application access
Recently Published Documents


TOTAL DOCUMENTS

47
(FIVE YEARS 13)

H-INDEX

3
(FIVE YEARS 0)

Author(s):  
Tresna Maulana Fahrudin ◽  
Ilmatus Sa'diyah ◽  
Latipah ◽  
Ibnu Zahy Atha Illah ◽  
Cagiva Chaedar Beylirna ◽  
...  

At educational institutions, especially at University, writing scientific papers is a skill that must be possessed by academics such as educators and students. However, writing scientific papers is not easy, there are many provisions and rules that need to be fulfilled. Several studies show that there are still many academics who make mistakes in writing their scientific papers. Some of the mistakes made include punctuation errors, typographic writing errors and the use of non-standard words in Indonesian. Researchers in Indonesia have developed various spelling error detection applications in Indonesian-language scientific papers. This study tries to analyze the development of an application framework for detecting Indonesian spelling errors from various assessment indicators. This study tries to compare the application framework for detecting spelling errors between other studies with proposed application that named KEBI 1.0 Checker. KEBI 1.0 Checker as a spelling error detection application has 3 main features, namely detecting errors in the use of punctuation marks, writing typography, and using non-standard words in accordance with the standards of the Big Indonesian Dictionary and the General Guidelines for Indonesian Spelling. In addition, this study tries to objectively examine the complexity of the features, advantages and disadvantages, methods and the level of accuracy of each application. The results of the analysis show that KEBI 1.0 Checker has the completeness of features, fast computation time, easy application access, and an attractive user interface. However, it is still necessary to improve the precision in correcting spelling errors in typographic words.


Synthesis ◽  
2021 ◽  
Author(s):  
Christian V. Stevens ◽  
Jonas Everaert ◽  
Maarten Debruyne ◽  
Flore Vanden Bussche ◽  
Kristof Van Hecke ◽  
...  

AbstractCovalent triazine frameworks (CTFs) based on polydentate ligands are highly promising supports to anchor catalytic metal complexes. The modular nature of CTFs allows to tailor the composition, structure, and function to its specific application. Access to a broad range of chelating building blocks is therefore essential. In this respect, we extended the current available set of CTF building blocks with new nitrile-functionalized N-heterocyclic ligands. This paper presents the synthesis of the six ligands which vary in the extent of the aromatic system and the denticity. The new building blocks may help in a rational design of enhanced support materials in catalysis.


2021 ◽  
Vol 11 (2) ◽  
pp. 95-106
Author(s):  
Muhamad Agung Santoso ◽  
◽  
Rina Fiati ◽  
Ratih Nindyasari ◽  
◽  
...  

The asset performance monitoring should be done to find out and review the reported data whether it has been in line with the reality or not. It is important to identify the occurring problems to be immediately handled. The information system development aimed to build the existing system. Thus, it will be more effective and efficient to produce information. This research applied the System Development Life Cycle (SDLC) with Waterfall Model to design, create, maintain the information and process the system. During the creation of this information system, the authors applied the PHP language program, Framework Codeigniter, MySQL, database, and Visual Studio Code as the editorial codes. The implementation of the SIPERITA application, could be used excellently were proven effective and efficient because the application facilitated the monitoring activities by providing single application access in promoting a checking process of the condition asset then the user administrator can see a diagram of the monitoring results on the home page so that if there is a problem with the asset, direct action can be taken and with this application, users can print the reports based on daily, monthly, and annually.


2020 ◽  
Vol 39 (5) ◽  
pp. 6009-6020
Author(s):  
Yosef Ashibani ◽  
Qusay H. Mahmoud

Smartphones have now become ubiquitous for accessing and controlling home appliances in smart homes, a popular application of the Internet of Things. User authentication on smartphones is mostly achieved at initial access. However, without applying a continuous authentication process, the network will be susceptible to unauthorized users. This issue emphasizes the importance of offering a continuous authentication scheme to identify the current user of the device. This can be achieved by extracting information during smartphone usage, including application access patterns. In this paper, we present a flexible machine learning user authentication scheme for smart home networks based on smartphone usage. Considering that users may run their smartphone applications differently during different day time intervals as well as different days of the week, new features are extracted by considering this information. The scheme is evaluated on a real-world dataset for continuous user authentication. The results show that the presented scheme authenticates users with high accuracy.


Author(s):  
Lana Ciarna Artheswara ◽  
Asri Sulistiawati

Pesatnya perkembangan E-Commerce di beberapa tahun belakang, menjadikan E-Commerce sebagai prospek bisnis besar dalam dunia perdagangan. Tren penggunaan E-Commerce ini melanda dunia remaja, dibuktikan dengan adanya survey OTX dan The Intelligence Group yang dilakukan terhadap remaja berusia 13-17 tahun, hampir 6 dari setiap 10 remaja pernah membeli produk dan jasa lewat internet. Hasil survey ini menunjukkan bahwa perilaku remaja dalam berbelanja di E-Commerce telah berkembang dan menjadi gaya hidup remaja perkotaan. Namun, akses internet di Indonesia saat ini dapat dijangkau hingga ke daerah pedesaan, maka dari itu saat ini E-Commerce dapat diakses oleh semua orang tanpa adanya batasan geografis. Penelitian ini dilakukan di dua lokasi yang berbeda yaitu di Kota dan Kabupaten Bogor. Hal ini untuk membandingkan hasil data dari kedua lokasi tersebut. Tulisan ini bertujuan untuk mengetahui perbedaan tingkat penggunaan E-Commerce yang dilihat dari frekuensi penggunaan aplikasi, durasi akses aplikasi, dan banyaknya aplikasi E-Commerce pada gawai yang dimiliki oleh remaja Kota dan Kabupaten Bogor. Penelitian ini menggunakan pendekatan kuantitatif dan didukung dengan data kualitatif. Data kuantitatif didapat melalui kuesioner dan data kualitatif didapatkan dari wawancara mendalam. Hasil dari penelitian ini menunjukkan adanya perbedaan signifikan dalam hal penggunaan E-Commerce oleh remaja yang tinggal di daerah pedesaan dan di Kota Bogor. Perbedaan nampak dalam hal durasi akses dan tingkat kepemilikan aplikasi E-Commerce.Kata Kunci : E-Commerce, ICT, Internet, Remaja=====ABSTRACTThe development of Electronic-Commerce (E-Commerce) in the past few years has made E-Commerce as a big business prospect in the world of commerce. The trend of E-Commerce is coming to adolescent’s world, there’s evidenced by the OTX survey and The Intelligence Group conducted on adolescents aged 13-17 years, the survey said that 6 out of every 10 teenagers have bought products and services online. The results of this survey indicate that adolescent behaviour in shopping in E-Commerce has developed and become a lifestyle of urban youth. While internet access in Indonesia can be reached up to rural areas, it means E-Commerce can be accessed by everyone without geographical restrictions. This research was conducted in two different locations, on Urban and Rural Area in Bogor to compare the results of data from the two locations. This paper aims to determine differences in the level of E-Commerce usage, and the indicator to measure it is the frequency of application usage, the duration of application access, and the number of E-Commerce applications on devices. This research uses a quantitative approach and is supported by qualitative data. Quantitative data obtained through questionnaires and for qualitative data obtained from in-depth interviews. The results of this study is the duration of access and the amount of E-Commerce has significant differences between the adolescent who lived in Urban and Rural Area of Bogor.Keywords : E-Commerce, ICT, Internet, Teenagers


Author(s):  
Lana Ciarna Artheswara ◽  
Asri Sulistiawati

Pesatnya perkembangan E-Commerce di beberapa tahun belakang, menjadikan E-Commerce sebagai prospek bisnis besar dalam dunia perdagangan. Tren penggunaan E-Commerce ini melanda dunia remaja, dibuktikan dengan adanya survey OTX dan The Intelligence Group yang dilakukan terhadap remaja berusia 13-17 tahun, hampir 6 dari setiap 10 remaja pernah membeli produk dan jasa lewat internet. Hasil survey ini menunjukkan bahwa perilaku remaja dalam berbelanja di E-Commerce telah berkembang dan menjadi gaya hidup remaja perkotaan. Namun, akses internet di Indonesia saat ini dapat dijangkau hingga ke daerah pedesaan, maka dari itu saat ini E-Commerce dapat diakses oleh semua orang tanpa adanya batasan geografis. Penelitian ini dilakukan di dua lokasi yang berbeda yaitu di Kota dan Kabupaten Bogor. Hal ini untuk membandingkan hasil data dari kedua lokasi tersebut. Tulisan ini bertujuan untuk mengetahui perbedaan tingkat penggunaan E-Commerce yang dilihat dari frekuensi penggunaan aplikasi, durasi akses aplikasi, dan banyaknya aplikasi E-Commerce pada gawai yang dimiliki oleh remaja Kota dan Kabupaten Bogor. Penelitian ini menggunakan pendekatan kuantitatif dan didukung dengan data kualitatif. Data kuantitatif didapat melalui kuesioner dan data kualitatif didapatkan dari wawancara mendalam. Hasil dari penelitian ini menunjukkan adanya perbedaan signifikan dalam hal penggunaan E-Commerce oleh remaja yang tinggal di daerah pedesaan dan di Kota Bogor. Perbedaan nampak dalam hal durasi akses dan tingkat kepemilikan aplikasi E-Commerce.Kata Kunci : E-Commerce, ICT, Internet, Remaja=====ABSTRACTThe development of Electronic-Commerce (E-Commerce) in the past few years has made E-Commerce as a big business prospect in the world of commerce. The trend of E-Commerce is coming to adolescent’s world, there’s evidenced by the OTX survey and The Intelligence Group conducted on adolescents aged 13-17 years, the survey said that 6 out of every 10 teenagers have bought products and services online. The results of this survey indicate that adolescent behaviour in shopping in E-Commerce has developed and become a lifestyle of urban youth. While internet access in Indonesia can be reached up to rural areas, it means E-Commerce can be accessed by everyone without geographical restrictions. This research was conducted in two different locations, on Urban and Rural Area in Bogor to compare the results of data from the two locations. This paper aims to determine differences in the level of E-Commerce usage, and the indicator to measure it is the frequency of application usage, the duration of application access, and the number of E-Commerce applications on devices. This research uses a quantitative approach and is supported by qualitative data. Quantitative data obtained through questionnaires and for qualitative data obtained from in-depth interviews. The results of this study is the duration of access and the amount of E-Commerce has significant differences between the adolescent who lived in Urban and Rural Area of Bogor.Keywords : E-Commerce, ICT, Internet, Teenagers


Author(s):  
Rian Dwi Hapsari ◽  
Kuncoro G. Pambayun ◽  
Heri Iman Santoso

Problem Statement: The author focuses on limited online library services, direct verbal communication, access to referrals, librarian resource conditions and diversity of LSFH support facilities. Purpose: This study aims to know the LSFH policy by the Library in deciding the spread of COVID-19 on IPDN Method: This study uses qualitative methods. The technique of collecting data observation, documentation, and online interviews of 10 respondents consisting of 5 LSFH librarians and 5 LSFH service recipients Result: The results showed that the e-Resources Service was the easiest to implement and improved. Scientific Publication Services had the greatest technical challenges due to constrained server and application access, while the Library Guidance Service was a challenge to the capability and quality of delivering a librarian Conclusion: The LSFH policy by IPDN Library runs quite well. The writer's suggestion to equalization of the capacity of librarians with sufficient bandwidth, librarians' capacity improvement, and improvement of applications and scientific publication server.


2019 ◽  
Vol 13 (2) ◽  
pp. 72-79
Author(s):  
Sucipto Sucipto ◽  
Teguh Andriyanto ◽  
Muhammad Najibulloh Muzaki ◽  
Erna Daniati ◽  
Rini Indriati ◽  
...  

The role of network communication is vital in this era which is the industrial era 4.0. In this era, the emphasis on digital economic patterns, artificial intelligence, big data, robotics, and so on or known as the phenomenon of disruptive innovation. Technology tools that need to be developed do not directly want sophisticated automation technology. Still, network infrastructure that is available in an agency or region that wants to reach the industrial era must be considered. This research aims at designing the network is to make the topology of private networks and public networks. It is solving private networks to optimise SIMRS application access speed. It also improves the management of public networks in the form of hotspot management. The result that can be felt among the private networks is not that the SIMRS application network will not be interrupted by the public hotspot network. Besides, public network management will be more evenly distributed with hotspot management.


Cloud Computing is a most widespread and popular form of computing, promising high reliability for customers and providers both at the same point of time for many fields, where cloud storage security is based on Authentication and Authorization in cloud computing. Data is uploaded into a cloud and stored in a datacenter, Authentication and authorization are the major concerns to access the data stored in cloud by users from the data center. Security is a major issue; these are mainly deal with identity and access management, prevention of data loss and malware attack control management. In this paper we majorly concentrated on Authentication and Authorization to cloud access, we focused on identity management mechanism as cloud security solution that provides directory services for application access management. We discussed the protocols that support authorization and allows the communication across applications with the help of tokens instead of credentials. We even concentrated on the different mechanisms which plays a major role in designing a secured cloud computing architecture from malicious intrusions and attacks, it is a step to verify the presence and functioning of the cloud customers and cloud providers through security mechanisms to protect from different risks, threats and attacks. In this paper we discussed different security Algorithms and Authentication architecture along with the proposed algorithm, where analysis is done along with the computational evaluation with output


Sign in / Sign up

Export Citation Format

Share Document