Fire is one of the disasters that most people worry about, especially indoor fires in office buildings, hospitals, shopping centers or housing, because in addition to possibly causing material loss…
Cyber attacks are a form of threat aimed at stealing, damaging, or altering important data within computer systems or networks. These attacks include hacking, phishing, and malware. Detecting cyber…
In the rapid development of technology, System and Network Security is very important in the ecosystem of digital communication environments. Machine Learning techniques can be used to solve this p…
Cyber attacks have become an increasing threat to the security of modern information systems. To overcome the complexity and diversity of attacks that occur, a sophisticated and reliable detection …
Android menjadi OS paling populer pada perangkat mobile membuatnya menjadi target utama threat actor dalam membuat malware. Beberapa penelitian menunjukkan bahwa deteksi malware pada perangkat mobi…
Watering plants is a tedious thing and is often forgotten by both households and farmers, while plants really need enough water to grow. Seeing these conditions, researchers designed an automation …
K-Means clustering is a tool used to determine the cluster structure of a dataset identified by its strong similarity to other clusters or its strong difference from other clusters. In another pape…
Growth factors such as economic, social, political, and cultural developments have become one of the traffic problems in Palembang City that has caused the occurrence of traffic density. To avoid g…
Traffic congestion is always a primary concern in transportation issues, and it continues to pose challenges in daily activities. To address this problem, a system that can detect vehicle density l…
Cyberattacks are unauthorized attempts to track and disrupt the operation of communication systems and control systems by exploiting the security weaknesses of communication networks. Efforts to pr…
Tujuan penelitian ini adalah Menganalisis jalur terbaik yang didapatkan berdasarkan hasil algoritma CH pada beberapa kondisi jalan di Kota Palembang. Penelitian dilakukan pada bulan Juni 2023 s.d. …
Continuous Deployment (CD) is a method of deploying applications to production servers automatically and continuously. This research aims to explore the application of the Continuous Deployment met…
Bitcoin, introduced in 2008 by Satoshi Nakamoto, is the first digital currency to use blockchain for secure transactions. Despite its popularity, challenges in detecting illegal or suspicious trans…
Kehilangan data merupakan isu umum dalam berbagai kumpulan data dan menjadi salah satu tantangan paling kompleks dalam ilmu komputer. Masalah ini mempersulit proses pengolahan data karena banyaknya…
Apache HTTP Server is one of the most widely used web servers today. Despite its advantages in stability and security, the performance of the Apache HTTP Server is often affected by traffic load an…
With the computing speed possessed by quantum computers, the security of encryption on classical computers is threatened, especially the security of the RSA encryption algorithm, because it is pred…
Maritime transportation plays an important role in international trade, more than 50,000 merchant ships are involved every day and this causes a large opportunity for maritime accidents. Therefore,…
Use of Supply Chain Management (SCM) technology integrated with Smart Contract to increase transparency and data security in the supply chain industry. Several traditional problems in SCM, such as …
As the most widely used mobile operating system, Android is increasingly becoming a prime target for malware attacks. The popularity of this operating system makes it attractive for cyber security …
Pada penerapan AI untuk menentukan kepadatan kendaraan di kota Palembang yang terpantau oleh kamera penulis menggunakan algoritma Convolutional Neural Network. kemudian untuk Mencari rute terbaik d…
Digital Forensics is a part of forensic science that includes inventions and Data investigation on a digital device that aims to prove scientific computer crimes in order to obtain digital evidence…
The title of this research is the Implementation of the End-To-End Encryption Mechanism on IoT Using the Rivest Cipher 4 (RC4) Method. This study aims to implement RC4 cryptography in the process o…
Supervisory Control and Data Acquisition (SCADA) is widely used in industry as a system that is tasked with supervising, controlling while simultaneously collecting data from sensors connected duri…
DoS attack detection is important because SCADA networks are used in large companies, making them vulnerable to attack. In this research, the deep neural network (DNN) method is used to detect DoS …
This study aims to determine the best route using Artificial Intelligence (AI) based on the Particle Swarm Optimization algorithm under road conditions in Palembang City. This research employs You …
Camera PTZ (Pan-tilt-zoom) is a camera that is capable of moving simultaneously horizontal and vertical, PTZ cameras also have features zoom which serves to make frame the camera approaches or move…
Port infrastructure plays an important role in supporting inter-island connectivity and marine transportation services. In this study, we used the K-means clustering method to identify patterns and…
Spyware is one type of malware that threatens computer systems because it can steal users' personal information and sensitive data without their knowledge. Spyware can monitor user activities and s…
Illegal activities such as money laundering using cryptocurrencies represented by Bitcoin have emerged. In this study, a Gated Recurrent Unit (GRU) neural network is used to identify anomalous tran…
In this study, the only parts of the face used were the eyes and mouth. Apart from that, data in facial recognition is also limited, namely a distance of 40-50cm from the camera. This facial recogn…