The purpose of this study is 1) Describe the ideal and feasible model of the allocation of an entrepreneurship education curriculum for learners at a course institution. 2) Describe an ideal and ...feasible model of an entrepreneurship education learning strategy for learners in a course institution. Qualitative research is also called naturalistic research. Subjects in this study are students and alumi in course programs organized by LKP Kresna Informatika such as English courses courses, computer and office accounting. Data collection techniques in the context of this study have a significant role considering the quality of various types of data obtained at each stage of module development. Observation and documentation, interviews and tests are the data collection techniques used in this research before it will be analyzed. Stages of data analysis pursued after the need for data both secondary and primary when it has been fulfilled which includes; (1) data reduction, (2) display data, and (3) conclusion drawing/verification. The results in the study conclude that to establish entrepreneurial attitude in the courses and training programs conducted by LKP Kresna Informatika include; 1) The prerequisite of one's attitude input and one's entrepreneurial nature in LKP Kresna Informatika includes; discipline, high commitment, honest, reative and Innovative. 2) Design learning strategies in growing and developing entrepreneurship skills of learners in LKP Kresna Informatika through a special approach that is called 4 in 1 or with four stages. 3) Implementation of learning strategies in growing and developing entrepreneurship skills of learners in LKP Kresna Informatika; Identification of Business Opportunities, entrepreneurship learning based on the development of attitudes, knowledge and entrepreneurship skills, Evaluation of Learning Outcomes and Business Assistance and Pioneering.
Aplikasi berbasis cloud menjadi sebuah produk yang sangat bermanfaat bagi pembelajaran termasuk media pembelajaran untuk kegiatan yang bersifat ekstrakurikuler seperti paduan suara di masa pandemi ...COVID-19. Aplikasi pembelajaran ini mampu membantu instruktur untuk menganalisis kemampuan calon anggota baru dan menentukan strategi yang tepat supaya harmoni dan melodi di dalam paduan suara tersebut terjalin dengan baik. Hal ini dapat diupayakan melalui penilaian intonasi sebagai salah satu fitur media pembelajaran tersebut. Penilaian intonasi dilakukan berdasarkan penentuan pitch error dan stabilitas nada pada jenis vokal bass pria. Pengembangan fitur di dalam aplikasi ini tidak dapat dilakukan secara biasa, teknik penilaian intonasi perlu diterapkan dengan baik karena intonasi berperan terhadap keselarasan nada. Penelitian ini merupakan penelitian pendahulu yang akan dikembangkan ke penelitian-penelitian berikutnya yang melibatkan nada lain dan dilaksanakan secara orkestra. Hasil penerapan teknik pada kegiatan ini menunjukkan tidak ada ketimpangan di antara vokal dari calon anggota baru paduan suara sebagai data uji dengan vokal anggota paduan yang disimpang di dalam database sebagai dataset.
Moments as projections of an image’s intensity onto a proper polynomial basis can be applied to many different aspects of image processing. These include invariant pattern recognition, image ...normalization, image registration, focus/ defocus measurement, and watermarking. This book presents a survey of both recent and traditional image analysis and pattern recognition methods, based on image moments, and offers new concepts of invariants to linear filtering and implicit invariants. In addition to the theory, attention is paid to efficient algorithms for moment computation in a discrete domain, and to computational aspects of orthogonal moments. The authors also illustrate the theory through practical examples, demonstrating moment invariants in real applications across computer vision, remote sensing and medical imaging.Key features:Presents a systematic review of the basic definitions and properties of moments covering geometric moments and complex moments. Considers invariants to traditional transforms – translation, rotation, scaling, and affine transform - from a new point of view, which offers new possibilities of designing optimal sets of invariants. Reviews and extends a recent field of invariants with respect to convolution/blurring. Introduces implicit moment invariants as a tool for recognizing elastically deformed objects. Compares various classes of orthogonal moments (Legendre, Zernike, Fourier-Mellin, Chebyshev, among others) and demonstrates their application to image reconstruction from moments. Offers comprehensive advice on the construction of various invariants illustrated with practical examples. Includes an accompanying website providing efficient numerical algorithms for moment computation and for constructing invariants of various kinds, with about 250 slides suitable for a graduate university course. Moments and Moment Invariants in Pattern Recognitionis ideal for researchers and engineers involved in pattern recognition in medical imaging, remote sensing, robotics and computer vision. Post graduate students in image processing and pattern recognition will also find the book of interest.
Data Mining: Concepts and Techniques provides the concepts and techniques in processing gathered data or information, which will be used in various applications. Specifically, it explains data mining ...and the tools used in discovering knowledge from the collected data. This book is referred as the knowledge discovery from data (KDD). It focuses on the feasibility, usefulness, effectiveness, and scalability of techniques of large data sets. After describing data mining, this edition explains the methods of knowing, preprocessing, processing, and warehousing data. It then presents information about data warehouses, online analytical processing (OLAP), and data cube technology. Then, the methods involved in mining frequent patterns, associations, and correlations for large data sets are described. The book details the methods for data classification and introduces the concepts and methods for data clustering. The remaining chapters discuss the outlier detection and the trends, applications, and research frontiers in data mining. This book is intended for Computer Science students, application developers, business professionals, and researchers who seek information on data mining. * Presents dozens of algorithms and implementation examples, all in pseudo-code and suitable for use in real-world, large-scale data mining projects * Addresses advanced topics such as mining object-relational databases, spatial databases, multimedia databases, time-series databases, text databases, the World Wide Web, and applications in several fields * Provides a comprehensive, practical look at the concepts and techniques you need to get the most out of your data
Jednotlivé právní dokumenty jako nosiče právních textů pocházejí tradičně z různých zdrojů. Jsou zpracovávány v rozličných podmínkách a za rozmanitým účelem. Kromě publikačních platforem oficiálních ...se setkáváme i se zdroji neoficiálními. Moderní zdroje právních informací fungují v dnešní době ve formě právních informačních systémů. Právní významnost či informační hodnota právních textů ve zdrojích právních informací se liší podle jejich autenticity, formy a kvality jejich zpracování i role a legitimity editorů. Editorský prvek v celém procesu zpracování právních informací má dominantní úlohu v praktické interpretaci práva. Legitimita zdrojů právních informací, resp. jejich tvůrců, se tak zásadně liší.
In recent years game theory has had a substantial impact on computer science, especially on Internet- and e-commerce-related issues. Algorithmic Game Theory, first published in 2007, develops the ...central ideas and results of this exciting area in a clear and succinct manner. More than 40 of the top researchers in this field have written chapters that go from the foundations to the state of the art. Basic chapters on algorithmic methods for equilibria, mechanism design and combinatorial auctions are followed by chapters on important game theory applications such as incentives and pricing, cost sharing, information markets and cryptography and security. This definitive work will set the tone of research for the next few years and beyond. Students, researchers, and practitioners alike need to learn more about these fascinating theoretical developments and their widespread practical application.
Discrete optimization problems are everywhere, from traditional operations research planning (scheduling, facility location and network design); to computer science databases; to advertising issues ...in viral marketing. Yet most such problems are NP-hard; unless P = NP, there are no efficient algorithms to find optimal solutions. This book shows how to design approximation algorithms: efficient algorithms that find provably near-optimal solutions. The book is organized around central algorithmic techniques for designing approximation algorithms, including greedy and local search algorithms, dynamic programming, linear and semidefinite programming, and randomization. Each chapter in the first section is devoted to a single algorithmic technique applied to several different problems, with more sophisticated treatment in the second section. The book also covers methods for proving that optimization problems are hard to approximate. Designed as a textbook for graduate-level algorithm courses, it will also serve as a reference for researchers interested in the heuristic solution of discrete optimization problems.
Révész György portréja a Neumann János Számítógép-tudományi Társaság (NJSZT) Informatikatörténeti Fóruma (iTF) szervezésében készített "Arcképek a magyar informatika történetéből" sorozatában.
Masa pandemi Covid-19 menyebabkan perubahan strategi pembelajaran dari offline menjadi online. Pembelajaran online ini bukan merupakan hal baru, namun pembelajaran online pada masa pandemi sangat ...berbeda karena pembelajaran harus dilakukan full daring selama 1 semester. Tujuan dari penelitian ini adalah untuk mengetahui pengaruh penerapan video conference dalam pembelajaran sinkronus yang dilakukan secara online. Penelitian ini merupakan penelitian eksperimentasi dengan populasi mahasiswa Teknik Informatika STIKI, dengan pengambilan sampel secara random pada mahasiswa yang menempuh mata kuliah bersama dan mata kuliah keahlian. Analisis data yang digunakan adalah Uji Mann Whitney. Hasil dari penelitian ini adalah tidak ada perbedaan hasil belajar yang diukur dari nilai posttest mahasiswa antara pembelajaran daring dengan menggunakan video conference dan LMS Moodle yang dikembangkan di STIKI tanpa menggunakan video conference pada mata kuliah bersama. Sedangkan pada mata kuliah keahlian ada perbedaan hasil belajar yang diukur dari nilai posttest mahasiswa antara kegiatan perkuliahan daring dengan menggunakan video conference dan kegiatan daring dengan Moodle saja tanpa menggunakan video conference. Pembelajaran melalui video conference tidak selalu berpengaruh pada hasil belajar, namun ada beberapa faktor lain yang mempengaruhi, seperti tingkat kesulitan materi dan ketertarikan mahasiswa untuk mempelajari materi.