68 results on '"Sukarno"'
Search Results
2. Implementation of IR Lock on Poledrone (Polman Drone Education) for Precision Landing with ROS
3. A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected Systems
4. A Survey on Recent Advancements in Lightweight Generative Adversarial Networks, their Applications and Datasets
5. Human-Centered Machine Learning Implementation in Banking: Case Study in BRILink (BRI Branchless Banking) Agent Acquisition, Upgrade, and Activation
6. An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee
7. A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics
8. Human-Centered Machine Learning Implementation in Banking: Case Study in BRILink (BRI Branchless Banking) Agent Acquisition, Upgrade, and Activation
9. A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics
10. Security System for Digital Land Certificate Based on Blockchain and QR Code Validation in Indonesia
11. LSTM-NB: DoS Attack Detection On SDN With P4 Programmable Dataplane
12. LSTM-NB: DoS Attack Detection On SDN With P4 Programmable Dataplane
13. Security System for Digital Land Certificate Based on Blockchain and QR Code Validation in Indonesia
14. Secure MQTT Authentication and Message Exchange Methods for IoT Constrained Device
15. Thermal Characteristics of Tube Economizer with Serrated Fin
16. Secure MQTT Authentication and Message Exchange Methods for IoT Constrained Device
17. How Can National Identity Card Reduce Authentication Risks in Enterprise Attendance Management System?
18. Randomness, Uniqueness, and Steadiness Evaluation of Physical Unclonable Functions
19. Thermal Characteristics of Tube Economizer with Serrated Fin
20. How Can National Identity Card Reduce Authentication Risks in Enterprise Attendance Management System?
21. Randomness, Uniqueness, and Steadiness Evaluation of Physical Unclonable Functions
22. Comparison of 5G NR Planning in Mid-Band and High-Band in Jababeka Industrial Estate
23. Mitigating Risk of IoT Sensing Data Error Using Platform as a Data Handler
24. Blacklisted IP Distribution System to handle DDoS attacks on IPS Snort based on Blockchain
25. Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System
26. Comparative Analysis of K-Nearest Neighbor and Decision Tree in Detecting Distributed Denial of Service
27. Security Functional Requirements for The Development of a Biometrics Attendance System
28. How Can Fingerprint Improves The Payment Experience of a Drink Vending Machine?
29. Notice of Removal: Material Handling Cost Analysis in Oil and Gas Company: (Case Study: Removal of Heat Exchanger with Rough Terrain Crane)
30. Comparison of 5G NR Planning in Mid-Band and High-Band in Jababeka Industrial Estate
31. Mitigating Risk of IoT Sensing Data Error Using Platform as a Data Handler
32. Blacklisted IP Distribution System to handle DDoS attacks on IPS Snort based on Blockchain
33. Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System
34. Comparative Analysis of K-Nearest Neighbor and Decision Tree in Detecting Distributed Denial of Service
35. Security Functional Requirements for The Development of a Biometrics Attendance System
36. How Can Fingerprint Improves The Payment Experience of a Drink Vending Machine?
37. Notice of Removal: Material Handling Cost Analysis in Oil and Gas Company: (Case Study: Removal of Heat Exchanger with Rough Terrain Crane)
38. Toward Autonomy: Symbiotic Formal and Statistical Machine Reasoning
39. Adopting Fingerprint as an Authentication Factor on E-Ticketing Mechanism
40. Mitigation of Cryptojacking Attacks Using Taint Analysis
41. Virtual Password Authentication Scheme in Hashed Domain
42. Overhead Analysis on the Use of Digital Signature in MQTT Protocol
43. Security Document for Smart Parking Gate based on Common Criteria Framework
44. Quality of Service (QoS) Comparison Analysis of Snort IDS and Bro IDS Application in Software Define Network (SDN) Architecture
45. Improving The Accuracy of Fuzzy Vault Scheme in Fingerprint Biometric
46. Reducing Attack Surface via Executable Transformation
47. Analysis and Classification of Danger Level in Android Applications Using Naive Bayes Algorithm
48. Analysis of the Technology Acceptance Model (TAM) on Survey System Based Smartphone by the National Population and Family Planning Indonesia
49. Hardening the Virtual Password Authentication Scheme
50. An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.