International Journal of Engineering Continuity最新文献

筛选
英文 中文
Implementing NIST Framework and the People, Process, Technology approach in Indonesian Financial Services 在印尼金融服务业实施 NIST 框架和人员、流程、技术方法
International Journal of Engineering Continuity Pub Date : 2024-07-16 DOI: 10.58291/ijec.v3i1.265
Ferdynandus Ferdynandus, Johny Natu Prihanto, Winarno Winarno
{"title":"Implementing NIST Framework and the People, Process, Technology approach in Indonesian Financial Services","authors":"Ferdynandus Ferdynandus, Johny Natu Prihanto, Winarno Winarno","doi":"10.58291/ijec.v3i1.265","DOIUrl":"https://doi.org/10.58291/ijec.v3i1.265","url":null,"abstract":"A financial services company in Indonesia was implementing digital transformation with various strategies. Regulators such as the Financial Services Authority have stipulated that financial services companies must ensure effective data security and smooth internal operations to counter evolving cybersecurity threats. The Gap Analysis results show that the Roadmap and Solution development will be focused starting from the Identify dimension of the NIST Framework, specifically in the asset management category. This research also uses a post-positivist paradigm with a mixed methods approach, which combines qualitative and quantitative research methods.  This research will adopt two Digital Maturity Models. by considering the complementary elements of the two models, to create a Framework that is more holistic and in accordance with the specific needs of the organization. The benefit of this research is the development of a framework based on the NIST Cybersecurity Framework and Profile for Ransomware Risk Management, which will be integrated with the PPT Framework (People, Process & Technology) which is expected to improve cybersecurity maturity, especially in dealing with ransomware risks.","PeriodicalId":388974,"journal":{"name":"International Journal of Engineering Continuity","volume":"4 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141640844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Software Developer Selection with Integrated F-AHP and F-TOPSIS Techniques 利用 F-AHP 和 F-TOPSIS 综合技术加强软件开发人员的选拔工作
International Journal of Engineering Continuity Pub Date : 2024-07-09 DOI: 10.58291/ijec.v3i2.250
Murnawan Murnawan, R.A.E. Virgana Targa Sapanji, Sri Lestari, Rosalin Samihardjo
{"title":"Enhancing Software Developer Selection with Integrated F-AHP and F-TOPSIS Techniques","authors":"Murnawan Murnawan, R.A.E. Virgana Targa Sapanji, Sri Lestari, Rosalin Samihardjo","doi":"10.58291/ijec.v3i2.250","DOIUrl":"https://doi.org/10.58291/ijec.v3i2.250","url":null,"abstract":"This study focuses on enhancing the selection process for software developers by integrating the Fuzzy Analytic Hierarchy Process (F-AHP) and the Fuzzy Technique for Order Preference by Similarity to Ideal Solution (F-TOPSIS). The primary objective is to address the uncertainties and ambiguities in determining evaluation criteria and weights, thereby facilitating accurate decision-making when faced with multiple criteria and alternatives. Conducted within a software development company in Bandung, Indonesia, the study involved evaluating ten potential candidates for the software developer position. The methodology employed F-AHP to assess the importance of each criterion through pairwise comparisons, and F-TOPSIS to rank the candidates based on these criteria weights. The results revealed that Candidate CK-7 exhibited the highest closeness coefficient (CCi), making them the top candidate, while CK-4 ranked the lowest. This integrated approach provided a systematic and transparent framework for decision-making, demonstrating its effectiveness in optimizing recruitment processes. The study contributes to the field by offering a robust decision-making tool that can be adapted to various industries, ensuring the selection of high-quality employees who meet necessary competencies, thereby improving overall productivity and performance.","PeriodicalId":388974,"journal":{"name":"International Journal of Engineering Continuity","volume":"113 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141666041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Static Loading Simulation on Temporary Platform and Ladder Absorbent Chamber Design 临时平台和梯子吸收室设计的静态负载模拟
International Journal of Engineering Continuity Pub Date : 2024-06-16 DOI: 10.58291/ijec.v3i1.247
Rinto Hindroyuwono, Rachmat Anggi Marvianto, Eliev Fajar Almaida, Yunus Bakhtiar Arafat
{"title":"Static Loading Simulation on Temporary Platform and Ladder Absorbent Chamber Design","authors":"Rinto Hindroyuwono, Rachmat Anggi Marvianto, Eliev Fajar Almaida, Yunus Bakhtiar Arafat","doi":"10.58291/ijec.v3i1.247","DOIUrl":"https://doi.org/10.58291/ijec.v3i1.247","url":null,"abstract":"This study utilizes SolidWorks software to thoroughly examine the structural layout and static load simulation of a temporary platform and ladder in an adsorbent chamber. SolidWorks, a computer-aided design (CAD) and computer-aided engineering (CAE) software, offers robust tools for 3D modeling, simulation, and analysis, making it ideal for this type of structural assessment. Finite element analysis (FEA), a simulation model within SolidWorks, is employed to determine stress distribution and safety factors. The results demonstrate the platform's maximum stress at 198.65 MPa, below the yield strength of ASTM A36 Steel, leading to a safety factor of 1.3. These findings validate the design's safety and reliability for industrial use.","PeriodicalId":388974,"journal":{"name":"International Journal of Engineering Continuity","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141335600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Attribute-Base Control in Personal Data Protection 在个人数据保护中实施属性基础控制
International Journal of Engineering Continuity Pub Date : 2024-06-04 DOI: 10.58291/ijec.v3i1.231
Sigit Wibawa, Ahmad Gani, Taufik Hidayat
{"title":"Implementation of Attribute-Base Control in Personal Data Protection","authors":"Sigit Wibawa, Ahmad Gani, Taufik Hidayat","doi":"10.58291/ijec.v3i1.231","DOIUrl":"https://doi.org/10.58291/ijec.v3i1.231","url":null,"abstract":"This research addresses the growing concern of cybersecurity and access control in Python applications, providing actionable recommendations for improving Attribute-Based Access Control (ABAC) systems to better protect personal data. The study aims to evaluate ABAC's efficacy in managing access control within Python applications, particularly focusing on its ability to provide precise and fine-grained control over personal data access. By analyzing three key attributes—user roles, data classification, and access times—within Python applications, the research methodically assesses ABAC's performance and challenges in implementation. The findings, with a significant proportion of 70%, underscore ABAC's advantages over traditional models like Discretionary Access Control (DAC) and Role-Based Access Control (RBAC), emphasizing its capability to provide precise and fine-grained control over personal data access. Additionally, the research identifies and addresses three main challenges in ABAC implementation: attribute management complexity 15%, the necessity for standardization 10%, and interoperability issues 5%. This research has far-reaching implications, highlighting the importance of meticulous planning and modeling for successful ABAC deployment. By enriching our understanding of ABAC in Python-based environments, the study offers insights for enhancing cybersecurity measures and access control strategies in personal data protection.","PeriodicalId":388974,"journal":{"name":"International Journal of Engineering Continuity","volume":"24 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141266286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation OSPFv3 For Internet Protocol Verses 6 (IPv6) Based On Juniper Routers Use Emulator Virtual Engine – Next Generation (Eve-NG) 基于瞻博网络路由器使用仿真器虚拟引擎--下一代(Eve-NG)为互联网协议第 6 版(IPv6)实施 OSPFv3
International Journal of Engineering Continuity Pub Date : 2023-10-16 DOI: 10.58291/ijec.v3i1.141
Nurwan Reza Fachrur Rozi, Ade Nurhayati, Seandy Arandiant Rozano
{"title":"Implementation OSPFv3 For Internet Protocol Verses 6 (IPv6) Based On Juniper Routers Use Emulator Virtual Engine – Next Generation (Eve-NG)","authors":"Nurwan Reza Fachrur Rozi, Ade Nurhayati, Seandy Arandiant Rozano","doi":"10.58291/ijec.v3i1.141","DOIUrl":"https://doi.org/10.58291/ijec.v3i1.141","url":null,"abstract":"Advances in computer network technology and increased use of Internet information have reduced IPv4 offerings. This requires a computer network protocol that can replace the role of IPv4 which is currently limited/loose. Also known as Internet Protocol Verses 6 (IPv6), it aims to improve on IPv4 and does not represent a fundamental change from IPv4. Features that are available in IPv4 are also available in IPv6, but features that do not work in IPv4 are available in IPv4. IPv6 is no longer used. A transition mechanism is required to forward IPv6 packets to an existing IPv4 network and vice versa. One of the available mechanisms is automatic tunneling (abbreviated as Tunneling). The EVE-NG simulator is used to implement and study the routing protocol (OSPFv3) on IPv6 networks. To check the results, use the traceroute, ping command. The Juniper platform is implemented in this small virtual network to test the OSPFv3 protocol on an IPv6 network. This research explains how to assign IPv6 addresses on Juniper routers and end devices as well as their configuration. The Internet protocol layer is responsible for receiving and sending data packets within the network. In the virtual environment simulation mode, Juniper packets are analyzed and packet forwarding via IPv6 on OSPFv3 is used to make decisions for protocols in the IPv6 environment that are faster, and more secure.","PeriodicalId":388974,"journal":{"name":"International Journal of Engineering Continuity","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139318714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Adversarial Attacks on AI-based With Fast Gradient Sign Method 基于快速梯度符号的人工智能对抗性攻击分析
International Journal of Engineering Continuity Pub Date : 2023-08-01 DOI: 10.58291/ijec.v2i2.120
Sigit Wibawa
{"title":"Analysis of Adversarial Attacks on AI-based With Fast Gradient Sign Method","authors":"Sigit Wibawa","doi":"10.58291/ijec.v2i2.120","DOIUrl":"https://doi.org/10.58291/ijec.v2i2.120","url":null,"abstract":"Artificial intelligence (AI) has become a key driving force in sectors from transportation to healthcare, and is opening up tremendous opportunities for technological advancement. However, behind this promising potential, AI also presents serious security challenges. This article aims to investigate attacks on AI and security challenges that must be faced in the era of artificial intelligence, this research aims to simulate and test the security of AI systems due to adversarial attacks. We can use the Python programming language for this, using several libraries and tools. One that is very popular for testing the security of AI models is CleverHans, and by understanding those threats we can protect the positive developments of AI in the future. this research provides a thorough understanding of attacks in AI technology especially in neural networks and machine learning, and the security challenge we face is that adding a little interference to the input data causes the AI ​​model to produce wrong predictions in adversarial attacks there is the FGSM model which with an epsilon value of 0.1 causes the model suffered a drastic reduction in accuracy of around 66%, which means that the attack managed to mislead the model and lead to incorrect predictions. in the future understanding this threat is the key to protecting the positive development of AI. With a thorough understanding of AI attacks and the security challenges we address, we can build a solid foundation to effectively address these threats.","PeriodicalId":388974,"journal":{"name":"International Journal of Engineering Continuity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128446437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Robot Object Detection Method Based on Deep Learning 基于深度学习的移动机器人目标检测方法
International Journal of Engineering Continuity Pub Date : 2023-07-26 DOI: 10.58291/ijec.v2i2.118
Guo Yuhan
{"title":"Mobile Robot Object Detection Method Based on Deep Learning","authors":"Guo Yuhan","doi":"10.58291/ijec.v2i2.118","DOIUrl":"https://doi.org/10.58291/ijec.v2i2.118","url":null,"abstract":"The task of object detection is to accurately and efficiently identify and locate a large number of predefined categories of object instances from images. With the wide application of deep learning, the accuracy and efficiency of target detection have been greatly improved. However, deep learning-based target detection still faces challenges from key technologies such as improving and optimizing the performance of mainstream target detection algorithms, improving the detection accuracy of small target objects, realizing multi-class object detection and lightweight detection model. In response to the above challenges, based on extensive literature research, this paper analyses methods for lightweight detection models and improved detection accuracy from the perspective of YOLOv5s network structure. The problems to be solved in target detection and the future research direction are predicted and prospected.","PeriodicalId":388974,"journal":{"name":"International Journal of Engineering Continuity","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129323245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Path planning of mobile robot based on improved artificial potential field method 基于改进人工势场法的移动机器人路径规划
International Journal of Engineering Continuity Pub Date : 2023-07-26 DOI: 10.58291/ijec.v2i2.117
Li Bing
{"title":"Path planning of mobile robot based on improved artificial potential field method","authors":"Li Bing","doi":"10.58291/ijec.v2i2.117","DOIUrl":"https://doi.org/10.58291/ijec.v2i2.117","url":null,"abstract":"Artificial potential field method is widely used in robot path planning because of its simplicity, efficiency and smooth path generation. In this paper, based on the introduction of the basic principle of the artificial potential field method, the limitations of the algorithm are analysed in depth, and improvement methods are summarized for these problems. Aiming at the problem that the target near the obstacle is unreachable in the traditional artificial potential field method, an improved repulsive force potential field function is used to introduce the distance between the robot and the target point into the potential field function, so that the potential field of the target position is minimized in the global potential field, so that the robot can successfully reach the target. Using the obstacle connection method, the robot can quickly get rid of the local minimum point, go out of the local minimum area, and complete the path planning. The simulation results show that the method is effective.","PeriodicalId":388974,"journal":{"name":"International Journal of Engineering Continuity","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130329050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A method of tracking and positioning of industrial robots 一种工业机器人的跟踪定位方法
International Journal of Engineering Continuity Pub Date : 2023-07-23 DOI: 10.58291/ijec.v2i2.115
AI Tengfeng
{"title":"A method of tracking and positioning of industrial robots","authors":"AI Tengfeng","doi":"10.58291/ijec.v2i2.115","DOIUrl":"https://doi.org/10.58291/ijec.v2i2.115","url":null,"abstract":"In this paper, an improved tracking and localization algorithm of an omni-directional mobile industrial robot is proposed to meet the high positional accuracy requirement, improve the robot’s repeatability positioning precision in the traditional trilateral algorithm, and solve the problem of pose lost in the moving process. Laser sensors are used to identify the reflectors, and by associating the reflectors identified at a particular time with the reflectors at a previous time, an optimal triangular positioning method is applied to realize the positioning and tracking of the robot. The experimental results show that positioning accuracy can be satisfied, and the repeatability and anti-jamming ability of the omni-directional mobile industrial robot will be greatly improved via this algorithm.","PeriodicalId":388974,"journal":{"name":"International Journal of Engineering Continuity","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122701376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Design of a Detection Robot with OLED Display 一种OLED显示检测机器人的设计
International Journal of Engineering Continuity Pub Date : 2023-07-11 DOI: 10.58291/ijec.v2i2.108
Rachmat Anggi Marvianto, Rizky Gauraf, Yunus Bakhtiar Arafat, Panpan Zang
{"title":"The Design of a Detection Robot with OLED Display","authors":"Rachmat Anggi Marvianto, Rizky Gauraf, Yunus Bakhtiar Arafat, Panpan Zang","doi":"10.58291/ijec.v2i2.108","DOIUrl":"https://doi.org/10.58291/ijec.v2i2.108","url":null,"abstract":"OLED display has the advantages of self-illumination, wide viewing angle, fast response, small size, small weight, flexibility. It is a huge breakthrough in the field of display technology, and enhances the visual enjoyment and on-the-spot experience of people. With the rapid development of science and technology, the combination of OLED and robot has attracted attention from most of the fields. In this paper, the working principle, advantages and main application fields of OLED devices are introduced, and a detection robot with OLED is designed. The detection robot can accurately control the speed of the motor and the angle of the steering gear within a distance of 1,000 meters, and receive the images from airborne cameras in real time.","PeriodicalId":388974,"journal":{"name":"International Journal of Engineering Continuity","volume":"730 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122004990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信