The Sriwijaya University Library

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Login
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
1 2 3 4 5 Next Last Page
cover
DATA ANALISIS KECELAKAAN KERETA API DI INDONESIA MENGGUNAKAN METODE EXPLORATO…
Endy, Afri Wildanu

This research discusses train accidents in Indonesia from 2007-2022. With the aim of identifying the factors that cause train accidents in Indonesia, revealing which years Indonesia experienced the…

Edition
-
ISBN/ISSN
-
Collation
xiv, 55 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1690372025
Availability1
Add to basket
View DetailCite
cover
ANALISIS PENGGUNAAN MEDIA SOSIAL SEBAGAI SARANA MEMAKSIMALKAN FUNGSI WEBSITE …
Khairunnisa, Cahyani

Penggunaan SIPPN oleh masyarakat masih dirasakan belum maksimal, karena keterbatasan sebagian masyarakat dalam menggunakan teknologi informasi. Namun dengan adanya media sosial diharapkan dapat mem…

Edition
-
ISBN/ISSN
-
Collation
xiv, 60 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1685672025
Availability1
Add to basket
View DetailCite
cover
DETEKSI EXPLOIT REVERSE HTTPS DENGAN METODE DECISION TREE
Al Kautsar, Azzan Daffa

Exploit Reverse HTTPS merupakan sebuah konsep teknik serangan malware yang dilakukan oleh penyerang untuk mengekspos kelemahan dalam lapisan HTTPS pada sistem atau aplikasi untuk mencuri atau menga…

Edition
-
ISBN/ISSN
-
Collation
xv, 90 hlm.: ilus., tab.; 29 cm
Series Title
-
Call Number
T1637762025
Availability1
Add to basket
View DetailCite
cover
DETEKSI ANOMALI TRANSAKSI BITCOIN MENGGUNAKAN METODE KMEANS DAN KMEDOIDS
Juniansyah, Rahmat

Bitcoin is one of the most popular digital currencies widely used in online transactions. However, Bitcoin transactions are prone to anomalies, which may indicate suspicious activities such as frau…

Edition
-
ISBN/ISSN
-
Collation
xv, 83 hlm.: ilus., tab.; 29 cm
Series Title
-
Call Number
T1658352025
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN DDOS DOS DAN MITM PADA JARINGAN SMARTHOME DENGAN MENGGUNAKAN…
Pratama, Edo

Smart Home is a form of automation technology designed to facilitate household activities with the help of the Internet of Things (IoT). IoT technology enables objects around us, such as sensors, c…

Edition
-
ISBN/ISSN
-
Collation
xiv, 74 hlm., ilus., tab.; 29 cm
Series Title
-
Call Number
T1651822025
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI METODE FUZZY LOGIC PADA SISTEM KESEIMBANGAN ROBOT BAWAH AIR
Habibullah, Abdurasyid Fairuz

This research was motivated by conducting underwater exploration, because underwater exploration has a high risk if carried out by humans, with the difficulty of accessing underwater areas, so in t…

Edition
-
ISBN/ISSN
-
Collation
viii, 58 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1648582024
Availability1
Add to basket
View DetailCite
cover
PERBANDINGAN ANALISIS STATIS DAN DINAMIS PADA DETEKSI WANNACRY RANSOMWARE
Dwiyono, Luqman Agus

Ransomware is a type of malware that encrypts the victim's data and demands a ransom to restore access, with WannaCry being one of the most notorious variants exploiting EternalBlue on the SMB prot…

Edition
-
ISBN/ISSN
-
Collation
xvii, 131 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1651772025
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI MODEL NATURAL LANGUAGE PROCESSING (NLP) PADA SISTEM REKOMENDASI …
Fikri, Mhd. Haidir

Advances in technology present challenges in matching individual skills with appropriate job recommendations. This research develops a Natural Language Processing (NLP) based job recommendation sys…

Edition
-
ISBN/ISSN
-
Collation
xvi, 108 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1620882024
Availability1
Add to basket
View DetailCite
cover
SISTEM KLASIFIKASI PENYAKIT KULIT (LESI) MENGGUNAKAN TEKNIK PENGOLAHAN DIGITA…
Gusando, Edwin 

Skin diseases account for 1.79% of the world's disease burden. Indonesia is ranked 3rd of the top ten diseases in the world. Digital processing can enable better feature extraction from images of s…

Edition
-
ISBN/ISSN
-
Collation
xiii, 66 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1631452025
Availability1
Add to basket
View DetailCite
cover
 IMPLEMENTASI KENDALI LOGIKA FUZZY PADA PURWARUPA PENDETEKSI KEBAKARAN DALAM…
Malik, Imam

Fire is one of the disasters that most people worry about, especially indoor fires in office buildings, hospitals, shopping centers or housing, because in addition to possibly causing material loss…

Edition
-
ISBN/ISSN
-
Collation
xv, 55 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1410582024
Availability1
Add to basket
View DetailCite
cover
OPTIMALISASI MULTI-CLASSIFICATION SERANGAN CYBER MENGGUNAKAN METODE K-NEAREST…
Yanti, Zuli

Cyber attacks are a form of threat aimed at stealing, damaging, or altering important data within computer systems or networks. These attacks include hacking, phishing, and malware. Detecting cyber…

Edition
-
ISBN/ISSN
-
Collation
xxii, 251 hlm.; tab.; ilus.; 29 cm.
Series Title
-
Call Number
T1431382024
Availability1
Add to basket
View DetailCite
cover
PENERAPAN METODE HYBRID CNN-LSTM DALAM SISTEM DETEKSI MULTI CLASSIFICATION CY…
Fajri, Muhammad

In the rapid development of technology, System and Network Security is very important in the ecosystem of digital communication environments. Machine Learning techniques can be used to solve this p…

Edition
-
ISBN/ISSN
-
Collation
xvi, 164 hlm.; tab.; ilus.; 29 cm.
Series Title
-
Call Number
T1431302024
Availability1
Add to basket
View DetailCite
cover
SISTEM DETEKSI MULTI-CLASSIFICATION SERANGAN CYBER MENGGUNAKAN METODE DEEP LE…
Nurhaliza, Sari

Cyber attacks have become an increasing threat to the security of modern information systems. To overcome the complexity and diversity of attacks that occur, a sophisticated and reliable detection …

Edition
-
ISBN/ISSN
-
Collation
xvi, 187 hlm.; tab.; ilus.; 29 cm.
Series Title
-
Call Number
T1431292024
Availability1
Add to basket
View DetailCite
cover
DETEKSI EXPLOIT REVERSE TCP DARI APK TROJAN PADA NETWORK TRAFFIC DENGAN METOD…
Danuarta, Muhammad Arya

Android menjadi OS paling populer pada perangkat mobile membuatnya menjadi target utama threat actor dalam membuat malware. Beberapa penelitian menunjukkan bahwa deteksi malware pada perangkat mobi…

Edition
-
ISBN/ISSN
-
Collation
xv, 85 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1467452024
Availability1
Add to basket
View DetailCite
cover
SISTEM PENYIRAMAN OTOMATIS PADA TANAMAN SELADA (LACTUCA SATIVA L) BERDASARKAN…
Wahyudi, Mellinio Agung

Watering plants is a tedious thing and is often forgotten by both households and farmers, while plants really need enough water to grow. Seeing these conditions, researchers designed an automation …

Edition
-
ISBN/ISSN
-
Collation
xv, 59 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1425212024
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN TROJAN METASPLOIT PADA ANDROID DENGAN METODE K-MEANS
Setiawan, Hafizd

K-Means clustering is a tool used to determine the cluster structure of a dataset identified by its strong similarity to other clusters or its strong difference from other clusters. In another pape…

Edition
-
ISBN/ISSN
-
Collation
xiii, 46 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1465462024
Availability1
Add to basket
View DetailCite
cover
DETEKSI KEPADATAN KENDARAAN MENGGUNAKAN METODE K-NEAREST NEIGHBOR DIOPTIMASI …
Rahmadinni, Nadila

Growth factors such as economic, social, political, and cultural developments have become one of the traffic problems in Palembang City that has caused the occurrence of traffic density. To avoid g…

Edition
-
ISBN/ISSN
-
Collation
xv, 85 hlm.; tab.; Ilus.; 29 cm
Series Title
-
Call Number
T1492452024
Availability1
Add to basket
View DetailCite
cover
SISTEM TRANSPORTASI PINTAR MENGGUNAKAN METODE ARTIFICIAL NEURAL NETWORK YANG …
Indriyani, Sisca

Traffic congestion is always a primary concern in transportation issues, and it continues to pose challenges in daily activities. To address this problem, a system that can detect vehicle density l…

Edition
-
ISBN/ISSN
-
Collation
xii, 113 hlm.; ilus.; tab.; 28 cm
Series Title
-
Call Number
T1437732024
Availability1
Add to basket
View DetailCite
cover
MULTI-CLASSIFICATION SERANGAN SIBER MENGGUNAKAN METODE SUPPORT VECTOR MACHINE…
Albaqi, Yahadi Rasyid

Cyberattacks are unauthorized attempts to track and disrupt the operation of communication systems and control systems by exploiting the security weaknesses of communication networks. Efforts to pr…

Edition
-
ISBN/ISSN
-
Collation
xvii, 184 hlm.; ilus.; tab.; 28cm
Series Title
-
Call Number
T1440762024
Availability1
Add to basket
View DetailCite
cover
ANALISA KEPADATAN KENDARAAN MENGGUNAKAN METODE K-NN DAN PENENTUAN JALUR TERBA…
Pangestu, Muhammad Anugrah

Tujuan penelitian ini adalah Menganalisis jalur terbaik yang didapatkan berdasarkan hasil algoritma CH pada beberapa kondisi jalan di Kota Palembang. Penelitian dilakukan pada bulan Juni 2023 s.d. …

Edition
-
ISBN/ISSN
-
Collation
xvii, 87 hlm.; ilus.; tab.; 28 cm
Series Title
-
Call Number
T1435582024
Availability1
Add to basket
View DetailCite
cover
OPTIMASI DEPLOYMENT APLIKASI BERBASIS SERVER KE CLOUD ENVIRONMENT DENGAN METO…
Putra, Qory Amanah

Continuous Deployment (CD) is a method of deploying applications to production servers automatically and continuously. This research aims to explore the application of the Continuous Deployment met…

Edition
-
ISBN/ISSN
-
Collation
xvi, 111 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1486862024
Availability1
Add to basket
View DetailCite
cover
DETEKSI ANOMALI TRANSAKSI BITCOIN DENGAN METODE ISOLATION FOREST
Aniska, Agera

Bitcoin, introduced in 2008 by Satoshi Nakamoto, is the first digital currency to use blockchain for secure transactions. Despite its popularity, challenges in detecting illegal or suspicious trans…

Edition
-
ISBN/ISSN
-
Collation
xvii, 126 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1468362024
Availability1
Add to basket
View DetailCite
cover
 IMPUTASI DATA YANG HILANG PADA DATA DERET WAKTU MULTIVARIAT MENGGUNAKAN ARS…
Karim, Muhammad Irfan

Kehilangan data merupakan isu umum dalam berbagai kumpulan data dan menjadi salah satu tantangan paling kompleks dalam ilmu komputer. Masalah ini mempersulit proses pengolahan data karena banyaknya…

Edition
-
ISBN/ISSN
-
Collation
xix, 143 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1464252024
Availability1
Add to basket
View DetailCite
cover
OPTIMALISASI KINERJA APACHE HTTP SERVER DENGAN PENDEKATAN TUNING PARAMETER BE…
Abulkhoir, Syarif

Apache HTTP Server is one of the most widely used web servers today. Despite its advantages in stability and security, the performance of the Apache HTTP Server is often affected by traffic load an…

Edition
-
ISBN/ISSN
-
Collation
xv, 212 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1487702024
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI ALGORITMA ENKRIPSI PADA KOMPUTER KUANTUM
Repaldi, Khalifaturahman Al Hazri

With the computing speed possessed by quantum computers, the security of encryption on classical computers is threatened, especially the security of the RSA encryption algorithm, because it is pred…

Edition
-
ISBN/ISSN
-
Collation
xiv, 159.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1487632024
Availability1
Add to basket
View DetailCite
cover
PENGEMBANGAN MODEL TINGKAT KEPARAHAN KECELAKAAN LAUT MENGGUNAKAN METODE KLASI…
Safitri, Arinda Intan

Maritime transportation plays an important role in international trade, more than 50,000 merchant ships are involved every day and this causes a large opportunity for maritime accidents. Therefore,…

Edition
-
ISBN/ISSN
-
Collation
xv, 58 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1426182024
Availability1
Add to basket
View DetailCite
cover
 SIMULASI METODE PROOF OF WORK (POW) PADA SUPPLY CHAIN MANAGEMENT DI BIDANG …
Wulandari, Anisa

Use of Supply Chain Management (SCM) technology integrated with Smart Contract to increase transparency and data security in the supply chain industry. Several traditional problems in SCM, such as …

Edition
-
ISBN/ISSN
-
Collation
xiv, 98 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1430072024
Availability1
Add to basket
View DetailCite
cover
DETEKSI MALWARE ANDROID MENGGUNAKAN METODE CONVOLUTIONAL NEURAL NETWORK (CNN)
Hidayatullah, Hidayatullah

As the most widely used mobile operating system, Android is increasingly becoming a prime target for malware attacks. The popularity of this operating system makes it attractive for cyber security …

Edition
-
ISBN/ISSN
-
Collation
xvi, 41 hlm.; tab.; Ilus.; 29 cm
Series Title
-
Call Number
T1481942024
Availability1
Add to basket
View DetailCite
cover
 ANALISA KEPADATAN KENDARAAN MENGGUNAKAN ALGORITMA CONVOLUTIONAL NEURAL NETW…
Agistina, Titin

Pada penerapan AI untuk menentukan kepadatan kendaraan di kota Palembang yang terpantau oleh kamera penulis menggunakan algoritma Convolutional Neural Network. kemudian untuk Mencari rute terbaik d…

Edition
-
ISBN/ISSN
-
Collation
xvi, 99 hlm.; tab.; ilus.; 29 cm.
Series Title
-
Call Number
T1431372024
Availability1
Add to basket
View DetailCite
cover
ANALISA FORENSIK PEMALSUAN TIMESTAMP PADA NEW TECHNOLOGY FILE SYSTEM (NTFS)
Gustiawan, Rizky Soufi

Digital Forensics is a part of forensic science that includes inventions and Data investigation on a digital device that aims to prove scientific computer crimes in order to obtain digital evidence…

Edition
-
ISBN/ISSN
-
Collation
xvi, 55 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T393762020
Availability1
Add to basket
View DetailCite
1 2 3 4 5 Next Last Page

Search Result

Found 208 from your keywords: Subject : "Prodi Sistem Komputer,"
Query took 0.03148 second(s) to complete
XML ResultJSON Result

Suggestion
image
PROGRAMMING WITH Macintosh Pascal
Rink, Richard A. - Wisenbaker, Vance B. - Vance, Richard G.
image
KLASIFIKASI EMOSI PADA KALIMAT DI TWITTER MENGGUNAKAN ALGORITMA LONG SHORT-TERM MEMORY
Ramadhanti, Shabrina
image
PEMIDANAAN KASUS PENYALAHGUNAAN NARKOTIKA GOLONGAN I (STUDI PUTUSAN NOMOR 13/PID.SUS/2021/PN PLG DAN PUTUSAN NOMOR 242/PID.SUS/2021/PN PLG)
Akbar, Ilham.
image
INTERMARKET ANALYSIS and INVESTING: Integrating Economic, Fundamental, and Technical Trends
Gayed, Michael E.S.
image
PERENCANAAN KONSTRUKSI BAJA: UNTUK INSINYUR DAN ARSITEKTUR 2
Amon, Rene - Knobloch, Bruce - Mazumder, Atanu - Handoyo, Ridwan
The Sriwijaya University Library
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search