The Sriwijaya University Library

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Login
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
First Page Previous 1 2 3 4 5 Next Last Page
cover
PENERAPAN ALGORITMA SUPPORT VECTOR MACHINE PADA PLATFORM QUANTUM COMPUTING DA…
Azandi, Reza Mahesa

The necessity for more efficient computing will increase as technology develops, with quantum computing able to provide more efficient computing power than conventional computing. Technological dev…

Edition
-
ISBN/ISSN
-
Collation
xiv, 70 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1298912023
Availability1
Add to basket
View DetailCite
cover
 DAMPAK DARI MODERASI SIFAT KEPRIBADIAN SISWA SMA NEGERI 1 KOTA JAMBI PADA H…
Surya, Ramadhani Akbar 

Globalization has triggered the growth of social media, affecting various layers of society, including school adolescents. While social media provides benefits such as communication and education, …

Edition
-
ISBN/ISSN
-
Collation
xiv, 59 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1307512023
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI ABNORMALITAS JANTUNG ANAK DENGAN ARSITEKTUR CONVOLUTIONAL NEURAL …
Unigha, Siti Luthfia 

This study aims to develop a classification model using Convolutional Neural Networks (CNN) architecture to identify heart abnormalities in children. In this study, binary and multi-class CNNs are …

Edition
-
ISBN/ISSN
-
Collation
xiv, 102 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1052112023
Availability1
Add to basket
View DetailCite
cover
ANALISIS UNIFORM RANDOM WEIGHT PADA IOTA VISUALIZATION.
Aji, M. Restu

IOTA is an innovative open-source distributed ledger technology designed to address the challenges posed by the Internet of Things (IoT) ecosystem. Unlike traditional blockchain architectures, IOTA…

Edition
-
ISBN/ISSN
-
Collation
xvi, 68 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1261812023
Availability1
Add to basket
View DetailCite
cover
PENERAPAN BLOCKCHAIN UNTUK MENGAMANKAN DATA PADA SISTEM SMART HOME.
Bagus, Agustinus Yulius

The technology of the Internet of Things (IoT) has become an essential part of modern life, and its applications in various industries, including smart homes, are rapidly increasing. However, the s…

Edition
-
ISBN/ISSN
-
Collation
xv, 65 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1041892023
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN UDP FLOOD PADA LAYANAN INTERNET OF THINGS (IOT) MENGGUNA…
Ariq, Muhammad Rifqi Abiyyu

The Internet of Things (IoT) is a system for accumulating and transferring data on a physical device that is interconnected to the internet network in order to communicate with each other between d…

Edition
-
ISBN/ISSN
-
Collation
xiii, 27 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T863842023
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI DAN VISUALISASI ENAM KELAS ABNORMALITAS JANTUNG JANIN MENGGUNAKAN…
Lestari, Yuni Tri

The use of Artificial Intelligence (AI) technology in healthcare has brought significant changes in recent years, particularly in disease diagnosis. Deep learning is a popular AI technique used in …

Edition
-
ISBN/ISSN
-
Collation
xiv, 69 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1035212023
Availability1
Add to basket
View DetailCite
cover
SEGMENTASI RUANG JANTUNG JANIN MENGGUNAKAN METODE YOLACT.
Alana, M

ABSTRACT Ultrasonography (USG) is a non-invasive medical procedure that uses high-frequency sound waves to produce pictures of the internal organs of the human body. This procedure can be used to e…

Edition
-
ISBN/ISSN
-
Collation
xiii, 78 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1141282023
Availability1
Add to basket
View DetailCite
cover
MULTIVARIATE IMPUTATION TANDA VITAL PASIEN UNIT PERAWATAN INTENSIF MENGGUNAKA…
Ais'sy, Widya Rohadatul

Missing data is a common problem in vital sign datasets and is one of the most complex topics in computer science. The large number of missing values in the data makes it more difficult to process.…

Edition
-
ISBN/ISSN
-
Collation
xiii, 64 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1044752023
Availability1
Add to basket
View DetailCite
cover
ANALISIS PERBANDINGAN DETECTION TRAFFIC ANOMALY SERANGAN DDoS IPv4 DENGAN MET…
Maulana, Muhamad Chendy

Anomaly traffic is a condition that results in an abnormality in network traffic. Anomaly detections is a monitoring to monitor the movement that occurs in the network system. DDoS attack or Distri…

Edition
-
ISBN/ISSN
-
Collation
viii, 74 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T924222023
Availability1
Add to basket
View DetailCite
cover
PENERAPAN SISTEM PENENTUAN POSISI DALAM RUANGAN MENGGUNAKAN METODE FINGERPRIN…
Rasyid, Muhammad Fanny Nur

Recently, wireless communication is growing rapidly, due to its practicality and the many features that have been developed along with current technological developments, especially features that c…

Edition
-
ISBN/ISSN
-
Collation
xiii, 84 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1287872023
Availability1
Add to basket
View DetailCite
cover
ANALISA BIG DATA PADA CLUSTER KOMPUTER MENGGUNAKAN KOMPUTASI TERDISTRIBUSI
Zainudin, Zainudin

Along with the development of the era of globalization, the use of technology has been very widespread in various industrial sectors, so data accumulates in a very fast time to grow into large-scal…

Edition
-
ISBN/ISSN
-
Collation
xvii, 84 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1308762023
Availability1
Add to basket
View DetailCite
cover
DETEKSI TRANSAKSI ANOMALI PADA BLOCKCHAIN DENGAN MENGGUNAKAN METODE DEEP BELI…
Permana, Galih Bayu

In recent years, blockchain technology has found widespread applications across various domains, including cryptocurrency, financial services, and risk management. Cryptocurrency, in particular, ha…

Edition
-
ISBN/ISSN
-
Collation
xiii, 61 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1308532023
Availability1
Add to basket
View DetailCite
cover
DETEKSI TRANSAKSI ANOMALI PADA BLOCKCHAIN DENGAN MENGGUNAKAN METODE LONG SHOR…
Wahyudi, Muhammad Tri

The rapid growth and anonymity offered by cryptocurrencies have made them vulnerable to being used for illegal activities. In this study, Long Short-Term Memory (LSTM) neural network is used to ide…

Edition
-
ISBN/ISSN
-
Collation
xiii, 64 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1308512023
Availability1
Add to basket
View DetailCite
cover
DETEKSI TRANSAKSI ANOMALI PADA BLOCKCHAIN DENGAN MENGGUNAKAN METODE DEEP NEUR…
Imam, M

Blockchain is a digital data bank that stores transaction data transparently. With so much interest in bitcoin, making bitcoin wallets are an attractive target for hackers. This research uses the D…

Edition
-
ISBN/ISSN
-
Collation
xiii, 60 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1308542023
Availability1
Add to basket
View DetailCite
cover
DETEKSI MALICIOUS URL PADA FILE BERBASIS FITUR LEKSIKAL MENGGUNAKAN METODE RA…
Putri, Rachmawati Dwinanti

With the existence of attack models such as phishing and malware distribution, these actions begin by accessing a Uniform Resource Locator (URL) or files containing harmful links within them. A Uni…

Edition
-
ISBN/ISSN
-
Collation
xiv, 80 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1278062023
Availability1
Add to basket
View DetailCite
cover
PENERAPAN LIBRARY PYTORCH3D PADA REKONTRUKSI JARINGAN TRANSVENTRIKULAR CITRA …
Imanullah, Wahnuzsyah Choiri 

The reconstruction of two-dimensional images into three-dimensional using transventricular objects plays a crucial role in the medical field, particularly in the diagnosis and treatment within neur…

Edition
-
ISBN/ISSN
-
Collation
xiii, 54 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1309642023
Availability1
Add to basket
View DetailCite
cover
ANALISIS DATA TIME SERIES UNTUK FORECASTING DATA CYBER ATTACK PADA HONEYPOT M…
Sasfini, Cuh Meizi 

Cyber Attack is a crime that attacks computer systems that can shut down or damage information technology services. Every act of attack will have an impact on gaining access to services, manipulati…

Edition
-
ISBN/ISSN
-
Collation
xiii, 67 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1298992023
Availability1
Add to basket
View DetailCite
cover
OPTIMALISASI PERFORMA ALGORITMA CONVOLUTIONAL NEURAL NETWORK (CNN) DALAM PROS…
Ratfiana, Soniawati 

One of the threats to the internet network is botnet (robot network). although there are many methods used to detect botnet, but there are still less accurate. this can be seen from the results of …

Edition
-
ISBN/ISSN
-
Collation
xvii, 95 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1298982023
Availability1
Add to basket
View DetailCite
cover
PEMBAHRUAN SISTEM DETEKSI SERANGAN PORTSCAN BERBASIS LSTM DENGAN PENGIMPLEMEN…
Septriyanti, Wilda 

Port Scanning attacks are quite dangerous attacks, this technique can map characteristics, detect open ports and even obtain important information on a network or host to then forward to further at…

Edition
-
ISBN/ISSN
-
Collation
xvi, 120 hlm.; Ilus.; 21 cm
Series Title
-
Call Number
T1298902023
Availability1
Add to basket
View DetailCite
cover
OPTIMALISASI TEKNIK KLASIFIKASI SERANGAN BOTNET DENGAN MENGGUNAKAN SELEKSI FI…
Nuari, Muhammad Ilham 

A botnet consists of a group of interconnected software programs that communicate with each other via the internet to perform designated functions. This software is programmed to operate automatica…

Edition
-
ISBN/ISSN
-
Collation
xiii, 83 hlm.; Ilus.; 29 cm
Series Title
-
Call Number
T1285752022
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI ALGORITMA K-NEAREST NEIGHBOR DAN BAYESIAN OPTIMIZATION DALAM MEN…
Sepriyani, Yepi

The increase in the number of vehicles and the urban population has led to high levels of traffic congestion in urban areas. The focus of this research is to find the best alternative routes using …

Edition
-
ISBN/ISSN
-
Collation
xix, 103 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1291782023
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN DISTRIBUTED DENIAL OF SERVICE (DDoS) PADA APACHE SPARK MENGG…
Wicaksana, Mochammad Rafii Nanda

Distributed Denial-of-Service (DDoS) is a collection of denial-of-service attacks that are carried out by executing commands from the master computer to a number of botnets which are infected hosts…

Edition
-
ISBN/ISSN
-
Collation
xv, 67 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1024072023
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN MALWARE SPYWARE MENGGUNAKAN METODE K-MEANS CLUSTERING.
Saifullah, Muhammad Arief

K-means clustering is a tool for determining the cluster structure of a data set identified by its strong similarity to other clusters or its strong differences from other clusters. Another article…

Edition
-
ISBN/ISSN
-
Collation
xiii, 48 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1308832023
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI FITUR SELEKSI PADA MALWARE DENGAN DEEP NEURAL NETWORK.
Irfan, Ahmad Naufal

Malware is malicious software that refers to programs that deliberately exploit vulnerabilities in computing systems for malicious purposes, Deep Neural Network is an Artificial Neural Network with…

Edition
-
ISBN/ISSN
-
Collation
xiv, 68 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1308172023
Availability1
Add to basket
View DetailCite
cover
AUTOMATIC TEXT SUMMARIZATION PADA SINOPSIS LAPORAN KECELAKAAN LALU LINTAS PER…
Hilman, Muhammad Farhan 

Automatic text summarizzation merupakan salah satu cabang dalam ilmu natural language processing (NLP) yang memiliki tujuan untuk merepresentasikan suatu teks yang panjang kemudian dikompresi sehin…

Edition
-
ISBN/ISSN
-
Collation
xv, 54 hlm.; ilus.; 29 cm
Series Title
-
Call Number
2307006393
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI MALICIOUS URL PADA FILE MENGGUNAKAN METODE K-NEAREST NEIGHBOR BER…
Mafaza, Rizki Valen 

Various forms of attack models ranging from hosting, spreading malware and phishing websites, these actions can start from accessing the Uniform Resource Locator (URL) or files that contain malicio…

Edition
-
ISBN/ISSN
-
Collation
xiv, 73 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1301262023
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI KENDALI LOGIKA FUZZY PADA RANCANG BANGUN SISTEM PEMBERI PAKAN TE…
Mandayu, Aldo 

Technological developments have brought considerable changes in various fields, including in the field of animal husbandry. Farmers in Indonesia still use conventional methods to feed their livesto…

Edition
-
ISBN/ISSN
-
Collation
xv, 65 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T718812021
Availability1
Add to basket
View DetailCite
cover
DETEKSI ANOMALI FILE PDF MALWARE PADA LAYANAN AGREGATOR GARBA RUJUKAN DIGITAL…
Yuningsih, Novi

Portable Document Format (PDF) is a document exchange media that is very vulnerable to malicious attacks, namely Malware PDF. One of the services that most often use PDF files as a medium is a scie…

Edition
-
ISBN/ISSN
-
Collation
xvii, 84 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T850282022
Availability1
Add to basket
View DetailCite
cover
PREDIKSI HENTI JANTUNG BERDASARKAN TANDA VITAL PADA PASIEN UNIT PERAWATAN INT…
Oktaviani, Haqiqi

Henti jantung (CA) adalah penyebab kematian paling banyak di antara pasien yang dirawat di unit gawat darurat. Henti jantung biasanya merupakan deteksi awal hasil, dan kemudian membantu menginterpr…

Edition
-
ISBN/ISSN
-
Collation
xiii, 67 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T796152022
Availability1
Add to basket
View DetailCite
First Page Previous 1 2 3 4 5 Next Last Page

Search Result

Found 228 from your keywords: Subject : "Prodi Sistem Komputer,"
You currently on page 4 of 8 page(s)
Query took 0.0321 second(s) to complete
XML ResultJSON Result

Suggestion
image
STUDI EKSPERIMENTAL PERPINDAHAN PANAS SECARA KONVEKSI PAKSA PADA PIPA TEMBAGA BERBENTUK CIRCULAR
Fahzy, Muhammad Chrissandy
image
HUBUNGAN SANITASI LINGKUNGAN DENGAN KELUHAN PENYAKIT KULIT DI KECAMATAN INDRALAYA KABUPATEN OGAN ILIR
Wildan, Muhammad
image
PENGGUNAAN METODE BLOCKCHAIN DENGAN ALGORITMA KONSENSUS DELEGATED PROOF OF STAKE (DPOS) UNTUK STUDI KASUS SUPPLY CHAIN MANAGEMENT
Tarigan, Yanita Yuristia
image
Smart Wireless Sensing
Zhang, Yi - Yang,Zheng - Qian,Kun - Wu, Chenshu
image
ETNOBOTANI TUMBUHAN OBAT MASYARAKAT SUKU KAYUAGUNG DI DESA PEMATANG PANGGANG KECAMATAN MESUJI KABUPATEN OGAN KOMERING ILIR
Venia, Tika Maidela
The Sriwijaya University Library
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search