Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Journal of Informatics and Communication Technology (JICT)

Analisis Keamanan dan Kenyamanan pada Cloud Computing Dwina Satrinia; Syifa Nurgaida Yutia; Iik Muhamad Malik Matin
Journal of Informatics and Communication Technology (JICT) Vol. 4 No. 1 (2022)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52661/j_ict.v4i1.111

Abstract

Cloud computing atau ‘komputasi awan’ menyajikan berbagai kemudahan untuk organisasi maupun individu dalam mengakses data dimanapun dan kapanpun. Cloud computing memiliki kelebihan seperti memberikan berbagai pilihan model layanan, jenis penyimpanan data, serta kustomisasi komputasi sehingga memberikan manfaat yang menarik yaitu efisiensi, efektif dan hemat biaya, tetapi hal tersebut tidak membuat cloud computing aman dari ancaman serangan keamanan. Konsep keamanan dibutuhkan untuk membantu manajemen pada organisasi maupun individu dalam melindungi dan melakukan pengamanan data pada layanan cloud. Selain itu, model kenyamanan juga diperlukan untuk membantu pengguna dalam menggunakan layanan cloud.
Potensi Artificial Intelligence dalam Dunia Kreativitas Desain Dwina Satrinia; Reza Ramadani Firman; Trimalda Nur Fitriati
Journal of Informatics and Communication Technology (JICT) Vol. 5 No. 1
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52661/j_ict.v5i1.164

Abstract

The shift in cultural practices towards digital usage has led companies and product brands to become increasingly adept at utilizing social media for promotion and branding. Creating social media content requires creativity, interactivity, attractiveness, and speed, driving a growing demand for design skills. To support the design process, designers rely on various tools, including AI-integrated applications, such as Canva, Figma, Picsart, Adobe Photoshop, Adobe Lightroom, and others. These tools enhance graphic designers' productivity and enable them to edit images, create artworks, and produce creative content for social media. The research explores the usage of AI technology in the field of design and art. It examines several AI applications, including image segmentation, image enhancement, image-to-image translation, face attribute manipulation, creating new artistic expressions, detecting fake paintings, 3D art, and AI influencers. AI has positively impacted the creative design world by enabling artists to explore new artistic expressions, generate more personal and interactive artworks, and streamline the design workflow. AI tools have also facilitated inclusive design, making creative content accessible to diverse audiences. However, there are concerns that AI may replace human artists and create art lacking soul or authenticity. The research aims to provide an overview of the existing studies on AI in design to help designers understand the potential of AI in the creative domain. It also discusses the positive and negative implications of AI's integration into the world of design, emphasizing the need for ethical considerations and the preservation of human artistic contributions.
Tren Penelitian Metode Konsensus, Serangan, serta Pencegahannya pada Cryptocurrency Mining Satrinia, Dwina; Fajriyah, Siti Zahrotul; Yutia, Syifa Nurgaida
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Studi ini membahas metode konsensus di cryptomining, serangan umum, dan pencegahannya. Blockchain awal menggunakan Proof of Work (PoW), yang tidak efisien energi dan rentan keamanan. Proof of Stake (PoS) dikembangkan untuk meningkatkan desentralisasi dan efisiensi energi. Protokol seperti Proof-of-Search (PoS) dan Proof-of-Publicly Verifiable Randomness (PoPVR) menawarkan alternatif PoW, mengatasi penipuan dan serangan denial-of-service. Penelitian ini juga mengevaluasi perilaku penambangan strategis dan metode deteksi serta pencegahan serangan. Model konsensus hibrida, seperti Hybrid PoW-PoS, menggabungkan kekuatan PoW dan PoS untuk melawan serangan mayoritas. Temuan menekankan perlunya keamanan yang kuat dan pemantauan berkelanjutan untuk mencegah aktivitas jahat dan memastikan keadilan serta keberlanjutan penambangan kripto. Makalah ini mengumpulkan analisis dari berbagai jurnal untuk meningkatkan keamanan dan efisiensi penambangan kripto.