Blog

Category

This article emphasizes the importance of protecting data privacy in the digital age. We highlight the potential damage that hackers can cause, both internal and external to the organization. If hackers manage to steal sensitive data, it can cause financial losses, compromise individual privacy, and damage an organization’s reputation. Research by Jamal et al. (2024)...
Read More
The Aquila optimizer (AO) algorithm is a nature-inspired optimization algorithm that can be used to determine the optimal parameters of a proportional integral derivative (PID) controller to control the speed of a DC motor. The hunting behavior of Aquila, a bird of prey in the northern hemisphere inspires the AO algorithm. It has been shown...
Read More
Assegie et al. (2022) explored a dataset of heart disease images using machine learning models to predict heart disease. They used recursive feature elimination with cross-validation (RFECV) to analyze the significance of heart disease features on the output generated by the model. The dataset for this experiment was obtained from the University of California Irvine...
Read More
The maturity level of digital technology competence (DTC) in vocational education was analyzed by Astuti et al. (2022) to measure the difference between teachers and students in mastering DTC. They conducted research in public and private vocational schools in Yogyakarta, Indonesia, with a total of 233 respondents. Data were collected using a Likert scale questionnaire...
Read More
Factors that influence childbirth services in Indonesia include geography, education, and economics. Non-resident women tend to use private health facilities rather than institutionalized health facilities that are more accessible. Putri and Laksono (2022) emphasized the importance of empowering women so that they can take advantage of safe childbirth at health facilities. The challenges faced by...
Read More
Synergistic control is applied to a piezoelectric positioning mechanism or piezoelectric actuator (PEA) to improve its stability and performance. This technique is based on the LuGre model. The model works by capturing most of the physical phenomena in the system and then identifying them using particle swarm optimization (PSO). The synergistic control method shows the...
Read More
Sunardi et al. (2022) conducted research by implementing augmented reality (AR) in video conference-based learning during the COVID-19 pandemic in higher education. They surveyed 170 students from various majors and regions. They found that performance expectation, hedonic motivation, and habit were the most significant factors influencing the acceptance of AR in video conference-based learning. The...
Read More
Greetings, fellow Nawala! May you always be in good health. This is the IAES Nawala from the Institute of Advanced Engineering and Science. Today, we will share news about the role of machine learning. It has been mentioned in the previous post, that machine learning (ML) includes algorithms and techniques that allow computers to learn...
Read More
Periasamy et al. (2022) researched the application of the particle swarm optimization (PSO) method in renewable and non-renewable energy sources. Their research aims to address issues related to costs, emissions, and financial burden sharing associated with different energy sources. They emphasize using hybrid algorithms and fuzzy systems to achieve these goals. In addition, they discussed...
Read More
Greetings, fellow Nawala! May you always be in good health. This is the IAES Nawala of the Institute of Advanced Engineering and Science. Today we will share some news about neural networks. Neural networks (NN) are computational models created by mimicking the structure and function of the human brain as a model. NN consists of...
Read More
1 2 3 8