Modularizing RESTful Web Service Management with Aspect Oriented Programming
Modularizing RESTful Web Service Management with Aspect Oriented Programming Author : WIDHIAN BRAMANTYA; BAYU MUNAJAT Published on : ICoICT 2015 Abstract REST is one type of web services that uses standardized HTTP and runs on top of website-like protocol. In web application, functionalities spread in tiers or layers. Using Object Oriented Programming (OOP), […]
Recommender System Based on User Functional Requirements Using Euclidean Fuzzy
Recommender System Based on User Functional Requirements Using Euclidean Fuzzy Author : KEN ARNETT DS; Z K ABDURAHMAN BAIZAL; ADIWIJAYA Published on : The 3rd International Conference of Information and Communication Technology 2015 (ICoICT 2015) Abstract Customer often feels difficult to describe what he needs when he intends to buy a high-tech product […]
The Combination of Agglomerative Clustering and K-Means Algorithm for Website Visitor Segmentation
The Combination of Agglomerative Clustering and K-Means Algorithm for Website Visitor Segmentation Author : YUDHA AGUNG WIRAWAN; INDWIARTI; YULIANT SIBARONI Published on : GTAR Conference 2015 Abstract Clustering is an important aspect in the use of website mining for web visitor segmentation. In this writing, we classify visitors using hierarchical and non-hierarchical clustering […]
Redefining E-Learning Readiness Model
Redefining E-Learning Readiness Model Author : YANUAR FIRDAUS ARIE WIBOWO; KUSUMA AYU LAKSITOWENING Published on : ICoICT 2015 Abstract In order to bring out the highest advantages of e-learning, e-learning implementation need well-prepared strategic plan. It is expected that the implementation of e-learning is considered not only limited to investment and technology adoption, […]
Differential Evolution for the Cryptanalysis of Transposition Cipher
Differential Evolution for the Cryptanalysis of Transposition Cipher Author : GIA SEPTIANA WULANDARI; WAHYU RISMAWAN; SITI SA’ADAH Published on : The 3rd International Conference on Information and Communication Technology Abstract Transposition cipher is a class of hystorical encryption algorithms that rearrange positions in plaintext based on some fixed permutation which is its secret […]