Since the corona pandemic, many internet users have maximized their interactions with the internet to minimize face-to-face meetings. As a result, many collaborative filtering algorithms, which are part of recommender...
Since the corona pandemic, many internet users have maximized their interactions with the internet to minimize face-to-face meetings. As a result, many collaborative filtering algorithms, which are part of recommender systems, have been optimized so that users can obtain the best results. Collaborative filtering is an approach to providing recommendations that relies on the interactions and preferences of past users. Essentially, recommendations are generated by considering how users with similar preferences and behaviors have interacted. There are two primary forms of collaborative filtering: user-user and item-item. User-user collaborative filtering suggests recommendations based on users who share similar preferences with the current user. On the other hand, item-item collaborative filtering suggests recommendations based on items that are frequently selected together by other users. Both types of collaborative filtering rely on user interaction and preference data to deliver effective results. The latest trend related to collaborative filtering involves the use of geographic information. This paper aims to map the research developments related to collaborative filtering with geographic information in recent years, including the algorithms used, implementation issues, and challenges faced. Our hope is that this research can provide an overview of where this technology is heading.
Since internet service is mostly available in many countries, tunneling solution over an internet link often used in the company for network communication between its multi-regional branches. The current state of the ...
详细信息
Since internet service is mostly available in many countries, tunneling solution over an internet link often used in the company for network communication between its multi-regional branches. The current state of the art solution consisting of an EoIP tunnel combined with IPsec installed on the Head Quarter of the company. Researchers see this solution as prone to total network disruption when the HQ loses its internet service. With the rising trend of cloud computing development, researchers then propose a multi-region network infrastructure design consist of MikroTik devices and Cloud platforms using EoIP IPsec protocol. Cloud platform used as an EoIP IPsec gateway due to its high availability. From the implementation and testing, the EoIP Cloud gateway proved to have high network availability. Branch network communication proved to be running well with no impact on the HQ loss of internet services. IPsec also proved to be secure enough to secure user data transmitted over the internet. From the QoS findings, there is a 24ms drop in delay performance and 0,66 ms drop in jitter performance. The EoIP IPsec on cloud platform also proved to have a 0,97% improvement in throughput performance and has a 0% packet loss rate.
The area of oil palm plantations in Indonesia increased by 7% from 14 million ha in 2017 to 15 million ha in 2021. The vast land requires the support of effective and efficient management techniques to maintain sustai...
详细信息
The exponential growth of data is compelling organizations to employ data in decision-making. As one of the businesses with an ecosystem that contributes to data growth, banks have challenges in generating insight. A ...
详细信息
The exponential growth of data is compelling organizations to employ data in decision-making. As one of the businesses with an ecosystem that contributes to data growth, banks have challenges in generating insight. A high level of data security is frequently linked to a high level of data access difficulties. This poses a challenge to the implementation of data-driven business, where taking control of our data is one of the best ways to ensure that we not only own data but also have the ability to process and use data to extract business value. Through literature review, a number of challenges to optimizing the implementation of big data analytics in the banking industry were discovered. Data governance refers to the methods and procedures that assist banks in managing and securing data. A big data architecture is presented to address the highlighted issues, particularly with a multi-tiered approach to big data structures. With the adoption of this architecture, it will be simpler to generate business-value-generating insights for the banking industry using big data with accessibility and protection of data.
The Information Technology/Operational Technology convergence towards Industry 4.0 opens the opportunity to leverage recent advancements in Information Technology for Operational Technology, such as Cloud, Internet of...
The Information Technology/Operational Technology convergence towards Industry 4.0 opens the opportunity to leverage recent advancements in Information Technology for Operational Technology, such as Cloud, Internet of Things, and Artificial Intelligence. Meanwhile, cyber-attacks are increasing for Operational Technology. The security aspect in Operational Technology systems has traditionally been a low priority, in contrast with speed. This introduces challenges as Industrial Control Systems such as programmable Logic Controller in Operational Technology have been traditionally optimized for speed rather than security due to limited computing power. As computations need to be as efficient as possible, security in Operational Technology has yet to be managed as robustly as in Information Technology. Operational Technology communication protocols for securing data transfer, for example, have no or just a few security capabilities, even for basic authentication and encryption. Common security algorithms rely on random numbers. However, Random Number Generator is not usually part of standard functions in programmable Logic Controllers, the core control component in Industrial Control Systems. In Industrial Control Systems, the Random Number Generator is mostly implemented as a software-based Pseudo Random Number Generator. This paper shows how to apply a Pseudo Random Number Generator in a Siemens Compact PLC S7-1200 using a modified lightweight XORshift algorithm. The XORshift algorithm can generate better randomness than the system’s clock-based implementation in the Siemens Library of Generic Functions.
The rise of blockchain technology and smart contracts has brought widespread attention due to their capacity to transform multiple industrial sectors through decentralized, transparent, secure transactions. However, d...
The rise of blockchain technology and smart contracts has brought widespread attention due to their capacity to transform multiple industrial sectors through decentralized, transparent, secure transactions. However, despite their promise to revolutionize various fields worldwide, lingering concerns regarding security risks impede their adoption rate. Addressing these concerns is crucial now more than ever; therefore, we conducted a comprehensive literature review within our study's scope that focused on published papers between 2014-2023 centered around security risks concerning blockchain and smart contracts. Our systematic approach using the PRISMA checklist analyzed nine categorized research model-based primary studies while recognizing vulnerabilities in smart contract development and providing best practices to mitigate such issues. These findings benefit both researchers and practitioners as they showcase how acknowledging these vulnerabilities can further develop into exploring more significant aspects of blockchain technology's security issues and smart contract development processes. Our study contributes significantly by expanding knowledge in this field while providing novel insights valuable for individuals involved in designing or implementing blockchain technologies.
Content based recommendation system tries to recommend items similar to those a given user has likely in the past, whereas systems designed according to the collaborative recommendation paradigm identify users whose p...
详细信息
Humans are basically curious creatures. We always look for all the latest information through books or news. News usually contains tags or categories to make it easier to find similar news. It can be done manually by ...
Scrum is widely used to manage application development, including third-party vendors. There are some problems when third-party vendor using scrum such as communication challenges, lack of control, and lack of trust. ...
详细信息
Scrum is widely used to manage application development, including third-party vendors. There are some problems when third-party vendor using scrum such as communication challenges, lack of control, and lack of trust. Therefore, we proposed new model of distributed scrum using Scrum of Scrum and Holonic view to manage an application development project in third party vendors. In this study we created 3 model, Scrum Team Model, Meeting Coordination Model, and Product Backlog Model. In this study it has been shown that the Distributed scrum method is better than waterfall method as a result of the project’s success based on scope, time, and cost aspects. Based on the comparison result, it is found that the Cost Performance Index (CPI) and the Schedule Performance Index (SPI) value of the waterfall approach project is smaller than the Distributed scrum approach project as well as the change request issued by the Distributed scrum project resulting is less than the waterfall project.
As the executor of the transfer of civil servants, BKD (Badan Kepegawaian Daerah) is required for professionals in carrying out their duties in mutation positions for civil servants. This study implements a mutation s...
详细信息
暂无评论