)8-%;%2 2-:)67-8%7)2(-(-/%22(32)7-% 2(32)7-%
6-)*)8=%283 2-:)67-8%7#3+=%/%68% 2(32)7-%
;%2)8=%;%2 %8=%!%'%2%,6-78-%22-:)67-8= 2(32)7-%
=%6-*%,%>0-2)=)(%(>-6 2-:)67-8-)/2303+-%0%=7-% %0%=7-%
*)26-%283*)26-%283 -2972-:)67-8= 2(32)7-%
(-8-,%61% 2+-2))6-2+300)+)3(,496 2(-%
9/90,%61% %.%78,%2)',2-'%02-:)67-8= 2(-%
)7,%.,%61%%2.%() 28)036436%8-32
%2++=9,-2 (:%2')(278-898)3*2(9786-%0)',2303+= %4%2 1%1,3*- 2-:)67-8%770%1)+)6-=%6-*-(%=%8900%,%/%68% 2(32)7-%
,%2%2.%=-2+, %2/9/2-:)67-8=3*36)-+289(-)7 36)%
)6--71363 2-:)67-8%71-/31#3+=%/%68% 2(32)7-%
,-2%32%+-6- =()6%&%( 2(-%
39&-2+32+ 1&6=-((0))632%98-'%02-:)67-8=
-'/,332+ 36)%(:%2')(278-898)3*'-)2')%2()',2303+= 36)%
#-)29 ,9)2-:)67-8= %-;%2
3)=9&% 2-:)67-8=3*8,)779148-32 ,-0-44-2)7
9(%61%;%29(%61%;%2 #3+=%/%68%2-:)67-8= 2(32)7-%
&&%9+%2(%-67%2+ -2%97%28%6%2-:)67-8= 2(32)7-%
%61%29/%623 )0/312-:)67-8= 2(32)7-%
2(-92=383 2-:)67-8%7#3+=%/%68% 2(32)7-%
-'396%28,% -2%97%28%6%2-:)67-8= 2(32)7-%
3:-2(96=%;%27,- 2-:)67-8=3*92)92) 2(-%
6-)797%283 =%6-*-(%=%8900%,%/%68% 2(32)7-%
9=%2839=%283 )0/312-:)67-8= 2(32)7-%
-63236-9>9/- -4432278-898)3*)',2303+= %4%2
%/9.-%',-&%2% 2-:)67-8=3*9/9- %4%2
6-2-:%7909%(-7)88= %/%8-=%2-:)67-8=300)+)3*2+-2))6-2+%2(
)',2303+= 2(-%
-632%3%/%,%7,- 9**)62-:)67-8= %4%2
97,-0,%0) 63(6-+9)7278-898)3*)',2303+= 2(-%
:%22%-138-97 %8=%!%'%2%,6-78-%22-:)67-8= 2(32)7-%
%(-%28%6-%81%(.% 2-:)67-8%7%(.%,%(% 2(32)7-%
-,%-0=%+923: %8-32%0)7)%6',2-:)67-8=37'3;3;)6
2+-2))6-2+ 977-%
9,%1%((%,%11%62+ 2-:)67-8-%0%=7-%%,%2+ %0%=7-%
7%/36%/- )-32-:)67-8= %4%2
((=!%,=9(-) 2-:)67-8= 2-8)(6%&1-6%8)7
92'363!%789;-&3;3 )0/312(32)7-% 2(32)7-%
90-%2!)&&)6 7%/%2-:)67-8= %4%2
)66=!%,=9!-&3;3 2-:)67-8%7#3+=%/%68% 2(32)7-%
/-!-'%/7323 2-:)67-8%7%(.%,%(% 2(32)7-%
)(=!-.%=% )0/312-:)67-8= 2(32)7-%
-2+2"9) 7-2+,9%2-:)67-8= ,-2%
!%697-%#%77-2 2-:)67-8-)/2-/%0%0%=7-%)0%/% %0%=7-%
),1)8/-*#%>-'- 78%2&90)',2-'%02-:)67-8= 96/)=
,%;))7%/#-2+8,%;36279/ -2+32+/9872-:)67-8=3*)',2303+=,32&96- ,%-0%2(
#9=%#3/3=%1% =3836)*)'896%02-:)67-8= %4%2
,%9#9)2 -2+%436)2-:)67-8=3*)',2303+=%2()7-+2 -2+%436)
3#92 )6-38!%882-:)67-8=%0%=7-% %0%=7-%
%9>-%,$%-29((-2 2-:)67-8-%0%=7-%%,%2+ %0%=7-%
/6%1$)/- 28)62%8-32%070%1-'2-:)67-8=%0%=7-% %0%=7-%
!)-;)2$,%2+ 278-898)3*-+,)6*361%2')31498-2+ -2+%436)
6-$90-%2% 92%2%0-.%+% 2(32)7-%
%*(%*!&%#&%(%&%%&($*!&%%&$$+%!*!&%) %&#&,
(###))!&%
(###))!&%
#?F5<<53DB931<<I)E>12<5"(!%81C5(896D5B1C54?>!6?B-21>4"93B?G1F5
@@<931D9?>C
!0-5$-4119->.5::?@5@A@1;2&1/4:;8;3E"$45:-5-A5A->.5::?@5@A@1;2
&1/4:;8;3E"$45:-
#5G<53DB931<<I)E>12<5B5AE5>3I6?B(81@54"93B?CDB9@%1D38BB1I21C54?>#!
51DEB9>7E1<1>4E1<51=
!0-5$-4119->.5::?@5@A@1;2&1/4:;8;3E"$45:-5-A5A->.5::?@5@A@1;2
&1/4:;8;3E"$45:-
"1>175=5>D?661E<DD?<5B1>351>4DB166933?>75CD9?>9>3<?E441D135>D5B
A9<4>1E91?;CA9':5B1>?5@E;2";>@?9;A@4':5@105:30;9>1-@>5@-5:
5C97>1>41>1<IC9C?66554213;3?>DB?<CICD5=
%45.85 5?-> '%%& '%%&"-75?@-:
'53?==5>41D9?>(ICD5=6?B%B?@5BDI(51B38*C9>7?>D5>D1C549<D5B9>7"5D8?4
&1??E-0>5E-481/@>;:5/:35:11>5:3";8E@1/4:5/:?@5@A@1;2%A>-.-E-:0;:1?5-C-:
%E->52";85@17:57817@>;:57- 131>5%A>-.-E-" %:0;:1?5-)5>-@9;7;+AC;:;
";85@17:57817@>;:57- 131>5%A>-.-E-:0;:1?5-%12>E-:FBE";85@17:57817@>;:57-
131>5%A>-.-E-" %:0;:1?5-
&E5BI<7?B9D8=$@D9=9J1D9?>G9D8)5=@)12<5?>=@<?I55%175C"?4E<5 >?G<5475
"1>175=5>D(ICD5=
->@;?7-:0-> '% &$':5B1>?5@E:0;:1?5-
?=29>543?>?=93=9CC9?>9C@1D38G9D8E293B9D5B9?>E>3D9?>?>C945B9>7+1B9?EC
%B935%5>1<DI13D?B*C9>7E3;??(51B38<7?B9D8=
A4-99-04-858:?@5@A@&17:;8;35%1<A8A4 ;<19.1>:0;:1?5-$;:E%1@;)5.;C;
:?@5@A@&17:;8;35%1<A8A4 ;<19.1>:0;:1?5-!:@;?1:;"1:-:3?-:3:?@5@A@&17:;8;35
%1<A8A4 ;<19.1>%A>-.-E-:0;:1?5-
"51CEB9>7)85&E1<9DI?6+1B9?EC+5BC9?>1>$2:53D$B95>D54(?6DG1B5*D9<9J9>7 "5DB93C
C-:5:-:@;%-:-@-4->9-':5B1>?5@E:0;:1?5-
(###))!&%
'%!%($&%,,&*'"()
(###))!&%
<1CC96931D9?>?65<<)I@5C>3ED5"I5<?94!5E;5=91"!?6""1>4"(E2DI@5C ,9D8(E@@?BD+53D?B"1389>5<1CC9695B
:057-%1@5-C-:':5B1>?5@-?-06-4-0-:0;:1?5-3A?->6;7;':5B1>?5@-?-06-4 -0-:0;:1?5-&>5$-@:-:5:3?54':5B1>?5@-?-06-4-0-:0;:1?5-%A>E-:5 ':5B1>?5@E;2%1.18-?->1@:0;:1?5-)54->@;)54->@;':5B1>?5@-?%1.18-?->1@
:0;:1?5-%->:3-05"-83A:-05%1.18-?->1@':5B1>?5@E:0;:1?5-
>4?>5C91>)B16693(97>5D53D9?>1>4'53?7>9D9?>*C9>7?<?B1>4)5HDEB551DEB5HDB13D9?>
1>4(+"<1CC9695B
?:--AF5-$-49-4-8-:3%@-@1";8E@1/4:5/:0;:1?5--4E-$-49-0%@-@1
";8E@1/4:5/;2-8-:3:0;:1?5-$;?-?9->-%@-@1";8E@1/4:5/;2-8-:3:0;:1?5-
!516"?B@8?<?7931<51DEB5HDB13D9?>1C54?> #51B5CD#59782?B
A4-9-0->05':5B1>?5@-?5-: A?C-:@;>;:0;:1?5-A4-99-0 AA>5>0-A?
':5B1>?5@-?5-: A?C-:@;>;:0;:1?5--EA"A@>-"-9A:37-?':5B1>?5@-?5-:
A?C-:@;>;:0;:1?5-'?9-:%A05.E;':5B1>?5@-?5-: A?C-:@;>;:0;:1?5-4>5?@E
@57-%->55-: A?C-:@;>;':5B1>?5@E:0;:1?5-+-:5"->@5?@A@55-: A?C-:@;>;
':5B1>?5@E:0;:1?5-7;$-/49-C-:@;':5B1>?5@-?5-: A?C-:@;>;:0;:1?5- 1C'5<956=175>81>35=5>D
->5:-A85-?->5 -@5;:-8:?@5@A@1;2&1/4:;8;3E& -8-:3:0;:1?5-5>-!>5?-
-@5;:-8:?@5@A@1;2&1/4:;8;3E& -8-:3:0;:1?5-
>81>39>75>5B1<9DI?6"5D15EB9CD93<7?B9D8=CD8B?E7841@D9F5(5<53D9?>1>4 I2B949J1D9?>
-9-8,,-985':5B1>?5@5-8-E?5-"-4-:3-8-E?5-
>9=1D9?>$@@?BDE>9D95C?6>D5<<975>D"E<D9=5491(ICD5=C9>5F5<?@9>71B51D9F53?>?=I
%1B;
;4-99-0%AE-:@;':5B1>?5@-?!+;3E-7->@-:0;:1?5-1>>E)-4EA)5.;C;
':5B1>?5@-?!+;3E-7->@-:0;:1?5-
,9B5<5CC(5BF9351D%E2<93*>9F5BC9DI(EBF5I?6*C5BC%5B35@D9?>?>(53EB9DIC@53DC
>52$504;A.5?";85@17:57 131>510-::0;:1?5-1>>E-4>5F-8";85@17:57 131>5 10-::0;:1?5-A4->9-:A.5?&187;9':5B1>?5@E:0;:1?5--@59;4-9-0&-45>
':5B1>?5@5'@->--8-E?5-%/4;;8;2;9<A@5:3-8-E?5-
5?<?31D9?>%B5493D9?>9>(?391<"54911D1*C9>7)5HD>1<IC9C'5F95G
A4-99-0 A>+-?5>'@;9;':5B1>?5@-?-06-4-0-:0;:1?5-&13A44->-@-065 ':5B1>?5@-?-06-4-0-:0;:1?5-35>05E-:@;':5B1>?5@-?-06-4-0--/A8@E;2
:35:11>5:3:0;:1?5-
4/22/2020 IEEE Xplore - Conference Table of Contents
Institutional Sign In
IEEE.org IEEE Xplore Digital Library| |IEEE-SA|IEEE Spectrum|More Sites Cart Create Account| | Personal Sign In
Browse Conferences > Information and Communications... > 2018 International Conference ...
Information and Communications Technology (ICOIACT), International Conference on
Copy Persistent Link Browse Title List Sign up for Conference Alerts
Proceedings All Proceedings Popular
2018 International Conference on Information and Communications Technology (ICOIACT) DOI: 10.1109/ICOIACT41508.2018
Per Page: Per Page 50 Export Email Selected Results
Search within results | |
Showing 1-177 of 177
Filter sort: Sort Sequence | EmailRefine
Author
Affiliation
Conference
Location
Quick Links Search for Upcoming Conferences IEEE Publication Recommender IEEE Author Center Proceedings
The proceedings of this conference will be available for purchase through Curran Associates.
Information and Communications Technology (ICOIACT), 2018 International Conference on Print on Demand Purchase at Partner
[Copyright notice]
Publication Year: 2018, Page(s): 1 - 1
(44 Kb)
[Copyright notice]
2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Welcome to the 1st ICOIACT 2018 Publication Year: 2018, Page(s): 2 - 2
(44 Kb)
Welcome to the 1st ICOIACT 2018
2018 International Conference on Information and Communications Technology (ICOIACT)Year: 2018
Table of contents
Publication Year: 2018, Page(s): 3 - 20
(558 Kb)
Table of contents
2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Technical program committee Publication Year: 2018, Page(s): 21 - 25
(60 Kb)
Technical program committee
2018 International Conference on Information and Communications Technology (ICOIACT)
Quick Links
Search for Upcoming Conferences IEEE Publication Recommender IEEE Author Center
Proceedings
The proceedings of this conference will be available for purchase through Curran Associates.
Information and Communications Technology (ICOIACT), 2018 International Conference on Print on Demand Purchase at Partner
External Hard-drive Purchase at Partner
My Settings Get Help
Browse Subscribe
IEEE websites place cookies on your device to give you the best user experience. By using our websites,
you agree to the placement of these cookies. To learn more, read our Accept & Close Privacy Policy.
4/22/2020 IEEE Xplore - Conference Table of Contents Publication Year: 2018, Page(s): 56 - 61
Abstract (490 Kb)
Leaf morphological feature extraction based on K- Nearest Neighbor
Muhamad Hardi ; Muhammad Nuur Firdaus ; Bayu Putra Pamungkas ; Usman Sudibyo ; Christy Atika Sari ; Yani Parti Astuti ; Eko Hari Rachmawanto
2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Reduction of catastrophic forgetting for multilayer neural networks trained by no-prop algorithm
Motonobu Hattori ; Hideto Tsuboi
Publication Year: 2018, Page(s): 214 - 219
Abstract (1555 Kb)
Reduction of catastrophic forgetting for multilayer neural networks trained by no-prop algorithm
Motonobu Hattori ; Hideto Tsuboi2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Complex-valued support vector machines based on multi-valued neurons
Hokuto Shinoda ; Motonobu Hattori Publication Year: 2018, Page(s): 208 - 213
Abstract (157 Kb)
Complex-valued support vector machines based on multi-valued neurons
Hokuto Shinoda ; Motonobu Hattori
2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Pathloss modeling based on measurement at 3 Ghz for on body area network application
Kurnia Paranita Kartika ; Gamantyo Hendrantoro ; Achmad Mauludiyanto
Publication Year: 2018, Page(s): 905 - 910 Cited by: Papers (1)
Abstract (459 Kb)
Pathloss modeling based on measurement at 3 Ghz for on body area network application
Kurnia Paranita Kartika ; Gamantyo Hendrantoro ; Achmad Mauludiyanto
2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Multi document summarization for the Indonesian language based on latent dirichlet allocation and significance sentence Agus Widjanarko ; Retno Kusumaningrum ; Bayu Surarso Publication Year: 2018, Page(s): 520 - 524
Cited by: Papers (1)
Abstract (139 Kb)
Multi document summarization for the Indonesian language based on latent dirichlet allocation and significance sentence
IEEE websites place cookies on your device to give you the best user experience. By using our websites,
you agree to the placement of these cookies. To learn more, read our Accept & Close Privacy Policy.
4/22/2020 IEEE Xplore - Conference Table of Contents Mochammad Apriyadi Hadi Sirad ; Muhammad Rais ; Muhammad Ruswandi Djalal ; Andi Nur Putri
2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Model development of students' scholarship status at first asia institute of technology and humanities (Faith)
Jonalyn Joy B. Labayne ; Lester L. Mercado ; Jheanel Espiritu Estrada
Publication Year: 2018, Page(s): 152 - 157
Abstract (260 Kb)
Model development of students' scholarship status at first asia institute of technology and humanities (Faith)
Jonalyn Joy B. Labayne ; Lester L. Mercado ; Jheanel Espiritu Estrada2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Design of land optical fiber backbone communication network in North Sumatera
Yudiansyah ; Prita Dewi Mariyam ; Arie Pangesti Aji ; Novietasari Chisnariandini ; Catur Apriono
Publication Year: 2018, Page(s): 915 - 918 Cited by: Papers (2)
Abstract (197 Kb)
Design of land optical fiber backbone communication network in North Sumatera
Yudiansyah ; Prita Dewi Mariyam ; Arie Pangesti Aji ; Novietasari Chisnariandini ; Catur Apriono
2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
LINGO-based optimization problem of cloud computing of bandwidth consumption in the Internet
Indrawati ; Fitri Maya Puspita ; Sri Erlita ; Inosensius Nadeak ; Bella Arisha
Publication Year: 2018, Page(s): 436 - 441
Abstract (221 Kb)
LINGO-based optimization problem of cloud computing of bandwidth consumption in the Internet
Indrawati ; Fitri Maya Puspita ; Sri Erlita ; Inosensius Nadeak ; Bella Arisha2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
LINGO-based on robust counterpart open capacitated vehicle routing problem (RC-OCVRP) model of waste transportation in Palembang
Yusuf Hartono ; Fitri Maya Puspita ; Desi Indah Permatasari ; Bella Arisha
Publication Year: 2018, Page(s): 429 - 435
Abstract (235 Kb)
LINGO-based on robust counterpart open capacitated vehicle routing problem (RC-OCVRP) model of waste transportation in Palembang
IEEE websites place cookies on your device to give you the best user experience. By using our websites,
you agree to the placement of these cookies. To learn more, read our Accept & Close Privacy Policy.
4/22/2020 IEEE Xplore - Conference Table of Contents Yusuf Hartono ; Fitri Maya Puspita ; Desi Indah Permatasari ; Bella Arisha
2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Failover mechanism during upgrading process for software- defined networking
Siew-Hoon Lim ; Yung-Wey Chong ; Qi-Guan Ng ; Khong-Lim Yap Publication Year: 2018, Page(s): 591 - 596
Abstract (330 Kb)
Failover mechanism during upgrading process for software-defined networking
Siew-Hoon Lim ; Yung-Wey Chong ; Qi-Guan Ng ; Khong-Lim Yap 2018 International Conference on Information and
Communications Technology (ICOIACT) Year: 2018
Civil servant behaviors performance evaluation: Combining DEAHP and 360-degree feedback
Irfani Zuhrufillah ; Farikhin ; Rizal Isnanto Publication Year: 2018, Page(s): 280 - 285
Abstract (811 Kb)
Civil servant behaviors performance evaluation:
Combining DEAHP and 360-degree feedback
Irfani Zuhrufillah ; Farikhin ; Rizal Isnanto2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Management of fault tolerance and traffic congestion in cloud data center
Humphrey Emesowum ; Athanasios Paraskelidis ; Mo Adda Publication Year: 2018, Page(s): 10 - 15
Cited by: Papers (1)
Abstract (716 Kb)
Management of fault tolerance and traffic congestion in cloud data center
Humphrey Emesowum ; Athanasios Paraskelidis ; Mo Adda 2018 International Conference on Information and
Communications Technology (ICOIACT) Year: 2018
Effect of stator slot geometry on high speed spindle motor performance
Wawan Purwanto ; Risfendra ; Dwi Sudarno Putra Publication Year: 2018, Page(s): 561 - 565 Cited by: Papers (2)
Abstract (319 Kb)
Effect of stator slot geometry on high speed spindle motor performance
Wawan Purwanto ; Risfendra ; Dwi Sudarno Putra 2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
CEW-DTW: A new time series model for text mining GuanDong Zhang ; Hao Yu ; Lu Xiao
Publication Year: 2018, Page(s): 158 - 162
IEEE websites place cookies on your device to give you the best user experience. By using our websites,
you agree to the placement of these cookies. To learn more, read our Accept & Close Privacy Policy.
4/22/2020 IEEE Xplore - Conference Table of Contents
Abstract (297 Kb)
CEW-DTW: A new time series model for text mining
GuanDong Zhang ; Hao Yu ; Lu Xiao2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Optimization of light tracker movement using fuzzy logic control Lutfi Mahardika ; Anik Nur Handayani ; Heru Wahyu Herwanto ; Kohei Arai
Publication Year: 2018, Page(s): 384 - 389
Abstract (521 Kb)
Optimization of light tracker movement using fuzzy logic control
Lutfi Mahardika ; Anik Nur Handayani ; Heru Wahyu Herwanto ; Kohei Arai
2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Combined economic emission dispatch with cubic criterion function using cuckoo search algorithm
Muhammad Khalil ; Rony Seto Wibowo ; Ontoseno Penangsang Publication Year: 2018, Page(s): 36 - 40
Abstract (227 Kb)
Combined economic emission dispatch with cubic criterion function using cuckoo search algorithm
Muhammad Khalil ; Rony Seto Wibowo ; Ontoseno Penangsang 2018 International Conference on Information andCommunications Technology (ICOIACT) Year: 2018
Analysis of evaluation quality website from developers perspective for build website
Dwi Rahayu ; Ema Utami ; Emha Taufiq Luthfi Publication Year: 2018, Page(s): 120 - 124
Abstract (301 Kb)
Analysis of evaluation quality website from developers perspective for build website
Dwi Rahayu ; Ema Utami ; Emha Taufiq Luthfi 2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Control system based on fuzzy logic in nutmeg oil distillation process for energy optimization
Syamsul ; Rudi Syahputra ; Suherman Publication Year: 2018, Page(s): 679 - 683
Abstract (233 Kb)
Control system based on fuzzy logic in nutmeg oil distillation process for energy optimization
Syamsul ; Rudi Syahputra ; Suherman2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Twitter data transformation for network visualization based context analysis
Hani Nurrahmi ; Rini Wijayanti ; Andri Fachrur Rozie ; Andria Arisal
IEEE websites place cookies on your device to give you the best user experience. By using our websites,
you agree to the placement of these cookies. To learn more, read our Accept & Close Privacy Policy.
4/22/2020 IEEE Xplore - Conference Table of Contents Spatial probit regression model: Recursive importance sampling approach
Taufiq Fajar Dewanto ; Vita Ratnasari ; Purhadi Publication Year: 2018, Page(s): 759 - 764
Abstract (445 Kb)
Spatial probit regression model: Recursive importance sampling approach
Taufiq Fajar Dewanto ; Vita Ratnasari ; Purhadi 2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Wireless service at Public University: A survey of users perception on security aspects
Arif Ridho Lubis ; Ferry Fachrizal ; Muharman Lubis ; Hatim Mohamad Tahir
Publication Year: 2018, Page(s): 78 - 83
Abstract (531 Kb)
Wireless service at Public University: A survey of users perception on security aspects
Arif Ridho Lubis ; Ferry Fachrizal ; Muharman Lubis ; Hatim Mohamad Tahir
2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
Machine learning: Fisher fund classification using neural Machine learning
network and particle swarm optimization
Arifin Paulus Tindi ; Rahmat Gernowo ; Oky Dwi Nurhayati Publication Year: 2018, Page(s): 315 - 320
Abstract (536 Kb)
Machine learning: Fisher fund classification using neural network and particle swarm optimization
Arifin Paulus Tindi ; Rahmat Gernowo ; Oky Dwi Nurhayati 2018 International Conference on Information and Communications Technology (ICOIACT)Year: 2018
A double stage micro-inverter for optimal power flow control in grid connected PV system
Ferdian Ronilaya ; Achsanul Khabib ; Mohammad Noor Hidayat ; Indrazno Siradjudin ; Erfan Rohadi ; Rosa Andri Asmara ; Erni Yudaningtyas
Publication Year: 2018, Page(s): 808 - 813 Cited by: Papers (1)
Abstract (749 Kb)
A double stage micro-inverter for optimal power flow control in grid connected PV system
Ferdian Ronilaya ; Achsanul Khabib ; Mohammad Noor Hidayat ; Indrazno Siradjudin ; Erfan Rohadi ; Rosa Andri Asmara ; Erni Yudaningtyas
2018 International Conference on Information and Communications Technology (ICOIACT)
Year: 2018
River body extraction and classification using enhanced models of modified normalized water difference index at Yeh Unda River Bali
Putu Virga Nanta Nugraha ; Sunu Wibirama ; Risanuri Hidayat
IEEE websites place cookies on your device to give you the best user experience. By using our websites,
you agree to the placement of these cookies. To learn more, read our Accept & Close Privacy Policy.
4/22/2020 Machine learning: Fisher fund classification using neural network and particle swarm optimization - IEEE Conference Publication
Institutional Sign In
IEEE.org IEEE Xplore Digital Library| |IEEE-SA|IEEE Spectrum|More Sites Cart Create Account| | Personal Sign In
Conferences > 2018 International Conference...
3Author(s) Arifin Paulus Tindi ; Rahmat Gernowo ; Oky Dwi Nurhayati View All Authors
Machine learning: Fisher fund classification using neural network and particle swarm optimization
Publisher: IEEE Cite This Cite This PDF
77 FullText Views
Alerts
Manage Content Alerts
Add to Citation Alerts Export to
Collabratec
Abstract Document Sections I. Introduction II. Related Work III. Background
Theory IV. Implementation,
Result and Discussion V. Conclusion
Authors Figures References
Keywords Metrics More Like This
Downl PDF
Abstract: Assistance fishery can increase the income of fishermen and contribute to the country. Required classification awarding kind of help to improve the utilization of fund.
I... View more Metadata
Published in: 2018 International Conference on Information and Communications Technology (ICOIACT)
Abstract:
Assistance fishery can increase the income of fishermen and contribute to the country.
Required classification awarding kind of help to improve the utilization of fund. In this research the ML to learn the features in a dataset of combinations Fishermen Card database and data Monitoring and Evaluation fisheries fund. ML process performed by NN MLP models combined with PSO with performance models such as Precision qualitative reached 0.75, sensitivity is reduced to 0.44, with the quantitative achievements reached 0.66 Accuracy and Error 0.34 with network model and small parameters.
Date of Conference: 6-7 March 2018 Date Added to IEEE Xplore: 30 April 2018
ISBN Information:
INSPEC Accession Number: 17750258 DOI: 10.1109/ICOIACT.2018.8350787 Publisher: IEEE
Conference Location: Yogyakarta, Indonesia
More Like This
Multilayer perceptron learning with particle swarm optimization for well log data inversion
The 2012 International Joint Conference on Neural Networks (IJCNN)
Published: 2012
Multilayer perceptron with particle swarm optimization for well log data inversion 2012 IEEE International Geoscience and Remote Sensing Symposium Published: 2012
View More
Top Organizations with Patents on Technologies Mentioned in This Article
My Settings Get Help
Browse Subscribe
IEEE websites place cookies on your device to give you the best user experience. By using our websites,
you agree to the placement of these cookies. To learn more, read our Accept & Close Privacy Policy.
4/22/2020 Machine learning: Fisher fund classification using neural network and particle swarm optimization - IEEE Conference Publication
IEEE Personal Account
CHANGE USERNAME/PASSWORD
Purchase Details
PAYMENT OPTIONS
VIEW PURCHASED DOCUMENTS
Profile Information
COMMUNICATIONS PREFERENCES PROFESSION AND EDUCATION TECHNICAL INTERESTS
Need Help?
US & CANADA: +1 800 678 4333 WORLDWIDE: +1 732 981 0060 CONTACT & SUPPORT
Follow
About IEEE Xplore | Contact Us | Help | Accessibility | Terms of Use | Nondiscrimination Policy | Sitemap | Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.
© Copyright 2020 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
Authors
Figures
References
Keywords
Metrics
Arifin Paulus Tindi
Master's Dept. of Information System, Diponegoro University, Semarang, Indonesia
Rahmat Gernowo
Department of Physics, Diponegoro University, Semarang, Indonesia
Oky Dwi Nurhayati
Department of Informatics, Diponegoro University, Semarang, Indonesia
I. Introduction
Fishing is a strategic sub-sectors in development. Efforts to improve the construction was done with the fund fisheries infrastructure. Utilization can help increase the income of fishermen and contribute to state revenues [1], Utilization of fund is still low due to the provision of fund that is not targeted[2], Utilization of fisheries fund is influenced by the characteristics and motivations of fishermen in an effort to increase revenue [3], [4]. To overcome these problems required the classification of the provision of the type of fund and beneficiary fishermen to learn the facts.
Sign in to Continue Reading
Arifin Paulus Tindi
Master's Dept. of Information System, Diponegoro University, Semarang, Indonesia Rahmat Gernowo
Department of Physics, Diponegoro University, Semarang, Indonesia Oky Dwi Nurhayati
Department of Informatics, Diponegoro University, Semarang, Indonesia
Contents
IEEE websites place cookies on your device to give you the best user experience. By using our websites,
you agree to the placement of these cookies. To learn more, read our Accept & Close Privacy Policy.
4/22/2020 Reduction of catastrophic forgetting for multilayer neural networks trained by no-prop algorithm - IEEE Conference Publication
Institutional Sign In
IEEE.org IEEE Xplore Digital Library| |IEEE-SA|IEEE Spectrum|More Sites Cart Create Account| | Personal Sign In
Conferences > 2018 International Conference...
2Author(s) Motonobu Hattori ; Hideto Tsuboi View All Authors
Reduction of catastrophic forgetting for multilayer neural networks trained by no-prop algorithm
Publisher: IEEE Cite This Cite This PDF
43 FullText Views
Alerts
Manage Content Alerts
Add to Citation Alerts Export to
Collabratec
Abstract Document Sections I. Introduction II. No-Propagation
Algorithm III. Pseudorehearsal IV. Computer
Simulation Results V. Conclusions
Authors Figures References
Keywords Metrics More Like This
Downl PDF
Abstract: Neural networks encounter sever fatal forgetting or fatal interference when information is learned sequentially. This is called catastrophic forgetting. One way to reduce... View more
Metadata
Published in: 2018 International Conference on Information and Communications Technology (ICOIACT)
Abstract:
Neural networks encounter sever fatal forgetting or fatal interference when information is learned sequentially. This is called catastrophic forgetting. One way to reduce catastrophic forgetting is pseudorehearsal, in which pseudopatterns are learned with training patterns. This method has shown excellent performance in multilayered neural networks trained by the backpropagation algorithm. In recent years, a new learning method of multilayered neural networks called the no-propagation algorithm has been proposed. This algorithm is far easier to implement because only the weights of output layer neurons are trained, and convergence is much faster than backpropagation.
Nevertheless, its performance is essentially equivalent to that of backpropagation. Our previous research has shown that pseudorehearsal is effective even for networks trained by no-propagation, whereas it is less effective than networks trained by backpropagation. In this paper, we modify the no-propagation algorithm for pseudorehearsal so that it can much reduce catastrophic forgetting. Computer simulation results show that networks trained by the proposed algorithm can much improve the reduction of catastrophic forgetting in comparison with the conventional no- propagation algorithm and becomes comparable to those trained by backpropagation.
More Like This
Generalized net model for parallel optimization of multilayer perceptron with momentum backpropagation algorithm 2010 5th IEEE International Conference Intelligent Systems
Published: 2010
Application of multilayer perceptron with backpropagation algorithm and regression analysis for long-term forecast of electricity demand: A comparison
2008 International Conference on Electronic Design
Published: 2008
View More
Top Organizations with Patents on Technologies Mentioned in This Article
My Settings Get Help
Browse Subscribe
IEEE websites place cookies on your device to give you the best user experience. By using our websites,
you agree to the placement of these cookies. To learn more, read our Accept & Close Privacy Policy.
4/22/2020 Reduction of catastrophic forgetting for multilayer neural networks trained by no-prop algorithm - IEEE Conference Publication
Authors
Figures
References
Keywords
Metrics
Date of Conference: 6-7 March 2018 Date Added to IEEE Xplore: 30 April 2018
ISBN Information:
INSPEC Accession Number: 17735732 DOI: 10.1109/ICOIACT.2018.8350665 Publisher: IEEE
Conference Location: Yogyakarta, Indonesia
Motonobu Hattori
Department of Computer Science and Engineering, Faculty of Interdisciplinary Research, University of Yamanashi, Kofu, Yamanashi, Japan
Hideto Tsuboi
Department of Computer Science and Media Engineering, Faculty of Engineering, University of Yamanashi, Kofu, Yamanashi, Japan
I. Introduction
If a neural network is trained on a set of patterns and later trying to add new patterns to its repertoire, catastrophic interference or complete loss of all of its previously learned information may occur. This type of radical forgetting is unacceptable for both human memory models and practical engineering applications. One typical solution to catastrophic forgetting is interleaved learning, that is, mixing the previous set of patterns during training for a new set of patterns. However, this solution requires the unrealistic assumption of permanent access to all patterns that the network has previously learned. Therefore, several methods have been proposed to reduce catastrophic forgetting without performing such straight rehearsal [1]–[5]. Among them, Robins has proposed
pseudorehearsal which does not require access to the information itself that was learned previously, and shown that it can greatly reduce catastrophic forgetting [4]. Moreover, several neural network models using pseudorehearsal have been proposed so far [6]–[8]. However, most of the studies so far were directed to multilayered neural networks trained by the back-propagation algorithm (Back-Prop).
Sign in to Continue Reading
Motonobu Hattori
Department of Computer Science and Engineering, Faculty of Interdisciplinary Research, University of Yamanashi, Kofu, Yamanashi, Japan
Hideto Tsuboi
Department of Computer Science and Media Engineering, Faculty of Engineering, University of Yamanashi, Kofu, Yamanashi, Japan
Contents
IEEE websites place cookies on your device to give you the best user experience. By using our websites,
you agree to the placement of these cookies. To learn more, read our Accept & Close Privacy Policy.
4/22/2020 Complex-valued support vector machines based on multi-valued neurons - IEEE Conference Publication
Institutional Sign In
IEEE.org IEEE Xplore Digital Library| |IEEE-SA|IEEE Spectrum|More Sites Cart Create Account| | Personal Sign In
Conferences > 2018 International Conference...
2Author(s) Hokuto Shinoda ; Motonobu Hattori View All Authors
Complex-valued support vector machines based on multi-valued neurons
Publisher: IEEE Cite This Cite This PDF
22 FullText Views
Alerts
Manage Content Alerts
Add to Citation Alerts Export to
Collabratec
Abstract Document Sections I. Introduction II. Multi-Valued
Neurons (MVNs) III. Complex-Valued Support Vector Machines (CVSVMs) IV. Implementation
Technique V. Computer
Simulation Results
Authors Figures References
Keywords Metrics More Like This
Downl PDF
Abstract: In this paper, we propose complex-valued support vector machines (CVSVMs) which are a new type of support vector machines (SVMs) based on multi- valued neurons (MVNs). An ... View more
Metadata
Published in: 2018 International Conference on Information and Communications Technology (ICOIACT)
Abstract:
In this paper, we propose complex-valued support vector machines (CVSVMs) which are a new type of support vector machines (SVMs) based on multi-valued neurons (MVNs). An MVN which is a type of complex-valued neurons is a component of the proposed CVSVM. The features of the proposed CVSVM are: 1) it has a multi-valued complex output; 2) it provides the generalization ability by a decision boundary with the maximal margin; 3) it can deal with non-linear classification by using a kernel function.
Experimental results for some famous benchmark problems show the effectiveness of the proposed CVSVM.
Date of Conference: 6-7 March 2018 Date Added to IEEE Xplore: 30 April 2018
ISBN Information:
INSPEC Accession Number: 17735714 DOI: 10.1109/ICOIACT.2018.8350666 Publisher: IEEE
Conference Location: Yogyakarta, Indonesia
More Like This
Weighted least squares twin support vector machines for pattern classification 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE)
Published: 2010
A Combination of Modified Particle Swarm Optimization Algorithm and Support Vector Machine for Pattern Classification 2009 Third International Symposium on Intelligent Information Technology Application
Published: 2009
View More
Top Organizations with Patents on Technologies Mentioned in This Article
My Settings Get Help
Browse Subscribe
IEEE websites place cookies on your device to give you the best user experience. By using our websites,
you agree to the placement of these cookies. To learn more, read our Accept & Close Privacy Policy.
4/22/2020 Complex-valued support vector machines based on multi-valued neurons - IEEE Conference Publication
IEEE Personal Account
CHANGE USERNAME/PASSWORD
Purchase Details
PAYMENT OPTIONS
VIEW PURCHASED DOCUMENTS
Profile Information
COMMUNICATIONS PREFERENCES PROFESSION AND EDUCATION TECHNICAL INTERESTS
Need Help?
US & CANADA: +1 800 678 4333 WORLDWIDE: +1 732 981 0060 CONTACT & SUPPORT
Follow
About IEEE Xplore | Contact Us | Help | Accessibility | Terms of Use | Nondiscrimination Policy | Sitemap | Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.
© Copyright 2020 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
Authors
Figures
References
Keywords
Metrics
Hokuto Shinoda
Interdisciplinary Graduate School of Medicine and Engineering, University of Yamanashi, Kofu, Yamanashi, Japan
Motonobu Hattori
Department of Computer Science and Engineering, Faculty of Interdisciplinary Research, University of Yamanashi, Kofu, Yamanashi, Japan
I. Introduction
Support vector machines (SVMs) [1] have attracted much attention in recent years. The principle of maximal margin method used in SVMs can optimize a decision boundary in the feature space for training examples. Moreover, by using a kernel function, SVMs can learn non- linear relations of training examples. Owing to these characteristics, SVMs have excellent generalization ability and show outstanding performance in pattern recognition, classification, prediction, regression, and so on. An SVM classifies the input pattern to positive or negative class, so it is called a binary classifier.
Sign in to Continue Reading
Hokuto Shinoda
Interdisciplinary Graduate School of Medicine and Engineering, University of Yamanashi, Kofu, Yamanashi, Japan
Motonobu Hattori
Department of Computer Science and Engineering, Faculty of Interdisciplinary Research, University of Yamanashi, Kofu, Yamanashi, Japan
Contents
IEEE websites place cookies on your device to give you the best user experience. By using our websites,
you agree to the placement of these cookies. To learn more, read our Accept & Close Privacy Policy.
4/22/2020 Model development of students' scholarship status at first asia institute of technology and humanities (Faith) - IEEE Conference Publication
Institutional Sign In
IEEE.org IEEE Xplore Digital Library| |IEEE-SA|IEEE Spectrum|More Sites Cart Create Account| | Personal Sign In
Conferences > 2018 International Conference...
3Author(s) Jonalyn Joy B. Labayne ; Lester L. Mercado ; Jheanel Espiritu Estrada View All Authors
Model development of students' scholarship status at first asia institute of technology and humanities (Faith)
Publisher: IEEE Cite This Cite This PDF
68 FullText Views
Alerts
Manage Content Alerts
Add to Citation Alerts Export to
Collabratec
Abstract Document Sections I. Introduction II. Methodology III. Result and
Discussion IV. Conclusion V. Recommendation
Authors Figures References
Keywords Metrics More Like This
Downl PDF
Abstract: Data Mining nowadays is much known in the field of IT industry. It is a very powerful instrument and technique for many various fields such as education, IT and even in b... View more
Metadata
Published in: 2018 International Conference on Information and Communications Technology (ICOIACT)
Abstract:
Data Mining nowadays is much known in the field of IT industry. It is a very powerful instrument and technique for many various fields such as education, IT and even in business industry. In this research, the researchers will predict if the students will retain or will not retain their scholarship based on the students' academic performance. On processing the data, the researchers will use different methods and techniques for data mining namely: Decision tree, Naïve Bayes and k-NN to provide more acceptable results on predicting the continuity of the scholarship of every students. Based on the result of the study, it shows that the students are having difficulties in Algebra and English subjects as shown by the results provided by the processed data on rapid miner. BAC with 17.58% and BSECE 15.37% has a high percentage of not retaining their scholarship because most of the students exceed on the allowable strikes of not maintaining their grades. The researchers found that the main cause why the students were not retaining their scholarship is because of their core subjects.
Date of Conference: 6-7 March 2018 INSPEC Accession Number: 17735619
More Like This
Development of a website-based decision tree system in data mining concept 2018 Third International Conference on Informatics and Computing (ICIC) Published: 2018
Data Mining Analysis on Student’s Academic Performance through Exploration of Student’s Background and Social Activities
2018 Fourth International Conference on Advances in Computing, Communication &
Automation (ICACCA) Published: 2018
View More
Top Organizations with Patents on Technologies Mentioned in This Article
My Settings Get Help
Browse Subscribe
IEEE websites place cookies on your device to give you the best user experience. By using our websites,
you agree to the placement of these cookies. To learn more, read our Accept & Close Privacy Policy.
4/22/2020 Model development of students' scholarship status at first asia institute of technology and humanities (Faith) - IEEE Conference Publication
IEEE Personal Account
CHANGE USERNAME/PASSWORD
Purchase Details
PAYMENT OPTIONS
VIEW PURCHASED DOCUMENTS
Profile Information
COMMUNICATIONS PREFERENCES PROFESSION AND EDUCATION TECHNICAL INTERESTS
Need Help?
US & CANADA: +1 800 678 4333 WORLDWIDE: +1 732 981 0060 CONTACT & SUPPORT
Follow
About IEEE Xplore | Contact Us | Help | Accessibility | Terms of Use | Nondiscrimination Policy | Sitemap | Privacy & Opting Out of Cookies
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.
Authors
Figures
References
Keywords
Metrics
Date Added to IEEE Xplore: 30 April 2018 ISBN Information:
DOI: 10.1109/ICOIACT.2018.8350686 Publisher: IEEE
Conference Location: Yogyakarta, Indonesia
Jonalyn Joy B. Labayne
Technological Institute of the Philippines, Manila, Philippines
Lester L. Mercado
Technological Institute of the Philippines, Manila, Philippines
Jheanel Espiritu Estrada
Technological Institute of the Philippines, Manila, Philippines
I. Introduction
FAITH is an Institution of higher learning and research located in City of Tanauan in Batangas. Since its inception on September 8, 2000. Faith is envisioned to be a premier educational institution in the high-growth region, south of Metro Manila. It aims to contribute to the humane and holistic development of the Filipino nation and the individual by training and producing graduates who are technologically skilled, well-rounded and competent as well as grounded on Christian humanistic value. [1]
Sign in to Continue Reading
Jonalyn Joy B. Labayne
Technological Institute of the Philippines, Manila, Philippines Lester L. Mercado
Technological Institute of the Philippines, Manila, Philippines Jheanel Espiritu Estrada
Technological Institute of the Philippines, Manila, Philippines
Contents
IEEE websites place cookies on your device to give you the best user experience. By using our websites,
you agree to the placement of these cookies. To learn more, read our Accept & Close Privacy Policy.