In the third quarter of 2023, BNI Mobile banking recorded a total of 15.62 million users or grew 20.9% as of September 2023. However, the growth of BNI Mobile banking users is still relatively smal…
PayPal merupakan salah satu akun virtual yang menyediakan layanan transfer dan pembayaran online dengan jumlah pengguna mencapai sekitar 429 juta orang. Akan tetapi, PayPal tidak termasuk dalam kat…
Cyberattacks are unauthorized attempts to track and disrupt the operation of communication systems and control systems by exploiting the security weaknesses of communication networks. Efforts to pr…
Tujuan penelitian ini adalah Menganalisis jalur terbaik yang didapatkan berdasarkan hasil algoritma CH pada beberapa kondisi jalan di Kota Palembang. Penelitian dilakukan pada bulan Juni 2023 s.d. …
THE RELATIONSHIP OF URINE ALBUMIN CREATININE RATIO TO THE INCIDENT OF ACUTE KIDNEY INJURY IN PATIENTS IN THE ICU OF DR MOHAMMAD HOESIN HOSPITAL PALEMBANG ABSTRACT Rr. Marina Rizky Utami1 , Zulkifli…
Meter Subscription Service Information System (SIPL) is an information system application used by employees of the Service and Reading Meter section at Tirta Musi Palembang. Based on observation, i…
Continuous Deployment (CD) is a method of deploying applications to production servers automatically and continuously. This research aims to explore the application of the Continuous Deployment met…
Bitcoin, introduced in 2008 by Satoshi Nakamoto, is the first digital currency to use blockchain for secure transactions. Despite its popularity, challenges in detecting illegal or suspicious trans…
Kehilangan data merupakan isu umum dalam berbagai kumpulan data dan menjadi salah satu tantangan paling kompleks dalam ilmu komputer. Masalah ini mempersulit proses pengolahan data karena banyaknya…
Rice is one of the most widely grown staples in rural Indonesia. East OKU Regency is the Regency with the second largest rice production in South Sumatra Province, Madang Suku 1 District is a Distr…
Learning Management System (LMS) is a web-based technology that makes it easier to plan, distribute and evaluate a learning process (Fitriani, 2020). With the Learning Management System, the learni…
In the era of globalization, the use of the internet and technology has become commonplace. One of them is the banking sector, which has shifted to offering services with a digital touch, such as m…
CV. Juna Cell is a trading unit that sells cellphones and cellphone accessories. In the sales process on CV. Juna Cell still uses system management in a manual way, namely by handwriting on a noteb…
As one of the state-owned enterprises (BUMN) PT. Pertamina Hulu Rokan has an obligation in the management of good Information Technology Governance in accordance with the Good Corporate Governance …
In the application of Artificial Intelligence to determine the best route as a means to alleviate traffic congestion in the city of Palembang, the author uses the Glowworm Swarm Optimization (GSO) …
In the era Society 5.0, economic growth and digital products have mushroomed, leading to digital transaction product innovation becoming a daily necessity for society. Easy, cashless payment are ma…
Apache HTTP Server is one of the most widely used web servers today. Despite its advantages in stability and security, the performance of the Apache HTTP Server is often affected by traffic load an…
With the computing speed possessed by quantum computers, the security of encryption on classical computers is threatened, especially the security of the RSA encryption algorithm, because it is pred…
Background :Carpal tunnel syndrome is a musculoskeletal disorder of the wrist caused by pressure on the median nerve when passing through the carpal tunnel. The symptoms of CTS are pain, tingling, …
Maritime transportation plays an important role in international trade, more than 50,000 merchant ships are involved every day and this causes a large opportunity for maritime accidents. Therefore,…
Use of Supply Chain Management (SCM) technology integrated with Smart Contract to increase transparency and data security in the supply chain industry. Several traditional problems in SCM, such as …
The growth of technology has reached the financial sector including the development of payment instruments. Payment methods in Indonesia began with a barter system, followed by the invention of coi…
As the most widely used mobile operating system, Android is increasingly becoming a prime target for malware attacks. The popularity of this operating system makes it attractive for cyber security …
Malware that can enter through PDF files that appear unsuspicious is one of the main factors in cyber security attacks. The GARUDA dataset was analyzed statically using VirusTotal and PDFiD to iden…
Pada penerapan AI untuk menentukan kepadatan kendaraan di kota Palembang yang terpantau oleh kamera penulis menggunakan algoritma Convolutional Neural Network. kemudian untuk Mencari rute terbaik d…
With the widespread use of information technology at this time, it also influences business processes in various industrial environments, one of which is the banking industry. BRI Bank is one of th…
Background: Calf Muscle pain is one of the muscle pains that many people complain about. Some causes of calf muscle pain include wearing high heels and standing for too long that causing the calf m…
Digital Forensics is a part of forensic science that includes inventions and Data investigation on a digital device that aims to prove scientific computer crimes in order to obtain digital evidence…
The title of this research is the Implementation of the End-To-End Encryption Mechanism on IoT Using the Rivest Cipher 4 (RC4) Method. This study aims to implement RC4 cryptography in the process o…