Photo studio is a company engaged in the field of photography and video recording services. Lack of information about pre-wedding photo studios in Palembang City is one of the reasons why many pre-…
Clickbait is a term that describes a title with the aim of attracting the reader's interest by using flashy and provocative word choices. The problem faced if clickbait detection is done manually i…
DDoS attacks are one of the main threats to security issues on the internet today which have quite a severe impact. As for knowing the best DDoS attack detection, this study applies several selecti…
Dengue Hemorrhagic Fever (DHF) is a disease caused by infected mosquitoes, especially Aedes albopictus and Aedes aegypti mosquitoes. Dengue hemorrhagic fever is included in the category of dangerou…
Brute force is one of many attacks that are often used by hackers in carrying out the cyber crimes. For recognizing the attack patterns visualization is carried out, so that in presenting this rese…
Congestion is a problem that often occurs in big cities caused by the increasing number of vehicles each year without being accompanied by the expansion of highways. There are 3 methods proposed, n…
Kemacetan lalu lintas masih menjadi permasalahan yang sering dihadapi masyarakat di kota Palembang hingga saat ini masih kesulitan dalam melakukan mobilitas untuk mendukung aktivitas sehari-hari. D…
The process of recognizing numbers in digital prayer beads requires an appropriate method for recognizing numbers. The challenge that arises in the prayer beads image is to have a small image displ…
Algoritma k-Nearest Neighbor (kNN) merupakan algoritma yang paling sederhana diantara algoritma machine learning namun algoritma kNN memiliki kelemahan seperti nilai k yang bias mudah terkecoh deng…
Botnet is a group of programs that have been infected by malware and connected to the internet network that has been controlled by certain parties. Using Long Short-Term Memory (LSTM) can help dete…
Pemakaian masker wajah yang diberlakukan saat Pandemi Covid-19 menyebabkan oklusi parsial pada fitur-fitur wajah. Hal ini berakibat identitas seseorang sulit dikenali oleh sistem pengenalan. Peneli…
Classification of diabetes data can be implemented using several different methods, one of which is Learning Vector Quantization. Nevertheless, the output obtained from this method could not always…
Bruteforce attack is a form of attack to be able to enter network services by making various pairs of usernames and passwords illegally. To avoid this attack you can use different character combina…
Bruteforce attack is an attack that uses the trial-error method to obtain user information, especially passwords. To overcome these problems, previous research has applied learning algorithms to cy…
Brute Force Attack is an attack that targets private information such as usernames, passwords, passphrases and other information. Brute force attack sends combinations continuously in the form of d…
Clustering is one of several techniques used in data mining, which is to group data based on the degree of similarity. The greater the degree of similarity of the data, it will be placed in the sam…
Chronic kidney disease is a global public health problem with a high incidence rate. About one-tenth of the world's population suffers from this disease. The high number of sufferers is accompanied…
Traffic congestion is currently a major problem in big cities in Indonesia. Therefore, a system for determining the best paths is needed to address traffic congestion issues. This system is part of…
Anxiety disorders are mental disorders in which sufferers experience excessive anxiety. Many people don't realize that they may have an anxiety disorder. In this study, an expert system for diagnos…
Propagation is the existence of a signal sharing area from one place to another and is one of the most important perspectives of cellular wireless network planning. Prediction of path loss or commo…
Remote Access Trojan (RAT) is a special type of remote access software commonly used for malicious purposes, in which the installation is performed without the user's consent, the remote control th…
The progress of advanced times and modern technology can be utilized and used as well as possible which aims to make work more effective and easier. One of them is by making a house mouse trap that…
Every living thing definitely needs a stable temperature to maintain its life, the need for a stable temperature cannot be denied anymore, because living things as creatures with the highest degree…
Price fluctuation of urea fertilizer can result the difference between the selling price and production costs to be low, or even cause losses. In order to reduce the possibility of loss, a way is n…
This research aims to develop a detection model by combining Convolutional Neural Networks (CNN) and Recurrent Neural Network (RNN) architectures to detect QRS Complex signal waves in fetal electro…
Chili plants have an important role in Indonesian agriculture, but the risk of crop failure due to leaf damage and unsuitable soil moisture often occurs. To overcome this problem, this final projec…
The teeth and mouth are some of the important parts of the body that receive food, fluids, and are also one of the organs involved in the digestive process. However, dental and mouth health should …
The development of technology is very rapid so that many applications have emerged, such as smart transportation applications. Smart transport is considered as an umbrella term that includes route …
The increasing use of vehicles in urban areas has resulted in high levels of road congestion. The focus of this research is the application of smart transportation in smart city to find the best ro…
Schizophrenia (SZ) is a brain disease with a chronic condition that affects the ability to think. Common symptoms that are often seen in this disorder are hallucinations, delusions, abnormal behavi…