Category: Informatics
Home Research
Yuda Septiawan, Juliansyah Adi Putra, Adimas Aglasia, Danang Ade Muktiawan, Meiliza
Deteksi Sentimen Ujaran Kebencian dalam Tweet Media Sosial X dalam Konteks RKUHP Menggunakan Algoritma KNN
Informatics

Penyebaran ujaran kebencian di platform media sosial, terutama dalam konteks undang-undang kontroversial seperti Rancangan Kitab Undang-Und...

Review:

This manuscript addresses a highly relevant and timely topic: the detection of hate speech sentiment on social media, specifically Twitter (now X), wi...

View Full Research
Goutham Kacheru, Nagaraju Arthan, Rohit Bajjuru
Artificial Intelligence (AI) for Low-Code and No-Code Development: Making Non-Developers Developers in 2024
Informatics

Low-code and no-code development platforms are here to transform the software development landscape by allowing even non-technical users build applica...

View Full Research
Theresia Lumbantobing
Implementasi Metode Felics Pada Kompresi Citra Format GIF
Informatics

At this time, the increasingly rapid development of science and technology makes two-dimensional image files very necessary, where the resulting image...

Review:

This paper proposes an implementation of the FELICS method for compressing GIF image files, addressing the common issue of large image sizes consuming...

View Full Research
Dini Novelia
Implementasi Algoritma Boldi Vigna Kompresi File Teks
Informatics

Data compression technology is the process of converting a set of data into a lower form of code. Compression techniques are usually used for data tra...

Review:

This paper, titled "Implementasi Algoritma Boldi Vigna Kompresi File Teks," proposes to explore the implementation of the Boldi Vigna algorithm for te...

View Full Research
William Dhaniel Tampubolon
Sistem Pendukung Keputusan Pemilihan Security Officer Pada PT Kharisma Esa Unggul Menggunakan Metode VIKOR
Informatics

A security officer is a security unit or security group established by a business entity to ensure physical security in the environment where they are...

Review:

This paper addresses a pertinent issue in human resource management: the subjective selection of security officers, specifically at PT Kharisma Esa Un...

View Full Research
Luccas Ruben J. Constantin-Sukul, Rasmus Ø. Gammelgaard, Alexander N. Henriksen, Diego Aranha
Key recovery on static Kyber based on transient execution attacks
Informatics

Transient execution attacks on modern processors continue to threaten security by stealing sensitive data from other processes running on t...

Review:

This paper presents a highly significant contribution to the field of cybersecurity, specifically at the intersection of microarchitectural vulnerabil...

View Full Research
Stefan Gloor, Patrick Jattke, Kaveh Razavi
REFault: A Fault Injection Platform for Rowhammer Research on DDR5 Memory
Informatics

DDR5 is showing increased resistance to Rowhammer attacks compared to previous generations. The minimum hammer count (HCmin) is a metric to...

Review:

This paper presents REFault, a novel and timely fault injection platform designed to address a critical gap in Rowhammer research on DDR5 memory. The...

View Full Research
Jacqueline Henes, Marius Muench, David Oswald, Hany Ragab
Talk: Transient-execution attacks on the CHERI Morello platform
Informatics

CHERI (Capability Hardware Enhanced RISC Instructions) is a capability-based ISA extension providing spatial memory protection and compar...

Review:

The abstract for "Talk: Transient-execution attacks on the CHERI Morello platform" introduces a highly timely and critical area of research at the int...

View Full Research
ALVA HERBART MIFTAHUL FIRDAUS, SAMSUL MAARIF, MENTARI ALEXSA, WASIS HARYONO
PERANCANGAN SISTEM INFORMASI MANAJEMEN PROYEK BERBASIS WEBSITE MENGGUNAKAN MODEL AGILE PADA PT RHI BUILD
Informatics

Penelitian ini bertujuan untuk merancang sistem informasi manajemen proyek berbasis website pada PT RHI Build dengan pendekatan Agile. PT RHI Build me...

Review:

This paper presents a timely and relevant effort to address the challenges of manual and unintegrated project data management within PT RHI Build thro...

View Full Research
Haddad Sammir, Khairil Hamdi
Perancangan Lokapasar Terdistribusi Sebagai Publikasi Kalatog Produk UMKM
Informatics

The use of information technology in sales is inevitable. There are many approaches that can be used such as developing an online store or joining a p...

Review:

The title, "Perancangan Lokapasar Terdistribusi Sebagai Publikasi Kalatog Produk UMKM" (Design of a Distributed Marketplace for Publication of MSME Pr...

View Full Research