All Stories

  1. Classification of bird sounds as an early warning method of forest fires using Convolutional Neural Network (CNN) algorithm
  2. Comparison of Decision Tree Classification Methods and Gradient Boosted Trees
  3. Comparison of Classification Data Mining C4.5 and Naïve Bayes Algorithms of EDM Dataset
  4. Davies Bouldin Index Algorithm for Optimizing Clustering Case Studies Mapping School Facilities
  5. Understanding disaster risk and development of resilience as one of the fundamental drivers of sustainable development in India with special reference to supercyclone Amphan
  6. A model of cryptographic network protection when using distributed Big Data arrays
  7. Energy and Economic Analysis of Curved, Straight, and Spiral Flow Flat-Plate Solar Water Collector
  8. Forecast Analysis of Gross Regional Domestic Product based on the Linear Regression Algorithm Technique
  9. Performance enhancement of solar photovoltaic system for roof top garden
  10. Short-Term Power Prediction of Building Integrated Photovoltaic (BIPV) System Based on Machine Learning Algorithms
  11. Novel Multi-Time Scale Deep Learning Algorithm for Solar Irradiance Forecasting
  12. State of Charge Estimation of Lithium-Ion Battery for Electric Vehicles Using Machine Learning Algorithms
  13. Improved Pohlig - Hellman using Sieve of Eratosthenes for Three-Pass Protocol Security Enhancement
  14. Comprehensive review on recycling of spent lithium-ion batteries
  15. Optimization forecasting using back-propagation algorithm
  16. Wind power forecasting based on time series model using deep machine learning algorithms
  17. Detecting the Phishing Attack Using Collaborative Approach and Secure Login through Dynamic Virtual Passwords
  18. Unsupervised Data Mining with K-Medoids Method in Mapping Areas of Student and Teacher Ratio in Indonesia
  19. Solar still with evacuated tubes and calcium stones to enhance the yield: An experimental investigation
  20. Effective Use of Deep Learning and Image Processing for Cancer Diagnosis
  21. Pattern recognition and features selection for speech emotion recognition model using deep learning
  22. Educational Data Mining (EDM)on the use of the Internet in the World of Indonesian Education
  23. Taylor Based Grey Wolf Optimization Algorithm (TGWOA) For Energy Aware Secure Routing Protocol
  24. VISUAL SECRET SHARING: A REVIEW
  25. Hashed Needham Schroeder Industrial IoT based Cost Optimized Deep Secured data transmission in cloud
  26. The Design of Digital Liquid Density Meter Based on Arduino
  27. Regression Tree Role for Interpret Monetizing of Game Live Streaming
  28. A Review on Cryptography Protocol for Securing Data
  29. Data Security On RFID Information Using Word Auto Key Encryption Algorithm
  30. Enhancement IDEA Algorithm with Digital Image as Key Encryption and Decryption
  31. Online Expert System for Diagnosis Psychological Disorders Using Case-Based Reasoning Method
  32. Transient liquid phase bonding of stainless steel 316 L to Ti-6Al-4 V using Cu/Ni multi-interlayer: microstructure, mechanical properties, and fractography
  33. Exploring of mathematics classroom goal structures in senior high school: An engaging in academic work for student
  34. Measuring of student learning performance based on geometry test for middle class in elementary school using dichotomous Rasch analysis
  35. Re-thinking of student skills to handling basic computer practice in junior high school
  36. K-means method with linear search algorithm to reduce Means Square Error (MSE) within data clustering
  37. Application of Bidirectional DC-DC Converter for Saving Energy on Photovoltaic
  38. Effect of alpha value change on thrust quadcopter Qball-X4 stability testing using backstepping control
  39. Internet-based social media and its influence on student behaviour changes
  40. Diagnosis of students zone proximal development on math design instruction: A Rasch analysis
  41. Market Basket Analysis Using Apriori and FP-Growth for Analysis Consumer Expenditure Patterns at Berkah Mart in Pekanbaru Riau
  42. Application of Interpolation Image by using Bi-Cubic Algorithm
  43. Decision Support System For Formula Milk Selection Based On Nutrition Value Using Tahani Model Database Fuzzy Method
  44. The utilization of search engines by students of the Library and Information Science Program at Universitas Padjadjaran
  45. F, Cl, Br Doped Ge44 and Al22P22 Nanocages As Anode Electrode Materials of Li, Na, and K ion Batteries
  46. Comparison of time in processing frame as an error detection mechanism in network transmission
  47. Pixel image steganography using EOF method and modular multiplication block cipher algorithm
  48. A systematic literature review on attribute independent assumption of Naive Bayes: research trend, datasets, methods and frameworks
  49. Data Mining of Family, School, and Society Environments Influences to Student Performance
  50. Design and Implementation of A Low Cost Heartbeat Meter using Vibration Sensor, ATmega 16 Microcontroller, and Android Based Smartphone
  51. Organization model for information system project: a literature review & blended learning case
  52. Systematic literature review: comparison study of symmetric key and asymmetric key algorithm
  53. Web based testing application security system using semantic comparison method
  54. Control and Notification Automatic Water Pump with Arduino and SMS Gateway
  55. Base64, End of File and One Time Pad for Improvement Steganography Security
  56. Similarity dan Metadata
  57. Authentication Security in Radio Frequency Identification with IDEA Algorithm
  58. Using K-Means Clustering to Cluster Provinces in Indonesia
  59. eConf: an Information System to Manage the Conference
  60. Employee Recruitment Fraud Prevention with the Implementation of Decision Support System
  61. RC4 Algorithm Visualization for Cryptography Education
  62. Sound Absorption Type Single Reflex Bandpass from Rolled Kinds of Areca Nut with Polyurethane and Gypsum Matric
  63. Implementation of the ARIMA(p,d,q) method to forecasting CPI Data using forecast package in R Software
  64. Secure a Transaction Activity with Base64 Algorithm and Word Auto Key Encryption Algorithm
  65. Combination Base64 and Hashing Variable Length for Securing Data
  66. Web Based Application for Decision Support System with ELECTRE Method
  67. TOPSIS Method Application for Decision Support System in Internal Control for Selecting Best Employees
  68. Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
  69. Mobile Application Detection of Road Damage using Canny Algorithm
  70. Application of Web Based Book Calculation using Deterministic Dynamic Programming Algorithm
  71. Breadth First Search Approach for Shortest Path Solution in Cartesian Area
  72. Breadth First Search Approach for Shortest Path Solution in Cartesian Area
  73. Knowledge Management Organization to Gain Performance in Private University
  74. Super-Encryption Cryptography with IDEA and WAKE Algorithm
  75. User acceptance of E-Government Services Based on TRAM model
  76. Content validity of critical success factors for e-Government implementation in Indonesia
  77. An Effect Sensitivity Harmonics of Rotor Induction Motors Based On Fuzzy Logic
  78. Comparison Between PCI and Box Girder in BridgesPrestressed Concrete Design
  79. Searching Process with Raita Algorithm and its Application
  80. Combination Base64 Algorithm and EOF Technique for Steganography
  81. Effect of the Machined Surfaces of AISI 4337 Steel to Cutting Conditions on Dry Machining Lathe
  82. INA-Rxiv: The Missing Puzzle in Indonesia’s Scientific Publishing Workflow
  83. Analysis of e-learning implementation readiness based on integrated elr model
  84. Analysis of user readiness toward ICT usage at small medium enterprise in south tangerang
  85. E-Business, the impact of regional growth on the improvement of Information and Communication Development
  86. E-Business, The impact of the Regional Government Development (APBD) on Information and Communication Development in Indonesia
  87. E-Business, Airport Development and Its Impact on the Increasing of Information of Communication Development in Indonesia
  88. Comparison Analysis of TOPSIS and Fuzzy Logic Methods On Fertilizer Selection
  89. Expert System for Disease Risk Based on Lifestyle with Fuzzy Mamdani
  90. Kampung Pulo Environmental Planning Observed from Biophysical Aspects as Adaptation of Flood in Jakarta
  91. Hesitant Fuzzy Linguistic Term Sets with Fuzzy Grid Partition in Determining the Best Lecturer
  92. Combination Vigenere Cipher and One Time Pad for Data Security
  93. Latent Semantic Indexing for Indonesian Text Similarity
  94. Decision Support Rating System with Analytical Hierarchy Process Method
  95. C4.5 Classification Data Mining for Inventory Control
  96. Prime Numbers Comparison using Sieve of Eratosthenes and Sieve of Sundaram Algorithm
  97. Crossing Rivers Problem Solution with Breadth-First Search Approach
  98. A Novelty Design Of Minimization Of Electrical Losses In A Vector Controlled Induction Machine Drive
  99. Research of Face Recognition with Fisher Linear Discriminant
  100. Block Architecture Problem with Depth First Search Solution and Its Application
  101. Keylogger Application to Monitoring Users Activity with Exact String Matching Algorithm
  102. A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm
  103. Modeling Data Containing Outliers using ARIMA Additive Outlier (ARIMA-AO)
  104. Analysis of Student Satisfaction Toward Quality of Service Facility
  105. Lecturers’ Understanding of SINTA, DOAJ, Google Scholar, SCOPUS, and Web of Science
  106. Congklak, a traditional game solution approach with breadth first search
  107. Enhanced pixel value differencing with cryptography algorithm
  108. Pseudo-prime number simulation and its application for security purpose
  109. Development of a secured room access system based on face recognition using Raspberry Pi and Android based smartphone
  110. A Slack-Based Measures within Group Common Benchmarking using DEA for Improving the Efficiency Performance of Departments in Universitas Malikussaleh
  111. IOWA Unemployment Insurance Claimants: A Comparison between α-Sutte Indicator and Other Forecasting Methods
  112. Aceh young users purchase intention by online store exposure on Facebook
  113. Applied Pohlig-Hellman algorithm in three-pass protocol communication
  114. Designing Application for Performance Assessment to Measure Employee Profesionalism in Goverment Institution
  115. The new system for promoting news through social media
  116. A critical study on applicability of sokoban game for building cognitive model of a student for career assessment
  117. Modulation diversity for differential amplitude and phase shift keying technique
  118. Personalized web search on e-commerce using ontology based association mining
  119. Applicability of Sudoku game for building the cognitive model of a student for career assessment - an analytical study
  120. Comparative Analysis of Membership Function on Mamdani Fuzzy Inference System for Decision Making
  121. Forecasting Error Calculation with Mean Absolute Deviation and Mean Absolute Percentage Error
  122. Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement
  123. Data Collision Prevention with Overflow Hashing Technique in Closed Hash Searching Process
  124. Research of Simple Multi-Attribute Rating Technique for Decision Support
  125. Prime Number: an Experiment Rabin-Miller and Fast Exponentiation
  126. Visual Approach of Searching Process using Boyer-Moore Algorithm
  127. Comparison Searching Process of Linear, Binary and Interpolation Algorithm
  128. Impact of GDP Information Technology in Developing of Regional Central Business (Case 50 Airports IT City Development in Indonesia)
  129. A research framework of disaster traffic management to Smart City
  130. Enhanced pixel value differencing steganography with government standard algorithm
  131. A review: search visualization with Knuth Morris Pratt algorithm
  132. Double hashing technique in closed hashing search process
  133. Technical Approach of TOPSIS in Decision Making
  134. Vernam Encypted Text in End of File Hiding Steganography Technique
  135. Comparison Between Dynamic And Static Blocks In Sequitur Algorithm
  136. Study Approach Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS)
  137. Decision Support System Best Employee Assessments with Technique for Order of Preference by Similarity to Ideal Solution
  138. 24 Bit Image Noise Reduction with Median Filtering Algorithm
  139. 128 Bit Hash of Variable Length in Short Message Service Security
  140. Study of Three Pass Protocol on Data Security
  141. Arnold
  142. Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm