Academic literature on the topic 'Bloco Ubuntu'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Bloco Ubuntu.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Bloco Ubuntu"

1

Syahputra, Edy Rahman, Boni Oktaviana Sembing, Arie Rafika Dewi, H. Hasdiana, and Halim Maulana. "Ads Block Management System Using Open Virtual Private Network on Ubuntu Operating System." International Journal of Engineering & Technology 7, no. 2.5 (2018): 58. http://dx.doi.org/10.14419/ijet.v7i2.5.13951.

Full text
Abstract:
In internet, an ad is something that able to be avoided when opening a web page. At this time many internet based businesses rely on advertising for their income. However, users are dissatisfied with the presence of ads on websites they visit, since the size of the ad data is often proportional to the actual content ads. This impacts not only on loading web pages and may lead to a file that may potentially be a carrier of the virus and may damage the operating system of the visitor. A system that can overcome the annoying ads will be needed by the user for the convenience of users in using the
APA, Harvard, Vancouver, ISO, and other styles
2

Akbar, Lalu A. Syamsul Irfan, Rayasa Puringgar Prasadha Putra, and Suthami Ariessaputra. "WEBSITE INTERFACE MONITORING CLIENT ACTIVITIES USING MIKROTIK ON UBUNTU SERVER 18.04 LTS." DIELEKTRIKA 10, no. 1 (2023): 41–51. http://dx.doi.org/10.29303/dielektrika.v10i1.332.

Full text
Abstract:
Internet network is beneficial to be able to support the needs of the learning process. However, a large number of internet users, for example, who access university data, can cause weaknesses in a system, making it very vulnerable to data theft, damage, and leakage of confidential documents. The obstacle faced is that the internet is getting slower due to many users using the internet network and not knowing the amount of bandwidth usage. A system is needed to determine the bandwidth usage for each client. This system To simplify the process of monitoring the internet network. It can view cli
APA, Harvard, Vancouver, ISO, and other styles
3

Schutte, Flip, and Emetia Swart. "THE NEW KID ON THE BLOCK TAKES US TO THE FIFTH INDUSTRIAL REVOLUTION." International Journal of Professional Business Review 10, no. 2 (2025): e04937. https://doi.org/10.26668/businessreview/2025.v10i2.4937.

Full text
Abstract:
Objectives: Conscious leadership is an emerging field in leadership theory that focuses on the integration of spiritual, emotional, and physical intelligence, as well as sustainability and ecological concerns. This article presents a literature review aiming to establish a solid foundation for understanding conscious leadership and to contribute to theory development in this area. The research question asked was if a conscious leadership style will be able to lead organisations in the Fifth Industrial Revolution. Theoretical Frameworks: The study examines the current debates among scholars reg
APA, Harvard, Vancouver, ISO, and other styles
4

Wuryani, Ruruh, Indah Fenriana, Dicky Surya Dwi Putra, Desiyanna Lasut, and Susanto Hariyanto. "Network Security Analysis with SnortIDS Using ACID (Analysis Console for Intrusion Databases." bit-Tech 5, no. 3 (2023): 145–54. http://dx.doi.org/10.32877/bt.v5i3.728.

Full text
Abstract:
The use of Wi-Fi and Ethernet is increasing in today's computer networks due to the advancement of technology. The development of networks today is characterized by the need for low-latency and high-bandwidth technology. The technology has also introduced 5G and Wi-Fi 6 which support high-speed internet surfing. The introduction of Network File System (NFS) in this era sparked the demand for Ethernet. NFS also increased the use of UNIX in education and professional computing in the 1980s. Then, in 1982, Token Ring Topology emerged as an alternative to the internet and was only standardized in
APA, Harvard, Vancouver, ISO, and other styles
5

Dewantara, Rizki, Siska Iskandar, and Agung Fatwanto. "Availability Analysis with Failover Computer Cluster Method Case Study in Academic Information System of UIN Sunan Kalijaga." IJID (International Journal on Informatics for Development) 6, no. 2 (2018): 24. http://dx.doi.org/10.14421/ijid.2017.06205.

Full text
Abstract:
High-performance academic information systems and high availability services are requirement in every university. One of many reasons is for anticipation damage and fail server disrupting server network performance. Failover computer cluster method is applied to two servers: primary server as main server and secondary server as backup server. Four stages will be carried out: First: Installation and support software configuration. Second: installation and failover cluster configuration. Third: installation and Distributed Replicated Block Devices (DRBD) configuration. Forth: server testing with
APA, Harvard, Vancouver, ISO, and other styles
6

Sheybani, Ehsan, and Giti Javidi. "Integrating Software Defined Radio with USRP." International Journal of Interdisciplinary Telecommunications and Networking 9, no. 3 (2017): 1–9. http://dx.doi.org/10.4018/ijitn.2017070101.

Full text
Abstract:
The USRP1 is the original Universal Software Radio Peripheral hardware (USRP) that provides entry-level RF processing capability. Its primary purpose is to provide flexible software defined radio development capability at a low price. You can control the frequency you receive and transmit by installing different daughter-boards. The authors' USRP model had been configured to receive a signal from local radio stations in the DC, Maryland metropolitan area with the BasicRX model daughterboard. The programmable USRP was running python block code implemented in the GNU Radio Companion (GRC) on Ubu
APA, Harvard, Vancouver, ISO, and other styles
7

Majid, Jalal Sami. "Building A Firewall And Intrusion Detection System Dased Network Security System Using Opnsense Tools." Iraqi Journal of Intelligent Computing and Informatics (IJICI) 4, no. 1 (2025): 66–76. https://doi.org/10.52940/ijici.v4i1.96.

Full text
Abstract:
Computer networks are a crucial element in the evolution of information technology, because all aspects in the realm of information technology require computer networks as a medium of communication between users of the technology. OPNSense will act as a link between the internet and the Ubuntu client, which will serve as a firewall and Detection Instruction System (IDS) provider. Implementing a Firewall and Intrusion Detection System (IDS) with OPNSense Tools can be an effective solution for server security and preventing unauthorised attacks. During scanning, DDOS testing, and sniffing, the s
APA, Harvard, Vancouver, ISO, and other styles
8

Listyawati, Ni Made Meliana, Adityas Widjajarto, and M. Teguh Kurniawan. "Implementasi dan Analisis Profil Sistem Pada Virtualisasi Paloalto Firewall Berdasarkan Metrik Sumber Daya Komputasi." Jurnal Sistem Komputer dan Informatika (JSON) 4, no. 1 (2022): 112. http://dx.doi.org/10.30865/json.v4i1.4780.

Full text
Abstract:
On the security aspect, it is necessary to know how effectively a firewall can protect network devices from DDoS attacks. The characteristics of a firewall have different functions in protecting the system from various external attacks that can attack and retrieve data. In this research, the implementation of Paloalto firewall virtualization aims to obtain the system profile function on the firewall based on the use of computing resources. Profiling of the firewall system of this experiment based on the consumption of computing resources in load testing. This experiment used a DDoS SYN flood a
APA, Harvard, Vancouver, ISO, and other styles
9

Okindo, Geoffrey, Prof George Kamucha, and Dr Nicholas Oyie. "Dynamic Optimization in 5G Network Slices: A Comparative Study of Whale Optimization, Particle Swarm Optimization, and Genetic Algorithm." International Journal of Electrical and Electronics Research 12, no. 3 (2024): 849–62. http://dx.doi.org/10.37391/ijeer.120316.

Full text
Abstract:
This study presents a comprehensive framework for optimizing 5G network slices using metaheuristic algorithms, focusing on Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low-Latency Communications (URLLC), and massive Machine Type Communications (mMTC) scenarios. The initial setup involves a MATLAB-based 5G New Radio (NR) Physical Downlink Shared Channel (PDSCH) simulation and OpenAir-Interface (OAI) 5G network testbed, utilizing Ubuntu 22.04 Long Term Support (LTS), MicroStack, Open-Source MANO (OSM), and k3OS to create a versatile testing environment. Key network parameters are identified
APA, Harvard, Vancouver, ISO, and other styles
10

Nugroho, Dyakso Anindito, Adian Fatchur Rochim, and Eko Didik Widianto. "Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro." Jurnal Teknologi dan Sistem Komputer 3, no. 2 (2015): 171. http://dx.doi.org/10.14710/jtsiskom.3.2.2015.171-178.

Full text
Abstract:
The use of information technology gives the advantage of open access for its users, but a new problem arises that there is a threat from unauthorized users. Intrusion Detection System (IDS) is applied to assist administrator to monitoring network security. IDS displays illegal access information in a raw form which is require more time to read the detected threats. This final project aims to design an IDS with web application which is made for pulling information on IDS sensor database, then processing and representing them in tables and graphs that are easy to understand. The web application
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Bloco Ubuntu"

1

"As ‘nagôs’ estão na rua com prazer e alegria": Uma cartografia afro-baiana de Belmonte (Bahia). EDITUS, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Bloco Ubuntu"

1

Sheybani, Ehsan. "Universal Software Radio Peripheral/GNU Radio-Based Implementation of a Software-Defined Radio Communication System." In Strategic Innovations and Interdisciplinary Perspectives in Telecommunications and Networking. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8188-8.ch012.

Full text
Abstract:
Challenges involved in space communications across wireless channels call for new approaches to radio systems. Due to the growing need for frequency change in modern wireless systems, an adaptive radio system has the highest demand. Software-defined radios (SDR) offer this type of adaptivity as well as compatibility with other standard platforms such as USRP/GNU radio. Despite limitations of this approach due to hardware components, viable modeling and simulation as well as deployable systems are possible using this platform. This chapter presents a detailed implementation procedure for a USRP
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!