Technology and information will always develop dynamically;this statement demands programmers to always be creative and keep up with the times. Despite this, their work ethic is always the same and tends to stagnate. ...
详细信息
Artificial Intelligence (AI) and chatbot technology have emerged as promising solutions to improve healthcare services. AI chatbots can mimic human-like interactions and assist with tasks such as triaging patients and...
详细信息
Air pollution has emerged as a critical issue in several major urban areas, including Jakarta. To address this problem, the study explores the utilization of the Artificial Neural Network (ANN) method. Three distinct ...
详细信息
The increasing threat of ransomware attacks in an interconnected and digital world presents important hurdles for cybersecurity, prompting further examination into how organizational security culture affects their abi...
The increasing threat of ransomware attacks in an interconnected and digital world presents important hurdles for cybersecurity, prompting further examination into how organizational security culture affects their ability to withstand these malicious threats. This study examines the impact and importance of organizational security culture in ransomware threat mitigation. We have surveyed five organizations, giving points from 1 to 5 for each question on cultural factors, leadership support, employee awareness and involvement (compliance), communication, behavior change or BBS practice incorporation, learning/training delivery methodology, and Size and industry impact on their security culture. The results indicate that a robust security culture, with leadership and effective communication, builds stronger resilience to ransomware. Organizations with jointly accountable cybersecurity and training practices are highly efficient. Suggestions range from establishing a secure environment to increasing management buy-in and integrating compliance. This work helps advance our understanding of ransomware resilience and highlights the key role of organizational security culture. The resulting learnings can help to inform organizations' security posture, ultimately helping them better protect their defenses against ransomware threats.
Several studies suggest that sleep quality is associated with physical activities. Moreover, deep sleep time can be used to determine the sleep quality of an individual. In this work, we aim to find the association be...
详细信息
The measurement of information security risk in a public sector organization is of utmost importance. This measurement serves the purpose of taking appropriate actions in response to potential risks or damaging incide...
The measurement of information security risk in a public sector organization is of utmost importance. This measurement serves the purpose of taking appropriate actions in response to potential risks or damaging incidents. The objective of this study is to develop a straightforward yet smart decision model capable of evaluating risks, particularly within the public sector organization. The decision support modelling (DSM) concept is employed as a framework to construct a computer model that supports decision-making in a specific case. The study comprises five stages, which are integral parts of the DSM process. These stages include analyzing the case, examining relevant documents, designing the model, constructing the model, and evaluating the finalized model. The object-oriented method serves as a fundamental approach to model design. Additionally, the fuzzy logic method, an intelligent computational technique, plays a central role in the development of this decision model. The proposed model demonstrates an average error value of 0.05 when compared to the actual risk measurement conducted. Furthermore, it reveals average risk values of 0.59 and 0.45 for the pre- and post-remediation scenarios, respectively.
Containerization has become a popular approach in application development in applications development and deployment, many benefits we can get such as improved scalability, portability, and resource efficiency. Contai...
Containerization has become a popular approach in application development in applications development and deployment, many benefits we can get such as improved scalability, portability, and resource efficiency. Container-based applications, utilizing technologies like Docker and Kubernetes, have transformed the packaging, deployment, and management of software from the desktop environment to the cloud platform. In this context, software metrics approach plays a good role in evaluating the characteristics and performance of container-based applications, ensuring that developers and operators are on the same page. This article explores the importance of software metrics in optimizing the software lifecycle of container-based applications, addressing the unique challenges they present, and highlighting the potential benefits of leveraging metrics to improve performance and efficiency. Our finding Performance Metrics and Availability Metrics is the most metrics that the most measure by applications owner, relevant studies and industry practices, this study aims to provide insights and recommendations to effectively measure and optimize region-based software systems.
Hate speech is any act of provoking or insulting another person or group based on their ethnicity, religion, race, gender, sexual orientation, physical ability, or other characteristics. This can be done in a variety ...
详细信息
Detecting fake news in the digital era is challenging due to the proliferation of misinformation. One of the crucial is-sues in this domain is the inherent class imbalance, where genuine news articles significantly ou...
Detecting fake news in the digital era is challenging due to the proliferation of misinformation. One of the crucial is-sues in this domain is the inherent class imbalance, where genuine news articles significantly outnumber fake ones. This imbalance severely hampers the performance of machine and deep learning models in accurately identifying fake news. Consequently, there is a compelling need to address this problem effectively. In this study, we delve into fake news detection and tackle the critical issue of imbalanced data. We investigate the application of Easy Data Augmentation (EDA) techniques, including back-translation, random insertion, random deletion, and random swap to mitigate the adverse effects of imbalanced data. This study focuses on employing these techniques in conjunction with a deep learning framework, specifically a Bidirectional Long Short-Term Memory (BiLSTM) architecture. The results of the EDA techniques will be systematically compared to see their effectiveness and their impacts on model performance. This study reveals that various EDA techniques, when coupled with a BiLSTM architecture, yield significant improvements in fake news detection. Among the experiments, it shows that Random Insertion, with an impressive accuracy rate of 81.68%, a precision score of 89.38%, and an F1-Score of 87.77% emerges as the most promising technique. The study also highlights the exceptional potential of Back-translation stands out with an 87.16% recall performance.
Addressing multiple criteria and parameter issues in computer modelling presents a significant challenge. Several factors including data types, parameter behaviours, and purposes, must be taken into account to enhance...
Addressing multiple criteria and parameter issues in computer modelling presents a significant challenge. Several factors including data types, parameter behaviours, and purposes, must be taken into account to enhance computer modelling capability; particularly in evaluation cases. Through the utilization of a multi-criteria and method approach, a decision model was effectively developed to assess a case of environmental sustainability level of a building. One method operated in the study is the curve method for handling membership function form in realizing fuzzy logic. This innovative model demonstrates superior performance. It achieves an impressive accuracy rate of 96%, surpassing the previous model that employed a trapezoidal approach to describe fuzzy membership functions hy 1%.
暂无评论