Digital forensic tool is a software used by digital evidence investigators to extract data and information from a digital evidence. The integrity of the digital evidence must be maintained through the chain of custody...
详细信息
Digital forensic tool is a software used by digital evidence investigators to extract data and information from a digital evidence. The integrity of the digital evidence must be maintained through the chain of custody in order to be admissible in court. Most digital extraction tool use either MD5 (Message Digest) or SHA (Secured Hash Algorithm) hashing to check the integrity of digital evidence. The hashing algorithm has been found to have a weakness known as collision in which two different messages have the same hashing values. Although the probability of producing such weakness is very small, this collision can be used to deny the usage of the evidence in court of justice. After the first collision has been found, many cryptanalysts have tried to explore various methods to detect the collisions with shorter and efficient time. This paper is to review the existing methods in digital forensic tools that have been used to create a collision attacks in digital evidence.
This paper presents the development air quality monitoring system for indoor workplace that send measurement CO, CO2, PM2.5, temperature and humidity and send it via IEEE 802.11 b/g wireless communication. The problem...
This paper presents the development air quality monitoring system for indoor workplace that send measurement CO, CO2, PM2.5, temperature and humidity and send it via IEEE 802.11 b/g wireless communication. The problem is many sensor node for indoor air quality should not always send data to server in normal situation. It could spend power consumption and the data would send it periodically. Although the data send periodically, the sensor must handle emergency situation like fire. The results show that with controlled transmission interval not only spend power consumption but the device also good respond in emergency situation and user could monitor air quality remotely via web application.
This paper proposes a service desk to handle two important issues in financial company using the Information Technology Infrastructure Library (ITIL) Framework, i.e. Single Point of Contact (SPOC) and Service Level Ag...
This paper proposes a service desk to handle two important issues in financial company using the Information Technology Infrastructure Library (ITIL) Framework, i.e. Single Point of Contact (SPOC) and Service Level Agreement (SLA) issues. SPOC is a gateway to information needs of both users and company staff, particularly the IT staff, while SLA defines the responsibilities of the parties where such services work and provides coverage for services provided to the client to achieve client satisfaction. The service desk is built by focusing in service operation. A service desk has been successfully built in this study to make user's problem controllable. The result also shows that the user's problem can be solved faster in many cases.
Computational technology is an important thing that needed in the whole of human life. Along with the development of computer technology, there are a significant data created and wait to be processed; we will get more...
Computational technology is an important thing that needed in the whole of human life. Along with the development of computer technology, there are a significant data created and wait to be processed; we will get more advantages if it well-processed, if not we will see the data explosion, the data is just a useless stack. Research mitigates the other research paper and makes a conclusion and a report by PRISMA method. The development of computer technology will support the development of an organization. Considering any factors in choosing the right and suitable high-performance computer resource due to our organization is a must. The existing high-performance computing forms are Supercomputer, Grid Computing, Cluster Computing, and Cloud Computing. Based on this work, the last form of high-performance computing, Cloud Computing is one of the most used forms thus we mitigate its advantages and disadvantages. Recently, to process this vast data, we must have a high-performance computer and to provide it, this is not a cheap resource.
Application architecture and information technology systems in the company should be able to support the company’s policy that leads to their alignment with the business objectives. The alignment of the implementatio...
Application architecture and information technology systems in the company should be able to support the company’s policy that leads to their alignment with the business objectives. The alignment of the implementation of information technology systems to the needs and goals of the organization will be able to be answered by taking into account the integration in the development, so that the gap of these two things can be minimized. As a company engaged in IT consulting, project management system is one form of application systems that support core business objective of the company: to produce high-quality software. Nevertheless, the project management system should be able to work together with other supporting information systems, so that the flow of information within the company can run effectively. To achieve these objectives, required the analysis and design of an integrated system, which can be achieved through a service-oriented architecture based system. which includes the stages of requirements and analysis, design and development, and the last is the IT operations. The final result expected is the design of the service-oriented architecture based project management system which built through top-down approach that focuses on improving the effectiveness of business process.
The purpose of this study is to determine the factors that encourage the use of visual electronic banking system (VEBS) application in Bank Central Asia Corporation, and provide an idea to increase the use of VEBS. Th...
The purpose of this study is to determine the factors that encourage the use of visual electronic banking system (VEBS) application in Bank Central Asia Corporation, and provide an idea to increase the use of VEBS. This study using UTAUT 2 model approach. The primary data obtained from interviews, direct observation and questionnaires that distributed and processed using SEM-PLS. The results of this study provide qualitative calculation results of UTAUT 2 variable. The conclusion obtained that interest of the use of application VEBS affected by variables facilitating condition, performance expectancy and behavioral intention. From these conclusions this study provided an idea to the future development of application's features for more effective and efficient use.
Every organization must ensure that information assets are protected and information security system has been implemented well. PT. IndoDev Niaga Internet is a provider of business solutions applications and implement...
Every organization must ensure that information assets are protected and information security system has been implemented well. PT. IndoDev Niaga Internet is a provider of business solutions applications and implementation services that include application Human Resource Information System (HRIS) and Enterprise Resource Planning (ERP). In order to ensure the security of the information, then in 2015 PT. IndoDev Niaga Internet implement ISO 27001: 2013. Through the implementation of ISO 27001: 2013, it is expected that information can be properly maintained, which in turn will affect the business continuity. Companies need to know the extent to which the process has been applied and what actions can be done to improve the performance of the application of ISO 27001: 2013. Factor analysis was conducted first to determine the factors that affect to the information security. After the factors that affect to the information security known, then observation and interview conducted to gather data about PT. IndoDev Niaga Internet ISO 27001:2013 implementation according to the factors that affect. And then recommendation and corrective action developed using gap analysis method. The most influential factor to the security of customer information PT. IndoDev Niaga Internet is a factor access control and security operations. For the audit results IS027001: 2013 from the aspect of access control, they found 11 check items that fit into the category of NC (Non-Conformance) of 33 check items in which 9 of them in the category of major and two remaining categories minor, while for operations security aspects of the 12 check items, found 5 that goes into the category of NC (Non-Conformance) and everything was included into the category of minor.
A system for automatic detection of road damages is essential for logistics management. At the core of the system lies an algorithm for classification of damages. This work intends to establish such an algorithm. In t...
A system for automatic detection of road damages is essential for logistics management. At the core of the system lies an algorithm for classification of damages. This work intends to establish such an algorithm. In the current proposal, the algorithm receives data of the probe vehicle rate of rotations, extracts statistics descriptive from the data to produce a feature vector, and finally, feeds the vector to a simple-three-layer neural network to classify the damages. The types of damages are limited to four cases: normal, pothole, speed bump, and expansion joint. For the development, a probe vehicle is used to produce 400 empirical data involving those four damage cases. By using Monte Carlo approach, the established neural network model is evaluated. The results show that the approach is able to classify the cases with 85% accuracy. The study also finds that the rates of pitch and roll to be the determining factors.
Psoriasis classification requires the accurate identification of the lesional types for the early and effective diagnosis and it is worth interesting that the normal and psoriasis cell tissues exhibit different gene e...
详细信息
Psoriasis classification requires the accurate identification of the lesional types for the early and effective diagnosis and it is worth interesting that the normal and psoriasis cell tissues exhibit different gene expression. Therefore, gene expression data is an effective source for psoriasis classification and there is a challenge regarding the selection of suitable gene signatures for its purpose. In this present study, the gene expression-based microarray data were used and 35 expression features linked with psoriasis were utilized to feed into our machine learning model. Overall, the performance of our model based on 35 mentioned-above features surpassed that of other state-of-the-art classifiers with an average accuracy of 98.3%, recall of 98.6%, and precision of 98% in 5-fold cross-validation tests. We also validate our model on two different sets of psoriasis and the performance results are significant. These results have suggested that our 35 expression signatures have been identified as key features for classifying samples between lesion and non-lesion. More specifically, the expression levels of few genes i.e., FABP5 , TGM1 , or BCAR3 are discovered as newly potential biomarkers for psoriasis classification and treatment with high confidence. This study, therefore, could shed light on developing the prediction models for psoriasis classification and treatment using gene expression profiles.
Recently, the Indonesian government requires auditors, the need for auditors around 40,000 auditors in 2016, currently has only about 10,800 auditors, however, the lack of the auditors impacting the risk of financial ...
详细信息
ISBN:
(纸本)9781538674086;9781538674079
Recently, the Indonesian government requires auditors, the need for auditors around 40,000 auditors in 2016, currently has only about 10,800 auditors, however, the lack of the auditors impacting the risk of financial loss for the state. Referring to the problem, this experimental research was conducted. The experiment of the research was conducted two times and the audit topic is a compliance audit in the year 2017 and year 2018. The goal of this research is to know, can the stakeholder act as an IT and general compliance auditor? The experiment was conducted by 8 university students in 2017 and 19 university students in 2018, and the supporting tools of audit activities the university student use the smartphone to capture the object as evidence. The experiment results with descriptive method show university students can act as an auditor and found several pieces of evidence that might cause future impact to the institution.
暂无评论