The purpose of this study is to analyze the influence of training programs on technician intrinsic motivation, the influence of training programs on technician performance, intrinsic motivation is a mediating variable between …
The interoperability between electronic health records (EHR) and electronic medical records (EMR) from various healthcare facilities for comprehensive patient care is important. However, integrating such systems, including the…
This study aims to assess the performance of non-ASN employees at the Human Resources Development Agency (BPSDM),
East Kalimantan Province, Indonesia in order to assist organizers in determining the feasibility of extending work contracts.
The…
The objective of research was to describe many attempts taken to develop tourism
destination and to formulate a synergistic model in developing tourism destination in
Karanganyar Regency. This study was a combination of descriptive qualitative and…
This comprehensive study introduces a meticulously designed and characterized
terahertz (THz) multiple-input multiple-output (MIMO) antenna engineered to
operate within the 0.4 THz to 1.6 THz frequency range. The antenna’s construction
includes a…
The rapid growth of Artificial Intelligence (AI) industries worldwide has increased the demand for skilled professionals and highlighted the need to understand
salary determinants in this sector. This study aims to analyze the factors influencing…
Data clustering is a data mining approach that assigns similar data to the same group. Traditionally, cluster similarity considers all attributes equally, but in real-world applications, some attributes may be more important than others.…
A dynamic model of countering phishing attacks is considered. Cryptocurrency exchanges (CCE) and/or their clients are considered as an example of a phishing victim. The model, unlike similar ones, is based on the assumption that the dynamics of the…
Abstract—Condition monitoring in railways is an important and
critical process in terms of travel safety. However, this process is
generally done based on observation or with various equipment.
Therefore, it is costly and has a high probability of…
Achieving security is the most important goal for any digital signature scheme. The security of RSA, the most widely used signature is based on the difficulty of factoring of large integers. The minimum key size required for RSA according to current…