Search Results - "2022 5th International Conference of Computer and Informatics Engineering (IC2IE)"

Refine Results
  1. 1

    Using Cohesion-Based and Sentiment-Based Attributes to Classify Spoilers in Movie Reviews by Marukatat, Rangsipan

    “…Spoiler reviews have different narrative patterns from non-spoiler reviews. Their narrative is more precise about what happened in the movies, while that of…”
    Get full text
    Conference Proceeding
  2. 2
  3. 3

    Design and Implementation of IoT-Based Automatic Oxygen Flow Control in Response to the Covid-19 Crisis by Lamon, Ahmed, Roy, Kanoge, Musha, Ahmmad, Hasan, Md. Galib, Abedin, Shamsul

    “…Internet of Things (IoT) technology has brought a revolution in several ways to a common person's life by making everything smart and intelligent. During the…”
    Get full text
    Conference Proceeding
  4. 4

    Implementation of Genetic Algorithm-Support Vector Machine on Gene Expression Data in Identification of Non-Small Cell Lung Cancer in Nonsmoking Female by Ramadhani Rohimat, Tasya Nurfauziah, Nhita, Fhira, Kurniawan, Isman

    “…Lung cancer is the leading cause of death in the world. There are two types of lung cancer, i.e., non-small cell lung cancer and small cell lung cancer. The…”
    Get full text
    Conference Proceeding
  5. 5

    Control of Super Capacitor in Solar Power Plant Using Automatic Hybrid Mode by Isdawimah, K, Ikhsan, N, Nuha, Yoga, Setyadi T.

    “…The utility of Super Capacitors has been widely used in the aspect of hybrid energy management which is applied together with energy storage systems into…”
    Get full text
    Conference Proceeding
  6. 6

    Envisioning the Future of Collaboration for Banking and FinTech Industry by Legowo, Mercurius Broto, Sorongan, Fangky Antoneous, Subanidja, Steph

    “…This study aims to envision the future of banking and the FinTech industry collaboration by the triggers for change based on trends watching in current…”
    Get full text
    Conference Proceeding
  7. 7

    Nonlinear Modeling and Robust Backstepping Control of a Quadrotor Unmanned Aerial Vehicle by Karahan, Mehmet, Kasnakoglu, Cosku

    “…Developments in information technology have enabled unmanned aerial vehicles to decrease in size, increase their maneuverability and gain vertical landing and…”
    Get full text
    Conference Proceeding
  8. 8

    Application of Extreme Learning Machine (ELM) Classification in Detecting Phishing Sites by Ridho, M. Rasyid, Nuha, Hilal H.

    “…Phishing site is a website created by internet criminals as closely as possible to resemble a real site to trick internet users by making it look like…”
    Get full text
    Conference Proceeding
  9. 9

    e-Monev: Tools to Monitor and Manage Projects Carried Out by Partners using Architectural Microservice Development Methods by Hartono, R. W. Tri, Koto, Adiyatma

    “…In the implementation of the partnership for business process many companies are still using the conventional method. Communication still uses the social…”
    Get full text
    Conference Proceeding
  10. 10

    Development of Animation as a Medium for Public Health Education by Eriya, Bahreisy, Farah Nur Amani, Nugrahani, Fitria

    “…One of the diseases still suffered by many Indonesian people, especially in the city of Depok, is respiratory disease. Currently, respiratory tract disease is…”
    Get full text
    Conference Proceeding
  11. 11

    Progressive Web Application (PWA) Development for Outfit Management System by Soetanto, Christian, Prawartana, Ivana, Leonardo, Stephen, Anggreainy, Maria Susan, Yasri, Gintoro

    “…Due to the development of information technology, changes in fashion lifestyle, and the current trend of human consumptive behavior, people often find it…”
    Get full text
    Conference Proceeding
  12. 12

    Developing an Application to Recommend Major Based on Personality Test using Waterfall Method by Ethan, Daphne, Calista, Stanley, Michael, Augustine, Vannessa, Anggreainy, Maria Susan, Setiawan, Arden Sagiterry

    “…Education is one of the most fundamental aspects for humans. From human birth to growing up, we never stop learning. Especially now that we are in an era where…”
    Get full text
    Conference Proceeding
  13. 13

    Development of a Mobile Application for the Early Detection of Skin Cancer using Image Processing Algorithms, Transfer Learning, and AutoKeras by Shrimali, Samyak

    “…Skin cancer is one of the most common and dangerous types of cancer. With global ozone levels depleting and more ultraviolet radiation reaching the Earth's…”
    Get full text
    Conference Proceeding
  14. 14

    A Survey of Cryptographic Algorithms for Lightweight Authentication Schemes in the Internet of Things Environment by Rene, Chiadighikaobi Ikenna, Katuk, Norliza, Osman, Baharudin

    “…This paper discusses the cryptographic algorithms used in lightweight authentication schemes for the Internet of Things (IoT) systems. IoT systems contain…”
    Get full text
    Conference Proceeding
  15. 15

    Comparison of Time, Size and Quality of 3D Object Rendering Using Render Engine Eevee and Cycles in Blender by Astuti, Ika Asti, Purwanto, Ibnu Hadi, Hidayat, Tonny, Satria, Dhimas Adi, Haryoko, Purnama, Rizky

    “…3D is widely used in industries such as cinema, architecture, health and others. The 3D model must be rendered before it can be used. The number of rendering…”
    Get full text
    Conference Proceeding
  16. 16

    Potential Classification Prediction of Solar and Wind Energy in Indonesia using Machine Learning with Random Forest Algorithm by Ardiansyah, Deden, Mantoro, Teddy, Syafei, Wahyul Amien

    “…The realization of the mass use of renewable energy needs to be supported by various parties, including Indonesia, which is a country that has great potential…”
    Get full text
    Conference Proceeding
  17. 17

    Electricity Time Series Forecasting by using Transformer with Case Study in Jakarta Banten by Fasvazahra, Indira Alima, Adytia, Didit, Simaremare, Arionmaro Asi

    “…As the number of people in Indonesia grows, the need for various basic things, such as food, house, and even electricity demand also increases. Emerging…”
    Get full text
    Conference Proceeding
  18. 18

    Analysis QoS VoIP using GRE + IPSec Tunnel and IPIP Based on Session Initiation Protocol by Ubedilah, Budiyanto, Setiyo, Silalahi, Lukman Medriavin

    “…The development of communication technology is now very dependent on the internet, not only for information delivery but also for telecommunications (Voice and…”
    Get full text
    Conference Proceeding
  19. 19

    Development of Face Mask Detection using SSDLite MobilenetV3 Small on Raspberry Pi 4 by Anggraini, Nenny, Ramadhani, Syarif Hilmi, Wardhani, Luh Kesuma, Hakiem, Nashrul, Shofi, Imam Marzuki, Rosyadi, M. Tabah

    “…This study aimed to develop a mask detection tool with SSDLite MobilenetV3 Small based on Raspberry Pi 4. SSDLite MobilenetV3 Small is a single-stage object…”
    Get full text
    Conference Proceeding
  20. 20

    Non-Invasive IoT Home Medical Check-up Programming to Monitor Blood Sugar, Cholesterol, Uric Acid, and Body Temperature by Darmawan, Helmy Yusuf, Sanubari, Agung, Saida, Nur, Fauzi, Rahmat Noor, Ristiani, Nadia, Oktivasari, Prihatin, Wardhani, Rika Novita, Riandini

    “…Non-invasive loT home medical check-up tool is a tool to check the temperature, uric acid, cholesterol, and blood sugar levels. The tool was designed using…”
    Get full text
    Conference Proceeding