AN IMPLEMENTATION OF DATA ENCRYPTION FOR INTERNET OF THINGS USING BLOWFISH ALGORITHM ON FPGA
AN IMPLEMENTATION OF DATA ENCRYPTION FOR INTERNET OF THINGS USING BLOWFISH ALGORITHM ON FPGA Author : KURNIAWAN NUR P; YUDHA PURWANTO; DENNY DARLIS Published on : ICoICT 2014 (Grand Royal Panghegar Hotel Bandung, Indonesia.) Abstract “Information security has become an important issue in data communications. One method to ensure the security of data […]
Handling Imbalanced Data in Customer Churn Prediction using Combined Sampling and Weighted Random Forest
Handling Imbalanced Data in Customer Churn Prediction using Combined Sampling and Weighted Random Forest Author : VERONIKHA EFFENDY; ADIWIJAYA; Z K ABDURAHMAN BAIZAL Published on : ICoICT 2014 (Universitas Telkom – Bandung, Indonesia) Abstract Customer churn is a major problem that is found in the telecommunications industry because it affects the company’s revenue. […]
“Probabilistic Partnership Index (PPI) in Social Network Analysis using Kretschmer Approach”
“Probabilistic Partnership Index (PPI) in Social Network Analysis using Kretschmer Approach” Author : NISA SHARAFINA CAHYA SUCI FAJARIYATI; WARIH MAHARANI; ADIWIJAYA; Natya Taniarza Published on : ICoICT 2014 (Universitas Telkom – Bandung, Indonesia) Abstract “Nowadays, Twitter has become an effective media to communicate as the increasing number of its user. The interaction or relation […]
A Pattern Reconfigurable of Circular Short-Circuited Patch Antenna Based on Genetic Algorithm
A Pattern Reconfigurable of Circular Short-Circuited Patch Antenna Based on Genetic Algorithm Author : DWI ANDI NURMANTRIS; HEROE WIJANTO; BAMBANG SETIA NUGROHO Published on : ICoICT 2014 (Universitas Telkom – Bandung, Indonesia) Abstract A new method to reconfigure the radiation pattern of a simple circular patch antenna is presented. The antenna consists of […]
Anomaly Detection on Intrusion Detection System Using Clique Partitioning
Anomaly Detection on Intrusion Detection System Using Clique Partitioning Author : NUNGKY NASTAIINULLAH; ADIWIJAYA; ANGELINA PRIMA KURNIATI Published on : ICoICT 2014 (Universitas Telkom – Bandung, Indonesia) Abstract The development of information and network technology makes network security become important. Intrusion is one of the issue in network security. To prevent intrusion happens, […]