Penyakit COVID-19 merupakan penyakit yang disebabkan oleh virus SARS-CoV-2. Salah satu cara untuk mendiagnosis penyakit COVID-19 adalah dengan menggunakan radiografi toraks. Namun, diagnosis dengan…
The lateral movement is one of the most crucial phases in an Advanced Persistent Threat (APT) attack, aiming to penetrate other resources and gain greater privileges within the target network. Atta…
overty is a problem that exists in every region in Indonesia. There are many factors that cause poverty that influence the level of welfare of the population. Therefore, it is necessary to group da…
With the advancement of technology, the Internet of Things (IoT) has become a striking innovation, transforming human interaction with the environment. One intriguing application of IoT is in monit…
This research discusses the implementation of the object detection method You Only Look Once (YOLO), capable of performing detection and localization in the form of object segmentation on an image.…
A person's handwriting is different and unique, even though it looks similar it is certainly not the same as someone else's writing. One's personality traits can be identified based on handwriting.…
This study aims to develop a classification model using Convolutional Neural Networks (CNN) architecture to identify heart abnormalities in children. In this study, binary and multi-class CNNs are …
IOTA is an innovative open-source distributed ledger technology designed to address the challenges posed by the Internet of Things (IoT) ecosystem. Unlike traditional blockchain architectures, IOTA…
The technology of the Internet of Things (IoT) has become an essential part of modern life, and its applications in various industries, including smart homes, are rapidly increasing. However, the s…
The Internet of Things (IoT) is a system for accumulating and transferring data on a physical device that is interconnected to the internet network in order to communicate with each other between d…
The use of Artificial Intelligence (AI) technology in healthcare has brought significant changes in recent years, particularly in disease diagnosis. Deep learning is a popular AI technique used in …
ABSTRACT Ultrasonography (USG) is a non-invasive medical procedure that uses high-frequency sound waves to produce pictures of the internal organs of the human body. This procedure can be used to e…
Missing data is a common problem in vital sign datasets and is one of the most complex topics in computer science. The large number of missing values in the data makes it more difficult to process.…
Anomaly traffic is a condition that results in an abnormality in network traffic. Anomaly detections is a monitoring to monitor the movement that occurs in the network system. DDoS attack or Distri…
Recently, wireless communication is growing rapidly, due to its practicality and the many features that have been developed along with current technological developments, especially features that c…
Along with the development of the era of globalization, the use of technology has been very widespread in various industrial sectors, so data accumulates in a very fast time to grow into large-scal…
In recent years, blockchain technology has found widespread applications across various domains, including cryptocurrency, financial services, and risk management. Cryptocurrency, in particular, ha…
Blockchain is a digital data bank that stores transaction data transparently. With so much interest in bitcoin, making bitcoin wallets are an attractive target for hackers. This research uses the D…
With the existence of attack models such as phishing and malware distribution, these actions begin by accessing a Uniform Resource Locator (URL) or files containing harmful links within them. A Uni…
The reconstruction of two-dimensional images into three-dimensional using transventricular objects plays a crucial role in the medical field, particularly in the diagnosis and treatment within neur…
Cyber Attack is a crime that attacks computer systems that can shut down or damage information technology services. Every act of attack will have an impact on gaining access to services, manipulati…
One of the threats to the internet network is botnet (robot network). although there are many methods used to detect botnet, but there are still less accurate. this can be seen from the results of …
Port Scanning attacks are quite dangerous attacks, this technique can map characteristics, detect open ports and even obtain important information on a network or host to then forward to further at…
The increase in the number of vehicles and the urban population has led to high levels of traffic congestion in urban areas. The focus of this research is to find the best alternative routes using …
Automatic text summarizzation merupakan salah satu cabang dalam ilmu natural language processing (NLP) yang memiliki tujuan untuk merepresentasikan suatu teks yang panjang kemudian dikompresi sehin…
Algortima Fuzzy C-Means memberi kebebasan dalam hal jumlah cluster yang akan dibuat dan dapat melakukan clustering lebih dari satu variabel secara sekaligus. Pada kondisi awal, pusat cluster ini ma…
The cumulative grade point or GPA is a student's academic achievement score which is calculated from all courses a student has passed. This study aims to design a web-based system that can predict …
It is very important for outstanding students to be directed and guided to get coaching related to the development of each student's personal potential so that superior and quality students are cre…
Unemployment is one of the crucial problems faced by Indonesia. Moreover, unemployment for Bachelor and Diploma graduates, which has a large number every year. Based on official data published by t…
As a metropolitan area, the city of Palembang has no escape from the phenomenon of urban poverty. Seberang Ulu 1 Sub-district is included as an area that have high poverty rate in Palembang. Theref…