Penyebaran ujaran kebencian di platform media sosial, terutama dalam konteks undang-undang kontroversial seperti Rancangan Kitab Undang-Und...
This manuscript addresses a highly relevant and timely topic: the detection of hate speech sentiment on social media, specifically Twitter (now X), wi...
Low-code and no-code development platforms are here to transform the software development landscape by allowing even non-technical users build applica...
At this time, the increasingly rapid development of science and technology makes two-dimensional image files very necessary, where the resulting image...
This paper proposes an implementation of the FELICS method for compressing GIF image files, addressing the common issue of large image sizes consuming...
Data compression technology is the process of converting a set of data into a lower form of code. Compression techniques are usually used for data tra...
This paper, titled "Implementasi Algoritma Boldi Vigna Kompresi File Teks," proposes to explore the implementation of the Boldi Vigna algorithm for te...
A security officer is a security unit or security group established by a business entity to ensure physical security in the environment where they are...
This paper addresses a pertinent issue in human resource management: the subjective selection of security officers, specifically at PT Kharisma Esa Un...
Transient execution attacks on modern processors continue to threaten security by stealing sensitive data from other processes running on t...
This paper presents a highly significant contribution to the field of cybersecurity, specifically at the intersection of microarchitectural vulnerabil...
DDR5 is showing increased resistance to Rowhammer attacks compared to previous generations. The minimum hammer count (HCmin) is a metric to...
This paper presents REFault, a novel and timely fault injection platform designed to address a critical gap in Rowhammer research on DDR5 memory. The...
CHERI (Capability Hardware Enhanced RISC Instructions) is a capability-based ISA extension providing spatial memory protection and compar...
The abstract for "Talk: Transient-execution attacks on the CHERI Morello platform" introduces a highly timely and critical area of research at the int...
Penelitian ini bertujuan untuk merancang sistem informasi manajemen proyek berbasis website pada PT RHI Build dengan pendekatan Agile. PT RHI Build me...
This paper presents a timely and relevant effort to address the challenges of manual and unintegrated project data management within PT RHI Build thro...
The use of information technology in sales is inevitable. There are many approaches that can be used such as developing an online store or joining a p...
The title, "Perancangan Lokapasar Terdistribusi Sebagai Publikasi Kalatog Produk UMKM" (Design of a Distributed Marketplace for Publication of MSME Pr...
Showing 161 to 170 of 368 results
By Sciaria
By Sciaria
By Sciaria
By Sciaria
By Sciaria
By Sciaria