Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Vera Suryani"'
Publikováno v:
Egyptian Informatics Journal, Vol 28, Iss , Pp 100562- (2024)
This research aimed to investigate the application of Vlse Kriterijumska Optimizacija I Kompromisno Resenje (VIKOR) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) multi-criteria decision-making to select the optimal cl
Externí odkaz:
https://doaj.org/article/bcf84f01d2454ae88c03a21739009ec1
Publikováno v:
Jurnal Infotel, Vol 15, Iss 1, Pp 75-81 (2023)
Cleanliness is a mandatory requirement to help prevent virus spread. The cleaning process can be done automatically by humans or robotic devices. If a robot does this process, it is a must that the robot is able to explore the room autonomously. The
Externí odkaz:
https://doaj.org/article/9cd287ef15d8446e8273e9b3b5fa4886
Publikováno v:
JURNAL INFOTEL. 15:75-81
Cleanliness is a mandatory requirement to help prevent virus spread. The cleaning process can be done automatically by humans or robotic devices. If a robot does this process, it is a must that the robot is able to explore the room autonomously. The
Publikováno v:
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika). 8:140-153
Anti-forensics on audio is aimed at complicating investigations on audio forensics, on sound recordings. Sound recordings can be altered or manipulated in various ways as well as the provision of distortion effects on sound recordings. Effect such di
Publikováno v:
International journal of electrical and computer engineering systems
Volume 13
Issue 7
Volume 13
Issue 7
LoRa or Long Range with LoRaWAN technology is a protocol for low-power wireless networks. The absence of an encryption process on the data payload becomes a challenge for the LoRaWAN network. When the process of sending messages is running inter devi
Publikováno v:
2022 International Conference on Information Technology Systems and Innovation (ICITSI).
Autor:
Fauzi Dwi Setiawan Sumadi, Christian Sri Kusuma Aditya, Ahmad Akbar Maulana, Syaifuddin Syaifuddin, Vera Suryani
Distributed Denial of Service (DDoS) attacks is the most common type of cyber-attack. Therefore, an appropriate mechanism is needed to overcome those problems. This paper proposed an integration method between the honeypot sensor and software defined
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f272b94854357942c832e7d33db9f3a3
https://zenodo.org/record/6961380
https://zenodo.org/record/6961380
Publikováno v:
2022 10th International Conference on Information and Communication Technology (ICoICT).
Publikováno v:
2022 10th International Conference on Information and Communication Technology (ICoICT).
Publikováno v:
Kinetik, Vol 5, Iss 1, Pp 11-20 (2020)
Internet of Things (IoT) refers to a concept connecting any devices onto the internet. The IoT devices cannot only use a service or server to be controlled at a distance but also to do computation. IoT has been applied in many fields, such as smart c