Browse Items (10272 total)

2535-Article Text-11667-1-10-20240718 (1).pdf
The purpose of this study is to analyze the influence of training programs on technician intrinsic motivation, the influence of training programs on technician performance, intrinsic motivation is a mediating variable between …

5707-Article Text-19658-1-10-20240601 (1).pdf
The interoperability between electronic health records (EHR) and electronic medical records (EMR) from various healthcare facilities for comprehensive patient care is important. However, integrating such systems, including the…

3961-Article Text-11963-1-10-20220429.pdf
This study aims to assess the performance of non-ASN employees at the Human Resources Development Agency (BPSDM),
East Kalimantan Province, Indonesia in order to assist organizers in determining the feasibility of extending work contracts.
The…

10618-32451-1-PB.pdf
The objective of research was to describe many attempts taken to develop tourism
destination and to formulate a synergistic model in developing tourism destination in
Karanganyar Regency. This study was a combination of descriptive qualitative and…

26551-70187-1-PB.pdf
This comprehensive study introduces a meticulously designed and characterized
terahertz (THz) multiple-input multiple-output (MIMO) antenna engineered to
operate within the 0.4 THz to 1.6 THz frequency range. The antenna’s construction
includes a…

213-752-1-PB.pdf
The rapid growth of Artificial Intelligence (AI) industries worldwide has increased the demand for skilled professionals and highlighted the need to understand
salary determinants in this sector. This study aims to analyze the factors influencing…

23258-Article Text-85703-4-10-20241001.pdf
Data clustering is a data mining approach that assigns similar data to the same group. Traditionally, cluster similarity considers all attributes equally, but in real-world applications, some attributes may be more important than others.…

25938-68022-1-PB.pdf
A dynamic model of countering phishing attacks is considered. Cryptocurrency exchanges (CCE) and/or their clients are considered as an example of a phishing victim. The model, unlike similar ones, is based on the assumption that the dynamics of the…

3_A+New+Computer+Vision+Based+Rail+Detection.pdf
Abstract—Condition monitoring in railways is an important and
critical process in terms of travel safety. However, this process is
generally done based on observation or with various equipment.
Therefore, it is costly and has a high probability of…

admin,+2_A+New+Digital+Signature+Scheme+Using.pdf
Achieving security is the most important goal for any digital signature scheme. The security of RSA, the most widely used signature is based on the difficulty of factoring of large integers. The minimum key size required for RSA according to current…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2