
Indonesia, with its high biodiversity, is home to 1,539 bird species, some of which have morphological similarities that make manual identification challenging.This research aims to develop a bird …
The demand for accurate positioning systems is increasing with the growth of the Internet of Things (IoT) and location-based applications. GPS is limited in indoor environments, making Wi-Fi-based …

Denial of Service (DoS) is one of the popular cyber attacks targeting websites of well-known organizations and has the potential to have high economic and time costs. One of the most common types o…

Face identification is a form of Machine Learning application, specifically using Deep Learning, that is commonly encountered in our daily lives. In its implementation, there are many algorithms us…

Bangkitan perjalanan merupakan tahap pemodelan yang memperkirakan jumlah pergerakan yang menuju ke suatu zona atau jumlah pergerakan yang meninggalkan suatu zona. Untuk menghasilkan suatu model hub…

Stroke is a disease in which the sufferer experiences bleeding or blockage of the brain arteries. The focus of this research is the use of Convolutional Neural Network (CNN) method in stroke diseas…

The U-Net architecture has a fairly deep network. The addition of layers in the U-Net architecture network can increase the complexity of the U-Net network which can affect the training time to be …

-

-

Steel is still the choice as a structural material for earthquake-prone areas, because in addition to having high strength, the elastic properties of steel contribute to better ductility and energy…

Indonesia ranks second in contributing the largest amount of plastic waste to the global oceans, producing approximately 64 million tons of plastic waste annually, with around 3.2 million tons reac…

Bangkitan perjalanan merupakan tahap permodelan untuk memperkirakan jumlah banyaknya perjalanan yang berasal dari suatu zona atau tata guna lahan serta memperlihatkan banyaknya lalu lintas yang dib…


Attendance system is an activity carried out in every institution such as offices and education. With this attendance system, it can improve discipline for everyone and for the agency itself. In th…

This book dives into radio resource allocation optimizations, a research area for wireless communications, in a pragmatic way and not only includes wireless channel conditions but also incorporates…

With the development of information technology regarding supply chain management to control data directly related to information technology, inventory control cannot be successful solely relying on…

Twitter is currently one of the social media that is widely used by the public. By utilizing Twitter, people can now easily express opinions on various matters, including the Quick Respond Code Ind…





This book offers an accessible introduction and practical guide to Voice over Internet Protocol (VoIP) technology, providing readers with the know-how to solve the problems encountered in applying …

This book provides an introduction to the software system SMURPH, comprising a programming language, its compiler, and an execution environment, for specifying communication networks and protocols …

Computer networks have an important role in carrying out various kinds of work activities. VLANs can limit users who can access data, thereby reducing the possibility of abuse of access rights. Vir…





-
