Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Istiyanto, Jazi Eko"'
The rapid growth of industrial technology, driven by automation, IoT, and cloud computing, has also increased the risk of cyberattacks, such as Man-in-the-Middle (MITM) attacks. A standard solution to protect data is using a Hardware Security Module
Externí odkaz:
http://arxiv.org/abs/2409.09948
This research highlights the rapid development of technology in the industry, particularly Industry 4.0, supported by fundamental technologies such as the Internet of Things (IoT), cloud computing, big data, and data analysis. Despite providing effic
Externí odkaz:
http://arxiv.org/abs/2409.09928
Autor:
Rochman, Syafiqur, Istiyanto, Jazi Eko, Dharmawan, Andi, Handika, Vian, Purnama, Satriawan Rasyid
Publikováno v:
In Procedia Computer Science 2023 216:230-236
Publikováno v:
Huizen, R.R., Istiyanto, J.E. and Putra, A.E., 2017, International Journal of Advanced Studies in Computer Science and Engineering (IJASCSE), Volume 6 Issue 01
This research was conducted to develop a method to identify voice utterance. For voice utterance that encounters change caused by aging factor, with the interval of 10 to 25 years. The change of voice utterance influenced by aging factor might be ext
Externí odkaz:
http://arxiv.org/abs/1702.01999
Publikováno v:
Haryono, Istiyanto, J.E., Harjoko, A., Putra, A.E., 2014, International Journal of advanced studies in Computer Science and Engineering IJASCSE, Volume 3, Issue 2, 2014
Hazard radiation can lead the system fault therefore Fault Tolerance is required. Fault Tolerant is a system, which is designed to keep operations running, despite the degradation in the specific module is happening. Many fault tolerances have been d
Externí odkaz:
http://arxiv.org/abs/1403.1928
Publikováno v:
IJACSA Vol. 2 No. 11, 2011. The Science and Information Organization
Open Source Software (OSS) Projects are gaining popularity these days, and they become alternatives in building software system. Despite many failures in these projects, there are some success stories with one of the identified success factors is mod
Externí odkaz:
http://arxiv.org/abs/1309.5689
Internet crimes are now increasing. In a row with many crimes using information technology, in particular those using Internet, some crimes are often carried out in the form of attacks that occur within a particular agency or institution. To be able
Externí odkaz:
http://arxiv.org/abs/1307.0072
This paper proposes a new consensus model in participatory decision making. The model employs advice centrality approach by electing a leader and recommender named as Supra Decision Maker (SDM). A SDM has a role as a decision bench-marker to other de
Externí odkaz:
http://arxiv.org/abs/1203.5570
Autor:
Timur, Muhammad Idham Ananta, Dharmawan, Andi, Istiyanto, Jazi Eko, Pambudi, Stanislaus Arya Luhur, Tsurayya, Hayfa
Publikováno v:
AIP Conference Proceedings; 2023, Vol. 2654 Issue 1, p1-8, 8p
Autor:
Rafi’i, Muhammad, Istiyanto, Jazi Eko
Publikováno v:
BIMIPA; Vol 24, No 1 (2014); 39-50
Saat ini SMS menjadi kebutuhan bagi pengguna telepon seluler untuk berkomunikasi dengan orang lain. Tetapi pengguna telepon seluler tidak menyadari bahwa pesan yang dikirim bisa disadap atau dirubah oleh pihak yang tidak diinginkan. Untuk itu dibutuh