ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Biology
Computing
Technology
Research
Education
Computing
Agronomy and forestry
Environment
Languages
Social Sciences
all records (72)

Languages
English
Portuguese
Spanish
German
Finnish

Countries
Indonesia
USA
Brazil
Ukraine
Italy
Switzerland
Romania
Spain
South Africa
Denmark
all records (75)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
4.064  Articles
1 of 407 pages  |  10  records  |  more records»
The security of the computer network, especially the internet, is very crucial to note. One of the most effective ways to secure a computer network is to use a firewall. However, making a firewall that is still manual will make it difficult for network ad... see more

The activity of writing scientific articles by academics at universities is one of the activities that is often carried out, but when writing scientific articles problems arise regarding the difficulty of finding ideas, literature studies, and reference s... see more

Document search has several approaches, including full-text search, plain metadata search and semantic search. This study uses the Weighted Tree Similarity algorithm with the Cosine Sorensen Dice algorithm to calculate the semantic search similarity. In t... see more

Research and community service activities are the obligations of a lecturer that must be carried out from part of the Tri Dharma of Higher Education in addition to teaching, where research activities should have a level of innovation in the form of develo... see more

Assessment usually plays an indispensable role in the education and it is the prime indicator of student learning achievement. Exam questions are the main form of assessment used in learning. Setting appropriate exam questions to achieve the desired outco... see more

Data security by using an alphanumeric combination password is no longer used, so it needs to be added security that is difficult to be manipulated by certain people. One type of security is the type of biometrics technology using face recognition which h... see more

Clustering salah satu metode yang sering digunakan di berbagai bidang yang melakukan analisis data, termasuk penggalian data, pengambilan dokumen, segmentasi gambar, dan klasifikasi pola. Adapaun tujuan dari metode tersebut adalah untuk mengelompokkan dat... see more

Report handling on "LAPOR!" systemdepends on the system administrator who manually reads every incoming report [3]. Read manually can lead to errorsin handling complaints [4] if the data flow is very large and grows rapidly it can take at least three days... see more

1 of 407 pages  |  10  records  |  more records»