This study focuses on the dataset from DDoS Attack SDN Dataset (2020) where the Smurf DDoS attack focuses on the ICMP protocol. The purpose of this study is to detect Smurf DDoS attacks on the Soft…
Various kinds of positioning technologies have been used in everyday life. Thetechnology in the service usage system is based on tracking the position of objects or humans, namely Google Maps. RFID…
Riding safety on a motorcycle is something that must be done. Safety devices like helmets there are currently only able to protect without being able to give a warning to the user. Therefore, an ea…
ABSTRAK PENENTUAN PENJUALAN CROSS SELLING PRODUK MENGGUNAKAN TEKNIK ASSOCIATION RULES PADA PT DEWI ERGE NAULI Oleh Zulfadhli Syarif 09031381720012 PT DEWI ERGE NAULI merupakan salah satu retail sto…
Penelitian ini merupakan penelitian pengembangan atau research & development (R&D) yang bertujuan untuk menghasilkan instrumen penilaian pada mata kuliah pendahuluan fisika inti berbasis komputer y…
Recently, Deep Learning-based approaches in the medical field have brought excellent performance in segmentation and object detection. In computer-based methods, image segmentation is a fundamental…
Garba Rujukan Digital (GARUDA) is a digital service used for collecting archives of national publication documents in PDF format. There are sections in the PDF that can be used by hackers to carry …
Fetal head reconstruction is usually used by doctors as a process to determine the condition of the fetus. This process takes a very long time and draining the mind,because to do this process is ve…
SQL Injection is an attack technique by entering malicious SQL commands (queries) and can manipulate command logic to gain access to databases and other sensitive information. The main aim of this …
Electrodiagram (ECG) is a graph that depicts a recording of the electrical activity of the heart through electrodes placed on the body. EKG is one of the medical devices that has a function in assi…
In the security sector, malware that specifically attacks smartphones is growing faster and more sophisticated. Malware is becoming more and more powerful in carrying out criminal acts, such as ste…
SCADA is an industrial control system with an access control network that monitors and manages industrial processes remotely. The increasing development of the internet, especially in the industria…
The head of the fetus is one part that is widely studied by experts because it has important information related to the health condition of the fetus. Research in the field of the fetal head requir…
Botnets are one of the most serious threats to the internet because they are able to provide a platform that can be distributed to illegal activities such as various attacks on the internet. One of…