Various kinds of positioning technologies have been used in everyday life. Thetechnology in the service usage system is based on tracking the position of objects or humans, namely Google Maps. RFID…
Recently, Deep Learning-based approaches in the medical field have brought excellent performance in segmentation and object detection. In computer-based methods, image segmentation is a fundamental…
Garba Rujukan Digital (GARUDA) is a digital service used for collecting archives of national publication documents in PDF format. There are sections in the PDF that can be used by hackers to carry …
Fetal head reconstruction is usually used by doctors as a process to determine the condition of the fetus. This process takes a very long time and draining the mind,because to do this process is ve…
SQL Injection is an attack technique by entering malicious SQL commands (queries) and can manipulate command logic to gain access to databases and other sensitive information. The main aim of this …
Electrodiagram (ECG) is a graph that depicts a recording of the electrical activity of the heart through electrodes placed on the body. EKG is one of the medical devices that has a function in assi…
In the security sector, malware that specifically attacks smartphones is growing faster and more sophisticated. Malware is becoming more and more powerful in carrying out criminal acts, such as ste…
SCADA is an industrial control system with an access control network that monitors and manages industrial processes remotely. The increasing development of the internet, especially in the industria…
The head of the fetus is one part that is widely studied by experts because it has important information related to the health condition of the fetus. Research in the field of the fetal head requir…
Botnets are one of the most serious threats to the internet because they are able to provide a platform that can be distributed to illegal activities such as various attacks on the internet. One of…
Researchers especially in the medical field have done a lot of research on the fetus. Where the research has a long process and requires a large amount of money. Research on the fetal head can be c…
Deteksi Wajah merupakan tahap awal sebelum melakukan proses Pengenalan Wajah. Manusia memiliki ciri dan bentuk wajah yang berbeda-beda. Seperti bentuk mata dan mulut. Tujuan penelitian ini melakuka…
Quality Of Service (QoS) is the ability of a network to provide better service to users by dividing bandwidth according to the needs used. Disturbances in data traffic can affect the decrease in Qo…
Face recognition is one of the technologies in Computer Vision that is widely used in recognizing someone. Face recognition uses facial pixel data in doing recognition. In this research, the reduct…
At this time the smartphone market penetration continues to grow along with technological developments. Therefore, position detection in closed areas has become an important area of research. IPS o…
The most important thing to know about fetal development is the development of heart. The first step in automated analysis of fetal heart chambers is to locate the four important chambers of fetal …
Unsupervised feature extraction and selection algorithms, which are widely used to perform dimensionality reduction tasks to avoid overfitting. Machine Learning is a machine learning system in an a…
The Portable Document Format (PDF) is one of the most commonly used document reader formats, the object structure in PDF is flexible and easy to use. Therefore, that hackers use PDFs to carry out t…
There are several things that have been done to deal with congestion problems, for example the start of transportation infrastructure, widening sidewalks, and widening roads. Routing is the process…
Botnet attacks have become a major threat on the internet in recent years. Because a botnet is a collection of programs in which there is malware, both of which are connected to each other within t…
With the increasing use of vehicles and the large human population in urban areas, the level of traffic jams is high. Every motorist certainly does not want to be stuck in a traffic jam for too lon…
This study focuses on analysing data on the causes of commercial aircraft accidents in the world using data from the Bureau of Aircraft Accident Archives from 1918-2021. Using K-means clustering to…
Automatic Identification System or commonly called AIS is a system found on ships with the aim of sending or receiving information electronically and automatically about ship data. AIS can be recei…
Supervisory Control and Data Acquisition (SCADA) is a system based on software and hardware elements critical to everyday life and the citizens' economy, including oil networks, water treatment pla…
The image of the fetal heart is the image produced by ultrasound, where the image is used in the health sector to obtain information about the development of the fetus in the womb. The image produc…
Cardiac arrest refers to a sudden interruption of cardiac activity that commonly caused by certain anomalous events. The patients of cardiac arrest have at least one abnormal vital sign in the one …
Garba Rujukan Digital (GARUDA) is a repository for articles in PDF files, All PDF files have metadata that can be used by hackers so that PDF files become PDF Malware. In the metadata of PDF Malwar…
User Datagram Protocol (UDP) merupakan salah satu protokol pada Transport Layer TCP/IP yang mendukung komunikasi yang tidak andal (unreliable), tanpa koneksi (Connectionless). Penelitian ini berfok…
Blood vessels in the retina have a lot of information related to human health. Image analysis on the retina is one of the first steps in the main diagnosis of the disease. This research will focus …
Arrhythmias are considered to be the most frequently observed cases of cardiac abnormalities. Cardiac abnormalities such as arrhythmias affecting the electrical activity of the heart can be detecte…