Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 9 dokumen yang sesuai dengan query
cover
Abstrak :
The book covers the recent developments in the field of materials for advancing recording technology by experts worldwide. Chapters that provide sufficient information on the fundamentals will be also included, so that the book can be followed by graduate students or a beginner in the field of magnetic recording. The book also would have a few chapters related to optical data storage. In addition to helping a graduate student to quickly grasp the subject, the book also will serve as a useful reference material for the advanced researcher. The field of materials science related to data storage applications (especially hard disk drives) is rapidly growing. Several innovations take place every year in order to keep the growth trend in the capacity of the hard disk drives. Moreover, magnetic recording is very complicated that it is quite difficult for new engineers and graduate students in the field of materials science or electrical engineering to grasp the subject with a good understanding. There are no competing books in this area, considering that a book that may look 50% similar to the proposed book was published in 2001. A span of 6 years is too long gap, considering the progress this field makes every year. "The book covers the recent developments in the field of materials for advancing recording technology by experts worldwide. Chapters that provide sufficient information on the fundamentals will be also included, so that the book can be followed by graduate students or a beginner in the field of magnetic recording. The book also would have a few chapters related to optical data storage. In addition to helping a graduate student to quickly grasp the subject, the book also will serve as a useful reference material for the advanced researcher"-- Provided by publisher.
New Jarsey: John Wiley & Sons, 2012
621.397 DEV
Buku Teks  Universitas Indonesia Library
cover
Reza Ramadhana Indaryanto
Abstrak :
Implementasi pembuatan software CMMS ditujukan untuk kegiatan maintenance dari pesawat angkut tipe sedang. CMMS dibuat dengan menggunakan java sebagai bahasa pemrograman berbasis objek. Metode penelitian dilakukan dengan cara observasi langsung kepada perusahaan terkait. Pembuatan software CMMS dinilai dapat menjadi penghubung antara teknisi sebgai pelaksana lapangan dan pihak manajerial sebagai pihak yang mengolah data terkait. Implementasi dari CMMS disesuaikan dengan kegiatan maintenance yang telah dilakukan oleh perusahaan tersebut, sehingga tidak akan menyulitkan pengguna dalam ber adaptasi terhadap sistem tersebut. CMMS juga dapat mengoptimalkan kinerja maintenance yang dilakukan perusahaan tersebut, terutama dalam hal schedulling, dan penyimpanan data. ......Implementation of CMMS software development activities aimed at the maintenance of the type of medium transport aircraft. CMMS created using Java as object-based programming language. Methods of research done by direct observation related to the company. CMMS software development can be assessed as a liaison between technicians and field operators as the managerial process data related parties. Adapted to the implementation of CMMS maintenance activities that have been performed by the company, so it will not be difficult for users to adapt to the system. CMMS can also optimize the performance of maintenance by the company, especially in terms of scheduling, and data storage.
Depok: Fakultas Teknik Universitas Indonesia, 2013
S45867
UI - Skripsi Membership  Universitas Indonesia Library
cover
Deshpande, Prachi S.
Abstrak :
This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike.
Singapore: Springer Nature, 2019
e20509833
eBooks  Universitas Indonesia Library
cover
Abdul Ro`uf
Abstrak :
ABSTRAK
Dalam tesis ini dibuat model pelayan direktori yang dapat melayani permintaan akses arsip pada sistem terdistribusi.

Model yang dibuat menggunakan memori utama sebagai media untuk menyimpan arsip yang sedang dioperasikan. Ruang memori yang dipakai, lokasinya tersebar didalam sistem. Untuk memudahkan pengelolaan, maka ruang memori tersebut dibagi kedalam blok-blok.

Pelayan direktori terdiri dari dua tingkat pelayan, yaitu pelayan pusat dan pelayan lokal. Pelayan pusat menangani pengelolaan ruang memori keseluruhan secara global dan melayani akses arsip ke disk oleh pelayan-pelayan lokal. Sedangkan pelayan lokal menangani pengelolaan ruang memori secara rinci pada lokasi dimana pelayan lokal tersebut berada dan melayani permintaan akses arsip oleh pemakai. Antar pelayan lokal dapat terjadi saling komunikasi.

Fasilitas pelayanan arsip yang disediakan hanya terbatas pada operasi arsip yang dasar yaitu: operasi buka arsip, operasi baca arsip, operasi tulis arsip dan operasi tutup arsip.

Pelayanan akses arsip oleh beberapa peminta secara serentak dapat dilayani untuk permintaan baca arsip yang serentak ataupun satu permintaan tulis arsip dan lainnya permintaan baca arsip yang terjadi secara serentak. Sedangkan untuk permintaan tulis arsip yang serentak akan dilayani satu persatu secara berurutan. Cara ini diterapkan untuk menjaga suatu arsip selalu dalam keadaan yang konsisten.

Arsip yang sedang dipakai, seluruh datanya akan berada di memori. Sedangkan perubahan-perubahan data yang terjadi hanya akan ditulis ke disk pada saat arsip tersebut di tutup.

Model yang dibuat telah diimplementasikan menggunakan mesin Hewlett-Packard dengan dua buah stasiun kerja, yang fasilitas memorinya masing-masing 4 mega-byte dan 8 mega-byte. Mesin tersebut dioperasikan dengan menggunakan sistem operasi HP-M. Sedangkan untuk keperluan komunikasi antar proses pada model yang dibuat, digunakan protokol TCP/IP.

1990
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Brookshear, J. Glenn
Abstrak :
This text uses broad coverage and clear exposition to present a complete picture of the dynamic computer science field. Accessible to students from all backgrounds, Glenn Brookshear uses a language-independent context to encourage the development of a practical, realistic understanding of the field. An overview of each of the important areas of Computer Science provides students with a general level of proficiency for future courses
Boston: Pearson, 2015
004 BRO c
Buku Teks  Universitas Indonesia Library
cover
Abstrak :
Topics covered include skyline queries, probabilistic logics and reasoning, theory of conceptual modeling, prediction in networks of moving objects, validation of XML integrity constraints, management of loosely structured multi-dimensional data, data discovery in the presence of annotations, and quality ranking for Web articles.
Berlin: Springer, 2012
e20407271
eBooks  Universitas Indonesia Library
cover
Fikroh Amali Fahmi Addiani
Abstrak :
ABSTRAK
Dengan posisi strategis Sekretariat Dewan Pertimbangan Presiden dalam pemberian dukungan teknis dan administrasi kepada Dewan Pertimbangan Presiden dalam menjalankan tugas memberikan nasihat dan pertimbangan kepada Presiden, perlindungan terhadap aset data dan informasi Dewan Pertimbangan Presiden yang bersifat rahasia dan terbatas, dari berbagai bentuk ancaman dan risiko keamanan, kerahasiaan, keutuhan, dan ketersediaan data dan informasi sangat penting. Penyimpanan data dengan sistem komputasi awan (cloud storage) memiliki beberapa risiko diantaranya risiko dari sisi keamanan data, integritas data, dan ketersediaan data. Teknologi Blockchain menawarkan sistem penyimpanan data yang terdesentralisasi, cepat, aman, transparan, dan terekam. Penelitian ini dilakukan guna merancang model teknologi blockchain sebagai solusi permasalahan pada sistem penyimpanan data sehingga dapat meningkatkan kinerja organisasi Sekretariat Dewan Pertimbangan Presiden.

Metode yang digunakan dalam penelitian ini adalah dengan studi kasus, survei responden dan studi literatur. Analisis statistik dan analisis risiko digunakan untuk mengetahui tingkat risiko pada sistem penyimpanan data di Sekretariat Dewan Pertimbangan Presiden yang berpengaruh pada kinerja organisasi, untuk kemudian dirumuskan respons preventif dan korektif atas risiko yang paling dominan. Dari penelitian diketahui bahwa risiko yang paling dominan adalah pencurian data, kerusakan data akibat virus atau penyerangan sistem, data tidak dapat disimpan karena keterbatasan ruang simpan, kehilangan data akibat kerusakan sistem dan sistem tidak menyediakan backup data, setiap pengguna dapat masuk ke sistem tanpa hak akses (username dan password), dan tidak ada jaminan dari sistem jika ada ancaman keamanan. Berdasarkan hasil rumusan respons risiko tersebut, sebagai hasil akhir penelitian ini, dibuat suatu rancangan model sistem penyimpanan data berbasis risiko dengan platform teknologi blockchain yang sesuai untuk Sekretariat Dewan Pertimbangan Presiden sehingga dapat meningkatkan kinerja organisasi Sekretariat Dewan Pertimbangan Presiden.
ABSTRACT
With the strategic position of the Secretariat of the Presidential Advisory Council in providing technical and administrative support to the Presidential Advisory Council in providing advise and consideration to the President, protection of confidential and limited data and information assets of the Presidential Advisory Council from various security threats and risks, confidentiality, integrity, and the availability of data and information is very important. Data storage with a cloud computing system (cloud storage) has several risks including risks of data security, data integrity, and data availability. Blockchain technology offers a decentralized, fast, secure, transparent and recorded data storage system. This research was conducted to determine the appropriate blockchain technology model for the Presidential Advisory Council Secretariat as a solution to the problems in the data storage system, to enhance the performance of the Presidential Advisory Council Secretariat organization.

The method used in this research is case studies, survey respondents and literature studies. Statistical analysis and risk analysis are used to determine the level of risk in the data storage system at the Secretariat of the Presidential Advisory Council that affects the performance of the organization, to then formulate a preventive and corrective response to the most dominant risk. From the research it is known that the most dominant risk is data theft, data damage due to viruses or system attacks, data cannot be stored due to limited storage space, data loss due to system damage and the system does not provide backup data, each user can enter the system without access rights (username and password), and there is no guarantee from the system if there is a security threat. Based on the results of the risk response formulation, as the final result of the study, a risk-based data storage system model was created with a blockchain technology platform that is appropriate for the Secretariat of the Presidential Advisory Council to improve the Secretariat of the Presidential Advisory Council performance.
Depok: Fakultas Teknik Universitas Indonesia, 2020
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Yushu Zhang
Abstrak :
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.
Singapore: Springer Singapore, 2019
e20502525
eBooks  Universitas Indonesia Library
cover
Abstrak :
This book presents the latest research findings, as well as innovative theoretical and practical research results, methods and development techniques related to P2P, grid, cloud and Internet computing. It also reveals the synergies among such large scale computing paradigms. P2P, Grid, Cloud and Internet computing technologies have rapidly become established as breakthrough paradigms for solving complex problems by enabling aggregation and sharing of an increasing variety of distributed computational resources on a large scale. Grid computing originated as a paradigm for high-performance computing, offering an alternative to expensive supercomputers through different forms of large-scale distributed computing. P2P computing emerged as a new paradigm following on from client-server and web-based computing and has proved useful in the development of social networking, B2B (Business to Business), B2C (Business to Consumer), B2G (Business to Government), and B2E (Business to Employee). Cloud computing has been described as a “computing paradigm where the boundaries of computing are determined by economic rationale rather than technical limits”. Cloud computing has fast become the computing paradigm with applicability and adoption in all domains and providing utility computing at large scale. Lastly, Internet computing is the basis of any large-scale distributed computing paradigm; it has very quickly developed into a vast and flourishing field with enormous impact on today’s information societies and serving as a universal platform comprising a large variety of computing forms such as grid, P2P, cloud and mobile computing.
Switzerland: Springer Cham, 2019
e20502886
eBooks  Universitas Indonesia Library