The title of this research is the Implementation of the End-To-End Encryption Mechanism on IoT Using the Rivest Cipher 4 (RC4) Method. This study aims to implement RC4 cryptography in the process o…
Supervisory Control and Data Acquisition (SCADA) is widely used in industry as a system that is tasked with supervising, controlling while simultaneously collecting data from sensors connected duri…
DoS attack detection is important because SCADA networks are used in large companies, making them vulnerable to attack. In this research, the deep neural network (DNN) method is used to detect DoS …
This study aims to determine the best route using Artificial Intelligence (AI) based on the Particle Swarm Optimization algorithm under road conditions in Palembang City. This research employs You …
Camera PTZ (Pan-tilt-zoom) is a camera that is capable of moving simultaneously horizontal and vertical, PTZ cameras also have features zoom which serves to make frame the camera approaches or move…
Port infrastructure plays an important role in supporting inter-island connectivity and marine transportation services. In this study, we used the K-means clustering method to identify patterns and…
Spyware is one type of malware that threatens computer systems because it can steal users' personal information and sensitive data without their knowledge. Spyware can monitor user activities and s…
Illegal activities such as money laundering using cryptocurrencies represented by Bitcoin have emerged. In this study, a Gated Recurrent Unit (GRU) neural network is used to identify anomalous tran…
In this study, the only parts of the face used were the eyes and mouth. Apart from that, data in facial recognition is also limited, namely a distance of 40-50cm from the camera. This facial recogn…
Congestion is one of the main causes of road users experiencing delays in arriving at their destination. In this study the authors wanted to overcome this problem with the best route determination …
In this study, the You Only Look Once Version 8 (YOLOv8) algorithm was used to detect and use the Supervision library to calculate the number of vehicles violating zebra crossings. The Two Dimensio…
Garba Rujukan Digital (GARUDA) is a Service Provider whice provides information and means which has been produced by research academics in Indonesia, Currently the service (GARUDA) Provides data in…
This research aims to address challenges in Supply Chain Management (SCM) by utilizing Smart Contract Solidity technology and Proof of Authority (PoA) algorithm. The main focus of the research is t…
Supply chain management (SCM) is an important concept in the business world. In the short and long term, implementing SCM can provide benefits for companies, but conventional methods for calculatin…
The main idea of a smart home is a technology that can control devices in the home environment system with an internet connection automatically. As time advances, automation has become a system tha…
Blockchain adalah sebuah metode yang sedang berkembang pesat, terutama dalam aspek keamanan data yang meningkatkan kepercayaan pengguna melalui sistem terdistribusi. Keunggulan transparansi dalam b…
This research aims to investigate the use of Radio Frequency Identification (RFID) technology and Solidity smart contracts in simulating goods delivery in Supply Chain Management (SCM). The chosen …
This research aims to develop a method for detecting Diabetic Retinopathy (DR) in retinal images using the RETINANET architecture with a ResNet-50 backbone. DR is a serious complication in individu…
Clean water is a vital factor for human survival. The concept of adequate drinking water emphasizes water quality that meets health standards and can be consumed directly. Monitoring and managing w…
The study aims to determine the best regression model to measure the linear relationship between electronic media use and sleep duration. as well as testing and measuring the level of impact of ele…
Location detection is a system for detecting and determining the location of an object, thing or person in a certain environment. The RFID system used to capture data uses an RFID reader on tags pl…
Supply Chain Management melibatkan beberapa pihak yang berperan dalam proses pengiriman barang atau jasa sehingga memerlukan transparansi terkait catatan transaksi bagi semua pihak yang terlibat de…
Traffic congestion remains a primary concern in the transportation sector and continues to pose challenges for everyday activities. To address this issue, a system capable of detecting vehicle dens…
The lateral movement is one of the most crucial phases in an Advanced Persistent Threat (APT) attack, aiming to penetrate other resources and gain greater privileges within the target network. Atta…
Technological advances in the field of Computer Vision are increasingly complex, especially in research and industrial needs. Computer Vision allows computers to process and recognize images with a…
Wrong-way traffic violation is often committed by the public and frequently leads to traffic accidents and congestion. This research aims to develop a detection system using the You Only Look Once …
Ancaman keamanan internet sangatlah rentan terhadap serangan dari pihak manapun, termasuk serangan Distributed Denial-of-Services (DDoS). Serangan DDoS mengirimkan paket secara terus menerus sehing…
Jaringan enterprise terbentuk dari banyak router dan tentu memiliki konfigurasi routingnya tersendiri. Dalam penerapannya, setiap protokol routing mempunyai karakteristik algoritmanya masing-masing…