In recent years, the COVID-19 pandemic has become one of the most crucial scientific issues in the world, and efforts to eradicate the disease are still ongoing. The acute inflammatory reaction associated with this di...
详细信息
In recent years, the COVID-19 pandemic has become one of the most crucial scientific issues in the world, and efforts to eradicate the disease are still ongoing. The acute inflammatory reaction associated with this disease is associated with several complications such as cytokine storm, multiple organ damage, lung fibrosis, and blood clots. PTX3, as part of the humoral innate immune systems, is one of the acute-phase proteins that perform various functions, such as modulating inflammation, repairing tissue, and recruiting immune cells. PTX3 is increased in people with SARS-CoV-2, and its level decreases with proper treatment. Therefore, it can be regarded as a suitable marker for the prognosis of the COVID-19 and evaluating the effectiveness of the treatment method applied. However, some studies have shown that PTX3 can be a double-edged sword and develop tumors by providing an immunosuppressive environment.
A system for automatic detection of road damages is essential for logistics management. At the core of the system lies an algorithm for classification of damages. This work intends to establish such an algorithm. In t...
A system for automatic detection of road damages is essential for logistics management. At the core of the system lies an algorithm for classification of damages. This work intends to establish such an algorithm. In the current proposal, the algorithm receives data of the probe vehicle rate of rotations, extracts statistics descriptive from the data to produce a feature vector, and finally, feeds the vector to a simple-three-layer neural network to classify the damages. The types of damages are limited to four cases: normal, pothole, speed bump, and expansion joint. For the development, a probe vehicle is used to produce 400 empirical data involving those four damage cases. By using Monte Carlo approach, the established neural network model is evaluated. The results show that the approach is able to classify the cases with 85% accuracy. The study also finds that the rates of pitch and roll to be the determining factors.
Decision support model (DSM) is familiarly applied in a lot of areas and issues. The model is commonly benefited by decision maker to solve semi / unstructured problems. One of them should be used to treat medical was...
Decision support model (DSM) is familiarly applied in a lot of areas and issues. The model is commonly benefited by decision maker to solve semi / unstructured problems. One of them should be used to treat medical waste by considering six selected parameters and three decision alternatives. In this study, environmental issue is main concerned aspect that the constructed model consequently becomes ecological DSM (eco-DSM). Three main methods are operated to construct the model; they are fuzzy logic, Euclidean distance, and full-factorial optimization methods. The model is analysed and designed via object oriented method. Lastly, the study shows simulation results based on empirical data of medical waste from one class 'A' state hospital in Jakarta, Indonesia.
Numerous efforts have been reasonably done to eliminate the road traffic congestion, however it occurs every working day, particularly in metropolitan. This study positively proposed a model which is not only able to ...
Numerous efforts have been reasonably done to eliminate the road traffic congestion, however it occurs every working day, particularly in metropolitan. This study positively proposed a model which is not only able to show the effect of road traffic congestion ecologically, but also can recommend the strategy for road traffic engineering with methodically elaborating the environmental attributes as a dominant aspects considered. It is called as ecological decision support model (eco-DSM). To construct the model, two main methods were operated and combined: fuzzy logic and water flow algorithm (WFA). The method fuzzy logic exploited to exterminate the bias facet on parameters, and the WFA utilised to model the road traffic congestion and vehicle flow and to optimize its velocity based on emission calculation. The constructed model itself was designed thru the method object oriented, and the empirical road traffic congestion data of the Juanda Street in Tangerang Selatan city were functioned. Finally, the model showed the simulation result for suggesting the best decision alternative for road traffic engineering.
As a company which relates its customer service, a software company (this case is PT Boon Software) is induced to give the good service to its customer. The existing information technology (IT) system service is made ...
As a company which relates its customer service, a software company (this case is PT Boon Software) is induced to give the good service to its customer. The existing information technology (IT) system service is made by patchwork. It brings some problems in service catalog, problem managment, change management, and service level agreement (SLA). The purpose of this research is to implement helpdesk system to software company with information Technology Infrastructure Library (ITIL) framework as a standard reference to solve various problem related information technology service on a company. This research starts by investigation all stakeholders of the company with some questionnares. Implementation ITIL is strated by finding the gap between the current condition and the standard base line in ITIL. After implementation IT service using ITIL, the stakeholders are asked the same questionnares. The result shows that there is significant different before and after implementing system service using ITIL.
In its development, information technology has become an important in people's everyday lives. Security and confidentiality of the data on computer networks today become a very important issue and continues to gro...
In its development, information technology has become an important in people's everyday lives. Security and confidentiality of the data on computer networks today become a very important issue and continues to grow. Some of the cases relating to computer network security today become a job that requires handling fee and security has been tremendous. Vital systems, such as the defense system, the banking system, the hospital system, and other systems, requires such a high level of security. This is mainly due to the advancement of the field of computer networks with the concept of open system so that anyone, anywhere and at any time, have the opportunity to access these vital areas. To maintain the security and confidentiality of messages, data, or information in a computer network would require some encryption to create messages, data, or information that is not read or understood by any person, except for eligible recipients.
File security is very important in maintaining the confidentiality of the information contained in the file. For that we need a way for information to be kept secrecy, that is with the science of cryptography. Cryptog...
File security is very important in maintaining the confidentiality of the information contained in the file. For that we need a way for information to be kept secrecy, that is with the science of cryptography. Cryptography is one method that disguises data to form encrypted data. In the symmetric RC4+ (Ron Code or Rivest's Cipher) algorithm, it provides secure message security and is an efficient stream cipher. RC4 NGG stream cipher algorithm 3-5 times faster than RC4 algorithm and but still have weakness in KSA randomization. The RC4 GGHN stream cipher algorithm is based on the RC4 algorithm and is relatively more efficient but still has weaknesses. Based on literature review from several research sources, it was stated that RC4+, RC4 NGG, RC4 GGHN are algorithms that are faster and more efficient than RC4 algorithm. Therefore, it is necessary to compare the encryption process with the aim of comparing and knowing which algorithm is better from running time and algorithm complexity. In this research we will perform two tests on each algorithm, image encryption using different key length and same image size and image encryption using the same key length and different image size. The results obtained in this research is RC4 NGG algorithm is the fastest algorithm between the three algorithms that is 13.3% faster than RC4+ and 10.2% faster than RC4 GGHN where the key lengths used in encryption do not affect the processing time and image size used in encryption very affects the processing time.
It is the key successful factors for the manufacture industry that create and select the key parameters in product design to match customer requirements in multimedia. Previous literature studies are focused on the de...
详细信息
Hybrid cryptosystem combines symmetric algorithms and asymmetric algorithms. This combination utilizes speeds on encryption/decryption processes of symmetric algorithms and asymmetric algorithms to secure symmetric ke...
Hybrid cryptosystem combines symmetric algorithms and asymmetric algorithms. This combination utilizes speeds on encryption/decryption processes of symmetric algorithms and asymmetric algorithms to secure symmetric keys. In this paper we propose hybrid cryptosystem that combine symmetric algorithms VMPC and asymmetric algorithms RSA – CRT optimization. RSA – CRT optimization speeds up the decryption process by obtaining plaintext with dp and p key only, so there is no need to perform CRT processes. The VMPC algorithm is more efficient in software implementation and reduces known weaknesses in RC4 key generation. The results show hybrid cryptosystem RSA – CRT optimization and VMPC is faster than hybrid cryptosystem RSA – VMPC and hybrid cryptosystem RSA – CRT – VMPC. Keyword : Cryptography, RSA, RSA – CRT, VMPC, Hybrid Cryptosystem.
Ngesti Pandowo is a wayang orang (traditional Javanese theatre) company, which is trying to preserve this art form. There are many ways to do this. One of them is by utilizing technology to carry out promotion and tic...
详细信息
ISBN:
(纸本)9781538639481
Ngesti Pandowo is a wayang orang (traditional Javanese theatre) company, which is trying to preserve this art form. There are many ways to do this. One of them is by utilizing technology to carry out promotion and ticket sales online. Financial technology is an innovation in the field of finance employing modern technology to make financial transactions more practical, easy and secure.
暂无评论