Following the evolution of technology, researchers have conducted several studies to propose reliable scholarship recommender systems. However, few have explored the data storage systems, which are highly beneficial t...
详细信息
Monitoring of vehicle conditions is needed as one of the securities in driving because one of the accident rates is negligence in checking the condition of the vehicle. This study aims to help reduce the level of acci...
详细信息
This study introduces the system submitted to the SemEval 2022 Task 11: MultiCoNER (Multilingual Complex Named Entity Recognition) by the UC3M-PUCPR team. We proposed an ensemble of transformer-based models for entity...
详细信息
Geospatial data come from various sources, such as satellites, aircraft, and LiDAR. The variability of the source is not limited to the types of data acquisition techniques, as we have maps from different time periods...
详细信息
This study examines the pivotal role of red teaming within the context of cybersecurity drill tests, focusing on its contribution to enhancing Indonesia's cyber defenses. Through a detailed analysis, this research...
详细信息
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. ...
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. This study explores IDOR vulnerabilities found within Android APIs, intending to clarify their inception while evaluating their implications for application security. This study combined the qualitative and quantitative approaches. Insights were obtained from an actual penetration test on an Android app into the primary reasons for IDOR vulnerabilities, underscoring insufficient input validation and weak authorization methods. We stress the frequent occurrence of IDOR vulnerabilities in the OWASP Top 10 API vulnerability list, highlighting the necessity to prioritize them in security evaluations. There are mitigation recommendations available for developers, which recognize its limitations involving a possibly small and homogeneous selection of tested Android applications, the testing environment that could cause some inaccuracies, and the impact of time constraints. Additionally, the study noted insufficient threat modeling and root cause analysis, affecting its generalizability and real-world relevance. However, comprehending and controlling IDOR dangers can enhance Android API security, protect user data, and bolster application resilience.
This research delves into enhancing local area power stability by integrating battery energy storage systems (BESS) with photovoltaic (PV) systems to address and accelerate the damping of post-fault oscillations follo...
详细信息
ISBN:
(数字)9798331518646
ISBN:
(纸本)9798331518653
This research delves into enhancing local area power stability by integrating battery energy storage systems (BESS) with photovoltaic (PV) systems to address and accelerate the damping of post-fault oscillations following short-circuit disturbances within power grids incorporating variable renewable energy sources. Focused on implementing a power oscillation damping (POD) mechanism within PV plants, this study aims to mitigate post-fault oscillations effectively within a specified timeframe. The proposed POD within the PV plant is strategically designed to augment the grid's resilience by supplying additional active and reactive power in response to system demands post-disturbance. The integration of a 25 MW BESS has demonstrated a significant enhancement in the system's recovery speed, reducing oscillation duration from 60 seconds to 45 seconds. Moreover, a configuration with double PV systems and a 50 MW BESS further reduced the oscillation duration to 42 seconds. Utilizing PSCAD software, this study presents an innovative approach to visualize the system's behavior post-short-circuit disturbances, confirming the efficacy of BESS integration in improving system stability and reliability. These results pave the way for further exploration of optimal BESS sizing and placement strategies to maximize grid resilience.
In this era, people often overeat, make parties or events, where there are excessive availability of food. As well as shops or restaurants that sell food, has ready-to-eat foods that only lasts one day and then treate...
详细信息
The volatile behavior of Bitcoin's price, especially during its halving periods, poses considerable obstacles for forecasting and decision-making in cryptocurrency trading. This paper presents a novel method that ...
详细信息
The volatile behavior of Bitcoin's price, especially during its halving periods, poses considerable obstacles for forecasting and decision-making in cryptocurrency trading. This paper presents a novel method that combines application fuzzy logic with Bollinger Bands to improve trading decision-making in times of high market volatility. This study conducted an experiment utilizing three fuzzy logic controllers and Bollinger Bands (BB) to determine the strength of buy, hold, and sell signals. This dataset includes the initial and final prices that are used to calculate the BB. The raw and computed values serve as the precise input parameters for the Fuzzy Inference System (FIS). The membership functions were categorized into four levels: very low, low, high, and very high, based on the input default settings utilized by traders. Rulesets were created using fuzzy logic to produce signals that indicate the level of strength of a trading advice. This study evaluate the effectiveness of this hybrid method in comparison to the traditional utilization of the Bollinger Band only indicator and Moving Average Convergence Divergence (MACD) indicator, which is widely favored by traders to identify possible market fluctuations. This methodology involves creating a trading simulation that is based on past Bitcoin halving events. The objective is to assess the efficacy of these strategies in managing heightened volatility. The application of fuzzy logic with the Bollinger Bands model yielded a success rate of 92.47% while analyzing 93 daily data points from the previous Bitcoin halving event on May 11, 2020.
Vigenère encryption algorithm is a classical cryptographic algorithm featuring a polyalphabetic stream cipher, which as numerous limitations pertaining to finding the size and length of the encryption key. This s...
详细信息
ISBN:
(数字)9798331506407
ISBN:
(纸本)9798331506414
Vigenère encryption algorithm is a classical cryptographic algorithm featuring a polyalphabetic stream cipher, which as numerous limitations pertaining to finding the size and length of the encryption key. This study presents the process of enhancing the Vigenère algorithm using 6S-substitution and 2S-transposition techniques with the novelty of accommodating a 103-character set based on the selected ASCII and Unicode characters. It adopts the three-security metrics such as the degree of diffusion, degree of confusion, and integrity check for measuring the security level. Experiment results showed that the enhanced Vigenère algorithm produced more secure ciphertexts. Using PHP, the proponents tested and simulated ten (10) data sets to ensure the consistency of the results at each security level. The results exhibited a vigorous outcome starting the degree of diffusion output, the original Vigenère yields 1.8% while the enhanced Vigenère obtains 68.75% with an increase of 66.95%. Secondly, the result in the degree of confusion test, the former algorithm results in 1.88%, on the other hand, the latter obtains 53.39% with an increase of 51.51%. In the integrity check, the former gets 2.42% while the latter advances to 57.11%, increasing 54.69%. Thus, it is evident that the test result for the Enhanced Vigenère has a higher percentage than the original Vigenère in providing better security in the ciphertext and improving the overall encryption and decryption processes.
暂无评论