Academic literature on the topic 'Bloco Ubuntu'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Bloco Ubuntu.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Bloco Ubuntu"

1

Syahputra, Edy Rahman, Boni Oktaviana Sembing, Arie Rafika Dewi, H. Hasdiana, and Halim Maulana. "Ads Block Management System Using Open Virtual Private Network on Ubuntu Operating System." International Journal of Engineering & Technology 7, no. 2.5 (March 10, 2018): 58. http://dx.doi.org/10.14419/ijet.v7i2.5.13951.

Full text
Abstract:
In internet, an ad is something that able to be avoided when opening a web page. At this time many internet based businesses rely on advertising for their income. However, users are dissatisfied with the presence of ads on websites they visit, since the size of the ad data is often proportional to the actual content ads. This impacts not only on loading web pages and may lead to a file that may potentially be a carrier of the virus and may damage the operating system of the visitor. A system that can overcome the annoying ads will be needed by the user for the convenience of users in using the internet media. To overcome this will be built a system using the pi-hole and Ubuntu operating system
APA, Harvard, Vancouver, ISO, and other styles
2

Akbar, Lalu A. Syamsul Irfan, Rayasa Puringgar Prasadha Putra, and Suthami Ariessaputra. "WEBSITE INTERFACE MONITORING CLIENT ACTIVITIES USING MIKROTIK ON UBUNTU SERVER 18.04 LTS." DIELEKTRIKA 10, no. 1 (February 28, 2023): 41–51. http://dx.doi.org/10.29303/dielektrika.v10i1.332.

Full text
Abstract:
Internet network is beneficial to be able to support the needs of the learning process. However, a large number of internet users, for example, who access university data, can cause weaknesses in a system, making it very vulnerable to data theft, damage, and leakage of confidential documents. The obstacle faced is that the internet is getting slower due to many users using the internet network and not knowing the amount of bandwidth usage. A system is needed to determine the bandwidth usage for each client. This system To simplify the process of monitoring the internet network. It can view client browsing history and block website domains so that internet users in the world of education have positive characteristics and the internet is not slow. In this system, the admin will monitor the use of internet clients connected to the campus environment through the user name and password obtained for each student. The results of this research are the creation of an internet monitoring system for a proxy to monitor the maximum amount of bandwidth usage for each client, view the client's browsing history, and block website domains and client IPs. The admin can observe the internet network and monitor client activity that uses the internet network in the campus environment using the monitoring application.
APA, Harvard, Vancouver, ISO, and other styles
3

Wuryani, Ruruh, Indah Fenriana, Dicky Surya Dwi Putra, Desiyanna Lasut, and Susanto Hariyanto. "Network Security Analysis with SnortIDS Using ACID (Analysis Console for Intrusion Databases." bit-Tech 5, no. 3 (April 28, 2023): 145–54. http://dx.doi.org/10.32877/bt.v5i3.728.

Full text
Abstract:
The use of Wi-Fi and Ethernet is increasing in today's computer networks due to the advancement of technology. The development of networks today is characterized by the need for low-latency and high-bandwidth technology. The technology has also introduced 5G and Wi-Fi 6 which support high-speed internet surfing. The introduction of Network File System (NFS) in this era sparked the demand for Ethernet. NFS also increased the use of UNIX in education and professional computing in the 1980s. Then, in 1982, Token Ring Topology emerged as an alternative to the internet and was only standardized in 1985. Network security is an important factor in ensuring data is not stolen or damaged. With the increasing knowledge of hacking and cracking, and the availability of tools that can be easily used to launch attacks or intrusions, it is important to investigate when an attack occurs. One network forensic method for monitoring attacks on the network is using Snort IDS and Ntop to facilitate the logging process for monitoring the network system. Based on the results obtained from designing a network security with Snort Intrusion Detection System (IDS) using ACID (Analysis Console for Intrusion Databases) with the utilization of IPTables on Ubuntu Server can stop attackers. In this research, the researcher used IPTables on Ubuntu as a firewall to anticipate attacks. To prevent port scanning attacks conducted by the attacker, the author created a firewall using IPTables where the IPTables rules aim to block the IP address of the attacker.
APA, Harvard, Vancouver, ISO, and other styles
4

Dewantara, Rizki, Siska Iskandar, and Agung Fatwanto. "Availability Analysis with Failover Computer Cluster Method Case Study in Academic Information System of UIN Sunan Kalijaga." IJID (International Journal on Informatics for Development) 6, no. 2 (November 28, 2018): 24. http://dx.doi.org/10.14421/ijid.2017.06205.

Full text
Abstract:
High-performance academic information systems and high availability services are requirement in every university. One of many reasons is for anticipation damage and fail server disrupting server network performance. Failover computer cluster method is applied to two servers: primary server as main server and secondary server as backup server. Four stages will be carried out: First: Installation and support software configuration. Second: installation and failover cluster configuration. Third: installation and Distributed Replicated Block Devices (DRBD) configuration. Forth: server testing with siege and nettool.This research conducted by doing server test before and after high availability. As if the main server has a system failure, it will automatically backup the main server to backup server to minimize user accessed data failures. System uses Ubuntu 16.04 LTS operating system. Based on the test data, it is acquired two data: packet data and data response time (ms). Data packets acquired from this research are: 233.3 average data sent; 228.3 average data received; 2.3 average data lost; while 59.7 average response time (ms) is showed; 2.7 minimum average; 633.8 maximum average. Data sent is 120B per data.
APA, Harvard, Vancouver, ISO, and other styles
5

Sheybani, Ehsan, and Giti Javidi. "Integrating Software Defined Radio with USRP." International Journal of Interdisciplinary Telecommunications and Networking 9, no. 3 (July 2017): 1–9. http://dx.doi.org/10.4018/ijitn.2017070101.

Full text
Abstract:
The USRP1 is the original Universal Software Radio Peripheral hardware (USRP) that provides entry-level RF processing capability. Its primary purpose is to provide flexible software defined radio development capability at a low price. You can control the frequency you receive and transmit by installing different daughter-boards. The authors' USRP model had been configured to receive a signal from local radio stations in the DC, Maryland metropolitan area with the BasicRX model daughterboard. The programmable USRP was running python block code implemented in the GNU Radio Companion (GRC) on Ubuntu OS. With proper parameters and sinks the authors were able to tune into the radio signal, record the signal and extract the in-phase (I) and quadrature phase (Q) data and plot the phase and magnitude of the signal. Using the terminal along with proper MATLAB and Octave code, they were able to read the I/Q data and look at the Fast Fourier Transform (FFT) plot along with the I/Q data. With the proper equations, you could determine not only the direction of arrival, but one would also be able to calculate the distance from the receiver to the exact location where the signal is being transmitted. The purpose of doing this experiment was to gain experience in signal processing and receive hands on experience with the USRP and potentially add a tracking system to the authors' model for further experiments.
APA, Harvard, Vancouver, ISO, and other styles
6

Listyawati, Ni Made Meliana, Adityas Widjajarto, and M. Teguh Kurniawan. "Implementasi dan Analisis Profil Sistem Pada Virtualisasi Paloalto Firewall Berdasarkan Metrik Sumber Daya Komputasi." Jurnal Sistem Komputer dan Informatika (JSON) 4, no. 1 (September 30, 2022): 112. http://dx.doi.org/10.30865/json.v4i1.4780.

Full text
Abstract:
On the security aspect, it is necessary to know how effectively a firewall can protect network devices from DDoS attacks. The characteristics of a firewall have different functions in protecting the system from various external attacks that can attack and retrieve data. In this research, the implementation of Paloalto firewall virtualization aims to obtain the system profile function on the firewall based on the use of computing resources. Profiling of the firewall system of this experiment based on the consumption of computing resources in load testing. This experiment used a DDoS SYN flood attack on Kali Linux as an attacker and a virtualization Paloalto firewall that protects a web server on Ubuntu Server as an attack target. This research distinguished based on two test scenarios, namely based on testing the service HTTP allow and service HTTP block with Paloalto memory specifications at RAM 5.5 GB and RAM 8 GB specifications. Measurements were made based on computing resources on CPU, memory, and a session focused on before, during, and after DDoS SYN flood attacks. The pattern of usage of computing resources tends to be linear when a DDoS SYN flood attack occurs. The experimental results obtained on the highest use of computing resources during the attack were CPU usage with an average percentage of 95.8% and the second increase was in memory usage with an average percentage of 44%, and the session usage was 138682. For further research, it can use variations of DDoS attacks to get a wider profile.
APA, Harvard, Vancouver, ISO, and other styles
7

Nugroho, Dyakso Anindito, Adian Fatchur Rochim, and Eko Didik Widianto. "Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro." Jurnal Teknologi dan Sistem Komputer 3, no. 2 (April 20, 2015): 171. http://dx.doi.org/10.14710/jtsiskom.3.2.2015.171-178.

Full text
Abstract:
The use of information technology gives the advantage of open access for its users, but a new problem arises that there is a threat from unauthorized users. Intrusion Detection System (IDS) is applied to assist administrator to monitoring network security. IDS displays illegal access information in a raw form which is require more time to read the detected threats. This final project aims to design an IDS with web application which is made for pulling information on IDS sensor database, then processing and representing them in tables and graphs that are easy to understand. The web application also has IpTables firewall module to block attacker's IP address. The hardware used is Cisco IPS 4240, two computers Compaq Presario 4010F as client and gateway, and Cisco Catalyst 2960 switch. The software used is Ubuntu 12.0 LTS Precise operating system, BackTrack 5 R1 operating system, PHP 5.4 programming language, MySQL 5 database, and web-based system configuration tool Webmin. Testing is done using several BackTrack applications with the aim of Cisco IPS 4240 is capable of detecting accordance with the applicable rules. Each events of any attack attempt or threat was obtained from IDS sensor database in XML form. XML file is sent using Security Device Event Exchange (SDEE) protocol. The web application is tested by looking at the output tables and graphs that displays the appropriate results of sensor detection. This study generated an intrusion detection system that is easier to monitor. Network packets copied by the Cisco 2960 switch and then forwarded to the sensor. Intruder detection is done by Cisco IPS 4240 sensor. Log detection processed by the web application into tables and graphs. Intrusion detection systems are intended to improve network security.
APA, Harvard, Vancouver, ISO, and other styles
8

Javidi, Giti, and Ehsan Sheybani. "Application of Digital Signal Processing in USRP Satellite Signal Detection." International Journal of Interdisciplinary Telecommunications and Networking 9, no. 2 (April 2017): 16–25. http://dx.doi.org/10.4018/ijitn.2017040102.

Full text
Abstract:
The Universal Software Radio Peripheral development technique is designing and implementing radio frequency based systems. The distinctiveness originates from the interchangeable daughterboard within the USRP. The system is designed around the Xilinx Vertex 3 FPGA chip. This means C++, Python, and VHDL can be used to program this device. The project consists of creating a receiver. The objective of the project is to research and comprehend the hardware functionalities of the USRP. The purpose is to create codes in C++ and Python to implement receiving capabilities of the device. The goal of this project was to design a GPS receiver that is capable of recording the L1 signal from a DirecTV satellite. The USRP is used a lot for research. This project consisted of more than just one method. We used GNU Radio Companion and Matlab/Simulink. GNU Radio is open source for building software defined radios. It is also known as GRC. While using GRC the USRP1 was the device used. This software has rapid development. It runs in Ubuntu, a Linux operating system. Within this software there are logic blocks. Each block consists of information to create a flow graph. The flow graph builds and generates the program. Simulink can be compared to GRC. They both have logic blocks that have to be connected to run. Simulink can be used to create a transmitter or a receiver for software radio development and signal processing. Software-defined radio can only be defined if its baseband operations can be completely defined by software. A SDR converts digital to analog signals. The USRP can also convert digital signals from a computer to Radio Frequency Signals (RF). This software is one way to communicate between hardware and software.
APA, Harvard, Vancouver, ISO, and other styles
9

Salim, Muhammad Ade, Muhammad Nur Ihsan, Nur Isnaini, and Trinil Susilawati. "Kualitas Semen Cair Kambing Boer Berbahan Pengencer Air Kelapa Muda Varietas Viridis Setelah Simpan Dingin." Jurnal Ilmu dan Teknologi Peternakan Tropis 6, no. 1 (January 21, 2019): 78. http://dx.doi.org/10.33772/jitro.v6i1.5449.

Full text
Abstract:
ABSTRAKAir kelapa muda varietas viridisdapat dijadikan pengencer aletrnatif semen cair bagi program IB di daerah minim sarana semen beku. Tujuan penelitian ini untuk menguji pengaruh penggunaan air kelapa muda viridissebagai bahan pengencer terhadap kualitas semen cair kambing Boer setelah didinginkan. Dilaksanakanselama 3 bulan di Laboratorium Fakultas Peternakan UBUnit SumberSekar,Malang. Metodenya yaitu eksperimen. Semen dari 3 pejantan Boer umur 3-5 tahun, dikoleksi seminggu sekali dengan VB. Air kelapa mudaviridis umur 5-7 bulan serta tris aminomethane sebagai kontrol. Didesain menggunakan Rancangan Acak Kelompok (RAK) dengan 2 perlakuan yaitu P0 (tris aminomethane + 10% KT) dan P1 (air kelapa muda viridis + 10% KT) masing-masing diulang 10 kali. Data dianalisis dengan analisis Ragam (Anova) dengan software Genstat 18. Variabelnya yaitu motilitas individu, viabilitas dan abnormalitas. Hasil penelitian yaitu motilitas individu pada P1bertahan sampai 4 hari (40,5± 24,3%), viabilitas terbaik sampai hari ke-5 (42±24,6%), abnormalitas terendah di hari ke-7(1,31± 0,6). Kesimpulannya, Pengencer air kelapa muda viridis dapat mempertahankan kualitas semen cair kambing Boer selama 4 hari untuk motilitas dan 5 hari untuk viabilitas.Kata Kunci:pengencer, air kelapa, varietas viridisABSTRACTYoung viridis coconut water could be used as an alternative to liquid semen diluent for artificial insemination program in the area with limited facility for frozen semen production. This study evaluated the use of young coconut water as a diluent on liquid semen quality of Boer goat after cold storage. This study was carried out for 3 months at Sumber Sekar Laboratory, Faculty of Animal Husbandry, University of Brawijaya, Malang. The semen was collected from 3 Boer bucks aged at 3 to 5 years old. The semen collection was done once a week with the aid of artificial vagina. The diluents used were young Viridis coconut (5 to 7 months old) and tris aminomethane. The method used was an experiment in a randomized block design with 2 treatments and 10 replicates. The treatments used were T0: tris aminomethane + 10% egg yolk (control) and T1: young Viridis coconut water + 10% egg yolk. Data were analyzed by analysis of variance using Genstat 18 software. The variables measured were sperm individual motility, viability, and abnormality. The results showed that the sperm individual motility in T1 survived up to 4 days (40.5± 24.3%), the best viability at 5 days (42.0±24.6%), while the lowest abnormality at 7 days (1.31±0.6). It could be concluded that: 1. Tris aminomethane diluent has higher quality with the storage length up to 9 days, 2. Young Viridis coconut water diluent could preserve liquid semen quality of Boer goat up to 4 days for sperm motility and 5 days for sperm viability.Keywords: diluents, coconut water, viridis variety
APA, Harvard, Vancouver, ISO, and other styles
10

Yahya, Zahraa M., and Mohammed F. Al-Gailani. "Secure Data Delivery in a Software-Defined Wireless Body Area Network." Journal of Telecommunications and Information Technology, April 17, 2024, 41–47. http://dx.doi.org/10.26636/jtit.2024.2.1491.

Full text
Abstract:
High security solutions are highly important in wireless medical environments, since patient data is confidential, sensitive and must be transmitted over a secure connection. Accordingly, a hybrid encryption method is proposed to ensure data confidentiality (RSA-2048 for key exchange using ACL in SDN with the addition of AES-256-CTR and a hashed secret key for data encryption), and the encrypted data is stored in a private blockchain with the DBFT consensus algorithm to ensure the integrity of data before it being accessed by a doctor's application which decrypts and displays the relevant information. The system was programmed using Python, in an NS3.37 simulator installed on Ubuntu with a MySQL database created using the Apache XAMPP. The product turned out to be a highly secure system for transmitting data from a medical sensor to the doctor's application, offering a throughput of approximately 9 Gbps for both encryption and decryption tasks, while the processing time equaled 0.014 µs per a 128-bit block size for both encryption and decryption, with latency amounting to 0.14 s per 1 KB of data, and the blockchain agreement time equaling 4 ms per 1 KB.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Bloco Ubuntu"

1

"As ‘nagôs’ estão na rua com prazer e alegria": Uma cartografia afro-baiana de Belmonte (Bahia). Ilhéus, Brasil: EDITUS, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Bloco Ubuntu"

1

Sheybani, Ehsan. "Universal Software Radio Peripheral/GNU Radio-Based Implementation of a Software-Defined Radio Communication System." In Strategic Innovations and Interdisciplinary Perspectives in Telecommunications and Networking, 227–40. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8188-8.ch012.

Full text
Abstract:
Challenges involved in space communications across wireless channels call for new approaches to radio systems. Due to the growing need for frequency change in modern wireless systems, an adaptive radio system has the highest demand. Software-defined radios (SDR) offer this type of adaptivity as well as compatibility with other standard platforms such as USRP/GNU radio. Despite limitations of this approach due to hardware components, viable modeling and simulation as well as deployable systems are possible using this platform. This chapter presents a detailed implementation procedure for a USRP/GNU radio-based SDR communication system that can be used for practical experiments as well as an academic lab in this field. In this experiment the USRP has been configured to receive signal from a local radio station using the BasicRX model daughterboard. The programmable USRP executes Python block code implemented in the GNU Radio Companion (GRC) on Ubuntu OS.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography