Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Marza Ihsan Marzuki"'
Autor:
Hasan Bisri, Marza Ihsan Marzuki
Publikováno v:
G-Tech: Jurnal Teknologi Terapan. 7:586-595
Deteksi pemalsuan citra digital memerlukan metode analisis yang lebih canggih daripada sekadar mengandalkan pengamatan visual manusia. Meskipun terdapat banyak metode untuk melakukan pembuktian pada citra yang telah di-edit, namun setiap metode memil
Publikováno v:
Journal of Integrated and Advanced Engineering (JIAE). 3:7-22
The use of WhatsApp for actions that lead to unlawful acts is a serious matter that needs to be proven in court. Android and the WhatsApp messaging application continue to update their features and security to provide maximum service and protection t
Autor:
Rahmat Hidayat, Marza Ihsan Marzuki, Yuliarman Saragih, Ibrahim Ibrahim, Edmund Ucok Armin, Safrian Andromeda, Imam Budi Santoso, Suroyo Suroyo
Publikováno v:
TEKNOKOM. 5:143-148
The development of application and network technology is currently so rapid. This technology is widely used as a solution to overcome data inspection problems in the field of Digital Forensics. The importance of Digital Forensics as evidence, especia
Autor:
Ekky Rega Prabowo, Marza Ihsan Marzuki
Publikováno v:
Journal Of Social Research. 1:318-327
Serangan siber memiliki dampak signifikan pada kinerja jaringan di cloud publik. Sysadmin harus siap untuk menangani setiap serangan di server yang sangat dibutuhkan untuk mencegah serangan yang dapat mengganggu kinerja jaringan cloud publik. Diperlu
Autor:
Agus Sulaiman, Marza Ihsan Marzuki
Publikováno v:
Journal of Integrated and Advanced Engineering (JIAE). 2:11-18
Video streaming is digital data that is shared over the internet network. Streaming video through security protection techniques creates a security that is expected to protect intellectual property rights because there is data transfer through the in
Autor:
Marza Ihsan Marzuki, Dede Fadhilah
Publikováno v:
2020 2nd International Conference on Broadband Communications, Wireless Sensors and Powering (BCWSP).
The rapid development of technology makes it possible for a physical machine to be converted into a virtual machine, which can operate multiple operating systems that are running simultaneously and connected to the internet. DoS/DDoS attacks are cybe
Publikováno v:
IEEE Journal of Oceanic Engineering
IEEE Journal of Oceanic Engineering, Institute of Electrical and Electronics Engineers, 2017, ⟨10.1109/JOE.2017.2723278⟩
IEEE Journal of Oceanic Engineering, Institute of Electrical and Electronics Engineers, 2017, ⟨10.1109/JOE.2017.2723278⟩
International audience; The surveillance of illegal fishing activities is a critical issue for the management of marine resources. In this study, we investigate the space-based monitoring of fishing vessel activities using VMS (Vessel Monitoring Syst
Autor:
Marza Ihsan Marzuki, Rinny Rahmania, Penny Dyah Kusumaningrum, Rudhy Akhwady, Daud Saputra Amare Sianturi, Yustisia Firdaus, Agus Sufyan, Cecep Ahmad Hatori, Handy Chandra
Publikováno v:
IOP Conference Series: Earth and Environmental Science. 925:012058
Detecting fishing boat activity is still a challenge for the biggest archipelago countries, such as Indonesia, to monitor the huge marine area. Space technology using sensors SAR to detect ships has been developed since 1985. However, the cost of usi
Publikováno v:
Jurnal Penelitian Sains. 22:55
The Southern Waters of Java included in 573 WPP has high fishing activity, which the most important commodity is Tuna. The number of Tuna catch are fluctuated which influenced by oceanography factors in the waters. Some of the factors that affect the