Vital sign monitoring is the most common assessment in medicine. Vital signs show how the patient's status is. Proper and accurate monitoring of vital signs is very important to ensure the progress…
With dental image processing emerging in the case of human identification in forensic science. Dental X-rays have helped effectively to diagnose and detect problems in the teeth. In this study, we …
The retina is a very crucial organ in the human eye. The retina has a blood vessel section which in every human has a different form of blood vessels. Early detection of retinal disease can be done…
Malware sangat berbahaya karna dapat merugikan banyak orang, salah satu malware yang sangat berbahaya ini adalah Malware Trojan Banking yang dirancang untuk mencuri uang langsung dari rekening bank…
This final project focuses on detecting smurf attacks to be categorized as normal data or attacks. The smurf attack data packet is an ICMP packet, so in this study the focus is on the ICMP protocol…
Brute Force is a password cracking attack against a computer security system. In launching the attack, the perpetrator uses a trial-and-error method by trying all password combinations in order to …
In Indonesia, especially in big cities, the number of motorized vehicles is increasing. The increase in the number of vehicles, especially in big cities, makes congestion an important problem that …
During the pandemic, online learning have become commonplace in all areas of people's lives. One of the fields that also uses online learning is the education sector. The goverment as the highest p…
Leaky heart disease is a disease of heart valve abnormalities. Diseases called congenital heart defects, are abnormalities in the structure of the heart from birth. This method of examining congeni…
Images with low contrast (dark) and images that have unclear objects make objects in the image difficult to identify either systemically or by observers. Nowadays, almost everyone has an interest i…
Building a computational model to recognize faces is a complex task because faces are complex multidimensional visual models. This study presents a method for detecting objects on the face such as …
The retina is one of the most important parts of the eye. One part of the retina is the optic disc. The optic disc is the starting point of the optic nerve, where the optics meet and relay informat…
Atrial fibrillation (AF) is a heart disease characterized by an irregular heartbeat. So it can cause stroke, heart failure and even death. AF disease is the most common and mostly affects the elder…
Di dalam perkembangan bisnis, web service sungguh sangat dibutuhkan dalam integrasi sistem karena tidak melihat platform, arsitektur maupun bahasa pemrograman yang digunakan oleh sumber berbeda. Ke…
Airplane is one of the public transportation used in various parts of the world. Airplanes are an important means for people to travel between provinces and between countries. The development of ai…
In modern times, growing on the Internet in terms of technology and its use can bring many positive things to human life. Surely it cannot be denied that Internet technology has had a negative impa…
Supervisory Control and Data Acquisition (SCADA) adalah suatu sistem kontrol yang memungkinkan pemantauan dan pengelolaan proses industri dari jarak jauh dan dikendalikan dengan memanfaatkan jaring…
Social media are popular platforms frequently used to share mementos and as a means of marketing strategy, especially by the food industry. Unfortunately, most food photos in social media are not l…
Implementation of IoT (Internet of Things) technology and HTTP protocol on IoT networks for a warehousing system. Where is the client which consists of device 1, device 2 and the web client. The de…
Generally human hearts have four inner segments, including the Right Upper Atrium, Left Upper Atrium, Right Lower Ventricle, and Left Lower Ventricle. By using ultrasound, we can see the process of…
Visualization is a method used to represent data in the form of an image to display hidden information. The visualization in this study uses malware data to be converted into a grayscale image. Thi…
Face detection is widely used to help various human needs, this is because faces can provide information related to identification or personal data. Face recognition can be started by detecting fac…
Electrocardiogram (ECG) is electrical records that contains information about human heart. In the medical field, humans heart condition can be diagnosed by analyzing the changes in hearts beat or r…
Intrusion Prevention System (IPS) is an approach used to build a computer security system that is more advanced than the Intrusion Detection System (IDS), because this IPS can do more than just ana…
The heart signal is taken from the electric current that is generated or called an electrocardiogram. This electrocardiogram is useful for doctors to find out heart defects in patients. One of the …
Heart is a vital organ in human body, however congengital heart disease is an anomaly in fetal body structure that frequently happens, because of that fetal echocardiograph is done by pediatric car…
When recognized in an image or photo, it is easy for us as humans, but not with a computer. In order to recognize a human face, special treatment is needed so that when given an input image or phot…
The research in this final task report, which is how to design a face date application using CNN's Multi-Task method and compare it with the MobileNet-V3 method. Testing was conducted between CNN M…
SQL Injection merupakan serangan pada sistem database suatu website yang memanfaatkan celah keamanan yang berada pada layer basis data sebuah aplikasi website. XSS merupakan serangan pada aplikasi …
The sources of information are currently diverse, making it easier for people to get information. However, the main information in the media is not structured so that it must be carefully read so a…