Browse Items (7 total)

68-Article Text-436-3-10-20250202.pdf
The effects of social media and modern approaches help offenders to achieve their crimes. This paper exploresmachine learning architectureto predict criminal crime cases by classifyingeach type of crime using K-Means which is optimized…

101-Article Text-413-2-10-20250130.pdf
Distributed Denial of Service (DDoS) attacks are one of the serious threats in cybersecurity that can disrupt the availability of network services. Traditional approaches to DDoS mitigation often have limitations in detecting complex attack patterns…

104-Article Text-410-1-10-20250130.pdf
Corruption is one of the most pressing issues in Indonesia, significantly affecting public trust in governance and the nation’s development. Among the many corruption cases that have surfaced, the recent 271 trillion rupiahs corruption…

103-Article Text-404-2-10-20250130.pdf
nternet of Things (IoT), Health Monitoring, Wireless Data Transmission

102-Article Text-402-2-10-20250130.pdf
Low knowledge about reproductive health among mothers and adolescent girls leads to a lack of understanding of its importance. This limited knowledge results in women's inability to care for their reproductive organs, often exacerbated by…

98-Article Text-393-4-10-20250130.pdf
The advancement of information technology has driven the massive adoption of web-based information systems across various sectors. However, this surge in usage has been accompanied by increasingly complex data security threats, such as…

71-Article Text-447-5-10-20250210.pdf
This study aims to develop and implement a plant disease detection system for oil palm seedlings based on leaf images using the MobileNetV2 architecture, which is based on Convolutional Neural Networks (CNN). The model was trained using a dataset of…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2