36 research outputs found

    PENDIDIKAN AKHLAK KEPADA ANAK DENGAN METODE HABITUASI

    Get PDF
    Moral education for children is very important because children are the next generation of religion, nation and state, imagine what a country would be like if its successor or leader does not have morals and morals, of course what happens is chaos in that country. Moral education for someone should be early because morality is the embodiment of personality that is nurtured from the beginning, fostering good moral character for children certainly starts from the smallest environment of his life, namely the family environment. But the problem that arises is how to educate children correctly and effectively, a term known in children's temperament is the tabula rasa expression which means the child is born like blank paper and innocently does not have any scribble at all that the child carries nothing when born, so this it is the duty of parents to direct their children to where they are going

    PENDIDIKAN AKHLAK KEPADA ANAK DENGAN METODE HABITUASI (Kajian Hadits Dalam Perspektif Psikologi)

    Get PDF
    Moral education for children is very important because children are the next generation of religion, nation and state, imagine how a country would become if its successor or leader does not have morals and morals, of course, what happens is chaos in that country. Moral education for someone should be early because morality is the embodiment of personality that is nurtured from the beginning, fostering good moral character for children certainly starts from the smallest environment of his life, namely the family environment. But the problem that arises is how to educate children correctly and effectively, a term known in children’s temperament is the tabula rasa expression which means the child is born like blank paper and innocently does not have any scribble at all that the child carries nothing when born, so this It is the duty of parents to direct their children to the right path or to the wrong road

    Inter-Domain Path Computation using Improved Crankback Signaling in Label Switched Networks

    Full text link
    The paper deals with the problem of finding suboptimal routing paths in multi-domain Internet environment. The proposed solution can be used in traffic enginering with MPLS

    Proof-of-communication-capability based authentication in blockchain-enabled wireless autonomous vehicular networks

    Get PDF
    Blockchain technology is finding applications in wireless networks, in particular vehicular networks, for the purposes of establishing trust. A certain set of network resources in terms of communication and computation requirements is also necessary for successful blockchain deployment. Moreover, heterogeneity in wireless networks and changing radio conditions at the physical layer, make it even more challenging to guarantee steady block generation latency. In this work, we study the possible denial of blockchain service attacks where malicious nodes threaten to slow down the block generation latency. We propose a novel Proof-of-Communication-Capability (PoCC) authentication framework that acts as a defense against communication capability spoofing over wireless networks. Our PoCC authentication framework utilizes physical properties such as distance between nodes, channel state information (CSI), and communication puzzle latency to establish the communication capabilities of nodes in the wireless network. Results from a simulated AV network under three different variations of the proposed PoCC framework are encouraging and demonstrate that such attacks can be effectively mitigated

    Energy level spoofing attacks and countermeasures in blockchain-enabled IoT

    Get PDF
    The Internet of Things (IoT) ecosystem is witnessing widespread deployments for emerging applications in diverse domains such as remote sensing, smart homes, and industry 4.0. There is also a growing need to secure such deployments against malicious IoT devices to sustain normal network operations. Since the IoT deployments encompass geographically distributed nodes, blockchain technology, which inherently offers distributed trust in such scenarios, is gaining popularity in providing a secure and trusted IoT deployment. In this paper, we present a use case in which an IoT deployment is retrofitted with a blockchain. The use of blockchain prevents malicious nodes from falsifying information about their energy levels. We first present attack scenarios where IoT nodes can spoof energy while joining or being a part of the network. We then build a defense strategy and evaluate its performance under various attack scenarios. Our results indicate that the IoT deployment is robust under the proposed defense strategy which can detect if a node is spoofing its energy levels over 75% of the time

    Diseminasi Informasi Terkait Metode Kontrasepsi Jangka Panjang pada Masyarakat Desa Bunut Baok, Lombok Tengah

    Get PDF
    Indonesia is the fourth most populous country in the world. In 2015, the population growth rate in West Nusa Tenggara is equal with national population growth rate, which is about 1.39%. The long-term contraceptive methods is one of the most effective family planning programs to succeed in controlling the population growth rate. The participation rate for the use of this contraceptive methods by fertile age couples in Bunut Baok village, Middle Lombok, is only about 10%. This was dissemination of information event aimed to disseminate the information regarding long-term contraceptive methods to Bunut Baok villagers, Middle of Lombok. This social event is part of the thematic Kuliah Kerja Nyata (KKN) programs of students of Universitas Mataram in the period of 2020 in Bunut Baok villagers attended by 59 Bunut Baok villagers as participants. In this event, pre-test and post-test were also conducted to evaluate the increase of their knowledge about long-term contraceptive methods. The participants had mean age of 36 years old, mostly female and had senior high school educational level. The mean of posttest scores was higher than the mean of pretest scores (88.54vs77.03; p = 0.000). These results indicated that this dissemination of information event increase the level of knowledge of Bunut Baok villagers related to the long-term contraceptive methods

    CSN: A Network Protocol for Serving Dynamic Queries in Large-Scale Wireless Sensor Networks

    No full text
    A fundamental problem that confronts future applications of sensor networks is how to efficiently locate the sensor node that stores a particular data item. It is known that distributed hash table (DHT) based Internet peer-topeer (P2P) protocols provide near-optimum data lookup times for queries made on networks of distributed nodes [2, 23-25]. A generic mapping of these protocols to sensor networks is, however, perceived as difficult [1]. We present a novel DHT based network protocol for sensor networks—Chord for Sensor Networks (CSN)—for which bounded times for data lookup, in the order of O(logN) messages, can be achieved in an energy efficient manner. CSN makes system lifetime of the sensor network proportional to its effective use. Furthermore, CSN scales well to large-scale sensor networks when the information about other nodes logarithmically increases with an increase in the number of sensor nodes. 1

    An energy-efficient node address naming scheme for wireless sensor networks

    No full text
    Abstract — In wireless sensor networks the small data rate, generally 16 bytes per packet, makes the overhead of globally unique network and MAC addresses, which is typically as much as the payload itself, undesirable [12]. We present a node address naming scheme that assigns locally unique addresses, which could be spatially reused, to nodes in an energy efficient manner and reduces the address size by a factor of 3.6. The focus of our work is solely on clustering routing approaches [8]. Further, we question the need of separate MAC and network addresses and show how our spatially reused locally unique node address could be used in both contexts, leading to greater energy efficiency. I
    corecore