TEKNOKOM

Design Of Machine Learning Detection Mask Using Yolo And Darknet On Nvidia Jetson Nano

in the covid-19 pandemic, wearing a mask has become the obligation of indonesian citizen,for outdoor and indoor. public awareness of wearing masks when leaving the house according to the government's...


Analysis and Application of Cloud Storage Security Utilization Based on as A Service (Iaas) Infrastructure Service Model as A Document Sharing Media During Pandemi

storage via the cloud is very necessary which is carried out in this research can be used as a basis for research at pt. indocode technology has a problem where the problem is that the process of stor...


The Aca-based Pid Controller for Enhancing A Wheeled-mobile Robot

wall-following control of mobile robot is an important topic in the mobile robot researches. the wall-following control problem is characterized by moving the robot along the wall in a desired directi...


Memory Forensic Development and Challenges in Identifying Digital Crime : A Review

digital forensic technology is currently advancing along with the demands to uncover various crimes using technology. memory forensic is one of the investigative fields in digital forensics. we use th...


Analysis of the Influence of Loose Termination Level with Increasing Termination Temperature of Electrical Equipment Using Infrared Thermography

the use of electrical energy in the industrial is very important to drive production machines. machine maintenance is carried out so that the lifetime of the machine becomes longer so that the product...


Security Architecture on Wireless Network Traffic Handoff : A Review

this paper provides an overview of the wireless handoff process on wireless networks by investigating authentication protocol using eap -aka (extensible authentication protocol) - authentication and k...


Raw Data Security By Using Elgamal And Sha 256 Public Key Algorithm

the development of information technology has grown exponentially and various of data collections and its method has been obtained. in the era of big data, data has now become an asset that held impor...


A 5g Rural, Remote, and Difficult Areas Hope: A Review

the 5g cellular networks are “urban” areas technology in nature, extensively deployed where the user's density is high to provide very high data rates, coupled with extremely low delays and dealing wi.


Vpn Site to Site Implementation Using Protocol L2tp and Ipsec

data exchange communication has developed, which leads to centralized communication, and to achieve this communication requires a type of data communication whose data is accommodated on the server an...


How Machine Learning Method Performance for Imbalanced Data : Case Study: Classification of Working Status of Banten Province

this study will examine the application of several classification methods to machine learning models by taking into account the case of imbalanced data. the research was conducted on a case study of c...


Design Of Computer Repair Services Application Android-based

computers are one form of advances in electronic and informatics technology; the function of the computer itself serves as a tool for writing, drawing, editing images or photographs, or as a means of ...


A Systematic Review Method for Security Analysis of Internet of Things on Honeypot Detection

a very significant increase in the spread of malware has resulted in malware analysis. a recent approach to using the internet of things has been put forward by many researchers. iot tool learning app...


Mobile Scanner Adoption Analysis Between Employment And Educational Background – An Analysis Of Logistic Regression

as of today, the mobile apps may be downloaded everywhere. the development of mobile apps depends on the type of the work. an increasing use of mobile app is scanner apps due to an easy use. this pape...


The Optimize of Association Rule Method for the Best Book Placement Patterns in Library: A Monthly Trial

data mining is the process of finding interesting patterns and knowledge from large amounts of data. sources of information service, especially in the library, include books, reference books, serials,...


A Study of the Influence of 650 Nm Laser Interference on Visible Laser Light Communication System

visible laser light communication system (vllc) is a wireless communication system, using laser as the medium. in the data transfer process, it is possible to have optical interference where 2 laser b...


Algoritma K-means Untuk Mendeteksi Frame Pada Video Asli Dan Video Tampering

sebuah video tersusun dari frame dalam jumlah yang banyak, apabila terdapat frame-frame yang menunjukkan ketidakwajaran maka dapat disimpulkan bahwa file rekaman video tersebut telah mengalami tamperi...


Analisa Prediksi Pertumbuhan Start-up Di Era Industri 4.0 Menggunakan Metode Markov Chain

bisnis start-up semakin tumbuh dan berkembang di berbagai daerah di indonesia, tidak terkecuali di jabodetabek. dari bisnis start-up dapat menghasilkan berbagai platform atau aplikasi yang diminati ko...


Analisa Keamanan E-commerce Menggunakan Metode Aes Algoritma

e-commerse yaitu kegiatan bertransaksi jasa atau barang dengan cara jarak jauh. sarana ini digunakan menggunakan media internet. berbagai manfaat yang kita dapatkan mulai dari lebih mudah dan lebih mu...


Studi Kasus Sistem Pencarian Data Penduduk Menggunakan Metode Study Practice

sistem kependudukan yang selalu up to date sangat dibutuhkan untuk kegiatan pelayanan masyarakat di bidang administrasi kependudukan pada suatu pemerintahan baik di daerah maupun pusat. namun kondisi...


Analisis Prediksi Tingkat Kelulusan Mahasiswa Universitas Wiralodra Indramayu Menggunakan Metode Fuzzy Tsukamoto

universitas wiralodra merupakan universitas swasta pertama di indramayu, terletak di kota indramayu, jawa barat. seiring dengan perjalanannya, universitas wiralodra terus berbenah untuk meningkatkan k...


2

Cari Penelitian dan Publikasi

CARI TULISAN adalah situs pengindeksan publikasi ilmiah yang membantu semua orang menemukan hasil penelitian dan data yang relevan dari makalah, jurnal, buku, laporan penelitian, dan sebagainya. Dikumpulkan dari berbagai repositori di Indonesia, membuat penelitian ilmiah yang tersebar menjadi mudah dicari.
Semua artikel dan konten yang ada di situs ini adalah hasil cipta karya penulis terkait yang telah dipublikasi sebagai hasil penelitian ilmiah. CARI TULISAN tidak pernah menyebarkan dan mendukung konten bajakan.