Results (1510)
Search Parameters:
Keyword: CoMPThe Importance of Sustainability Audit Report in Go Public Companies Sector, in Indonesia
Sustainability is considered new for Indonesian state-owned enterprises, also has become an obligation since two years ago. More and more people are aware of the environment for the next generation, the survival of mankind in the future. Sustainability issues are no exception in Indonesia. Companies publish sustainability reports as well as financial and annual reports.…
Read MoreComposition of Methods to Ensure Iris Liveness and Authenticity
In a biometric system technology, a person is authenticated based on processing the unique features of the human biometric signs. One of the well known biometric systems is iris recognition, this technique being considered as one of the most secure authentication solutions in the biometric field. However, several attacks do exist that are able to…
Read MoreDesign of an EEG Acquisition System for Embedded Edge Computing
The human brain is one of the most complex machines on the planet. Being the only method to get real-time data with high temporal resolution from the brain makes EEG a highly sought upon signal in the neurological and psychiatric domain. However, recent developments in this field have made EEG more than just a tool…
Read MoreContribution in Private Cloud Computing Development based on Study and KPI Analysis
The preset paper describes a contributes in the implementation of private Cloud Computing. Exhaustive study made validates Cloud environment creation and successful deployed Solution Configuration choice. Related solution ensures a good investment that reduces energy costs of the data center, minimizes network traffic cost proven as an NP-hard problem. In addition, each virtual machine (VsM)…
Read MoreFraud Detection Call Detail Record Using Machine Learning in Telecommunications Company
Fraud calls have a serious impact on telecommunications operator revenues. Fraud detection is very important because service providers can feel a significant loss of income. We conducted a fraud research case study on one of the operators that experienced fraud in 2009 and 2018. Call Detail Record (CDR) containing records of customer conversations such as…
Read MoreOntologic Design of Software Engineering Knowledge Area Knowledge Components
The article sets forth the solution of the educational resources semantic context knowledge components development task, based on the learning technology project-oriented concepts, graduate’s competency model and ontological; engineering. The being considered ontology model and knowledge display formalisms allow, firstly, relevantly image the educational resources semantic context in the support concepts ontology format, and their…
Read MoreCitizen Behavior: The Evaluation of Complaint Application that Connected to Smart City
SIARAN is application which is created by Government of South Tangerang City, Indonesia. The application is e-government services social media based. It is designed for citizens to be able to report problems that occur around South Tangerang City. The research was conducted to find out the factors that affect the intention of SIARAN’s users. The…
Read MoreWarehouse Relocation of a Company in the Automotive Industry Using P-median
To have enough information on time can be helpful when companies try to reduce costs and operate more efficiently. An international company that supplies parts for the automotive industry is currently testing its new facilities in Mexico. The relocation of the raw materials and finished goods warehouses were tested using a P-Median model. The operating…
Read MoreEfficient Discretization Approaches for Machine Learning Techniques to Improve Disease Classification on Gut Microbiome Composition Data
The human gut environment can contain hundreds to thousands bacterial species which are proven that they are associated with various diseases. Although Machine learning has been supporting and developing metagenomic researches to obtain great achievements in personalized medicine approaches to improve human health, we still face overfitting issues in Bioinformatics tasks related to metagenomic data…
Read MoreBusiness Process Design for Widuri Indah School Management System with the Support of Cloud Computing
This study aims to design business processes or school management solutions that are right for the school. Widuri Indah School is private school that has not been integrated with the school management system. Qualitative method such as observation and interview are conducted to gain insights about main activities and support activities in Widuri Indah school…
Read MoreA Framework for Measuring Workforce Agility: Fuzzy Logic Approach Applied in a Moroccan Manufacturing Company
In today’s Moroccan business environment, companies need to implement organization agility by developing an agile workforce that is able to deal with the environment volatility. Thus, the agile workforce concept has been appeared as a necessary and sufficient condition to achieve agility. Focusing on agile enablers influencing workforce agility is an important area but currently…
Read MoreEnhancing Decision Making Capabilities in Humanitarian Logistics by Integrating Serious Gaming and Computer Modelling
The field of humanitarian logistics has in recent times gained an increasing attention from both academics and practitioners communities alike. Although various research groups have addressed theoretical and technical developments in humanitarian logistics using conventional research tools, applied research appears to be often dependent on practitioners’ inputs. This paper is an attempt to fill the…
Read MoreBased on Reconfiguring the Supercomputers Runtime Environment New Security Methods
This paper is an extension of work originally presented in 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). Author describes two new methods: reactive protection method (without delay after detecting an attack), which consists in virtualizing the execution environment of supercomputers processes if the calculated state descriptor falls into the…
Read MoreOrganizational, Social and Individual Aspect on Acceptance of Computerized Audit in Financial Audit Work
Auditors now can no longer rely on the old-fashioned way of auditing manually. More and more jobs, increasingly complex work environment, the demands of the times, accuracy and speed of work require auditors inevitably must adopt technology. This research began with our success as academics in the audit family. Related to Indonesia, a large country…
Read MoreA Comprehensive Survey on Image Modality Based Computerized Dry Eye Disease Detection Techniques
Dry Eye Disease (DED) is one of the commonly occurring chronic disease today, affecting the vision of eye. It causes severe discomfort in eye, visual disturbance and blurred vision impacting the quality of life of patients. Due to recent advancements in Artificial Intelligence (AI) and rapid progress of analytics techniques, several image modality based computerized…
Read MoreComparison of the RC-Triggered MOSFET-Based ESD Clamp Circuits for an Ultra-low Power Sensor System
This paper uses the RC-triggered MOSFET-based electrostatic discharge (ESD) power clamp to conduct ESD from ESD events and not affect the ultra-low power sensor system. Then using the stacked device include stacked MOSFET or stacked BJT to reduce the leakage current which increases with temperature. Moreover, we compare gate-driven method and two-level–driven with both gate-driven…
Read MoreOn the Use of Triple Graph Grammars for Model Composition
In the software engineering research, several works focus on advantages of multi-modeling, which facilitate modeling a system by separating of concerns. The Model Driven Engineering approach relies on model to design software artefacts during the software development lifecycle. Handling such models involves describing some model management operators like ‘ composition ‘. That is an operation…
Read MoreCommercialization Process of Disruptive Innovations in Corporate Ventures and Spinoff Companies: A Comparison
One of the most critical challenges that large companies, small enterprises and research institutes face, when commercializing their innovations, is the transfer process at the moment of scaling up. These organizations often transfer their innovation to either existing business units or create a new business entirely. The process of transferring innovations to an existing unit…
Read MoreComparison Analysis between Mobile Banking and Mobile Payment as Determinant Factors of Customer Privacy
Mobile banking and mobile payment are currently always used by customers for financial payments. With customer payments, it is usually easier to make payments with mobile payment, because it is more practical and direct than mobile banking. However, is the privacy of both platforms understood by the customer? Research questions to be answered: 1) What…
Read MorePyrolysis of Beech Wood in A Continuous Drop Tube Reactor in Comparison to A Batch Reactor
The goal of this research work is first to investigate the comparison between a batch and a continuous pyrolysis reactor (at 500, 550 and 600 °C) and the eventual differences and similarities that are obtained by analysing the obtained liquid and gas compositions. All the products formed were examined: liquids by GC-MS/FID and Karl Fischer…
Read MoreA Comprehensive Study of Privacy Preserving Techniques in Cloud Computing Environment
The huge growth in cloud storage utilization over the past years has made a big demand for an advanced technique and strong tools to make services even more practical and secure. Data privacy in cloud computing has become one of the biggest concerns for both individuals and organizations which adds more pressure on cloud service…
Read MoreA Comparative Analysis of ARIMA and Feed-Forward Neural Network Prognostic Model for Bull Services
Bull service is the natural copulation by a purebred male carabao with a female counterpart. This is part of the bull loan agenda of the Philippine Carabao Center-Visayas State University (PCC-VSU), one of the 12 regional centers of PCC. For the past years, PCC-VSU used averaging of bull services count of previous years and sometimes…
Read MoreIn-Plane Shear Behavior of Unreinforced Masonry Walls Strengthened with Fiber Reinforced Polymer Composites
Unreinforced masonry (URM) wall is one of the oldest types of walls used around the world. During earthquakes, URM walls present a real danger to life safety due to their behavior characterized by a brittle failure caused by their feeble shear resistance to in-plane loads, which make their strengthening necessary. Numerous studies had been used…
Read MoreAnalyzing Job Tenure Factors in Private and Public Companies in Albania by Using Cox Proportional Hazards Model
Job tenure is an important factor for both employees and employers. Sometimes, for employees, this time is a criterion in starting new job, and also for employers when they have to hire new employees. It measures the length of time that employees have been in their current job or with their current employer. Analyzing factors,…
Read MoreThe Acquiring Process of Entrepreneurship Competencies in Realist Airbrush Art
One of the creative industries with rapid growth is the airbrush industry. Airbrush art, especially realist, is identical to the field of automotive engineering in the combination of art and technology. The research is directed to prove how the difficult realist airbrush competency can be achieved by Vocational High School (VHS) students in a short…
Read More
