The purpose of writing this Final Report is to create an Inventory Information System At Gunung Merah Shop based on website. In processing data items, the shop rely on the ability of the cashier to…
Collaborative text editor systems are widely used to allow users to edit the same document simultaneously. YATA CRDT (Yet Another Transformation Approach Conflict-free Replicated Data Types) is an …
Room security is a very important thing to pay attention to and to create that security there are many things we can do, one of which is the use of technology to maintain security. This project aim…
he Indonesian government has been making efforts to adopt the use of information technology to improve facilities and infrastructure in the fields of science and information technology, both at the…
The use of the Internet of Things (IoT) has been growing, starting from industry, education, to everyday life. Using the concept of the Internet of Things (IoT) can make it easier to solve various …
Penelitian ini bertujuan untuk membangun framework dalam mengidentifikasi kepribadian seseorang berdasarkan analisis tulisan tangan (grafologi). Meskipun telah banyak dikembangkan berbagai model da…
The ever-increasing number of vehicle users makes traffic congestion one of the major problems to be overcome. Services provided by Intelligent Transportation Systems (ITS) can help solve traffic c…
The system for determining the best path is included in the concept of Smart Transportation where the city that applies the concept is called a Smart City. This study uses the You Only Look Once ve…
Clutering adalah cara mengklasifikasikan data mentah secara sederhana dan mencari pola tersembunyi yang mungkin terdapat dalam dataset K-means, yakni algoritma pengelompokan tipikal dalam data mini…
Kepadatan lalu lintas telah menjadi permasalahan umum dalam sistem transportasi, hal tersebut dapat menyebabkan laju kendaraan harus terhenti karena kemacetan akibat kepadatan lalu lintas. Peneliti…
The aim of this study is to perform the localization of pre-cervical cancer images using Convolutional Neural Network (CNN) method and guided backpropagation visualization. The pre-cervical cancer …
One of the processes in raising chickens to achieve quality production results is by controlling the temperature of the coop space regularly. The temperature of the cage room must be controlled as …
Teknologi komputer yang kompleks dan canggih sangat membantu dalam pengambilan keputusan, termasuk dalam memilih siswa terbaik di sekolah. SMA N 4 OKU saat ini hanya menggunakan nilai rapor sebagai…
Load balancing is a technique used in a network environment to distribute traffic evenly and efficiently among multiple servers. Nginx is a popular web server and reverse proxy for implementing loa…
In developing applications, a good database is needed to store data from an application. Data availability and security must be guaranteed by the database developer. Users also need to know what th…
DDoS assaults pose a serious threat to enterprises, inflicting damage and disruption, thus improving the speed and accuracy of DDoS detection and mitigation is critical. The combination of Network …
Skripsi ini membahas penerapan knowledge management system dengan konsep gamification sebagai sarana untuk membantu Mentor dan Mentee dalam kegiatan internship Merdeka Belajar Kampus Merdeka (MBKM)…
The aim of this study is to classify cervicalpre cancer images using Convolutional Neural Network (CNN) method. The dataset of cervical precancer images was evaluated using various CNN models that …
Android is the most popular mobile software platform across the globe. The worldwide app downloads reached 352.9 billion in 2021. However, it still faces serious security threats due to its open-so…
This study presents and analyzes deep learning techniques to classify abnormalities in fetal heart images. This research compares four convolutional neural network (CNN) architectures to choose the…
The development of information technology which grow rapidly nowadays, allows their user to do work more effective and efficient. in carry out its water sampling report activity, PERUMDA Tirta Musi…
ABSTRAK ANALISIS TRADING HARGA EMAS DIGITAL MENGGUNAKAN METODE BUY OPEN MARKET (BOM) Henny Pratiwi (09011281520129) Program Sistem Komputer, Fakultas Ilmu Komputer, Universitas Sriwijaya Email : hp…
SQL Injection is a hacking attack that is carried out by abusing the security gaps in the SQL layer on a data-based application, Sql Injections is a serious threat to the security of a website. The…
This research was developed for the purpose of making it easier to apply fertilizer without touching plants with human hands. This research utilizes a technology called microcontroller esp32 as a c…
The content is a research summary about the process of examining the contents of the uterus using Ultrasonography (USG) conducted by doctors. USG is a device that utilizes high-frequency sound wave…
Quality Assurance is a term that refers to an evaluation process that includes monitoring and guaranteeing the quality of something, one of which is Recognition of Past Learning (RPL). In this case…
This study presents and analyzes deep learning techniques to classify abnormalities in fetal heart images. This research compares four convolutional neural network (CNN) architectures to choose the…
The ability to predict patterns of Cardiac Arrest with high accuracy can significantly contribute to more effective prevention and treatment. This research focuses on predicting patterns of Cardiac…
Sentiment analysis is a fundamental task in Natural Language Processing (NLP). Social media is designed to enable people to share content quickly through electronic tools. People can openly express…