Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Sugiantoro, Bambang"'
Publikováno v:
International Journal of Electrical & Computer Engineering (2088-8708); 2024, Vol. 14 Issue 5, p5400-5407, 8p
Publikováno v:
International Journal on Advanced Science, Engineering & Information Technology; 2024, Vol. 14 Issue 3, p880-886, 7p
Publikováno v:
Engineering Headway; April 2024, Vol. 6 Issue: 1 p211-218, 8p
Autor:
Sakuri, Sakuri, Sugiarto, Tris, Sugiantoro, Bambang, Sutarno, Faqih, S., Pratiwi, Yuliyanti Dian, Sutisna, Utis, Praharto, Y. B.
Publikováno v:
Technium; 2023, Vol. 15, p33-44, 12p
Publikováno v:
Jurnal Pendidikan Multimedia (Edsence); Volume 4 No 1 (Juni 2022); 29-36
Kerja Praktek merupakan matakuliah wajib yang harus diselesaikan oleh mahasiswa. Pada pelaksanaan kerja praktek, banyak mahasiswa yang tidak mengerti prosedur pada mata kuliah ini karena sumber informasi yang selama ini digunakan, hanya penjelasan se
Publikováno v:
EnvironmentAsia; Jan2023, Vol. 16 Issue 1, p146-156, 11p
Publikováno v:
semanTIK; Vol 4, No 2 (2018): semanTIK; 193-200
An audio recorder is one of the multimedia content that is often found at the crime scene and is used as evidence in the trial process. Audio recorders that can be made as legal evidence in court must follow the rules and audio forensic standards tha
Autor:
Sugiantoro, Bambang
Publikováno v:
Query: Jurnal Sistem Informasi, Vol 1, Iss 2 (2017)
Query: Journal of Information Systems; Volume: 01, Number: 02, October 2017
Query: Journal of Information Systems; Volume: 01, Number: 02, October 2017
As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has been gradually developed. Agent-based approach for intrusion detection system has developed from single to multi agent, and later developed mobile age
Publikováno v:
Materials Science Forum; May 2021, Vol. 1029 Issue: 1 p65-72, 8p
Autor:
Sugiantoro, Bambang, Maulida, Desti
Publikováno v:
Seminar Nasional Aplikasi Teknologi Informasi (SNATI); 2007
Last several year, the happening terrorism around the society required security officers to act firmer andfind strategy to fight this crime. One of the strategies used was by listening to the committer’s telephone. Tosupport the strategy, it needs