Fire is one of the natural disasters that cause loss of property. objects and endanger the safety of life. The fire started from a small fire that got bigger, causing the fire to spread. This resea…
Perkembangan jaringan Internet of Things (IoT) telah membawa dampak signifikan pada berbagai sektor, termasuk transportasi dan pelayanan kesehatan. Namun, lonjakan adopsi IoT juga memunculkan tanta…
This study utilizes a deep learning model using a Convolutional Neural Network with ResNet – 18 architecture in classifying dental conditions based on RGB images consisting of four classes: Calcu…
Exploit Reverse HTTPS merupakan sebuah konsep teknik serangan malware yang dilakukan oleh penyerang untuk mengekspos kelemahan dalam lapisan HTTPS pada sistem atau aplikasi untuk mencuri atau menga…
Bitcoin is one of the most popular digital currencies widely used in online transactions. However, Bitcoin transactions are prone to anomalies, which may indicate suspicious activities such as frau…
Smart Home is a form of automation technology designed to facilitate household activities with the help of the Internet of Things (IoT). IoT technology enables objects around us, such as sensors, c…
This research was motivated by conducting underwater exploration, because underwater exploration has a high risk if carried out by humans, with the difficulty of accessing underwater areas, so in t…
Ransomware is a type of malware that encrypts the victim's data and demands a ransom to restore access, with WannaCry being one of the most notorious variants exploiting EternalBlue on the SMB prot…
Advances in technology present challenges in matching individual skills with appropriate job recommendations. This research develops a Natural Language Processing (NLP) based job recommendation sys…
Skin diseases account for 1.79% of the world's disease burden. Indonesia is ranked 3rd of the top ten diseases in the world. Digital processing can enable better feature extraction from images of s…
Wireless Sensor Networks (WSN) are distributed systems consisting of numerous small and intelligent sensors designed to monitor, collect, and transmit data from the surrounding environment to a con…
The advancement of the Internet of Things (IoT) presents new challenges in network security, especially in Low-Power and Lossy Networks (LLN) which are vulnerable to Denial-of-Service (DoS) attacks…
Garba Rujukan Digital (GARUDA) is a source of information covering various fields including science, behavioral psychology, moral science, math, and computers, as well as other scientific publicati…
The security of cloud computing has become a critical issue with the rise of malware threats such as spyware, ransomware, and trojan horses. This study develops a malware detection system based on …
Distributed Denial of Service (DDoS) is a major threat to cloud computing infrastructure, capable of causing service disruptions and significant losses. This study aims to develop an adaptive DDoS …
Fire is one of the disasters that most people worry about, especially indoor fires in office buildings, hospitals, shopping centers or housing, because in addition to possibly causing material loss…
Cyber attacks are a form of threat aimed at stealing, damaging, or altering important data within computer systems or networks. These attacks include hacking, phishing, and malware. Detecting cyber…
In the rapid development of technology, System and Network Security is very important in the ecosystem of digital communication environments. Machine Learning techniques can be used to solve this p…
Cyber attacks have become an increasing threat to the security of modern information systems. To overcome the complexity and diversity of attacks that occur, a sophisticated and reliable detection …
Android menjadi OS paling populer pada perangkat mobile membuatnya menjadi target utama threat actor dalam membuat malware. Beberapa penelitian menunjukkan bahwa deteksi malware pada perangkat mobi…
Watering plants is a tedious thing and is often forgotten by both households and farmers, while plants really need enough water to grow. Seeing these conditions, researchers designed an automation …
K-Means clustering is a tool used to determine the cluster structure of a dataset identified by its strong similarity to other clusters or its strong difference from other clusters. In another pape…
Growth factors such as economic, social, political, and cultural developments have become one of the traffic problems in Palembang City that has caused the occurrence of traffic density. To avoid g…
Traffic congestion is always a primary concern in transportation issues, and it continues to pose challenges in daily activities. To address this problem, a system that can detect vehicle density l…
Cyberattacks are unauthorized attempts to track and disrupt the operation of communication systems and control systems by exploiting the security weaknesses of communication networks. Efforts to pr…
Tujuan penelitian ini adalah Menganalisis jalur terbaik yang didapatkan berdasarkan hasil algoritma CH pada beberapa kondisi jalan di Kota Palembang. Penelitian dilakukan pada bulan Juni 2023 s.d. …
Continuous Deployment (CD) is a method of deploying applications to production servers automatically and continuously. This research aims to explore the application of the Continuous Deployment met…
Bitcoin, introduced in 2008 by Satoshi Nakamoto, is the first digital currency to use blockchain for secure transactions. Despite its popularity, challenges in detecting illegal or suspicious trans…
Kehilangan data merupakan isu umum dalam berbagai kumpulan data dan menjadi salah satu tantangan paling kompleks dalam ilmu komputer. Masalah ini mempersulit proses pengolahan data karena banyaknya…
In the application of Artificial Intelligence to determine the best route as a means to alleviate traffic congestion in the city of Palembang, the author uses the Glowworm Swarm Optimization (GSO) …