53   Artículos

 
en línea
Melki Mario Gulo, I Gede Puja Astawa, Amang Sudarsono     Pág. 35 - 59
In recent years, the development of communication technology has advanced at an accelerated rate. Communication technologies such as 4G, 5G, Wi-Fi 5 (802.11ac), and Wi-Fi 6 (802.11ax) are extensively used today due to their excellent system quality and e... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Ruwaidah Afiyati, Sudarsono, Tunggul Anshari Setia Negara, Imam Koeswahyono     Pág. 503 - 511

 
en línea
Febby Ronaldo, Amang Sudarsono, Dadet Pramadihanto     Pág. 120 - 135
Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time.  Howe... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Indra Kusuma Haryanto, Sudarsono Sudarsono, Bambang Sugiri, Abdul Rachmad Budiono     Pág. 423 - 431

 
en línea
Dielasy Budiarti, Sudarsono Sudarsono, Bambang Sugiri, Abdul Rachmad Budiono     Pág. 173 - 183

 
en línea
Saifudin Usman, Idris Winarno, Amang Sudarsono     Pág. 252 - 267
Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusio... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Tri Ubayanto, sudarsono sudarsono, Iwan Permadi, Setyo Widagdo     Pág. 105 - 113

 
en línea
Hendra Kurnia Putra, sudarsono sudarsono, Istislam Istislam, Aan Eko Widiarto     Pág. 182 - 190

 
en línea
Anindya Dwi Putri Islamidina, Amang Sudarsono, Titon Dutono     Pág. 102 - 125
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size an... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Inka Trisna Dewi, Amang Sudarsono, Prima Kristalina, Mike Yuliana     Pág. 140 - 160
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic scheme that requires the distribution of shared secret keys. To reduce attacks on key distribution, physical layer-based key formation schemes that utilize ... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »