The research is focused on designing collaborative learning-oriented framework fulfilment service in teaching SQL Oracle 10g. Framework built a foundation of academic fulfilment service performed by a layer of the wor...
The research is focused on designing collaborative learning-oriented framework fulfilment service in teaching SQL Oracle 10g. Framework built a foundation of academic fulfilment service performed by a layer of the working unit in collaboration with program Studi Manajemen Informatika. In the design phase defined what form of collaboration models and information technology proposed for program Studi Manajemen Informatika by using a framework of collaboration inspired by the stages of modelling a Service Oriented Architecture (SOA). Stages begin with analyzing subsystems, this activity is used to determine subsystem involved and reliance as well as workflow between the subsystems. After the service can be identified, the second phase is designing the component specifications, which details the components that are implemented in the service to include the data, rules, services, profiles can be configured, and variations. The third stage is to allocate service, set the service to the subsystems that have been identified, and its components. Implementation framework contributes to the teaching guides and application architecture that can be used as a landing realize an increase in service by applying information technology.
Modification planning of business transformation involving technological utilization required a system of transition and migration planning process. Planning of system migration activity is the most important. The mig...
Modification planning of business transformation involving technological utilization required a system of transition and migration planning process. Planning of system migration activity is the most important. The migration process is including complex elements such as business re-engineering, transition scheme mapping, data transformation, application development, individual involvement by computer and trial interaction. TOGAF ADM is the framework and method of enterprise architecture implementation. TOGAF ADM provides a manual refer to the architecture and migration planning. The planning includes an implementation solution, in this case, IT solution, but when the solution becomes an IT operational planning, TOGAF could not handle it. This paper presents a new model framework detail transitions process of integration between TOGAF and ITIL. We evaluated our models in field study inside a private university.
Open Geospatial Consortium (OGC) has a standard for cartographic over web service; there are Web Map Service (WMS) used by MapServer, Web Feature Service (WFS), and Web Map Tile Service. There is research on comparing...
Open Geospatial Consortium (OGC) has a standard for cartographic over web service; there are Web Map Service (WMS) used by MapServer, Web Feature Service (WFS), and Web Map Tile Service. There is research on comparing two cartography information between WMS and WFS, so this research extends to proposed solution by comparing WMS and WMTS computation cost and created a product called Sampeu. Sampeu has proposed a solution by creating WMTS protocol over WMS. WMTS work on the tile-ing system where the data transform from big picture to part of the Tile is. A lot of Tile making a pyramid of cartography and serving to client one by one, so the computation cost can be decreasing.
Many researches proposes geospatial web framework over the popularity of the Internet. Based on that, research on securing geospatial web framework is necessary. In this research aimed Peuyeum. Peuyeum is geospatial w...
Many researches proposes geospatial web framework over the popularity of the Internet. Based on that, research on securing geospatial web framework is necessary. In this research aimed Peuyeum. Peuyeum is geospatial web framework with Encrypted Universal Resource Locator (URL). Advance Encryption Standard (AES)-Cipher Block Chaining (CBC) chosen as the method in this research. By calculating attack time, the brute force attack will reduce by this approach and resistance time will improve.
暂无评论