Archives for June, 2015

Modularizing RESTful Web Service Management with Aspect Oriented Programming

Modularizing RESTful Web Service Management with Aspect Oriented Programming   Author : WIDHIAN BRAMANTYA; BAYU MUNAJAT Published on : ICoICT 2015   Abstract REST is one type of web services that uses standardized HTTP and runs on top of website-like protocol. In web application, functionalities spread in tiers or layers. Using Object Oriented Programming (OOP), […]

By ppm | Publikasi2015
DETAIL

Recommender System Based on User Functional Requirements Using Euclidean Fuzzy

Recommender System Based on User Functional Requirements Using Euclidean Fuzzy   Author : KEN ARNETT DS; Z K ABDURAHMAN BAIZAL; ADIWIJAYA Published on : The 3rd International Conference of Information and Communication Technology 2015 (ICoICT 2015)   Abstract Customer often feels difficult to describe what he needs when he intends to buy a high-tech product […]

By ppm | Publikasi2015
DETAIL

The Combination of Agglomerative Clustering and K-Means Algorithm for Website Visitor Segmentation

The Combination of Agglomerative Clustering and K-Means Algorithm for Website Visitor Segmentation   Author : YUDHA AGUNG WIRAWAN; INDWIARTI; YULIANT SIBARONI Published on : GTAR Conference 2015   Abstract Clustering is an important aspect in the use of website mining for web visitor segmentation. In this writing, we classify visitors using hierarchical and non-hierarchical clustering […]

By ppm | Publikasi2015
DETAIL

Redefining E-Learning Readiness Model

Redefining E-Learning Readiness Model   Author : YANUAR FIRDAUS ARIE WIBOWO; KUSUMA AYU LAKSITOWENING Published on : ICoICT 2015   Abstract In order to bring out the highest advantages of e-learning, e-learning implementation need well-prepared strategic plan. It is expected that the implementation of e-learning is considered not only limited to investment and technology adoption, […]

By ppm | Publikasi2015
DETAIL

Differential Evolution for the Cryptanalysis of Transposition Cipher

Differential Evolution for the Cryptanalysis of Transposition Cipher   Author : GIA SEPTIANA WULANDARI; WAHYU RISMAWAN; SITI SA’ADAH Published on : The 3rd International Conference on Information and Communication Technology   Abstract Transposition cipher is a class of hystorical encryption algorithms that rearrange positions in plaintext based on some fixed permutation which is its secret […]

By ppm | Publikasi2015
DETAIL

Follicle Detection on the USG Images to Support Determination Polycystic Ovary Syndrome

Follicle Detection on the USG Images to Support Determination Polycystic Ovary Syndrome   Author : ADIWIJAYA Published on : Scietech 2015   Abstract Polycystic Ovary Syndrome (PCOS) is the most common endocrine disorders affected to female in their reproductive cycle. This has gained the attention from marriage couple which affected by infertility. One of the […]

By ppm | Publikasi2015
DETAIL

Mobile OCR Using Centroid to Boundary and Backpropagation Neural Network

Mobile OCR Using Centroid to Boundary and Backpropagation Neural Network   Author : BAKTI ANUGRAH YUDHA PRATAMA; TJOKORDA AGUNG BUDI WIRAYUDA; KURNIAWAN NUR RAMADHANI; Febryanti Sthevanie Published on : International Conference on Information and Communication Technology 2015   Abstract In this research, the writer proposed feature extraction method using Centroid to Boundary. Centroid to Boundary […]

By ppm | Publikasi2015
DETAIL

(EDsHEED) Enhanced Simplified Hybrid, Energy- Efficient, Distributed Clustering for Wireless Sensor Network

(EDsHEED) Enhanced Simplified Hybrid, Energy- Efficient, Distributed Clustering for Wireless Sensor Network   Author : SIDIK PRABOWO; MAMAN ABDUROHMAN; BAYU ERFIANTO Published on : ICoICT 2015   Abstract “Recently, WSN (Wireless sensor Network) technology application has expanded in almost all aspects of life. This is because of their ability and ease of implementation of the […]

By ppm | Publikasi2015
DETAIL

Structural Similarity Analyze of Bussiness Process Model using Selective Reduce based on Petri Net

Structural Similarity Analyze of Bussiness Process Model using Selective Reduce based on Petri Net   Author : NIILA SYUKRIILAH; DANA SULISTYO KUSUMO Published on : ICoICT 2015   Abstract It is exceedingly possible for an organization to have similarities, differences, and varieties among its business processes. To coordinate and make those processes effective and efficient, […]

By ppm | Publikasi2015
DETAIL

Detection of Factors that Influence Student Failure Rate using Exhaustive CHAID (Chi – Square Automatic Interaction Detection)

Detection of Factors that Influence Student Failure Rate using Exhaustive CHAID (Chi – Square Automatic Interaction Detection)   Author : RIASYAH NOVITA; MIRA KANIA SABARIAH; VERONIKHA EFFENDY Published on : ICOICT 2015   Abstract Institutions hassles to accommodate a large of students body through the normal study period. Some of the students who passed through […]

By ppm | Publikasi2015
DETAIL
Translate »