Browse Items (8976 total)

4090-Article Text-12549-1-10-20220702.pdf
Mastoiditis is disease that to infection of the mastoid bone cavity that affects the size of the air cell system of the temporal bone.
Visually, the information temporal CT image mastoid bone has can assist medical experts in viewing the mastoid…

4089-Article Text-12804-1-10-20220715.pdf
Vehicular Ad Hoc Network (VANET) or vehicle network is a technology developed for autonomous vehicles in Intelligent
Transportation Systems (ITS). The communication system of VANET is using a wireless network that is potentially being
attacked.…

4067-Article Text-12534-4-10-20220702.pdf
Beef consumption is quite high and expensive in the world. In Indonesia, beef prices are relatively expensive because the meat
supply chain from farmers to the market is quite long. The high demand for beef and the difficulty of obtaining meat are…

4064-Article Text-12574-1-10-20220703.pdf
Knowledge and utilization of digital images are growing rapidly not only in the fields of medicine and industry but also in the
field of agriculture. This knowledge can apply it to a computer-based program that is used to detect agricultural…

4062-Article Text-12533-1-10-20220630.pdf
Consumption of fish as a food requirement for the fulfillment of community nutrition is increasing. This was followed by an
increase in the amount of fish caught that were sold at fish markets. Market managers must be concerned about the dispersion…

4051-Article Text-12532-1-10-20220630.pdf
The sturdy and reliable payment system is one of the most important systems in the digitalization era, especially in the pandemic
COVID-19 period. As part of Critical Infrastructure Information (CII), a strategy to protect the payment system is…

4049-Article Text-12530-1-10-20220630.pdf
The researchers conducted data simulation experiments, but they did so unstructured in determining the number of neurons in
the hidden layer in the Artificial Neural Network Back-Propagation architecture. The researchers also used a general…

5_Enhancing+Image+Processing+Capabilities+based+on.pdf
Image processing is the ability of machines to interpret and understand visual data, has been significantly advanced by Convolutional Neural Networks (CNNs). This study investigates the enhancement of image procesing performance through the…

4035-Article Text-12527-1-10-20220630.pdf
Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations
between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack,…

4018-Article Text-12526-1-10-20220630.pdf
Data security is an infrastructure designed to protect and secure data from unauthorized access, data manipulation,
malfunction, destruction, and inappropriate data disclosure. Currently, organizations widely use data transfer to validate and…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2