International Electrotechnical Commission (IEC) 61850 is a communications standard designed specifically for electrical substation automation, facilitating interoperability among Intelligent Electr…
The rapid development of technology and internet access has fostered the widespread activity of online gambling, becoming a global phenomenon. This research aims to classify multi-class detection o…
A Man-in-the-Middle (MITM) attack is a security threat in network communication that allows an attacker to intercept and modify data transmitted between two devices. This attack can disrupt SCADA-b…
Deteksi anomali pada jaringan merupakan aspek penting dalam keamanan siber. Penelitian ini bertujuan untuk mengevaluasi kinerja model Gradient Boosting dalam mendeteksi anomali pada lalu lintas rev…
Android is one of the most widely used operating systems. Android devices store various personal and sensitive information, which poses significant security risks. One of the major threats is the m…
Malware, short for malicious software, is a type of harmful software designed to damage, steal data from, or disrupt computer systems and networks. One of the most common types of malware is the Tr…
This study aims to identify patterns in the relationship between the number of school buses and the number of school passengers in Jakarta during the 2017–2019 period using an unsupervised learni…
This research aims to develop a model capable of predicting soil condition classification based on datasets obtained from smart farming monitoring devices using the Support Vector Machine (SVM) alg…
In digital era right now, with the rapid advancement of time, system and network security is very important in the digital communication environment. Machine learning techniques are currently one o…
The Internet of Things (IoT) has brought various conveniences to everyday life, particularly in smart home applications. However, this increased connectivity also heightens the risk of cyber attack…
The Internet of Things (IoT) has facilitated the automation of household device management through the implementation of smart home concepts. However, the increasing number of connected devices in …
The advancement of the Internet of Things (IoT) enables physical devices such as cameras, home doors, televisions, lights, and other household appliances to connect to the internet, forming an inte…
The Internet of Things (IoT) has brought convenience to everyday life, particularly through the implementation of smarthome devices. However, the connectivity of these devices also increases their …
The Internet of Things (IoT) offers numerous benefits but also increases security risks, one of which is Distributed Denial of Service (DDoS) attacks. These attacks can cripple Smarthome systems by…
This study aims to compare data from two different sources, namely social media data and data from the Electronic Traffic Law Enforcement (ETLE) system, using the K-Nearest Neighbor method, in term…
Denial of Service attacks are a type of attack that can cripple a network system by flooding the target with a large number of request packets, such as ICMPv6 Flood "Echo Request". This attack is h…
The advancement of technology had led to an increasing variety of attacks or threats targeting internet users. Attacks such as phishing, malware, spyware, and ransomware were the common types that …
The rapid growth of digital biomedical data has posed significant challenges in managing and extracting information from unstructured medical texts. This study aims to develop and evaluate a Clinic…
Clinical Named Entity Recognition (CNER) is a critical task in natural language processing (NLP) aimed at extracting medical entities from complex biomedical texts. The main challenges in this task…
Named Entity Recognition (NER) is one of the key tasks in natural language processing (NLP), especially within the biomedical domain, which is complex and filled with specific terminologies. This r…
Cloud Computing, particularly Infrastructure as a Service (IaaS), offers high flexibility, cost efficiency, and scalability in managing computing resources. However, fluctuating demands and dynamic…
Blockchain offers high security; however, the performance of transactions on this network remains a subject that requires further analysis. Transaction success in blockchain is influenced by variou…
Network security is very important in the increasingly modern era like today, where almost every human activity today requires this, especially the implementation of Warehouse Management Systems wh…
Supply chain management is a series of business processes that connect several actors to increase the added value of products and distribute them to consumers. In reality, there is a problem that o…
This research aims to analyse public sentiment towards traffic congestion in Palembang City using YOLOv8 model and Recurrent Neural Network (RNN) algorithm. The background of this research focuses …
The Proximal Policy Optimization (PPO) and Advantage Actor-Critic (A2C) methods have proven effective in detecting, evaluating, and performing multi-class classification of cyberattacks. This study…
This research discusses train accidents in Indonesia from 2007-2022. With the aim of identifying the factors that cause train accidents in Indonesia, revealing which years Indonesia experienced the…
Penggunaan SIPPN oleh masyarakat masih dirasakan belum maksimal, karena keterbatasan sebagian masyarakat dalam menggunakan teknologi informasi. Namun dengan adanya media sosial diharapkan dapat mem…
Fire is one of the natural disasters that cause loss of property. objects and endanger the safety of life. The fire started from a small fire that got bigger, causing the fire to spread. This resea…
Perkembangan jaringan Internet of Things (IoT) telah membawa dampak signifikan pada berbagai sektor, termasuk transportasi dan pelayanan kesehatan. Namun, lonjakan adopsi IoT juga memunculkan tanta…