Fiber optic is a transmission medium which is currently the most good for data transmits, because it also can be transmitted even voice and video. In most cases a fiber optic network has been implemented using cluster...
详细信息
This article will be described replication system of oracle database standard edition by utilizing traditional archived log, because in this database version doesn't have replication feature like in oracle databas...
详细信息
Students generally experience difficulties in learning human body anatomy due to constraints to visualize the body anatomy from 2D into 3D image. This research aims to develop a human anatomy learning system using aug...
详细信息
In daily banking customer queues, unknown waiting-time could lower customer experience. Little's Law formula in Queue Theory provides a generic formula for waiting-time, but it cannot be implemented directly to gi...
详细信息
Next-Generation Sequencing (NGS)-based genomics data have a huge potential to be used in transcriptomic profiling of Nasopharyngeal Carcinoma (NPC) to study the biosynthesis mechanism behind it. The high dimensionalit...
Next-Generation Sequencing (NGS)-based genomics data have a huge potential to be used in transcriptomic profiling of Nasopharyngeal Carcinoma (NPC) to study the biosynthesis mechanism behind it. The high dimensionality of NGS data is the main challenge in performing the data analysis to extract useful information. In this workflow pipeline, memory-efficient Linux-based software such as HISAT2 and HTSeq are utilized to process the raw NGS data. Furthermore, Differential Expression Gene (DEG) list can be obtained by performing advanced analysis to the aligned Ribonucleic Acid (RNA) sequence using the edgeR protocol. This DEG list is one of the main inputs of biological pathway analysis that can be done in DAVID and PANTHER web-based software. Both tools generate a different pathway result related to inflammation.
The problem with telecommunications companies today is that transactional data is more extensive than existing source tables. This makes business reporting less efficient and overwhelms query processing results in dat...
详细信息
Every organization must ensure that information assets are protected and information security system has been implemented well. PT. IndoDev Niaga Internet is a provider of business solutions applications and implement...
详细信息
In this study, an analysis of the Web security system from a Denial-of-Service Attack (DoS) with SYN Attack, Ping of Death, Land Attack, Smurf Attack and UDP Flood types. The server computer that will be tested for Do...
In this study, an analysis of the Web security system from a Denial-of-Service Attack (DoS) with SYN Attack, Ping of Death, Land Attack, Smurf Attack and UDP Flood types. The server computer that will be tested for DoS attacks is a local web server including *** IP: 54.169.71.56, *** IP: 104.152.168.14, *** IP: 156.67.210.132, *** IP: 202.162. 207,101 and *** with IP Address 213.136.83.52 port 80. The attack on the local web server computer was carried out through attacking cloned computers as many as 5 zombie computers and then observing data traffic on each Web server computer. The test results use ping to the local web server computer, where the target web server sends a replay request time out and the check results in the Google Chrome browser are slow to inaccessible conditions. Ping access time the greater the packet, the greater the average time when accessing a local web server with 5,000 packets is 242.68 seconds, 10,000 packets is 310.28 seconds, 20,000 packets are 337.4 seconds, 30,000 packets are 377.2 seconds, 40,000 packets are 398.4 seconds, 50,000 packets are 545.4 seconds and 100,000 packets are above 600 seconds with the condition that the web server will recover after 600 seconds where the system recovery process depends on each local web server.
Content based recommendation system tries to recommend items similar to those a given user has likely in the past, whereas systems designed according to the collaborative recommendation paradigm identify users whose p...
Content based recommendation system tries to recommend items similar to those a given user has likely in the past, whereas systems designed according to the collaborative recommendation paradigm identify users whose preferences are similar to those of the given user and recommend items they have liked. The proposed recommendation system is discussing about Data finitihotel recommendations for a place across U.S. The selected process for the recommendation is calculating the rating of hotel categories on the city. By calculating hotel categories from several city by combining two features namely categories and taken from the city of the selected hotelcategory as well. The result of process will be recommended hotel with highest ratingto the user.
The Constitutional Court of The Republic of Indonesia is an institution which has authority to judge and examine constitutions. In this institution, each component has responsibility to manage their own finance and bu...
详细信息
暂无评论