Home Return


cv publish0x hive steemit uptrennd https://lbry.tv/$/invite/@0fajarpurnama0:e https://bittube.app/?ref?2JY4FE0CP youtube viewly twitch bitchute dlive dtube portal twitter facebook instagram lindked discord reddit vk pininterest socialeaglerockglobal minds medium blogger weebly wix joomla thumblr

source code

View My Stats

word number: 26

Time: 2021-03-01 14:29:27 +0000

Compatible Course Content Synchronization Model for Various LMS over The Network https://steemitimages.com/640x0/https://cdn.steemitimages.com/DQmcaEdoZ1pMWudCoNhG9gqUotwshp61c1VhcDf7wAYeuoA/1.Issues-of-Course-Sharing.png There are connectivity issues in developing countries and is distributed LMS. However, the resource cost keeps on increasing which requires incremental synchronization. Keywords: elearningonlinersyncsynchronizationlearning management system

My Summary and Most Interested Topic in Advanced Computer Organization 2 Master’s Course https://steemitimages.com/640x0/https://cdn.steemitimages.com/DQmcaEdoZ1pMWudCoNhG9gqUotwshp61c1VhcDf7wAYeuoA/1.Issues-of-Course-Sharing.png My own summary regarding to the lecture about how computer hardware works and who knows it might give you a description. Keywords: computer organizationinterconnection networkhardwaremicroprocessorFPGAassignment

7,4 Hamming Codes https://images.blurt.buzz/DQmPxBJQc6SbsjgFRE5Bg2GV28UusmDXqtTuMejgum5LgWe/Figure%200.%207,4%20Hamming%20Venn%20Diagram.png First group 4 bits per block, and then obtain the 3 hamming bit codes from the 4 bits for each blocks and add them to make 7 bits per block. Keywords: mathbinarychaospiecewisehammingassignmentmarkovrandomengineeringsciencetechnology

(4,3)-Single Parity Check of Binary Sequence Skew Tent and PWL Map https://images.blurt.buzz/DQmc13pG698x1NFTB14Xco6sCpccCMYo5tu9xE9BU7QifNG/featured-image.png For error probability below 0.2 the Skew Tent Map has lower undetected error and for above that, it is better to use Piece Wise Linear Map. Keywords: mathbinarychaospiecewiseparityassignmentrandomengineeringsciencetechnology

Markov Information Binary Sequences Based on Piecewise Linear Chaotic Maps https://images.blurt.buzz/DQmZNo7vmJhBrC73MyvUvSgHADPnEHGCjKQdwe4YiEmWnU1/Figure%203b.%20map%20p1%20=%200.9%20and%20p2%20=%200.8%20edit.png Uses piecewise linear chaotic binary sequence which is more complex than skew tent map but allows various map design for chaotic sequences. Keywords: mathbinarychaospiecewisemarkovassignmentrandomengineeringsciencetechnology

Chaotic and Memoryless Binary Sequences Based on Skew Tent Maps https://images.blurt.buzz/DQmSbHzMM8BVha1nY8dzgDqgZ6RNC8Fp5iovR4ECiUp5wGu/Figure%203.%20Markov's%20Chain.PNG Using the chaotic sequence generated by skew tent map we can generate the random binary sequence with the probability of ‘0’s and ‘1’s. Keywords: mathbinarychaosmarkovassignmentrandomengineeringsciencetechnology

Chaotic Real-Valued Sequences By Skew Tent Map https://images.blurt.buzz/DQmcGjikkd4poY4BLLxW5FsPa7hbmQCUkgAKRmwcf56aX13/featured-image.png We can predict the weather for a month. Beyond that, we will likely miss predict. In computer it can be applied for creating random values. Keywords: mathengineeringchaosrandomassignmentsciencetechnology

Portable and Synchronized Distributed Learning Management System in Severe Networked Regions https://cdn.publish0x.com/prod/fs/images/8927af331309d978d40d3d7a7542ac2664b52f606c75363b6d6e6f8a6dbb04b3.jpeg This is a thesis submitted to Graduate School of Science and Technology, Computer Science and Electrical Engineering in Kumamoto University, Japan, on September 2017 in partial fulfillment of the requirements for the degree of Master of Engineering. Keywords: technologye-learningportablesynchronizationdistributed systemportablemastersthesis

Collection of My Mini Assignments in Current Science and Technology in Japan 2016 Course https://images.blurt.buzz/DQmRtYMgQ2BzQMWLqUL5wuDUBWam4n7xn4GAqQFeYZkWduo/Figure%204.%20Feedback%20control%20application%20compilation.png The assignments that survived are Control System, Xray, Noise Policy, Pulse Power, Binaural Accoustic, and how to return home without honor. Keywords: technologyscienceengineeringJapanassignment

My Assignment in Simple Image Compression Utility Website Evaluation and Other Journal Paper Presentation https://images.blurt.buzz/DQmUh4hPNajhcAQjMi33fELiYXDU2g3Ggiha6PcVWND5SFn/thumbnail.png The assignments in human perceptions were exciting where we experiment in compressing image, analyzing website, making video presentations. Keywords: engineeringimagehumanperceptionassignment

My Summary About Origin of Biosignals https://0fajarpurnama0.github.io/assets/images/origin-biosignal-summary/Fig.2.6b.gif This summary contains the origin of biosignals as deep as how cells generate electricity and how living body can be illustrated as circuit. Keywords: engineeringmedicalelectricitybiosignalassignment

My Summary in Advanced Telecommunication Engineering Course https://images.blurt.buzz/DQmU3ca8NKicybGm66ThYB6wDMHmVJH4retw5pGbeJojQwA/Figure%201.%20LOS%20and%20NLOS%20illustration.png This summary contains materials about wireless communication, Maxwell equation, line of sight and nlos, circular polarization, and antennas. Keywords: telecommunicationline of sightcircular polarizationantennaassignment

The Stereo 3D on Future Drones https://images.blurt.buzz/DQme9WMTsRGzriTzVdK8pLttKzsrq6bLNDLqVyGkJ4GJV4p/Figure%200.%20Featured%20Image.png When using a drone we simply have to apply a control system so the drone will capture 2 image separately that fulfills the 3D requirements. Keywords: technologycomputersdroneperception3Dassignment

My opinion on affective media and wearables paper when I was a young student https://images.blurt.buzz/DQmRhMipF7oz1oN9ZdWQijSaRWNhHFN72Gx5qTuqYP6Ve9k/information%20media%20perception%20and%20emotion%20illustration.png With the advance in technology we can use electronic devices to communicate with others in long distances but can it detect emotions? Keywords: technologycomputersinformationperceptionemotionassignment

My Opinion on Digital Forensic Steps when I was a Young Student https://images.blurt.buzz/DQmS3rd3NwyDU6udYbCpSqTSGbaQ335iXwAyAuTYtqgLgZN/digital-forensic-steps.png The four steps of digital forensic are confiscating and isolating storage drive, cloning data, analyzing data, and writing a detail report. Keywords: technologycomputersdigitalforensicassignment

My Opinion of XSS/CSS, Digital Forensic, and Digital Crime Investigation when I was a Young Student https://images.blurt.buzz/DQmbds3FcyD2UnctK7GepM8BFibTnGwd1vJjVAmvXHm3KHC/0.featured-image.png My Opinion of XSS/CSS, Digital Forensic, and Digital Crime Investigation when I was a Young Student Keywords: technologycomputersXSSCSSdigital forensicassignment

My Opinion of How Edward Snowden Breached the NSA when I was a Young Student https://images.blurt.buzz/DQmP7SwQBTHYoVszzMLdSMJ6tCLDXTuLcczCNnhHy6oFZjJ/how-edward-snowden-breached-nsa.png There are mainly 3 steps of breaching NSA using kill chain analysis which are researching the target, initial intrusion, and exfiltration. Keywords: technologycomputersEdward SnowdenNSAbreachassignment

My Simple C Program Demonstrating Heap Buffer Overflow https://images.blurt.buzz/DQmNz53WvQ28ocB2E4Nc9DcRi6mSx1EZ8BNNMesWvBBh4qc/0.Heap_Over_Flow.png The statically assigned variables or local variables resides in the stack area and dynamically assigned variables resides in the heap area. Keywords: technologycomputersbuffer overflowheapC Programassignment

My Simple C Program Demonstrating Buffer Overflow https://images.blurt.buzz/DQmRwNbgV4rW8gGneY1CCWmQ4oNcBwJe14LbvvEnu2oXJwp/Figure%205.%20Simple%20Login%20Buffer%20Overflow%20Demonstration%20in%20C%20programming.png Buffer overflow overwrites other part of the memory. The simplest case is variable B if put too much data can flood to the next variable A. Keywords: technologycomputersbuffer overflowC Programassignment

My Examples on Reverse Engineering in Computers when I was a young student https://images.blurt.buzz/DQmbcgzjYNPW87N84iJscRcFctGjDSVoa4rBd2XT6BF63HB/Figure%202.%20Decompiled%20Hello%20Java%20Program.gif Reverse engineering was originally applied only to hardware, reverse-engineering is now applied to software, databases and even human DNA. Keywords: technologycomputersreverse engineeringdecompileassignment

My Comments on Malware and Spams in Email when I was a young student https://images.blurt.buzz/DQmbFiCA8nq7JYeV3d2M5RhFsyQw5ANWhkuR8qCv4CidMn7/Figure%203.%20Using%20authentication%20for%20smtp.png Use email anti virus (AV), outbound port 25 blocking & authentication, sender policy framework, domain key identified mail, identification. Keywords: technologycomputersmalwareemailspamassignment

My Comments on Malware Quarantine when I was a young student https://images.blurt.buzz/DQmQQZFzBvi1yrxXdAXoxHZmzNa6CTdfxR7c4gtrUFyv3oU/1.malware-quarantine.png In computer and information system the quarantine is used to isolate harmful data that could spread and infect other PC for example malware. Keywords: technologycomputersmalwarequarantineassignment

Choosing Between Host and Network Intrusion Detection System https://images.blurt.buzz/DQmbFM9aTRvnYUhbprwrMyQ2x2VWjgT89CHW72qtHfSFwQr/1.dmz.png Which type of intrusion detection system should be placed? The best security choice is use both HIDS and NIDS but the problem is resource. Keywords: technologycomputersintrusion detection systemHIDSNIDSassignment

Intrusion Detection System Important Specifications https://images.blurt.buzz/DQmNjgToWeiVCzM2eqNqo8ptgbJhja1CNyjwhHGXvLrUss4/1.inside-ids.png The important specifications are coverage, detection capability, processing power, false negative, and false positive, though there are more Keywords: technologycomputersintrusion detection systemspecificationassignment

Having Intrusion Detection System Despite Having Anti Virus and Firewall https://images.blurt.buzz/DQmUDCF8BPqrZBXVvKjxaqB2x9kXxiohHzHHenXQMTKU1Uh/1.av-vs-fw-vs-ids.png Antivirus handles malware inside devices, firewall filters packet based on identity, and intrusion detection system find malware in packets. Keywords: technologycomputersantivirusfirewallintrusion detection systemassignmentmalware

Malware Counter Measure Standard Operation Procedure in Old Corporations https://images.blurt.buzz/DQmNtU8TNDRu4SNeLUiAvyJ6PF1pBLKsjyEqGdUocQxz4HC/featured%20image%20summary.png The counter measures are quarantining infected devices, plugging to an external malware cleaner, scan for infections, and delete infections. Keywords: technologycomputersmalwarecounter measureassignment

My Comments on Information Security Policy when I was a young student https://images.blurt.buzz/DQmd2wnUBE1uyhFsMTjieea95Js33uqnUManmyWd9DPJ6Sa/0.featured-image-summary.png The lecture explained the policies when facing vulnerabilities in the kernel, server program, and server common gateway interface (CGI). Keywords: technologyinformationsecuritypolicyassignment

Dealing with Malware for Ordinary Users https://images.blurt.buzz/DQmdCMdGiY9iaBDAB8bEASbdL1CBtmX4UwsGidUCRYDVHnd/0.featured-image-summary.png The countermeasures of Malicious Ware are mitigation, evasion, and treatment like any other measures to cope against harmful substances. Keywords: technologycomputersantivirusmalwareassignment

My Comments on Network and Bots and Pentest when I was a young student https://images.blurt.buzz/DQmRK2wpcVFE87Jzr5BtKG6iedjQ7oM1xit3MHh9NpqsWGE/0.image-summary.png Network consists of clients and servers, there are many bots, and ddos and web defacements and sql injections are popular hacking methods. Keywords: technologycomputer networkbotpenetration testingassignmenthacking

Hand Carry Data Collecting Through Questionnaire and Quiz Alike Using Mini-computer Raspberry Pi https://steemitimages.com/640x0/https://images.hive.blog/DQmeSRhUbmAX28bBXwoGhqMYSxVu8UxsGzdCYKLvTETw38U/Figure-1-Hand-Carry-Server-Data-Collecting-Illustration.png Our method involves in providing a portable hotspot device for correspondent to connect and access our local survey questionnaire website. Keywords: single board computerhand carry serverraspberry piportablesurvey

Rsync and Rdiff Implementation on Moodle’s Backup and Restore Feature for Course Synchronization over The Network https://hicc.cs.kumamoto-u.ac.jp/~fajar/masters/rdiffrsyncmbz/Course-Synchronization-Mechanism.png This paper proposed the synchronization of the existing backup and restore features. The file synchronization is performed between course’s backup files based on rsync algorithm. Keywords: rsyncrdiffmoodlenetworksynchronization

Demonstration on Extending The Pageview Feature to Page Section Based Towards Identifying Reading Patterns of Users https://steemitimages.com/0x0/https://cdn.steemitimages.com/DQmbppBD4UdeoFiPVdF9azLZm28MPeCbWXcsy8e53y9wfMq/section-based-page-view-demo.gif The web application can show the date accessed to a particular section and the duration spent on that section by the user. It can also provide data that shows the reading pattern of a reader which in the future can be used for analysis by other researchers. Keywords: technologymouse trackingsection based page viewweb analyticmonitoringonline

Introductory Work on Section Based Page View of Web Contents Towards The Idea of How a Page is Viewed https://steemitimages.com/640x0/https://cdn.steemitimages.com/DQmPiWxvjQriUczJ8USYxVBq1Zk34bvrAo3kVsfQaZuUg4s/SBPV_Application_Architecture.png The data can answer what, when, and where, but cannot answer how a page is viewed. To answer that question it is needed to track as detail as the page section level. Keywords: technologymouse trackingsection based page viewweb analyticmonitoringonline


Keywords: mastersschooluniversityresearchpublicationjournalconferencetechnicalpaperarticlemanuscriptslide