Results (241)
Search Parameters:
Section: cisAnalysis of Vulnerabilities, Risks and Threats in the Process of Quota Allocation for the State University of Ecuador
Different models and standards of information security were analyzed, to adopt a model that mitigates vulnerabilities, risks and threats in the quota allocation process for the State University in Ecuador. The main objective is defining a prototype for the management of processes and information security in this type of organization. It was used the deductive…
Read MoreAn ISO 25010 Based Quality Model for ERP Systems
Higher Education Institutions (HEIs) have begun rapidly adopting, selecting and implementing ERP systems due to the call by various governments to streamline their processes and practices. While ERPs are expanding at much faster rate, there is pressure on most HEIs to ensure quality. For quality model, ISO/IEC 25010 is an international standard for software and…
Read MoreSecuring Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model
In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…
Read MoreComparison Analysis between Mobile Banking and Mobile Payment as Determinant Factors of Customer Privacy
Mobile banking and mobile payment are currently always used by customers for financial payments. With customer payments, it is usually easier to make payments with mobile payment, because it is more practical and direct than mobile banking. However, is the privacy of both platforms understood by the customer? Research questions to be answered: 1) What…
Read MoreAnalysis of Cyberattacks in Public Organizations in Latin America
It was analyzed certain information about cyberattacks in Latin America and methods to counteract the aggressions that affect services, data and infrastructure. The problem is the cyberattack on information networks where there is interdependence between processes, people and devices within public organizations with the negative consequence of denial of services. The objective is to propose…
Read MorePerformance Evaluation and Examination of Data Transfer: A Review of Parallel Migration in Cloud Storage
Recent years have seen a continued pattern of development in the cloud computing field. Numerous approaches to maximize file transfer capacity are still completely standing for use on cloud computing storage; however, they do not maximize the advantage of data migration scalability and elasticity in cloud storage. One potential problem is that elasticity takes time;…
Read MoreResource Selection Service Based on Neural Network in Fog Environment
As an emergent technology in Internet of Things (IoT), the ultimate target of fog computing is to provide a widely distributed computational resources and data repository closer to the network edge providing heterogeneous systems both in terms of software and hardware. The fog system must have the capability to deal with huge number of resources…
Read MoreAlternative Financing Model for Smart Cities Initiatives in Indonesia
Currently Indonesia is working actively in the implementation of the Smart Cities initiative program. However, to be able to apply the concept, there are three main elements that must be prepared as the basic foundation. These elements are structure, infrastructure, and superstructure. In this study we focused on the problem of the high cost of…
Read MoreConfigurable Process Model: Discovery Approach from Event Logs
In the domain of business process management, the configurable process model is widely used to optimize time and cost of business process models design, which is known as the concept of “reuse”. Using process mining techniques for process model discovery helps to provide a better view on processes and improve quality of models. The majority…
Read MorePerformance Portability and Unified Profiling for Finite Element Methods on Parallel Systems
The currently available variety of modern, highly-parallel universal processors includes multi-core CPU and many-core GPU (Graphics Processing Units) from different vendors. Systems composed of such processors enable high-performance execution of demanding applications like numerical Finite Element Methods. However, today’s application pro- gramming for parallel systems lacks performance portability: the same program code cannot achieve stable…
Read MoreComparative Study of Semantic and Keyword Based Search Engines
Day by day, the data on the web becomes very huge which makes it difficult to find relevant information. Search engines are one of the successful factors that can retrieve information from the Web. The process of seeking information by search engines helps users find information on the internet, however it is not an easy…
Read MoreThe Financial Services Authority of Indonesia E-Reporting System Development Based on Metadata XBRL Taxonomy
The XBRL taxonomy has been proven to be able to restore various forms of redundancies and ambiguities in making financial reports from financial service institutions. However, the nature of XBRL which is oriented towards documents and based on XML makes the XBRL taxonomy difficult to use because the information cannot be directly read by ordinary…
Read MoreBPMN4 Collaboration: An Extension for collaborative Business Process
Nowadays the collaboration of organizations, systems or services becomes more and more answered in practice. Indeed, organizations try to expand their service, other to satisfy the needs of their customers. Thus, the need to work collaboratively with other partners whether internally or externally becomes trivial. However, process modeling in a collaborative environment becomes heavy because…
Read MoreDesigning and Using a MySQL Database for Human Resource Management
In this paper, we would like to discuss the methods and ideologies used to create a database to be used for Human Resource purposes. Because we want this database to be accessible anywhere at any time, it is safe to conclude that an internet-based (web-based) database would work best, therefore we chose MySQL as the…
Read MoreThe Correlation of the Specific and Global Performance of Teachers in UNTELS Engineering Schools
This article presents an analysis on the existing correlation of the specific and global performance of teachers in UNTELS engineering schools, whose data collection was carried out during the development of the first academic semester of the year 2019, using the Survey technique; which presents indicators classified in two dimensions: “Specific Dimension of Teaching Performance”…
Read MoreIntegration of Third-Party Routing Stack to NetScaler CPX
The Citrix NetScaler CPX, is one of the many Application Delivery Controllers (ADCs), which is used mainly for load balancing between the application servers in a datacenter network. ADCs are typically placed in the demilitarized zone in an organization’s network, handling the connectivity of the external clients to the organization’s servers. While performing load balancing…
Read MoreData Dashboard for Decision Support Systems for Intrapreneurship in A Company
Nowadays, as the Information and Technology rapidly growing all across the world, Indonesia as one of many developed countries always tries to keep up relating to this trend. Regarding to this situation, the use of Information and Technology in various fields are greatly enhanced, and not to mention businesses. There are a lot of businesses…
Read MoreA Big Data Security Layer Meta-Model Proposition
In Big Data, several solution providers offer distributions to handle this large amount of data. Given the variety of these solutions, we are working to provide universal meta-modeling for all layers of a Big Data system in order to address the issue of interoperability and portability between these solutions. As part of our continuous efforts…
Read MoreAnalysis of Information Security for a Voting Process for Sectional Governments in Ecuador
Knowing about different events in several Latin American countries, as well as in Ecuador, in relation to data alteration, in the different sectional voting processes, it has been necessary to carry out a security analysis provided by the systems of choice in the different sectional governments of the country. The objective of this study is…
Read MoreImproving the Performance of Hadoop Framework Using Optimization Process in the Information Management
Hadoop has certain issues that could be taken care to execute the job efficiently. These limitations are due to the locality of the data in the cluster, allocation of the jobs, scheduling of the tasks and resource allocations in Hadoop. Execution in the mapreduce remains a challenge in terms of efficiency. So, an improved Hadoop…
Read MoreAn Integrated Framework for Pronominal Anaphora Resolution in Malayalam
Anaphora resolution is one of the old problems in Natural Language Processing. It is the process of identifying the antecedent of an anaphoric expression in a natural language text. Most of the NLP applications such as text summarization, question answering, information extraction, machine translation etc. require the successful resolution of anaphors. In this paper, we…
Read MoreToward a Smart Campus Using IoT: Framework for Safety and Security System on a University Campus
Recently, there is an enormous research on the smart campus concept due to the revolution of the IoT technologies. The motivation of this paper is to: reinforce the safety on campus, reduce the cost, and take one step forward toward a University smart campus. In this paper, we are not only proposing a framework that…
Read MoreProposal for a Security Model for a Popular Voting System Process in Latin America
In Latin America, there is a need for better security systems in different national or sectional votes, which is why this study was carried out, to show a proposal for a security model that helps to obtain better results and to this purpose has been selected information on the database for different Latin American countries,…
Read MoreCommunication Management of Digital Information Data in Human Resources as a Policy Making Strategic Program for University
Modern universities aim at carrying capacity human resources component in its tri dharma (Three Pillars of Higher Education). UPI with sufficient conditions in the management of several resources has undoubtedly tried to establish itself as a modern university. The superior human resource support in every competition and the university’s tri dharma is the primary resource…
Read MoreAn Investigative Study on Technology Impact on the Quality of Working Life in a University Healthcare and Pharmacy
The purpose of this study was to investigate the impact of the implementation of the Online Appointment Scheduling system and Pharm Partner system technologies on the quality of working life for users in a small healthcare environment at the University of Technology, Jamaica. Both qualitative and quantitative methods were employed. Two data collection instruments were:…
Read More
