Conformance Analysis of Student Activities to Evaluate Implementation of Outcome-Based Education in Early of Pandemic using Process Mining [PDF]
The learning management system has a core component of a system event log that contains data on activities carried out by students and lecturers in the system.
Andreswari Rachmadita+3 more
doaj +1 more source
Green Computing case study: calls for proposing solutions for the Arabian Gulf Oil Company [PDF]
Nowadays technology-based means are elements in every-day’s life, they ease running household and institution needs. In Libya the number of newly established institutions is on the rise in both the private and public sectors, with such growth there must ...
Benamer Wisam H.+4 more
doaj +1 more source
Quasi Monte Carlo for Periodic Review in Inventory Systems [PDF]
Periodic Review as a method is widely used especially in inventory system. In this paper Quasi Monte Carlo is used for simulating Periodic Review. The problem: How to implement Quasi Monte Carlo simulation in Periodic Review for inventory system of MSMEs
Sugiharti Endang+4 more
doaj +1 more source
Information Systems: Towards a System of Information Systems [PDF]
Information Systems are viewed as a set of services creating a workflow of information directed to specific groups and members. This allows individuals to share ideas and their talents with other members. In such manner, tasks can be carried out both efficiently and effectively.
Saleh, Majd, Abel, Marie-Helene
openaire +2 more sources
ERP Implementation and Foreign Ownership in High-Tech Industry to Achieve Sustainable Development Goals [PDF]
This research aims to identify how ERP implementation can benefit the high-tech industry and achieve sustainable development goals. This research also examines how foreign ownership can affect the performance of the high-technology industry.
Kharunnisa Amelia, Noerlina, Meiryani
doaj +1 more source
Integrated information theory (IIT) starts from consciousness itself and identifies a set of properties (axioms) that are true of every conceivable experience. The axioms are translated into a set of postulates about the substrate of consciousness (called a complex), which are then used to formulate a mathematical framework for assessing both the ...
William Marshall+9 more
openaire +4 more sources
How to Design the Best Audit Instrument for Evaluate E-Government Security? [PDF]
The United Nation e-government survey reports that the implementation of e-government in Indonesia will increase in 2021. This proves that the Indonesian government is trying to transform all its business processes by digitalization.
Safitri Eristya Maya+5 more
doaj +1 more source
A Systematic Literature Review On Missing Values: Research Trends, Datasets, Methods and Frameworks [PDF]
Handling of missing values in data analysis is the focus of attention in various research fields. Imputation is one method that is commonly used to overcome this problem of missing data.
Setiawan Ismail+2 more
doaj +1 more source
On Linear Information Systems [PDF]
Scott's information systems provide a categorically equivalent, intensional description of Scott domains and continuous functions. Following a well established pattern in denotational semantics, we define a linear version of information systems, providing a model of intuitionistic linear logic (a new-Seely category), with a "set-theoretic ...
Bucciarelli, Antonio+3 more
openaire +6 more sources
Blind estimation of modulation parameters for PCMA signals using frame cyclic features
Blind receiver technologies for paired carrier multiple access (PCMA) signals have always been a challenging task with many technical difficulties, among which the estimation of modulation parameters is a fundamental but important element.
Fang Li+3 more
doaj +1 more source