Browsing by Author "Zulpratita, Ulil Surtia"
Now showing 1 - 6 of 6
Results Per Page
Sort Options
- ItemTHE EFFECTIVENESS OF THE BRUTE FORCE ALGORITHM FOR PASSWORDS RECOVERY(International Journal of Psychosocial Rehabilitation, Vol.24, Issue 02, 2020) Sulianta, Feri; Zulpratita, Ulil Surtia; Rosita, AiSecurity problems, password theft, phishing websites, crackers, hacking threaten information ownership. Moreover, passwords with minimal durability which is considered as weak passwords become easy targets for crackers. There are so many method used to break the password for recovery lost. Every method has advantage and disadvantage, which is depend on condition and situation, including the characteristic of the password which is need to recover. Brute force is one of the oldest method to recover password, and still be used to recover the password for specific needs. In this research, the Brute Force method will be introduced as a method of recovering and breaking passwords. This method is easy to use in guessing passwords even though it takes longer because it is done by tapping a number of keywords. Thus computer users are more concerned about maintaining the confidentiality of passwords so as not to be easily broken down by others, because with a short time the password can be broken.
- ItemINFORMATION SYSTEM SECURITY ANALYSIS AT PT. TELKOM USING KAMI INDEX(International Journal of Psychosocial Rehabilitation, Vol.24, Issue 02, 2020) Yuliani, SY; Heryono, Heri; Rosita, Ai; Zulpratita, Ulil Surtia; Angga Laksana, Eka; Sulianta, Feriby the development of information technology, it provides convenience way for every individual or institution to perform its duties and functions. Information security used by institutions must be maintained, yet they can manage and further they can avoid failure. Therefore it is important to assess the relevant institutions to determine the level of maturity and completeness of information security. The assessment carried out was by using the Information Security Index (KAMI) issued by the Ministry of Communication and Information that has fulfilled the requirements and aspects of information security that refer to ISO 27001. Currently, PT Telekomunikasi Indonesia (TELKOM) has implemented information technology. At PT TELKOM there are well-implemented access controls including security or supervision of important work locations (server room, archive space); only employees are given a username and password to access it and also have implemented security to detect and prevent network access usage (including network wireless).
- ItemLEVERAGING AI TO FIGHT AGAINST PANDEMIC(Solid State Technology Volume: 63 Issue: 3, 2020) Zulpratita, Ulil SurtiaIn the course of recent months, the world has encountered a progression of COVID-19 flare-ups that have by and large followed a similar pathway: an underlying stage with not many diseases and restricted reaction, trailed by a remove from the popular pestilence bend joined by a nationwide lockdown to level the bend. All through the pandemic, incredible accentuation has been set on the sharing (or absence of it) of basic data across nations about the spread of the ailment. On the other hand, generally little has been said about how COVID-19 could have been exceptional overseen by utilizing the serious information advancements that have changed business in recent years. Desires are high for AI to help battle COVID-19. Be that as it may, before AI instruments can have an effect, worldwide coordinated effort and great information and model sharing are required. AI companies around the globe have been hustling to grow new instruments that can be utilized to arm ourselves against the novel Covid-19, and limit the general interruption that it will cause.
- ItemLIFI AS AN ADDITIVE 5G BRIGHT FUTURE(International Journal of Psychosocial Rehabilitation, Vol. 24, Issue 2, 2020) Zulpratita, Ulil Surtia; Falahah5G isn't only the following change of 4G innovation; it's another age. The quantity of portable web - associated gadget is developing quick, it is anticipated to essentially increment as the Internet of Things become a reality. The quantity of cell IoT develops from 5 billion to more than 20 billion by 2020. This development will proceed. It is, thusly, unavoidable that other range than the RF range must be utilized for future remote correspondence frameworks. Utilizing light to transmit information is the same old thing. LiFi is a remote correspondence innovation that uses the infrared and noticeable light range for fast information correspondence. LiFi alludes to the fast, bidirectional and arranged remote interchanges utilizing light to give a consistent remote client experience a lot of like conventional portable correspondences. It's similar to WiFi yet has arrived at speeds multiple times quicker in testing, making it undeniably increasingly fit to the requests of things to come of information. LiFi isn't relied upon to totally supplant Wi-Fi, however the two advances could be utilized correspondingly to make increasingly productive, green and futur-confirmation get to systems.
- ItemPREPARATORY DOCUMENT STRUCTURING TECHNIQUE(International Journal of Psychosocial Rehabilitation, Vol.24, Issue 02, 2020) Puspitarani, Yan; Zulpratita, Ulil SurtiaThe need for mining structured data has increased in the past few years. This structured data is used as input for data mining tasks. Text mining is part of data mining where the data used is in the form of unstructured text. Text mining can able to handle unstructured or semi-structured data sets such as emails HTML files and full text documents etc. The unstructured data usually refers to information that does not reside in a traditional row-column database and it is the opposite of structured data. In order to extract information from text, preprocessing steps are needed. This paper discussed about the theoretical basis of preprocessing document for Text Mining. Brief descriptions of some representative approaches such as NLP tasks and Information extraction are provided as well.
- ItemSYNTAX ERROR ON WRITTEN LANGUAGE IN BIPA PROGRAM: A Study on Cambodian Students at Widyatama University Bandung, Indonesia(International Journal of Psychosocial Rehabilitation, Vol.24, Issue 02, 2020) Heryono, Heri; Zulpratita, Ulil Surtia; Yuliani, Sy; Rosita, AiBahasa Indonesia becomes one of the most favored language for foreigner, especially in Asia. Though the language has the similar root as Malay, Singapore and several South-east Asian countries, Indonesia attracts more to the foreigners within some reasons. The study of Bahasa Indonesia for foreigners is called BIPA, Bahasa Indonesia untuk Penutur Asing. This program has continually developed since the beginning of its appearance. Foreigners who come to Indonesia in various purposes, as traveling, business or even study in some institutions. One of the institution which accepted foreigners as their student was Widyatama University Bandung. They collaborated with NPIC (National Polytechnic Institute of Cambodia) to have a join degree program in 2017 (batch I) and in 2018 (batch II). Students tended to make some mistakes in learning process. The errors were attributable to their native language (Khmer) which was basically different with Bahasa Indonesia. During the learning process in BIPA Program, syntax error occurred especially in written language when they sent information through social media (instant messaging), such as WhatsApp or Line. The research was conducted in Widyatama University during a four-month-program. The research focused only in Syntax level and This study was qualitative research in the form of case study.