Category: Informatics
Home Research
Endah Septa Sintiya, Rizdania, Afifah Nurul Izzati, Septyana Riskitasari, Deasy Sandhya Elya Ikawati
Sistem Informasi Manajemen Posyandu Harmoni untuk Mendukung Digitalisasi Data Kesehatan Balita dan Ibu
Informatics

Pelayanan data kesehatan balita dan ibu di Posyandu masih banyak dilakukan secara manual, yang rentan terhadap kesalahan pencatatan, kehila...

Review:

This paper addresses a critical challenge in public health data management, specifically within Posyandu (Integrated Healthcare Service Posts) in Indo...

View Full Research
Zainudin Sidik, Abdul Rahman Ismail
Perbandingan Teknik Normalisasi dan Denormalisasi dalam Pengelolaan Data Skala Besar
Informatics

Penelitian ini bertujuan menganalisis perbandingan teknik normalisasi dan denormalisasi dalam pengelolaan data skala besar untuk mengidenti...

Review:

This study, "Perbandingan Teknik Normalisasi dan Denormalisasi dalam Pengelolaan Data Skala Besar," addresses a crucial topic in modern data managemen...

View Full Research
Inggrid Yanuar Risca Pratiwi, Windi Agustina, Cucu Marlya, Annisa Dewi Fatimah Agustini, Marwa Diah Puspita
Rancang Bangun E-Katalog Produk Skincare Lyodaskin Lumajang Berbasis Website Menggunakan Framework Scrum sebagai Media Promosi
Informatics

Industri skincare di Indonesia mengalami perkembangan pesat seiring meningkatnya kesadaran masyarakat, khususnya wanita, terhadap perawata...

Review:

This paper presents a highly relevant and timely endeavor to address key challenges within the burgeoning Indonesian skincare market. It adeptly ident...

View Full Research
Tri Anggoro, Moeng Sakmar, Sigit Pambudi
Analisis Penerimaan Website UNUGHA Menggunakan Metode Technology Acceptance Model (TAM)
Informatics

Penelitian ini bertujuan untuk menganalisis penerimaan website Universitas Nahdlatul Ulama Al Ghazali (UNUGHA) menggunakan pendekatan Tech...

View Full Research
Yuda Septiawan, Juliansyah Adi Putra, Adimas Aglasia, Danang Ade Muktiawan, Meiliza
Deteksi Sentimen Ujaran Kebencian dalam Tweet Media Sosial X dalam Konteks RKUHP Menggunakan Algoritma KNN
Informatics

Penyebaran ujaran kebencian di platform media sosial, terutama dalam konteks undang-undang kontroversial seperti Rancangan Kitab Undang-Und...

Review:

This manuscript addresses a highly relevant and timely topic: the detection of hate speech sentiment on social media, specifically Twitter (now X), wi...

View Full Research
Goutham Kacheru, Nagaraju Arthan, Rohit Bajjuru
Artificial Intelligence (AI) for Low-Code and No-Code Development: Making Non-Developers Developers in 2024
Informatics

Low-code and no-code development platforms are here to transform the software development landscape by allowing even non-technical users build applica...

View Full Research
Theresia Lumbantobing
Implementasi Metode Felics Pada Kompresi Citra Format GIF
Informatics

At this time, the increasingly rapid development of science and technology makes two-dimensional image files very necessary, where the resulting image...

Review:

This paper proposes an implementation of the FELICS method for compressing GIF image files, addressing the common issue of large image sizes consuming...

View Full Research
Dini Novelia
Implementasi Algoritma Boldi Vigna Kompresi File Teks
Informatics

Data compression technology is the process of converting a set of data into a lower form of code. Compression techniques are usually used for data tra...

Review:

This paper, titled "Implementasi Algoritma Boldi Vigna Kompresi File Teks," proposes to explore the implementation of the Boldi Vigna algorithm for te...

View Full Research
William Dhaniel Tampubolon
Sistem Pendukung Keputusan Pemilihan Security Officer Pada PT Kharisma Esa Unggul Menggunakan Metode VIKOR
Informatics

A security officer is a security unit or security group established by a business entity to ensure physical security in the environment where they are...

Review:

This paper addresses a pertinent issue in human resource management: the subjective selection of security officers, specifically at PT Kharisma Esa Un...

View Full Research
Luccas Ruben J. Constantin-Sukul, Rasmus Ø. Gammelgaard, Alexander N. Henriksen, Diego Aranha
Key recovery on static Kyber based on transient execution attacks
Informatics

Transient execution attacks on modern processors continue to threaten security by stealing sensitive data from other processes running on t...

Review:

This paper presents a highly significant contribution to the field of cybersecurity, specifically at the intersection of microarchitectural vulnerabil...

View Full Research