The Sriwijaya University Library

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Login
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
First Page Previous 6 7 8 9 10 Next Last Page
cover
MULTIVARIATE IMPUTATION TANDA VITAL PASIEN UNIT PERAWATAN INTENSIF MENGGUNAKA…
Ais'sy, Widya Rohadatul

Missing data is a common problem in vital sign datasets and is one of the most complex topics in computer science. The large number of missing values in the data makes it more difficult to process.…

Edition
-
ISBN/ISSN
-
Collation
xiii, 64 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1044752023
Availability1
Add to basket
View DetailCite
cover
ANALISIS PERBANDINGAN DETECTION TRAFFIC ANOMALY SERANGAN DDoS IPv4 DENGAN MET…
Maulana, Muhamad Chendy

Anomaly traffic is a condition that results in an abnormality in network traffic. Anomaly detections is a monitoring to monitor the movement that occurs in the network system. DDoS attack or Distri…

Edition
-
ISBN/ISSN
-
Collation
viii, 74 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T924222023
Availability1
Add to basket
View DetailCite
cover
Cyber Security: 18th China Annual Conference, CNCERT 2021, Beijing, China, Ju…
Lu, WeiZhang, YuqingWen, WeipingYan, HanbingLi, Chao

This open access book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, held in Beijing, China, in AJuly 2021. The 14 papers prese…

Edition
1
ISBN/ISSN
978-981-16-9229-1
Collation
x, 235p.: Ill.
Series Title
Communications in Computer and Information Science
Call Number
005.8 Cyb
Availability1
Add to basket
View DetailCite
cover
Mobile Forensics – The File Format Handbook: Common File Formats and File S…
Hummert, ChristianPawlaszczyk, Dirk

This open access book summarizes knowledge about several file systems and file formats commonly used in mobile devices. In addition to the fundamental description of the formats, there are hints ab…

Edition
1
ISBN/ISSN
978-3-030-98467-0
Collation
xiii, 269p.: Ill.
Series Title
-
Call Number
005.75 Mob
Availability1
Add to basket
View DetailCite
cover
Silicon Valley Cybersecurity Conference: Third Conference, SVCC 2022, Virtual…
Bathen, LuisSaldamli, GokaySun, XiaoyanAustin, Thomas H.Nelson, Alex J.

This open access book constitutes refereed proceedings of the Third Conference on Silicon Valley Cybersecurity Conference, SVCC 2022, held as virtual event, in August 17–19, 2022. The 8 full p…

Edition
1
ISBN/ISSN
978-3-031-24049-2
Collation
ix, 137p.: Ill.
Series Title
-
Call Number
005.8 Sil
Availability1
Add to basket
View DetailCite
cover
PENGANTAR BASIS DATA
Widianti, Sri

Edition
-
ISBN/ISSN
978-602-8016-24-7
Collation
iii + 124 hlm .; ilus : 21 cm
Series Title
-
Call Number
005.74 Wid p

Edition
-
ISBN/ISSN
978-602-8016-24-7
Collation
iii + 124 hlm .; ilus : 21 cm
Series Title
-
Call Number
005.74 Wid p
Availability1
Add to basket
View DetailCite
cover
SISTEM KOMPUTER AKUNTANSI: INVENTORY
Pranoto, LemanEko

Edition
-
ISBN/ISSN
-
Collation
x, 117 hlm. ; 23 cm.
Series Title
-
Call Number
001.642 5 Pra s

Edition
-
ISBN/ISSN
-
Collation
x, 117 hlm. ; 23 cm.
Series Title
-
Call Number
001.642 5 Pra s
Availability1
Add to basket
View DetailCite
cover
PENERAPAN SISTEM PENENTUAN POSISI DALAM RUANGAN MENGGUNAKAN METODE FINGERPRIN…
Rasyid, Muhammad Fanny Nur

Recently, wireless communication is growing rapidly, due to its practicality and the many features that have been developed along with current technological developments, especially features that c…

Edition
-
ISBN/ISSN
-
Collation
xiii, 84 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1287872023
Availability1
Add to basket
View DetailCite
cover
ANALISA BIG DATA PADA CLUSTER KOMPUTER MENGGUNAKAN KOMPUTASI TERDISTRIBUSI
Zainudin, Zainudin

Along with the development of the era of globalization, the use of technology has been very widespread in various industrial sectors, so data accumulates in a very fast time to grow into large-scal…

Edition
-
ISBN/ISSN
-
Collation
xvii, 84 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1308762023
Availability1
Add to basket
View DetailCite
cover
DETEKSI TRANSAKSI ANOMALI PADA BLOCKCHAIN DENGAN MENGGUNAKAN METODE DEEP BELI…
Permana, Galih Bayu

In recent years, blockchain technology has found widespread applications across various domains, including cryptocurrency, financial services, and risk management. Cryptocurrency, in particular, ha…

Edition
-
ISBN/ISSN
-
Collation
xiii, 61 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1308532023
Availability1
Add to basket
View DetailCite
cover
APLIKASI PENGELOLAAN DATA RAB PADA CV. MULTI MANDIRI BERBASIS WEB
Syahrani, Khairunisa

CV. Multi Mandiri is a company engaged in housing development or development. In its activities there are still many obstacles, namely, the transaction process is still ongoing manually, relying on…

Edition
-
ISBN/ISSN
-
Collation
xiii, 36 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1305352023
Availability1
Add to basket
View DetailCite
cover
DETEKSI TRANSAKSI ANOMALI PADA BLOCKCHAIN DENGAN MENGGUNAKAN METODE LONG SHOR…
Wahyudi, Muhammad Tri

The rapid growth and anonymity offered by cryptocurrencies have made them vulnerable to being used for illegal activities. In this study, Long Short-Term Memory (LSTM) neural network is used to ide…

Edition
-
ISBN/ISSN
-
Collation
xiii, 64 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1308512023
Availability1
Add to basket
View DetailCite
cover
ANALISIS DATA PENELITIAN Menggunakan SPSS
Sarwono, Jonathan

Edition
-
ISBN/ISSN
979-763-314-4
Collation
ix, 250 hlm. ; 22 cm
Series Title
-
Call Number
001.42 Sar a

Edition
-
ISBN/ISSN
979-763-314-4
Collation
ix, 250 hlm. ; 22 cm
Series Title
-
Call Number
001.42 Sar a
Availability1
Add to basket
View DetailCite
cover
DETEKSI TRANSAKSI ANOMALI PADA BLOCKCHAIN DENGAN MENGGUNAKAN METODE DEEP NEUR…
Imam, M

Blockchain is a digital data bank that stores transaction data transparently. With so much interest in bitcoin, making bitcoin wallets are an attractive target for hackers. This research uses the D…

Edition
-
ISBN/ISSN
-
Collation
xiii, 60 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1308542023
Availability1
Add to basket
View DetailCite
cover
DETEKSI MALICIOUS URL PADA FILE BERBASIS FITUR LEKSIKAL MENGGUNAKAN METODE RA…
Putri, Rachmawati Dwinanti

With the existence of attack models such as phishing and malware distribution, these actions begin by accessing a Uniform Resource Locator (URL) or files containing harmful links within them. A Uni…

Edition
-
ISBN/ISSN
-
Collation
xiv, 80 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1278062023
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI SECURE SOCKET TUNNELING PROTOCOL (SSTP) UNTUK KEAMANAN DATA PADA…
Firmansyah, Rifki 

Building a secure socket tunneling protocol method to access port services on the MikroTikrouterboard. Limiting ports that are easy to access remotely on the MikroTikrouterboard. Knowing the steps …

Edition
-
ISBN/ISSN
-
Collation
xvi, 40 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1318812023
Availability1
Add to basket
View DetailCite
cover
PENERAPAN LIBRARY PYTORCH3D PADA REKONTRUKSI JARINGAN TRANSVENTRIKULAR CITRA …
Imanullah, Wahnuzsyah Choiri 

The reconstruction of two-dimensional images into three-dimensional using transventricular objects plays a crucial role in the medical field, particularly in the diagnosis and treatment within neur…

Edition
-
ISBN/ISSN
-
Collation
xiii, 54 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1309642023
Availability1
Add to basket
View DetailCite
cover
Cyber Security: 19th China Annual Conference, CNCERT 2022, Beijing, China, Au…
Lu, WeiZhang, YuqingWen, WeipingYan, HanbingLi, Chao

This open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented we…

Edition
1
ISBN/ISSN
978-981-19-8285-9
Collation
x, 239p.: Ill.
Series Title
Communications in Computer and Information Science
Call Number
005.8 Cyb
Availability1
Add to basket
View DetailCite
cover
Handbook of Digital Face Manipulation and Detection: From DeepFakes to Morphi…
Rathgeb, ChristianTolosana, RubenVeraRodriguez, RubenBusch, Christoph

This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines th…

Edition
1
ISBN/ISSN
978-3-030-87664-7
Collation
ix, 487p.: Ill.
Series Title
Advances in Computer Vision and Pattern Recognition
Call Number
005.8 Han
Availability1
Add to basket
View DetailCite
cover
ANALISIS DATA TIME SERIES UNTUK FORECASTING DATA CYBER ATTACK PADA HONEYPOT M…
Sasfini, Cuh Meizi 

Cyber Attack is a crime that attacks computer systems that can shut down or damage information technology services. Every act of attack will have an impact on gaining access to services, manipulati…

Edition
-
ISBN/ISSN
-
Collation
xiii, 67 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1298992023
Availability1
Add to basket
View DetailCite
cover
OPTIMALISASI PERFORMA ALGORITMA CONVOLUTIONAL NEURAL NETWORK (CNN) DALAM PROS…
Ratfiana, Soniawati 

One of the threats to the internet network is botnet (robot network). although there are many methods used to detect botnet, but there are still less accurate. this can be seen from the results of …

Edition
-
ISBN/ISSN
-
Collation
xvii, 95 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1298982023
Availability1
Add to basket
View DetailCite
cover
Security in Computer and Information Sciences: Second International Symposium…
Gelenbe, ErolJankovic, MarijaKehagias, DionysiosMarton, Anna

This open access book constitutes the thoroughly refereed proceedings of the Second International Symposium on Computer and Information Sciences, EuroCybersec 2021, held in Nice, France, in October…

Edition
1
ISBN/ISSN
978-3-031-09357-9
Collation
xi, 133p.: Ill.
Series Title
Communications in Computer and Information Science
Call Number
005.8 Sec
Availability1
Add to basket
View DetailCite
cover
PEMBAHRUAN SISTEM DETEKSI SERANGAN PORTSCAN BERBASIS LSTM DENGAN PENGIMPLEMEN…
Septriyanti, Wilda 

Port Scanning attacks are quite dangerous attacks, this technique can map characteristics, detect open ports and even obtain important information on a network or host to then forward to further at…

Edition
-
ISBN/ISSN
-
Collation
xvi, 120 hlm.; Ilus.; 21 cm
Series Title
-
Call Number
T1298902023
Availability1
Add to basket
View DetailCite
cover
PENGENALAN SUARA KE TEKS MENGGUNAKAN HIDDEN MARKOV MODEL
Kurniawan, Irvan 

Learning new words can be difficult, it helps if it’s possible to look up the new word in a dictionary, however, a word in English often sounds alike to another word, therefore a speech to text s…

Edition
-
ISBN/ISSN
-
Collation
xv, 52 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T956232023
Availability1
Add to basket
View DetailCite
cover
PENDETEKSIAN PENDARAHAN PADA CITRA DIGITAL RADIOLOGI OTAK MANUSIA MENGGUNAKAN…
Artamananda, Artamananda 

This research discusses four scenarios in developing a Faster Region-based Convolutional Neural Network (Faster R-CNN) model to detect bleeding in radiological images of the human brain. We specifi…

Edition
-
ISBN/ISSN
-
Collation
xviii, 72 hlm.; ilus.;29 cm
Series Title
-
Call Number
T1312342023
Availability1
Add to basket
View DetailCite
cover
DIAGNOSA INFEKSI SALURAN PERNAPASAN AKUT MENGGUNAKAN ALGORITMA NAIVE BAYES CL…
Ramadhan, Bayu Catur Wangsa 

ARI is a disease that attacks the respiratory tract which can be caused by a viral infection or can also be caused by other diseases or other conditions, under certain conditions ARI can cause comp…

Edition
-
ISBN/ISSN
-
Collation
xiv, 73 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T874412023
Availability1
Add to basket
View DetailCite
cover
SISTEM REKOMENDASI PAKET CHANNEL TV MENGGUNAKAN ITEM-BASED CLUSTERING HYBRID …
Marinah, Marinah 

IPTV minipacks are small packages of various additional channels owned by IndiHome. This package can be selected and purchased according to customer needs. currently used traditional methods of ana…

Edition
-
ISBN/ISSN
-
Collation
xvii, 77 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T859312022
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI ALGORITMA K-NEAREST NEIGHBOR DAN BAYESIAN OPTIMIZATION DALAM MEN…
Sepriyani, Yepi

The increase in the number of vehicles and the urban population has led to high levels of traffic congestion in urban areas. The focus of this research is to find the best alternative routes using …

Edition
-
ISBN/ISSN
-
Collation
xix, 103 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1291782023
Availability1
Add to basket
View DetailCite
cover
Obstructions in Security-Aware Business Processes: Analysis, Detection, and H…
Holderer, Julius

This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continuity and governance on the other. The g…

Edition
1
ISBN/ISSN
978-3-658-38154-7
Collation
xxi, 341p.: Ill.
Series Title
-
Call Number
005.8 Hol
Availability1
Add to basket
View DetailCite
cover
Foundations of Software Science and Computation Structures: 25th Internationa…
Bouyer, PatriciaSchröder, Lutz

This open access book constitutes the proceedings of the 25th International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2022, which was held during April 4-6…

Edition
1
ISBN/ISSN
978-3-030-99253-8
Collation
xvi, 471p.: Ill.
Series Title
Lecture Notes in Computer Science
Call Number
005.7 005.7 Fou
Availability1
Add to basket
View DetailCite
First Page Previous 6 7 8 9 10 Next Last Page

Search Result

Found 1591 from your keywords: Subject : "Data"
You currently on page 10 of 54 page(s)
Query took 0.02473 second(s) to complete
XML ResultJSON Result

Suggestion
image
AKSELERASI TRANSFORMASI PERLINDUNGAN HAK KEKAYAAN INTELEKTUAL MELALUI INOVASI
Harris, Freddy
image
PENGEMBANGAN MEDIA PEMBELAJARAN BERBASIS GIM EDUKASI WORDWALL PADA MENULIS TEKS EKSPLANASI PESERTA DIDIK KELAS VIII SMP NEGERI 1 INDRALAYA
Lestari, Indri Loi
image
IT Convergence and Security
Kim, Hyuncheol - Kim, Kuinam J.
image
EVALUASI PENGGUNAAN OBAT PADA PASIEN STROKE HEMORAGIK DI RSUD SITI FATIMAH PROVINSI SUMATERA SELATAN
Lestari, Kinanti Putri
image
Statistika Deskriptif: untuk Penelitian Diliengkapi Perhitungan Manual dan Aplikasi SPSS Versi 17
Siregar, Syofian
The Sriwijaya University Library
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search