Search Results - "2022 IEEE International Conference of Computer Science and Information Technology (ICOSNIKOM)"

Refine Results
  1. 1

    Deepfake Video Detection Using Spatiotemporal Convolutional Network and Photo Response Non Uniformity by Pipin, Sio Jurnalis, Purba, Ronsen, Pasha, Muhammad Fermi

    “…It is important to improve the detection of deepfake videos to differentiate between real and fake videos that cause disinformation in the digital age so that…”
    Get full text
    Conference Proceeding
  2. 2

    Comparison of CNN Architecture for White Blood Cells Image Classification by Kohsasih, Kelvin Leonardi, Zarlis, Muhammad, Hayadi, B. Herawan

    “…Deep learning is a development of machine learning that has obtained good performance in image segmentation, prediction, classification, and machine…”
    Get full text
    Conference Proceeding
  3. 3

    Quadcopter Unmanned Aerial Vehicle (UAV) Design for Search and Rescue (SAR) by Immanuel Damanik, Joy Andrew, Dermawan Sitanggang, Imanuel Maurice, Hutabarat, Fajar Sam, Boy Knight, Guntur Petrus, Sagala, Albert

    “…The hard and challenging disaster terrain often hindered victim search processes which commonly use ground-based methods. UAVs were used to avoid this problem…”
    Get full text
    Conference Proceeding
  4. 4

    Improving Multi-face Detection Using Bimodality Approach on Viola Jones by Kurniawan, Heru, Purba, Ronsen, Halim, Arwin

    “…Multi-face detection has a different level of difficulty with single face detection because it requires the ability to detect at various scales/sizes. Viola…”
    Get full text
    Conference Proceeding
  5. 5

    Improving Prometer, A Measure For Programmer Performance by Sihombing, Vinny Kristina, Simaremare, Mario E.S., Samosir, Deni Josua, Limbong, Ventina Otani

    “…The performance of a programmer can be defined as skills in solving problems or challenges. A programmer produces source codes. There are types of source code:…”
    Get full text
    Conference Proceeding
  6. 6

    Development of WSAN on a Prototype Three-Phase Separator Level Control System using LoRa RF Based on IoT by Suvanto, Juwari, Darwito, Purwadi Agus, Widjiantoro, Bambang Lelono, Prananda, Sulthan Ariq, Pradana, Dwiki Okvian, Sudrajat, Sapto Wahyu

    “…The separation process in the oil and gas industry occurs in a three-phase separator. The separator needs to be controlled so that the oil production is stable…”
    Get full text
    Conference Proceeding
  7. 7

    Analysis Comparison of FastText and Word2vec for Detecting Offensive Language by Lumbantoruan, Rosni, Siregar, Rifka Uli, Manik, Indah, Tambunan, Nadya, Simanjuntak, Humasak

    “…Twitter is one of the most popular platforms for sharing opinions, ideas, feelings and information. Tweets on Twitter may have language that is similar to that…”
    Get full text
    Conference Proceeding
  8. 8

    Convolutional Neural Network Using Res-Net For Organic and Anorganic Waste Classification by Girsang, Abba Suganda, Yunanda, Rezky, Syahputra, Muhammad Edo, Peranginangin, Ezra

    “…Convolutional Neural network is state of the art of image recognition or image classification. However to build the robust model using CNN needs many…”
    Get full text
    Conference Proceeding
  9. 9

    Face Recognition with Edge Detection and LBP Feature Extraction by Dharma, Aria Satia, Tambunan, Naomi, Sinaga, Laura Elisabeth

    “…The face is the main part of humans that is used as a recognition center in everyday life. With the different faces of many people, it will be increasingly…”
    Get full text
    Conference Proceeding
  10. 10

    Twitter Data Warehouse and Business Intelligence Using Dimensional Model and Data Mining by Togatorop, Parmonangan R., Sitorus, Dody, Purba, Yohana, Tarigan, Andika M. F.

    “…Sentiment analysis is used to analyze data in text format such as tweets from Twitter social media users. Twitter is one of the most popular social media with…”
    Get full text
    Conference Proceeding
  11. 11

    Test Case Prioritization by Combining Mirror Adaptive Random Testing and Forgetting by Sinaga, Arnaldo Marulitua, Yohana, Rosa Amelia B, Sijabat, Apriyanti, Manullang, Yohana Christina

    “…This research examines test case prioritization methods that employ information from the previously selected test cases. Three methods were studied, namely…”
    Get full text
    Conference Proceeding
  12. 12

    Application of Backpropagation Prediction Methods on Land Deformation Results Using the DInSAR Method by Samosir, Amelia, Sitorus, Jose J. V., Simanjuntak, Indra D., Panggabean, Good Fried

    “…Dolok Sanggul District is located at 2°09'- 2°16' North Latitude and 98°41' - 99°49' East Longitude. Dolok Sanggul Subdistrict is above about 1300 to 1,450…”
    Get full text
    Conference Proceeding
  13. 13

    Adopting Centroid and Bandwidth to Shape Security Line by Pratiwi, Heni Ispur, Kartowisastro, Iman Herwidiana, Soewito, Benfano, Budiharto, Widodo

    “…The voice patterns of gender and age have been used as speaker's identity and implied into sectors such as smart cards, healthcare, banking, and other security…”
    Get full text
    Conference Proceeding
  14. 14

    A Review Text-based Recommendation System in Text Mining by Rinaldi, Ferdiana, Ridi, Setiawan, Noor Akhmad

    “…Digitization makes data more readily available, leading to data inflation in recent years. However, the large amount of data makes it difficult for users to…”
    Get full text
    Conference Proceeding
  15. 15

    Fresh Concrete Image Data Set Development Using Data Augmentation Algorithm as Building Concrete Compression Identification Reference by Handayani, Tri, Sudiro, Sunny Arief, Andayani, Relly, Madenda, Sarifuddin

    “…Image is one of the most important multimedia data that is widely used in information technology. Information can be represented by image and human eye can…”
    Get full text
    Conference Proceeding
  16. 16

    Implementation of Backtracking and Steepest Ascent Hill Climbing Algorithms on Ferry Scheduling in Lake Toba by Pasaribu, Monalisa, Pratama, Yohanssen, Sianipar, Amsal M., Sihombing, Grace A.M., Purba, Yohana

    “…Scheduling is highly important in transportation, particularly in Ajibata port, where many limitations and conditions occur. Some of the limitations are the…”
    Get full text
    Conference Proceeding
  17. 17

    Forensic Imaging Integrity Guarantor using Raspberry Pi and RFID Tag by Hadi Kusuma, M Jaya, Khairunnisa, Rizka

    “…Digital Evidence used in criminal investigation could help reveal the unlawful act committed by the perpetrators. Digital evidence is more revealing, but it is…”
    Get full text
    Conference Proceeding
  18. 18

    Students' Timely Graduation Attributes Prediction Using Feature Selection Techniques, Case Study: Informatics Engineering Bachelor Study Program by Gunawan, Halim, Fandi, Djoni

    “…Timely graduation is a problem that is often experienced by study programs at higher education institutions, where several factors can be the cause. This study…”
    Get full text
    Conference Proceeding
  19. 19

    Hyperparameter Search for CT-Scan Classification Using Hyperparameter Tuning in Pre-Trained Model CNN With MLP by Pardede, Jasman, Purohita, A.S.

    “…The common approach to find best hyperparameter in CNN training is grid search, by observing one set to another of hyperparameter for obtaining the best…”
    Get full text
    Conference Proceeding
  20. 20

    Integrated Travel Route Information System with Ferry Schedule by Using Dijkstra Algorithm by Pratama, Yohanssen, Situmorang, Verawaty, Sianipar, Kiki Ferawati, Simanjuntak, Martin, Naibaho, Gabriela Melva

    “…The purpose of this study is to build a travel route information system with synchronization of ferry crossing schedules that will help tourists and residents…”
    Get full text
    Conference Proceeding