Katalog

Reset




gunakan subjek dalam bahasa inggris untuk ketepatan hasil pencarian. gunakan karakter % untuk pencarian diperluas
No. Katalog Katalog Subjek Actions
83455 results (page 20/8346)
25.05.948
The Impact of Word Embedding on the Film Recommendation System Using Hybrid Filtering - Dalam bentuk buku karya ilmiah
IHSANI HAWA ARSYTANIA
Universitas Telkom, S2 Informatika, 2025
Klasifikasi Knowledge-based systems, deductive databases, expert systems
Karya Ilmiah - Thesis (S2) - Reference (Non-Sirkulasi)
tersedia 1 koleksi
total 1 koleksi
tersedia 1 file download
RECOMMENDER SYSTEMS
Film recommendation systems have become an integral part of the modern entertainment industry, helping users find content that suits their preferences amid advances in digital technology. The recommendation system generally..selengkapnya..
25.05.949
A Neuro Symbolic AI Conversational Recommender System for Recommending a Workout Plan - Dalam bentuk buku karya ilmiah
WIDI SAYYID FADHIL MUHAMMAD
Universitas Telkom, S2 Informatika, 2025
Klasifikasi Special Computer Methods- Artificial intelligence
Karya Ilmiah - Thesis (S2) - Reference (Non-Sirkulasi)
tersedia 1 koleksi
total 1 koleksi
ARTIFICIAL INTELLIGENCE IN HEALTHCARE
Physical inactivity remains a global health challenge, with existing digital fitness applications often failing to provide guidance that is simultaneously personalized, safe, and engaging. Current recommender systems face a critical..selengkapnya..
25.05.950
Cough Sound Classification for Covid-19 Screening by Using Statistical Features - Dalam bentuk buku karya ilmiah
MUHAMMAD FARHAN AUDIANTO
Universitas Telkom, S2 Informatika, 2025
Klasifikasi Machine Learning
Karya Ilmiah - Thesis (S2) - Reference (Non-Sirkulasi)
tersedia 1 koleksi
total 1 koleksi
tersedia 19 file download
MACHINE LEARNING
Coughing is one of the primary symptoms of respiratory illnesses, including COVID-19. With the advancement of machine learning, cough sound classification has emerged as a promising method for non-invasive health..selengkapnya..
25.05.951
Cross-Domain Fake Reviews Identification Based on Deep Learning Neural Network with Rolling Collaborative Training - Dalam bentuk buku karya ilmiah
IRHAM ARYANDI BASIR
Universitas Telkom, S2 Informatika, 2025
Klasifikasi Data in Computer Systems
Karya Ilmiah - Thesis (S2) - Reference (Non-Sirkulasi)
tersedia 1 koleksi
total 1 koleksi
tersedia 22 file download
DATA SCIENCE
Identifying fake reviews in today's digital era is important. This is because the increasing prevalence of fake reviews will have a less favorable impact on individuals or groups. therefore, this..selengkapnya..
25.05.952
Reducing The Processing Time Of Token Logic In Zero-Knowledge Digital Identity Management System (DIMS) - Dalam bentuk buku karya ilmiah
AGUNG KURNIAWAN
Universitas Telkom, S2 Ilmu Forensik, 2025
Klasifikasi Cryptography; computer science
Karya Ilmiah - Thesis (S2) - Reference (Non-Sirkulasi)
tersedia 1 koleksi
total 1 koleksi
tersedia 22 file download
CRYPTOGRAPHIC ALGORITHMS
The current centralized Digital Identity Management System (DIMS) exhibits several weaknesses, including the potential for fragmented identities, single points of failure, and privacy breaches. Implementing the ZK-DIMS system offers enhanced..selengkapnya..
25.05.953
DEVELOPING SEIZURE FRAMEWORK ON A WEBSERVER TO SUPPORT ACQUISITION VALIDITY - Dalam bentuk buku karya ilmiah
IRWAN HARIYANTO
Universitas Telkom, S2 Ilmu Forensik, 2025
Klasifikasi Data Security
Karya Ilmiah - Thesis (S2) - Reference (Non-Sirkulasi)
tersedia 1 koleksi
total 1 koleksi
tersedia 23 file download
DIGITAL FORENSICS
The surge in cybercrime activities utilizing web servers for illegal purposes, such as distributing hoaxes, hosting illegal online gambling, and spreading malware, highlights the urgent need for a standardized digital forensic..selengkapnya..
25.05.954
Generating Decoy Chat Message in Honey Encryption using Natural Language Processing - Dalam bentuk buku karya ilmiah
YUSRIL FIRZA
Universitas Telkom, S2 Ilmu Forensik, 2025
Klasifikasi Data Security
Karya Ilmiah - Thesis (S2) - Reference (Non-Sirkulasi)
tersedia 1 koleksi
total 1 koleksi
tersedia 18 file download
CYBER SECURITY
Implementations of encryption methods generally provide a low level of security against brute-force attacks that try every possible key. The Honey Encryption (HE) method was created to overcome these problems...selengkapnya..
25.05.955
Dampak Privasi dan Keamanan terhadap Penerapan E-Commerce: PMT dan UTAUT sebagai Model Dasar - Dalam bentuk buku karya ilmiah
AULIYA AZ-ZAHRA
Universitas Telkom, S2 Ilmu Forensik, 2025
Klasifikasi Data Security
Karya Ilmiah - Thesis (S2) - Reference (Non-Sirkulasi)
tersedia 1 koleksi
total 1 koleksi
tersedia 21 file download
PRIVACY
Penelitian ini menyelidiki pengaruh persepsi privasi dan keamanan terhadap adopsi e-commerce dengan mengintegrasikan konstruk dari Protection Motivation Theory (PMT) dan Unified Theory of Acceptance and Use of Technology (UTAUT). Menggunakan..selengkapnya..
25.05.956
Utilizing Stereo Panning Features in Countering Audio Anti-Forensic Activities - Dalam bentuk buku karya ilmiah
THORIQ PUTRA RENALDI
Universitas Telkom, S2 Ilmu Forensik, 2025
Klasifikasi Data Security
Karya Ilmiah - Thesis (S2) - Reference (Non-Sirkulasi)
tersedia 1 koleksi
total 1 koleksi
tersedia 19 file download
DIGITAL FORENSICS
Penelitian ini mengembangkan sistem deteksi audio stereo palsu menggunakan Stereo Panning Features (SPF) dan pengklasifikasi seperti Support Vector Machine (SVM) dan eXtreme Gradient Boosting (XGBoost). Sistem ini bertujuan untuk membedakan..selengkapnya..
25.05.957
Virtual Jamming Attack Detection using Neural Network - Dalam bentuk buku karya ilmiah
IQRA REZKY ALIGRAH MUHAMMAD
Universitas Telkom, S2 Ilmu Forensik, 2025
Klasifikasi Data Security
Karya Ilmiah - Thesis (S2) - Reference (Non-Sirkulasi)
tersedia 1 koleksi
total 1 koleksi
tersedia 21 file download
CYBERSECURITY
Jaringan Sensor Nirkabel (Wireless Sensor Networks/WSNs) banyak digunakan dalam sis tem komunikasi kritis, namun tetap rentan terhadap berbagai serangan siber, khusus nya serangan jamming virtual. Berbeda dengan jamming konvensional, jamming..selengkapnya..