Author |
Session |
Start page |
Title |
A A B C D E F G H I K L M N P R S T U V W Y Z |
A, Mirwan |
5B.4 |
652 |
Virtual Assistant Using LSTM Networks In Indonesian |
Abd Rauf, Muhammad Fairuz |
3B.8 |
433 |
Sentiment Analysis for 2016's SPM and STPM leavers |
Abdullah, Syaifudin |
5A.4 |
612 |
Legal Protection Policy on Computer Programming of Document Security System Based On Law No. 28 Copyright |
Abdurachman, Edi |
1C.3 |
99 |
Key Factor Adoption Blockchain Technology In Smart Supply Management: Literature Review |
5A.5 |
617 |
Success Factors of the Blockchain Adoption for Smart Manufacture |
Achsani, M Zulfa |
3B.5 |
415 |
Elasticsearch Analyzer In Broad Match Advertising System |
Adawati, Infaz |
2B.3 |
231 |
Data Quality Assessment on Higher Education: A Case Study of Institute of Statistics |
Adi, Kusworo |
3C.5 |
459 |
Logic Scoring of Preference Method for Determining Landfill with Geographic Information System |
Adi, Prajanto |
4A.4 |
527 |
Image Watermarking using CRT through Gradient Magnitude of Laplacian Filter |
Adiaksa, Gregah |
3D.2 |
481 |
Implementation of One Orde Extraction for Identification of Coal Batik Method with Backpropagation Method |
Adji, Teguh |
2C.5 |
287 |
The effect of embedding dimension reduction on increasing LSTM performance for Sentiment Analysis |
Adnan, Zuraidy |
2C.4 |
281 |
Exploiting Malay Corpus On Islamic Issue using Sketch Engine |
3B.8 |
433 |
Sentiment Analysis for 2016's SPM and STPM leavers |
Adzkiya, Dieky |
4B.3 |
566 |
Mathematical Modeling and Simulation of Missile Firing Impact Force on Warship |
4B.4 |
571 |
Ship Heading Control of Warship Using Disturbance Compensating Model Predictive Control Method |
Affandi, Achmad |
4B.1 |
555 |
Data Communication Protocols Supporting Monitoring Service of Traffic Management Center |
Ahmad, Yasir |
5B.8 |
674 |
A Fuzzy base Approach to Reduce the Domain of Ambiguities in Software Requirement |
Ahmadzadegan, Mohammad Hossein |
6A.4 |
695 |
Massive DDoS Occurrence Investigation in Future IoT devices |
Alasiry, Ali |
4B.5 |
577 |
Balance Control of Humanoid Dancing Robot ERISA while Walking on Sloped Surface using PID |
Alifi, Muhammad |
5B.1 |
637 |
Information Extraction of Traffic Condition from Social Media using Bidirectional LSTM-CNN |
Almahfud, Mustofa Alisahid |
1A.3 |
11 |
An Effective MRI Brain Image Segmentation using Joint Clustering (K-Means and Fuzzy C-Means) |
Amalia, Citra |
1B.2 |
49 |
Determine The Winner of The Construction Tender in Central Kalimantan Using Analysis Network Process (Case Study: LPSE Central Kalimantan) |
Amanah, Umu |
5B.3 |
646 |
SEMAR: An Interface for Indonesian Hate Speech Detection Using Machine Learning |
Amini Deilami, Hossein |
6A.4 |
695 |
Massive DDoS Occurrence Investigation in Future IoT devices |
Andri, Kuntoro |
2D.8 |
347 |
Agricultural Strategic Commodity Price Forecasting Using Artificial Neural Network |
Anggraeni, Wiwik |
2D.8 |
347 |
Agricultural Strategic Commodity Price Forecasting Using Artificial Neural Network |
Anto, Irfan |
4B.6 |
582 |
Design and development the IoT-based smart hydroponic system |
Ardita, Michael |
4B.1 |
555 |
Data Communication Protocols Supporting Monitoring Service of Traffic Management Center |
Ardyastiti, Ericha |
1A.7 |
33 |
A Survey: Effect of the Number of GLCM Features on Classification Accuracy of Lasem Batik Images using K-Nearest Neighbor |
Armi, Nasrullah |
4B.8 |
591 |
OFDM based Signal Detection Performance in Cognitive Radio Systems |
Arrasyid, Adli Azhar |
4A.3 |
522 |
Image Watermarking using Triple Transform (DCT-DWT-SVD) to Improve Copyright Protection Performance |
Arsiwi, Pramudi |
4A.4 |
527 |
Image Watermarking using CRT through Gradient Magnitude of Laplacian Filter |
Arymurthy, Aniati |
2C.8 |
305 |
Random Subspace Method for Sleep Stage Classification of Autism Patients |
Asfihani, Tahiyatul |
4B.3 |
566 |
Mathematical Modeling and Simulation of Missile Firing Impact Force on Warship |
4B.4 |
571 |
Ship Heading Control of Warship Using Disturbance Compensating Model Predictive Control Method |
Ashari, Ahmad |
5A.1 |
595 |
Visual Adjustment Tools Selection for Multi-format Distributed World Framework |
Asor, Jonardo |
3C.7 |
470 |
RESEARCH++: An Academic Social Networking Research Community Portal for Profiling and Expertise Classification |
3D.1 |
476 |
Pattern Recognition from Radiology Reports towards Predictive Lung Disease Manifestation in Municipal Settings |
Assidiqi, Moh Hasbi |
3A.1 |
353 |
Development of A Warning Receiver System for Public Display Based on Application-Controlled Video Switcher |
Astuti, Dwi |
1D.6 |
158 |
Improved Message Payload and Security of Image Steganography using 3-3-2 LSB and Dual Encryption |
Augoestien, Nia |
3A.7 |
384 |
Multidimensional Earcon Interaction Design for The Blind: a Proposal and Evaluation |
Aulia, Giska |
4B.4 |
571 |
Ship Heading Control of Warship Using Disturbance Compensating Model Predictive Control Method |
Ayuning Budi, Nur Fitriah |
5A.3 |
606 |
Challenges for Implementation of The Draft of Presidential Regulation on Indonesia One Data |
Azhari, Azhari |
3A.7 |
384 |
Multidimensional Earcon Interaction Design for The Blind: a Proposal and Evaluation |
B A B C D E F G H I K L M N P R S T U V W Y Z |
Bachtiar, Mochamad |
3A.1 |
353 |
Development of A Warning Receiver System for Public Display Based on Application-Controlled Video Switcher |
Basofi, Arif |
1B.7 |
77 |
Landslide Risk Mapping in East Java, Indonesia, Using Analytic Hierarchy Process - Natural Breaks Classification |
Bertalya, Bertalya |
2D.1 |
310 |
Analysis of Tuberculosis Cases in Indonesian by Using K-means Clustering Technique |
Budi Utomo, Eko |
4A.6 |
538 |
Payload and Antena Tracker System Development for Indonesia Tropopause Baloon Competition |
Budiharto, Widodo |
3B.6 |
421 |
Text Mining Analysis Log Discussion Forum for Online Learning Recommendation Systems Using Machine Learning |
Budiyanto, Dani |
1D.2 |
136 |
Comparative Implementation Tiny Encryption Algorithm (TEA) And Advanced Encryption Standard (AES) For Open Source Develop Cryptomator Library Based On Android |
Buliali, Joko |
2C.3 |
276 |
Hybrid Method of Undersampling AND Oversampling for Handling Imbalanced Dataset |
Bustoni, Isna |
3A.7 |
384 |
Multidimensional Earcon Interaction Design for The Blind: a Proposal and Evaluation |
Buwono, Robby Cokro |
3A.4 |
367 |
Round-robin Algorithm in HAProxy and Nginx Load Balancing Performance Evaluation: a Review |
C A B C D E F G H I K L M N P R S T U V W Y Z |
Cahyabuana, Brigitta |
1B.4 |
61 |
The Consistency of Using Failure Mode Effect Analysis (FMEA) on Risk Assessment of Information Technology |
Catedrilla, Gene Marck |
3C.4 |
453 |
VIP READY: A Mobile Leisure Search Engine for Visually Impaired Persons Utilizing Phone Motion and Speech Recognition |
3D.1 |
476 |
Pattern Recognition from Radiology Reports towards Predictive Lung Disease Manifestation in Municipal Settings |
Ceisa Santi, Nirma |
3D.2 |
481 |
Implementation of One Orde Extraction for Identification of Coal Batik Method with Backpropagation Method |
Choirunnisa, Shabrina |
2C.3 |
276 |
Hybrid Method of Undersampling AND Oversampling for Handling Imbalanced Dataset |
Chrisnanto, Yulison |
1B.8 |
83 |
Optimizing Outlier in K-Means Clustering Using Simulated Annealing Algorithm |
Christian, Dion |
1B.8 |
83 |
Optimizing Outlier in K-Means Clustering Using Simulated Annealing Algorithm |
Chyan, Phie |
2D.7 |
343 |
Decision support system for selection of dog breeds |
Condrobimo, A. Raharto |
3C.3 |
449 |
The Safe and Trust factors of Mobile Transportation System for user behavior in Indonesia |
Crysdian, Cahyo |
3C.6 |
465 |
Optimization of Naïve Bayes Classifier To Classify Green Open Space Object Based on Google Earth Image |
D A B C D E F G H I K L M N P R S T U V W Y Z |
Darabpour, Roya |
6A.1 |
679 |
A comparison between evolutionary-algorithms parallelization in CUDA architecture |
Darmawan, Adytia |
4A.6 |
538 |
Payload and Antena Tracker System Development for Indonesia Tropopause Baloon Competition |
Darwis, Taufik |
3B.5 |
415 |
Elasticsearch Analyzer In Broad Match Advertising System |
Dewantara, Belly |
4B.2 |
560 |
Adaptive DOCR Coordination in Loop Electrical Distribution System With DG Using Artificial Neural Network LMBP |
Diah Prahmana karyatanti, Iradiratu |
4B.2 |
560 |
Adaptive DOCR Coordination in Loop Electrical Distribution System With DG Using Artificial Neural Network LMBP |
Dinimaharawati, Ashri |
2C.1 |
265 |
Design and Implementation Educational Games E-Learning Using Learning Experience Design (LXD) Towards Student Learning Experience |
E A B C D E F G H I K L M N P R S T U V W Y Z |
Echalar, Loyd |
3C.2 |
443 |
PaLife: A Mobile Application for Palay (Rice) Health Condition Classification Utilizing Image Processing and Pigment Analysis Towards Sustainability of Palay Production |
Edbert, Ivan |
3C.3 |
449 |
The Safe and Trust factors of Mobile Transportation System for user behavior in Indonesia |
Eridani, Dania |
4B.7 |
587 |
Performance of Sensors Monitoring System using Raspberry Pi through MQTT Protocol |
F A B C D E F G H I K L M N P R S T U V W Y Z |
Fahmi, Amiq |
5A.6 |
622 |
Waqf Lands Assets Classification Based On Productive Value For Business Development Using Naïve Bayes |
Fajar, Ahmad |
1A.8 |
39 |
Information as a Service on Cloud Computing Technology: A Review |
2A.8 |
215 |
Big Data Architecture for Indonesia Online Travel Agent based on Cloud Computing |
Fakhrurroja, Hanif |
4B.6 |
582 |
Design and development the IoT-based smart hydroponic system |
Fanany, Ivan |
2C.8 |
305 |
Random Subspace Method for Sleep Stage Classification of Autism Patients |
Fariza, Arna |
1B.7 |
77 |
Landslide Risk Mapping in East Java, Indonesia, Using Analytic Hierarchy Process - Natural Breaks Classification |
Fauzan, Reza |
5A.2 |
601 |
Activity Diagram Similarity Measurement: A Different Approach |
Fauziah, Noveline Aziz |
1D.4 |
146 |
Design and Implementation of AES and SHA-256 Cryptography for Securing Multimedia File over Android Chat Application |
Fauziati, Silmi |
2B.8 |
259 |
Analysis Distribution Traders and Population Density in Dharmasraya District of West Sumatera Province Using Exploratory Spatial Data Analysis |
Ferdiana, Ridi |
2A.1 |
174 |
Software Metrics Classification for Agile Scrum Process: A Literature Review |
Ferdiansyah, Indra |
3A.1 |
353 |
Development of A Warning Receiver System for Public Display Based on Application-Controlled Video Switcher |
Fernando, Erick |
1C.3 |
99 |
Key Factor Adoption Blockchain Technology In Smart Supply Management: Literature Review |
3C.3 |
449 |
The Safe and Trust factors of Mobile Transportation System for user behavior in Indonesia |
5A.5 |
617 |
Success Factors of the Blockchain Adoption for Smart Manufacture |
Fikri, Ahmad |
3C.1 |
439 |
Performance Comparison of Dalvik and ART on Different Android-Based Mobile Devices |
Fransisca, Fransisca |
3B.4 |
410 |
The Impact of Facebook and Whatsapp Utilization to The Learning Effectiveness |
Fuad, Muchamad Chaninul |
3A.1 |
353 |
Development of A Warning Receiver System for Public Display Based on Application-Controlled Video Switcher |
G A B C D E F G H I K L M N P R S T U V W Y Z |
Gemeliarana, I Gusti Ayu Kusdiah |
1C.8 |
126 |
Evaluation Of Proof Of Work (Pow) Blockchains Security Network On Selfish Mining |
Gharibi, Wajeb |
4B.8 |
591 |
OFDM based Signal Detection Performance in Cognitive Radio Systems |
Ghorbani, Hamidreza |
6A.4 |
695 |
Massive DDoS Occurrence Investigation in Future IoT devices |
Ginting, Jusia |
3B.3 |
405 |
The Spread Path of Hoax News in Social Media (Facebook)Using Social Network Analysis (SNA) |
Gumilang, Mukhamad |
2C.2 |
271 |
E-learning Governance of Universitas Negeri Malang Using Cobit 4.1 Through Deliver and Support Domain |
Gunanto, Samuel Gandang |
4A.5 |
532 |
Visual Perception Evaluation from The Synthesis of Realistic Facial Expressions Based On Feature Point Clusters |
Guntoro, Azmi |
2A.8 |
215 |
Big Data Architecture for Indonesia Online Travel Agent based on Cloud Computing |
H A B C D E F G H I K L M N P R S T U V W Y Z |
Hadi Alhaq, Rohman |
3D.2 |
481 |
Implementation of One Orde Extraction for Identification of Coal Batik Method with Backpropagation Method |
Hamid, Azhar |
1C.4 |
103 |
A Study of Tracking Technology in Supply Chain Management |
2C.4 |
281 |
Exploiting Malay Corpus On Islamic Issue using Sketch Engine |
Hananto, Mursid |
5A.1 |
595 |
Visual Adjustment Tools Selection for Multi-format Distributed World Framework |
Harso, Suhono |
1C.3 |
99 |
Key Factor Adoption Blockchain Technology In Smart Supply Management: Literature Review |
5A.5 |
617 |
Success Factors of the Blockchain Adoption for Smart Manufacture |
5B.1 |
637 |
Information Extraction of Traffic Condition from Social Media using Bidirectional LSTM-CNN |
Hartanto, Rudy |
3D.4 |
492 |
Classification of Batik Image using Grey Level Co-occurrence Matrix Feature Extraction and Correlation Based Feature Selection |
Harwahyu, Ruki |
3C.1 |
439 |
Performance Comparison of Dalvik and ART on Different Android-Based Mobile Devices |
Hastawan, Ahmad |
1D.1 |
131 |
Robustness of Steganography Image Method Using Dynamical Management Position of Least Significant Bit (LSB) |
Hayati, Hashri |
1C.7 |
120 |
Blockchain Based Traceability System in Food Supply Chain |
Hermawan, Hendhi |
4A.6 |
538 |
Payload and Antena Tracker System Development for Indonesia Tropopause Baloon Competition |
Heryadi, Yaya |
3B.6 |
421 |
Text Mining Analysis Log Discussion Forum for Online Learning Recommendation Systems Using Machine Learning |
Hidayanto, Achmad |
2B.3 |
231 |
Data Quality Assessment on Higher Education: A Case Study of Institute of Statistics |
5A.3 |
606 |
Challenges for Implementation of The Draft of Presidential Regulation on Indonesia One Data |
Hidayat, Wahyu Nur |
2C.2 |
271 |
E-learning Governance of Universitas Negeri Malang Using Cobit 4.1 Through Deliver and Support Domain |
Hidayatulloh, Indra |
3A.7 |
384 |
Multidimensional Earcon Interaction Design for The Blind: a Proposal and Evaluation |
Hildayanti, Ica |
1B.1 |
43 |
Performance Comparison of Genetic Algorithm Operator Combinations for Optimization Problems |
Holle, Khadijah |
3C.6 |
465 |
Optimization of Naïve Bayes Classifier To Classify Green Open Space Object Based on Google Earth Image |
I A B C D E F G H I K L M N P R S T U V W Y Z |
Imawan, Cuk |
3D.3 |
487 |
Electrical Conductivity Prediction System of Honey using Hyperspectral Imaging |
Indrianti, Yasinta |
2C.6 |
293 |
Student Satisfaction on E-learning Website Sasmoko.com |
Irawan, Candra |
1A.7 |
33 |
A Survey: Effect of the Number of GLCM Features on Classification Accuracy of Lasem Batik Images using K-Nearest Neighbor |
Iriani, Ade |
3B.2 |
400 |
Identification of Influencers in Social Media using Social Network Analysis (SNA) |
Isa, Sani Muhammad |
3B.6 |
421 |
Text Mining Analysis Log Discussion Forum for Online Learning Recommendation Systems Using Machine Learning |
Ismayati, Euis |
4A.2 |
518 |
Fragile Watermarking Technique using a Linear Block Mapping for Document Image Authentication with Recovery Capability |
Isnanto, R Rizal |
1D.1 |
131 |
Robustness of Steganography Image Method Using Dynamical Management Position of Least Significant Bit (LSB) |
Izadyar, Marzieh |
6A.4 |
695 |
Massive DDoS Occurrence Investigation in Future IoT devices |
Izzati, Afifah |
1C.1 |
87 |
The Success Factors in Implementation of The E-Government Master Plan |
K A B C D E F G H I K L M N P R S T U V W Y Z |
Kathiravan, Yamunah |
3B.8 |
433 |
Sentiment Analysis for 2016's SPM and STPM leavers |
Kelana, Bayu |
3A.5 |
373 |
The Antecedents of Cloud Storage's Continued Use on Higher Education |
Khalili, Mohammad |
6A.1 |
679 |
A comparison between evolutionary-algorithms parallelization in CUDA architecture |
Khan, Wazir Zada |
4B.8 |
591 |
OFDM based Signal Detection Performance in Cognitive Radio Systems |
Kharsananda, Boffin |
2B.8 |
259 |
Analysis Distribution Traders and Population Density in Dharmasraya District of West Sumatera Province Using Exploratory Spatial Data Analysis |
Kirana, Elika |
1B.3 |
55 |
Multi-Method Approach for Visual Detection to Improve M-Banking Application Among Students in Yogyakarta |
Komalasari, Nia |
2B.1 |
221 |
Effect Of Education, Performance, Position And Information Technology Competency Of Information Systems To Performance Of Information System |
Kosala, Raymond |
1C.3 |
99 |
Key Factor Adoption Blockchain Technology In Smart Supply Management: Literature Review |
5A.5 |
617 |
Success Factors of the Blockchain Adoption for Smart Manufacture |
Krisnawati, Lucia |
4A.5 |
532 |
Visual Perception Evaluation from The Synthesis of Realistic Facial Expressions Based On Feature Point Clusters |
Kuncoro, Muhamad Wahyu |
1A.2 |
5 |
Roundness and Eccentricity Feature Extraction for Javanese Handwritten Character Recognition based on K-Nearest Neighbor |
Kurnia, Reni |
2A.1 |
174 |
Software Metrics Classification for Agile Scrum Process: A Literature Review |
Kurniawan, Aditya |
1A.6 |
28 |
Face Authentication in E-Learning using Local Binary Pattern and Haar Cascade |
Kurniawan, Defri |
2A.5 |
198 |
Analysis And Design Of Online Exam System At School Using Unified Model |
Kusrahardjo, Gatot |
4B.1 |
555 |
Data Communication Protocols Supporting Monitoring Service of Traffic Management Center |
Kusumastuti, Dwi |
2C.6 |
293 |
Student Satisfaction on E-learning Website Sasmoko.com |
2D.4 |
327 |
Consumer Segmentation Using Case Base Reasoning Approach To Printing Company |
L A B C D E F G H I K L M N P R S T U V W Y Z |
Labayne, Jonalyn Joy |
2C.7 |
299 |
Institutional Evaluation System with Data Analytics: Input to Continuous Quality Improvement |
Lestari, Indah |
3A.5 |
373 |
The Antecedents of Cloud Storage's Continued Use on Higher Education |
Lisanti, Yuliana |
3B.4 |
410 |
The Impact of Facebook and Whatsapp Utilization to The Learning Effectiveness |
Luhukay, Devyano |
3B.4 |
410 |
The Impact of Facebook and Whatsapp Utilization to The Learning Effectiveness |
M A B C D E F G H I K L M N P R S T U V W Y Z |
M Saleh, Abdul |
1B.3 |
55 |
Multi-Method Approach for Visual Detection to Improve M-Banking Application Among Students in Yogyakarta |
Mahananto, Faizal |
2D.8 |
347 |
Agricultural Strategic Commodity Price Forecasting Using Artificial Neural Network |
Mahastama, Aditya |
4A.5 |
532 |
Visual Perception Evaluation from The Synthesis of Realistic Facial Expressions Based On Feature Point Clusters |
Manongga, Daniel |
3B.2 |
400 |
Identification of Influencers in Social Media using Social Network Analysis (SNA) |
Manongga, Danny |
3B.3 |
405 |
The Spread Path of Hoax News in Social Media (Facebook)Using Social Network Analysis (SNA) |
Marjudi, Suziyanti |
1C.4 |
103 |
A Study of Tracking Technology in Supply Chain Management |
2C.4 |
281 |
Exploiting Malay Corpus On Islamic Issue using Sketch Engine |
Marpaung, Budi |
6A.3 |
690 |
Theoretical Model of Determinants Factors of Health Information Technology (HIT) Acceptance |
Marutho, Dhendra |
2D.3 |
322 |
Measuring Hybrid SC-FCM Clustering with Cluster Validity Index |
Maspupah, Asri |
1B.8 |
83 |
Optimizing Outlier in K-Means Clustering Using Simulated Annealing Algorithm |
Meiyanti, Ruci |
2B.4 |
237 |
Exploring Factors Influence Behavioral Intention to Use E-Government Services Using Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) |
2B.6 |
249 |
The Components of Smart City Initiative: A Literature Review |
Mercado, Lester |
3A.6 |
378 |
Intelligent Library Systems with Data Analytics for Enhanced Customer Relation Management Towards Continuous Quality Improvement |
Meyliana, Meyliana |
1C.3 |
99 |
Key Factor Adoption Blockchain Technology In Smart Supply Management: Literature Review |
3C.3 |
449 |
The Safe and Trust factors of Mobile Transportation System for user behavior in Indonesia |
5A.5 |
617 |
Success Factors of the Blockchain Adoption for Smart Manufacture |
Mohamad Amran, Mohd Fahmi |
3B.8 |
433 |
Sentiment Analysis for 2016's SPM and STPM leavers |
Moniaga, Jurike |
1A.6 |
28 |
Face Authentication in E-Learning using Local Binary Pattern and Haar Cascade |
Mubarok, Husein |
4A.7 |
544 |
Solar Cell-Wind Turbine Hybrid Generation as a Solution of the Energy Audit Analysis at Hospital |
Mukhneri, Mukhneri |
2C.6 |
293 |
Student Satisfaction on E-learning Website Sasmoko.com |
Mulyati, Sri |
2D.5 |
332 |
The system of Classification of Diseases With Fever Symptoms In Children Using Methods Fuzzy K-Nearest Neighbor |
Munandar, Aris |
4B.6 |
582 |
Design and development the IoT-based smart hydroponic system |
Murad, Dina |
2B.1 |
221 |
Effect Of Education, Performance, Position And Information Technology Competency Of Information Systems To Performance Of Information System |
3B.5 |
415 |
Elasticsearch Analyzer In Broad Match Advertising System |
3B.6 |
421 |
Text Mining Analysis Log Discussion Forum for Online Learning Recommendation Systems Using Machine Learning |
Murmanto, Imanuel |
2D.4 |
327 |
Consumer Segmentation Using Case Base Reasoning Approach To Printing Company |
Mustika, I Wayan |
5B.6 |
662 |
Proper Buffer Size and Time To Live on the Scheduled Train System using Delay-Tolerant Networks |
Mustofa, Khabib |
5A.1 |
595 |
Visual Adjustment Tools Selection for Multi-format Distributed World Framework |
N A B C D E F G H I K L M N P R S T U V W Y Z |
Najwa, Nina |
1B.4 |
61 |
The Consistency of Using Failure Mode Effect Analysis (FMEA) on Risk Assessment of Information Technology |
Naviangga, Dani |
1D.3 |
140 |
Secure Mobile Payment Based on Elliptic Curve Cryptography |
Negara, Edi Surya |
5A.3 |
606 |
Challenges for Implementation of The Draft of Presidential Regulation on Indonesia One Data |
Ningrum, Novita |
3D.2 |
481 |
Implementation of One Orde Extraction for Identification of Coal Batik Method with Backpropagation Method |
Nugraha, I Gusti Bagus Baskara |
1C.7 |
120 |
Blockchain Based Traceability System in Food Supply Chain |
Nurcahyo, Aldian |
2A.8 |
215 |
Big Data Architecture for Indonesia Online Travel Agent based on Cloud Computing |
Nursetyo, Arif |
1A.4 |
17 |
LatAksLate: Javanese Script Translator based on Indonesian Speech Recognition using Sphinx-4 and Google API |
5B.2 |
641 |
Smart Chatbot System for E-Commerce Assitance based on AIML |
P A B C D E F G H I K L M N P R S T U V W Y Z |
Panjaitan, Christin |
1A.1 |
1 |
Comparison K-Nearest Neighbors (K-NN) and Artificial Neural Network (ANN) in Real Time Entrants Recognition |
3A.2 |
358 |
Radio Frequency Communication for Data Transceiver in Fluid Pressure Monitoring on U-tube |
Patmanthara, Syaad |
2C.2 |
271 |
E-learning Governance of Universitas Negeri Malang Using Cobit 4.1 Through Deliver and Support Domain |
Permanasari, Adhistya |
1B.1 |
43 |
Performance Comparison of Genetic Algorithm Operator Combinations for Optimization Problems |
2B.8 |
259 |
Analysis Distribution Traders and Population Density in Dharmasraya District of West Sumatera Province Using Exploratory Spatial Data Analysis |
Pirmanto, Dovel |
3C.5 |
459 |
Logic Scoring of Preference Method for Determining Landfill with Geographic Information System |
Pramono, Luthfan Hadi |
3A.4 |
367 |
Round-robin Algorithm in HAProxy and Nginx Load Balancing Performance Evaluation: a Review |
Prasetijo, Agung |
5A.8 |
633 |
Indonesia Stock Exchange Securities Buy/ Sell Signal Detection using Bollinger Bands and Williams Percent Range |
Prasetyo, Khabib |
1D.7 |
163 |
Secured PVD Video Steganography Method based on AES and Linear Congruential Generator |
Pratama, Rian |
4B.6 |
582 |
Design and development the IoT-based smart hydroponic system |
Prathama, Dhimas Riksa |
1D.3 |
140 |
Secure Mobile Payment Based on Elliptic Curve Cryptography |
Pratiwi, Dian |
5A.4 |
612 |
Legal Protection Policy on Computer Programming of Document Security System Based On Law No. 28 Copyright |
Presekal, Alfan |
3C.1 |
439 |
Performance Comparison of Dalvik and ART on Different Android-Based Mobile Devices |
Prihandoko, Prihandoko |
2D.1 |
310 |
Analysis of Tuberculosis Cases in Indonesian by Using K-means Clustering Technique |
Priskila, Ressa |
2B.7 |
253 |
An Investigation of Factors Affecting the Success of Regional Financial Management Information System (Case Study of Palangka Raya Government) |
Priyatama, Wisnu |
4A.7 |
544 |
Solar Cell-Wind Turbine Hybrid Generation as a Solution of the Energy Audit Analysis at Hospital |
Pudjajana, Andre |
3B.2 |
400 |
Identification of Influencers in Social Media using Social Network Analysis (SNA) |
Purnawan, Heri |
4B.3 |
566 |
Mathematical Modeling and Simulation of Missile Firing Impact Force on Warship |
Purnomo, Hindriyanto |
3B.2 |
400 |
Identification of Influencers in Social Media using Social Network Analysis (SNA) |
Purnomo, Mauridhi |
5A.6 |
622 |
Waqf Lands Assets Classification Based On Productive Value For Business Development Using Naïve Bayes |
Puspitaningrum, Ari Cahaya |
1C.2 |
93 |
A Proposed Stages to Develop E-Government Master Plan in Indonesia |
Puspitasari, Windi |
3A.3 |
362 |
Real-Time Monitoring and Automated Control Of Greenhouse Using Wireless Sensor Network: Design and Implementation |
Putra, Rizky |
2D.5 |
332 |
The system of Classification of Diseases With Fever Symptoms In Children Using Methods Fuzzy K-Nearest Neighbor |
Putrie, Vike Maylana |
1D.5 |
152 |
Super Encryption using Transposition-Hill Cipher for Digital Color Image |
Putro, Endi |
2B.2 |
227 |
Information Technology Governance For Smart Village in Indonesia |
Putro, Irfan |
3D.3 |
487 |
Electrical Conductivity Prediction System of Honey using Hyperspectral Imaging |
Putro, Prasetyo Adi Wibowo |
1D.2 |
136 |
Comparative Implementation Tiny Encryption Algorithm (TEA) And Advanced Encryption Standard (AES) For Open Source Develop Cryptomator Library Based On Android |
1D.3 |
140 |
Secure Mobile Payment Based on Elliptic Curve Cryptography |
R A B C D E F G H I K L M N P R S T U V W Y Z |
Rabiha, Sucianna |
1A.6 |
28 |
Face Authentication in E-Learning using Local Binary Pattern and Haar Cascade |
2D.4 |
327 |
Consumer Segmentation Using Case Base Reasoning Approach To Printing Company |
Rachmawanto, Eko |
1A.2 |
5 |
Roundness and Eccentricity Feature Extraction for Javanese Handwritten Character Recognition based on K-Nearest Neighbor |
1A.3 |
11 |
An Effective MRI Brain Image Segmentation using Joint Clustering (K-Means and Fuzzy C-Means) |
1A.5 |
23 |
Pathogenic Bacteria Genus Classification using Support Vector Machine |
1A.7 |
33 |
A Survey: Effect of the Number of GLCM Features on Classification Accuracy of Lasem Batik Images using K-Nearest Neighbor |
1D.4 |
146 |
Design and Implementation of AES and SHA-256 Cryptography for Securing Multimedia File over Android Chat Application |
1D.5 |
152 |
Super Encryption using Transposition-Hill Cipher for Digital Color Image |
1D.6 |
158 |
Improved Message Payload and Security of Image Steganography using 3-3-2 LSB and Dual Encryption |
1D.7 |
163 |
Secured PVD Video Steganography Method based on AES and Linear Congruential Generator |
4A.3 |
522 |
Image Watermarking using Triple Transform (DCT-DWT-SVD) to Improve Copyright Protection Performance |
Rahardwika, Dewangga |
1A.5 |
23 |
Pathogenic Bacteria Genus Classification using Support Vector Machine |
Rahman, Aulia |
5A.7 |
627 |
Review on Food Recommender System for Diabetes Mellitus |
Rahman, Yuli |
6A.5 |
699 |
An empirical metaheuristic assessment for solving of multi type DGs allocation problem |
Rahmatullah, Daeng |
4B.2 |
560 |
Adaptive DOCR Coordination in Loop Electrical Distribution System With DG Using Artificial Neural Network LMBP |
Rahmawanto, Fathur |
5B.5 |
656 |
Similarity Detector On The Student Assignment Document Using Levenshtein Distance Method |
Rahmayuna, Novita |
1A.5 |
23 |
Pathogenic Bacteria Genus Classification using Support Vector Machine |
Raja Lope Ahmad, Raja Mohd Tariqi |
1C.4 |
103 |
A Study of Tracking Technology in Supply Chain Management |
2C.4 |
281 |
Exploiting Malay Corpus On Islamic Issue using Sketch Engine |
Rakhmawati, Lusia |
4A.2 |
518 |
Fragile Watermarking Technique using a Linear Block Mapping for Document Image Authentication with Recovery Capability |
Rijati, Nova |
1D.7 |
163 |
Secured PVD Video Steganography Method based on AES and Linear Congruential Generator |
Riskinanto, Anggar |
3A.5 |
373 |
The Antecedents of Cloud Storage's Continued Use on Higher Education |
Rizqyawan, Muhammad Ilham |
4B.6 |
582 |
Design and development the IoT-based smart hydroponic system |
Rochimah, Siti |
2B.5 |
243 |
Error Message Quality of Web Form: Assessment on Existing Parameters |
5A.2 |
601 |
Activity Diagram Similarity Measurement: A Different Approach |
Rochmawati, Naim |
4A.2 |
518 |
Fragile Watermarking Technique using a Linear Block Mapping for Document Image Authentication with Recovery Capability |
Rofiq, M |
2D.8 |
347 |
Agricultural Strategic Commodity Price Forecasting Using Artificial Neural Network |
Rosfitasari, Yuzi |
3D.2 |
481 |
Implementation of One Orde Extraction for Identification of Coal Batik Method with Backpropagation Method |
S A B C D E F G H I K L M N P R S T U V W Y Z |
S, Syamsudin |
2B.4 |
237 |
Exploring Factors Influence Behavioral Intention to Use E-Government Services Using Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) |
Safitri, Erika |
1B.7 |
77 |
Landslide Risk Mapping in East Java, Indonesia, Using Analytic Hierarchy Process - Natural Breaks Classification |
Safitri, Irma |
4A.1 |
513 |
Compressive Sensing L1 Norm for 2D-DCT Huffman Coding Medical Image Watermarking |
4A.8 |
550 |
Compressive Sensing and Histogram Adaptive Fuzzy Image Steganography |
Salim, Taufik |
4B.6 |
582 |
Design and development the IoT-based smart hydroponic system |
Sani, Ramadhan |
2A.5 |
198 |
Analysis And Design Of Online Exam System At School Using Unified Model |
Santoso, Albertus |
1B.2 |
49 |
Determine The Winner of The Construction Tender in Central Kalimantan Using Analysis Network Process (Case Study: LPSE Central Kalimantan) |
Santoso, Albertus Joko |
2B.7 |
253 |
An Investigation of Factors Affecting the Success of Regional Financial Management Information System (Case Study of Palangka Raya Government) |
Santoso, Irwan |
3C.6 |
465 |
Optimization of Naïve Bayes Classifier To Classify Green Open Space Object Based on Google Earth Image |
Saputro, Adhi |
3D.3 |
487 |
Electrical Conductivity Prediction System of Honey using Hyperspectral Imaging |
Sari, Christy Atika |
1A.2 |
5 |
Roundness and Eccentricity Feature Extraction for Javanese Handwritten Character Recognition based on K-Nearest Neighbor |
1A.3 |
11 |
An Effective MRI Brain Image Segmentation using Joint Clustering (K-Means and Fuzzy C-Means) |
1A.5 |
23 |
Pathogenic Bacteria Genus Classification using Support Vector Machine |
1A.7 |
33 |
A Survey: Effect of the Number of GLCM Features on Classification Accuracy of Lasem Batik Images using K-Nearest Neighbor |
1D.4 |
146 |
Design and Implementation of AES and SHA-256 Cryptography for Securing Multimedia File over Android Chat Application |
1D.5 |
152 |
Super Encryption using Transposition-Hill Cipher for Digital Color Image |
1D.6 |
158 |
Improved Message Payload and Security of Image Steganography using 3-3-2 LSB and Dual Encryption |
1D.7 |
163 |
Secured PVD Video Steganography Method based on AES and Linear Congruential Generator |
4A.3 |
522 |
Image Watermarking using Triple Transform (DCT-DWT-SVD) to Improve Copyright Protection Performance |
Sari, Riri |
1C.8 |
126 |
Evaluation Of Proof Of Work (Pow) Blockchains Security Network On Selfish Mining |
3C.1 |
439 |
Performance Comparison of Dalvik and ART on Different Android-Based Mobile Devices |
Sasmoko, Sasmoko |
1A.6 |
28 |
Face Authentication in E-Learning using Local Binary Pattern and Haar Cascade |
2C.6 |
293 |
Student Satisfaction on E-learning Website Sasmoko.com |
2D.4 |
327 |
Consumer Segmentation Using Case Base Reasoning Approach To Printing Company |
Satria, Novian Fajar |
4B.5 |
577 |
Balance Control of Humanoid Dancing Robot ERISA while Walking on Sloped Surface using PID |
Sauffi, Muhammad |
1C.4 |
103 |
A Study of Tracking Technology in Supply Chain Management |
Sembiring, Irwan |
3B.3 |
405 |
The Spread Path of Hoax News in Social Media (Facebook)Using Social Network Analysis (SNA) |
Sensuse, Dana |
2B.4 |
237 |
Exploring Factors Influence Behavioral Intention to Use E-Government Services Using Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) |
Septiana, Risma |
1D.1 |
131 |
Robustness of Steganography Image Method Using Dynamical Management Position of Least Significant Bit (LSB) |
Setiadi, De Rosal Ignatius Moses |
1A.2 |
5 |
Roundness and Eccentricity Feature Extraction for Javanese Handwritten Character Recognition based on K-Nearest Neighbor |
1A.3 |
11 |
An Effective MRI Brain Image Segmentation using Joint Clustering (K-Means and Fuzzy C-Means) |
1A.4 |
17 |
LatAksLate: Javanese Script Translator based on Indonesian Speech Recognition using Sphinx-4 and Google API |
1A.5 |
23 |
Pathogenic Bacteria Genus Classification using Support Vector Machine |
1A.7 |
33 |
A Survey: Effect of the Number of GLCM Features on Classification Accuracy of Lasem Batik Images using K-Nearest Neighbor |
1D.4 |
146 |
Design and Implementation of AES and SHA-256 Cryptography for Securing Multimedia File over Android Chat Application |
1D.5 |
152 |
Super Encryption using Transposition-Hill Cipher for Digital Color Image |
1D.6 |
158 |
Improved Message Payload and Security of Image Steganography using 3-3-2 LSB and Dual Encryption |
1D.7 |
163 |
Secured PVD Video Steganography Method based on AES and Linear Congruential Generator |
4A.3 |
522 |
Image Watermarking using Triple Transform (DCT-DWT-SVD) to Improve Copyright Protection Performance |
5B.2 |
641 |
Smart Chatbot System for E-Commerce Assitance based on AIML |
Setiawan, Hermawan |
1D.8 |
168 |
Design of Secure Electronic Disposition Applications by Applying Blowfish, SHA-512, and RSA Digital Signature Algorithms to The Y Institution |
Setijadi, Eko |
4B.1 |
555 |
Data Communication Protocols Supporting Monitoring Service of Traffic Management Center |
Setik, Roziyani |
1C.4 |
103 |
A Study of Tracking Technology in Supply Chain Management |
2C.4 |
281 |
Exploiting Malay Corpus On Islamic Issue using Sketch Engine |
3B.8 |
433 |
Sentiment Analysis for 2016's SPM and STPM leavers |
Setiowati, Yuliana |
3B.7 |
427 |
Service Extraction and Sentiment Analysis to Indicate Hotel Service Quality in Yogyakarta based on User Opinion |
Setyabudhi, Nugroho |
1C.6 |
114 |
Factors Influencing The Adoption of e-Government by Indonesian Agribusiness Companies |
Setyawan, Robert |
1A.3 |
11 |
An Effective MRI Brain Image Segmentation using Joint Clustering (K-Means and Fuzzy C-Means) |
Setyohadi, Djoko |
1B.2 |
49 |
Determine The Winner of The Construction Tender in Central Kalimantan Using Analysis Network Process (Case Study: LPSE Central Kalimantan) |
1B.3 |
55 |
Multi-Method Approach for Visual Detection to Improve M-Banking Application Among Students in Yogyakarta |
2B.7 |
253 |
An Investigation of Factors Affecting the Success of Regional Financial Management Information System (Case Study of Palangka Raya Government) |
Setyorini, Fitri |
3B.7 |
427 |
Service Extraction and Sentiment Analysis to Indicate Hotel Service Quality in Yogyakarta based on User Opinion |
Setyowati, Lilis |
2D.1 |
310 |
Analysis of Tuberculosis Cases in Indonesian by Using K-means Clustering Technique |
Setyowati, Reni |
5A.3 |
606 |
Challenges for Implementation of The Draft of Presidential Regulation on Indonesia One Data |
Sevani, Nina |
6A.3 |
690 |
Theoretical Model of Determinants Factors of Health Information Technology (HIT) Acceptance |
Sfenrianto, Sfenrianto |
2A.8 |
215 |
Big Data Architecture for Indonesia Online Travel Agent based on Cloud Computing |
Shofro, Puteri Awaliatush |
1D.6 |
158 |
Improved Message Payload and Security of Image Steganography using 3-3-2 LSB and Dual Encryption |
Shohieb, Samaa |
6A.2 |
685 |
A Proposed Effective Framework for Elderly with Dementia Using Data Mining Technique |
Sholiq, Sholiq |
2A.3 |
186 |
Effort Distribution per Activities for Small Software Development Project Which Uses Prototype Model |
2A.4 |
192 |
Quality Measurement of Software is Based on Characteristics of Functionality, Reliability, and Maintainability |
Siahaan, Daniel |
5A.2 |
601 |
Activity Diagram Similarity Measurement: A Different Approach |
Sihwi, Sari |
2D.6 |
338 |
Decision Support System of Complementary Breastfeeding Based on Ontology Modeling |
3B.1 |
394 |
Development of Regional Public Election Analytics Application In Indonesia Using Data from Twitter |
5B.3 |
646 |
SEMAR: An Interface for Indonesian Hate Speech Detection Using Machine Learning |
Sintiya, Endah |
1C.5 |
108 |
IT/E-Leadership Indicators to Explore Leadership Experience in E-Government Project |
Soeleman, Moch Arief |
3D.2 |
481 |
Implementation of One Orde Extraction for Identification of Coal Batik Method with Backpropagation Method |
4A.3 |
522 |
Image Watermarking using Triple Transform (DCT-DWT-SVD) to Improve Copyright Protection Performance |
Soesanti, Indah |
1B.1 |
43 |
Performance Comparison of Genetic Algorithm Operator Combinations for Optimization Problems |
3D.4 |
492 |
Classification of Batik Image using Grey Level Co-occurrence Matrix Feature Extraction and Correlation Based Feature Selection |
5A.7 |
627 |
Review on Food Recommender System for Diabetes Mellitus |
Soyusiawaty, Dewi |
5B.5 |
656 |
Similarity Detector On The Student Assignment Document Using Levenshtein Distance Method |
Spits Warnars, Harco Leslie Hendric |
1C.3 |
99 |
Key Factor Adoption Blockchain Technology In Smart Supply Management: Literature Review |
5A.5 |
617 |
Success Factors of the Blockchain Adoption for Smart Manufacture |
Sriratnasari, Septia |
2A.8 |
215 |
Big Data Architecture for Indonesia Online Travel Agent based on Cloud Computing |
Subchan, Subchan |
4B.3 |
566 |
Mathematical Modeling and Simulation of Missile Firing Impact Force on Warship |
4B.4 |
571 |
Ship Heading Control of Warship Using Disturbance Compensating Model Predictive Control Method |
Subhiyakto, Egia |
2A.2 |
180 |
Fair Assessment in Collaboration Novice Teams for Basic Learning of UML Use Case Diagrams |
5B.2 |
641 |
Smart Chatbot System for E-Commerce Assitance based on AIML |
Subion, Marco Antonio |
3C.2 |
443 |
PaLife: A Mobile Application for Palay (Rice) Health Condition Classification Utilizing Image Processing and Pigment Analysis Towards Sustainability of Palay Production |
3C.4 |
453 |
VIP READY: A Mobile Leisure Search Engine for Visually Impaired Persons Utilizing Phone Motion and Speech Recognition |
3C.7 |
470 |
RESEARCH++: An Academic Social Networking Research Community Portal for Profiling and Expertise Classification |
Subriadi, Apol |
1B.4 |
61 |
The Consistency of Using Failure Mode Effect Analysis (FMEA) on Risk Assessment of Information Technology |
1B.5 |
67 |
The Need to Critical Review of Function Point Analysis |
2A.6 |
204 |
The Comparison Analysis of Estimation Effort Among Software Development Using Function Point Method |
2D.8 |
347 |
Agricultural Strategic Commodity Price Forecasting Using Artificial Neural Network |
Sugiarto, Agung |
4B.5 |
577 |
Balance Control of Humanoid Dancing Robot ERISA while Walking on Sloped Surface using PID |
Sugiarto, Edi |
5A.6 |
622 |
Waqf Lands Assets Classification Based On Productive Value For Business Development Using Naïve Bayes |
Sulistianingsih, Nani |
3D.4 |
492 |
Classification of Batik Image using Grey Level Co-occurrence Matrix Feature Extraction and Correlation Based Feature Selection |
Sulistiyono, Arif |
4A.5 |
532 |
Visual Perception Evaluation from The Synthesis of Realistic Facial Expressions Based On Feature Point Clusters |
Sulistyo, Selo |
5B.6 |
662 |
Proper Buffer Size and Time To Live on the Scheduled Train System using Delay-Tolerant Networks |
Sumaryanto, Sumaryanto |
2D.8 |
347 |
Agricultural Strategic Commodity Price Forecasting Using Artificial Neural Network |
Sumpeno, Surya |
5A.6 |
622 |
Waqf Lands Assets Classification Based On Productive Value For Business Development Using Naïve Bayes |
Sunardi, Sunardi |
2D.2 |
316 |
MADM Model For Evaluation of Non-Permanent Teacher Performance Using Fuzzy AHP and TOPSIS Methods |
Supriyono, Supriyono |
3C.6 |
465 |
Optimization of Naïve Bayes Classifier To Classify Green Open Space Object Based on Google Earth Image |
Surjandy, Surjandy |
1C.3 |
99 |
Key Factor Adoption Blockchain Technology In Smart Supply Management: Literature Review |
3C.3 |
449 |
The Safe and Trust factors of Mobile Transportation System for user behavior in Indonesia |
5A.5 |
617 |
Success Factors of the Blockchain Adoption for Smart Manufacture |
Susanto, Tony Dwi |
1C.1 |
87 |
The Success Factors in Implementation of The E-Government Master Plan |
1C.2 |
93 |
A Proposed Stages to Develop E-Government Master Plan in Indonesia |
Suseno, Jatmiko |
3C.5 |
459 |
Logic Scoring of Preference Method for Determining Landfill with Geographic Information System |
Sutadji, Eddy |
2C.2 |
271 |
E-learning Governance of Universitas Negeri Malang Using Cobit 4.1 Through Deliver and Support Domain |
T A B C D E F G H I K L M N P R S T U V W Y Z |
Tamara, Mohamad |
3A.1 |
353 |
Development of A Warning Receiver System for Public Display Based on Application-Controlled Video Switcher |
Taryana, Ujang |
1A.8 |
39 |
Information as a Service on Cloud Computing Technology: A Review |
Taufiq, Taufiqqurrachman |
4B.8 |
591 |
OFDM based Signal Detection Performance in Cognitive Radio Systems |
Triandini, Evi |
5A.2 |
601 |
Activity Diagram Similarity Measurement: A Different Approach |
Trisno, Trisno |
3D.6 |
502 |
Clasification Of Typical Food From Sulawesi Using Artificial Neural Network And Wavelet Haar |
Trubus, Trubus |
5A.4 |
612 |
Legal Protection Policy on Computer Programming of Document Security System Based On Law No. 28 Copyright |
U A B C D E F G H I K L M N P R S T U V W Y Z |
Urip Ari Wibowo, Agus |
5B.6 |
662 |
Proper Buffer Size and Time To Live on the Scheduled Train System using Delay-Tolerant Networks |
Utama, Ditdit |
1A.8 |
39 |
Information as a Service on Cloud Computing Technology: A Review |
Utami, Febyana |
3B.5 |
415 |
Elasticsearch Analyzer In Broad Match Advertising System |
Utomo, Danang |
2A.2 |
180 |
Fair Assessment in Collaboration Novice Teams for Basic Learning of UML Use Case Diagrams |
Utomo, Victor |
2D.3 |
322 |
Measuring Hybrid SC-FCM Clustering with Cluster Validity Index |
V A B C D E F G H I K L M N P R S T U V W Y Z |
Vivien, Vivien |
3C.3 |
449 |
The Safe and Trust factors of Mobile Transportation System for user behavior in Indonesia |
W A B C D E F G H I K L M N P R S T U V W Y Z |
Wael, Chaeriah |
4B.8 |
591 |
OFDM based Signal Detection Performance in Cognitive Radio Systems |
Wahyudi, Daud |
1A.6 |
28 |
Face Authentication in E-Learning using Local Binary Pattern and Haar Cascade |
Wahyunggoro, Oyas |
5A.7 |
627 |
Review on Food Recommender System for Diabetes Mellitus |
Wahyuni, Elyza |
3D.7 |
507 |
Decisions Support System To Determine Anxiety Levels Based On Fuzzy Preference Relations |
Wahyuni, Rinda |
2B.4 |
237 |
Exploring Factors Influence Behavioral Intention to Use E-Government Services Using Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) |
Wan Hassan, Wan Azlan |
1C.4 |
103 |
A Study of Tracking Technology in Supply Chain Management |
2C.4 |
281 |
Exploiting Malay Corpus On Islamic Issue using Sketch Engine |
Wan Ismail, Wan Basri |
2C.4 |
281 |
Exploiting Malay Corpus On Islamic Issue using Sketch Engine |
Waskito, Yanuar |
3A.4 |
367 |
Round-robin Algorithm in HAProxy and Nginx Load Balancing Performance Evaluation: a Review |
Wibirama, Sunu |
2A.1 |
174 |
Software Metrics Classification for Agile Scrum Process: A Literature Review |
Wibowo, Ferry Wahyu |
3A.8 |
389 |
A Dynamic Intelligent Control Analysis on the Wireless Smart Machine Environments in The Industry 4.0 |
Wibowo, Jony Winaryo |
4B.6 |
582 |
Design and development the IoT-based smart hydroponic system |
Widayat, Widi |
2C.5 |
287 |
The effect of embedding dimension reduction on increasing LSTM performance for Sentiment Analysis |
Widia, Kiki |
1D.6 |
158 |
Improved Message Payload and Security of Image Steganography using 3-3-2 LSB and Dual Encryption |
Widianto, Eko |
4B.7 |
587 |
Performance of Sensors Monitoring System using Raspberry Pi through MQTT Protocol |
Widyasmoro, Agnes |
4A.5 |
532 |
Visual Perception Evaluation from The Synthesis of Realistic Facial Expressions Based On Feature Point Clusters |
Widyawan, Widy |
2C.5 |
287 |
The effect of embedding dimension reduction on increasing LSTM performance for Sentiment Analysis |
Wijanarko, Bambang |
3B.6 |
421 |
Text Mining Analysis Log Discussion Forum for Online Learning Recommendation Systems Using Machine Learning |
Wijayanti, Wiluyaningtyas |
2B.3 |
231 |
Data Quality Assessment on Higher Education: A Case Study of Institute of Statistics |
Wijayanto, Yusuf Nur |
4B.8 |
591 |
OFDM based Signal Detection Performance in Cognitive Radio Systems |
Wilantika, Nori |
2B.3 |
231 |
Data Quality Assessment on Higher Education: A Case Study of Institute of Statistics |
Wiliam, Andi |
2C.6 |
293 |
Student Satisfaction on E-learning Website Sasmoko.com |
Wilson, Eric |
1A.6 |
28 |
Face Authentication in E-Learning using Local Binary Pattern and Haar Cascade |
Winarno, Agus |
5A.6 |
622 |
Waqf Lands Assets Classification Based On Productive Value For Business Development Using Naïve Bayes |
Winarno, Edy |
4A.4 |
527 |
Image Watermarking using CRT through Gradient Magnitude of Laplacian Filter |
Windarto, Yudhi |
2B.2 |
227 |
Information Technology Governance For Smart Village in Indonesia |
Windasari, Ike |
5A.8 |
633 |
Indonesia Stock Exchange Securities Buy/ Sell Signal Detection using Bollinger Bands and Williams Percent Range |
Wiryanto, Wiryanto |
4A.2 |
518 |
Fragile Watermarking Technique using a Linear Block Mapping for Document Image Authentication with Recovery Capability |
Wiyono, Briansyah |
2B.5 |
243 |
Error Message Quality of Web Form: Assessment on Existing Parameters |
Y A B C D E F G H I K L M N P R S T U V W Y Z |
Yhurinda Perdana Putri, Anggi |
1B.5 |
67 |
The Need to Critical Review of Function Point Analysis |
Yordan, Kahfi |
3D.7 |
507 |
Decisions Support System To Determine Anxiety Levels Based On Fuzzy Preference Relations |
Yossy, Emny |
2C.6 |
293 |
Student Satisfaction on E-learning Website Sasmoko.com |
2D.4 |
327 |
Consumer Segmentation Using Case Base Reasoning Approach To Printing Company |
Yudhoatmojo, Satrio |
2B.3 |
231 |
Data Quality Assessment on Higher Education: A Case Study of Institute of Statistics |
Yuhendra, Yuhendra |
3D.5 |
498 |
Image fusion for Classification Accuracy |
Yulherniwati, Yulherniwati |
2A.7 |
210 |
Modeling flexibility on internal quality assurance system business process |
Yulita, Intan |
2C.8 |
305 |
Random Subspace Method for Sleep Stage Classification of Autism Patients |
Z A B C D E F G H I K L M N P R S T U V W Y Z |
Zahra, I |
1B.6 |
72 |
Development of Knowledge Management Application for Agricultural Indramayu |
Zahrotun, Lisna |
5B.7 |
668 |
The Implementation of Data Mining for Association Patterns Determination Using Temporal Association Methods in Medicine Data |
Zaini, Zulkifli |
2D.8 |
347 |
Agricultural Strategic Commodity Price Forecasting Using Artificial Neural Network |