Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Vipkas Al Hadid Firdaus"'
Autor:
null Kadek Suarjuna Batubulan, null Putra Prima Arhandi, null Annisa Taufika Firdausi, null Vipkas Al Hadid Firdaus, null Ade Ismail, null Rizky Ardiansyah
Publikováno v:
Jurnal Pengabdian Polinema Kepada Masyarakat. 9:224-227
Desa Duwet Krajan merupakan Desa yang terletak dikaki gunung tengger, terbagi atas tiga dusun, Swaru paling bawah, Krajan dan Dusun Tosari, Desa Duwet Krajan berbatasan timur dengan TNBTS sebelah selatan berbatasan dengan Kecamatan Poncokusumo sedang
Autor:
null Ade Ismail, null Kadek Suarjuna Batubulan, null Vipkas Al Hadid Firdaus, Noprianto Noprianto, null Dian Hanifudin Subhi
Publikováno v:
J-ABDI: Jurnal Pengabdian kepada Masyarakat. 2:4627-4632
Lokasi BUMDes Desa Duwet yang cukup dengan Taman Nasional Bromo Tengger Semeru (TNBTS) mengakibatkan desa ini memiliki kontur tanah berbukit, dengan ketinggian 700-1500 meter diatas laut, membuat suasana di desa cukup sejuk. Namun, daerah lereng meny
Publikováno v:
2021 Universitas Riau International Conference on Education Technology (URICET).
Autor:
Fairuz Iqbal Maulana, Inda Rusdia Sofiani, Vipkas Al Hadid Firdaus, M. Aldiki Febriantono, Dwi Risza Budi Raharja
Publikováno v:
2021 7th International Conference on Electrical, Electronics and Information Engineering (ICEEIE).
Autor:
Ridho Hendra Yoga Perdana, Ahmad Wilda Yulianto, Nurul Hidayati, Nila Novita Sari, Dodit Suprianto, Vipkas Al Hadid Firdaus
Publikováno v:
2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS).
Nowadays, the evolution of a factory has pushed towards a smart learning factory. By having the ability to learn, monitor each device and the resulting product will get more precise product results according to design. Detection of a place to put a p
Publikováno v:
JURIKOM (Jurnal Riset Komputer). 9:85
Data security is still a major issue regarding the need for data confidentiality. The encryption process using the RSA algorithm is still the most popular method used in securing data because the complexity of the mathematical equations used in this
Publikováno v:
Jurnal Sistem Komputer dan Informatika (JSON). 2:283
Disk encryption technology is something very useful in securing data. On the other hand, disk encryption can be used by criminals to hide the digital evidence. The information in the disk will be very useful for the investigation, but if the disk on
Publikováno v:
IOP Conference Series: Materials Science and Engineering. 830:022090
Mathematics equation of the RSA is the complicated one between the other asymmetric encryption methods. It makes the RSA method needs more resources than the others. Most existing studies are trying to make another encryption method that need less co
Publikováno v:
IOP Conference Series: Materials Science and Engineering. 830:022089
In the Law Fiction Theory, it is assumed that once the government enforces legal norms at that time, everyone is considered to know the law. So that someone’s ignorance of the law cannot free him from lawsuits. This condition led to the emergence o
Publikováno v:
IOP Conference Series: Materials Science and Engineering. 732:012081
Virtualization server uses the hypervisor technology in its implementation. Hypervisor is one of the virtualization techniques. Where this technique runs several operating systems together in one host. Cloud computing is a combination of the use of i