Perjuangan University is developing an information system in its campus, but the system is partially built. This has resulted in its own problems, there is no connectivity between systems and the difficulty of developing data integration. So that in the business process that occurs many experience difficulties in data synchronization and the amount of duplicate data that must be entered. One solution to overcome this problem is to utilize web service technology. The web service architecture used is REST. REST as a bridge that is able to integrate data in a stateless format. The results of the application of the web service as a backend system are able to integrate the existing academic information systems and library information systems without changing existing structures, programs or architecture. Format data exchange between systems using the JSON format. In addition, officers do not need to input and verify data several times, when the data in the library information system changes automatically in the academic information system the changes are immediately read.
RFID (Radio Frequenscy Identification) merupakan sebuah teknologi compact wireless yang diunggulkan untuk mentranformasi dunia komersial. Telah banyak dikembangkan di dunia bisnis maupun keamanan dewasa ini sebagai suksesor dari barcode, RFID dapat melakukan control otomatis untuk banyak hal. Sistem-sistem RFID menawarkan peningkatan efisien dalam penggendalian inventory control dalam pengidentifikasian barang. Oleh karena itu terdapat manfaat yang besar untuk sebuah perpustakaan secara intensif mempercayakan pada sistem ini. Adopsi yang meluas dari RFID banyak memunculkan persoalan dalam peningkatan layanan khususnya layanan self-service dan mengurangi layanan contacless, jaminan keamanan buku di perpustakaan sehingga perpustakaan akan dapat mengoptimalkan sumber daya manusia di perpustakaan. Peneliti menerapkan teknologi RFID pada pengisian data kunjungan perpustakaan dengan menggabungkan teknologi RFID yang berfungsi sebagai penghubung antara RFID reader dengan pembacaan database berbasis arduino.
The Internet of Things (IoT) in the Industrial Revolution 4.0 refers to networks of objects, objects, or devices that are connected on a large scale connected to the Internet. These objects, become smart, feel the environment and collect and exchange data with other objects. Devices on the internet of things are interconnected with other devices for the purpose of securely exchanging data. This new technology appears in various fields of human life. Therefore there are many new challenges for forensic investigators in finding digital evidence on these IoT devices. A digital forensic researcher will face many challenges to gather evidence from infected components on an Internet of Things (IoT) device and also face difficulties in analyzing the evidence. In this study, there will be an investigation of network forensic attacks on the Internet of Things (IoT) devices using the IDFIF method.
Room safety is very important considering that the crime scene is very disturbing to the public, one of which is the usual theft case. This might be caused partly because of economic factors that cause people to sometimes take shortcuts to make ends meet by stealing. So the PIR sensor sensor tool was made to detect human movements making it easier for us to control security when leaving a room empty, the media used is Mobile, by utilizing SMS facilities. The purpose of this research is the implementation of the PIR sensor as a detector of human motion in a room based on sms. This tool consists of a sensor that is a pir sensor as a detector of human motion around, and the bazzer will sound every time there is a movement that is captured by a pir sensor, a GPRS Shield which has a sim card inside that works to send SMS. This type of research used is qualitative research with experimental methods, namely by conducting a cona test (trial and error) for mechanical and electronic design components of the hadware and trying to explain. From this research produced information provider using two KC7738 PIR-based SMS sensors can be applied by the public so that they can provide information when leaving a room empty.
An important aspect of a network security system is maintaining data integrity and ensuring that it can be used by users safely. All types of attacks and countermeasures against network discovery attempts by unauthorized parties must be able to overcome efforts to protect network security systems. Firewall systems are used to solve this problem, but software-level attack errors cannot be protected by firewall systems. In this study, the implementation of port knocking and port blocking methods in the network was successfully carried out for data privacy issues. The port blocking method on the Mikrotik router permanently blocks the www port and the Winbox port using the services provided by the Mikrotik router. The port knocking method is more effective because it has rules for being able to enter the proxy server and access it remotely on the local network. The port knocking network implementation experiment applied to the Mikrotik router has enforced the winbox port, and www with 1-2-3 authentication flows with each authentication has a predetermined timeout time.
Penelitian ini mengkaji tentang perbandingan klasifikasi judul skripsi menggunakan algoritma naïve bayes classifier dan algoritma decision tree. Tujuan dari penelitian ini adalah untuk membandingkan dua algoritma dalam pengklasifikasian judul skripsi. Proses pengumpulan data dilakukan dengan cara studi pustaka dan literature sejenis. Hasil pengumpulan data akan di analisis dengan menggunakan algoritma naïve bayes classifier dan algoritma decision tree dengan tools rapidminer. Hasil penenlitian ini menemukan perbandingan yang cukup signifikan dengan hasil akurasi 80,33% untuk algoritma naïve bayes classifier dan 60,33% untuk algoritma decision tree dari 52 data judul skripsi yang digunakan.
Changes in business processes, lifestyles and ways of working that are more effective and efficient are caused by the rapid development of technology in various fields of human life, especially education. The current service partner is the Muhammadiyah Islamic Boarding School in Tasikmalaya Regency which has problems in optimizing educational activities in the pesantren environment. The use of features in Google Apps For Education (GAFE) is not optimal in educational activities, both in the teaching process between teachers and students, subject assignments, or other educational administration activities, so it is necessary to use these features more optimally. In addition, it is a new thing for teachers and students in optimizing the use of Google Apps for Education (GAFE), which makes it difficult and requires assistance to be used. This service provides alternative solutions for partners, namely the implementation and training of Google Apps for Education (GAFE) technology for teachers and students in an effort to improve skills and culture of responsiveness to the maximum use of technological developments so that it has an impact on the ease and smoothness of the online learning process.
The increasing utilization of IoT technology in various fields creates opportunities and risks for investigating all cybercrimes. At the same time, many research studies have concentrated on security and forensic investigations to collect digital evidence on IoT devices. However, until now, the IoT platform has not fully evolved to adjust the tools, methods, and procedures of IoT forensic investigations. The main reasons for investigators are the characteristics and infrastructure of IoT devices. For example, device number variations, heterogeneity, distribution of protocols used, data duplication, complexity, limited memory, etc. As a result, resulting is a tough challenge to identify, collect, examine, analyze, and present potential IoT digital evidence for forensic investigative processes effectively and efficiently. Indeed, there is not fully used and adapted international standard for the perfect IoT forensic investigation framework. In the research method, a literature review has been carried out by producing previous research studies that have contributed to further facing challenges. To keep the quality of the literature review, research questions (RQ) were conducted for all studies related to the IoT forensic investigation framework between 2015-2022. This research results highlight and provides a comprehensive overview of the twenty current IoT forensic investigation framework that has been proposed. Then, a summary or contribution is presented focusing on the latest research, grouping the forensic phases, and evaluating essential frameworks in the IoT forensic investigation process to obtain digital evidence. Finally, open research issues are presented for further research in developing IoT forensic investigative framework.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.