A cloud quantum computer is a quantum computer that can be accessed in a cloud environment through a network. Today, there are numbers of cloud quantum computing services that can be accessed by users. They are used t...
详细信息
A cloud quantum computer is a quantum computer that can be accessed in a cloud environment through a network. Today, there are numbers of cloud quantum computing services that can be accessed by users. They are used to solve complex problems that require powerful computing. Different cloud quantum computing services deliver different architecture and performances. In our study, we conducted a research on some services to test and evaluate the performances of different cloud quantum computing services and make a comparison out of it. The test will be conducted using two different methods such as visual programming and qiskit. From the result, we can see that the amount of qubit per backend and shots per run pretty much affect the execution time of a cloud quantum computing. This test will give the users some insight and enables them to decide which cloud quantum computing services deliver better performance or faster execution time based on the specification each cloud quantum computer offers.
Now in the era of big data, many are applying information methods accurately especially by social media. The aims of this study to classify the weather based on Twitter automatically using text mining by using Support...
详细信息
Now in the era of big data, many are applying information methods accurately especially by social media. The aims of this study to classify the weather based on Twitter automatically using text mining by using Support Vector Machine (SVM), MultinomialNaive Bayes (MNB), and Logistic Regression (LR) method. The experimental results show that SVM substantially outperforms various other machine learning algorithms for the task of text classification with an accuracy value of 93%. This result proves that SVM is very suitable for text categorization. We use clustering technique to read the pattern in customers’ opinion about the restaurant based on some measurement variables.
Improving the quality of information technology-based higher education institutions is a must to realizing a transparent, accountable and professional education system and refers to the achievement of higher education...
详细信息
Sarcasm is the use of words usually used to either mock or annoy someone, or for humorous purposes. Sarcasm is largely used in social networks and microblogging websites, where people mock or censure in a way that mak...
详细信息
This study aims to analyze the comparison of the academic result of the EA447 Managerial Accounting course using offline and online learning at the Management and Accounting undergraduate study program during 10 semes...
详细信息
ISBN:
(纸本)9781450398091
This study aims to analyze the comparison of the academic result of the EA447 Managerial Accounting course using offline and online learning at the Management and Accounting undergraduate study program during 10 semesters of the 2016-2020 academic years at Indonesia Persada University-Jakarta. This study uses simple descriptive statistics to analyze the pass rate, failure rate and eligibility rate to take the final semester exam. The data is taken from the academic section of the institution in the form of student scores based on offline learning before the covid-19 pandemic, namely the odd semester 2016/17, 2017/18, 2018/19 and 2019/20, and 2019/20 and the academic year in online learning during the covid19 pandemic in the even semester 2019/2020, and the 2020/2021 school year. The results of this study indicate that the graduation rate is high, the failure rate is low, and the eligibility rate for taking the final semester exam is lower in online learning outcomes than offline learning outcomes. This finding implied to provide references in applying offline and online learning for the Management and Accounting undergraduate study program at the university.
This research explores the vital role of penetration testing in cybersecurity, specifically its alignment with ISO 27001:2022, COBIT 2019, and NIST CSF standards in the context of crypto asset exchange management. The...
This research explores the vital role of penetration testing in cybersecurity, specifically its alignment with ISO 27001:2022, COBIT 2019, and NIST CSF standards in the context of crypto asset exchange management. These sectors grapple with rapidly evolving threat landscapes, necessitating robust cybersecurity strategies. However, the integration of penetration testing with these standards remains underexamined. Through a comprehensive approach, including literature reviews, surveys, case studies, and interviews, this study investigates the incorporation of penetration testing into an organization's cybersecurity. It unveils the current state of penetration testing practices, interprets ISO 27001:2022, COBIT 2019, and NIST CSF perspectives, and pinpoints integration challenges and opportunities. This study offers practical insights and best practices for integrating penetration testing into cybersecurity frameworks by emphasizing alignment. It underscores the importance of aligning penetration testing with information security standards in the crypto asset exchange management sector, enhancing security, proactively identifying vulnerabilities, and effectively mitigating risks in the context of growing crypto asset importance. This research provides invaluable guidance for safeguarding digital assets in this evolving domain.
The development of the internet is getting faster, participating in encouraging the emergence of new and innovative information. In filtering the various information that appears, we need a recommended system to perfo...
详细信息
The development of the internet is getting faster, participating in encouraging the emergence of new and innovative information. In filtering the various information that appears, we need a recommended system to perform well for users in today's internet era. A well-performing recommendation system in question is a reliable recommendation algorithm. This algorithm is fundamental to analyzing various information, such as responses on social media based on user behavior data related to the topic of COVID. This data is crawled from tweets on social media Twitter. The data analysis algorithm obtained uses Python, which is then visualized in the form of a diagram. The processed data is user comments on Twitter, and the text data is analyzed using Python, using more than 60000 data sets taken to form visualizations and conclusions. From sentiment analysis, polarity and subjectivity data are obtained to be analyzed, which are negative, neutral, or positive. The result is show positive tweets with 29.2%, negative tweets is 13%, and 57.8% neutral tweets. Lastly, sentiment analysis can help people effectively infer vast and complex data from social media like Twitter.
The development of the internet made new problems within the scope of copyright. The internet is used to download copyrighted content and use it without permission from the creators. The legal protection of copyright ...
详细信息
Nowadays, every company knows that when making a decision that has a potential in affecting their assets, an accurately processed report is necessary in order to support the reasoning behind their decision. Generating...
详细信息
Blockchain has become a mainstream technology in our society in recent years. With its nature of secure decentralization, people can create decentralized applications by developing smart contracts on top of a blockcha...
详细信息
ISBN:
(纸本)9781450388962
Blockchain has become a mainstream technology in our society in recent years. With its nature of secure decentralization, people can create decentralized applications by developing smart contracts on top of a blockchain platform. With blockchain, technology is still in the developing phase, the smart contract development process in blockchain has its unique complexity and uncertainty. The condition will drive the challenge for any developers to work on this issue. In this research, we determine the smart contract development model in creating decentralized applications. Our proposed model aligned with our findings in the systematic mapping process of this study.
暂无评论