13 research outputs found

    Review of Peer-to-Peer (P2P) Lending Based on Blockchain

    Get PDF
    Peer-to-Peer (P2P) lending is a financing business model that has gained popularity in recent years due to the ease of loan application, disbursement, and repayment processes. The volume of Peer-to-Peer (P2P) Lending transactions have a significant growth. One of the reasons for the popularity of Peer-to-Peer (P2P) lending is its utilization of technology in both the application and loan repayment processes. One such technology gaining traction in Peer-to-Peer (P2P) lending is blockchain technology. The popularity of blockchain technology lies in its ability to enhance the transparency of the transaction process. This literature study aims to address three main questions: What are the characteristics of blockchain suitable for Peer-to-Peer (P2P) lending , the benefits of implementing blockchain technology in Peer-to-Peer (P2P) lending and the challenges of Peer-to-Peer (P2P) lending based on blockchain. The findings reveal that there are characteristics of blockchain that can be applied to Peer-to-Peer (P2P) lending, bringing numerous benefits to the overall Peer-to-Peer (P2P) lending process. However, challenges persist in the implementation of blockchain technology in Peer-to-Peer (P2P) lending. The insights gained from this literature review are intended to guide researchers interested in studying the application of blockchain technology in the context of Peer-to-Peer (P2P) lending

    Ddos Attack Detection Simulation and Handling Mechanism

    Get PDF
    In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism). From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker

    A Sense-based Registration Process for TDMA in IEEE 802.11 Network

    Get PDF
    TDMA implementation offer better fairness and throughput in IEEE 802.11. To implement TDMA, new registration process is needed, because current registration mechanism can disrupt TDMA process. This paper proposes a sense-based TDMA registration process using service slot and random timer. Simulation result shows, by using our mechanism, we can reduce the number of unused timeslot, and for 10 new nodes, each node only need 7 ms to complete the registration process

    Fungal Production of Xylanase from Oil Palm Empty Fruit Bunches via Solid State Cultivation

    Get PDF
    The abundance of Oil Palm Empty Fruit Bunches (EFB), the lignocellulosic biomass waste from Crude Palm Oil (CPO) industries, offers a potential for its application as raw material for biorefinery. Its xylan content in particular, suggests that EFB can be used as raw material for xylanase production. This article studies xylanase production by fungal Trichoderma viride ITB CC L67, Aspergillus niger ITB CC L51, and Penicillium sp. ITB CC L96 using EFB as the substrate in solid state fermentation. The aims of this research are to evaluate the incubation time to produce the highest xylanase activity, to explore the effect of particle size of EFB on xylanase activity and to determine the optimal operation condition of each significant variable, including temperature and substrate ratio (g EFB in mL liquid medium) using Response Surface Methodology (RSM).  The method of Central Composite Design (CCD) is employed to investigate the individual crucial component of the operation condition, which significantly affected the enzyme activity. The incubation time of  T. viride, A. niger, and Penicillium sp. were observed to produce xylanase .  The result show that the xylanase activity is increase in the early phase of incubation at 0-36 hours, and remained constant afterward. At the time of 36 hours, the activity of xylanase produced by T. viride, A. niger and Penicillium sp. were subsequently 815 U/mL, 624 U/mL and 789 U/mL or equal to 8,146 U/g, 6,243 U/g and 7,892 U/g dry substrate. The particle size of the EFB is affect the growth and hence affects on xylanase production. It shows that the smaller size of EFB resulted in better fungal growth, which was indicated by higher biomass dry weight and higher protein content, as well as higher xylanase activity. The optimum conditions obtained xylanase activity is 740.6 U/mL or 5,095.5 U/g substrate, produced by T.viride ITB CC L.67 at 32.8oC and substrate ratio of 0.63. 

    DECEPTION BASED TECHNIQUES AGAINST RANSOMWARES: A SYSTEMATIC REVIEW

    Get PDF
    Ransomware is the most prevalent emerging business risk nowadays. It seriously affects business continuity and operations. According to Deloitte Cyber Security Landscape 2022, up to 4000 ransomware attacks occur daily, while the average number of days an organization takes to identify a breach is 191. Sophisticated cyber-attacks such as ransomware typically must go through multiple consecutive phases (initial foothold, network propagation, and action on objectives) before accomplishing its final objective. This study analyzed decoy-based solutions as an approach (detection, prevention, or mitigation) to overcome ransomware. A systematic literature review was conducted, in which the result has shown that deception-based techniques have given effective and significant performance against ransomware with minimal resources. It is also identified that contrary to general belief, deception techniques mainly involved in passive approaches (i.e., prevention, detection) possess other active capabilities such as ransomware traceback and obstruction (thwarting), file decryption, and decryption key recovery. Based on the literature review, several evaluation methods are also analyzed to measure the effectiveness of these deception-based techniques during the implementation process

    KARAKTERISTIK PEKERJA TRAMPIL PERANGKAT LUNAK

    No full text
    Makalah ini menjabarkan beberapa kemampuan dasar non teknls yang perlu dlmiliki vleh tenaga kerja di bidang industri perangkat lunak. I3erdasarkan pengalaman berkerja di perusahaan perangkat lunak di Onawa, Canada dan di Bangalore, India, olgambarkan suasana kerja dibidang industri perangkat lunak pada umum nya. Dari gambaran ini selanjUlnya disarikan perilaku dan kemampuan intelektual(etos kerja) yang penting bagi keberhasilan di bidang ini. Sebagai penurup diUlwarkan beberapa hal yang dapat dilakukan oleh lembaga pendidikan di Indonesia untuk menumbuhkan kemampuan ini di masyarakat

    A MAPPING OF COMMON INFORMATION MODEL: A CASE STUDY OF HIGHER EDUCATION INSTITUTION

    No full text
    Most of higher education institution in Indonesia has heterogeneous application software for managing their institution. Maintaining all application software run smoothly and able to collaborate one to other is very difficult. Each application has own schema and usually not prepare for collaboration. This paper will map a case study of a higher education institution. This paper describes a mapping of common information model which captured from all application software that has been implemented and review model conceptually. Common information model should reduce number of interfaces and provide a basis of integrating applications in a way that reduces the coupling among of them. Minimal functional impact should be achieved by allowing them to be upgraded or replaced

    A MAPPING OF COMMON INFORMATION MODEL: A CASE STUDY OF HIGHER EDUCATION INSTITUTION

    No full text
    Most of higher education institution in Indonesia has heterogeneous application software for managing their institution. Maintaining all application software run smoothly and able to collaborate one to other is very difficult. Each application has own schema and usually not prepare for collaboration. This paper will map a case study of a higher education institution. This paper describes a mapping of common information model which captured from all application software that has been implemented and review model conceptually. Common information model should reduce number of interfaces and provide a basis of integrating applications in a way that reduces the coupling among of them. Minimal functional impact should be achieved by allowing them to be upgraded or replaced
    corecore