worm, Blaster. Based on the logs (host and networks), the traces of scan event shows the attribute of communication exist between the victim and attacker via Destination IP Address and Source IP Address respectively. Next, the destination port open responded is port 135 and the operation type (action) is OPEN-INBOUND (traffic is allowed in), whereas the connection request (protocol) is TCP (traffic packet is transmitted). The success of this event leads to the next event, exploit. In this event, the action continues with destination port open responded is 4444 and 69. If the port 4444 is exploited, the operation type (action) is OPEN- INBOUND and the connection request is TCP, then partial exploit is in place. Port 69 is also exploitable. If port 69 is exploited, the operation type (action) is OPEN (in/out communication is allowed) and the connection request is UDP (file is transmitted) which leads to vulnerable service (service) as TFTP (file transfer occurred). We consider the exploit is successful if both ports above are exploited. As the consequences of the scan and exploit event, the impact/effect incident occurred. This event consists of few attributes namely; a) offender identified (who is victim and attacker), b) a process created (traffic action) which reside at %WINDIR%\System32\tftp.exe, c) the service terminated is RPC, and d) malicious code transferred (file transmitted) is %WINDIR%\System32\msblast.exe. The above example describes that the traces belong to victim trace pattern. The example can also be represented as an algorithm depicted in Table 3.
A research done in  introduced a mapping process which occurs inside digitalforensicinvestigationprocess model. The mapping is formulated by grouping and merging the same activities or processes in five phases that provide the same output into an appropriate phase. From the analysis, most of the models consist of the critical phases which are Phase 2 – Collection and Preservation, Phase 3 – Examination and Analysis, and Phase 4 – Presentation and Reporting except Phase 1 and Phase 5. Even though, Phase 1 and Phase 5 are not included in some of the model reviewed, the study done by          indicate that both phases are important to ensure the completeness of the investigation. Phases 1 is to ensure the investigationprocess can start and run in the proper procedure, and protect the chain of evidence. While by eliminating Phase 5, it will lead to the possibility of the incomplete investigation and no improvement ininvestigation procedures or policies. Therefore, a good model should consist of all important phases; Preparation Phase, Collection and Preservation Phase, Examination and Analysis Phase, Presentation and Reporting, and Disseminating the case.
This modern future internet technology users is growing, this had a positive impact because it can facilitate the work of man but can negatively impact human development. one example is the negative impact of computer crimes are becoming more frequent. with the birth of information legislation electronic transactions hence the number 11 Year 2008 computer crime increasingly need to be considered so as not to cause problems for the community. in general computer crime must have died of digital evidence, and therefore require special skills to be able to analyze the digital evidence. Digital forensics is a branch of forensic science that is growing recently. one of the main tasks is finding and analysis of digital evidence. basically needed an operational standard when analyzing up to make a report to be given to the court. This report then that will be a consideration for the judge to sentence perpetrators of computer crime.
As an example, in the breeding unit, the data attribute among others were seeds ID, pond ID, provided feed mill supplier, pond water temperature, pH, water salinity etc (Table 4). After login into software application, users should inputting seed ID data, choose a pond ID, feed supplier ID and all of measured data during handling process. Another stakeholder would perform the same stages after handling process finished. The process is then continued by printing the report in the form of label contains barcode ID and and destination unit as product identification for the next handling process. The barcodes on the labels function as product identification that can be read using barcode scanner. Readable barcode labels subsequently can be added to the data on the next process. The barcode is printed back and imprinted on the next product label. A fragment on business process for barcode generate shown on Figure 11. For tracing purposes, it is essential to know the relationship between ingoing and outgoing idents of a relation type, in example knowing which shrimp batch or pond ID is inside a box of shrimp product (Hulzebos and Koenderink 2006). Business process for another stakeholder can be seen on Appendix 12-15. Table 4 Seed data documentation result on breeding farm
Network forensics is the process of capturing, recording, and analysis of network data traffic which lead to a security threats in computer networks . Meanwhile, according to Almulhem and Issa , network forensics is developing a network security model that focuses on the capture, recording, and analysis of network traffic for the purposes of investigation. The concept of network forensics deals with the data found in computer networks and Analysis of network traffic such as data logging via a firewall or intrusion detection systems on devices like routers. Network Forensic Analysis Tool is a tool used in this activity. The importance of this work is to present an overview of network forensics, covering tools, models and frameworks implementation process, which will be very useful for practitioners of network computer security Traceback process was conducted to determine the identity of the attacker in order to be used as a source of guidance on the investigationprocess. The increasing number of Internet users and the higher number of media crimes, the extraction traffic or efficiency in storage media is a must. Data were obtained from the data log as the activity history for each user then compressed using the WMH. After this compression process is completed, traceback analysis is then performed to obtain attacker profile, which is synchronized with the header as a provider of information a data packet.
Based on the analysis using BPMN 2.0, it is known that there were five stakeholders taking role intraceability system. The results of critical attribute determination by using relief method determined that water salinity parameter became critical attribute that requires documentation. The results of mathematic verification model show that the model used was able to produce the expected parameter according to its purpose. The rule of sorting method could show data sorting process. Search method also proved that it could be utilized for searching data location index. Similarity measurement shows that data attributed similar with standard process, thus the value almost 1
However in 2002,  proposed a framework called an abstract digital forensics framework based on DFRWS framework consists of eleven phases which are identification, preparation, approach strategy, preservation, collection, examination, analysis, presentation and returning evidence. Its does well at providing a general framework that can be applied to categorizing of incidents. This comprehensive process offers a number of advantages as listed by the authors such as mechanism for applying the same framework to future digital technologies. However this framework is open to at least one criticism where its third phase (the approach strategy) is to an extent a duplication of its second phase (the preparation phase). This is because at the time of responding to a notification of the incident, the identification of the appropriate procedure will likely entail the determination of techniques to be used.
Though to some researchers the digitalforensic is in- clusive of computer forensic, network forensic, software forensic and information forensic, but it is largely used interchangeably with computer forensic . Computer forensic implies a connection between computers, the scientific method, and crime detection. It includes de- vices other than general-purpose computer systems such as network devices, cell phones, and other devices with embedded systems. There are over hundreds of digitalforensicinvestigation procedures developed indigitalforensicinvestigation practices. An organization tends to develop its own procedures and some focused on the technology aspects such as data acquisition or data analy- sis . Most of these procedures were developed in tack- ling different technology used in the inspected device. As a result, when underlying technology of the target device changes, new procedures have to be developed. However, [7,8] stated that the process of the investigation should be incorporated with the basic procedures inforensic inves- tigation which are preparation, investigation and presen- tation. A categorization of investigationprocess was done in  to group and merge the similar activities or processes in five phases that provide the same output. The phases are: Phase 1 (Preparation), Phase 2 (Collec- tion and Preservation), Phase 3 (Examination and Analy- sis), Phase 4 (Presentation and Reporting), and Phase 5 (Disseminating the case). The researcher also proposed a mapping process of digitalforensicinvestigationprocess model to eliminate the redundancy of the processin- volved in the model and standardize the terms used in achieving the investigation goal.
Ambross, J.N. (2011). A Case Study of the Implementation of Science Process Skills for Grades 4 to 7 Learners in Natural Sciences in a South African Primary School . Johannesburg: Nelson Mandela Metropolitan University. Arikunto, S. (2011). Dasar-Dasar Evaluasi Pendidikan . Jakarta: Bumi Aksara. Ashkenazi, G & Zimrot, R. (2007). Interactive Lecture Demonstrations: A Tool
It function is sucking up water from the ground (ground water) to the Tubewell tank. It used one pump to operate this process. All water after sucking keeping in storage tank to avoid for any contaminations and chemical reaction. The tubewell capable to suck water 30m 3 /hour or 720m3/day. The capacity of is 3500L/ period. Equipment involved are Tubewells and
Berdasarkan pelaksanaan kegiatan pengabdian masyarakat ini telah didapatkan luaran seperti yang telah diinginkan. Hal ini bila dilihat dari hasil pemantauan dilapangan peserta kegiatan sudah sangat memperhatikan dari penggunaan es yang digunakan produknya. Selain itu juga ada beberapa upaya dari beberapa sektor yang akan membantu dalam proses pengawasan terhadap kesalahan penggunaan formalin pada produk perikanan. Walaupun masih harus perlu ada perbaikan secara terus menerus dalam menciptakan penerapan rantai dingin sesuai dengan konsep traceability yang baik dan benar yang dikarenakan masih kurangnya prasarana yang memadai. Dalam mendukung upaya kegiatan ini dalam jangka panjang juga telah dilakukan kerjasama jangka panjang dengan beberapa instansi terkait, antara lain : Kepala Unit Pelaksana Teknis (UPT) Pangkalan Pendaratan Ikan (PPI) dan PKPP Muara Angke, Kepala TPI Muara Angke, Kepala Kontak Tani Nelayan Andalan (KTNA) DKI Jakarta, Ketua Himpunan Nelayan Seluruh Indonesia (HNSI) DKI Jakarta, dan Kepala Dinas Perikanan dan Kelautan DKI Jakarta. Rekomendasi yang dikeluarkan untuk Dinas Perikanan dan Kelautan DKI Jakarta berupa penambahan prasarana untuk
At the first meeting of the learning process , students discussed the material is not too complicated . The material is made of mathematical models of matter relating to SPLDV . But students are not familiar investigation that resulted in the group stages appeared less committed student investigations . the class discussion there that gives suggestions and constructive example by comparing the mathematical models that they can . So that when discussed , of this material could have many forms of mathematical models . But there are students who are shy in asking questions and responses , so that the observer helps the students to dare to express their opinions . Moreover atmosphere class discussion went well , although less visible in answering questions kebersamaanya and time of presentation , there is still a member of the presenters are nervous speaking in front of each other so they told Kels told to answer questions from participants.
Enkripsi merupakan suatu ilmu seni didalam melakukan penyandian suatu pesan. Pesan yang sifatnya rahasia akan dirubah menjadi ciphertext dalam proses enkripsi yang bertujuan untuk mengacak plaintext sehingga sulit untuk dipahami makna dari pesan tersebut. Pada kriptografi menggunakan algoritma Triple DES untuk penyandian pesan aslinya menjadi ciphertext. Pesan ciphertext tersebut akan disisipkan atau disembunyikan kedalam sebuah media digital berupa file gambar dengan format .bmp. Penggunaan dengan gambar format .bmp karena sederhana, tidak dikompresi, sehingga setiap pixel menyatakan nilai keabuan secara langsung. Penggunaan metode Least Significant Bit (LSB) pada Steganografi digunakan untuk penanaman pesan kedalam sebuah citra gambar, dimana seluruh byte dari gambar akan dirumah menjadi bit dari suatu pesan rahasia. Hasil dari penelitian ini adalah rancangan dan desain awal dari aplikasi dan penerapan Algoritma Triple DES dan Least Significant Bit untuk penyembunyian pesan didalam sebuah media digital berupa gambar. Dengan begitu, hasil dari penelitian ini bisa digunakan untuk tahap berikutnya yaitu ketahap coding dan implementasi.
Abstract. One of the major drivers of cellular network evolution towards 5G systems is the communication between devices, also known as Machine-to-Machine (M2M) communications. M2M mobile connec- tions will reach an estimated 3.2 billion devices and connections by 2020, which will pose a challenge as the state-of-the-art cellular and wireless networks were designed keeping in mind Human-to-Human (H2H) com- munication. A massive amount of M2M devices create overload problems with a significant impact on the radio access and core network of the cellular system leading to what are known as the problems of RAN over- load and CN overload. The paper presents a proof-of-concept hardware implementation of novel resource allocation algorithms in 4G cellular communication systems. The proof-of-concept thus, will enable lab-scale analytical and experimental studies for validating theoretically developed algorithms with the focus being on validating the scheduling and admis- sion control algorithms for M2M scenarios. The platform will be based on an LTE-A eNodeB implemented using a software defined radio (SDR) platform and a UE simulator that enables simulating a large number of UEs sharing the same spectrum. The platform will be complemented by field-programmable gate array (FPGA) devices that enable the hard- ware implementation of the analytically developed resource allocation algorithms.
“APU provided me a fabulous platform to equip myself to enter the industrial world, from organizing various engineering events to managing a team. Studying at Asia Paciic University has given me a lot of memorable and happy moments. It provided many opportunities for students to learn and explore. In the university’s engineering community, IEM-APU Student Section, I was one of the committee representatives to assist in different events such as seminar coordination, industrial visit arrangements and technical workshops to skill up other studetns and so on. It was such an honour to be enrolled in Asia Paciic University and be involved in this student section, as I could develop my management skills .The student section established a bridge between our internal communities and other universities to reinforce students’ experiences during their university life. These experiences made my student life eventful and valuable during my study at Asia Paciic University.”
Accelerated spin-up reduces computational overhead for modeling analyses and makes some computationally costly analyses feasible. For example, model parameters usually represent the average physiological properties of plant func- tional types or mean soil attributes. Most of these parameters in the model are assigned values based on relatively few field and/or laboratory observations (Stockli et al., 2008). More and more databases have been developed to indicate that key plant physiological properties, such as leaf traits (GLOP- NET; Reich et al., 2007), carboxylation capacity (Vcmax; Kattge et al., 2009), and biomass allocation (Poorter et al., 2012), greatly vary among plants of different species at dif- ferent locations. Similarly, properties of soil processes, such as temperature sensitivity of soil respiration (Peng et al., 2009), also greatly vary over time and space. The natural variations in key plant and soil properties can be adequately represented only by probability distributions of parameters, which would propagate in the land models to generate un- certainties in model projections (Weng and Luo, 2011; Xu et al., 2006). The model projection uncertainties can be quan- tified through ensemble analysis. However, such ensemble analysis of land models against parameter variations is com- putationally not feasible, because each ensemble element re- quires spin-up at least once up to a thousand and even million times for one ensemble analysis. Without the ensemble anal- ysis against parameter variations at regional or global scales, uncertainties in model projections cannot be fully assessed. Fast spin-up methods, including SAS, could reduce compu- tational cost and enable the ensemble analysis that is impos- sible with traditional methods.
By constraining certain variables (subject content, indus- try and operational context, level and prior capability of learn- ers) and by measuring the performance of participants, we were able to establish the validity of comparative case analy- ses as the method for an analysis of the impact of curriculum on performance. Using Firestone’s (1993) view of case-to- case transfer as one of three forms of generalization and Stake’s (1988) distinction between deductive and inductive generalization in support of the use of case study methods of analyses (in educational research), we also feel that case studies provide a valuable method for conducting compar- ative analysis and positing generalizable propositions as a result of such an analytical approach.
Nowadays, the most popular gas laser for material processing is the CO2 laser. The C02 is mixed with the N2 while the He is in the different amount for the lasing medium. However, it depends on the design of laser resonator, operating pressure, and the operating mode either it is pulsed or continuous. Electric discharge excites the CO2 molecules through the gas mixture. The wavelength that IS emitted by the laser radiation is 10.6 µm. Normally, the range of conversion efficiencies is between 12 to 14%. For a long time, CO2lasers have been the highest CW power sources available for laser materials processing (Olsen and FlemmingOve , 2009). For the current commercial systems, the maximum power output is 20 Kw. One of the disadvantages of CO2 lasers is associated with the long wavelength of the emitted radiation. It causes most of the transparent material within the visible range of electromagnetic spectrum such as glass is opaque for CO2 laser radiation. Thus, the laser resonator need the transmission elements and manufactured the beam guidance from special and expensive material such as Zink Selenide. Then, the beam deﬂection and focusing must be realised by means of reﬂective optics. For example, multilayer coated copper substrates. Another effect of the long wavelength is the high reﬂectivity of metals, which is normally used in materials processing and the radiation interaction with laser-induced plasma is increased.