Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 6129 dokumen yang sesuai dengan query
cover
New York: IEEE Press , 2001
174.909 04 ETH
Buku Teks  Universitas Indonesia Library
cover
Messerchmitt, David G.
London: Morgan Kaufmann Publishing, 2000
004 MES u
Buku Teks  Universitas Indonesia Library
cover
Stair, Ralph M., Jr.
Illinois: Irwin, 1986
001.64 STA c
Buku Teks  Universitas Indonesia Library
cover
Quinn, Michael J. (Michael Jay)
""New technologies have brought us many benefits, but they have also raised many social and ethical concerns. The authors view in Ethics for the Information Age is that we ought to approach every new technology in a thoughtful manner, considering not just its short-term benefits, but also how its long-term use will affect our lives. A thoughtful response to information technology requires a basic understanding of its history, an awareness of current information-technology- related issues, and a familiarity with ethics."--Provided by publisher."
Boston: Pearson education, 2017
303.483 4 QUI e
Buku Teks  Universitas Indonesia Library
cover
cover
"This research describes the improvement of computer network performance with bandwidth management in Kemurnian II Senior High School. The main issue of this research is the absence of bandwidth division on computer, which makes user who is downloading data, the provided bandwidth will be absorbed by the user. It leads other users do not get the bandwidth. Besides that, it has been done IP address division on each room, such as computer, teacher and administration room for supporting learning process in Kemurnian II Senior High School, so wireless network is needed. The method is location observation and interview with related parties in Kemurnian II Senior High School, the network analysis has run and designed a new topology network including the wireless network along with its configuration and separation bandwidth on microtic router and its limitation. The result is network traffic on Kemurnian II Senior High School can be shared evenly to each user; IX and IIX traffic are separated, which improve the speed on network access at school and the implementation of wireless network.
"
621 COMMIT 6 (1-2) 2012
Artikel Jurnal  Universitas Indonesia Library
cover
Fakultas Teknik Universitas Indonesia, 1995
S38538
UI - Skripsi Membership  Universitas Indonesia Library
cover
"Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.
"
Oxford : Chandos , 2013
e20427966
eBooks  Universitas Indonesia Library
cover
Agus Suprayitno
"Perkembangan teknologi informasi yang semakin meningkat menyebabkan perubahan pola kehidupan masyarakat. Di lingkungan pemerintahan, pemerintah dituntut untuk dapat memberikan pelayanan terbaik dengan berbasis teknologi informasi. Terlebih lagi dengan diterapkannya Sistem Pemerintahan Berbasis Elektronik (SPBE), interaksi dengan dunia siber semakin besar. Hal ini tentunya akan meningkatkan potensi terjadinya insiden. Insiden siber yang kerap terjadi khususnya pada pemerintah adalah peretasan website. Hal ini juga terjadi pada Pemerintah Kota Depok yang tentunya sangat mengganggu terlebih lagi jika situs tersebut terkait pelayanan kepada masyarakat. Web Application Firewall (WAF) adalah sebuah sistem keamanan atau firewall yang berfungsi untuk melindungi website dari serangan siber. WAF merupakan sistem keamanan layer 7 (tujuh) yang dirancang untuk memantau, mendeteksi, menyaring, serta memblokir trafik berbahaya yang sekiranya dapat merusak website atau aplikasi web. WAF merupakan teknologi yang terus berkembang dan banyak digunakan di dunia security sehingga perlu dikaji bagaimana efektivitasnya terhadap keamanan suatu website. Penelitian ini mengkaji implementasi WAF terhadap keamanan website Pemerintah Kota Depok sehingga dari hasil analisis dapat diketahui apakah tools ini memberikan dampak positif terhadap peningkatan keamanan siber, khususnya website di Pemerintah Kota Depok

The development of information technology is increasingly causing changes in the pattern of people's lives. In the government environment, the government is required to be able to provide the best service based on information technology. the implementation of the Electronic-Based Government System (SPBE), interaction with the cyber world is getting bigger. This of course will increase the potential for incidents to occur. Cyber incidents that often occur, especially for the government, are website hacking. This has also happened to the Depok City Government, which is of course very disturbing, especially if the site is related to services to the community. A Web Application Firewall (WAF) is a security system or firewall that functions to protect websites from cyber attacks. WAF is a layer 7 (seven) security system designed to monitor, detect, filter, and block malicious traffic that could damage websites or web applications. WAF is a technology that continues to develop and is widely used in the world of security, so it is necessary to study how effective it is on the security of a website. This study examines the implementation of WAF on the security of the Depok City Government website so that from the results of the analysis it can be seen whether these tools have a positive impact on increasing cyber security, especially websites in the Depok City Government"
Jakarta: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2022
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Rochmatullah
"Tesis ini meneliti metode pengklasifikasian menggunakan metode jaringan syaraf tiruan untuk mengklasifikasikan data aroma. Data aroma adalah data keluaran dari sistem penciuman elektronik. Penelitian ini merupakan lanjutan penelitian sebelumnya yaitu metode pengklasifikasian fuzzy-neuro learning vector quantization (fnlvq). Sebelumnya telah dikembangkan pula metode matrix similarity analysis (msa) guna menentukan kriteria pemberhentian algoritma fnlvq.
Dalam penelitian ini akan dikembangkan dua metode fnlvq yang akan dioptimasikan dengan metode swarm intelligence yaitu fnlvq-particle swarm optimization (pso) dan metode swarm-fnlvq. Dengan menggunakan validasi silang, hasil dari penelitian ini menunjukkan bahwa rata-rata tingkat pengklasifikasian untuk aroma tiga campuran menggunakan fnlvq-pso sebesar 91% dan swarm-fnlvq sebesar 90% dimana kedua metode ini lebih baik daripada fnlvq yang sebesar 79% dan fnlvq-msa sebesar 77%.

This thesis examines a classification method based on artificial neural networks to classifying various mixture of fragrance which is the output of the electronic nose system. This research is a continuation research of earlier fuzzy-neuro learning vector quantization (fnlvq) classification method. Previously a matrix similarity analysis method is developed to determine a stopping criterion of fnlvq algorithms.
This research objective is to develops two modification fnlvq method based on swarm intelligence method namely fnlvq-particle swarm optimization (pso) and swarm-fnlvq methods. By using cross validation, this research showed that the average classification rate of fnlvq-pso is 91% whether swarm-fnlvq is 90%, this two methods is better than conventional fnlvq with 79% and fnlvq-msa at 77%.
"
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2009
T-Pdf
UI - Tesis Open  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>