Taman kanak-kanak merupakan pendidikan prasekolah yang sangat penting dalam mendukung perkembangan masa emas anak-anak di Indonesia. Namun tidak semua anak-anak di Indonesia memiliki kesempatan dal…
Android menjadi OS paling populer pada perangkat mobile membuatnya menjadi target utama threat actor dalam membuat malware. Beberapa penelitian menunjukkan bahwa deteksi malware pada perangkat mobi…
A railway crossing is a crossing where a railway line meets a road, either a highway or other footpath. Many cases of accidents are caused by a lack of guarding and not being equipped with train do…
Jaringan enterprise terbentuk dari banyak router dan tentu memiliki konfigurasi routingnya tersendiri. Dalam penerapannya, setiap protokol routing mempunyai karakteristik algoritmanya masing-masing…
This research analyzes various methods and algorithms in the context of object detection and optimal route determination in vehicle traffic in the city of Palembang, as a step towards developing th…
Collaborative text editor systems are widely used to allow users to edit the same document simultaneously. YATA CRDT (Yet Another Transformation Approach Conflict-free Replicated Data Types) is an …
Room security is a very important thing to pay attention to and to create that security there are many things we can do, one of which is the use of technology to maintain security. This project aim…
The aim of this study is to classify cervicalpre cancer images using Convolutional Neural Network (CNN) method. The dataset of cervical precancer images was evaluated using various CNN models that …
This study presents and analyzes deep learning techniques to classify abnormalities in fetal heart images. This research compares four convolutional neural network (CNN) architectures to choose the…
Supervisory and Data Acquisition (SCADA) plays an important role in industry by providing process automation, centralized control and monitoring processes. SCADA is designed for closed areas with s…
Detecting abnormal heart structures in infant is an important issue in the field of medicine. One method that can be used to detect abnormal heart structures in children is by using the Mask Region…
Time series forecasting (TSF) is the task of predicting future values of a particular time sequence. It used in various fields including forecast vital signs data. Vital signs data that are include…
Pada penelitian pada projek ini mengembangkan sebuah robot model U-Arm dengan tiga derajat kebebasan dengan menggunakan perhitungan Invers Kinematic. Invers Kinematic merupakan proses perhitungan m…
DDoS attacks are one of the main threats to security issues on the internet today which have quite a severe impact. As for knowing the best DDoS attack detection, this study applies several selecti…
Brute force is one of many attacks that are often used by hackers in carrying out the cyber crimes. For recognizing the attack patterns visualization is carried out, so that in presenting this rese…
Congestion is a problem that often occurs in big cities caused by the increasing number of vehicles each year without being accompanied by the expansion of highways. There are 3 methods proposed, n…
Kemacetan lalu lintas masih menjadi permasalahan yang sering dihadapi masyarakat di kota Palembang hingga saat ini masih kesulitan dalam melakukan mobilitas untuk mendukung aktivitas sehari-hari. D…
Botnet is a group of programs that have been infected by malware and connected to the internet network that has been controlled by certain parties. Using Long Short-Term Memory (LSTM) can help dete…
Bruteforce attack is a form of attack to be able to enter network services by making various pairs of usernames and passwords illegally. To avoid this attack you can use different character combina…
Bruteforce attack is an attack that uses the trial-error method to obtain user information, especially passwords. To overcome these problems, previous research has applied learning algorithms to cy…
Brute Force Attack is an attack that targets private information such as usernames, passwords, passphrases and other information. Brute force attack sends combinations continuously in the form of d…
Traffic congestion is currently a major problem in big cities in Indonesia. Therefore, a system for determining the best paths is needed to address traffic congestion issues. This system is part of…
Propagation is the existence of a signal sharing area from one place to another and is one of the most important perspectives of cellular wireless network planning. Prediction of path loss or commo…
Remote Access Trojan (RAT) is a special type of remote access software commonly used for malicious purposes, in which the installation is performed without the user's consent, the remote control th…
The progress of advanced times and modern technology can be utilized and used as well as possible which aims to make work more effective and easier. One of them is by making a house mouse trap that…
Every living thing definitely needs a stable temperature to maintain its life, the need for a stable temperature cannot be denied anymore, because living things as creatures with the highest degree…
This research aims to develop a detection model by combining Convolutional Neural Networks (CNN) and Recurrent Neural Network (RNN) architectures to detect QRS Complex signal waves in fetal electro…