In daily banking customer queues, unknown waiting-time could lower customer experience. Little's Law formula in Queue Theory provides a generic formula for waiting-time, but it cannot be implemented directly to gi...
详细信息
Next-Generation Sequencing (NGS)-based genomics data have a huge potential to be used in transcriptomic profiling of Nasopharyngeal Carcinoma (NPC) to study the biosynthesis mechanism behind it. The high dimensionalit...
Next-Generation Sequencing (NGS)-based genomics data have a huge potential to be used in transcriptomic profiling of Nasopharyngeal Carcinoma (NPC) to study the biosynthesis mechanism behind it. The high dimensionality of NGS data is the main challenge in performing the data analysis to extract useful information. In this workflow pipeline, memory-efficient Linux-based software such as HISAT2 and HTSeq are utilized to process the raw NGS data. Furthermore, Differential Expression Gene (DEG) list can be obtained by performing advanced analysis to the aligned Ribonucleic Acid (RNA) sequence using the edgeR protocol. This DEG list is one of the main inputs of biological pathway analysis that can be done in DAVID and PANTHER web-based software. Both tools generate a different pathway result related to inflammation.
The problem with telecommunications companies today is that transactional data is more extensive than existing source tables. This makes business reporting less efficient and overwhelms query processing results in dat...
详细信息
Every organization must ensure that information assets are protected and information security system has been implemented well. PT. IndoDev Niaga Internet is a provider of business solutions applications and implement...
详细信息
In this study, an analysis of the Web security system from a Denial-of-Service Attack (DoS) with SYN Attack, Ping of Death, Land Attack, Smurf Attack and UDP Flood types. The server computer that will be tested for Do...
In this study, an analysis of the Web security system from a Denial-of-Service Attack (DoS) with SYN Attack, Ping of Death, Land Attack, Smurf Attack and UDP Flood types. The server computer that will be tested for DoS attacks is a local web server including *** IP: 54.169.71.56, *** IP: 104.152.168.14, *** IP: 156.67.210.132, *** IP: 202.162. 207,101 and *** with IP Address 213.136.83.52 port 80. The attack on the local web server computer was carried out through attacking cloned computers as many as 5 zombie computers and then observing data traffic on each Web server computer. The test results use ping to the local web server computer, where the target web server sends a replay request time out and the check results in the Google Chrome browser are slow to inaccessible conditions. Ping access time the greater the packet, the greater the average time when accessing a local web server with 5,000 packets is 242.68 seconds, 10,000 packets is 310.28 seconds, 20,000 packets are 337.4 seconds, 30,000 packets are 377.2 seconds, 40,000 packets are 398.4 seconds, 50,000 packets are 545.4 seconds and 100,000 packets are above 600 seconds with the condition that the web server will recover after 600 seconds where the system recovery process depends on each local web server.
Content based recommendation system tries to recommend items similar to those a given user has likely in the past, whereas systems designed according to the collaborative recommendation paradigm identify users whose p...
Content based recommendation system tries to recommend items similar to those a given user has likely in the past, whereas systems designed according to the collaborative recommendation paradigm identify users whose preferences are similar to those of the given user and recommend items they have liked. The proposed recommendation system is discussing about Data finitihotel recommendations for a place across U.S. The selected process for the recommendation is calculating the rating of hotel categories on the city. By calculating hotel categories from several city by combining two features namely categories and taken from the city of the selected hotelcategory as well. The result of process will be recommended hotel with highest ratingto the user.
The Constitutional Court of The Republic of Indonesia is an institution which has authority to judge and examine constitutions. In this institution, each component has responsibility to manage their own finance and bu...
详细信息
This research aims to design and implement a home security system with the capability for human detection. The traditional home security system, i.e. closed circuit television (CCTV) can only capture and record the vi...
详细信息
HKBP Kebon Jeruk Church has a lot of data consisting of church data, Pastor data, Church server data, family data, marital data, baptismal data, and also about church agenda such as the schedule of activities Church, ...
HKBP Kebon Jeruk Church has a lot of data consisting of church data, Pastor data, Church server data, family data, marital data, baptismal data, and also about church agenda such as the schedule of activities Church, schedule of church service. The problem in HKBP Kebon Jeruk is that the Data is provided and managed manually, as well as difficulties in finding the necessary information. Therefore, the system needs to be built by the HKBP Kebon Jeruk Church to request church management data. The method used in the HKBP Kebon Jeruk system is the Extreme programming method, and the analysis used is the PIECES analysis. The result of this research is to build the HKBP Kebon Jeruk system according to the needs of the user.
The explosive spread of Corona Virus Disease-19 (COVID-19) in late December 2019, requires the health authorities worldwide to enforced stricter standard operating procedures (SOP) for mass gathering events, which eve...
The explosive spread of Corona Virus Disease-19 (COVID-19) in late December 2019, requires the health authorities worldwide to enforced stricter standard operating procedures (SOP) for mass gathering events, which eventually caused postponement and cancellation. This has led to a great loss and bankruptcy for most event organizers. As an effort to offer solution to this matter, a professional touch producing “soft landing” such as “Mathematical Modelling of Physical Distancing Policy for Mass Gathering Event Organizer” was proposed. Therefore, a holistic understanding about the issues related to physical distancing in mass gathering event is required. This systematic review paper summarizes current practice of physical distancing among mass gathering event organizers. This study reviewed thirteen articles using two leading databases namely Scopus and Google Scholar. Based on thematic analysis, this review finalized four themes: 1) physical distancing method; 2) the importance of physical distancing; 3) challenges in physical distancing enforcement and 4) approach to monitor the compliance of physical distancing.
暂无评论