Pada penelitian pada projek ini mengembangkan sebuah robot model U-Arm dengan tiga derajat kebebasan dengan menggunakan perhitungan Invers Kinematic. Invers Kinematic merupakan proses perhitungan m…
DDoS attacks are one of the main threats to security issues on the internet today which have quite a severe impact. As for knowing the best DDoS attack detection, this study applies several selecti…
Brute force is one of many attacks that are often used by hackers in carrying out the cyber crimes. For recognizing the attack patterns visualization is carried out, so that in presenting this rese…
Congestion is a problem that often occurs in big cities caused by the increasing number of vehicles each year without being accompanied by the expansion of highways. There are 3 methods proposed, n…
Kemacetan lalu lintas masih menjadi permasalahan yang sering dihadapi masyarakat di kota Palembang hingga saat ini masih kesulitan dalam melakukan mobilitas untuk mendukung aktivitas sehari-hari. D…
Botnet is a group of programs that have been infected by malware and connected to the internet network that has been controlled by certain parties. Using Long Short-Term Memory (LSTM) can help dete…
Bruteforce attack is a form of attack to be able to enter network services by making various pairs of usernames and passwords illegally. To avoid this attack you can use different character combina…
Bruteforce attack is an attack that uses the trial-error method to obtain user information, especially passwords. To overcome these problems, previous research has applied learning algorithms to cy…
Brute Force Attack is an attack that targets private information such as usernames, passwords, passphrases and other information. Brute force attack sends combinations continuously in the form of d…
Traffic congestion is currently a major problem in big cities in Indonesia. Therefore, a system for determining the best paths is needed to address traffic congestion issues. This system is part of…
Propagation is the existence of a signal sharing area from one place to another and is one of the most important perspectives of cellular wireless network planning. Prediction of path loss or commo…
Remote Access Trojan (RAT) is a special type of remote access software commonly used for malicious purposes, in which the installation is performed without the user's consent, the remote control th…
The progress of advanced times and modern technology can be utilized and used as well as possible which aims to make work more effective and easier. One of them is by making a house mouse trap that…
Every living thing definitely needs a stable temperature to maintain its life, the need for a stable temperature cannot be denied anymore, because living things as creatures with the highest degree…
This research aims to develop a detection model by combining Convolutional Neural Networks (CNN) and Recurrent Neural Network (RNN) architectures to detect QRS Complex signal waves in fetal electro…
Chili plants have an important role in Indonesian agriculture, but the risk of crop failure due to leaf damage and unsuitable soil moisture often occurs. To overcome this problem, this final projec…
THE SMART DOOR LOCK SECURITY SYSTEM IS DOOR SECURITY WHICH IS USEFUL AS A SECURITY BOOSTER IN THE ROOM AND REDUCES DIRECT CONTACT AND BODY TEMPERATURE DETECTION IN ORDER TO REDUCE THE SPREAD OF VIR…
The development of technology is very rapid so that many applications have emerged, such as smart transportation applications. Smart transport is considered as an umbrella term that includes route …
The increasing use of vehicles in urban areas has resulted in high levels of road congestion. The focus of this research is the application of smart transportation in smart city to find the best ro…
Schizophrenia (SZ) is a brain disease with a chronic condition that affects the ability to think. Common symptoms that are often seen in this disorder are hallucinations, delusions, abnormal behavi…
The problem in this research is that the number of attack data is much less than the number of non-attack samples, which results in a high error rate in attack detection. The use of Support Vector …
A fire is a small or large flame in an unintended place, situation and time that is detrimental and generally difficult to control. Detection tools are needed by the community when a fire occurs. I…
Projek ini memaparkan hasil penelitian tentang perancangan prototipe lampu otomatis dengan kontrol tepuk. Tujuannya adalah untuk merancang sebuat alat kontrol intensitas cahaya lampu menggunakan se…
Coffee is one of the drinks that is in great demand among Indonesian people, because there are many areas of coffee-producing plants, for example, the city of Pagaralam which is a coffee-producing …
The role of technology in vehicle monitoring systems in traffic is still widely used, one of which is the use of RFID (Radio Frequency Identification) technology as a vehicle tracking sensor in tra…
DDoS attacks can cause targeted servers to become slow and web server services unavailable, but DDoS attacks are difficult to detect in a network because their traffic patterns are similar to those…
This study focuses on the dataset from DDoS Attack SDN Dataset (2020) where the Smurf DDoS attack focuses on the ICMP protocol. The purpose of this study is to detect Smurf DDoS attacks on the Soft…
Various kinds of positioning technologies have been used in everyday life. Thetechnology in the service usage system is based on tracking the position of objects or humans, namely Google Maps. RFID…
Recently, Deep Learning-based approaches in the medical field have brought excellent performance in segmentation and object detection. In computer-based methods, image segmentation is a fundamental…
Garba Rujukan Digital (GARUDA) is a digital service used for collecting archives of national publication documents in PDF format. There are sections in the PDF that can be used by hackers to carry …