Opening or closing dam-gate activities manually conducted in Manggarai dam to control the dam water level. The controlling action operated to avoid the flood possibility occurring in Jakarta city (the Indonesian capit...
详细信息
This paper purposes an improved algorithm of the butterfly lifecycle for calculating the performance of the company's growth. Three types of change for the better are regarding mathematical model, conception in ca...
详细信息
As e-commerce that covered all Indonesia, needs a fast reporting system to analyze the business to make the best decision. This paper provides methods to fasten the reporting process by making a data warehouse using K...
详细信息
Face recognition is a widely utilized biometric method due to its natural and non-intrusive approach. Recently, deep learning networks using Triplet Loss have become a common framework for person identification and ve...
详细信息
The rising threat of cybercrimes in Indonesia, including a significant breach of the national data center, reveals the urgent need for effective cybersecurity education. Cryptography, a key component of cybersecurity,...
详细信息
Six-sigma is an approach to appraise a company's prospect in generating a number of piece with homogenized processes without any production defects or zero faults. It is operated not only for declining defect numb...
详细信息
In the oil and gas industry, the available data regarding each well are very huge. With data and parameters are very numerous and complex, it is very difficult to analyze and process the data that will be used as a ba...
详细信息
Every enterprise stores and operates its transactions confidentially, therefore it has to encrypt the transaction to protect it from data intruders. Technically, most encryption processes are ranging from hundreds of ...
详细信息
This paper proposes a service desk to handle two important issues in financial company using the Information Technology Infrastructure Library (ITIL) Framework, i.e. Single Point of Contact (SPOC) and Service Level Ag...
详细信息
The increasing threat of ransomware attacks in an interconnected and digital world presents important hurdles for cybersecurity, prompting further examination into how organizational security culture affects their abi...
详细信息
暂无评论