19   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Anton Respati Pamungkas,Sutariyani Sutariyani,Yobel Cesar Adhi Kristyo     Pág. HAL. 151 - 161
Secara umum, ada dua kejadian banjir. Yakni banjir akibat hujan deras berkepanjangan dan banjir dari hulu sungai lainnya. Alat pemantauan saat ini biasanya tetap konvensional. Alat ini dipantau secara manual oleh petugas kepolisian yang sedang bertugas. ... ver más
Revista: Jurnal Go Infotech    Formato: Electrónico

 
en línea
Faulinda Ely Nastiti,Dedy Hariyadi,Fazlurrahman Bima     Pág. 51 - 54
Ancaman serangan siber masih didominasi oleh malware. Beberapa penyedia telah menyediakan peta dan analisis serangan malware berbasis agen yang telah ditempatkan pada beberapa infrastruktur. Namun, ada pihak lain yang menyediakan data serangan Malware ya... ver más

 
en línea
Andrei Chugunov,Boris Nizomutdinov,Aleksandr Budiak     Pág. 141 - 146
The paper analyzes the channels of the heads of regions of the Russian Federation. The research of channels was divided into 4 stages: selection of channels, collection of statistical information, unloading of messages and processing of text information.... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Fahreza Fahreza, Muhammad Rifqi     Pág. 130 - 146

 
en línea
P. Domashnev,V. Alexeev,T. Lavrukhina,O. Nazarkin     Pág. 67 - 72
In this paper, we consider the scheme of unidirectional and bidirectional messaging built over the popular Telegram service. The main purpose of our approach is to provide free real-time message exchange solution for inter-node communications in browser-... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Anna Uglova,Boris Nizomutdinov     Pág. 81 - 86
The information space provides a large amount of destructive, stressful information, and restricts self-destructive behavior. The article considers the possibility of using automated analysis of destructive content of telegram channels to predict the ris... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Dharma Dyatmika,Oka Sudana,Gusti Agung A. Putri     Pág. 146 - 155
Background: Information technology is developing rapidly over time, but there are many companies do not make use of it to support their operational activities. One example is the queue system in the Radiology Section of Sanglah Hospital, which operates t... ver más

 
en línea
Budhi Sumboro,Sutariyani Sutariyani,Ronny Imam Utomo     Pág. HAL. 96 - 106
Tindak kejahatan tidak dapat dipisahkan dari kehidupan sehari-hari karena sebuah aksi kejahatan dapat dilakukan kapan saja dan dimana saja, salah satunya aksi pencurian didalam rumah. Saat adanya wabah Covid-19 tingkat kriminalitas di Indonesia meningkat... ver más
Revista: Jurnal Go Infotech    Formato: Electrónico

 
en línea
Olga Papadopoulou , Themistoklis Makedas , Lazaros Apostolidis , Francesco Poldi , Symeon Papadopoulos and Ioannis Kompatsiaris    
The proliferation of online news, especially during the ?infodemic? that emerged along with the COVID-19 pandemic, has rapidly increased the risk of and, more importantly, the volume of online misinformation. Online Social Networks (OSNs), such as Facebo... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Abdul Hakim Ali Bin Abdul Aziz,Wan Zhafirah Binti Wan Zainudin,Radzuwan Ab Rashid     Pág. pp. 258 - 264
This paper narrates the use of multi-platforms? online affinity space called Teacherfiera.com to support ESL teachers? professional development. Teacherfiera.com utilizes three online platforms which are BlogSpot, Facebook Group and Telegram Group that w... ver más

 
en línea
Pablo Viollier, Valeria Ortega     Pág. 83 - 110
El trabajo analiza la legalidad de la utilización de técnicas de hacking por parte de la Dirección de Inteligencia de Carabineros de Chile (Dipolcar), a la luz de los hechos ocurridos en la polémica Operación Huracán. Para ello, se hace una breve relació... ver más
Revista: Revista Chilena de Derecho y Tecnología    Formato: Electrónico

 
en línea
Gabriel Ovando-Leon, Luis Veas-Castillo, Veronica Gil-Costa and Mauricio Marin    
Upon a serious emergency situation such as a natural disaster, people quickly try to call their friends and family with the software they use every day. On the other hand, people also tend to participate as a volunteer for rescue purposes. It is unlikely... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Olawande Daramola, Peter Nyasulu, Tivani Mashamba-Thompson, Thomas Moser, Sean Broomhead, Ameera Hamid, Jaishree Naidoo, Lindiwe Whati, Maritha J. Kotze, Karl Stroetmann and Victor Chukwudi Osamor    
A conceptual artificial intelligence (AI)-enabled framework is presented in this study involving triangulation of various diagnostic methods for management of coronavirus disease 2019 (COVID-19) and its associated comorbidities in resource-limited settin... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Jun Park and Youngho Cho    
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Musbah Joma Aqel,Omar Naqshbandi,Munsif Yousef Sokiyna,Pertsevoi Valentyn     Pág. pp. 107 - 127
Now, people all over the world use messengers to communicate with their families and employees at work, schedule meetings, congratulate on holidays, and conduct banking operations using bots built into messengers. However, it is challenging to improve su... ver más

 
en línea
Riad Kanan,Obaidallah Elhassan     Pág. 34 - 44
This paper proposes a design of an efficient hospital nurse calling system which combines two types of indoor localization systems. The purpose of the first system is to locate patients while the second is to locate nurses equipped with their smart phone... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Fazar Dawamsyach,Ikhwan Ruslianto,Uray Ristian     Pág. 149 - 161
Server security is an important thing that must be considered so that the server can work well and serve users. Attacks on servers can threaten server performance and data security in it. According to the National Cyber and Crypto Agency 2020 report, por... ver más

 
en línea
Rayco William,Ikhwan Ruslianto,Uray Ristian     Pág. 123 - 137
Server is a center for providing services and storing data in a computer network. A server is managed by server administrator who has a duty of monitoring security server. While on duty, there are deficiencies in detecting attacks, the slow information a... ver más

 
en línea
Heru Susanto, Leu Fang Yie, Fadzliwati Mohiddin, Arief Amier Rahman Setiawan, Parastou Khodaparast Haghi and Desi Setiana    
When the world was engulfed by a COVID-19 pandemic crisis, various activities could not be carried out normally. Activities may continue from home during a crisis by the use of a smartphone through the internet, because almost all people have their own s... ver más
Revista: Applied System Innovation    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »