On-time graduation is a crucial indicator for assessing the quality of higher education institutions. At the Postgraduate School of Sriwijaya University, delayed graduations remain a serious concer…
This research predicts traffic density based on CCTV footage of Palembang city traffic. It uses the YOLOv9 model to detect cars and motorcycles, achieving a training performance with an mAP 0.5 of …
This research focuses on identifying the optimal route by analyzing the results of Genetic Algorithm and Particle Swarm Optimization. This research uses You Only Look Once version 9 (YOLOv9) to cre…
Traffic congestion in Palembang City is caused by the number of vehicles exceeding the road capacity. This study discusses the determination of the best route in an intelligent transportation syste…
This study aims to analyze traffic density in Palembang City by utilizing YOLOv9 for vehicle detection from CCTV recordings and employing K-Nearest Neighbors (KNN) and Long Short-Term Memory (LSTM)…
This research is motivated by the rapid growth of the Indonesian film industry and the increasing need for an accurate film genre classification system to help viewers understand film content more …
This research aims to analyze public sentiment towards traffic congestion in Palembang City using the Long Short Term Memory (LSTM) algorithm and then video recording using YOLOv8 followed by LSTM.…
This research aims to analyze public sentiment towards traffic congestion in Palembang City using Random Forest algorithm then video recording using YOLOv8 followed by Random Forest. The method use…
Android malware is an application that targets Android devices to steal crucial data, including money or confidential information from Android users. Recent years have seen a surge in research on A…
Traffic management in major cities like Palembang faces congestion challenges, especially on main roads. The implementation of ETLE provides real-time data on traffic conditions, including vehicle …
This research aims to analyze public sentiment towards traffic jams in Palembang City using the K-Nearest Neighbors (KNN) algorithm and then video recordings using YOLOv8 followed by KNN. The metho…
The classification of articles into several categories has been done using the Naive Bayes method, with an F1-score result of 98% on balanced data based on titles and abstracts. The results show a …
The evolution of technology roles attracted cyber security threats not only compromise stable technology but also cause significant financial loss for organizations and individuals. As a result, or…
DDoS attacks are one of the most common network security threats on the internet. This attack utilizes various sources to send excessive traffic to a server, resulting in system disruption. This ma…
Intrusion Detection System (IDS) is a tool designed to detect suspicious activities or security threats within a computer network. This study focuses on developing a distributed IDS framework using…
Fire is one of the natural disasters that cause loss of property. objects and endanger the safety of life. The fire started from a small fire that got bigger, causing the fire to spread. This resea…
Choosing a major is a crucial decision for prospective students at SMK Negeri 4 Palembang, influenced by various academic and non-academic factors. This study aims to analyze the determinants of ma…
Face recognition has become an important technology in various applications, but challenges arise when multiple faces need to be recognized simultaneously in a single image or video frame. This res…
Digitalization provides benefits for students by allowing them to easily learn anytime and anywhere, commonly referred to as E-Learning. Currently, many tutoring services have adopted this system, …
This study utilizes a deep learning model using a Convolutional Neural Network with ResNet – 18 architecture in classifying dental conditions based on RGB images consisting of four classes: Calcu…
Exploit Reverse HTTPS merupakan sebuah konsep teknik serangan malware yang dilakukan oleh penyerang untuk mengekspos kelemahan dalam lapisan HTTPS pada sistem atau aplikasi untuk mencuri atau menga…
Smart Home is a form of automation technology designed to facilitate household activities with the help of the Internet of Things (IoT). IoT technology enables objects around us, such as sensors, c…
This research was motivated by conducting underwater exploration, because underwater exploration has a high risk if carried out by humans, with the difficulty of accessing underwater areas, so in t…
Ransomware is a type of malware that encrypts the victim's data and demands a ransom to restore access, with WannaCry being one of the most notorious variants exploiting EternalBlue on the SMB prot…
A chatbot is a software application to designed handle user inputs and generate appropriate replies based on those inputs, which are then communicated back to the user. In able to provide accurate …
Based on data accessed on the SimilarWeb website, it shows that preemployment website visitors in the last 3 months (February, March, April) are relatively unstable, this phenomenon could be caused…
The Tokopedia app was officially launched on 17 August 2009. It was founded on 6 February 2009, by William Tanuwijaya and Leontinus Alpha Edison under PT Tokopedia. Tokopedia is a platform that sim…
This study aims to evaluate the user experience (UX) of the LINE application using the System Usability Scale (SUS) method. Although LINE is one of the popular communication applications, data indi…
This research focuses on the implementation and comparison of the KMeans and KMedoids algorithms that function as poverty data clustering in South Sumatra Province, the poverty data is taken from t…