Pelayanan data kesehatan balita dan ibu di Posyandu masih banyak dilakukan secara manual, yang rentan terhadap kesalahan pencatatan, kehila...
This paper addresses a critical challenge in public health data management, specifically within Posyandu (Integrated Healthcare Service Posts) in Indo...
Penelitian ini bertujuan menganalisis perbandingan teknik normalisasi dan denormalisasi dalam pengelolaan data skala besar untuk mengidenti...
This study, "Perbandingan Teknik Normalisasi dan Denormalisasi dalam Pengelolaan Data Skala Besar," addresses a crucial topic in modern data managemen...
Industri skincare di Indonesia mengalami perkembangan pesat seiring meningkatnya kesadaran masyarakat, khususnya wanita, terhadap perawata...
This paper presents a highly relevant and timely endeavor to address key challenges within the burgeoning Indonesian skincare market. It adeptly ident...
Penelitian ini bertujuan untuk menganalisis penerimaan website Universitas Nahdlatul Ulama Al Ghazali (UNUGHA) menggunakan pendekatan Tech...
Penyebaran ujaran kebencian di platform media sosial, terutama dalam konteks undang-undang kontroversial seperti Rancangan Kitab Undang-Und...
This manuscript addresses a highly relevant and timely topic: the detection of hate speech sentiment on social media, specifically Twitter (now X), wi...
Low-code and no-code development platforms are here to transform the software development landscape by allowing even non-technical users build applica...
At this time, the increasingly rapid development of science and technology makes two-dimensional image files very necessary, where the resulting image...
This paper proposes an implementation of the FELICS method for compressing GIF image files, addressing the common issue of large image sizes consuming...
Data compression technology is the process of converting a set of data into a lower form of code. Compression techniques are usually used for data tra...
This paper, titled "Implementasi Algoritma Boldi Vigna Kompresi File Teks," proposes to explore the implementation of the Boldi Vigna algorithm for te...
A security officer is a security unit or security group established by a business entity to ensure physical security in the environment where they are...
This paper addresses a pertinent issue in human resource management: the subjective selection of security officers, specifically at PT Kharisma Esa Un...
Transient execution attacks on modern processors continue to threaten security by stealing sensitive data from other processes running on t...
This paper presents a highly significant contribution to the field of cybersecurity, specifically at the intersection of microarchitectural vulnerabil...
Showing 181 to 190 of 392 results
By Sciaria
By Sciaria
By Sciaria
By Sciaria
By Sciaria
By Sciaria