1 |
The Effectiveness of Anomaly-Based Intrusion Detec...
|
2023 |
|
2 |
Sign Language Translator Based on Raspberry Pi Cam...
|
2023 |
|
3 |
Analysis and Implementation of Digital Signature A...
|
2023 |
|
4 |
Comparative Analysis and Simulation of MPLS Ipv6 N...
|
2023 |
|
5 |
Performance Comparison Analysis of Virtual Router ...
|
2023 |
|
6 |
Pelatihan Berpikir Komputasional untuk Peningkatan...
|
2023 |
|
7 |
Video Injection Attack Detection on CCTV Using Ens...
|
2023 |
|
8 |
Analisis Korelasi Nilai Microteaching Guru dengan ...
|
2022 |
|
9 |
Implementation of Sleep Detector Using Histogram o...
|
2022 |
|
10 |
Pembelajaran interaktif melalui game edukatif sela...
|
2022 |
|
11 |
Skema Sistem Keamanan E-Voting
|
2021 |
|
12 |
Classifying Quranic Verse Topics using Word Centra...
|
2021 |
|
13 |
Reducing Docker Daemon Attack Surface Using Rootle...
|
2021 |
|
14 |
The Prototype of In-Store Visitor and People Passi...
|
2020 |
|
15 |
Candidate Recommendations for Voting System Using ...
|
2020 |
|
16 |
MSOF-DT Strategy and Its Impact on Real-Time Syste...
|
2020 |
|
17 |
The MSOF-DTW Method for Checking Timeseries Simila...
|
2019 |
|
18 |
The power saver development on android oreo smartp...
|
2018 |
|
19 |
Improving DDoS detection accuracy using Six-Sigma ...
|
2018 |
|
20 |
DT-MSOF Strategy and its Application to Reduce the...
|
2018 |
|
21 |
Computation Reduction for IRIS Process using DT-MS...
|
2018 |
|
22 |
A new approach to reducing execution time in real-...
|
2017 |
|
23 |
Improving distributed denial of service (DDOS) det...
|
2017 |
|
24 |
TCP LR-Newreno Congestion Control for IEEE 802.15....
|
2017 |
|
25 |
Verifiability notion in e-Voting based on modified...
|
2017 |
|
26 |
Intrusion Detection System (IDS) server placement ...
|
2016 |
|
27 |
Comparison of data acquisition technique using log...
|
2016 |
|
28 |
Comparative analysis of voice over internet protoc...
|
2015 |
|
29 |
The detection of DDOS flooding attack using hybrid...
|
2015 |
|
30 |
Digital Image Compression using Graph Coloring Qua...
|
2013 |
|
31 |
Visual-based fire detection using local binary pat...
|
2013 |
|
32 |
Analisis dan implementasi fast corner detector pad...
|
2012 |
|
33 |
Pengenalan Wajah Menggunakan Pseudo-2D Hidden Mark...
|
2011 |
|
34 |
Nutify: Identifikasi Gambar Manusia untuk Mencegah...
|
2011 |
|
35 |
An efficient key generation method in audio zero-W...
|
2011 |
|
36 |
METODE PENGATURAN THROUGHPUT UNTUK TCP WESTWOOD+ P...
|
2011 |
|
37 |
Wireless Multi-path TCP Westwood+ Modification to ...
|
2010 |
|
38 |
Dekomposisi Nilai Singular dan Discrete Fourier Tr...
|
2009 |
|
39 |
Watermarking pada Citra Digital dengan Metode Disc...
|
2007 |
|
40 |
LIVELINE: ANOTHER TIME CONSTRAINT FOR REAL-TIME SY...
|
2006 |
|
41 |
Perangkat Lunak Pembaca Not Balok Kunci G dengan M...
|
2006 |
|
42 |
Pembangunan Aplikasi Video Streaming Pada Handset ...
|
2006 |
|
43 |
AUDIO WATERMARKING MENGGUNAKAN TRANSFORMASI KOSINU...
|
2006 |
|
44 |
Implementasi RSS Reader dengan kXML pada Telepon G...
|
2005 |
|
45 |
Aplikasi Pengawas Ruangan Berbasis Deteksi Perubah...
|
2005 |
|
46 |
Pemanfaatan Telepon Selular dalam Proses Authorisa...
|
2005 |
|
47 |
SISTEM ISOLASI DAN BUKA ISOLASI OTOMATIS PADA SENT...
|
2004 |
|
48 |
PENJADWALAN DENGAN PRIORITAS DINAMIS UNTUK PROSES ...
|
2004 |
|
49 |
Tes Buta Warna Berbasis Komputer
|
2004 |
|
50 |
SISTEM TRANSFER PULSA TELEPON SELULER BERBASIS SHO...
|
2003 |
|
51 |
Konsep baru sistem waktu-nyata dan algoritma penja...
|
2003 |
|
52 |
APLIKASI MESSAGE SERVICE GROUP
|
2003 |
|