Visualization is a method used to represent data in the form of an image to display hidden information. The visualization in this study uses malware data to be converted into a grayscale image. Thi…
Face detection is widely used to help various human needs, this is because faces can provide information related to identification or personal data. Face recognition can be started by detecting fac…
Electrocardiogram (ECG) is electrical records that contains information about human heart. In the medical field, humans heart condition can be diagnosed by analyzing the changes in hearts beat or r…
Intrusion Prevention System (IPS) is an approach used to build a computer security system that is more advanced than the Intrusion Detection System (IDS), because this IPS can do more than just ana…
The heart signal is taken from the electric current that is generated or called an electrocardiogram. This electrocardiogram is useful for doctors to find out heart defects in patients. One of the …
Heart is a vital organ in human body, however congengital heart disease is an anomaly in fetal body structure that frequently happens, because of that fetal echocardiograph is done by pediatric car…
When recognized in an image or photo, it is easy for us as humans, but not with a computer. In order to recognize a human face, special treatment is needed so that when given an input image or phot…
The research in this final task report, which is how to design a face date application using CNN's Multi-Task method and compare it with the MobileNet-V3 method. Testing was conducted between CNN M…
SQL Injection merupakan serangan pada sistem database suatu website yang memanfaatkan celah keamanan yang berada pada layer basis data sebuah aplikasi website. XSS merupakan serangan pada aplikasi …
The sources of information are currently diverse, making it easier for people to get information. However, the main information in the media is not structured so that it must be carefully read so a…
Botnet attacks are one of the most serious threats of many threats in the rapid development of Internet of Things (IoT) devices. The more complex IoT devices make the detection or classifying time …
Parallel computing and multi-core processors become promising platforms and are capable of processing multiple tasks, instructions, and data simultaneously, the goal of which is to save and speed u…
Face recognition system is a branch of biometric science that is useful for identifying someone based on their physical characteristics, in this case their face. In general, face recognition system…
Deteksi objek merupakan salah satu hal penting di bidang komputer dan telah berkembang dari pengenalan objek tunggal hingga pengenalan multi-objek. Dalam tugas akhir ini mengusulkan metode Faster-R…
The development of technology triggers the development of malicious files called malware. Malware is software that is explicitly designed with the aim of finding weaknesses or even damaging softwar…
Visualisasi merupakan salah satu teknik untuk memberikan kemudahan seseorang dalam memahami suatu data informasi.. Visualisasi bertujuan untuk membaca ataupun mengenali dan menyimpulkan serangan ya…
Slow http dos attack is one of the DoS attack methods targeting HTTP servers. This method hampers the service by flooding it causing a pool of connections with slow and heavy requests to the web se…
The Hexapod robot is a type of mobile robot that has 6 legs. The hexapod robot can be stable using 3 leg robots because the robot has higher flexibility. The hexapod robot does not have to need all…
Internet of Things (IoT) merupakan salah satu bukti perkembangan teknologi yang dapat mempermudah segala pekerjaan sehari-hari. Salah satu contohnya adalah dalam penghematan energi listrik yang dis…
High availability cluster is the ability of the system to increase the availability of services provided by a cluster. The high availability process is when the main server cannot provide services,…
In the human-machine interaction system, there are several media that can be used to convey messages or orders, one of which is speaking. One form of today's technological developments related to h…
Deteksi objek adalah alat identifikasi yang cepat dan akurat. Anda dapat menggunakan metode yang berbeda untuk menemukan objek. Metode YOLO (You Only Look Once) sebagai detector dan untuk pengambil…
Artificial Intelligence (AI) is a system that regulates human-machine interaction, especially through voice. Intelligent Voice Assistant (IVA) technology is a technology that uses voice to perform …
Radio Propagation is a wireless delivery of information and data through electromagnetic waves between two antennas. The electromagnetic waves will face a certain hindrance in a form of signal leve…
Pathloss is a reduction on a energy level in wireless telecommunications that is caused by refractions, diffractions, reflections, disseminations and absorption and also caused by interferences fro…
Malware adalah sebuah perangkat lunak yang dibuat dengan tujuan memasuki dan terkadang merusak sistem komputer, jaringan, ataupun server tanpa diketahui oleh pemiliknya, Ransomware merupakan jenis …
Congenital heart disease (CHD) or often referred to as congenital heart disease is a disease that causes the most common morbidity of death in developing and developed countries. Congenital heart d…
Serangan SQL Injection dan XSS adalah salah satu contoh serangan kerentanan yang ada di aplikasi web. Serangan SQL Injection adalah salah satu dari lima teratas dalam semua risiko keamanan aplikasi…
n recent years, the development of technology is growing rapidly, especially in the field of wireless technology, Along with this rapid development, the object positioning feature is also developin…
Clinicians need the capabilities of deep learning to minimize healthcare costs, diagnose patient diseases, increase the chance to recover, and save many lifes. Deep learning has also proven to opti…