-
Technology Acceptance Model is a technology system acceptance model used in this study by using the variables Perceived Usefulness, Perceived Ease to Use, Behavioral Intention, Attitude Toward Usin…
Bibliografi: p. 255
Edisi kali ini menampilkan 10 artikel: 1. Desain Produk Kacamata Pintar Menggunakan Interaksi Manusia dan Komputer, Raihan Mahatma Satria, Agung Arya Adi Nugraha, dan Sidik Desti Fitrian 2. Apl…
Fire is one of the disasters that most people worry about, especially indoor fires in office buildings, hospitals, shopping centers or housing, because in addition to possibly causing material loss…
Cyber attacks are a form of threat aimed at stealing, damaging, or altering important data within computer systems or networks. These attacks include hacking, phishing, and malware. Detecting cyber…
In the rapid development of technology, System and Network Security is very important in the ecosystem of digital communication environments. Machine Learning techniques can be used to solve this p…
Cyber attacks have become an increasing threat to the security of modern information systems. To overcome the complexity and diversity of attacks that occur, a sophisticated and reliable detection …
Android menjadi OS paling populer pada perangkat mobile membuatnya menjadi target utama threat actor dalam membuat malware. Beberapa penelitian menunjukkan bahwa deteksi malware pada perangkat mobi…
Watering plants is a tedious thing and is often forgotten by both households and farmers, while plants really need enough water to grow. Seeing these conditions, researchers designed an automation …
K-Means clustering is a tool used to determine the cluster structure of a dataset identified by its strong similarity to other clusters or its strong difference from other clusters. In another pape…
Growth factors such as economic, social, political, and cultural developments have become one of the traffic problems in Palembang City that has caused the occurrence of traffic density. To avoid g…
Traffic congestion is always a primary concern in transportation issues, and it continues to pose challenges in daily activities. To address this problem, a system that can detect vehicle density l…
Aplikasi Threads merupakan aplikasi yang dirancang untuk memberikan pengalaman yang intim dan pribadi dalam berkomunikasi, sehingga pengguna dapat tetap terhubung dengan orang-orang.tterdekat, seja…
PDAM Tirta Musi Palembang is a company engaged in providing water supply services. Currently PDAM Tirta Musi Palembang has used information technology in operations, namely an appeal application th…
Cyberattacks are unauthorized attempts to track and disrupt the operation of communication systems and control systems by exploiting the security weaknesses of communication networks. Efforts to pr…
Tujuan penelitian ini adalah Menganalisis jalur terbaik yang didapatkan berdasarkan hasil algoritma CH pada beberapa kondisi jalan di Kota Palembang. Penelitian dilakukan pada bulan Juni 2023 s.d. …
Continuous Deployment (CD) is a method of deploying applications to production servers automatically and continuously. This research aims to explore the application of the Continuous Deployment met…