The foreign currency exchange rate against the rupiah in the Odoo ERP framework system accommodates multi-currencies. However, Odoo has not updated the rupiah exchange rate based on the value from Bank Indonesia regul...
详细信息
The increasing data volume given by the exponential growth of digital devices, cloud platforms, and the Internet of Things (IOT) had become an attractive target for attackers. This makes the search for innovative defe...
The increasing data volume given by the exponential growth of digital devices, cloud platforms, and the Internet of Things (IOT) had become an attractive target for attackers. This makes the search for innovative defense mechanisms intensified leading to a renewed focus on the utilization of honeypots to improve data security. This Systematic Literature Review (SLR) examines the usage and contributions of honeypots in data security field across diverse sectors and environments. Analyzing 38 selected articles from 2018 to 2023, the study highlights the growing adoption of honeypots as tools for detecting and preventing data breaches, exfiltration, and other security incidents. Our finding found that honeypots, with their deceptive capabilities, have proven could be deployed in sectors like healthcare, cloud computing, and industrial control systems and effective in detection and prevention data breaches, exfiltration, and other data breaches, making them as a crucial tool in the data security protection. The future of honeypots lies in their integration with machine learning and AI, to predict and counteract sophisticated. Moreover, evolving honeypots into tools for deterrence and corrective action opens new avenues for cybersecurity strategies. Their ability to act as deterrents by increasing perceived risks for attackers, coupled with their role in aiding recovery from data breaches through detailed forensic analysis, positions honeypots as a cornerstone in the development of resilient data security frameworks. This study paves the way for a more adaptive, proactive, and comprehensive approach to data security, highlighting the indispensable role of honeypots in the ever-evolving landscape of cybersecurity.
Forced phonetic alignment (FPA) is the task of associating a given phonetic unit to a timestamp interval in the speech waveform. Phoneticians are able mark the boundaries with precision, but as the corpus grows it bec...
详细信息
In today's digitalization era, asset management has evolved following the rapid adoption of information systems and digital technologies. In the maintenance phase of the asset, Digital Twin (DT) emerges as an effe...
详细信息
In today's digitalization era, asset management has evolved following the rapid adoption of information systems and digital technologies. In the maintenance phase of the asset, Digital Twin (DT) emerges as an effective approach to improve failure recognition and structural damage prediction through DT-driven Prognostic and Health Monitoring (PHM). As a result, DT allows asset manager to proactively plan maintenance strategy to improve the availability of the assets. However, to reduce asset downtime in a cost-effective and time efficient manner, DT for maintenance phase needs to be integrated with other software systems that manage the provision of maintenance service and spare part such as computerized maintenance management system (CMMS) or Enterprise Resource Planning (ERP). Nevertheless, many of the developed DT in PHM were not equipped with semantic data model and hence, lacks interoperability with other systems (e.g., other DT or non-DT system) and limits the effective use of the DT. To qualify as an effective DT, it needs a semantical-enabled interface to connect with data and models from various domain to enable DT-driven decision-making. This paper leverages a rule-based ontology reasoning model to enhance DT interoperability with other maintenance software systems. The results depicts that the developed model paves a way for an effective use of DT-driven system in asset maintenance management.
YouTube is a widely-used platform in Indonesia, with 93.8% of its users. As such, it presents a valuable opportunity for marketing tourist destinations, particularly in Riau province, which aims to become Indonesia...
详细信息
This empirical study involved volunteers who played a game featuring NPCs specially developed for the research. The research investigated the influence and behaviour of NPC appearance on some factors regarding the pla...
This empirical study involved volunteers who played a game featuring NPCs specially developed for the research. The research investigated the influence and behaviour of NPC appearance on some factors regarding the players. Results suggest that NPC appearance can significantly affect the player’s emotions, immersion, perception, and decision-making. Poorly dressed NPCs negatively influenced the player’s emotional state, while well-dressed NPCs generated higher trustworthiness and positively influenced the player’s decision-making. This study may help develop more efficient strategies for creating characters that influence the player’s decision-making in video games and encourage the development of new research in the field of human-agent interaction and game development.
This work demonstrates the development of a prototype system that could improve urban and digital accessibility for People with Disability - PwD. The research involves using an academic questionnaire to enable a wider...
详细信息
ISBN:
(数字)9798350362053
ISBN:
(纸本)9798350362060
This work demonstrates the development of a prototype system that could improve urban and digital accessibility for People with Disability - PwD. The research involves using an academic questionnaire to enable a wider perspective of the central subject and assessing the effectiveness of the proposed solution. The main goal is to help social integration and make the future solution implementable for smart cities through an experiment in an academic campus. The dissertation is related to technological and social issues that might be used as a resource by researchers, public or private bodies interested in more profound studies. The document recognizes the lack of studies on this subject, especially in Brazil because there are few available articles. The prototype system is designed to tackle the issues faced by persons with disability in urban settings through platforms, applications and mobile phones as it proposes a comprehensive set of solutions when addressing accessibility for PwDs. In turn, this research fosters knowledge advancements in the field of urban accessibility and provides vital recommendations for developing inclusive technologies and policies.
Chess is a popular game among many people worldwide and is frequently played online. Although players are ranked based on existing rating systems, automation is essential for coordinating matches in tournaments with t...
详细信息
Chess is a popular game among many people worldwide and is frequently played online. Although players are ranked based on existing rating systems, automation is essential for coordinating matches in tournaments with thousands of participants. In this study, we analyzed the game records of highly skilled chess players and determined appropriate ratings for players without ratings by using a decision tree model. It was determined that high-rated and low-rated players could be identified with accuracy levels above 80%, even for players who were not included at the time of model training.
Many patients with leukoaraiosis (LA) exhibit mild and difficult-to-detect symptoms in the early stages, and due to the lack of effective detection methods, the optimal timing for treatment is often missed. This not o...
详细信息
Universities can employ information technology as one means of achieving their goals and objectives. Universities can get advantages from information technology, such as effective resource management and information m...
Universities can employ information technology as one means of achieving their goals and objectives. Universities can get advantages from information technology, such as effective resource management and information management for decision-making. However, don't forget that the campus must consider what technology is appropriate to assist them achieve their goals, particularly in the current industrial era 4.0 where technology is available with many different choices. The campus requires an enterprise architecture in order to design, manage, and coordinate information technology infrastructure, applications, and processes strategically and thoroughly. The adoption of enterprise information system architecture (EA) is also intended to improve the quality of services provided to internal and external stakeholders. In this case, Enterprise Architecture can help an organization to match its information technology resources with business processes and strategies to achieve their goals. This research was conducted using TOGAF ADM, also known as the Open Group Architecture Framework Architecture Development Method. This method offers best practices for creating enterprise architecture and emphasizes several steps that include creating an architectural vision, information systems, business architecture modeling to help XYZ campus manage all their information technology.
暂无评论