1–20 of
75 results.
-
Husni Thamrin
•
Jan Wantoro
Closed questions offer poor information on student's ability to manage and apply knowledge. On the other hand, open questions have advantages because it may be used to grasp students' conceptual matur...
-
Adi Setiawan
In psychology or educational research, we often want to test the validity of our instrument. Usually we use the Pearson coefficient of correlation in validity testing. However, the distribution of the...
-
Alireza Tajalli
•
Seyed-Amin Hosseini-Seno
•
Mohamed Shenify
•
Rahmat Budiarto
Wireless ad hoc networks have seen a great deal of attention in the past years, especially in cases where no infrastructure is available. The main goal in these networks is to provide good data access...
-
Fauziah Abdul Rahman
•
Mohammad Ishak Desa
•
Antoni Wibowo
•
Norhaidah Abu Haris
In this paper, an understanding and a review of data mining (DM) development and its applications in logistics and specifically transportation are highlighted. Even though data mining has been success...
-
Cut Fiarni
Asthma is a chronic lung disease that inflames and narrows the airways. Asthma is a multifactorial chronic illness, there is no uniformity of triggers factors of asthma attack on asthma patients with ...
-
Mirwan Ushada
•
Tsuyoshi Okayama
•
Atris Suyantohadi
•
Nafis Khuriyati
•
Haruhiko Murase
This paper highlighted a new method for worker capacity assessment in Indonesian small-medium food industry. The sustainable and productivity of Indonesian food industry should be maintained based on ...
-
Lukman Rosyidi
•
Khoirul Umam
This paper will discuss about design of consumerparticipative device for smart grid initiative. Indonesia conditionis taken as the case, because smart grid initiative will depend onobject and environm...
-
Bambang Tutuko
•
Siti Nurmaini
This paper describes the swarm robots communication and control base Mobile ad-hoc network (MANET). MANET is a source of codes which migrate the network, collects and exchanges information of network ...
-
Erlin Erlin
•
Rahmiati Rahmiati
•
Unang Rio
Online discussion is a powerful way to conduct online conversation and a significant component of online learning. Online discussion can provide a platform for online learners to communicate with one ...
-
Herlina Jayadianti
•
Lukito Edi Nugroho
•
Paulus Insap Santosa
•
Wahyu Widayat
•
Carlos Alberta Baptista Sousa Pinto
The purpose of this paper is to provide research based understanding of adding sinonyms to a concept in an ontology. We hypothesize that managing synonyms with a good taxonomy and a good integration p...
-
Silvia Silvia
•
Pitri Rukmana
•
Vivi Regina Aprilia
•
Derwin Suhartono
•
Rini Wongso
•
1 more
• Meiliana Meiliana
The number of documents progressively increases especially for the electronic one. This degrades effectivity and efficiency in managing them. Therefore, it is a must to manage the documents. Automatic...
-
Arda Yunianta
•
Norazah Yusof
•
Abdul Aziz
•
Nataniel Dengen
•
Mohd Shahizan Othman
Heterogeneity on learning environment is about different data and applications to support a learning process in education institutions. Distributed and various systems on learning environment is the c...
-
Loo Hui Ru
•
Trias Andromeda
•
M. N. Marsono
Mining data streams such as Internet traffic andnetwork security is complex. Due to the difficulty of storage, datastreams analytics need to be done in one scan. This limits thetime to observe stream ...
-
Muhammad Qomaruddin
•
Azizah Abdul Rahman
•
Noorminshah A. Iahad
Recent years, Computer-Assisted Assessment (CAA) has become increasingly important in education. This is indicated by many researches that focused on the development of computer-based assessment tool ...
-
Marva Mirabolghasemi
•
Noorminshah A. Iahad
•
Muhammad Qomaruddin
One of the major software used in today's classroom are Course Management Systems (CMS). There is currently little research regarding the learning experience of students using CMS like Moodle in a ble...
-
Mu’Awya Naser
•
Rahmat Budiarto
•
Ismat Aldmour
•
Pedro Peris Lopez
In this paper we scrutinize the security properties of an RFID authentication protocol conforming to the EPC Class-1 Generation-2 standard. The protocol is suitable for Gen-2 passive tags and requires...
-
Pandapotan Siagian
•
Kurniabudi Kurniabudi
•
Erick Fernando
•
Herry Mulyono
Previous studies with the title of the login authentication e-library with method of CBIR for matching face, have proved reaching the level of accuracy about 75%. This multiple verification of QR-code...
-
Ismat Aldmour
•
Lelyzar Siregar
•
Thair Al Dala’In
•
Rahmat Budiarto
The world is progressing toward the Mobile Internet Protocol Television (MIPTV) era where people are able to watch television while roaming. The MIPTV technology requires high bandwidth and low latenc...
-
Muhammad Rifqi Ma’Arif
•
Agus Mulyanto
This paper proposes a technique to improve the accuracy of recommender system result which employ collaborative filtering technique. The proposed method incorporates structural equivalence score of it...
-
Ahmad Fali Okilas
•
Sri Desy Siswanti
•
M. Dieka Rachman
The increasing development of mobile technology makes some technology capable to running on multiple mobile platforms. One of them is Location Based Service. Location Based Service is a service provid...