The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
NDN (Named Data Networking) as one approach of the Content-Centric Networking (CCN) architecture, proposed by Jacobson, 2006, conceptually, has some advantages compares to the current Internet technology which build based on host-to-host TCP/IP protocol stack. However, technically, we have to examine the NDN approach, beside to prove the concept, also to get as much as able the opportunities of improvement...
Travelling salesman problem is a problem that has always sought the best solution every time, because the problem salesman problem yet finalized, there are two important variable that must be met to achieve a settlement of traveling salesman problem, namely the problem optimum level of distance and the optimal time, any algorithm that serves to solve this problem mostly encountered problems at an...
In this paper discusses about performance analysis of Gigabit Passive Optical Network (GPON) with splitting ratio 1:64. The network topology is simulated using software tool called Optisystem. The transmitter uses a laser components with NRZ modulation scheme and the transmitter power is adjusted to maximum power according to the ITU-T standards. The transmission channel, used a fiber optic cable...
Campus is one of the environment that needs a good network connectivity because it has a lot of user and require a rapid information exchange on a large scale. To equal the increasing number for those necessaries, the network becomes more complex and complicated, so it is difficult to manage the complex network. SDN is presented to facilitate the process of network control by separating control plane...
In this paper explains about performance analysis of 10-Gigabit-capable Passive Optical Network (XGPON) with splitting ratio 1:64. The software tool called Optisystem is used to simulate the network topology. The transmitter uses a laser components with NRZ modulation scheme and the transmitter power is adjusted to maximum power according to the ITU-T standards. The transmission channel, used a fiber...
In a SDN-based data center network, the controller used greatly affects the behavior of the network. In this paper, the observation is conducted to describe the effect of various link failure scenarios to data center network performance using the Ripl-POX controller. Results shown in this paper can be used as a consideration for both controller selection or building for managing the data center and...
Digital Forensics is a branch of forensic science related to legal evidence found in computers and digital storage media. In the process of the investigation, the investigators took digital evidence from computers, laptops, HP, and other electronic goods. But there are times when a suspect or a witness or related person does not want to cooperate with investigators and removing the digital evidence...
In running the activities, the Goverment requires the data and information that are real time, accurate and relevant to the field of development planning. In short, application monitoring system for fishery sea resources is a mechanism of monitoring integrated activity between staff whos are in the headquarter with staff working in each unit of work scattered throughout the territory of Indonesia...
The availability of computer systems has created a variety of automated applications in personal identification. From the various characteristics of biometrics, face recognition techniques mainly face verification has become an area of active research and the application are important in law enforcement because it can be done without involving the subject. However, the influence of age progression...
Interconnection SMS in Indonesia currently uses a peering model in which every operator interconnected with one another. The model works well for a small number of operators offering simple text messaging service. However, the model is problematic for a large number of operators offering complex service and business arrangements. To overcome this problem, SMS Hubbing model becomes alternatives model...
Surface Ground Penetrating Radar (GPR) is the one of Radar technology that is widely used on many applications. It is non-destructive remote sensing method to detect underground buried objects. However, the output target is only hyperbolic representation. This research develops a system to identify a buried object on surface GPR based on decision tree method. GPR data of many basic objects (with circular,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.