scholarly journals Penerapan Internet Financial Reporting (IFR) Pada Bank Umum Syariah Di Indonesia

2019 ◽  
Vol 5 (1) ◽  
pp. 63-81 ◽  
Author(s):  
Ria Nur Rizqiah ◽  
Ahmad Tarmizi Lubis

Along with the rapid development of internet technology today, the company's financial reporting activities can be done via the Internet in real time in an easy way and a wider scope. Internet-based financial reporting is commonly known as the Internet Financial Reporting (IFR). This research is a descriptive study that aims to determine the implementation of IFR on Islamic Banks in Indonesia. The variables in this study consisted of content, presentation and timeliness variable with a total of 112 items tested indicators. The results of this study indicate that the eleventh BUS sampled research has been able to apply IFR. IFR score obtained by each BUS has a nearly equal value ranging from 49% to 63% with the total maximum score of 100% and average score of 55%

2020 ◽  
Author(s):  
Syufrijal .

This research aims to develop interactive PLC learning media based on virtual learning. The interactive PLC learning media uses a 3D simulator design to simulate the application of PLC in the industry, so it looks like real and makes students more interested in learning PLC This study uses experimental methods. The 3D simulation software is Factory I/O developed by Real Games. It enables us to build a conveyor virtual plant and to bring it into the classroom. The automatic controller used to control the virtual plant is the PLC Siemens S7-1200 with Tia Portal software. The PLC is connected to the computer server through an ethernet network via TCP/IP protocol. With the rapid development of current internet technology, PLC learning can be done in virtual learning. This PLC learning media can be run remotely through the internet with team viewer program so that PLC learning is not only done on campus but can be done anywhere. From the results of research that has been done, the user can create PLC programs remotely to control conveyor virtual plant on a computer server through an internet network without having to install the program on their computers. Keywords: PLC, interactive learning media, virtual learning, remote desktop


2018 ◽  
Vol 173 ◽  
pp. 02029
Author(s):  
XU Jiahui ◽  
YU Hongyuan ◽  
WANG Gang ◽  
WANG Zi ◽  
BAI Jingjie ◽  
...  

The rapid development of mobile Internet technology and the wide spread of smart terminals have brought opportunities for the transformation of power grid business model. Compared to the non-real-time information, the real-time and running data of dispatch and control domain is easy to be intercepted and cracked. To solve this problem, this paper presents a new approach to mobile application security framework for the power grid control field. It is to realize secondary encryption by using the method of MD5+AES mixed encryption algorithm and combining the time stamp in real-time data transmission process. At the same time it is to prevent cross-border operations and brute force by using Token authentication and Session technology. China EPRI safety test results show that the application of the framework significantly improves the integrity, safety and reliability of real-time data in power grid control.


2013 ◽  
Vol 433-435 ◽  
pp. 1613-1617
Author(s):  
Kai Ni

With the rapid development of communication technology, wireless internet technology and the increasing number of mobile phone users, people were more concern on the efficiency of real-time information service. Based on communication mechanism of multiple threads, a data delivery controller for mobile phone communication was presented in this paper. The server side controller designed on Java multiple threads and provided efficiency data response for request of android mobile phones. By our experiment, the average response time on the server was 3.8s on ten million times addition calculation, which can effectively meet the real-time requirements of mobile communication.


2014 ◽  
Vol 986-987 ◽  
pp. 1569-1573 ◽  
Author(s):  
Chen Jiang ◽  
Lei Zhou ◽  
Xiao Ju Liu ◽  
Xiao Liang Xu

This paper presents a set of schemes of centralized indoor electrical safety intelligent monitoring systems which are more intelligent, real-time and reliable based on the internet technology of things. Integrated use of wireless sensor networks, embedded microprocessor technology is realized. Hall sensor is used to collect the real-time current on the power grid. As well, This system utilizes the method of the subspace pattern recognition to identify electrical appliances and eliminate some safety risks of the domestic distribution network through the fault arc detection.


2014 ◽  
Vol 1073-1076 ◽  
pp. 1875-1878
Author(s):  
Li Juan Shi ◽  
Xiu Xia Yu ◽  
Jian Zhao ◽  
Qin Sheng Du

Facility agriculture environment monitoring system of the existing main adopts the wired communication technology, such as serial bus technology and field bus technology for communication. This system has the advantages of good interoperability, strong anti-interference ability, but the poor stability, low reliability, difficult to deploy, installation and maintenance costs high, which greatly limits its application in the design of facilities agriculture field. Three nets fusion refers to the 3G, RFID and Internet combination. In this paper, the 3G network, wireless radio frequency technology and Internet technology combining, in order to solve the above problems, the use of 3G network and the Internet to a large amount of data real-time remote transmission, using radio frequency network RFID technology through the short distance wireless data transmission terminal sensors to collect information, these information in time through the3G network and the Internet are transmitted to the the remote controller. The remote controller sends according to terminal sensor control information, through the 3G network and the Internet will control information is transmitted to the radio frequency network, wireless RF network through wireless communication control information is transmitted to the terminal controller, the final completion of the remote monitoring and control of agricultural facilities. The experimental results show that, the system can meet the real-time and can perform remote transmission for large data, provide the technical basis of visual audio data monitoring information transmission for agricultural facilities.


2014 ◽  
Vol 635-637 ◽  
pp. 1628-1631
Author(s):  
Li Juan Zhuang

In the context of the rapid development of Internet technology, information security is particularly important, especially at present there is growing incidence of attack targeting at the host and a variety of attacking means, which does a lot of harm. To do preventive work well is to figure out what risks threatening the host and formulate timely and effective measures to protect the host.The first computer in the world came out in 1946 in the USA. With the birth of this computer, the computer technology of humankind has made spectacular development for more than the last half century and penetrated into all aspects of our lives till today. Compared with traditional means of communication, the Internet has greatly facilitated our lives, which led to the growing dependence on the Internet as well. While technology is a double-edged sword, the Internet information security is also very acute problem, which greatly troubles people’s work and life. As the most fundamental part of a computer system, the host security problem draws people’s attention in particular.


2020 ◽  
Vol 4 (2) ◽  
pp. 8
Author(s):  
Xiang Anqi

With the rapid development of Internet technology, the Internet economy has gradually penetrated into every aspect of people’s life. The group of high school students has increasingly become an important part of the Internet consumption market, and its consumption concept is also deeply influenced by the Internet economy. Based on the analysis of the development status of the Internet economy and the characteristics of high school students’ consumption concepts, this article analyzes the double impact of the Internet economy on high school students’ consumption concepts. On this basis, it expounds how to guide high school students to form the correct consumption concepts under the Internet economy from the three dimensions of school, family and individual.


Author(s):  
Li Chen ◽  
Zhijie Song ◽  
Billy Liavas

Abstract Real-time collaboration systems, in which participants share product data and applications in real time, have been a subject of interest for many years. Nowadays, a rapid development of Internet-based technologies with steadily increasing easiness in accessing any kind of information through the World Wide Web (WWW) would offer the possibility of developing a real-time collaborative system over the Internet. Two strategies are required to create such a system. One strategy is finding effective methods for communicating and sharing distributed product information, especially those related to design and manufacturing. Another strategy is developing Web-based approaches that support real-time sharing of platform-independent applications. In this paper, a concept for a multi-user collaborative assembly environment on the Internet is presented. The Client/Server structure of the environment, and the four main functional modules including: 1) integration and sharing of distributed product data through a STEP server; 2) session management including team management, user management and access control; 3) sharing of multimedia data (e.g. text, audio and video); 4) 3D collaborative assembly, are described. Finally, a scenario has been designed to demonstrate the effectiveness of the environment to support distributed collaborative assembly design.


Author(s):  
Bo Shen ◽  
Wei Huang ◽  
Xiaodi Li

With the rapid development of the Internet technology, JS (short for JavaScript), as one of the representative of script languages, which is very powerful, is becoming more and more popular to the developers and users. But JS programming is more complex than usual static technology. In the field of search engine and information acquisition, it's very difficult to get the information hidden in script code. In this paper, the authors design a distributed system for parsing the JS code embedded in HTML file and retrieving the underling information. the authors describe how to extract JS codes from HTML file and parse them. Also, they introduce a task scheduling algorithm for the JS parsing system by employing Hadoop distributed computing technology. The experimental results indicate that the proposed algorithm and system can achieve a reasonable task scheduling efficiency and parse JS codes rapidly.


Symmetry ◽  
2019 ◽  
Vol 11 (3) ◽  
pp. 361
Author(s):  
Jaeseung Lee ◽  
Jungho Kang ◽  
Moon-seog Jun ◽  
Jaekyung Han

The rapid development of Internet technology and the spread of various smart devices have enabled the creation of a convenient environment used by people all around the world. It has become increasingly popular, with the technology known as the Internet of Things (IoT). However, both the development and proliferation of IoT technology have caused various problems such as personal information leakage and privacy violations due to attacks by hackers. Furthermore, countless devices are connected to the network in the sense that all things are connected to the Internet, and network attacks that have thus far been exploited in the existing PC environment are now also occurring frequently in the IoT environment. In fact, there have been many security incidents such as DDoS attacks involving the hacking of IP cameras, which are typical IoT devices, leakages of personal information and the monitoring of numerous persons without their consent. While attacks in the existing Internet environment were PC-based, we have confirmed that various smart devices used in the IoT environment—such as IP cameras and tablets—can be utilized and exploited for attacks on the network. Even though it is necessary to apply security solutions to IoT devices in order to prevent potential problems in the IoT environment, it is difficult to install and execute security solutions due to the inherent features of small devices with limited memory space and computational power in this aforementioned IoT environment, and it is also difficult to protect certificates and encryption keys due to easy physical access. Accordingly, this paper examines potential security threats in the IoT environment and proposes a security design and the development of an intelligent security framework designed to prevent them. The results of the performance evaluation of this study confirm that the proposed protocol is able to cope with various security threats in the network. Furthermore, from the perspective of energy efficiency, it was also possible to confirm that the proposed protocol is superior to other cryptographic protocols. Thus, it is expected to be effective if applied to the IoT environment.


Sign in / Sign up

Export Citation Format

Share Document