This paper proposes novel compressed sensing (CS) of colored iris images using three RGB iterations of basis pursuit (BP) with sparsity averaging (SA), called RGB-BPSA. In RGB-BPSA, a sparsity basis is performed using the average of multiple coherent dictionaries to improve the BP reconstruction. In the experiment, first, the decomposition level of wavelet is studied to analyze the best reconstruction result. Second, the effect of compression rate (CR) is considered. Third, the effect of resolution is investigated. Last, the sparse basis of SA is compared to existing basis, i.e., curvelet, Daubechies-1 or haar, and Daubechies-8. The superior RGB-BPSA over existing CS is shown by better visual quality with higher signal to noise ratio (SNR) and structural similarity (SSIM) index in the same CR. In addition, reconstruction time also investigated where RGB-BPSA outperforms curvelet and two times longer than haar and Daubechies-8. INDEX TERMSCompressed sampling, basis pursuit (BP), sparsity averaging, iris images.
Manusia tidak memiliki kemampuan untuk mengetahui apa yang akan terjadi di masa depan, seperti misalnya mengetahui barang yang laku dijual. Tetapi manusia dapat memprediksi sesuatu dengan melakukan analisa, misalnya memprediksi produk yang paling dicari atau dimiati di bulan depan atau tahun depan. Untuk dapat memprediksi hal tersebut dibutuhkan suatu ekosistem yang dapat membantu. Data warehouse dapat menjawab permasalahan tersebut. Data warehouse adalah sistem yang mengekstrasi, membersihkan, menyesuaikan, dan mengirim sumber data ke dalam penyimpanan data dimensi dan kemudian mendukung dan mengimplementasikan query dan analisis untuk tujuan pengambilan keputusan. Dengan data warehouse data historis suatu toko dapat dianalisa dan diketahui penjualan barang apa saja yang paling diminati oleh konsumen. Dengan mengetahui hal tersebut, pedagang dapat memprediksi barang apa saja yang dijual dan berapa jumlah barang yang harus di stok di tokonya sehingga dapat mengurangi tumpukan barang di gudang.
Computer forensics and anti computer forensics are two opposing fields. Computer forensics is done by a computer forensics expert in order to obtain accurate data and evidence of cyber crime cases for investigation, while the anti-computer forensics conducted by the attacker to remove traces at once difficult computer forensics expert in performing its duties. For the attacker, the selection of anti-computer forensics tool that default on the target machine, more effective and faster than installing it first on the victim machine. For this reason the author chose shred as anti computer forensics applications on GNU / Linux machine. If anti forensic work, forensic experts would be difficult to perform computer forensics to data as evidence of cyber crime. This paper describes the anti-forensics performed by the attacker to remote machines GNU / Linux for cyber crime cases in a computer network. Anti forensic performed using shred the syslog file to remove traces of the crime at the same time make it difficult for the forensic process by computer forensics expert. Tests performed on three pieces of computer-based GNU / Linux on System Signals Lab intranet ITB. Each act as the target machine (server), firewall machine, and the machine attacker. Doing the anti computer forensics and computer forensics at the server machine. The test results are recorded and analyzed in order to then be deduced.
Internet have evolved so rapidly in this day and age from where user only can access to internet service through cable UTP(LAN) and now user can access it from every where through nirkable (Wireless Network) and from this improvement it caused lots of device connected and heavy traffic coming in and out from a network. Because of this situation the network industry come with a new idea using a new network architecture that known as Software Defined Network (SDN). Software Defined Network (SDN) is a new way to manage, design and implementing network architecture where data flow from the control plane separated from the hardware. Network industry believe that SDN can change the network architecture that people using now that known as Traditonal Network because SDN can overcome the weakness of Tradional network that tend to be closed and distributed can be changed by SDN to be open source, can be programmed and can be controlled centrally. In this research will be implementing and analys simulation Quality Of Service (QOS) and Perfomance device openflow switch using ONOS as controller to monitor the device perfomance and iperf3 as a Quality Of Service testing.
Keamanan teknologi informasi merupakan kebutuhan vital bagi organisasi untuk menjamin kerahasiaan, integritas dan ketersediaan informasi. Salah satu organisasi yang membutuhkan keamanan TI adalah Lembaga X. Lembaga X yang memiliki tugas dan fungsi sebagai penyelenggara sistem informasi, pusat data dan informasi kebencanaan harus mampu menjamin keamanan, kerahasiaan, dan integritas data, juga kinerja sistem harus dikendalikan sehingga dapat berjalan dengan optimal. Audit keamaman TI dilakukan untuk memastikan bahwa keamanan informasi dan pengelolaan data yang diterapkan di Lembaga X sesuai dengan prosedur serta mengetahui tingkat kematangan teknologi informasi yang diterapkan. Standar yang digunakan dalam proses audit adalah ISO/IEC 27002 sebagai kontrol keamanan dan COBIT 5 untuk mengidentifikasi proses bisnis serta tingkat kematangan. Hasil tingkat kematangan TI di lembaga X adalah 2.48 yang masuk ke dalam kategori level 2: Managed Process. Level 2: Managed Process menunjukkan bahwa proses penerapan teknologi informasi telah dijalankan dan diimplementasikan dengan cara yang lebih teratur dan sudah mulai dikendalikan.Kata Kunci: Audit Keamanan, ISO 27002, COBIT 5, Tingkat Kematangan
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.