The Sriwijaya University Library

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Login
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
First Page Previous 1 2 3 4 5 Next Last Page
cover
DETEKSI KEPADATAN KENDARAAN MENGGUNAKAN METODE K-NEAREST NEIGHBOR DIOPTIMASI …
Rahmadinni, Nadila

Growth factors such as economic, social, political, and cultural developments have become one of the traffic problems in Palembang City that has caused the occurrence of traffic density. To avoid g…

Edition
-
ISBN/ISSN
-
Collation
xv, 85 hlm.; tab.; Ilus.; 29 cm
Series Title
-
Call Number
T1492452024
Availability1
Add to basket
View DetailCite
cover
SISTEM TRANSPORTASI PINTAR MENGGUNAKAN METODE ARTIFICIAL NEURAL NETWORK YANG …
Indriyani, Sisca

Traffic congestion is always a primary concern in transportation issues, and it continues to pose challenges in daily activities. To address this problem, a system that can detect vehicle density l…

Edition
-
ISBN/ISSN
-
Collation
xii, 113 hlm.; ilus.; tab.; 28 cm
Series Title
-
Call Number
T1437732024
Availability1
Add to basket
View DetailCite
cover
MULTI-CLASSIFICATION SERANGAN SIBER MENGGUNAKAN METODE SUPPORT VECTOR MACHINE…
Albaqi, Yahadi Rasyid

Cyberattacks are unauthorized attempts to track and disrupt the operation of communication systems and control systems by exploiting the security weaknesses of communication networks. Efforts to pr…

Edition
-
ISBN/ISSN
-
Collation
xvii, 184 hlm.; ilus.; tab.; 28cm
Series Title
-
Call Number
T1440762024
Availability1
Add to basket
View DetailCite
cover
ANALISA KEPADATAN KENDARAAN MENGGUNAKAN METODE K-NN DAN PENENTUAN JALUR TERBA…
Pangestu, Muhammad Anugrah

Tujuan penelitian ini adalah Menganalisis jalur terbaik yang didapatkan berdasarkan hasil algoritma CH pada beberapa kondisi jalan di Kota Palembang. Penelitian dilakukan pada bulan Juni 2023 s.d. …

Edition
-
ISBN/ISSN
-
Collation
xvii, 87 hlm.; ilus.; tab.; 28 cm
Series Title
-
Call Number
T1435582024
Availability1
Add to basket
View DetailCite
cover
OPTIMASI DEPLOYMENT APLIKASI BERBASIS SERVER KE CLOUD ENVIRONMENT DENGAN METO…
Putra, Qory Amanah

Continuous Deployment (CD) is a method of deploying applications to production servers automatically and continuously. This research aims to explore the application of the Continuous Deployment met…

Edition
-
ISBN/ISSN
-
Collation
xvi, 111 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1486862024
Availability1
Add to basket
View DetailCite
cover
DETEKSI ANOMALI TRANSAKSI BITCOIN DENGAN METODE ISOLATION FOREST
Aniska, Agera

Bitcoin, introduced in 2008 by Satoshi Nakamoto, is the first digital currency to use blockchain for secure transactions. Despite its popularity, challenges in detecting illegal or suspicious trans…

Edition
-
ISBN/ISSN
-
Collation
xvii, 126 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1468362024
Availability1
Add to basket
View DetailCite
cover
 IMPUTASI DATA YANG HILANG PADA DATA DERET WAKTU MULTIVARIAT MENGGUNAKAN ARS…
Karim, Muhammad Irfan

Kehilangan data merupakan isu umum dalam berbagai kumpulan data dan menjadi salah satu tantangan paling kompleks dalam ilmu komputer. Masalah ini mempersulit proses pengolahan data karena banyaknya…

Edition
-
ISBN/ISSN
-
Collation
xix, 143 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1464252024
Availability1
Add to basket
View DetailCite
cover
PENENTUAN JALUR TERBAIK MENGGUNAKAN ALGORITMA GLOWWORM SWARM OPTIMIZATION BER…
Sholikah, Maratus

In the application of Artificial Intelligence to determine the best route as a means to alleviate traffic congestion in the city of Palembang, the author uses the Glowworm Swarm Optimization (GSO) …

Edition
-
ISBN/ISSN
-
Collation
xvii, 82 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1464912024
Availability1
Add to basket
View DetailCite
cover
OPTIMALISASI KINERJA APACHE HTTP SERVER DENGAN PENDEKATAN TUNING PARAMETER BE…
Abulkhoir, Syarif

Apache HTTP Server is one of the most widely used web servers today. Despite its advantages in stability and security, the performance of the Apache HTTP Server is often affected by traffic load an…

Edition
-
ISBN/ISSN
-
Collation
xv, 212 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1487702024
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI ALGORITMA ENKRIPSI PADA KOMPUTER KUANTUM
Repaldi, Khalifaturahman Al Hazri

With the computing speed possessed by quantum computers, the security of encryption on classical computers is threatened, especially the security of the RSA encryption algorithm, because it is pred…

Edition
-
ISBN/ISSN
-
Collation
xiv, 159.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1487632024
Availability1
Add to basket
View DetailCite
cover
PENGEMBANGAN MODEL TINGKAT KEPARAHAN KECELAKAAN LAUT MENGGUNAKAN METODE KLASI…
Safitri, Arinda Intan

Maritime transportation plays an important role in international trade, more than 50,000 merchant ships are involved every day and this causes a large opportunity for maritime accidents. Therefore,…

Edition
-
ISBN/ISSN
-
Collation
xv, 58 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1426182024
Availability1
Add to basket
View DetailCite
cover
 SIMULASI METODE PROOF OF WORK (POW) PADA SUPPLY CHAIN MANAGEMENT DI BIDANG …
Wulandari, Anisa

Use of Supply Chain Management (SCM) technology integrated with Smart Contract to increase transparency and data security in the supply chain industry. Several traditional problems in SCM, such as …

Edition
-
ISBN/ISSN
-
Collation
xiv, 98 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1430072024
Availability1
Add to basket
View DetailCite
cover
DETEKSI MALWARE ANDROID MENGGUNAKAN METODE CONVOLUTIONAL NEURAL NETWORK (CNN)
Hidayatullah, Hidayatullah

As the most widely used mobile operating system, Android is increasingly becoming a prime target for malware attacks. The popularity of this operating system makes it attractive for cyber security …

Edition
-
ISBN/ISSN
-
Collation
xvi, 41 hlm.; tab.; Ilus.; 29 cm
Series Title
-
Call Number
T1481942024
Availability1
Add to basket
View DetailCite
cover
 ANALISA KEPADATAN KENDARAAN MENGGUNAKAN ALGORITMA CONVOLUTIONAL NEURAL NETW…
Agistina, Titin

Pada penerapan AI untuk menentukan kepadatan kendaraan di kota Palembang yang terpantau oleh kamera penulis menggunakan algoritma Convolutional Neural Network. kemudian untuk Mencari rute terbaik d…

Edition
-
ISBN/ISSN
-
Collation
xvi, 99 hlm.; tab.; ilus.; 29 cm.
Series Title
-
Call Number
T1431372024
Availability1
Add to basket
View DetailCite
cover
ANALISA FORENSIK PEMALSUAN TIMESTAMP PADA NEW TECHNOLOGY FILE SYSTEM (NTFS)
Gustiawan, Rizky Soufi

Digital Forensics is a part of forensic science that includes inventions and Data investigation on a digital device that aims to prove scientific computer crimes in order to obtain digital evidence…

Edition
-
ISBN/ISSN
-
Collation
xvi, 55 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T393762020
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI MEKANISME END-TO-END ENCRYPTION PADA IOT MENGGUNAKAN METODE RIVE…
Panjaitan, Stevanus Christivan

The title of this research is the Implementation of the End-To-End Encryption Mechanism on IoT Using the Rivest Cipher 4 (RC4) Method. This study aims to implement RC4 cryptography in the process o…

Edition
-
ISBN/ISSN
-
Collation
xiv, 52 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T395422020
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN DENIAL OF SERVICE (DOS) PADA JARINGAN IEC 61850 SUPERVISORY …
Rinaldi, Muhammad Zaman

Supervisory Control and Data Acquisition (SCADA) is widely used in industry as a system that is tasked with supervising, controlling while simultaneously collecting data from sensors connected duri…

Edition
-
ISBN/ISSN
-
Collation
xiii, 34 hlm.; tab.; illus.; 29 cm
Series Title
-
Call Number
T1459642024
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN DENIAL OF SERVICE (DOS) PADA PROTOCOL JARINGAN IEC 61850 SUP…
Fahd, Mohammad At'thawri Abel

DoS attack detection is important because SCADA networks are used in large companies, making them vulnerable to attack. In this research, the deep neural network (DNN) method is used to detect DoS …

Edition
-
ISBN/ISSN
-
Collation
xiii, 42 hlm.; tab.; illus.; 29 cm
Series Title
-
Call Number
T1460302024
Availability1
Add to basket
View DetailCite
cover
 PENENTUAN JALUR TERBAIK MENGGUNAKAN ALGORITMA PARTICLE SWARM OPTIMIZATION B…
Nissa, Cikal Khairrun

This study aims to determine the best route using Artificial Intelligence (AI) based on the Particle Swarm Optimization algorithm under road conditions in Palembang City. This research employs You …

Edition
-
ISBN/ISSN
-
Collation
xvii, 84 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1464932024
Availability1
Add to basket
View DetailCite
cover
OTOMATISASI GERAK KAMERA BERDASARKANSENSOR PASSIVE INFRA RED (PIR) MENGGUNAKA…
Ramadhani, Angga

Camera PTZ (Pan-tilt-zoom) is a camera that is capable of moving simultaneously horizontal and vertical, PTZ cameras also have features zoom which serves to make frame the camera approaches or move…

Edition
-
ISBN/ISSN
-
Collation
xv, 68 hlm.; ilus.; tab.; 21 cm.
Series Title
-
Call Number
T1425442024
Availability1
Add to basket
View DetailCite
cover
ANALISIS DATA PENUMPANG KAPAL PROVINSI DKI JAKARTA MENGGUNAKAN METODE CLUSTER…
Febrianti, Rani

Port infrastructure plays an important role in supporting inter-island connectivity and marine transportation services. In this study, we used the K-means clustering method to identify patterns and…

Edition
-
ISBN/ISSN
-
Collation
xiv, 67 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1461072024
Availability1
Add to basket
View DetailCite
cover
LASIFIKASI SERANGAN SPYWARE DENGAN MENGGUNAKAN METODE K-NEAREST NEIGHBORS (KNN)
Pederson, Mulki

Spyware is one type of malware that threatens computer systems because it can steal users' personal information and sensitive data without their knowledge. Spyware can monitor user activities and s…

Edition
-
ISBN/ISSN
-
Collation
xiii, 59 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1467702024
Availability1
Add to basket
View DetailCite
cover
DETEKSI TRANSAKSI ANOMALI PADA BLOKCHAIN DENGAN MENGGUNAKAN METODE GATED RECU…
Muhammad, Faisal Soultan

Illegal activities such as money laundering using cryptocurrencies represented by Bitcoin have emerged. In this study, a Gated Recurrent Unit (GRU) neural network is used to identify anomalous tran…

Edition
-
ISBN/ISSN
-
Collation
xiii, 62 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1462932024
Availability1
Add to basket
View DetailCite
cover
 IMPLEMENTASI PENGENALAN WAJAH PADA MIKROKONTROLLER DENGAN METODE WEIGHTLESS…
Fadillah, Ammarrasyid

In this study, the only parts of the face used were the eyes and mouth. Apart from that, data in facial recognition is also limited, namely a distance of 40-50cm from the camera. This facial recogn…

Edition
-
ISBN/ISSN
-
Collation
xiii, 44 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1393082024
Availability1
Add to basket
View DetailCite
cover
PENERAPAN SMART TRANSPORTATION PADA SMART CITY UNTUK MENENTUKAN RUTE TERBAIK …
Alpina, Muhammad

Congestion is one of the main causes of road users experiencing delays in arriving at their destination. In this study the authors wanted to overcome this problem with the best route determination …

Edition
-
ISBN/ISSN
-
Collation
xiv, 94 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1217932023
Availability1
Add to basket
View DetailCite
cover
DETEKSI PELANGGARAN KENDARAAN PADA ZEBRA CROSS MENGGUNAKAN SUPERVISION DAN PE…
Saragih, Muhammad Fachri 

In this study, the You Only Look Once Version 8 (YOLOv8) algorithm was used to detect and use the Supervision library to calculate the number of vehicles violating zebra crossings. The Two Dimensio…

Edition
-
ISBN/ISSN
-
Collation
xvi, 84 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1378272024
Availability1
Add to basket
View DetailCite
cover
SIMULASI SUPPLY CHAIN MANAGEMENT (SCM) PADA PERDAGANGAN SPAREPART MOBIL MENGG…
Amin, M. Helmi Izzati

Edition
-
ISBN/ISSN
-
Collation
vii, 126 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1395812024

Edition
-
ISBN/ISSN
-
Collation
vii, 126 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1395812024
Availability1
Add to basket
View DetailCite
cover
PENERAPAN RANDOM FOREST CLASSIFIER UNTUK DETEKSI PDF MALWARE PADA LAYANAN AGR…
Fatmawati, Alfiah Nur

Garba Rujukan Digital (GARUDA) is a Service Provider whice provides information and means which has been produced by research academics in Indonesia, Currently the service (GARUDA) Provides data in…

Edition
-
ISBN/ISSN
-
Collation
xiii, 54 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1399602024
Availability1
Add to basket
View DetailCite
cover
SIMULASI SUPPLY CHAIN MANAGEMENT PADA PERDAGANGAN ALAT KOMPUTER MENGGUNAKAN R…
Farabi, Al

This research aims to address challenges in Supply Chain Management (SCM) by utilizing Smart Contract Solidity technology and Proof of Authority (PoA) algorithm. The main focus of the research is t…

Edition
-
ISBN/ISSN
-
Collation
xviii, 143 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1393532024
Availability1
Add to basket
View DetailCite
cover
UJI KELAYAKAN SOFTWARE MENGGUNAKAN METODE WHITE BOX PADA SISTEM MANAJEMEN STO…
Harahap, M Al Insyirah Satria

Supply chain management (SCM) is an important concept in the business world. In the short and long term, implementing SCM can provide benefits for companies, but conventional methods for calculatin…

Edition
-
ISBN/ISSN
-
Collation
xv, 67 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1397032024
Availability1
Add to basket
View DetailCite
First Page Previous 1 2 3 4 5 Next Last Page

Search Result

Found 474 from your keywords: Subject : "Sistem komputer"
You currently on page 2 of 16 page(s)
Query took 0.02745 second(s) to complete
XML ResultJSON Result

Suggestion
image
THE ART OF COMPUTER-GUIDED IMPLANTOLOGY
Tardieu, Philippe B - Alan L. Rosenfeld
image
The Myopias: BASIC SCIENCE AND CLINICAL MANAGEMENT
Curtin, Brian J
image
DAMPAK PERTAMBANGAN BATUBARA TERHADAP EKONOMI DAN LINGKUNGAN PETANI KARET DI DESA ULAK LEBAR KECAMATAN LAHAT KABUPATEN LAHAT
Sari, Anggun Tri Puspa
image
ARSITEKTUR KOLONIAL BELANDA DI INDONESIA
Sumalyo, Yulianto
image
ECONOMIC INDICATORS
Plocek, Joseph E
The Sriwijaya University Library
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search