2,077,869 research outputs found

    Success of Implementation of Computer Crime Act (UU Ite No.11 2008) (a Case Study in the Higher Education Institution in Indonesia)

    Full text link
    Computer crime rate grow rapidly along with the development of the digital world that has touched almost all aspects of human life. Institutions of higher education cannot be separated from the problem of computer crime activities. The paper analyses the implementation of Indonesia Computer Crime Act (UU ITE NO.11 2008) in the Higher Education Institution in Indonesia. It aims to investigate the level of computer crimes that occurred in the higher education institution environment and the act (UU ITE 11, 2008) successfully applied to prevent the crime that would arise. In this research, the analysis using Descriptive Statistics, Binary logistic regression. This paper also describes the success implementation of the Information System Security Policy (ISSP) as a computer crime prevention policy in higher education institution in Indonesia. In factor of act, clarity of objectives and purpose of the UU ITE 11, 2008 was low, the communication and socialization activities are still low to the society especially to the higher education institution, moreover the control process has been running on UU ITE 11, 2008, but at a low level

    Macaulay inverse systems revisited

    Get PDF
    Since its original publication in 1916 under the title "The Algebraic Theory of Modular Systems", the book by F. S. Macaulay has attracted a lot of scientists with a view towards pure mathematics (D. Eisenbud,...) or applications to control theory (U. Oberst,...).However, a carefull examination of the quotations clearly shows that people have hardly been looking at the last chapter dealing with the so-called "inverse systems", unless in very particular situations. The purpose of this paper is to provide for the first time the full explanation of this chapter within the framework of the formal theory of systems of partial differential equations (Spencer operator on sections, involution,...) and its algebraic counterpart now called "algebraic analysis" (commutative and homological algebra, differential modules,...). Many explicit examples are fully treated and hints are given towards the way to work out computer algebra packages.Comment: From a lecture at the International Conference : Application of Computer Algebra (ACA 2008) july 2008, RISC, LINZ, AUSTRI

    Using the PlayStation3 for speeding up metaheuristic optimization

    Get PDF
    Traditional computer software is written for serial computation. To solve an optimization problem, an algorithm or metaheuristic is constructed and implemented as a serial stream of instructions. These instructions are executed on a central processing unit (CPU) on one computer. Parallel computing uses multiple processing elements simultaneously to solve a problem. This is accomplished by breaking the problem into independent parts so that each processing element can execute its part of the algorithm simultaneously with the others. The processing elements can be diverse and include resources such as a single computer with multiple processors, several networked computers, specialized hardware, or any combination of the above. Today most commodity CPU designs include single instructions for some vector processing on multiple (vectorized) data sets, typically known as SIMD (Single Instruction, Multiple Data). Modern video game consoles and consumer computer-graphics hardware rely heavily on vector processing in their architecture. In 2000, IBM, Toshiba and Sony collaborated to create the Cell Broadband Engine (Cell BE), consisting of one traditional microprocessor (called the Power Processing Element or PPE) and eight SIMD co-processing units, or the so-called Synergistic Processor Elements (SPEs), which found use in the Sony PlayStation3 among other applications The computational power of the Cell BE orPlayStation3 can also be used for scientific computing. Examples and applications have been reported in e.g. Kurzak et al. (2008), Bader et al. (2008), Olivier et al. (2007), Petrini et al. (2007). In this work, the potential of using the PlayStation3 for speeding up metaheuristic optimization is investigated. More specifically, we propose an adaptation of an evolutionary algorithm with embedded simulation for inspection optimization, developed in Van Volsem et al. (2007), Van Volsem (2009a) and Van Volsem (2009b

    Preface

    Get PDF
    This special issue contains selected papers from the 18th European Symposium of Computer Aided Process Engineering (ESCAPE-18) which took place in Lyon, France, 1–4 June 2008. ESCAPE-18 was the 667th event of the European Federation of Chemical Engineering (EFCE) under responsibility of its CAPE Working Party. CAPE refers to computer aided methods, algorithms and techniques related to process and product engineering. The ESCAPE series brings the latest innovations and achievements by leading professionals from the industrial and academic communities. It serves as a forum for engineers, scientists, researchers, managers and students from academia and industry to present and discuss progress being made in the area of CAPE

    THE READINESS OF “CEN” (COMPUTER ENGINEERING AND NETWORKING)TEACHER IN TEACHING AND READINESS OF COMPUTER LABORATORY FACILITIES AND INFRASTRUCTURE IN SMKN 1 AND SMKN 2 IN BIMADISTRICT

    Get PDF
    The purpose of this study is to determine how the readiness of Computer Engineering and Networking teacher in teaching using the computer laboratory at SMKN 1 and SMKN 2 in Bima and to know the facilities and infrastructure at the Computer Laboratory at SMKN 1 and SMKN 2 in Bimaaccording to the standards required by the Minister of National Education of the Republic of Indonesia No. 40 of 2008. This study used quantitative descriptive methods. Descriptive methods used in earlier studies to collect data about the readiness of teachers and computer laboratory infrastructure conditions. This descriptive study aimed to obtain information about how the readiness of teachers to teach computer engineering and networking in a computer laboratory, and how the description of the feasibility of the SMKN 1 and SMKN 2 Bimacomputer laboratory. Data collection method used by questionnaire to determine the readiness of teachers, and a check list for the computer laboratory infrastructure. The instruments validation performed by expert judgment. The results of data were analyzed using a quantitative approach. After obtaining the results, then describe the conclusions based on the numbers processed with the statistical method. The results of this study obtained that the readiness of teachers to teach in SMKN 1Bima reached 88% with the excellentcategory. For SMKN 2 BIMA, the level of preparedness of teachers in teaching reached 77% with good category. While for readiness of facilities and infrastructure in the SMKN 1 Bimacomputer laboratoryclassified as excellent by achieving a score of 85.71% and SMAN I Bima reached 80.95% with good category. Keywords: Teacher CEN (Computer Engineering and Networking), Facilities, Infrastructure, Computer Laboratorys
    • …
    corecore