Browse Items (18 total)

6091-Article Text-21275-2-10-20241229 (1).pdf
In the digital age, the security of communication technologies is paramount, with cybercrime projected to reach $10.5 trillion annually by 2025. While encryption is vital, decrypted data remains vulnerable, prompting the exploration of steganography…

6119-Article Text-21280-2-10-20241229 (2).pdf
Human health depends on choosing food ingredients that align with dietary needs and avoid allergens. However, consumers often encounter unfamiliar ingredients that require additional information. Traditionally, they search online by typing in the…

6116-Article Text-21273-2-10-20241229 (1).pdf
This research seeks to construct an automatic translation between Indonesian and Sundanese languages based on the Neural Machine Translation (NMT) method. The model used in this study is the Long Short-Term Memory (LSTM) type, which carries out an…

6139-Article Text-21297-3-10-20241229 (1).pdf
Visitor reviews play a crucial role in determining the success of a business, particularly those offering hospitality and services, such as hotels. The growth of internet technology has made it easier for guests to share their experiences, which can…

5906-Article Text-21303-1-10-20241229 (1).pdf
The increase in population impacts several environmental sectors, particularly the use of natural gas energy for household needs, such as LPG (Liquefied Petroleum Gas). This has resulted in the depletion of natural gas reserves and a…

6005-Article Text-21302-1-10-20241229 (1).pdf
The performance of XYZ, a Government Higher Educational Institution (GHEI) in Indonesia is assessed through two unintegrated applications. The 2023 targetperformancewas missed due to miscalculations outside…

6017-Article Text-21272-1-10-20241226 (1).pdf
The pervasive issue of fake news spreading rapidly on online platforms.causing a concerning dissemination of misinformation. The influence of fake news has become a pressing social problem, shaping public opinionin important eventssuch as elections.…

6048-Article Text-21270-2-10-20241229 (1).pdf
This research aims to develop a memory-efficient face recognition system for a receptionist robot using the Local Binary Patterns Histogram (LBPH) algorithm. Given the computational limitations of the Raspberry Pi, the system utilizes optimization …

5507-Article Text-20087-2-10-20240804 (1).pdf
Student feedback plays a crucial role in enhancing the quality of educational programs, yet analyzing this feedback, especially in informal contexts, remains challenging. In Indonesia, where student comments often include colloquial language and vary…

6089-Article Text-21291-1-10-20241228 (1).pdf
This study presents a comprehensive comparison of U-Net and Ghost U-Net for road crack segmentation, emphasizing their performance and memory efficiency across various data representation formats, including FP32, FP16, and INT8 quantization. A…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2