The Sriwijaya University Library

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Login
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
1 2 3 4 5 Next Last Page
cover
 ANALISA KINERJA INFRASTRUCTURE AS A SERVICE PADA CLOUD COMPUTING DENGAN PEN…
Azzahra, Mutia Yasmin

Cloud Computing, particularly Infrastructure as a Service (IaaS), offers high flexibility, cost efficiency, and scalability in managing computing resources. However, fluctuating demands and dynamic…

Edition
-
ISBN/ISSN
-
Collation
xv, 99 hlm.; ilus.; 29 cm
Series Title
-
Call Number
T1631532024
Availability1
Add to basket
View DetailCite
cover
ANALISA TRANSAKSI PADA BLOCKCHAIN DENGAN METODE MACHINE LEARNING
Vadithya, Muhammad Dimas

Blockchain offers high security; however, the performance of transactions on this network remains a subject that requires further analysis. Transaction success in blockchain is influenced by variou…

Edition
-
ISBN/ISSN
-
Collation
xix, 108 hlm.: ilus., tab.; 29 cm
Series Title
-
Call Number
T1660552024
Availability1
Add to basket
View DetailCite
cover
ANALISA KEAMANAN PROTOKOL HTTPS DALAM PENGIRIMAN DATA SUPPLY CHAIN MANAGEMENT…
Rohman, Muhammad Fathur

Network security is very important in the increasingly modern era like today, where almost every human activity today requires this, especially the implementation of Warehouse Management Systems wh…

Edition
-
ISBN/ISSN
-
Collation
xix, 63 hlm.; tab.; 29 cm
Series Title
-
Call Number
T1667472025
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI METODE FUZZY TSUKAMOTO DALAM SISTEM MANAJEMEN STOK PERGUDANGAN B…
Padli, Ilham

Supply chain management is a series of business processes that connect several actors to increase the added value of products and distribute them to consumers. In reality, there is a problem that o…

Edition
-
ISBN/ISSN
-
Collation
xv, 90 hlm.: ilus., tab.; 29 cm
Series Title
-
Call Number
T1667502024
Availability1
Add to basket
View DetailCite
cover
ANALISIS SENTIMEN TERHADAP KEMACETAN LALU LINTAS MENGGUNAKAN YOLOV8 DENGAN AL…
Frandesca, Agil Anjas

This research aims to analyse public sentiment towards traffic congestion in Palembang City using YOLOv8 model and Recurrent Neural Network (RNN) algorithm. The background of this research focuses …

Edition
-
ISBN/ISSN
-
Collation
xiv, 138 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1676582025
Availability1
Add to basket
View DetailCite
cover
OPTIMALISASI KLASIFIKASI MULTICLASS SERANGAN SIBER DENGAN ALGORITMA PROXIMAL …
Toyyib, Ahmed Athallah

The Proximal Policy Optimization (PPO) and Advantage Actor-Critic (A2C) methods have proven effective in detecting, evaluating, and performing multi-class classification of cyberattacks. This study…

Edition
-
ISBN/ISSN
-
Collation
xvi, 153 hlm., ilus., tab.; 29 cm
Series Title
-
Call Number
T1753242025
Availability1
Add to basket
View DetailCite
cover
DATA ANALISIS KECELAKAAN KERETA API DI INDONESIA MENGGUNAKAN METODE EXPLORATO…
Endy, Afri Wildanu

This research discusses train accidents in Indonesia from 2007-2022. With the aim of identifying the factors that cause train accidents in Indonesia, revealing which years Indonesia experienced the…

Edition
-
ISBN/ISSN
-
Collation
xiv, 55 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1690372025
Availability1
Add to basket
View DetailCite
cover
ANALISIS PENGGUNAAN MEDIA SOSIAL SEBAGAI SARANA MEMAKSIMALKAN FUNGSI WEBSITE …
Khairunnisa, Cahyani

Penggunaan SIPPN oleh masyarakat masih dirasakan belum maksimal, karena keterbatasan sebagian masyarakat dalam menggunakan teknologi informasi. Namun dengan adanya media sosial diharapkan dapat mem…

Edition
-
ISBN/ISSN
-
Collation
xiv, 60 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1685672025
Availability1
Add to basket
View DetailCite
cover
DETEKSI API PADA VIDEO MENGGUNAKAN METODE BACKGROUND SUBTRACTION DAN SEGMENTA…
Anggraini,Yeni

Fire is one of the natural disasters that cause loss of property. objects and endanger the safety of life. The fire started from a small fire that got bigger, causing the fire to spread. This resea…

Edition
-
ISBN/ISSN
-
Collation
xi, 73 hlm.; ilus., tab.: 28 cm
Series Title
-
Call Number
T399262020
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN MIRAI DENGAN MENGGUNAKAN METODE LONG SHORT-TERM MEMORY (LSTM…
PUTRI, THALIA

Perkembangan jaringan Internet of Things (IoT) telah membawa dampak signifikan pada berbagai sektor, termasuk transportasi dan pelayanan kesehatan. Namun, lonjakan adopsi IoT juga memunculkan tanta…

Edition
-
ISBN/ISSN
-
Collation
xv, 63 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1651572025
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI KONDISI GIGI BERDASARKAN CITRA RGB MENGGUNAKAN CONVOLUTIONAL NEUR…
Sihotang, Gabriel Mediose Alfranda

This study utilizes a deep learning model using a Convolutional Neural Network with ResNet – 18 architecture in classifying dental conditions based on RGB images consisting of four classes: Calcu…

Edition
-
ISBN/ISSN
-
Collation
xiii, 48 hlm.: ilus., tab.; 29 cm
Series Title
-
Call Number
T1651892024
Availability1
Add to basket
View DetailCite
cover
DETEKSI EXPLOIT REVERSE HTTPS DENGAN METODE DECISION TREE
Al Kautsar, Azzan Daffa

Exploit Reverse HTTPS merupakan sebuah konsep teknik serangan malware yang dilakukan oleh penyerang untuk mengekspos kelemahan dalam lapisan HTTPS pada sistem atau aplikasi untuk mencuri atau menga…

Edition
-
ISBN/ISSN
-
Collation
xv, 90 hlm.: ilus., tab.; 29 cm
Series Title
-
Call Number
T1637762025
Availability1
Add to basket
View DetailCite
cover
DETEKSI ANOMALI TRANSAKSI BITCOIN MENGGUNAKAN METODE KMEANS DAN KMEDOIDS
Juniansyah, Rahmat

Bitcoin is one of the most popular digital currencies widely used in online transactions. However, Bitcoin transactions are prone to anomalies, which may indicate suspicious activities such as frau…

Edition
-
ISBN/ISSN
-
Collation
xv, 83 hlm.: ilus., tab.; 29 cm
Series Title
-
Call Number
T1658352025
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN DDOS DOS DAN MITM PADA JARINGAN SMARTHOME DENGAN MENGGUNAKAN…
Pratama, Edo

Smart Home is a form of automation technology designed to facilitate household activities with the help of the Internet of Things (IoT). IoT technology enables objects around us, such as sensors, c…

Edition
-
ISBN/ISSN
-
Collation
xiv, 74 hlm., ilus., tab.; 29 cm
Series Title
-
Call Number
T1651822025
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI METODE FUZZY LOGIC PADA SISTEM KESEIMBANGAN ROBOT BAWAH AIR
Habibullah, Abdurasyid Fairuz

This research was motivated by conducting underwater exploration, because underwater exploration has a high risk if carried out by humans, with the difficulty of accessing underwater areas, so in t…

Edition
-
ISBN/ISSN
-
Collation
viii, 58 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1648582024
Availability1
Add to basket
View DetailCite
cover
PERBANDINGAN ANALISIS STATIS DAN DINAMIS PADA DETEKSI WANNACRY RANSOMWARE
Dwiyono, Luqman Agus

Ransomware is a type of malware that encrypts the victim's data and demands a ransom to restore access, with WannaCry being one of the most notorious variants exploiting EternalBlue on the SMB prot…

Edition
-
ISBN/ISSN
-
Collation
xvii, 131 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1651772025
Availability1
Add to basket
View DetailCite
cover
IMPLEMENTASI MODEL NATURAL LANGUAGE PROCESSING (NLP) PADA SISTEM REKOMENDASI …
Fikri, Mhd. Haidir

Advances in technology present challenges in matching individual skills with appropriate job recommendations. This research develops a Natural Language Processing (NLP) based job recommendation sys…

Edition
-
ISBN/ISSN
-
Collation
xvi, 108 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1620882024
Availability1
Add to basket
View DetailCite
cover
SISTEM KLASIFIKASI PENYAKIT KULIT (LESI) MENGGUNAKAN TEKNIK PENGOLAHAN DIGITA…
Gusando, Edwin 

Skin diseases account for 1.79% of the world's disease burden. Indonesia is ranked 3rd of the top ten diseases in the world. Digital processing can enable better feature extraction from images of s…

Edition
-
ISBN/ISSN
-
Collation
xiii, 66 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1631452025
Availability1
Add to basket
View DetailCite
cover
PENGOPTIMALAN KONSUMSI ENERGI DALAM JARINGAN SENSOR NIRKABEL MELALUI PENINGKA…
Alhadi, M. Aziz

Wireless Sensor Networks (WSN) are distributed systems consisting of numerous small and intelligent sensors designed to monitor, collect, and transmit data from the surrounding environment to a con…

Edition
-
ISBN/ISSN
-
Collation
xiii, 72 hlm., ilus., tab.; 29 cm
Series Title
-
Call Number
T1638462024
Availability1
Add to basket
View DetailCite
cover
DETEKSI SERANGAN UDP FLOOD MENGGUNAKAN METODE RATE-BASED THRESHOLDING PADA JA…
Toha, Ghulam Robbani

The advancement of the Internet of Things (IoT) presents new challenges in network security, especially in Low-Power and Lossy Networks (LLN) which are vulnerable to Denial-of-Service (DoS) attacks…

Edition
-
ISBN/ISSN
-
Collation
xii, 52 hlm., ilus., tab.; 29 cm
Series Title
-
Call Number
T1631922024
Availability1
Add to basket
View DetailCite
cover
KLASIFIKASI PDF MALWARE PADA GARBA RUJUKAN DIGITAL (GARUDA) KEMDIKBUD DIKTI M…
Andina, Indah Ria

Garba Rujukan Digital (GARUDA) is a source of information covering various fields including science, behavioral psychology, moral science, math, and computers, as well as other scientific publicati…

Edition
-
ISBN/ISSN
-
Collation
xv, 58 hlm., ilus., tab.; 29 cm
Series Title
-
Call Number
T1634332025
Availability1
Add to basket
View DetailCite
cover
PENERAPAN METODE RT-AMD DALAM ANALISIS DETEKSI SERANGAN MALWARE PADA LINGKUNG…
Ningrum, Siti Triwinarti

The security of cloud computing has become a critical issue with the rise of malware threats such as spyware, ransomware, and trojan horses. This study develops a malware detection system based on …

Edition
-
ISBN/ISSN
-
Collation
xv, 112 hlm., ilus., tab.; 29 cm
Series Title
-
Call Number
T1643992024
Availability1
Add to basket
View DetailCite
cover
ANALISIS SISTEM DETEKSI SERANGAN DDOS ADAPTIF MENGGUNAKAN METODE RT-AMD PADA …
Maharani, Sahara Diva

Distributed Denial of Service (DDoS) is a major threat to cloud computing infrastructure, capable of causing service disruptions and significant losses. This study aims to develop an adaptive DDoS …

Edition
-
ISBN/ISSN
-
Collation
xv, 150 hlm., ilus., tab.; 29 cm
Series Title
-
Call Number
T1643802024
Availability1
Add to basket
View DetailCite
cover
 IMPLEMENTASI KENDALI LOGIKA FUZZY PADA PURWARUPA PENDETEKSI KEBAKARAN DALAM…
Malik, Imam

Fire is one of the disasters that most people worry about, especially indoor fires in office buildings, hospitals, shopping centers or housing, because in addition to possibly causing material loss…

Edition
-
ISBN/ISSN
-
Collation
xv, 55 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1410582024
Availability1
Add to basket
View DetailCite
cover
OPTIMALISASI MULTI-CLASSIFICATION SERANGAN CYBER MENGGUNAKAN METODE K-NEAREST…
Yanti, Zuli

Cyber attacks are a form of threat aimed at stealing, damaging, or altering important data within computer systems or networks. These attacks include hacking, phishing, and malware. Detecting cyber…

Edition
-
ISBN/ISSN
-
Collation
xxii, 251 hlm.; tab.; ilus.; 29 cm.
Series Title
-
Call Number
T1431382024
Availability1
Add to basket
View DetailCite
cover
PENERAPAN METODE HYBRID CNN-LSTM DALAM SISTEM DETEKSI MULTI CLASSIFICATION CY…
Fajri, Muhammad

In the rapid development of technology, System and Network Security is very important in the ecosystem of digital communication environments. Machine Learning techniques can be used to solve this p…

Edition
-
ISBN/ISSN
-
Collation
xvi, 164 hlm.; tab.; ilus.; 29 cm.
Series Title
-
Call Number
T1431302024
Availability1
Add to basket
View DetailCite
cover
SISTEM DETEKSI MULTI-CLASSIFICATION SERANGAN CYBER MENGGUNAKAN METODE DEEP LE…
Nurhaliza, Sari

Cyber attacks have become an increasing threat to the security of modern information systems. To overcome the complexity and diversity of attacks that occur, a sophisticated and reliable detection …

Edition
-
ISBN/ISSN
-
Collation
xvi, 187 hlm.; tab.; ilus.; 29 cm.
Series Title
-
Call Number
T1431292024
Availability1
Add to basket
View DetailCite
cover
DETEKSI EXPLOIT REVERSE TCP DARI APK TROJAN PADA NETWORK TRAFFIC DENGAN METOD…
Danuarta, Muhammad Arya

Android menjadi OS paling populer pada perangkat mobile membuatnya menjadi target utama threat actor dalam membuat malware. Beberapa penelitian menunjukkan bahwa deteksi malware pada perangkat mobi…

Edition
-
ISBN/ISSN
-
Collation
xv, 85 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1467452024
Availability1
Add to basket
View DetailCite
cover
SISTEM PENYIRAMAN OTOMATIS PADA TANAMAN SELADA (LACTUCA SATIVA L) BERDASARKAN…
Wahyudi, Mellinio Agung

Watering plants is a tedious thing and is often forgotten by both households and farmers, while plants really need enough water to grow. Seeing these conditions, researchers designed an automation …

Edition
-
ISBN/ISSN
-
Collation
xv, 59 hlm.; ilus.; tab.; 29 cm.
Series Title
-
Call Number
T1425212024
Availability1
Add to basket
View DetailCite
cover
VISUALISASI SERANGAN TROJAN METASPLOIT PADA ANDROID DENGAN METODE K-MEANS
Setiawan, Hafizd

K-Means clustering is a tool used to determine the cluster structure of a dataset identified by its strong similarity to other clusters or its strong difference from other clusters. In another pape…

Edition
-
ISBN/ISSN
-
Collation
xiii, 46 hlm.; ilus.; tab.; 29 cm
Series Title
-
Call Number
T1465462024
Availability1
Add to basket
View DetailCite
1 2 3 4 5 Next Last Page

Search Result

Found 474 from your keywords: Subject : "Sistem komputer"
Query took 0.02765 second(s) to complete
XML ResultJSON Result

Suggestion
image
Mechatronics and Automatic Control Systems: Proceedings of the 2013 International Conference on Mechatronics and Automatic Control Systems (ICMS2013)
Wang, Wego
image
ENGARUH PENERAPAN E-FILLING, PENGETAHUAN PERPAJAKAN, DAN SANKSI PERPAJAKAN TERHADAP KEPATUHAN WAJIB PAJAK ORANG PRIBADI DI PERUM BULOG KANTOR WILAYAH SUMSEL DAN BABEL
Nadila, Ervina Kurnia
image
VALUE AND CAPITAL
Hicks, J.R.
image
ANALISIS KONDISI SARANA SANITASI PADA AGEN PEMBUATAN PEMPEK SEPEDA DI KAMPUNG KAPITAN KOTA PALEMBANG.
Fadilah, Elda
image
Hidden Worlds: Looking Through a Scientist's Microscope
Kramer, Stephen
The Sriwijaya University Library
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search