This paper is collaboration between BMKG and the University of Mataram to mitigate land slide. For this study using light intensity sensors, air temperature sensors, voltage sensors, current sensors, humidity sensors....
This paper is collaboration between BMKG and the University of Mataram to mitigate land slide. For this study using light intensity sensors, air temperature sensors, voltage sensors, current sensors, humidity sensors. This research is on a laboratory scale with a soil slope of 10 degrees, dry soil with a tendency to split (clay) from brittle volcanic rocks. The initial conditions were without rain, then the soil was burdened with rain in low (drizzle), medium (25mm/h) and high (55mm/h) capacities. The second condition of the stage is given a vibration which is a model of the earthquake evenly on that stage. Soil Moisture soil, soil temperature, 3 pieces of vibration sensor switch, piezo electric vibration sensor. The initial height of the soil is 36.78 cm with a width of 79.35cm after being rained for 90 minutes, the final height is 29.93 and 60.25 cm, widening receding to the right and left sides.
For dealing with traffic bottlenecks at airports, aircraft object detection is insufficient. Every airport generally has a variety of planes with various physical and technological requirements as well as diverse serv...
详细信息
Inundating a system, network, or application with traffic is the goal of Denial of Service (DoS) attacks, a disruptive form of attack. SSL DoS attacks, particularly those involving renegotiation, are of particular con...
Inundating a system, network, or application with traffic is the goal of Denial of Service (DoS) attacks, a disruptive form of attack. SSL DoS attacks, particularly those involving renegotiation, are of particular concern. In order to address these types of attacks, the study proposes several security measures, including rate restriction, session caching, SSL acceleration, and integrating Intrusion Detection Systems (IDS) with a systematic technique method to reduce the risks associated with SSL renegotiation DoS attacks. This study investigates the security measures for preventing and mitigating SSL DoS attacks, with a focus on renegotiation attacks. It offers advice and insights for protecting systems to SSL server administrators and network security professionals by doing rate restriction, session caching, and SSL acceleration to avoid SSL DoS attacks.
Spam filters have become an important tool for ISP(Internet service Provider) to address the growing spam in cyberspace. Spam filtering is a program used to detect spam, prevent it and enter users' mailboxes. With...
详细信息
Light detection and ranging (LiDAR) provides geospatial information with massive amounts of data to use in a variety of applications. Canopy cover percentage of tree crown is one application that is estimated through ...
详细信息
Cancer is still one of the most devastating diseases of our time. One way of automatically classifying tumor samples is by analyzing its derived molecular information (i.e., its genes expression signatures). In this w...
详细信息
Photometric stereo recovers the surface normals of an object from multiple images with varying shading cues, i.e., modeling the relationship between surface orientation and intensity at each pixel. Photometric stereo ...
详细信息
This research is about smooth support vector machine (SSVM) and Decision Tree in data mining. Many researchers conduct and develop methods to improve the accuracy and classification of data on good results. This resea...
详细信息
Bitcoin has become a commodity traded by millions of traders from all over the world. This is one of the causes of fluctuating price movements. From the data we got on coinmarketcap, Bitcoin is traded on various crypt...
Bitcoin has become a commodity traded by millions of traders from all over the world. This is one of the causes of fluctuating price movements. From the data we got on coinmarketcap, Bitcoin is traded on various cryptocurrency trading exchanges. And at every exchange that has a reputation, of course, has an API service to access historical data about the price movements of all the crypto commodities they have traded from the start. By using the PHP programming language and implementation of the CURL function for JSON readings, we can pull Bitcoin movement data in real time. In this paper, Bitcoin is specifically observed because it is the forerunner and the main cryptocurrency commodity traded and is a determinant of Alternative coin price movements in general. In this paper Bitcoin price monitoring is carried out at 30 reputable exchange places through API access provided by each exchange place. Furthermore, conclusions are drawn about the various variants of how to access the API from the 30 bitcoin exchange places. The program code that is displayed directly in this paper can then be used as an initial reference if you want to develop a Cryptocurrency price movement monitoring application for Bitcoin. At the end of the paper, an example of the application of Bitcoin price monitoring will be presented using a web-based application containing charts and supporting indicators as well as a telegram bot to display price depth charts.
Indonesia meets the needs of 50% of the world's palm oil needs. Sources of Indonesian palm oil, 34 % are produced by independent smallholders. The lack of governance of independent smallholders leads to low produc...
Indonesia meets the needs of 50% of the world's palm oil needs. Sources of Indonesian palm oil, 34 % are produced by independent smallholders. The lack of governance of independent smallholders leads to low productivity of their crops. Global market demands for palm oil derivative sources become an obligation to compete. The development of blockchain technology that favors traceability and transparency is applied in the supply agriculture sector, and this is an opportunity for how blockchain technology can help the palm oil supply chain become transparent and can find its source. This research uses the system development life cycle (SDLC) method. And business process model and notation in business model design. The results of the design of the FFB sale and purchase transaction system with blockchain technology have succeeded in connecting farmer transactions as FFB providers with traders and PKS as FFB buyers. Every transaction sent by the farmer will be locked by a hash, as immunity makes the data sent immutable. The system can display the traceability of transactions while maintaining the integrity of member information.
暂无评论