A botnet consists of a group of interconnected software programs that communicate with each other via the internet to perform designated functions. This software is programmed to operate automatica…
The increase in the number of vehicles and the urban population has led to high levels of traffic congestion in urban areas. The focus of this research is to find the best alternative routes using …
Distributed Denial-of-Service (DDoS) is a collection of denial-of-service attacks that are carried out by executing commands from the master computer to a number of botnets which are infected hosts…
K-means clustering is a tool for determining the cluster structure of a data set identified by its strong similarity to other clusters or its strong differences from other clusters. Another article…
Malware is malicious software that refers to programs that deliberately exploit vulnerabilities in computing systems for malicious purposes, Deep Neural Network is an Artificial Neural Network with…
Automatic text summarizzation merupakan salah satu cabang dalam ilmu natural language processing (NLP) yang memiliki tujuan untuk merepresentasikan suatu teks yang panjang kemudian dikompresi sehin…
Various forms of attack models ranging from hosting, spreading malware and phishing websites, these actions can start from accessing the Uniform Resource Locator (URL) or files that contain malicio…
Technological developments have brought considerable changes in various fields, including in the field of animal husbandry. Farmers in Indonesia still use conventional methods to feed their livesto…
Portable Document Format (PDF) is a document exchange media that is very vulnerable to malicious attacks, namely Malware PDF. One of the services that most often use PDF files as a medium is a scie…
Henti jantung (CA) adalah penyebab kematian paling banyak di antara pasien yang dirawat di unit gawat darurat. Henti jantung biasanya merupakan deteksi awal hasil, dan kemudian membantu menginterpr…
Vital sign monitoring is the most common assessment in medicine. Vital signs show how the patient's status is. Proper and accurate monitoring of vital signs is very important to ensure the progress…
With dental image processing emerging in the case of human identification in forensic science. Dental X-rays have helped effectively to diagnose and detect problems in the teeth. In this study, we …
The retina is a very crucial organ in the human eye. The retina has a blood vessel section which in every human has a different form of blood vessels. Early detection of retinal disease can be done…
Malware sangat berbahaya karna dapat merugikan banyak orang, salah satu malware yang sangat berbahaya ini adalah Malware Trojan Banking yang dirancang untuk mencuri uang langsung dari rekening bank…
This final project focuses on detecting smurf attacks to be categorized as normal data or attacks. The smurf attack data packet is an ICMP packet, so in this study the focus is on the ICMP protocol…
Brute Force is a password cracking attack against a computer security system. In launching the attack, the perpetrator uses a trial-and-error method by trying all password combinations in order to …
In Indonesia, especially in big cities, the number of motorized vehicles is increasing. The increase in the number of vehicles, especially in big cities, makes congestion an important problem that …
During the pandemic, online learning have become commonplace in all areas of people's lives. One of the fields that also uses online learning is the education sector. The goverment as the highest p…
Leaky heart disease is a disease of heart valve abnormalities. Diseases called congenital heart defects, are abnormalities in the structure of the heart from birth. This method of examining congeni…
Images with low contrast (dark) and images that have unclear objects make objects in the image difficult to identify either systemically or by observers. Nowadays, almost everyone has an interest i…
Building a computational model to recognize faces is a complex task because faces are complex multidimensional visual models. This study presents a method for detecting objects on the face such as …
The retina is one of the most important parts of the eye. One part of the retina is the optic disc. The optic disc is the starting point of the optic nerve, where the optics meet and relay informat…
Atrial fibrillation (AF) is a heart disease characterized by an irregular heartbeat. So it can cause stroke, heart failure and even death. AF disease is the most common and mostly affects the elder…
Di dalam perkembangan bisnis, web service sungguh sangat dibutuhkan dalam integrasi sistem karena tidak melihat platform, arsitektur maupun bahasa pemrograman yang digunakan oleh sumber berbeda. Ke…
Airplane is one of the public transportation used in various parts of the world. Airplanes are an important means for people to travel between provinces and between countries. The development of ai…
In modern times, growing on the Internet in terms of technology and its use can bring many positive things to human life. Surely it cannot be denied that Internet technology has had a negative impa…
Supervisory Control and Data Acquisition (SCADA) adalah suatu sistem kontrol yang memungkinkan pemantauan dan pengelolaan proses industri dari jarak jauh dan dikendalikan dengan memanfaatkan jaring…
Social media are popular platforms frequently used to share mementos and as a means of marketing strategy, especially by the food industry. Unfortunately, most food photos in social media are not l…
Implementation of IoT (Internet of Things) technology and HTTP protocol on IoT networks for a warehousing system. Where is the client which consists of device 1, device 2 and the web client. The de…
Generally human hearts have four inner segments, including the Right Upper Atrium, Left Upper Atrium, Right Lower Ventricle, and Left Lower Ventricle. By using ultrasound, we can see the process of…