The Sriwijaya University Library

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Login
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
First Page Previous 1 2 3 4 5 Next Last Page
cover
OPTIMALISASI MULTI-CLASSIFICATION SERANGAN CYBER MENGGUNAKAN METODE K-NEAREST…
Yanti, Zuli

Cyber attacks are a form of threat aimed at stealing, damaging, or altering important data within computer systems or networks. These attacks include hacking, phishing, and malware. Detecting cyber…

Edition
-
ISBN/ISSN
-
Collation
xxii, 251 hlm.; tab.; ilus.; 29 cm.
Series Title
-
Call Number
T1431382024
Availability1
Add to basket
View DetailCite
cover
PENERAPAN METODE HYBRID CNN-LSTM DALAM SISTEM DETEKSI MULTI CLASSIFICATION CY…
Fajri, Muhammad

In the rapid development of technology, System and Network Security is very important in the ecosystem of digital communication environments. Machine Learning techniques can be used to solve this p…

Edition
-
ISBN/ISSN
-
Collation
xvi, 164 hlm.; tab.; ilus.; 29 cm.
Series Title
-
Call Number
T1431302024
Availability1
Add to basket
View DetailCite
cover
SISTEM DETEKSI MULTI-CLASSIFICATION SERANGAN CYBER MENGGUNAKAN METODE DEEP LE…
Nurhaliza, Sari

Cyber attacks have become an increasing threat to the security of modern information systems. To overcome the complexity and diversity of attacks that occur, a sophisticated and reliable detection …

Edition
-
ISBN/ISSN
-
Collation
xvi, 187 hlm.; tab.; ilus.; 29 cm.
Series Title
-
Call Number
T1431292024
Availability1
Add to basket
View DetailCite
cover
DETEKSI EXPLOIT REVERSE TCP DARI APK TROJAN PADA NETWORK TRAFFIC DENGAN METOD…
Danuarta, Muhammad Arya

Android menjadi OS paling populer pada perangkat mobile membuatnya menjadi target utama threat actor dalam membuat malware. Beberapa penelitian menunjukkan bahwa deteksi malware pada perangkat mobi…

Edition
-
ISBN/ISSN
-
Collation
xv, 85 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1467452024
Availability1
Add to basket
View DetailCite
cover
SISTEM PENYIRAMAN OTOMATIS PADA TANAMAN SELADA (LACTUCA SATIVA L) BERDASARKAN…
Wahyudi, Mellinio Agung

Watering plants is a tedious thing and is often forgotten by both households and farmers, while plants really need enough water to grow. Seeing these conditions, researchers designed an automation …

Edition
-
ISBN/ISSN
-
Collation
xv, 59 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1425212024
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN TROJAN METASPLOIT PADA ANDROID DENGAN METODE K-MEANS
Setiawan, Hafizd

K-Means clustering is a tool used to determine the cluster structure of a dataset identified by its strong similarity to other clusters or its strong difference from other clusters. In another pape…

Edition
-
ISBN/ISSN
-
Collation
xiii, 46 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1465462024
Availability1
Add to basket
View DetailCite
cover
DETEKSI KEPADATAN KENDARAAN MENGGUNAKAN METODE K-NEAREST NEIGHBOR DIOPTIMASI …
Rahmadinni, Nadila

Growth factors such as economic, social, political, and cultural developments have become one of the traffic problems in Palembang City that has caused the occurrence of traffic density. To avoid g…

Edition
-
ISBN/ISSN
-
Collation
xv, 85 hlm.; tab.; Ilus.; 29 cm
Series Title
-
Call Number
T1492452024
Availability1
Add to basket
View DetailCite
cover
SISTEM TRANSPORTASI PINTAR MENGGUNAKAN METODE ARTIFICIAL NEURAL NETWORK YANG …
Indriyani, Sisca

Traffic congestion is always a primary concern in transportation issues, and it continues to pose challenges in daily activities. To address this problem, a system that can detect vehicle density l…

Edition
-
ISBN/ISSN
-
Collation
xii, 113 hlm.; ilus.; tab.; 28 cm
Series Title
-
Call Number
T1437732024
Availability1
Add to basket
View DetailCite
cover
MULTI-CLASSIFICATION SERANGAN SIBER MENGGUNAKAN METODE SUPPORT VECTOR MACHINE…
Albaqi, Yahadi Rasyid

Cyberattacks are unauthorized attempts to track and disrupt the operation of communication systems and control systems by exploiting the security weaknesses of communication networks. Efforts to pr…

Edition
-
ISBN/ISSN
-
Collation
xvii, 184 hlm.; ilus.; tab.; 28cm
Series Title
-
Call Number
T1440762024
Availability1
Add to basket
View DetailCite
cover
ANALISA KEPADATAN KENDARAAN MENGGUNAKAN METODE K-NN DAN PENENTUAN JALUR TERBA…
Pangestu, Muhammad Anugrah

Tujuan penelitian ini adalah Menganalisis jalur terbaik yang didapatkan berdasarkan hasil algoritma CH pada beberapa kondisi jalan di Kota Palembang. Penelitian dilakukan pada bulan Juni 2023 s.d. …

Edition
-
ISBN/ISSN
-
Collation
xvii, 87 hlm.; ilus.; tab.; 28 cm
Series Title
-
Call Number
T1435582024
Availability1
Add to basket
View DetailCite
cover
OPTIMASI DEPLOYMENT APLIKASI BERBASIS SERVER KE CLOUD ENVIRONMENT DENGAN METO…
Putra, Qory Amanah

Continuous Deployment (CD) is a method of deploying applications to production servers automatically and continuously. This research aims to explore the application of the Continuous Deployment met…

Edition
-
ISBN/ISSN
-
Collation
xvi, 111 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1486862024
Availability1
Add to basket
View DetailCite
cover
DETEKSI ANOMALI TRANSAKSI BITCOIN DENGAN METODE ISOLATION FOREST
Aniska, Agera

Bitcoin, introduced in 2008 by Satoshi Nakamoto, is the first digital currency to use blockchain for secure transactions. Despite its popularity, challenges in detecting illegal or suspicious trans…

Edition
-
ISBN/ISSN
-
Collation
xvii, 126 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1468362024
Availability1
Add to basket
View DetailCite
cover
 IMPUTASI DATA YANG HILANG PADA DATA DERET WAKTU MULTIVARIAT MENGGUNAKAN ARS…
Karim, Muhammad Irfan

Kehilangan data merupakan isu umum dalam berbagai kumpulan data dan menjadi salah satu tantangan paling kompleks dalam ilmu komputer. Masalah ini mempersulit proses pengolahan data karena banyaknya…

Edition
-
ISBN/ISSN
-
Collation
xix, 143 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1464252024
Availability1
Add to basket
View DetailCite
cover
OPTIMALISASI KINERJA APACHE HTTP SERVER DENGAN PENDEKATAN TUNING PARAMETER BE…
Abulkhoir, Syarif

Apache HTTP Server is one of the most widely used web servers today. Despite its advantages in stability and security, the performance of the Apache HTTP Server is often affected by traffic load an…

Edition
-
ISBN/ISSN
-
Collation
xv, 212 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1487702024
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI ALGORITMA ENKRIPSI PADA KOMPUTER KUANTUM
Repaldi, Khalifaturahman Al Hazri

With the computing speed possessed by quantum computers, the security of encryption on classical computers is threatened, especially the security of the RSA encryption algorithm, because it is pred…

Edition
-
ISBN/ISSN
-
Collation
xiv, 159.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1487632024
Availability1
Add to basket
View DetailCite
cover
PENGEMBANGAN MODEL TINGKAT KEPARAHAN KECELAKAAN LAUT MENGGUNAKAN METODE KLASI…
Safitri, Arinda Intan

Maritime transportation plays an important role in international trade, more than 50,000 merchant ships are involved every day and this causes a large opportunity for maritime accidents. Therefore,…

Edition
-
ISBN/ISSN
-
Collation
xv, 58 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1426182024
Availability1
Add to basket
View DetailCite
cover
 SIMULASI METODE PROOF OF WORK (POW) PADA SUPPLY CHAIN MANAGEMENT DI BIDANG …
Wulandari, Anisa

Use of Supply Chain Management (SCM) technology integrated with Smart Contract to increase transparency and data security in the supply chain industry. Several traditional problems in SCM, such as …

Edition
-
ISBN/ISSN
-
Collation
xiv, 98 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1430072024
Availability1
Add to basket
View DetailCite
cover
DETEKSI MALWARE ANDROID MENGGUNAKAN METODE CONVOLUTIONAL NEURAL NETWORK (CNN)
Hidayatullah, Hidayatullah

As the most widely used mobile operating system, Android is increasingly becoming a prime target for malware attacks. The popularity of this operating system makes it attractive for cyber security …

Edition
-
ISBN/ISSN
-
Collation
xvi, 41 hlm.; tab.; Ilus.; 29 cm
Series Title
-
Call Number
T1481942024
Availability1
Add to basket
View DetailCite
cover
 ANALISA KEPADATAN KENDARAAN MENGGUNAKAN ALGORITMA CONVOLUTIONAL NEURAL NETW…
Agistina, Titin

Pada penerapan AI untuk menentukan kepadatan kendaraan di kota Palembang yang terpantau oleh kamera penulis menggunakan algoritma Convolutional Neural Network. kemudian untuk Mencari rute terbaik d…

Edition
-
ISBN/ISSN
-
Collation
xvi, 99 hlm.; tab.; ilus.; 29 cm.
Series Title
-
Call Number
T1431372024
Availability1
Add to basket
View DetailCite
cover
ANALISA FORENSIK PEMALSUAN TIMESTAMP PADA NEW TECHNOLOGY FILE SYSTEM (NTFS)
Gustiawan, Rizky Soufi

Digital Forensics is a part of forensic science that includes inventions and Data investigation on a digital device that aims to prove scientific computer crimes in order to obtain digital evidence…

Edition
-
ISBN/ISSN
-
Collation
xvi, 55 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T393762020
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI MEKANISME END-TO-END ENCRYPTION PADA IOT MENGGUNAKAN METODE RIVE…
Panjaitan, Stevanus Christivan

The title of this research is the Implementation of the End-To-End Encryption Mechanism on IoT Using the Rivest Cipher 4 (RC4) Method. This study aims to implement RC4 cryptography in the process o…

Edition
-
ISBN/ISSN
-
Collation
xiv, 52 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T395422020
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN DENIAL OF SERVICE (DOS) PADA JARINGAN IEC 61850 SUPERVISORY …
Rinaldi, Muhammad Zaman

Supervisory Control and Data Acquisition (SCADA) is widely used in industry as a system that is tasked with supervising, controlling while simultaneously collecting data from sensors connected duri…

Edition
-
ISBN/ISSN
-
Collation
xiii, 34 hlm.; tab.; illus.; 29 cm
Series Title
-
Call Number
T1459642024
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN DENIAL OF SERVICE (DOS) PADA PROTOCOL JARINGAN IEC 61850 SUP…
Fahd, Mohammad At'thawri Abel

DoS attack detection is important because SCADA networks are used in large companies, making them vulnerable to attack. In this research, the deep neural network (DNN) method is used to detect DoS …

Edition
-
ISBN/ISSN
-
Collation
xiii, 42 hlm.; tab.; illus.; 29 cm
Series Title
-
Call Number
T1460302024
Availability1
Add to basket
View DetailCite
cover
 PENENTUAN JALUR TERBAIK MENGGUNAKAN ALGORITMA PARTICLE SWARM OPTIMIZATION B…
Nissa, Cikal Khairrun

This study aims to determine the best route using Artificial Intelligence (AI) based on the Particle Swarm Optimization algorithm under road conditions in Palembang City. This research employs You …

Edition
-
ISBN/ISSN
-
Collation
xvii, 84 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1464932024
Availability1
Add to basket
View DetailCite
cover
OTOMATISASI GERAK KAMERA BERDASARKANSENSOR PASSIVE INFRA RED (PIR) MENGGUNAKA…
Ramadhani, Angga

Camera PTZ (Pan-tilt-zoom) is a camera that is capable of moving simultaneously horizontal and vertical, PTZ cameras also have features zoom which serves to make frame the camera approaches or move…

Edition
-
ISBN/ISSN
-
Collation
xv, 68 hlm.; ilus.; tab.; 21 cm.
Series Title
-
Call Number
T1425442024
Availability1
Add to basket
View DetailCite
cover
ANALISIS DATA PENUMPANG KAPAL PROVINSI DKI JAKARTA MENGGUNAKAN METODE CLUSTER…
Febrianti, Rani

Port infrastructure plays an important role in supporting inter-island connectivity and marine transportation services. In this study, we used the K-means clustering method to identify patterns and…

Edition
-
ISBN/ISSN
-
Collation
xiv, 67 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1461072024
Availability1
Add to basket
View DetailCite
cover
LASIFIKASI SERANGAN SPYWARE DENGAN MENGGUNAKAN METODE K-NEAREST NEIGHBORS (KNN)
Pederson, Mulki

Spyware is one type of malware that threatens computer systems because it can steal users' personal information and sensitive data without their knowledge. Spyware can monitor user activities and s…

Edition
-
ISBN/ISSN
-
Collation
xiii, 59 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1467702024
Availability1
Add to basket
View DetailCite
cover
DETEKSI TRANSAKSI ANOMALI PADA BLOKCHAIN DENGAN MENGGUNAKAN METODE GATED RECU…
Muhammad, Faisal Soultan

Illegal activities such as money laundering using cryptocurrencies represented by Bitcoin have emerged. In this study, a Gated Recurrent Unit (GRU) neural network is used to identify anomalous tran…

Edition
-
ISBN/ISSN
-
Collation
xiii, 62 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1462932024
Availability1
Add to basket
View DetailCite
cover
 IMPLEMENTASI PENGENALAN WAJAH PADA MIKROKONTROLLER DENGAN METODE WEIGHTLESS…
Fadillah, Ammarrasyid

In this study, the only parts of the face used were the eyes and mouth. Apart from that, data in facial recognition is also limited, namely a distance of 40-50cm from the camera. This facial recogn…

Edition
-
ISBN/ISSN
-
Collation
xiii, 44 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1393082024
Availability1
Add to basket
View DetailCite
cover
PENERAPAN SMART TRANSPORTATION PADA SMART CITY UNTUK MENENTUKAN RUTE TERBAIK …
Alpina, Muhammad

Congestion is one of the main causes of road users experiencing delays in arriving at their destination. In this study the authors wanted to overcome this problem with the best route determination …

Edition
-
ISBN/ISSN
-
Collation
xiv, 94 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1217932023
Availability1
Add to basket
View DetailCite
First Page Previous 1 2 3 4 5 Next Last Page

Search Result

Found 228 from your keywords: Subject : "Prodi Sistem Komputer,"
You currently on page 2 of 8 page(s)
Query took 0.03377 second(s) to complete
XML ResultJSON Result

Suggestion
image
IMPLEMENTASI DIMENSI BUDAYA KESELAMATAN DAN KESEHATAN KERJA PADA KARYAWAN PERUSAHAAN PT. PERTAMINA PHE CENTRAL PLANT FLOW STATION OFFSHORE NORTH WEST JAVA
Wigerar, Songo
image
ASESMEN PEMBELAJARAN
Hariyanto, Hariyanto - Basuki, Ismet - Mulawati, Nita Nur
image
ANALISA INTENSITAS HUJAN BERDASARKAN DATA HUJAN HARIAN DAN JAM-JAMAN KABUPATEN MUARA ENIM
Sulistyo, Tri
image
PERBAIKAN KUALITAS CITRA CHEST X-RAY DENGAN METODE CONVOLUTIONAL NEURAL NETWORK
Arfandi, Muhammad Irvan
image
ADZ-DZIKRAA: terjemah & tafsir ALQUR'AN dalam huruf Arab & Latin juz 21 - 25
Surin, Bachtiar
The Sriwijaya University Library
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search