muhammad fauzi - Academia.edu (original) (raw)

Papers by muhammad fauzi

Research paper thumbnail of A Comparative Assessment of Threat Identification Methods in EHR Systems

Research paper thumbnail of Exploring the Impact of Contingency Theory on Sustainable Innovation in Malaysian Manufacturing Firms

Sustainability

This study looks at the impact of contingency theory on sustainable innovation in Malaysian manuf... more This study looks at the impact of contingency theory on sustainable innovation in Malaysian manufacturing firms. A quantitative approach was used, with convenience sampling to select participants from a target population of Malaysian manufacturing employees. An online survey distributed via email was used to collect 101 sets of data for the study. PLS-SEM (Partial Least Squares Structural Equation Modeling) was used to analyze the collected data. According to the findings, corporate sustainable support policies and sustainable incentives have a significant positive impact on sustainable innovation in Malaysian manufacturing firms, whereas top management commitment was found to be insignificant. Companies that prioritize sustainable practices through policies and incentives are more likely to promote sustainable innovation, according to the findings. As a result, businesses should prioritize developing these two attributes in order to foster sustainable innovation, thereby improving ...

Research paper thumbnail of Comparative Analysis between Individual, Centralized, and Federated Learning for Smartwatch Based Stress Detection

Journal of Personalized Medicine

Machine learning has been proven to provide good performances on stress detection tasks using mul... more Machine learning has been proven to provide good performances on stress detection tasks using multi-modal sensor data from a smartwatch. Generally, machine learning techniques need a sufficient amount of data to train a robust model. Thus, we need to collect data from several users and send them to a central server to feed the algorithm. However, the uploaded data may contain sensitive information that can jeopardize the user’s privacy. Federated learning can tackle this challenge by enabling the model to be trained using data from all users without the user’s data leaving the user’s device. In this study, we implement federated learning-based stress detection and provide a comparative analysis between individual, centralized, and federated learning. The experiment was conducted on WESAD dataset by using Logistic Regression as the classifier. The experiment results show that in terms of accuracy, federated learning cannot reach the performance level of both individual and centralize...

Research paper thumbnail of Investigation into Phishing Risk Behaviour among Healthcare Staff

Information

A phishing attack is one of the less complicated ways to circumvent sophisticated technical secur... more A phishing attack is one of the less complicated ways to circumvent sophisticated technical security measures. It is often used to exploit psychological (as as well as other) factors of human users to succeed in social engineering attacks including ransomware. Guided by the state-of-the-arts in a phishing simulation study in healthcare and after deeply assessing the ethical dilemmas, an SMS-based phishing simulation was conducted among healthcare workers in Ghana. The study adopted an in-the-wild study approach alongside quantitative and qualitative surveys. From the state-of-the-art studies, the in-the-wild study approach was the most commonly used method as compared to laboratory-based experiments and statistical surveys because its findings are generally reliable and effective. The attack results also showed that 61% of the targeted healthcare staff were susceptible, and some of the healthcare staff were not victims of the attack because they prioritized patient care and were not...

Research paper thumbnail of A Comprehensive Assessment of Human Factors in Cyber Security Compliance toward Enhancing the Security Practice of Healthcare Staff in Paperless Hospitals

Information

Recent reports indicate that over 85% of data breaches are still caused by a human element, of wh... more Recent reports indicate that over 85% of data breaches are still caused by a human element, of which healthcare is one of the organizations that cyber criminals target. As healthcare IT infrastructure is characterized by a human element, this study comprehensively examined the effect of psycho-socio-cultural and work factors on security behavior in a typical hospital. A quantitative approach was adopted where we collected responses from 212 healthcare staff through an online questionnaire survey. A broad range of constructs was selected from psychological, social, cultural perception, and work factors based on earlier review work. These were related with some security practices to assess the information security (IS) knowledge, attitude and behavior gaps among healthcare staff in a comprehensive way. The study revealed that work emergency (WE) has a positive correlation with IS conscious care behavior (ISCCB) risk. Conscientiousness also had a positive correlation with ISCCB risk, b...

Research paper thumbnail of Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia

The 16th International Conference on Availability, Reliability and Security, 2021

Research paper thumbnail of Digital Addiction among Young Adolescent: Mitigating the Impact of Media Technological Adversity

Journal of Physics: Conference Series, 2020

Addiction toward social media has become a new norm, especially among young adolescent. Social me... more Addiction toward social media has become a new norm, especially among young adolescent. Social media users in Malaysia accounted to nearly 20 million, more than half of the population. Some individual having more than one account in different social media platform. With the increasing prevalent of social media addiction among young adolescent, this study ought to identify what are the critical factors that can influence one addiction toward social media. Based on the technology acceptance model (TAM) and flow-happiness theory, this study would like to unfold this issue and connect the possible factors that play critical role in user’s social media addiction based on its detrimental impact. Using partial least square structural equation modelling (PLS-SEM), this study applies the quantitative study by testing the antecedents of social media addition. 217 respondents who are mainly university students responded to the survey. It was found that the most critical factor is perceived eas...

Research paper thumbnail of Secure Software Development Best Practices

International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence

This research aims to explore optimal strategies for fortified software, enhancing the implementa... more This research aims to explore optimal strategies for fortified software, enhancing the implementation of secure software development practices. Software security involves crafting and designing software that guarantees the integrity, confidentiality, and availability of its code, data, and functionalities. Often, in prioritizing functionality, security takes a back seat when organizations embark on system development. Yet, it's imperative to embed security at every phase of the Software Development Life Cycle (SDLC). Numerous methodologies and models exist for addressing software security, but only a few substantiate creating secure software applications effectively. Despite advancements, software security remains inadequately addressed, posing a challenge to integrating security protocols into the SDLC seamlessly. This review advocates specific security measures to be integrated at each SDLC level, fostering a secure SDLC. Efficient amalgamation of these processes ensures the d...

Research paper thumbnail of Cyber–Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review

Social Sciences

Cyber and information security (CIS) is an issue of national and international interest. Despite ... more Cyber and information security (CIS) is an issue of national and international interest. Despite sophisticated security systems and extensive physical countermeasures to combat cyber-attacks, organisations are vulnerable due to the involvement of the human factor. Humans are regarded as the weakest link in cybersecurity systems as development in digital technology advances. The area of cybersecurity is an extension of the previously studied fields of information and internet security. The need to understand the underlying human behavioural factors associated with CIS policy warrants further study, mainly from theoretical perspectives. Based on these underlying theoretical perspectives, this study reviews literature focusing on CIS compliance and violations by personnel within organisations. Sixty studies from the years 2008 to 2020 were reviewed. Findings suggest that several prominent theories were used extensively and integrated with another specific theory. Protection Motivation ...

Research paper thumbnail of Pengembangan Perangkat Pembelajaran Matematika Untuk Meningkatkan Kemampuan Berpikir Kritis Dan Self Efficacy Siswa Dengan Menggunakan Model Problem Based Learning DI Sma Sultan Iskandar Muda T.A 2017/2018

Paradikma: Jurnal Pendidikan Matematika, 2020

Penelitian ini bertujuan untuk mendeskripsikan: 1) efektivitas perangkat pembelajaran model PBL d... more Penelitian ini bertujuan untuk mendeskripsikan: 1) efektivitas perangkat pembelajaran model PBL dalam meningkatkan kemampuan berpikir kritis dan Self Efficacy siswa SMA; 2) peningkatan kemampuan berpikir kritis dan Self Efficacy siswa SMA dengan menggunakan perangkat pembelajaran model PBL; Penelitian ini merupakan penelitian pengembangan. Penelitian ini dilakukan menggunakan model Dick and Carrey. Populasi dalam penelitian ini adalah seluruh siswa SMA kota Medan, pengambilan sampel menggunakan purposive sampling dan sekolah yang dijadikan sebagai subjek untuk uji coba adalah SMA Sultan Iskandar Muda kelas XI- IPA 1. Dari hasil uji coba I dan uji coba II diperoleh: 1) perangkat pembelajaran memenuhi keefektifan, efektivitas ditinjau dari a) ketuntasan belajar siswa secara klasikal; b) ketercapaian tujuan pembelajaran; dan c) waktu pembelajaran; 2) peningkatan kemampuan berpikir kritis dan Self Efficacy siswa dengan menggunakan perangkat pembelajaran model PBL; Selanjutnya, disaranka...

Research paper thumbnail of Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study

JMIR Medical Informatics, 2021

Background Blocklisting malicious activities in health care is challenging in relation to access ... more Background Blocklisting malicious activities in health care is challenging in relation to access control in health care security practices due to the fear of preventing legitimate access for therapeutic reasons. Inadvertent prevention of legitimate access can contravene the availability trait of the confidentiality, integrity, and availability triad, and may result in worsening health conditions, leading to serious consequences, including deaths. Therefore, health care staff are often provided with a wide range of access such as a “breaking-the-glass” or “self-authorization” mechanism for emergency access. However, this broad access can undermine the confidentiality and integrity of sensitive health care data because breaking-the-glass can lead to vast unauthorized access, which could be problematic when determining illegitimate access in security practices. Objective A review was performed to pinpoint appropriate artificial intelligence (AI) methods and data sources that can be use...

Research paper thumbnail of A Framework for Assessing Motivational Methods Towards Incentivizing Cybersecurity Practice in Healthcare

7th International Conference on Sustainable Information Engineering and Technology 2022

Research paper thumbnail of Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks

Information

This study examines the factors influencing government employees’ cybersecurity behavior in Malay... more This study examines the factors influencing government employees’ cybersecurity behavior in Malaysia. The country is considered the most vulnerable in Southeast Asia. Applying the protection motivation theory, this study addresses the gap by investigating how government employees behave toward corresponding cyberrisks and threats. Using partial least-squares structural equation modeling (PLS-SEM), 446 respondents participated and were analyzed. The findings suggest that highly motivated employees with high severity, vulnerability, response efficacy, and self-efficacy exercise cybersecurity. Incorporating the users’ perceptions of vulnerability and severity facilitates behavioral change and increases the understanding of cybersecurity behavior’s role in addressing cybersecurity threats—particularly the impact of the threat response in predicting the cybersecurity behavior of government employees. The implications include providing robust information security protection to the governm...

Research paper thumbnail of Peningkatan Kemampuan Koneksi Matematis Dan Kemandirian Belajar Siswa Dengan Pendekatan Pembelajaran Metakognitif Di Sekolah Menengah Pertama

Berdasarkan hasil analisis, temuan, dan pembahasan yang telah dikemukakan pada bab sebelumnya dip... more Berdasarkan hasil analisis, temuan, dan pembahasan yang telah dikemukakan pada bab sebelumnya diperoleh beberapa kesimpulan berikut.

Research paper thumbnail of A new family of conjugate gradient methods for small-scale unconstrained optimization

ABSTRACT Conjugate gradient (CG) methods are famous for solving nonlinear unconstrained optimizat... more ABSTRACT Conjugate gradient (CG) methods are famous for solving nonlinear unconstrained optimization problems because they only need low computer memory. In this paper, we propose a new CG coefficient (βk) which has global convergence properties using exact line search. Numerical results based on the number of iterations have shown that the new βk performs better than some other CG methods.

Research paper thumbnail of Karakteristik Spotlighting Untuk Koleksi Museum Dengan Pendekatan Fotografi

In the museum there are rules asked not to take pictures with flash. The main concern is keeping ... more In the museum there are rules asked not to take pictures with flash. The main concern is keeping the material of art, because flash light can cause significant damage to the collection object, Flash Light can contribute significantly to the degradation process of a work of art. As already said, many museums have known the desire of visitors to take photos from their collections. In response, many photography permits are allowed, as long as they do not use flash. The method of observation is done by phenomenology, preliminary analysis is presented in description on each object through intensive observation with the help of documentation based on predetermined category. Withdrawal in the form of a description of the results of the analysis that will answer the formulation of this research problem. The lighting conditions of the Fatahilah Museum gallery in particular are collectibles and what are the factors that optimize the design of efficient artificial lighting so as to create an a...

Research paper thumbnail of A Modified DPRP Conjugate Gradient Method for Unconstrained Optimization

Far East Journal of Mathematical Sciences

Currently, Zhang [17] takes some modification of the Wei-Yao-Liu nonlinear conjugate gradient met... more Currently, Zhang [17] takes some modification of the Wei-Yao-Liu nonlinear conjugate gradient method suggested by Wei et al. [18] such that the modified method called NPRP method. Dai and Wen [19] make a simple modification to the NPRP called DPRP method. In this paper, we change denominator of DPRP method such that the modified DPRP method possesses global convergence under exact line search. Numerical results show that the proposed method is efficient for the given test functions when compared with classical formula and DPRP method.

Research paper thumbnail of A Comparative Assessment of Threat Identification Methods in EHR Systems

Research paper thumbnail of Exploring the Impact of Contingency Theory on Sustainable Innovation in Malaysian Manufacturing Firms

Sustainability

This study looks at the impact of contingency theory on sustainable innovation in Malaysian manuf... more This study looks at the impact of contingency theory on sustainable innovation in Malaysian manufacturing firms. A quantitative approach was used, with convenience sampling to select participants from a target population of Malaysian manufacturing employees. An online survey distributed via email was used to collect 101 sets of data for the study. PLS-SEM (Partial Least Squares Structural Equation Modeling) was used to analyze the collected data. According to the findings, corporate sustainable support policies and sustainable incentives have a significant positive impact on sustainable innovation in Malaysian manufacturing firms, whereas top management commitment was found to be insignificant. Companies that prioritize sustainable practices through policies and incentives are more likely to promote sustainable innovation, according to the findings. As a result, businesses should prioritize developing these two attributes in order to foster sustainable innovation, thereby improving ...

Research paper thumbnail of Comparative Analysis between Individual, Centralized, and Federated Learning for Smartwatch Based Stress Detection

Journal of Personalized Medicine

Machine learning has been proven to provide good performances on stress detection tasks using mul... more Machine learning has been proven to provide good performances on stress detection tasks using multi-modal sensor data from a smartwatch. Generally, machine learning techniques need a sufficient amount of data to train a robust model. Thus, we need to collect data from several users and send them to a central server to feed the algorithm. However, the uploaded data may contain sensitive information that can jeopardize the user’s privacy. Federated learning can tackle this challenge by enabling the model to be trained using data from all users without the user’s data leaving the user’s device. In this study, we implement federated learning-based stress detection and provide a comparative analysis between individual, centralized, and federated learning. The experiment was conducted on WESAD dataset by using Logistic Regression as the classifier. The experiment results show that in terms of accuracy, federated learning cannot reach the performance level of both individual and centralize...

Research paper thumbnail of Investigation into Phishing Risk Behaviour among Healthcare Staff

Information

A phishing attack is one of the less complicated ways to circumvent sophisticated technical secur... more A phishing attack is one of the less complicated ways to circumvent sophisticated technical security measures. It is often used to exploit psychological (as as well as other) factors of human users to succeed in social engineering attacks including ransomware. Guided by the state-of-the-arts in a phishing simulation study in healthcare and after deeply assessing the ethical dilemmas, an SMS-based phishing simulation was conducted among healthcare workers in Ghana. The study adopted an in-the-wild study approach alongside quantitative and qualitative surveys. From the state-of-the-art studies, the in-the-wild study approach was the most commonly used method as compared to laboratory-based experiments and statistical surveys because its findings are generally reliable and effective. The attack results also showed that 61% of the targeted healthcare staff were susceptible, and some of the healthcare staff were not victims of the attack because they prioritized patient care and were not...

Research paper thumbnail of A Comprehensive Assessment of Human Factors in Cyber Security Compliance toward Enhancing the Security Practice of Healthcare Staff in Paperless Hospitals

Information

Recent reports indicate that over 85% of data breaches are still caused by a human element, of wh... more Recent reports indicate that over 85% of data breaches are still caused by a human element, of which healthcare is one of the organizations that cyber criminals target. As healthcare IT infrastructure is characterized by a human element, this study comprehensively examined the effect of psycho-socio-cultural and work factors on security behavior in a typical hospital. A quantitative approach was adopted where we collected responses from 212 healthcare staff through an online questionnaire survey. A broad range of constructs was selected from psychological, social, cultural perception, and work factors based on earlier review work. These were related with some security practices to assess the information security (IS) knowledge, attitude and behavior gaps among healthcare staff in a comprehensive way. The study revealed that work emergency (WE) has a positive correlation with IS conscious care behavior (ISCCB) risk. Conscientiousness also had a positive correlation with ISCCB risk, b...

Research paper thumbnail of Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia

The 16th International Conference on Availability, Reliability and Security, 2021

Research paper thumbnail of Digital Addiction among Young Adolescent: Mitigating the Impact of Media Technological Adversity

Journal of Physics: Conference Series, 2020

Addiction toward social media has become a new norm, especially among young adolescent. Social me... more Addiction toward social media has become a new norm, especially among young adolescent. Social media users in Malaysia accounted to nearly 20 million, more than half of the population. Some individual having more than one account in different social media platform. With the increasing prevalent of social media addiction among young adolescent, this study ought to identify what are the critical factors that can influence one addiction toward social media. Based on the technology acceptance model (TAM) and flow-happiness theory, this study would like to unfold this issue and connect the possible factors that play critical role in user’s social media addiction based on its detrimental impact. Using partial least square structural equation modelling (PLS-SEM), this study applies the quantitative study by testing the antecedents of social media addition. 217 respondents who are mainly university students responded to the survey. It was found that the most critical factor is perceived eas...

Research paper thumbnail of Secure Software Development Best Practices

International Journal of Emerging Multidisciplinaries: Computer Science & Artificial Intelligence

This research aims to explore optimal strategies for fortified software, enhancing the implementa... more This research aims to explore optimal strategies for fortified software, enhancing the implementation of secure software development practices. Software security involves crafting and designing software that guarantees the integrity, confidentiality, and availability of its code, data, and functionalities. Often, in prioritizing functionality, security takes a back seat when organizations embark on system development. Yet, it's imperative to embed security at every phase of the Software Development Life Cycle (SDLC). Numerous methodologies and models exist for addressing software security, but only a few substantiate creating secure software applications effectively. Despite advancements, software security remains inadequately addressed, posing a challenge to integrating security protocols into the SDLC seamlessly. This review advocates specific security measures to be integrated at each SDLC level, fostering a secure SDLC. Efficient amalgamation of these processes ensures the d...

Research paper thumbnail of Cyber–Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review

Social Sciences

Cyber and information security (CIS) is an issue of national and international interest. Despite ... more Cyber and information security (CIS) is an issue of national and international interest. Despite sophisticated security systems and extensive physical countermeasures to combat cyber-attacks, organisations are vulnerable due to the involvement of the human factor. Humans are regarded as the weakest link in cybersecurity systems as development in digital technology advances. The area of cybersecurity is an extension of the previously studied fields of information and internet security. The need to understand the underlying human behavioural factors associated with CIS policy warrants further study, mainly from theoretical perspectives. Based on these underlying theoretical perspectives, this study reviews literature focusing on CIS compliance and violations by personnel within organisations. Sixty studies from the years 2008 to 2020 were reviewed. Findings suggest that several prominent theories were used extensively and integrated with another specific theory. Protection Motivation ...

Research paper thumbnail of Pengembangan Perangkat Pembelajaran Matematika Untuk Meningkatkan Kemampuan Berpikir Kritis Dan Self Efficacy Siswa Dengan Menggunakan Model Problem Based Learning DI Sma Sultan Iskandar Muda T.A 2017/2018

Paradikma: Jurnal Pendidikan Matematika, 2020

Penelitian ini bertujuan untuk mendeskripsikan: 1) efektivitas perangkat pembelajaran model PBL d... more Penelitian ini bertujuan untuk mendeskripsikan: 1) efektivitas perangkat pembelajaran model PBL dalam meningkatkan kemampuan berpikir kritis dan Self Efficacy siswa SMA; 2) peningkatan kemampuan berpikir kritis dan Self Efficacy siswa SMA dengan menggunakan perangkat pembelajaran model PBL; Penelitian ini merupakan penelitian pengembangan. Penelitian ini dilakukan menggunakan model Dick and Carrey. Populasi dalam penelitian ini adalah seluruh siswa SMA kota Medan, pengambilan sampel menggunakan purposive sampling dan sekolah yang dijadikan sebagai subjek untuk uji coba adalah SMA Sultan Iskandar Muda kelas XI- IPA 1. Dari hasil uji coba I dan uji coba II diperoleh: 1) perangkat pembelajaran memenuhi keefektifan, efektivitas ditinjau dari a) ketuntasan belajar siswa secara klasikal; b) ketercapaian tujuan pembelajaran; dan c) waktu pembelajaran; 2) peningkatan kemampuan berpikir kritis dan Self Efficacy siswa dengan menggunakan perangkat pembelajaran model PBL; Selanjutnya, disaranka...

Research paper thumbnail of Artificial Intelligence–Based Framework for Analyzing Health Care Staff Security Practice: Mapping Review and Simulation Study

JMIR Medical Informatics, 2021

Background Blocklisting malicious activities in health care is challenging in relation to access ... more Background Blocklisting malicious activities in health care is challenging in relation to access control in health care security practices due to the fear of preventing legitimate access for therapeutic reasons. Inadvertent prevention of legitimate access can contravene the availability trait of the confidentiality, integrity, and availability triad, and may result in worsening health conditions, leading to serious consequences, including deaths. Therefore, health care staff are often provided with a wide range of access such as a “breaking-the-glass” or “self-authorization” mechanism for emergency access. However, this broad access can undermine the confidentiality and integrity of sensitive health care data because breaking-the-glass can lead to vast unauthorized access, which could be problematic when determining illegitimate access in security practices. Objective A review was performed to pinpoint appropriate artificial intelligence (AI) methods and data sources that can be use...

Research paper thumbnail of A Framework for Assessing Motivational Methods Towards Incentivizing Cybersecurity Practice in Healthcare

7th International Conference on Sustainable Information Engineering and Technology 2022

Research paper thumbnail of Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks

Information

This study examines the factors influencing government employees’ cybersecurity behavior in Malay... more This study examines the factors influencing government employees’ cybersecurity behavior in Malaysia. The country is considered the most vulnerable in Southeast Asia. Applying the protection motivation theory, this study addresses the gap by investigating how government employees behave toward corresponding cyberrisks and threats. Using partial least-squares structural equation modeling (PLS-SEM), 446 respondents participated and were analyzed. The findings suggest that highly motivated employees with high severity, vulnerability, response efficacy, and self-efficacy exercise cybersecurity. Incorporating the users’ perceptions of vulnerability and severity facilitates behavioral change and increases the understanding of cybersecurity behavior’s role in addressing cybersecurity threats—particularly the impact of the threat response in predicting the cybersecurity behavior of government employees. The implications include providing robust information security protection to the governm...

Research paper thumbnail of Peningkatan Kemampuan Koneksi Matematis Dan Kemandirian Belajar Siswa Dengan Pendekatan Pembelajaran Metakognitif Di Sekolah Menengah Pertama

Berdasarkan hasil analisis, temuan, dan pembahasan yang telah dikemukakan pada bab sebelumnya dip... more Berdasarkan hasil analisis, temuan, dan pembahasan yang telah dikemukakan pada bab sebelumnya diperoleh beberapa kesimpulan berikut.

Research paper thumbnail of A new family of conjugate gradient methods for small-scale unconstrained optimization

ABSTRACT Conjugate gradient (CG) methods are famous for solving nonlinear unconstrained optimizat... more ABSTRACT Conjugate gradient (CG) methods are famous for solving nonlinear unconstrained optimization problems because they only need low computer memory. In this paper, we propose a new CG coefficient (βk) which has global convergence properties using exact line search. Numerical results based on the number of iterations have shown that the new βk performs better than some other CG methods.

Research paper thumbnail of Karakteristik Spotlighting Untuk Koleksi Museum Dengan Pendekatan Fotografi

In the museum there are rules asked not to take pictures with flash. The main concern is keeping ... more In the museum there are rules asked not to take pictures with flash. The main concern is keeping the material of art, because flash light can cause significant damage to the collection object, Flash Light can contribute significantly to the degradation process of a work of art. As already said, many museums have known the desire of visitors to take photos from their collections. In response, many photography permits are allowed, as long as they do not use flash. The method of observation is done by phenomenology, preliminary analysis is presented in description on each object through intensive observation with the help of documentation based on predetermined category. Withdrawal in the form of a description of the results of the analysis that will answer the formulation of this research problem. The lighting conditions of the Fatahilah Museum gallery in particular are collectibles and what are the factors that optimize the design of efficient artificial lighting so as to create an a...

Research paper thumbnail of A Modified DPRP Conjugate Gradient Method for Unconstrained Optimization

Far East Journal of Mathematical Sciences

Currently, Zhang [17] takes some modification of the Wei-Yao-Liu nonlinear conjugate gradient met... more Currently, Zhang [17] takes some modification of the Wei-Yao-Liu nonlinear conjugate gradient method suggested by Wei et al. [18] such that the modified method called NPRP method. Dai and Wen [19] make a simple modification to the NPRP called DPRP method. In this paper, we change denominator of DPRP method such that the modified DPRP method possesses global convergence under exact line search. Numerical results show that the proposed method is efficient for the given test functions when compared with classical formula and DPRP method.