1–20 of
339 results.
-
Fuad Dary Rosyadi
•
Radityo Anggoro
Energy limitations are the problem that gets the most attention in the term of Wireless Sensor Networks (WSN). Sleep wakeup scheduling method is one of the most efficient techniques to increase sensor...
-
Amirullah Andi Bramantya
•
Chastine Fatichah
•
Nanik Suciati
Research in medical imagery field such as analysis of Red Blood Cells (RBCs) abnormalities can be used to assist laboratory's in determining further medical actions. Convolutional Neural Networks (CNN...
-
Hazna At Thooriqoh
•
M. Naufal Azzmi
•
Yoga Ari Tofan
•
Ary Mazharuddin Shiddiqi
Domain Name System (DNS) is an essential component in internet infrastructure to direct domains to IP addresses or conversely. Despite its important role in delivering internet services, attackers oft...
-
Ratih Nur Esti Anggraini
•
Ainatul Nur Esti Maulida
•
Daniel Oranova Siahaan
The information and communication technology development makes someone interact with each other easier. This convenience is used to exchange ideas, like using social media Twitter for product recommen...
-
Muhammad Aqil Maulana
•
Sri Rahayu Natasia
•
Dwi Arief Prambudi
•
Tegar Palyus Fiqar
As one of State ‘s Higher Education Institutions, the Kalimantan Institute of Technology (ITK) must perform the education and teaching function as mandated by the tri dharma perguruan tinggi, then the...
-
Al Haromainy, Muhammad Muharrom
•
Chastine Fatichah
•
Ahmad Saikhu
Multivariate time series data prediction is widely applied in various fields such as industry, health, and economics. Several methods can form prediction models, such as Artificial Neural Network (ANN...
-
Hazna At Thooriqoh
•
Tiara Nur Annisa
•
Umi Laili Yuhana
Software Testing plays a crucial role in making high-quality products. The process of manual testing is often inaccurate, unreliable, and needed more than automation testing. One of these tools, Selen...
-
Umi Sa'adah
•
Jauari Akhmad Nur Hasim
•
Andhik Ampuh Yunanto
•
Desy Intan Permatasari
•
Fadilah Fahrul Hardiansyah
•
2 lainnya
• Irma Wulandari
• Hazna At Thooriqoh
Software Testing plays an important role in making high quality products and the right time. The process of testing done manually is often inaccurate, unreliable, and needed more than automatic testin...
-
Achmadaniar Anindya Rhosady
•
Fuad Dary Rosyadi
•
Lucas Susanto
Microservice is an application architecture that separates one big application into smaller ones. The architecture simplifies development, deployment, and management process. However, the architecture...
-
Hafara Firdausi
•
Bagus Jati Santoso
•
Rohana Qudus
•
Henning Titi Ciptaningtyas
Attacks on network security can happen anywhere. Using Geo-Social Networks (GSN), i.e., a graph that combines social network data and spatial information, we can find the potential attackers based on ...
-
Nafa Zulfa
•
Nanik Suciati
•
Shintami Chusnul Hidayati
Lip-reading is one of the most challenging studies in computer vision. This is because lip-reading requires a large amount of training data, high computation time and power, and word length variation....
-
Prima Wiratama
•
Ary Mazharuddin Shiddiqi
Emergency Aid has a very vital role in saving the patient's life. The emergency process involves two stages, namely the pre-hospital and the hospital stage. Striving for the entire emergency process i...
-
Syavira Tiara Zulkarnain
•
Nanik Suciati
Facial expression recognition (FER) on images with illumination variation and noises is a challenging problem in the computer vision field. We solve this using deep learning approaches that have been ...
-
Dino Budi Prakoso
•
Royyana Muslim Ijtihadie
•
Tohari Ahmad
In the technology world especially in the field of current network of Autonomous Systems connectivity (AS) is indispensable. Especially against the dynamic routing protocols that are often used compar...
-
Junaidi Junaidi
•
Amirullah Andi Bramantya
•
Bintang Satya Pradipta
Context – Internet of Things (IoT) interrelates computing devices, machines, animals, or people and things that use the power of internet usage to utilize data to be much more usable. Food is one of t...
-
Rizky Januar Akbar
•
Nurul Fajrin Ariyani
•
Adistya Azhar
•
Andika Andra
There is an impersonation (login as) feature in several applications that can be used by system administrators who have special privileges. This feature can be utilized by development and maintenance ...
-
Akbar Pandu Segara
•
Royyana Muslim Ijtihadie
•
Tohari Ahmad
Software Defined Network is a network architecture with a new paradigm which consists of a control plane that is placed separately from the data plane. All forms of computer network behavior are contr...
-
Adenuar Purnomo
•
Handayani Tjandrasa
Deep learning is commonly used to solve problems such as biomedical problems and many other problems. The most common architecture used to solve those problems is Convolutional Neural Network (CNN) ar...
-
Cosmas Haryawan
•
Maria Mediatrix Sebatubun
University is one of the educational institutions and can be established by the government or the individual. At this time, Indonesia has hundreds of universities spread throughout the region. As an e...
-
Nafa Zulfa
•
Hafara Firdausi
•
Rakha Asyrofi
Supply chain management (SCM) system is an essential requirement for companies and manufacturers to collaborate in doing business. There are many techniques to manage supply chains, such as using Exce...