Preventive measures and early detection of LPG gas leaks, commonly used in households and industries, are necessary to prevent LPG gas leaks. This study developed a smart fire detection system in f…
On-time graduation is a crucial indicator for assessing the quality of higher education institutions. At the Postgraduate School of Sriwijaya University, delayed graduations remain a serious concer…
In industrial area, a pipe is required as a media to stream fluid form one point to another point. Combined pipes in which there are components and installation equipment operating on a plant is ca…
As the heart of every industry, the pipeline has an enormous role and influence, from simple roles such as water distribution to process piping. Almost a large percentage of factory performance in …
This research predicts traffic density based on CCTV footage of Palembang city traffic. It uses the YOLOv9 model to detect cars and motorcycles, achieving a training performance with an mAP 0.5 of …
This research focuses on identifying the optimal route by analyzing the results of Genetic Algorithm and Particle Swarm Optimization. This research uses You Only Look Once version 9 (YOLOv9) to cre…
Traffic congestion in Palembang City is caused by the number of vehicles exceeding the road capacity. This study discusses the determination of the best route in an intelligent transportation syste…
This study aims to analyze traffic density in Palembang City by utilizing YOLOv9 for vehicle detection from CCTV recordings and employing K-Nearest Neighbors (KNN) and Long Short-Term Memory (LSTM)…
This research designs and implements a computer network bandwidth monitoring system using the Simple Network Management Protocol (SNMP) integrated with Zabbix software. The main objective of this s…
Network performance heavily depends on efficient and structured bandwidth management to ensure optimal data communication. This study implements the Hierarchical Token Bucket (HTB) method on MikroT…
This research is motivated by the rapid growth of the Indonesian film industry and the increasing need for an accurate film genre classification system to help viewers understand film content more …
This research aims to analyze public sentiment towards traffic congestion in Palembang City using the Long Short Term Memory (LSTM) algorithm and then video recording using YOLOv8 followed by LSTM.…
This research aims to analyze public sentiment towards traffic congestion in Palembang City using Random Forest algorithm then video recording using YOLOv8 followed by Random Forest. The method use…
Android malware is an application that targets Android devices to steal crucial data, including money or confidential information from Android users. Recent years have seen a surge in research on A…
Cash is a valuable means of exchange owned by an institution or company and is ready to be used for transaction needs for the institution or company. Cash as an asset or the value of liquid wealth …
Traffic management in major cities like Palembang faces congestion challenges, especially on main roads. The implementation of ETLE provides real-time data on traffic conditions, including vehicle …
This research aims to analyze public sentiment towards traffic jams in Palembang City using the K-Nearest Neighbors (KNN) algorithm and then video recordings using YOLOv8 followed by KNN. The metho…
The advancement of computer network technology has brought significant benefits in data exchange and communication, but it also introduces cybersecurity risks, one of which is lateral movement. Thi…
Air quality is a crucial factor for maintaining environmental health and comfort, especially in outdoor areas. This study aims to design and implement an air quality monitoring system based on the …
The rapid development of technology and internet access has fostered the widespread activity of online gambling, becoming a global phenomenon. This research aims to classify multi-class detection o…
A Man-in-the-Middle (MITM) attack is a security threat in network communication that allows an attacker to intercept and modify data transmitted between two devices. This attack can disrupt SCADA-b…
Deteksi anomali pada jaringan merupakan aspek penting dalam keamanan siber. Penelitian ini bertujuan untuk mengevaluasi kinerja model Gradient Boosting dalam mendeteksi anomali pada lalu lintas rev…
The classification of articles into several categories has been done using the Naive Bayes method, with an F1-score result of 98% on balanced data based on titles and abstracts. The results show a …
Rapid development of technology has an impact in various factor on improving productivity and efficiency, one of which is in the agricultural sector. The available of various types of technology, t…
Hydroponic farming has become an alternative solution to the limitations of conventional agricultural land while also answering the challenge of increasing food needs. The Smart Showcase Hydroponic…
The hydroponic Smart Showcase is a modern agricultural innovation that requires real-time monitoring of light intensity to support plant growth. This study aims to implement a light intensity monit…
The evolution of technology roles attracted cyber security threats not only compromise stable technology but also cause significant financial loss for organizations and individuals. As a result, or…
DDoS attacks are one of the most common network security threats on the internet. This attack utilizes various sources to send excessive traffic to a server, resulting in system disruption. This ma…
Android is one of the most widely used operating systems. Android devices store various personal and sensitive information, which poses significant security risks. One of the major threats is the m…