Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 171–180 dari 8641 artikel
Tinjauan Yuridis Terhadap Tindak Pidana Penyalahgunaan Narkotika Berdasarakan Undang-Undang Nomor 35 Tahun 2009 tentang Narkotika
Jurnal Penelitian Serambi Hukum
Vol 19
, No 01
(2026)
This study aims to determine 1) the legal review of the crime of narcotics abuse based on Law Number 35 of 2009 concerning narcotics. 2) obstacles and law enforcement efforts against the crime of narcotics abuse based on Law Number 35 of 2009 concerning narcotics. This research method uses a normative legal approach with a prescriptive research type that focuses on literature studies. The data used are secondary data sourced from primary, secondary, and tertiary legal materials. The data collect...
Sumber Asli
Google Scholar
DOI
Implementasi Penggunaan Teknik Keamanan Data Hashing Dan Limit Login Pada Login Sistem Pengelolaan Pencatatan Barang Dppesdm Berbasis Web
Syarhanazmi
; M. Miko Sahputra Sembiring
; Vima Zikra Adha Lubis
; Ilhamuddin Ilhamuddin
; Mhd. Furqan
Vol 5
, No 3
(2026)
Penelitian ini berfokus pada penguatan arsitektur keamanan modul autentikasi sistem SIGUDANG di DPPESDM Provinsi Sumatera Utara, yang sebelumnya memiliki kerentanan terhadap serangan brute force otomatis. Masalah utama yang diidentifikasi adalah risiko pengambilalihan akun secara ilegal akibat ketiadaan pembatasan laju permintaan (rate limiting) dan perlindungan kredensial yang kuat pada lapisan basis data. Tujuan penelitian ini adalah menciptakan sistem autentikasi yang tangguh melalui implemen...
Sumber Asli
Google Scholar
DOI
Implementasi Pemasaran Digital dan Online Branding sebagai Strategi Pengembangan UMKM
Wawasan : Jurnal Ilmu Manajemenx, Ekonomi dan Kewirausahan
Vol 4
, No 1
(2026)
The development of digital technology has triggered significant changes in marketing and brand management, particularly in the Micro, Small, and Medium Enterprises (MSMEs) sector. This study aims to conduct a comprehensive analysis of the implementation of digital marketing and online branding as strategies for developing MSMEs to increase competitiveness and business sustainability in the digital economy era. This study focuses on the use of social media, marketplaces, and various other digital...
Sumber Asli
Google Scholar
DOI
Klasifikasi Jenis Bunga Menggunakan Algoritma Convolutional Neural Network (CNN)
Ade Irgi Firdaus
; Ade Irgi Firdaus
; Dwi Okta Djoas
; Riefaldi Diofano Saputra
; Indry Anggraeny
; Hilda Apriliya Ningsih
Jurnal Elektronika dan Komputer
Vol 18
, No 2
(2026)
This research aims to develop a multiclass flower image classification system using the Convolutional Neural Network (CNN) algorithm with the EfficientNet architecture. The main problem addressed is the difficulty of manual identification of flower species that share high visual similarity. The research stages include collecting 17,299 flower images across 19 classes, performing data preprocessing such as image resizing, pixel normalization, and augmentation, followed by model training using the...
Sumber Asli
Google Scholar
DOI
Integrating Lean Warehousing and Systematic Analysis to Minimize Waste in Finished Product Storage: A Case Study and Generalizable Improvement Framework
Advance Sustainable Science, Engineering and Technology
Vol 8
, No 1
(2026)
Efficient warehouse management is critical for make-to-order production systems. This study investigates waste reduction in a metal casting company’s finished-product warehouse by applying Lean Warehousing principles. Using time-motion studies, Value Stream Mapping (VSM), Pareto diagrams, and fishbone diagrams, the research analyzed 13 workstations and identified five primary areas of waste. Simulation results demonstrated a significant cycle time reduction from 2,559 to 2,128 seconds, alongside...
Sumber Asli
Google Scholar
DOI
1 Sitasi
Developing Artsteps-based Song Media to Make It Easier for Madrasah Ibtidaiyyah Students to Memorize Arabic
MAGISTRA: Media Pengembangan Ilmu Pendidikan Dasar dan Keislaman
Vol 16
, No 2
(2026)
Arabic language learning in Islamic Elementary Schools (MI) still faces various obstacles in improving students’ abilities, especially in memorizing vocabulary. This condition demands innovation in learning media that effectively supports the Arabic memorization process. This study aims to develop Artsteps-based song media to facilitate MI students’ memorization of Arabic. This study uses the Research and Development (R&D) method, which includes the stages of analysis, design, development, i...
Sumber Asli
Google Scholar
DOI
Teachers’ Spiritual Competence as The Foundation for Holistic Guidance of Children with Special Needs in Inclusive Madrasah Ibtidaiyyah
MAGISTRA: Media Pengembangan Ilmu Pendidikan Dasar dan Keislaman
Vol 16
, No 2
(2026)
This study aims to analyze the role of teachers' spiritual competence as the foundation for implementing inclusive education in Islamic elementary schools (Madrasah Ibtidaiyah) through a qualitative library research approach. Data were collected from 48 scholarly works, reduced to 12 core sources, and analyzed using content and conceptual analysis. The findings reveal that teachers' spirituality serves as a moral, reflective, and emotional force guiding inclusive practices. Drawing on Spiritual...
Sumber Asli
Google Scholar
DOI
Perbandingan Performa Pembelajaran Mesin untuk Deteksi Ancaman Keamanan Aplikasi Web: Tinjauan Sistematis
Divala Zahra Oktavia
; Dwi Alvin Hidayat
; Desy Natalia
; Satria Krisna Prabantara
; Arief Arfriandi
Vol 5
, No 1
(2026)
Pemanfaatan aplikasi berbasis web yang semakin meluas di berbagai sektor menyebabkan meningkatnya risiko terhadap ancaman siber, termasuk serangan phising, DDoS, injeksi SQL, XSS, serta intrusi. Berbagai metode deteksi tradisional yang bersifat statis sering kali tidak mampu mengidentifikasi pola serangan baru yang bersifat dinamis. Untuk mengatasi keterbatasan tersebut, machine learning muncul sebagai pendekatan yang lebih adaptif karena mampu mempelajari pola perilaku, mendeteksi anomali, dan...
Sumber Asli
Google Scholar
DOI
Paradoks Aksesibilitas Semu: Tinjauan Literatur Berbasis Grounded Theory tentang Chatbot Kesehatan Mental
Vol 5
, No 1
(2026)
Perkembangan teknologi kecerdasan buatan (AI) telah menciptakan peluang baru dalam layanan kesehatan mental, khususnya melalui chatbot berbasis teks. Chatbot berkembang sebagai alat yang skalabel dan mudah diakses untuk dukungan emosional instan. Namun, di balik popularitasnya, pemahaman menyeluruh mengenai validitas klinis dan tantangan etisnya masih terfragmentasi. Penelitian ini bertujuan meninjau literatur secara kritis untuk memetakan perkembangan, mengevaluasi efektivitas, dan mengidentifi...
Sumber Asli
Google Scholar
DOI
Development of an IoT-Based Smart Water System Roadmap in Singkawang City through a Comparative Study of Surabaya and Balikpapan
Vol 5
, No 1
(2026)
The City of Singkawang faces significant challenges in drinking water management, characterized by limited production capacity, high non-revenue water (NRW), and the absence of digital infrastructure such as AMR, LoRaWAN, and DMA, necessitating a structured development framework to support the transition toward a smart water system. This study formulates an IoT-based smart water roadmap aligned with the regional development plan (RPJMD) and the operational capacity of the local water utility thr...
Sumber Asli
Google Scholar
DOI