17 research outputs found

    FACTORS THAT DETERMINE BUYING INTERESTS OF FOREIGN TOURISTS IN CHOOSING ACCOMMODATIONS IN TEGALLALANG VILLAGE, GIANYAR , BALI

    Get PDF
    A number of accommodations are available in Tegallalang Village, because of its location that is close to central Ubud. Along with the increase in foreign tourist arrivals, then this study aims to analyze the factors that determine the interest of foreign tourists in the selection of accommodation in the village of Tegallalang, Gianyar Bali. This study used 50 respondents with accidental sampling technique. Data will be analyzed by factor analysis. The results showed characteristics of tourists who stay at accommodation in Tegallalang Village were dominant  Australian citizenship 18%, Length of their stay is 3-7 days (72%),  based on age in  26-30 years old  (36%). Characteristics based on occupation dominant as employed (48%) and purpose of visit for leisure (58%). Tourists choose villa for 68% as a place to stay, this is because the villa is more privacy than others. The factors that influence the buying interest of foreign tourists in choosing accommodation are the first is the factor of room quality, the second is the location factor, the third is the price factor and the fourth is accommodation security factor. The dominant factor that determines it is the room quality factorThe next research that will be conducted in the future is guest satisfaction toward accommodation in Tegallalang Village is highly expected

    New Key Generation and Encryption Algorithms for Privacy Preservation in Mobile Ad Hoc Networks

    Get PDF
    Mobile Ad Hoc Networks (MANETs) get widespread applications along with the evolving technologies. However, MANETs are at risk due to the shortage of security mechanisms. In this paper, we propose new algorithms for key generation and encryption for privacy preservation in MANETs. Our key generation algorithm modified Fibonacci sequence by adding scrambling factors to generate random key sequences with required length but incurred low computational overhead, whereas the encryption/decryption algorithm utilizes the One Time Pad (OTP) system by adding scrambling factors for data confidentiality which satisfies the randomness, diffusion, and confusion tests. Simulation of the proposed algorithms was conducted using Matlab and NS-2. Experiment results showed that the proposed algorithms produced random key sequences and random Ciphertexts. Through several tests i.e. speed, correlation and autocorrelation, diffusion, and confusion tests, the simulation result showed the superiority of our algorithms over the other algorithms. For the proof of concept, the proposed algorithms have been simulated in the network simulator, where the result showed that along with the increase of the number of nodes, the throughput of the network increased, while the delay is relatively constant around 6000 ms for 20 up to 70 nodes

    Systematic Review of Internet of Things Security

    Get PDF
    The Internet of Things has become a new paradigm of current communications technology that requires a deeper overview to map its application domains, advantages, and disadvantages. There have been a number of in-depth research efforts to study various aspects of IoT. However, to the best of our knowledge, there is no literature that have discussed specifically and deeply about the security and privacy aspects of IoT. To that end, this paper aims at providing a more comprehensive and systematic review of IoT security based on the survey result of the most recent literature over the past three years (2015 to 2017). We have classified IoT security research based on the research objectives, application domains, vulner-abilities/threats, countermeasures, platforms, proto-cols, and performance measurements. We have also provided some security challenges for further research

    Path Selection using Fuzzy Weight Aggregated Sum Product Assessment

    Get PDF
    The search for safe evacuation routes is an important issue to save flood victims so they can reach the evacuation centre. This research is a simulation of searching for safe and fast travel evacuation route that have 24 alternative routes. Every road that will be transverse has a limit with certain criteria. Calculate of the weight of the constraints using the Multi-Criteria Decision Making (MCDM) method, namely the Analytical Hierarchy Process (AHP) andWeight Aggregated Sum Product Assessment (WASPAS) based on Fuzzy logic. The criteria of obstacle that qualitative for obscurity so that it makes sense fuzzy will provide supportive input for the MCDM problem. The Fuzzy AHP method is applied to calculate the weight of an application while the Fuzzy WASPAS (WASPAS-F)method is used to determine the safest alternative route. By using the Fuzzy AHP and WASPAS-F methods, a safe and fast pathway weights 0.66

    SIMPLE: SISTIM PENILAI ESEI OTOMATIS UNTUK MENILAI UJIAN DALAM BAHASA INDONESIA

    Get PDF
    SIMPLE: System Automatic Essay Assessment for Indonesian Language Subject Examination. Evaluation ofstudy of a student is a very important aspect of an educational process. Evaluation is aimed at measuring the level ofstudent understanding of the given lecture materials. Measuring student understanding of the course material, usingessay-type exam, is generally used as the evaluation tool. In this essay-type exam, the student has to answer questionsusing sentences, whereby choices of possible answers are not indicated. The student has to answer the questions withhis/her sentences. The answers may vary, since it reflects the student's best thoughts of the materials. One of theweaknesses of essay-type exam is the difficulty to grade the answers and it tends to be time consuming. Currently,automatic grading systems that may speed up the grading process, are being developed in many research institutions.The method used to grade, varies form one system to another, and one of the popular system is the Latent SemanticAnalysis (LSA). LSA is a method of grading essay by extracting words and representing the sentence in the form ofmathematical or statistical formulation, from a text with a relatively large number of words. The grade of the essay isdetermined, by matching the important words to a group of words prepared by the human rater. This paper describes aneffort to developed LSA, enhanced with word weighting, word order and the word synonym to improve the accuracy ofgrading. This system is called SIMPLE. SIMPLE is used to grade answers using bahasa Indonesia. The exam is carriedout on-line through the Web. From the experiments conducted, for small classes, the conformity of grade compared tothe grade of human rater lies between 69.80 % - 94.64 %, and for medium size classes the conformity lies between77.18 % - 98.42 % with the human rater. These results are roughly proportional with the result of LSA system, whichgrade essay given in English.Keywords: SIMPLE, latent semantic analysis, on-line examination, we

    Remote Laboratories Multiuser based on Embedded Web Server

    Get PDF
    Abstract—This paper presents a new design of remote laboratory multiuser based embedded web server that is used for the lab microcontroller system. Architecture of Remote Lab System consists of a computer server, two experiment module microcontroller system and two embedded web server for controlling lab modules. The computer server is used as a web server remote lab that serves as a homepage and user management. Embedded web server serves as the user interface to control the lab module microcontroller via the internet. The novelty of the system proposed is the remote laboratory architecture is multi user, and embedded web server designed more intelligently that function as lab modul controller, such as ability to send log event data to database server and ability to send message to chat applications. This research activity has resulted a remote laboratory based on embedded web server, the system is multiuser so that at the same time can be used by more than one user. Test result, the system can work quite well. Index Terms—Remote Laboratories, Embedded Web Server, Microcontrolle

    Dynamic Multi-hop Routing Protocol Based on Fuzzy-Firefly Algorithm for Data Similarity Aware Node Clustering in WSNs

    Get PDF
    In multi-hop routing, cluster heads close to the base station functionaries as intermediate nodes for father cluster heads to relay the data packet from regular nodes to base station. The cluster heads that act as relays will experience energy depletion quicker that causes hot spot problem. This paper proposes a dynamic multihop routing algorithm named Data Similarity Aware for Dynamic Multi-hop Routing Protocol (DSA-DMRP) to improve the network lifetime, and satisfy the requirement of multi-hop routing protocol for the dynamic node clustering that consider the data similarity of adjacent nodes. The DSA-DMRP uses fuzzy aggregation technique to measure their data similarity degree in order to partition the network into unequal size clusters. In this mechanism, each node can recognize and note its similar neighbor nodes. Next, K-hop Clustering Algorithm (KHOPCA) that is modified by adding a priority factor that considers residual energy and distance to the base station is used to select cluster heads and create the best routes for intra-cluster and inter-cluster transmission. The DSA-DMRP was compared against the KHOPCA to justify the performance. Simulation results show that, the DSA DMRP can improve the network lifetime longer than the KHOPCA and can satisfy the requirement of the dynamic multi-hop routing protocol

    New Architecture of Remote Laboratories Multiuser based on Embedded Web Server

    Get PDF
    Abstract—This paper presents a new architecture for multiuser remote laboratory based on an embedded web server used for experiment with the MCS-51 microcontroller system. The design for the remote lab uses a green computing approach, with the aim of reducing energy consumption, lowering the cost of procurement systems, improving performance and use, and also saving space. The remote lab system uses multi user and multi device architecture to support collaborative work and improve scalability. The design of the remote lab has n modules experiment, and each module can be accessed by a single user or a group which consists of several user. The prototype of a remote lab that has been realized consists of an embedded web server based on Raspberry Pi as the remote lab gateway and 2 experiment modules that are controlled by an embedded web server based on MCS-51 microcontroller. Development of the system is expected to contribute to creating an efficient remote lab that is able to facilitate collaborative work and support green computing. Index Terms—Remote Laboratories, Embedded Web Server, Microcontroller, Multiuser, Collaborative Work, Green Computin

    Information security risk assessment using situational awareness frameworks and application tools

    Get PDF
    This paper describes the development of situational awareness models and applications to assess cybersecurity risks based on Annex ISO 27001:2013. The risk assessment method used is the direct testing method, namely audit, exercise and penetration testing. The risk assessment of this study is classified into three levels, namely high, medium and low. A high-risk value is an unacceptable risk value. Meanwhile, low and medium risk values can be categorized as acceptable risk values. The results of a network security case study with security performance index indicators based on the percentage of compliance with ISO 27001:2013 annex controls and the value of the risk level of the findings of the three test methods showed that testing with the audit method was 38.29% with a moderate and high-risk level. While the test results with the tabletop exercise method are 75% with low and moderate risk levels. On the other hand, the results with the penetration test method are 16.66%, with moderate and high-risk levels. Test results with unacceptable risk values or high-risk corrective actions are taken through an application. Finally, corrective actions have been verified to prove there is an increase in cyber resilience and security

    Influence of competence and locus of control on readiness of accounting department students facing the world of work era industrial revolution 4.0

    Get PDF
    This study discusses ethical competencies, knowledge competencies, capability competencies, relationship competencies, analytical competencies, and locus of control on the readiness of students majoring in accounting in the world of work of the revolution era 4.0. The population of the study was in the 2017 class of faculty of economics and business students of Udayana University. The research sample was determined by the nonprobability sampling method which obtained a total sample of 166 people. The data analysis technique used is multiple linear regression analysis. The results showed that the results showed ethical competence, knowledge competence, capability competence, relationship competence, analytical competence, and locus of control had a positive effect on the readiness of students majoring in accounting in connecting the world of work of the industrial revolution era 4.0
    corecore