Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 18745 dokumen yang sesuai dengan query
cover
Uzun, Abdulbaki
"This book discusses the fusion of mobile and WiFi network data with semantic technologies and diverse context sources for offering semantically enriched context-aware services in the telecommunications domain.
It presents the OpenMobileNetwork as a platform for providing estimated and semantically enriched mobile and WiFi network topology data using the principles of Linked Data. This platform is based on the OpenMobileNetwork Ontology consisting of a set of network context ontology facets that describe mobile network cells as well as WiFi access points from a topological perspective and geographically relate their coverage areas to other context sources.
The book also introduces Linked Crowdsourced Data and its corresponding Context Data Cloud Ontology, which is a crowdsourced dataset combining static location data with dynamic context information. Linked Crowdsourced Data supports the OpenMobileNetwork by providing the necessary context data richness for more sophisticated semantically enriched context-aware services.
Various application scenarios and proof of concept services as well as two separate evaluations are part of the book. As the usability of the provided services closely depends on the quality of the approximated network topologies, it compares the estimated positions for mobile network cells within the OpenMobileNetwork to a small set of real-world cell positions. The results prove that context-aware services based on the OpenMobileNetwork rely on a solid and accurate network topology dataset. The book also evaluates the performance of the exemplary Semantic Tracking as well as Semantic Geocoding services, verifying the applicability and added value of semantically enriched mobile and WiFi network data."
Switzerland: Springer Cham, 2019
e20501863
eBooks  Universitas Indonesia Library
cover
"This book provides an overview of the latest research and development of new technologies for cognitive radio, mobile communications, and wireless networks. The contributors discuss the research and requirement analysis and initial standardization work towards 5G cellular systems and the capacity problems it presents. They show how cognitive radio, with the capability to flexibly adapt its parameters, has been proposed as the enabling technology for unlicensed secondary users to dynamically access the licensed spectrum owned by legacy primary users on a negotiated or an opportunistic basis. They go on to show how cognitive radio is now perceived in a much broader paradigm that will contribute to solve the resource allocation problem that 5G requirements raise. The chapters represent hand-selected expanded papers from EAI sponsored and hosted conferences such as the 12th EAI International Conference on Mobile and Ubiquitous Systems, the 11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, the 10th International Conference on Cognitive Radio Oriented Wireless Networks, the 8th International Conference on Mobile Multimedia Communications, and the EAI International Conference on Software Defined Wireless Networks and Cognitive Technologies for IoT."
Switzerland: Springer Cham, 2019
e20502120
eBooks  Universitas Indonesia Library
cover
"This book presents peer-reviewed contributions from the 5th International Conference on Mobile and Wireless Technology (ICMWT 2018), held June 25-27, 2018 in Hong Kong. This conference provided researchers and practitioners from both academia and industry with a platform to keep them abreast of cutting-edge developments in the field. The book includes papers on mobile and wireless networks and their applications, the increasingly important security issues relating to mobile and wireless systems, data management, as well as the latest developments in mobile software development, and multimedia and wireless communications."
Singapore: Springer Singapore, 2019
e20501966
eBooks  Universitas Indonesia Library
cover
"This edited book covers recent advances of techniques, methods and tools treating the problem of learning from data streams generated by evolving non-stationary processes. The goal is to discuss and overview the advanced techniques, methods and tools that are dedicated to manage, exploit and interpret data streams in non-stationary environments. The book includes the required notions, definitions, and background to understand the problem of learning from data streams in non-stationary environments and synthesizes the state-of-the-art in the domain, discussing advanced aspects and concepts and presenting open problems and future challenges in this field.
-Provides multiple examples to facilitate the understanding data streams in non-stationary environments;
-Presents several application cases to show how the methods solve different real world problems;
-Discusses the links between methods to help stimulate new research and application directions."
Switzerland: Springer Cham, 2019
e20502053
eBooks  Universitas Indonesia Library
cover
"This book covers ideas, methods, algorithms, and tools for the in-depth study of the performance and reliability of dependable fault-tolerant systems. The chapters identify the current challenges that designers and practitioners must confront to ensure the reliability, availability, and performance of systems, with special focus on their dynamic behaviors and dependencies. Topics include network calculus, workload and scheduling; simulation, sensitivity analysis and applications; queuing networks analysis; clouds, federations and big data; and tools. This collection of recent research exposes system researchers, performance analysts, and practitioners to a spectrum of issues so that they can address these challenges in their work."
Switzerland: Springer Cham, 2019
e20502904
eBooks  Universitas Indonesia Library
cover
Laksmi Adyawardhani
"Tren bisnis telekomunikasi yang terjadi belakangan ini adalah munculnya suatu bentuk model bisnis baru, yaitu Operator Jaringan Maya Bergerak yang biasa dikenal dengan Mobile Virtual Network Operator (MVNO). MVNO berkembang pesat di beberapa negara di dunia, menjual layanan selular dengan menyewa jaringan operator. Di sisi lain, pemilik jaringan mendapat tambahan pendapatan tanpa harus memelihara hubungan dengan pelanggan dan menambah jumlah pegawai. Di Indonesia, bentuk MVNO ini belum diimplementasikan. Oleh karena itu perlu dilakukan analisa implementasi MVNO menggunakan model Porter 5 Forces untuk mengidentifikasi potensi keuntungan kompetitifnya dalam industri telekomunikasi di Indonesia. Porter 5 forces, merupakan salah satu perangkat strategi bisnis yang paling sering digunakan, dan keampuhannya telah terbukti dalam berbagai macam kasus. Porter 5 forces lebih mengarah pada analisa industri dari luar perusahaan, mencoba melihat potensi kedalam. Analisa yang dilakukan meliputi intensity of rivalvy among existing player, threat of new entrant, bargaining power of supplier, bargaining power of buyer, dan threat of substitution. Analisa keuntungan kompetitif digunakan untuk merancang strategi lebih lanjut dalam menghadapi kompetisi yang ada di industri selular. Dengan menerapkan model Porter 5 forces untuk analisis implementasi MVNO di Indonesia diperoleh hasil bahwa bisnis MVNO memiliki keuntungan kompetitif yang rendah. Untuk pengembangan MVNO ditawarkan beberapa strategi untuk memperbaiki posisi dalam kompetisi di industri telekomunikasi. Apabila pemerintah Indonesia ingin mengembangkan MVNO, yang perlu dilakukan adalah menurunkan bargaining power MNO, dan juga pelanggan.

Telecommunication business trend in many countries is a new celuler business model, Mobile Virtual Network Operator (MVNO). MVNO own their costumer but use the telecom network and radio spectrum of a Mobile Network Operator(MNO). This wholesale agreement will gives extra revenue for the host without maintain the customer.It has not implemented in Indonesia. This thesis is to analyze MVNO implementation by using Porter 5 forces model, to identify the MVNO competitive profit potential in Indonesia's telecommunication structure. Porter 5 forces, is one of the most often used business strategy tools and has proven its usefullness on numerous ocassione. Porter 5 forces is an outside in industry analysis.The analysis consist of intensity of rivalvy among existing player, threat of new entrant, bargaining power of supplier, bargaining power of buyer, dan threat of substitution. This analysis is needed in order to formulate strategy to face existing micro environment condition within the industry. By using Porter 5 forces to analyze MVNO implementation, resulting low competitive profit potential for MVNO in Indonsia. Several strategies are proposed in order to achieve better positioning. The goverment support for MVNO could be by decreasing bargaining power of MNO and subscribers."
Depok: Fakultas Teknik Universitas Indonesia, 2007
T40793
UI - Tesis Membership  Universitas Indonesia Library
cover
Fitrianta Eka Prasaja
"ABSTRAK
GNU Privacy Guard (GnuPG, atau GPG) merupakan hybrid crypto system yang digunakan untuk mengamankan komunikasi dan penyimpanan data. Salah satunya dapat dimanfaatkan untuk pengamanan komunikasi lewat email. GPG Webmail Versi 1.0 merupakan model aplikasi berbasis web untuk mengakses email yang berfungsi sebagai perantara dalam melakukan penyandian email dari email server dengan protokol POP3 dan SMTP. GPG Webmail Versi 1.0 ini diintegrasikan ke dalam distro linux server sehingga menjadi distro linux baru dilengkapi dengan paket aplikasi penyandian email berbasis web yang siap digunakan.
Aplikasi ini mempunyai keunggulan mudah dalam penggunaannya karena user tidak perlu melakukan instalasi serta mempermudah suatu organisasi yang belum mempunyai email Server sendiri namun ingin menyediakan fasilitas aman bagi anggotanya yang masih menggunakan email server yang bukan miliknya.
Keunggulan lainnya adalah tak perlu mengamankan PC/Laptop yang digunakan untuk mengakses aplikasi, karena data rahasia dan secret key tidak tersimpan dalam PC/Laptop tersebut, sehingga user bisa mengakses aplikasi dari PC/Laptop milik fasilitas umum.

ABSTRACT
GNU Privacy Guard (GnuPG or GPG) is a hybrid crypto system used to preserve communication and data storage, one of which can be utilized for communication pacification through e-Mail. GPG Webmail Version 1.0 is a web based model application to access a web based e-Mail that serves as an intermediary in conducting e-mail encryption of e-Mail server with POP3 and SMTP protocols. GPG Webmail Version 1.0 is integrated into Linux distros servers so that the new linux distro is equipped by web based e-Mail encoding application package which is ready for use.
The application has the advantage of easy to use as the user does not need to install anything. It also simplifies an organization that has not got an e-Mail server itself but want to provide safe facilities for members who still use e-mail server that is not its property.
Another advantage is no need to secure the PC / laptop that is used to access the application as confidential data and secret key are not stored in the PC / laptop, so that users can access the applications from a public PC / Laptop."
Fakultas Teknik Universitas Indonesia, 2011
S1082
UI - Skripsi Open  Universitas Indonesia Library
cover
"This book provides recent results of game theory for networking applications. The contributors address the major opportunities and challenges in applying traditional game theory as well as intelligent game theory to the understanding and designing of modern network systems, with emphasis on both new analytical techniques and novel application scenarios. After an overview of game theory for networks, the book narrows in on game theory in communications, game theory in wireless networks, and game theory applications. The book features contributions from researchers and professionals around the world.
- Presents a variety of perspectives on game theory for networking applications;
- Shows how game theory can apply to the study of data traffic, new generation networks, and smartgrid;
- Includes recent results of applied game theory for networks, providing some technical progresses in GAMENETS.
"
Switzerland: Springer Cham, 2019
e20502415
eBooks  Universitas Indonesia Library
cover
Verma, Pramode K.
"This book explores alternative ways of accomplishing secure information transfer with incoherent multi-photon pulses in contrast to conventional Quantum Key Distribution techniques. Most of the techniques presented in this book do not need conventional encryption. Furthermore, the book presents a technique whereby any symmetric key can be securely transferred using the polarization channel of an optical fiber for conventional data encryption. The work presented in this book has largely been practically realized, albeit in a laboratory environment, to offer proof of concept rather than building a rugged instrument that can withstand the rigors of a commercial environment. "
Singapore: Springer Singapore, 2019
e20502411
eBooks  Universitas Indonesia Library
cover
"Contents :
- List of Exhibits
- Executive Summary
- Chapter One: Introduction
- Chapter Two: Overview
- Chapter Three: Voice over Frame Relay
- Chapter Four: Voice over ATM
- Chapter Five: Voice over IP
- Chapter Six: The Future of Voice/Data Integration
- Chapter Seven: Forecast of Voice-over-X Markets
- Chapter Eight: Opportunities, Strategies, and the Keys to Success "
Chicago: International Engineering Consortium, 1999
e20451477
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>