Zobrazeno 1 - 10
of 87
pro vyhledávání: '"Sarifuddin, Madenda"'
Publikováno v:
Journal of Industrial Engineering and Management, Vol 17, Iss 1, Pp 151-167 (2024)
Purpose: This paper aims to develop a coffee supply chain traceability system based on Blockchain (BC) and Machine Learning (ML) with the aim of ensuring the quality of coffee beans production. BC functions to ensure supply chain performance, while t
Externí odkaz:
https://doaj.org/article/0794c1bbb12843f9afd1e617fc25f198
Publikováno v:
Communications in Science and Technology, Vol 8, Iss 2, Pp 198-207 (2023)
This article described the Advanced Encryption Standard (AES) encryption and decryption process without using lookup tables in the MixColumns transformation and parallelizing the transformation process implemented in the Field Programmable Gate Array
Externí odkaz:
https://doaj.org/article/bb12f1c89a1a4098b4186c83eb3bed8d
Publikováno v:
IJAIN (International Journal of Advances in Intelligent Informatics), Vol 9, Iss 2, Pp 331-346 (2023)
Scientific articles now have multidisciplinary content. These make it difficult for researchers to find out relevant information. Some submissions are irrelevant to the journal's discipline. Categorizing articles and assessing their relevance can aid
Externí odkaz:
https://doaj.org/article/1d7137a6648841a68bf5badf12521862
Publikováno v:
Energies, Vol 16, Iss 20, p 7200 (2023)
Waste-to-energy (WTE) is one of the Indonesian government’s programs aiming to meet the target of achieving a new and renewable energy (NRE) mix, as well as one of the solutions proposed to overcome the problem of waste. One of the products of WTE
Externí odkaz:
https://doaj.org/article/c3ffb6f8c99342949ec02a86aff3d34a
Autor:
Rodiah, Sarifuddin Madenda, Diana Tri Susetianingtias, Fitrianingsih, Dea Adlina, Rini Arianty
Publikováno v:
Компьютерная оптика, Vol 45, Iss 6, Pp 865-872 (2021)
Authentication is needed to enhance and protect the system from vulnerabilities or weaknesses of the system. There are still many weaknesses in the use of traditional authentication methods such as PINs or passwords, such as being hacked. New methods
Externí odkaz:
https://doaj.org/article/f3a2195c968f473e9fe398a5332626e1
Autor:
Oktaviani, Oktaviani, Sarifuddin, Madenda, Rodiah, Rodiah, Diana, Tri Susetianingtias, Fitrianingsih, Fitrianingsih, Dea, Adlina, Arianty, Rini
Publikováno v:
SAR Journal - Science and Research. 2(3):89-95
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=796004
The analysis of the performance of higher education academic quality in terms of student achievement, study period, and drop out rates is still an intensive study among researchers. Several clustering methods are often used to understand student and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::89fc7f580d7c7a758c83a8d399e7cb45
https://zenodo.org/record/7430636
https://zenodo.org/record/7430636
Publikováno v:
International Journal of Advanced Computer Science and Applications. 14
Publikováno v:
2022 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS).
Publikováno v:
2022 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS).