Penggunaan Big Data Analytic di Perguruan Tinggi
Penggunaan Big Data Analytic di Perguruan Tinggi Author : ASNIAR Published on : Konferensi Nasional Sistem Informasi (KNSI) 2015 Abstract Digitalisasi data menyebabkan ledakan data di Perguruan tinggi yang membuka peluang big data di perguruan tinggi. Data-data digital dalam jumlah banyak meninggalkan tentang apa yang mahasiswadan akademisi lihat, apa yang mereka baca, keterlibatan […]
AN ANALYSIS OF TELECOMMUNICATION VENDOR COMPANY BANKRUPTCY POTENCY BASED ON THE PROBLEMATIC FINANCIAL RATIO WITH ALTMAN, SPRINGATE AND ZMIJEWSKI METHODS
AN ANALYSIS OF TELECOMMUNICATION VENDOR COMPANY BANKRUPTCY POTENCY BASED ON THE PROBLEMATIC FINANCIAL RATIO WITH ALTMAN, SPRINGATE AND ZMIJEWSKI METHODS Author : NORITA Published on : International Conference In Organizational Innovation Abstract “The capability of a company to survive in business is highly related with its own performance. In order to preserve company???s […]
Performance Analysis of IEEE 802.21 MIH (Media Independent Handover) As a function of Vertical Handover using PMIPv6 and F-HMIPv6
Performance Analysis of IEEE 802.21 MIH (Media Independent Handover) As a function of Vertical Handover using PMIPv6 and F-HMIPv6 Author : GANDEVA BAYU; TRI BROTOHARSONO; SOFIAN WIRANANDI Published on : The 17th International Conference on Electronic Commerce 2015 Abstract “Mobile IP is an Internet protocol that supports mobility of hosts, so that each […]
Perbandingan Metode Adaptive Thresholding dan Global Thresholding Pada Deteksi Penyakit Kanker Serviks
Perbandingan Metode Adaptive Thresholding dan Global Thresholding Pada Deteksi Penyakit Kanker Serviks Author : RITA MAGDALENA; EGGI INTAN PUTRI Published on : Prosiding Seminar Nasional Sains dan Teknologi 2015 Abstract Dalam penelitian ini, dibandingkan metode Adaptive Thresholding dan Global Thresholding dalam mendeteksi gejala kanker serviks. Kanker serviks adalah penyakit kanker yang disebabkan oleh […]
The Detection of 8 Type Malware botnet using Hybrid Malware Analysis in Executable File Windows Operating Systems
The Detection of 8 Type Malware botnet using Hybrid Malware Analysis in Executable File Windows Operating Systems Author : GANDEVA BAYU; NIKEN DWI WAHYU CAHYANI; RITCHIE FERGINDO ANDRETA; Published on : The 17th International Conference on Electronic Commerce 2015 (ICEC 2015) Abstract Nowadays a lot of botnet are being used for the purpose […]