computer and web security system is an attempt to avoid attacks from crackers because a form and method of crime on internet network can not be predicted. Therefore, we just keep trying to use various methods in secur...
computer and web security system is an attempt to avoid attacks from crackers because a form and method of crime on internet network can not be predicted. Therefore, we just keep trying to use various methods in securing the system that is running. It is the same in web testing that can be accessed online by people who are not responsible from along distance to change and remove the test results or even damage the web testing system. So, the purpose of this paper is to design and implement web security testing system by using semantic comparison method to avoid structured query language injection (SQLI) attack and to do security on web testing application using Message Digest 5 encryption (MD5). Research data were obtained by using direct observation and documentation and literature review. After the design and application of the system, it can be obtained that by using semantic comparison method in web testing can prevent the occurrence of SQL injection attacks and can secure account from web testing users by using MD5.
Search engines have become an integral part of student learning activities. This study aims to see how the use of search engines by students, especially by students of the Library and Information Science program, Facu...
Search engines have become an integral part of student learning activities. This study aims to see how the use of search engines by students, especially by students of the Library and Information Science program, Faculty of Communication Sciences, Universitas Padjadjaran. This study uses the mixed method. The research data was obtained through questionnaires, in-depth interviews, observations and literature studies. The results of the study showed that in learning activities, the respondents used search engines to find the references for college assignments and thesis writing material. The students also use search engines to meet daily information needs, solve problems, increase knowledge, reduce doubts, clarify things, entertain, fulfill curiosity about others, etc. The retrieval technique used by students is by using keywords/queries, Boolean logic, query strategies in the form of a brief search and using the advanced search feature. This research is expected to contribute to the university in supporting online-based learning facilities for students.
Background: Problem posing, the generation of questions by learners, has been shown to be an effective instructional strategy for teaching–learning of complex materials in domains such as mathematics. In this paper, ...
详细信息
We derive rigorous criteria for the existence of surface-plasmon polaritons (SPPs) at lossy interfaces by considering properties of SPPs and employing the requirement of causality. These criteria impose limits on susc...
详细信息
ISBN:
(纸本)9781943580149
We derive rigorous criteria for the existence of surface-plasmon polaritons (SPPs) at lossy interfaces by considering properties of SPPs and employing the requirement of causality. These criteria impose limits on susceptibilities of the metamaterial.
Software-Defined Networking(SDN)is now considered as one of the promising future networking technologies,and this trend can be clearly verified by observing activities of both industry and *** industry,we can easily n...
详细信息
Software-Defined Networking(SDN)is now considered as one of the promising future networking technologies,and this trend can be clearly verified by observing activities of both industry and *** industry,we can easily notice that many major
This paper presents link prediction of Linked Open Data (LOD) by Multiple Label Propagation Algorithm (MLPA). The current LOD do not have enough links. Therefore, the LOD have not been able to exert so much semantic c...
详细信息
ISBN:
(纸本)9781509023349
This paper presents link prediction of Linked Open Data (LOD) by Multiple Label Propagation Algorithm (MLPA). The current LOD do not have enough links. Therefore, the LOD have not been able to exert so much semantic characteristics. In order to solve this problem, we proposed the MLPA considering semantic distance. The MLPA can expand potential links of each data contained in the LOD. The experimental result of the MLPA shows the good performance and the validity of this algorithm is confirmed.
暂无评论