Blockchain turns both currencies and commodities into a digital form without relying on middleman which allows one person to trade with another include trading the renewable energy. Blockchain technology as a secure and low-cost platform to track the billions of eventual transactions in a distributed energy economy has attracted the attention of experts in various fields of science. The current form of centralized energy trading system is still suffering from security concerns, quality of service, and to name a few. A decentralized energy system using blockchain technology allows the parties to create a trading energy transaction via microgrid. The blockchain technology offers the promise of an immutable, single source of truth from multiple sources without a third-party involvement. In this paper, we describe, explore and analyze the prominent implementation of blockchain technology in the energy sector. Furthermore, we analyze the security issues and highlight the performance of several attacks that might be occurred in the proposed system.
The national education department's inventory record is unique because the goods are in schools under service, not in the office. Inventory complexity has increased due to the procurement of different schedules and reports, not only for internal but also for other institutions concerned. A structured and accessible inventory from anywhere is the right choice for the effectiveness and efficiency of this work. This research aims to design a website-based information system for goods inventory in the National Education Office (DISDIKNAS). The software development method used in this study is the Rational Unified Process. The study results obtained a web-based application that can help DISDIKNAS inventory goods in a structured and accessible anywhere
This research produces an application that can send automatic notifications in the form of a chat on the Telegram platform when a weapon object is detected on CCTV. This application was created utilizing computer vision technology and artificial intelligence, in particular YOLOv7. As demonstrated by the mAP@0.5 value of 0.837 after 50 epochs of training, this application can detect weapon objects such as people, pistols, and knives with a reasonable degree of accuracy. This application is also linked to the telepot library, which enables it to send chats on the Telegram platform. These applications can aid in enhancing security and safety in a variety of environments and have numerous practical applications in fields such as public safety, law enforcement, and others. However, there are still deficiencies in this study that can be addressed in future research, such as the small number of training epochs and the size of the dataset.
Inventory of goods at large institutions is a complicated activity; one solution is to create a structured web application system that can be accessed anywhere. At the National Education Office, it is not only inventory management that is a problem but also the management of the School Operational Assistance Fund (BOS). Data security must be a priority because it involves significant funds and can be misused by irresponsible parties. This study aims to apply Two Factor Authentication to the Goods Inventory System and BOS Fund Management. The first stage is verification by the DISDIKNAS admin at each level of education. Next, a verification email will be sent to the registrant for verification. The results showed that the use of 2FA did not interfere with the performance of the web-based application or its users. The approval rate for the system is 97.4%. This research contributes to the implementation of website security and can be applied to similar systems
Controlling each member of the soldiers to carry out battle with Non-Playable Characters (NPC) is one of the secrets to winning Real-Time Strategy games. The game could be more complicated and offer a more engaging experience if every NPC acts like humans rather than machines with patterned behavior. Like people during a war, each army member's command requires rapid reflexes and direction to strike or evade attacks. An intelligent opponent based on ANN as NPC can react quickly to their opponents. The accuracy of ANN could be enhanced by weight modifications using a Genetic Algorithm (GA). The crossover and mutation rates significantly impact GA's performance as an ANN setup. This research aims to find the best crossover and mutation rates in GA as a weight adjustment in ANN. Experiments were conducted using an RTS game simulator using 20 scenarios on a maximum of 4000 iterations. The initial setup of each troop is random, with a seven-unit type available. In this research, the troops won because their men were subjected to fewer attacks than the opposing forces. The GA optimal crossover and mutation rates are determined using troop victories as a baseline. According to the findings, the best crossover rate for GA as an ANN weight adjustment is 0.6, whereas the specific mutation rate is 0.09. The crossover rate of 0.6 has the highest average win value and tends to increase every generation. As for the mutation rate of 0.09, it has the highest average win value. Thus, this preliminary study can develop NPC more humanly.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.