All Stories

  1. Optimization of Outlier Handling in Datasets for Machine Maintenance Prediction Using Machine Learning with the Addition of New Variables
  2. GUI Test Automation Studies: Selenium IDE, Uipath Studio, Katalon Studio
  3. Cost-Efficient Software Test Case Prioritization by Integrating Attributes Using Reinforcement Learning
  4. Cost-sensitive Approach for improving AUC-ROC Curve of Software Defect Prediction
  5. Enhancing Loan Application Business Process Model with Multi-perspective Process Mining
  6. Provisioning of Disaster Recovery with Terraform and Kubernetes: A Case Study on Software Defect Prediction
  7. Static and Dynamic Analysis System on Batch Flow Shop Algorithms for the Effectiveness of Part Number Production at PT. Shibaura
  8. Docker and Kubernetes Pipeline for DevOps Software Defect Prediction with MLOps Approach
  9. Improving Recommender Systems Performance with Cross-domain Scenario: Anime and Manga Domain Studies
  10. Combining PCA and SMOTE for Software Defect Prediction with Visual Analytics Approach
  11. Implementation of Text Association Rules about Terrorism on Twitter in Indonesia
  12. Using Deep Learning Model to Predict Terms Use by Terrorist to Pre-Plan an Attack on A Real-Time Twitter Tweets from Rapid Miner
  13. Improving Purchase to Pay Process Efficiency with RPA using Fuzzy Miner Algorithm in Process Mining
  14. Quick Classification of Xception And Resnet-50 Models on Deepfake Video Using Local Binary Pattern
  15. Handling High-Dimensionality on Software Defect Prediction with FLDA
  16. Hybrid Software Defect Prediction Based on LSTM (Long Short Term Memory) and Word Embedding
  17. Knowledge Management System to Improve The Competence of Aglaonema Farmers
  18. Software Defect Prediction Using Process Metrics Systematic Literature Review: Dataset and Granularity Level
  19. Forensic Audit Using Process Mining to Detect Fraud
  20. Behavior-driven development (BDD) Cucumber Katalon for Automation GUI testing case CURA and Swag Labs
  21. Tackling Feature Selection Problems with Genetic Algorithms in Software Defect Prediction for Optimization
  22. Identifying Pork Raw-Meat Based on Color and Texture Extraction Using Support Vector Machine
  23. Software Defect Prediction Using Neural Network Based SMOTE
  24. Creating the English Grammar Tenses Pattern Using Regular Expression Method
  25. The Cryptocurrency Simulation using Elliptic Curve Cryptography Algorithm in Mining Process from Normal, Failed, and Fake Bitcoin Transactions
  26. Cross-Project Defect Prediction For Web Application Using Naive Bayes (Case Study: Petstore Web Application)
  27. A study on pre-processing methods for copy-move forgery detection based on SIFT
  28. WatsaQ: Repository of Al hadith in Bahasa (Case study: Hadith Bukhari)
  29. Analysis of statement branch and loop coverage in software testing with genetic algorithm
  30. Analysis of travel time computation accuracy from Crowdsource data of hospitality application in South of Tangerang City with estimated travel time method
  31. Comparative analysis of business process litigation using queue theory and simulation (case study: Religious courts of South Jakarta)
  32. Implementation of a modern security systems honeypot Honey Network on wireless networks
  33. Cloud Based Drive Forensic and DDoS Analysis on Seafile as Case Study
  34. Comparison of methods for localizing the source position of deauthentication attacks on WAP 802.11n using Chanalyzer and Wi-Spy 2.4x
  35. Cost-benefits, NPV, IRR and QoS analysis of the dynamic telecytology system in Indonesia
  36. Empirical approach of ad hoc path loss propagation model in realistic forest environments
  37. Energy efficiency and loss of transmission data on Wireless Sensor Network with obstacle
  38. Techno economic approach of spectrum sharing between radar bands and LTE cellular system
  39. A preliminary study: Implementation and QoS analysis of dynamic telecytology system on broadband and 3G/4G network in Indonesia
  40. Building a Private Cloud Computing and the analysis against DoS (Denial of Service) attacks: Case study at SMKN 6 Jakarta
  41. Naive Bayes classifier algorithm and Particle Swarm Optimization for classification of cross selling (Case study: PT TELKOM Jakarta)
  42. Relationship between compressed image quality and Quality of Experience for wireless file sharing
  43. Transmission of Real-time Video Signal with Interference Density and Human Traffic
  44. Analysis of interference from wireless traffic light controller upon remote keyless entry for vehicles
  45. Comparative analysis of LLQ traffic scheduler to FIFO and CBWFQ on IP phone-based applications (VoIP) using Opnet (Riverbed)
  46. Open data strategy for enhancing the productivity and competitiveness of fishery SMEs in Indonesia
  47. Performance analysis of iSCSI target in wireless LAN using standard LIO
  48. Implementation of physics simulation in serious game
  49. Analysis of image similarity with CBIR concept using wavelet transform and threshold algorithm
  50. Preliminary research on e-government development overview: An assessment on e-Government capabilities in Indonesia
  51. Performance analysis of VoIP client with integrated encryption module
  52. Applying Merging Convetional Marker and Backpropagation Neural Network in QR Code Augmented Reality Tracking
  53. Exploring the influential antecedents of actual use of internet banking services in Indonesia