Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 3675 dokumen yang sesuai dengan query
cover
Tom Lovett, editor
"Mobile context awareness presents work from industrial and academic researchers, focusing on novel methods of context acquisition in the mobile environment – particularly through the use of physical and virtual sensors – along with research into new applications utilising this context. In addition, the book provides insights into the technical and usability challenges involved in mobile context-awareness, as well as observations on current and future trends in the field."
London: Springer, 2012
e20407419
eBooks  Universitas Indonesia Library
cover
Couto, Ricardo
"Context management for distributed and dynamic context-aware computing proposes a novel architecture for context management based on the concept of context domains, allowing applications to keep context interests across distributed context management systems. The authors describe a distributed middleware that implements the aforementioned concepts, without compromising scalability and efficiency of context access."
London: Springer, 2012
e20407575
eBooks  Universitas Indonesia Library
cover
China: Taschen, 2011
R 004.16 APP
Buku Referensi  Universitas Indonesia Library
cover
Poltak Reinold
"Tesis ini bertujuan memformulasikan strategi yang tepat dalam pemasaran produk mobile broadband SMART melalui analisis Porter 5 Forces dan SWOT. Potensi kompetitif SMART bersarkan Porter 5 Forces berada di level Medium. Hasil analisis SWOT menunjukkan posisi SMART pada Kuadran IV (Kekuatan - Ancaman) yang selanjutnya mengarahkan pada alternatif strategi stabilisasi dalam Grand Strategy. Dari sejumlah strategi berdasarkan Porter 5 Forces dan Grand Strategy, dilakukan pendekatan QSPM untuk menentukan suatu strategi unggulan dalam pemasaran produk mobile broadband SMART. Hasilnya adalah strategi tetap mempertahankan diferensiasi produk unlimited murni untuk memperkuat penetrasi pasar.

The focus of this study is to formulate the best strategy of product marketing of SMART mobile broadband through Porter 5 Forces and SWOT analysis. Porter 5 shows the medium level of SMART competitive potential. SWOT results the Quadrant IV of SMART position (Strenght - Threats) that continuing into stabilization strategy in Grand Strategy. Using QSPM approach, available strategies from Porter 5 Forces and Grand Strategy are processed to perform a best strategy of product marketing of SMART mobile broadband which is to keep the product differentiation strategy of unlimited mobile broadband in strengthening the market penetration."
Depok: Fakultas Teknik Universitas Indonesia, 2009
T40872
UI - Tesis Open  Universitas Indonesia Library
cover
Ihsan Nugraha
"Skripsi ini membahas tentang aplikasi Voice over Internet Protocol (VoIP) pada jaringan Mobile IPv6 (MIPv6) dengan menggunakan mekanisme komunikasi bidirectional tunneling. Jaringan MIPv6 sederhana yang dirancang akan diserang menggunakan variasi ukuran paket serangan Ping of Death sebesar 1 kB, 10 kB dan 100 kB untuk mendapatkan perubahan Quality of Service tertentu, yakni delay dan throughput, pada layanan VoIP. Kemudian akan dilakukan uji coba penyerangan pada variasi jenis codec (G.711, G.723.1 dan G.729) untuk menentukan jenis codec yang paling baik untuk digunakan pada jaringan Mobile IPv6 dengan ancaman keamanan Denial of Service.
Data hasil simulasi menunjukkan bahwa pada Home Network peningkatan delay mencapai 652,83 % dan penurunan throughput mencapai 57,05 % untuk serangan 1 kB, peningkatan delay 908,87 % dan penurunan throughput 60,95 % untuk serangan 10 kB dan peningkatan delay 2871,30 % dan penurunan throughput 61,75 % untuk serangan 100 kB. Codec G.723.1 merupakan codec yang paling baik digunakan untuk aplikasi VoIP pada environment ini dengan nilai delay paling kecil, yakni 147,94 ms di Home Network sebelum serangan dan 2,3 s setelah mendapat serangan, serta 4,9 s di Foreign Network sebelum serangan dan 10,8 s setelah mendapat serangan.

This paper discussing about Voice over Internet Protocol(VoIP) application in Mobile IPv6 (MIPv6) network using bidirectional tunneling mechanism. The simple MIPv6 network is going to be attacked using variant sizes of Ping of Death packets which are 1 kB, 10 kB and 100 kB to breakdown the certain Quality of Service, which are delay and throughput, on VoIP services. Then the attacking experiment to the variant of codec (G.711, G.723.1 and G.729) will be conducted to determine the recommended codec to be used for MIPv6 network which faces the security threats of Denial of Service.
Simulation data shows that in Home Network the delay increased by 652,83 % and the throughput decreased by 57,05 % for 1 kB Ping of Death, delay increased by 908,87 % and throughput decreased by 60,95 % for 10 kB Ping of Death, delay increased by 2871,30 % and throughput decreased by 61,75 % for 100 kB Ping of Death. Codec G.723.1 is the most recommended codec for VoIP application to be used in this kind of environment with the least delay value, which is 147,94 ms in Home Network before the threat occured and 2,3 s after the threat occured, and then 4,9 s in Foreign Network before the threat occured and 10,8 s after the threat occured.
"
Depok: Fakultas Teknik Universitas Indonesia, 2014
S53852
UI - Skripsi Membership  Universitas Indonesia Library
cover
Suwega Drestantiarto
"Jaringan Mobile IPv6 mendukung perpindahan mobile node dari titik akses jaringan satu ke titik akses lain tanpa harus memutuskan koneksi. Pada jaringan mobile, perpindahan ini disebut handover yang dibedakan atas vertical handover dan horizontal handover. Untuk mengetahui performa jaringan dengan kedua jenis handover tersebut, dapat diukur beberapa parameter QoS seperti throughput, transfer time, dan delay. Dalam skripsi ini, aplikasi yang digunakan berupa File Transfer Protocol (FTP).
Hasil pengukuran membuktikan bahwa throughput mengalami penurunan sebesar 4,14% pada horizontal handover dan mengalami penurunan sebesar 26,25% pada vertical handover; transfer time bertambah sebesar 8,34% pada horizontal handover dan bertambah sebesar 41,49% pada vertical handover; delay bertambah sebesar 8,22% pada horizontal handover dan bertambah sebesar 41,05% pada vertical handover. Secara keseluruhan performa jaringan mobile IPv6 skenario horizontal handover lebih baik daripada vertical handover.

Mobile IPv6 network supports mobile nodes movement from one location to another within the network without having to disconnect. In mobile networking, the movement is called handover which is divided into vertical handover and horizontal handover. To determine the network performance with both types of handovers, we can measure several QoS parameters such as throughput, delay, and transfer time. In this final paper, application that is used is the File Transfer Protocol (FTP).
Measurement results prove that the throughput decreased by 4.14 % in horizontal handover and decreased by 26.25 % in vertical handover; the transfer time increased by 8.34 percent in horizontal handover and increased by 41.49 % in vertical handover; the delay increased by 8.22 % in horizontal handover and increased by 41.05% in vertical handover. Overall, network performance of mobile IPv6 on horizontal handover scenario is better than the vertical handover.
"
Depok: Fakultas Teknik Universitas Indonesia, 2012
S43451
UI - Skripsi Open  Universitas Indonesia Library
cover
Mahmoodi, Seyed Eman
"This book presents solutions to the problems arising in two trends in mobile computing and their intersection: increased mobile traffic driven mainly by sophisticated smart phone applications; and the issue of user demand for lighter phones, which cause more battery power constrained handhelds to offload computations to resource intensive clouds (the second trend exacerbating the bandwidth crunch often experienced over wireless networks). The authors posit a new solution called spectrum aware cognitive mobile computing, which uses dynamic spectrum access and management concepts from wireless networking to offer overall optimized computation offloading and scheduling solutions that achieve optimal trade-offs between the mobile device and wireless resources. They show how in order to allow these competing goals to meet in the middle, and to meet the promise of 5G mobile computing, it is essential to consider mobile offloading holistically, from end to end and use the power of multi-radio access technologies that have been recently developed. Technologies covered in this book have applications to mobile computing, edge computing, fog computing, vehicular communications, mobile healthcare, mobile application developments such as augmented reality, and virtual reality.
- Gives readers valuable insights into the future of mobile computing and communication;
- Touches on wireless technologies such as 5G, mobile edge computing (MEC), mobile cloud services, and cognition-based networking;
- Provides examples throughout the book to provide insight into real world scenarios."
Switzerland: Springer Nature, 2019
e20509738
eBooks  Universitas Indonesia Library
cover
Harry Noor Sukarna
"Penelitian ini mengevalusai 20 situs web pemerintah berbasis mobile di indonesia berdasarkan kerangka kerja evaluasi yang terdiri dari empat aspek, yaitu karakteristil umum, konten elektronik, layanan elektronik dan partisipasi elektronik. dari hasil evaluasi, diketahui bahwa situs web pemerintah berbasis mobile fokus pada konten elektronik dan partisipasi elektronik. konten sudah diperbarui secara reguler khususnya tentang berita dan informasi, bagaimanapun nilai layanan elektronik rendah menyediakan bukti komunikasi satu arah. implementasi pemerintah mobile di indonesia sepertinya masih berada di tahap pertama. kebanyakan juga hanya bersifat memberikan informasi saja. direkomendasikan lebih lanjut untuk memcapai tingkat transaksi dimana semua layanan sudah terintegrasi"
Kementerian Komunikasi dan Informasi Ri, 2015
384 JPPKI 6:2 (2015)
Artikel Jurnal  Universitas Indonesia Library
cover
"Over the last decade, mobile telecommunications has grown dramatically, from a niche technology to a massive industry. As the mobile phone becomes ubiquitous and the divisions between PCs, personal digital assistants, mobiles phones and other mobile devices becomes blurred, the security both of the information handled by these devices and the devices themselves becomes increasingly important. The book consists of 17 chapters covering current developments in security for mobility; underlying technologies; network security; mobile code issues; application security; and the future."
London: Institution of Engineering and Technology, 2009
e20452642
eBooks  Universitas Indonesia Library
cover
Rahmadi Kurnia
Depok: Fakultas Teknik Universitas Indonesia, 1995
S38549
UI - Skripsi Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>