Model Pelatihan Pemanfaatan Limbah Kain Brokat di Sekolah Menengah Kejuruan (SMK) / The Model of Training Using Residual Material of Lace in Vocational School
Model Pelatihan Pemanfaatan Limbah Kain Brokat di Sekolah Menengah Kejuruan (SMK) / The Model of Training Using Residual Material of Lace in Vocational School Author : CITRA PUSPITASARI Published on : The 1stInternational Conference for Arst and Arts Education on Indonesia (ICAAE) (Universitas Negeri Yogyakarta) Abstract “Textile waste or residual materials which is […]
Automatic Musical Genre Classification of Audio Using Hidden Markov Model
Automatic Musical Genre Classification of Audio Using Hidden Markov Model Author : IMAM IKHSAN; LEDYA NOVAMIZANTI; I NYOMAN APRAZ RAMATRYANA Published on : ICoICT 2014 (Telkom University-Grand Royal Panghegar Hotel Bandung, Indonesia) Abstract The rapid growth in audio processing has given much help in advancing the development of digital music. It encourages the […]
“Design of an FPGA-Based OFDM-STBC Transceiver for WiMAX 802.16e Standard”
“Design of an FPGA-Based OFDM-STBC Transceiver for WiMAX 802.16e Standard” Author : SUGONDO HADIYOSO; RINA PUDJI ASTUTI; ISWAHYUDI HIDAYAT Published on : ICOICT 2014 (Universitas Telkom-Hotel Panghegar Bandung) Abstract “One of the wireless communication technologies, especially Broadband Wireless Access (BWA) is Worldwide Interoperability for Microwave Access (WiMAX). WiMAX communication system tend to use […]
Analysis of “Drama Theory” In the Bankruptcy Scenario of the Largest Indonesia Cellular Telecommunication Business
Analysis of “Drama Theory” In the Bankruptcy Scenario of the Largest Indonesia Cellular Telecommunication Business Author : DINI TURIPANAM ALAMANDA; ARIF PARTONO PRASETIO Published on : Journal of Asian Economics (Elsevier) Abstract This study presents analysis of “drama theory” in the bankruptcy scenario of PT TX. The drama is divided into 3 phases. […]
“Social Network Modeling Approach for Brand Awareness”
“Social Network Modeling Approach for Brand Awareness” Author : ANDRY ALAMSYAH; FATIMAH PUTRI U M A; OSA OMAR SHARIF Published on : The 2nd ICOICT 2014 (Bandung) Abstract “The advance of social computing study is grown very fast to the extent influenced in many aspects of our daily life. One of those aspects […]
Web Usage Mining untuk Penentuan Pola Akses User Menggunakan Algoritma Hierarchical Agglomerative Clustering
Web Usage Mining untuk Penentuan Pola Akses User Menggunakan Algoritma Hierarchical Agglomerative Clustering Author : ARHAM MAULANA; ANGELINA PRIMA KURNIATI; YANUAR FIRDAUS ARIE WIBOWO Published on : Konferensi Nasional Sistem Informasi 2014 (STMIK Dipanegara Makassar, Indonesia) Abstract Perkembangan teknologi Internet yang sangat pesat berdampak pada semakin tingginya aktivitas user dalam pemanfaatannya. E-commerce, e-news, […]
“MIDDLEWARE ARCHITECTURE FOR NATIONAL ELECTRONIC ID CARD: THE CASE OF E-KTP IN INDONESIA”
“MIDDLEWARE ARCHITECTURE FOR NATIONAL ELECTRONIC ID CARD: THE CASE OF E-KTP IN INDONESIA” Author : DEDY RAHMAN WIJAYA Published on : Journal of Theoretical and Applied Information Technology (Islamabad, Pakistan) Abstract “Since a few years ago Indonesian government began to perform the application of the concept of the internet of things (IoT). Application of […]
The Effect of The Leadership Style towards Work Family Conflict in PT. XYZ, Bandung
The Effect of The Leadership Style towards Work Family Conflict in PT. XYZ, Bandung Author : ARIF PARTONO PRASETIO; NURVITA TRIANASARI Published on : International Conference on Global Trends in Academic Research (Global Illuminator, Bali) Abstract One of the interesting topics in HR field is the work family conflict. All human being expected […]
INFORMATION SECURITY AWARENESS MEASUREMENT WITH CONFIRMATORY FACTOR ANALYSIS
INFORMATION SECURITY AWARENESS MEASUREMENT WITH CONFIRMATORY FACTOR ANALYSIS Author : PUSPITA KENCANA SARI; CANDIWAN; NURVITA TRIANASARI Published on :INTERNATIONAL SYMPOSIUM ON TECHNOLOGY MANAGEMENT AND EMERGING TECHNOLOGIES (Bandung Indonesia) Abstract One of information security management elements is information security awareness program. Usually, this programs only involve the employees within the organization. Some organizations also […]
The Use of Modified Unified Theory of Acceptance and Use of Technology to Predict the Behavioural Intention toward Website (Case study in ABC University in Indonesia
The Use of Modified Unified Theory of Acceptance and Use of Technology to Predict the Behavioural Intention toward Website (Case study in ABC University in Indonesia Author : INDRAWATI Published on : International Conference on Global Trends in Academic Research (Bali) Abstract “The availability of website for an institution is very important, especially […]