Enterprise Architecture Framework (EAF) is a commonly used framework and the best solution for addressing and defining the transformation that needs to be built to support business operations. To be able to make the t...
详细信息
Corrosion poses a significant challenge in industries due to material degradation and high maintenance costs, making effective inhibitors essential. Recent studies suggest expired pharmaceuticals as alternative corros...
详细信息
Classification of Indonesian crops is a critical task in developing farming and getting more understanding of agriculture. However, there is no clear task in classifying types of crops in Indonesia. Transfer learning ...
详细信息
Examining topic-level variability in modeling Twitter data can potentially yield more comprehensive insights into public perception during critical periods, thereby enhancing natural disaster mitigation and surveillan...
详细信息
Managing data has changed significantly because of cloud computing, which offers scalabe, flexible and reasonably priced solutions to enterprises and to people as well such as Amazon, Google, and Microsoft expanding t...
详细信息
ISBN:
(数字)9798350364910
ISBN:
(纸本)9798350364927
Managing data has changed significantly because of cloud computing, which offers scalabe, flexible and reasonably priced solutions to enterprises and to people as well such as Amazon, Google, and Microsoft expanding their infrastructure to meet the demand from the customer. With such advantages there will also be disadvantages such as security problems. This paper will discuss about security problems such as encryption, access control, multi-factor authentication, regular audits, secure configurations, incident response planning. This paper will also talk about security measures to deal with threats such as malicious insiders, data abuse, unsecured interfaces and APIs, shared technology complications, data loss or leakage, hijacking, and enigmatic risk profiles. This study examines and evaluates a range of cloud computing security concerns and issues through a systematic analysis of the literature. The goal of the research is to raise public awareness of the need for cloud computing security and to offer possible remedies. Identify and classify network security threats and vulnerabilities in cloud computing by doing an extensive examination of the body of research and empirical investigations is one of the answer to the questions from the paper. In the end, this take a look at unearths vulnerabilities and their practical implications through very well reading network safety in cloud computing.
Leveraging AI to analyze key topics on African social media can enhance public governance. Our study analyzes social media discourse within African society on development concerns by (1) evaluating AI techniques for s...
详细信息
The voice patterns of gender and age have been used as speaker's identity and implied into sectors such as smart cards, healthcare, banking, and other security access controls. However, age, illness, and ambient n...
详细信息
Artificial intelligence (AI) integration in workplaces reshapes employee engagement and organisational performance. This study investigates the combined impact of AI experience and sustainable leadership on work engag...
详细信息
CsSnI3 is widely studied as an environmentally friendly Pb-free perovskite material for optoelectronic device applications. To further improve material and device performance, it is important to understand the surface...
详细信息
CsSnI3 is widely studied as an environmentally friendly Pb-free perovskite material for optoelectronic device applications. To further improve material and device performance, it is important to understand the surface structures of CsSnI3. We generate surface structures with various stoichiometries, perform density functional theory calculations to create phase diagrams of the CsSnI3 (001), (110), and (100) surfaces, and determine the most stable surfaces under a wide range of Cs, Sn, and I chemical potentials. Under I-rich conditions, surfaces with Cs vacancies are stable, which lead to partially occupied surface states above the valence band maximum. Under I-poor conditions, we find the stoichiometric (100) surface to be stable under a wide region of the phase diagram, which does not have any surface states and can contribute to long charge-carrier lifetimes. Consequently, the I-poor (Sn-rich) conditions will be more beneficial to improve the device performance.
The study explores the role of Learning Management Systems (LMS) in enhancing academic teamwork and ambidextrous learning in Indonesian higher education. It examines how different uses of LMS, both explorative and exp...
详细信息
暂无评论