| 1 |
The Effectiveness of Anomaly-Based Intrusion Detec...
|
2023 |
|
| 2 |
Sign Language Translator Based on Raspberry Pi Cam...
|
2023 |
|
| 3 |
Analysis and Implementation of Digital Signature A...
|
2023 |
|
| 4 |
Comparative Analysis and Simulation of MPLS Ipv6 N...
|
2023 |
|
| 5 |
Performance Comparison Analysis of Virtual Router ...
|
2023 |
|
| 6 |
Pelatihan Berpikir Komputasional untuk Peningkatan...
|
2023 |
|
| 7 |
Video Injection Attack Detection on CCTV Using Ens...
|
2023 |
|
| 8 |
Analisis Korelasi Nilai Microteaching Guru dengan ...
|
2022 |
|
| 9 |
Implementation of Sleep Detector Using Histogram o...
|
2022 |
|
| 10 |
Pembelajaran interaktif melalui game edukatif sela...
|
2022 |
|
| 11 |
Skema Sistem Keamanan E-Voting
|
2021 |
|
| 12 |
Classifying Quranic Verse Topics using Word Centra...
|
2021 |
|
| 13 |
Reducing Docker Daemon Attack Surface Using Rootle...
|
2021 |
|
| 14 |
The Prototype of In-Store Visitor and People Passi...
|
2020 |
|
| 15 |
Candidate Recommendations for Voting System Using ...
|
2020 |
|
| 16 |
MSOF-DT Strategy and Its Impact on Real-Time Syste...
|
2020 |
|
| 17 |
The MSOF-DTW Method for Checking Timeseries Simila...
|
2019 |
|
| 18 |
The power saver development on android oreo smartp...
|
2018 |
|
| 19 |
Improving DDoS detection accuracy using Six-Sigma ...
|
2018 |
|
| 20 |
DT-MSOF Strategy and its Application to Reduce the...
|
2018 |
|
| 21 |
Computation Reduction for IRIS Process using DT-MS...
|
2018 |
|
| 22 |
A new approach to reducing execution time in real-...
|
2017 |
|
| 23 |
Improving distributed denial of service (DDOS) det...
|
2017 |
|
| 24 |
TCP LR-Newreno Congestion Control for IEEE 802.15....
|
2017 |
|
| 25 |
Verifiability notion in e-Voting based on modified...
|
2017 |
|
| 26 |
Intrusion Detection System (IDS) server placement ...
|
2016 |
|
| 27 |
Comparison of data acquisition technique using log...
|
2016 |
|
| 28 |
Comparative analysis of voice over internet protoc...
|
2015 |
|
| 29 |
The detection of DDOS flooding attack using hybrid...
|
2015 |
|
| 30 |
Digital Image Compression using Graph Coloring Qua...
|
2013 |
|
| 31 |
Visual-based fire detection using local binary pat...
|
2013 |
|
| 32 |
Analisis dan implementasi fast corner detector pad...
|
2012 |
|
| 33 |
Pengenalan Wajah Menggunakan Pseudo-2D Hidden Mark...
|
2011 |
|
| 34 |
Nutify: Identifikasi Gambar Manusia untuk Mencegah...
|
2011 |
|
| 35 |
An efficient key generation method in audio zero-W...
|
2011 |
|
| 36 |
METODE PENGATURAN THROUGHPUT UNTUK TCP WESTWOOD+ P...
|
2011 |
|
| 37 |
Wireless Multi-path TCP Westwood+ Modification to ...
|
2010 |
|
| 38 |
Dekomposisi Nilai Singular dan Discrete Fourier Tr...
|
2009 |
|
| 39 |
Watermarking pada Citra Digital dengan Metode Disc...
|
2007 |
|
| 40 |
LIVELINE: ANOTHER TIME CONSTRAINT FOR REAL-TIME SY...
|
2006 |
|
| 41 |
Perangkat Lunak Pembaca Not Balok Kunci G dengan M...
|
2006 |
|
| 42 |
Pembangunan Aplikasi Video Streaming Pada Handset ...
|
2006 |
|
| 43 |
AUDIO WATERMARKING MENGGUNAKAN TRANSFORMASI KOSINU...
|
2006 |
|
| 44 |
Implementasi RSS Reader dengan kXML pada Telepon G...
|
2005 |
|
| 45 |
Aplikasi Pengawas Ruangan Berbasis Deteksi Perubah...
|
2005 |
|
| 46 |
Pemanfaatan Telepon Selular dalam Proses Authorisa...
|
2005 |
|
| 47 |
SISTEM ISOLASI DAN BUKA ISOLASI OTOMATIS PADA SENT...
|
2004 |
|
| 48 |
PENJADWALAN DENGAN PRIORITAS DINAMIS UNTUK PROSES ...
|
2004 |
|
| 49 |
Tes Buta Warna Berbasis Komputer
|
2004 |
|
| 50 |
SISTEM TRANSFER PULSA TELEPON SELULER BERBASIS SHO...
|
2003 |
|
| 51 |
Konsep baru sistem waktu-nyata dan algoritma penja...
|
2003 |
|
| 52 |
APLIKASI MESSAGE SERVICE GROUP
|
2003 |
|