Search

Your search keyword '"Amang Sudarsono"' showing total 204 results

Search Constraints

Start Over You searched for: Author "Amang Sudarsono" Remove constraint Author: "Amang Sudarsono"
204 results on '"Amang Sudarsono"'

Search Results

1. Ephemeral Secret Leakage-Free ID-Role-Based Access Control Authentication and Key Exchange Protocol for Securing Electric Vehicle Data

2. An Anonymous Authentication With Received Signal Strength Based Pseudonymous Identities Generation for VANETs

3. Implementasi skema pengacakan subcarrier OFDM dengan algoritma RSA pada NI-USRP

4. Performance Analysis of MIMO-OFDM System Using Predistortion Neural Network with Convolutional Coding Addition to Reduce SDR-Based HPA Nonlinearity

5. Secure Real-time Data Transmission for Drone Delivery Services using Forward Prediction Scheduling SCTP

6. Steganography Based on Data Mapping and LSB Substitution With RSS Key Generation

7. Design and Implementation of Hypothermia Symptoms Early Detection With Smart Jacket Based on Wireless Body Area Network

8. Big Data Environment for Realtime Earthquake Data Acquisition and Visualization

9. Implementasi Metode LightGBM Untuk Klasifikasi Kondisi Abnormal Pada Pengemudi Sepeda Motor Berbasis Sensor Smartphone

10. SDN-Based Network Intrusion Detection as DDoS defense system for Virtualization Environment

11. A Performance Evaluation of Modified Weighted Pathloss Scenario Based on the Cluster Based-PLE for an Indoor Positioning of Wireless Sensor Network

12. Higher Rate Secret Key Formation (HRKF) based on Physical Layer for Securing Vehicle-to-Vehicle Communication

13. Secure Data Travelling User using Hybrid Cryptosystem with User Privacy Protection

14. Analisys and Implementation Cloud-based Biometricauthentication in Mobile Platform

15. Medical Image Encryption Using Modified Identity Based Encryption

16. Skema Lokalisasi Posisi Node Terdistribusi pada Lingkungan Free Space Path Loss

17. Medical Health Record Protection Using Ciphertext-Policy Attribute-Based Encryption and Elliptic Curve Digital Signature Algorithm

18. Trusted Data Transmission Using Data Scrambling Security Method with Asymmetric Key Algorithm for Synchronization

19. Secure Data Exchange in Environmental Health Monitoring System through Wireless Sensor Network

20. Remote Monitoring of the Heart Condition of Athletes by Measuring the Cardiac Action Potential Propagation Time Using a Wireless Sensor Network

21. Pollution Monitoring System Using Gas Sensor based on Wireless Sensor Network

22. Skema Peningkatan Reciprocity Kanal dengan Menggunakan Metode Hierarchical Clustering

23. Botnet Detection Using On-line Clustering with Pursuit Reinforcement Competitive Learning (PRCL)

24. Classification of Radical Web Content in Indonesia using Web Content Mining and k-Nearest Neighbor Algorithm

25. Performance Analysis of Video Transmission Using Sequential Distortion Minimization Method for Digital Video Broadcasting Terrestrial

26. Performance Analysis of CP-Based and CAZAC Training Sequence-Based Synchronization in OFDM System

27. Performance Analysis of Circular 8-QAM Constellation with MMSE Equalizer for OFDM System Using USRP

28. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

29. Adaptive Sleep Scheduling for Health Monitoring System Based on the IEEE 802.15.4 Standard

30. Covert Communication in MIMO-OFDM System Using Pseudo Random Location of Fake Subcarriers

31. Traffic Analysis of Quality of Service (QoS) for Video Conferencing between Main Campus and Sub Campus in Laboratory Scale

32. Performance Analysis of DTN Using Level Signal Priority Epidemic Routing Protocol

33. An Implementation of Error Minimization Data Transmission in OFDM using Modified Convolutional Code

34. Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management

35. Partition-Based GTS Adjustment for Wireless Sensor Networks

36. Modified GTS Allocation Scheme for IEEE 802.15.4

37. Indonesian Automatic Speech Recognition For Command Speech Controller Multimedia Player

38. Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning

39. Performance Analysis of an OFDM PHY Scheme with Zero Forcing Equalizer Using Software Defined Radio Platform and USRP

40. Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management

43. Pembuatan Sistem Mikroskop Digital Terintegrasi dengan Pengolahan Citra untuk Pengembangan Perangkat Pembelajaran IPA di SMPIT Al Uswah Surabaya

Catalog

Books, media, physical & digital resources