Growth factors such as economic, social, political, and cultural developments have become one of the traffic problems in Palembang City that has caused the occurrence of traffic density. To avoid g…
Traffic congestion is always a primary concern in transportation issues, and it continues to pose challenges in daily activities. To address this problem, a system that can detect vehicle density l…
Cyberattacks are unauthorized attempts to track and disrupt the operation of communication systems and control systems by exploiting the security weaknesses of communication networks. Efforts to pr…
Tujuan penelitian ini adalah Menganalisis jalur terbaik yang didapatkan berdasarkan hasil algoritma CH pada beberapa kondisi jalan di Kota Palembang. Penelitian dilakukan pada bulan Juni 2023 s.d. …
Continuous Deployment (CD) is a method of deploying applications to production servers automatically and continuously. This research aims to explore the application of the Continuous Deployment met…
Bitcoin, introduced in 2008 by Satoshi Nakamoto, is the first digital currency to use blockchain for secure transactions. Despite its popularity, challenges in detecting illegal or suspicious trans…
Kehilangan data merupakan isu umum dalam berbagai kumpulan data dan menjadi salah satu tantangan paling kompleks dalam ilmu komputer. Masalah ini mempersulit proses pengolahan data karena banyaknya…
In the application of Artificial Intelligence to determine the best route as a means to alleviate traffic congestion in the city of Palembang, the author uses the Glowworm Swarm Optimization (GSO) …
Apache HTTP Server is one of the most widely used web servers today. Despite its advantages in stability and security, the performance of the Apache HTTP Server is often affected by traffic load an…
With the computing speed possessed by quantum computers, the security of encryption on classical computers is threatened, especially the security of the RSA encryption algorithm, because it is pred…
Maritime transportation plays an important role in international trade, more than 50,000 merchant ships are involved every day and this causes a large opportunity for maritime accidents. Therefore,…
Use of Supply Chain Management (SCM) technology integrated with Smart Contract to increase transparency and data security in the supply chain industry. Several traditional problems in SCM, such as …
As the most widely used mobile operating system, Android is increasingly becoming a prime target for malware attacks. The popularity of this operating system makes it attractive for cyber security …
Pada penerapan AI untuk menentukan kepadatan kendaraan di kota Palembang yang terpantau oleh kamera penulis menggunakan algoritma Convolutional Neural Network. kemudian untuk Mencari rute terbaik d…
Digital Forensics is a part of forensic science that includes inventions and Data investigation on a digital device that aims to prove scientific computer crimes in order to obtain digital evidence…
The title of this research is the Implementation of the End-To-End Encryption Mechanism on IoT Using the Rivest Cipher 4 (RC4) Method. This study aims to implement RC4 cryptography in the process o…
Supervisory Control and Data Acquisition (SCADA) is widely used in industry as a system that is tasked with supervising, controlling while simultaneously collecting data from sensors connected duri…
DoS attack detection is important because SCADA networks are used in large companies, making them vulnerable to attack. In this research, the deep neural network (DNN) method is used to detect DoS …
This study aims to determine the best route using Artificial Intelligence (AI) based on the Particle Swarm Optimization algorithm under road conditions in Palembang City. This research employs You …
Camera PTZ (Pan-tilt-zoom) is a camera that is capable of moving simultaneously horizontal and vertical, PTZ cameras also have features zoom which serves to make frame the camera approaches or move…
Port infrastructure plays an important role in supporting inter-island connectivity and marine transportation services. In this study, we used the K-means clustering method to identify patterns and…
Spyware is one type of malware that threatens computer systems because it can steal users' personal information and sensitive data without their knowledge. Spyware can monitor user activities and s…
Illegal activities such as money laundering using cryptocurrencies represented by Bitcoin have emerged. In this study, a Gated Recurrent Unit (GRU) neural network is used to identify anomalous tran…
In this study, the only parts of the face used were the eyes and mouth. Apart from that, data in facial recognition is also limited, namely a distance of 40-50cm from the camera. This facial recogn…
Congestion is one of the main causes of road users experiencing delays in arriving at their destination. In this study the authors wanted to overcome this problem with the best route determination …
In this study, the You Only Look Once Version 8 (YOLOv8) algorithm was used to detect and use the Supervision library to calculate the number of vehicles violating zebra crossings. The Two Dimensio…
Garba Rujukan Digital (GARUDA) is a Service Provider whice provides information and means which has been produced by research academics in Indonesia, Currently the service (GARUDA) Provides data in…
This research aims to address challenges in Supply Chain Management (SCM) by utilizing Smart Contract Solidity technology and Proof of Authority (PoA) algorithm. The main focus of the research is t…
Supply chain management (SCM) is an important concept in the business world. In the short and long term, implementing SCM can provide benefits for companies, but conventional methods for calculatin…