Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 4 dokumen yang sesuai dengan query
cover
Nur Ulva Maulidevi
"Cognitive system modeling first introduced by psychology researchers. Unfortunately, the model has not been sufficient in supporting computer based problem solving. For that reason, artificial intelligence tries to propose a computational model of cognitive system. The main purpose of the computational model is to support human in solving complex problems, especially problem that involve large number of data, uncompleted data, and problem solving that requires systematic approach as human does. This research proposes and engineering of such multiagent bases cognitive system, which employs case bases reasoning as imitation of human reasoning to maintain the knowledge base."
Penelitian Akademik Sekolah Tinggi Manajemen Informatika & Teknik Komputer Surabaya, 2007
001 GJMI 9:1 (2007)
Artikel Jurnal  Universitas Indonesia Library
cover
Rinaldi Munir
"Asymmaetric watermaking scheme enable one can detect public watermark. Watermark detection doesn't need secret ke or original multimedia data. Watermark detection done by doing correlation test between public keys and data multimedia tested. Usually scheme, private keyis watermark inserted; public key is public key that correlated with private watermark.In this paper presents asymmetricwatermaking scheme concept that based on correlation test, and continue with review some asymmetric watermarking proposals that already publish."
Penelitian Akademik Sekolah Tinggi Manajemen Informatika & Teknik Komputer Surabaya, 2007
001 GJMI 9:1 (2007)
Artikel Jurnal  Universitas Indonesia Library
cover
Sitohang, R. Vensya
"Divide Query (Q) to primitive as much as we can do, and alocated sup-query (sQ) to every sQ on exact location where data found, as integrated Query Management System (Parallel Execution Control of Sub-Query of Database on Distributed System) based. In this paper will be explained the result of evaluation some Qs become sQ, and observe the rate of concurent excecution that may be done on IQMS, according to system configuration distribution data base used (3 computer: 1 system controlles and executionlocation, and 2 execution locations), by obsserving data location. "
Penelitian Akademik Sekolah Tinggi Manajemen Informatika & Teknik Komputer Surabaya, 2007
001 GJMI 9:1 (2007)
Artikel Jurnal  Universitas Indonesia Library
cover
Kuspriyanto
"Control concurrency on RTDBS more complex than in conventional database system, Basides guarantee database consistency, on RTDBS control concurency can support transaction deadlines. Mean while validities and value of data item change depend on time. Conventional control concurrency algorithm can be devided to two groups: Pessimistic concurrency control (PCC) and Optimistic Concurrency Control (OCC). PCC prevent conflict between transactions executed while OCC overcome between transactions after that transaction executed that restarted in conflict happened. These algorithms have weakness if applied in RTDBS that gives tight time on transaction execution bacause as a parameter is number of transactions done before deadlines, not only number of concurrency maximum and throughput. To overcome those two algorithms weakness some researches done. Between results modifications is speculative concurrency control and Hybrid concurrency control for the Nested model. But between alternatives there are some weaknesses, so it needs development for better control concurrency for RTDBS. "
Penelitian Akademik Sekolah Tinggi Manajemen Informatika & Teknik Komputer Surabaya, 2007
001 GJMI 9:1 (2007)
Artikel Jurnal  Universitas Indonesia Library