All Stories

  1. Cost-Efficient Software Test Case Prioritization by Integrating Attributes Using Reinforcement Learning
  2. Cost-sensitive Approach for improving AUC-ROC Curve of Software Defect Prediction
  3. Enhancing Loan Application Business Process Model with Multi-perspective Process Mining
  4. Provisioning of Disaster Recovery with Terraform and Kubernetes: A Case Study on Software Defect Prediction
  5. Static and Dynamic Analysis System on Batch Flow Shop Algorithms for the Effectiveness of Part Number Production at PT. Shibaura
  6. Docker and Kubernetes Pipeline for DevOps Software Defect Prediction with MLOps Approach
  7. Improving Recommender Systems Performance with Cross-domain Scenario: Anime and Manga Domain Studies
  8. Combining PCA and SMOTE for Software Defect Prediction with Visual Analytics Approach
  9. Implementation of Text Association Rules about Terrorism on Twitter in Indonesia
  10. Using Deep Learning Model to Predict Terms Use by Terrorist to Pre-Plan an Attack on A Real-Time Twitter Tweets from Rapid Miner
  11. Improving Purchase to Pay Process Efficiency with RPA using Fuzzy Miner Algorithm in Process Mining
  12. Quick Classification of Xception And Resnet-50 Models on Deepfake Video Using Local Binary Pattern
  13. Handling High-Dimensionality on Software Defect Prediction with FLDA
  14. Hybrid Software Defect Prediction Based on LSTM (Long Short Term Memory) and Word Embedding
  15. Knowledge Management System to Improve The Competence of Aglaonema Farmers
  16. Software Defect Prediction Using Process Metrics Systematic Literature Review: Dataset and Granularity Level
  17. Forensic Audit Using Process Mining to Detect Fraud
  18. Behavior-driven development (BDD) Cucumber Katalon for Automation GUI testing case CURA and Swag Labs
  19. Tackling Feature Selection Problems with Genetic Algorithms in Software Defect Prediction for Optimization
  20. Identifying Pork Raw-Meat Based on Color and Texture Extraction Using Support Vector Machine
  21. Software Defect Prediction Using Neural Network Based SMOTE
  22. Creating the English Grammar Tenses Pattern Using Regular Expression Method
  23. The Cryptocurrency Simulation using Elliptic Curve Cryptography Algorithm in Mining Process from Normal, Failed, and Fake Bitcoin Transactions
  24. Cross-Project Defect Prediction For Web Application Using Naive Bayes (Case Study: Petstore Web Application)
  25. A study on pre-processing methods for copy-move forgery detection based on SIFT
  26. WatsaQ: Repository of Al hadith in Bahasa (Case study: Hadith Bukhari)
  27. Analysis of statement branch and loop coverage in software testing with genetic algorithm
  28. Analysis of travel time computation accuracy from Crowdsource data of hospitality application in South of Tangerang City with estimated travel time method
  29. Comparative analysis of business process litigation using queue theory and simulation (case study: Religious courts of South Jakarta)
  30. Implementation of a modern security systems honeypot Honey Network on wireless networks
  31. Cloud Based Drive Forensic and DDoS Analysis on Seafile as Case Study
  32. Comparison of methods for localizing the source position of deauthentication attacks on WAP 802.11n using Chanalyzer and Wi-Spy 2.4x
  33. Cost-benefits, NPV, IRR and QoS analysis of the dynamic telecytology system in Indonesia
  34. Empirical approach of ad hoc path loss propagation model in realistic forest environments
  35. Energy efficiency and loss of transmission data on Wireless Sensor Network with obstacle
  36. Techno economic approach of spectrum sharing between radar bands and LTE cellular system
  37. A preliminary study: Implementation and QoS analysis of dynamic telecytology system on broadband and 3G/4G network in Indonesia
  38. Building a Private Cloud Computing and the analysis against DoS (Denial of Service) attacks: Case study at SMKN 6 Jakarta
  39. Naive Bayes classifier algorithm and Particle Swarm Optimization for classification of cross selling (Case study: PT TELKOM Jakarta)
  40. Relationship between compressed image quality and Quality of Experience for wireless file sharing
  41. Transmission of Real-time Video Signal with Interference Density and Human Traffic
  42. Analysis of interference from wireless traffic light controller upon remote keyless entry for vehicles
  43. Comparative analysis of LLQ traffic scheduler to FIFO and CBWFQ on IP phone-based applications (VoIP) using Opnet (Riverbed)
  44. Open data strategy for enhancing the productivity and competitiveness of fishery SMEs in Indonesia
  45. Performance analysis of iSCSI target in wireless LAN using standard LIO
  46. Implementation of physics simulation in serious game
  47. Analysis of image similarity with CBIR concept using wavelet transform and threshold algorithm
  48. Preliminary research on e-government development overview: An assessment on e-Government capabilities in Indonesia
  49. Performance analysis of VoIP client with integrated encryption module
  50. Applying Merging Convetional Marker and Backpropagation Neural Network in QR Code Augmented Reality Tracking
  51. Exploring the influential antecedents of actual use of internet banking services in Indonesia