Data security is an infrastructure designed to protect and secure data from unauthorized access, data manipulation,
malfunction, destruction, and inappropriate data disclosure. Currently, organizations widely use data transfer to validate and…
Data transfer across numerous platforms has increased dramatically due to the enormous number of visitors or users of the
present e-commerce platform. With the rise of increasingly massive data, consumers are finding it challenging to obtain the…
At the end of 2019, a new disease called Coronavirus Disease (COVID-19) originated in Wuhan, China. This disease is caused
by respiratory tract infections, ranging from the common cold to serious diseases such as Middle East Respiratory Syndrome…
Mastoiditis is disease that to infection of the mastoid bone cavity that affects the size of the air cell system of the temporal bone.
Visually, the information temporal CT image mastoid bone has can assist medical experts in viewing the mastoid…
Higher education institutions store data keep growing every year. The data has important information, but it still not optimized
into knowledge. Data Mining (DM) can be used to process existing data in universities in order to obtain knowledge that…
With background of Covid-19 pandemic, Indonesian state trying to make various efforts, so people comply health protocols.
One of them is through PeduliLindungi application. PeduliLindungi has 3 main functions, namely tracing, tracking, warning…
Beef consumption is quite high and expensive in the world. In Indonesia, beef prices are relatively expensive because the meat
supply chain from farmers to the market is quite long. The high demand for beef and the difficulty of obtaining meat are…
The results of the test using 5 data of malaria parasite test imagery found that image 1 has an average accuracy value of the
energy of 0.55627, homogeneity average of 0.8371, PSNR of 6.1336db, and MSE of 0.24358. Image 2 has an average energy…
Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations
between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack,…
Consumption of fish as a food requirement for the fulfillment of community nutrition is increasing. This was followed by an
increase in the amount of fish caught that were sold at fish markets. Market managers must be concerned about the dispersion…