23   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
I Gede Puja Astawa, Melki Mario Gulo, Amang Sudarsono     Pág. 301 - 318
Revista: Advances in Technology Innovation    Formato: Electrónico

 
en línea
Melki Mario Gulo, I Gede Puja Astawa, Amang Sudarsono     Pág. 35 - 59
In recent years, the development of communication technology has advanced at an accelerated rate. Communication technologies such as 4G, 5G, Wi-Fi 5 (802.11ac), and Wi-Fi 6 (802.11ax) are extensively used today due to their excellent system quality and e... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Febby Ronaldo, Amang Sudarsono, Dadet Pramadihanto     Pág. 120 - 135
Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time.  Howe... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Febby Ronaldo, Amang Sudarsono, Dadet Pramadihanto     Pág. 120 - 135
Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time.  Howe... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Saifudin Usman, Idris Winarno, Amang Sudarsono     Pág. 252 - 267
Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusio... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Saifudin Usman, Idris Winarno, Amang Sudarsono     Pág. 252 - 267
Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusio... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Anindya Dwi Putri Islamidina, Amang Sudarsono, Titon Dutono     Pág. 102 - 125
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size an... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Inka Trisna Dewi, Amang Sudarsono, Prima Kristalina, Mike Yuliana     Pág. 140 - 160
One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic scheme that requires the distribution of shared secret keys. To reduce attacks on key distribution, physical layer-based key formation schemes that utilize ... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Novi Aryani Fitri, M. Udin Harun Al Rasyid, Amang Sudarsono     Pág. 151 - 175
Information on medical record is very sensitive data due to the number of confidential information about a patient's condition. Therefore, a secure and reliable storage mechanism is needed so that the data remains original without any changes during it w... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Nihayatus Sa'adah, I Gede Puja Astawa, Amang Sudarsono     Pág. 217 - 235
Security is a major concern of the internet world because the development of the Internet requires the security of data transmission. The security method helps us to store valuable information and send it over an insecure network so that it can not be re... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Yesta Medya Mahardhika, Amang Sudarsono, Ali Ridho Barakbah     Pág. 1 - 21
Botnet is a malicious software that often occurs at this time, and can perform malicious activities, such as DDoS, spamming, phishing, keylogging, clickfraud, steal personal information and important data. Botnets can replicate themselves without user co... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Muh Subhan, Amang Sudarsono, Ali Ridho Barakbah     Pág. 328 - 348
Radical content in procedural meaning is content which have provoke the violence, spread the hatred and anti nationalism. Radical definition for each country is different, especially in Indonesia. Radical content is more identical with provocation issue,... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
R. Gaguk Pratama Yudha, I Gede Puja Astawa, Amang Sudarsono     Pág. 221 - 236
Orthogonal Frequency Division Multiplexing (OFDM) is a popular wireless data transmission scheme. However, its synchronization is still being a major problem when it is applied in real hardware. Cyclic Prefix (CP) based synchronization is one of the solu... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Novita Astin, I Gede Puja Astawa, Amang Sudarsono     Pág. 291 - 307
This paper presents about the transmission of Digital Video Broadcasting system with streaming video resolution 640x480 on different IQ rate and modulation. In the video transmission, distortion often occurs, so the received video has bad quality. Key fr... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Nurul Fahmi, M. Udin Harun Al Rasyid, Amang Sudarsono     Pág. 91 - 114
In the recent years, Wireless Sensor Networks (WSNs) have become a very popular technology for research in various fields. One of the technologies which is developed using WSN is environmental health monitoring. However, there is a problem when we want t... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Samsul Huda, Amang Sudarsono, Tri Harsono     Pág. 115 - 140
MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Rizky Pratama Hudhajanto, I Gede Puja Astawa, Amang Sudarsono     Pág. 150 - 163
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Amang Sudarsono, Anang Siswanto, Heru Iswanto, Qoirul Setiawan     Pág. 1 - 17
Recently, in the distance learning system, video conferencing becomes one of expected course material delivery systems for creating a virtual class such that lecturer and student which are separated at long distance can engage a learning activity as well... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Hendy Briantoro, I Gede Puja Astawa, Amang Sudarsono     Pág. 43 - 59
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Ahmad Zainudin, Amang Sudarsono, Kevin Prima Pambudi     Pág. 115 - 125
A DTN architecture consists of several nodes that are connected with high dynamic topology. The routing protocol is an important part which determine the DTN performance system. Although DTN is addressed to be tolerant of delay, a routing protocol with b... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »