Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–2 dari 2 artikel
Comparison of Multiple Linear Regression and Random Forest for Predicting Student Final Grades Using Google Colab
Nuraini, Laili
; Nuraini, Laili
; Fatma Ayu Widyoputri, Yohana Maritza
; Adiguna, Vinsent Brilian
Digital Business Intelligence Journal
Vol 2
, No 1
(2026)
A student's learning success is largely determined by their academic evaluation. Estimating a student's final grade can assist educational institutions in conducting initial assessments of academic achievement. This study aims to analyze the performance of the Multiple Linear Regression (MLR) and Random Forest (RF) algorithms in predicting students' final grades using Google Colab. This research method uses a quantitative approach using secondary data that includes age, mid-term exam scores, fin...
Sumber Asli
Google Scholar
DOI
Holistic Defense Strategy: Implementing Best Practices in Cybersecurity for E-Business
Nuraini, Laili
; Nuraini, Laili
; Prasetyo, Heru Eko
Digital Business Intelligence Journal
Vol 1
, No 2
(2025)
The rapid growth of e-business in the digital transformation era has brought significant cybersecurity challenges. This study aims to analyze holistic defense strategies to comprehensively protect e-business assets and operations. Utilizing a systematic literature review of 50 reputable scientific publications (2020–2024), the study identifies five key pillars of cybersecurity strategy: (1) multi-layered security architecture, (2) AI-powered threat detection, (3) Zero Trust security model, (4) c...
Sumber Asli
Google Scholar
DOI