The goal of combining the robustness of neural networks and the expressivity of symbolic methods has rekindled the interest in Neuro-Symbolic AI. One specifically interesting branch of research is deep probabilistic p...
详细信息
In the digital era, the demand for quick access to goods (q-Commerce) has driven retail companies to develop online shopping applications, aiming to attract more consumers. To cater to the demands of q-Commerce, speci...
详细信息
This study investigates the impact of digital emotional intelligence (DEI) on the achievement needs of Generation Z in Jakarta, with a focus on the interplay between digital self-awareness and digital relationship man...
详细信息
The economy is one of the determinants of how a person can live their life. In this current economic situation, inflation occurs everywhere, causing the prices of necessities to rise. In order to have a decent life, p...
详细信息
This study explores the efficacy of Instagram's augmented reality (AR) features in enhancing brand awareness and electronic word-of-mouth (e-WOM) within Indonesia's bottled tea industry. The research uses a cr...
详细信息
CsSnI3 is widely studied as an environmentally friendly Pb-free perovskite material for optoelectronic device applications. To further improve material and device performance, it is important to understand the surface...
详细信息
CsSnI3 is widely studied as an environmentally friendly Pb-free perovskite material for optoelectronic device applications. To further improve material and device performance, it is important to understand the surface structures of CsSnI3. We generate surface structures with various stoichiometries, perform density functional theory calculations to create phase diagrams of the CsSnI3 (001), (110), and (100) surfaces, and determine the most stable surfaces under a wide range of Cs, Sn, and I chemical potentials. Under I-rich conditions, surfaces with Cs vacancies are stable, which lead to partially occupied surface states above the valence band maximum. Under I-poor conditions, we find the stoichiometric (100) surface to be stable under a wide region of the phase diagram, which does not have any surface states and can contribute to long charge-carrier lifetimes. Consequently, the I-poor (Sn-rich) conditions will be more beneficial to improve the device performance.
This research paper analyzes the Air Pollution Standard Index (APSI) in Jakarta, Indonesia, using the Random Forest Classifier (RFC). The study aims to predict the APSI level in Jakarta based on the concentrations of ...
详细信息
Managing data has changed significantly because of cloud computing, which offers scalabe, flexible and reasonably priced solutions to enterprises and to people as well such as Amazon, Google, and Microsoft expanding t...
详细信息
ISBN:
(数字)9798350364910
ISBN:
(纸本)9798350364927
Managing data has changed significantly because of cloud computing, which offers scalabe, flexible and reasonably priced solutions to enterprises and to people as well such as Amazon, Google, and Microsoft expanding their infrastructure to meet the demand from the customer. With such advantages there will also be disadvantages such as security problems. This paper will discuss about security problems such as encryption, access control, multi-factor authentication, regular audits, secure configurations, incident response planning. This paper will also talk about security measures to deal with threats such as malicious insiders, data abuse, unsecured interfaces and APIs, shared technology complications, data loss or leakage, hijacking, and enigmatic risk profiles. This study examines and evaluates a range of cloud computing security concerns and issues through a systematic analysis of the literature. The goal of the research is to raise public awareness of the need for cloud computing security and to offer possible remedies. Identify and classify network security threats and vulnerabilities in cloud computing by doing an extensive examination of the body of research and empirical investigations is one of the answer to the questions from the paper. In the end, this take a look at unearths vulnerabilities and their practical implications through very well reading network safety in cloud computing.
There are many cases where borrowed money by debtors is not returned. It is because the company misjudged in determining the risk of lending. Thus, debtors cannot repay their debts and end up in losses on the company&...
详细信息
The present study examines how organizational work environments affect employee turnover at Delmon Poultry Company. The researcher used a structured questionnaire and a quantitative approach to collect data from 340 e...
详细信息
暂无评论