Path analysis is a method used to analyze the relationship between independent and dependent variables to identify direct and indirect relationship between them. This method is developed by Sewal Wright and initially only uses correlation analysis results in identifying the variables' relationship. Path analysis method currently is mostly used to deal with variables with non-spatial data type. When analyzing variables that have elements of spatial dependency, path analysis could result in a less precise model. Therefore, it is necessary to build a path analysis model that is able to identify and take into account the effects of spatial dependencies. Spatial autocorrelation and spatial regression methods can be used to develop path analysis method so as to identify the effects of spatial dependencies. This paper proposes a method in the form of path analysis method development to process data that have spatial elements. This study also discusses our effort on establishing a method that could be used to identify and analyze the spatial effect on data in the framework of path analysis; we call this method spatial path analysis.
The Intrusion Prevention System (IPS) Snort is a server security System that can prevent attacks by examining and recording all data packets as well as recognizing packets with sensors, when the attack has been identified, IPS Snort will deny the access (block) and log of all data packets identified. However by using only IPS Snort which can only check and note the Allert attacks that are incoming in less sense to secure a server by collaborating with the other server's secure system in the sense of being able to make the network security of the server better. Honeypot Artillery chosen which works when there is a Hacker trying to penetrate through open ports can be detected as if hackers can break through the system, then Honeypot Artillery will provide information about who attackers and how the attacker could enter the Snort IPS system for later record in the database that can be viewed on the Web interface, Allert recorded on the experiment that has been done in the database as much as 9453 on TCP protocol as much as 9%, UDP as much as < 1%, and ICMP As much as 91%.
This study aims to develop a software framework for modeling of tsunami vulnerability using DEM and Sentinel 2 images. The stages of study, are: 1) extraction Sentinel 2 images using algorithms NDVI, NDBI, NDWI, MSAVI, and MNDWI; 2) prediction vegetation indices using machine learning algorithms. 3) accuracy testing using the MSE, ME, RMSE, MAE, MPE, and MAPE; 4) spatial prediction using Kriging function and 5) modeling tsunami vulnerability indicators. The results show that in 2021 the area was dominated by vegetation density between (-0.1-0.3) with moderate to high vulnerability and risk of land use tsunami as a result of the decreasing of vegetation. The prediction results for 2021 show a low canopy density of vegetation and a high degree of land surface slope. Based on the prediction results in 2021, the study area mostly shows the existence of built-up lands with a high tsunami vulnerability risk (more than 0.1). Vegetation population had decreased to 67% from the original areas in 2017 with an area of 135 km2. Forest vegetation had decreased by 45% from 116 km2 in 2017. Land use for fisheries had increased to the area of 86 km2 from 2017 with an area of 24 km2.
Network security is the main of the development of today's technology. The ease in accessing the internet also requires protection on users is required. The ease of accessing the internet by people can also cause the occurrence of cyber crime. Cyber crime can be done by all internet users, without exception, to earn a profit. Security monitoring system server through the app messenger Telegram can help administrators in the work because always be on standby in front of the server computer. Notice of Snort as IDS via Telegram also quicked and can be accepted anywhere. In taking action when the server something happened not too late. Target cyber crime also can attack anyone without exception. A system should be a strength, with the protection of a secure network that will be difficult to hack by hackers. The server is the main target in the conduct of cyber crime. The use of the server must maintain to secure all the data is not misused by persons who are not responsible. Each server is a system that should be an administrator as a guard on duty watching and taking action when something happens on the server. To monitor a server, an administrator should always standby in front of the server computer so as not to late take action when the server is about to happen something.
This research focuses on the importance of data security in maintaining confidentiality, particularly for sensitive and critical information that should only be accessed by certain parties. Cryptography is a mathematical method used to secure data. Several methods are available, including ROT13, Vernam Cipher, and Stream Cipher. This study combines these three methods to achieve a higher level of data security. The analysis shows that the combination of these algorithms results in a stronger and more complex encryption process than using a single method. The process involves encrypting plaintext using ROT13, followed by encrypting the result using Vernam Cipher with an inputted key, and then encrypting the output again using Stream Cipher. The advantages of this combination model include enhanced data security, as demonstrated by the three-stage encryption and decryption process.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.