|
|
|
Anton Respati Pamungkas,Sutariyani Sutariyani,Yobel Cesar Adhi Kristyo
Pág. HAL. 151 - 161
Secara umum, ada dua kejadian banjir. Yakni banjir akibat hujan deras berkepanjangan dan banjir dari hulu sungai lainnya. Alat pemantauan saat ini biasanya tetap konvensional. Alat ini dipantau secara manual oleh petugas kepolisian yang sedang bertugas. ...
ver más
|
|
|
|
|
|
|
Faulinda Ely Nastiti,Dedy Hariyadi,Fazlurrahman Bima
Pág. 51 - 54
Ancaman serangan siber masih didominasi oleh malware. Beberapa penyedia telah menyediakan peta dan analisis serangan malware berbasis agen yang telah ditempatkan pada beberapa infrastruktur. Namun, ada pihak lain yang menyediakan data serangan Malware ya...
ver más
|
|
|
|
|
|
|
Andrei Chugunov,Boris Nizomutdinov,Aleksandr Budiak
Pág. 141 - 146
The paper analyzes the channels of the heads of regions of the Russian Federation. The research of channels was divided into 4 stages: selection of channels, collection of statistical information, unloading of messages and processing of text information....
ver más
|
|
|
|
|
|
|
Fahreza Fahreza, Muhammad Rifqi
Pág. 130 - 146
|
|
|
|
|
|
|
P. Domashnev,V. Alexeev,T. Lavrukhina,O. Nazarkin
Pág. 67 - 72
In this paper, we consider the scheme of unidirectional and bidirectional messaging built over the popular Telegram service. The main purpose of our approach is to provide free real-time message exchange solution for inter-node communications in browser-...
ver más
|
|
|
|
|
|
|
Anna Uglova,Boris Nizomutdinov
Pág. 81 - 86
The information space provides a large amount of destructive, stressful information, and restricts self-destructive behavior. The article considers the possibility of using automated analysis of destructive content of telegram channels to predict the ris...
ver más
|
|
|
|
|
|
|
Dharma Dyatmika,Oka Sudana,Gusti Agung A. Putri
Pág. 146 - 155
Background: Information technology is developing rapidly over time, but there are many companies do not make use of it to support their operational activities. One example is the queue system in the Radiology Section of Sanglah Hospital, which operates t...
ver más
|
|
|
|
|
|
|
Budhi Sumboro,Sutariyani Sutariyani,Ronny Imam Utomo
Pág. HAL. 96 - 106
Tindak kejahatan tidak dapat dipisahkan dari kehidupan sehari-hari karena sebuah aksi kejahatan dapat dilakukan kapan saja dan dimana saja, salah satunya aksi pencurian didalam rumah. Saat adanya wabah Covid-19 tingkat kriminalitas di Indonesia meningkat...
ver más
|
|
|
|
|
|
|
Olga Papadopoulou , Themistoklis Makedas , Lazaros Apostolidis , Francesco Poldi , Symeon Papadopoulos and Ioannis Kompatsiaris
The proliferation of online news, especially during the ?infodemic? that emerged along with the COVID-19 pandemic, has rapidly increased the risk of and, more importantly, the volume of online misinformation. Online Social Networks (OSNs), such as Facebo...
ver más
|
|
|
|
|
|
|
Abdul Hakim Ali Bin Abdul Aziz,Wan Zhafirah Binti Wan Zainudin,Radzuwan Ab Rashid
Pág. pp. 258 - 264
This paper narrates the use of multi-platforms? online affinity space called Teacherfiera.com to support ESL teachers? professional development. Teacherfiera.com utilizes three online platforms which are BlogSpot, Facebook Group and Telegram Group that w...
ver más
|
|
|
|
|
|
|
Pablo Viollier, Valeria Ortega
Pág. 83 - 110
El trabajo analiza la legalidad de la utilización de técnicas de hacking por parte de la Dirección de Inteligencia de Carabineros de Chile (Dipolcar), a la luz de los hechos ocurridos en la polémica Operación Huracán. Para ello, se hace una breve relació...
ver más
|
|
|
|
|
|
|
Gabriel Ovando-Leon, Luis Veas-Castillo, Veronica Gil-Costa and Mauricio Marin
Upon a serious emergency situation such as a natural disaster, people quickly try to call their friends and family with the software they use every day. On the other hand, people also tend to participate as a volunteer for rescue purposes. It is unlikely...
ver más
|
|
|
|
|
|
|
Olawande Daramola, Peter Nyasulu, Tivani Mashamba-Thompson, Thomas Moser, Sean Broomhead, Ameera Hamid, Jaishree Naidoo, Lindiwe Whati, Maritha J. Kotze, Karl Stroetmann and Victor Chukwudi Osamor
A conceptual artificial intelligence (AI)-enabled framework is presented in this study involving triangulation of various diagnostic methods for management of coronavirus disease 2019 (COVID-19) and its associated comorbidities in resource-limited settin...
ver más
|
|
|
|
|
|
|
Jun Park and Youngho Cho
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
ver más
|
|
|
|
|
|
|
Musbah Joma Aqel,Omar Naqshbandi,Munsif Yousef Sokiyna,Pertsevoi Valentyn
Pág. pp. 107 - 127
Now, people all over the world use messengers to communicate with their families and employees at work, schedule meetings, congratulate on holidays, and conduct banking operations using bots built into messengers. However, it is challenging to improve su...
ver más
|
|
|
|
|
|
|
Riad Kanan,Obaidallah Elhassan
Pág. 34 - 44
This paper proposes a design of an efficient hospital nurse calling system which combines two types of indoor localization systems. The purpose of the first system is to locate patients while the second is to locate nurses equipped with their smart phone...
ver más
|
|
|
|
|
|
|
Fazar Dawamsyach,Ikhwan Ruslianto,Uray Ristian
Pág. 149 - 161
Server security is an important thing that must be considered so that the server can work well and serve users. Attacks on servers can threaten server performance and data security in it. According to the National Cyber and Crypto Agency 2020 report, por...
ver más
|
|
|
|
|
|
|
Rayco William,Ikhwan Ruslianto,Uray Ristian
Pág. 123 - 137
Server is a center for providing services and storing data in a computer network. A server is managed by server administrator who has a duty of monitoring security server. While on duty, there are deficiencies in detecting attacks, the slow information a...
ver más
|
|
|
|
|
|
|
Heru Susanto, Leu Fang Yie, Fadzliwati Mohiddin, Arief Amier Rahman Setiawan, Parastou Khodaparast Haghi and Desi Setiana
When the world was engulfed by a COVID-19 pandemic crisis, various activities could not be carried out normally. Activities may continue from home during a crisis by the use of a smartphone through the internet, because almost all people have their own s...
ver más
|
|
|
|