Search Results - "Justitia, Army"
-
1
An Indonesian Hoax News Detection System Using Reader Feedback and Naïve Bayes Algorithm
Published in Cybernetics and information technologies : CIT (01-03-2020)“…Hoax news in Indonesia spread at an alarming rate. To reduce this, hoax news detection system needs to be created and put into practice. Such a system may use…”
Get full text
Journal Article -
2
Tool for Generating Behavior-Driven Development Test-Cases
Published in Journal of information systems engineering and business intelligence (27-04-2020)“…Background: Testing using Behavior-Driven Development (BDD) techniques is one of the practices of Agile software development. This technique composes a…”
Get full text
Journal Article -
3
Enhancing Software Feature Extraction Results Using Sentiment Analysis to Aid Requirements Reuse
Published in Computers (Basel) (01-03-2021)“…Recently, feature extraction from user reviews has been used for requirements reuse to improve the software development process. However, research has yet to…”
Get full text
Journal Article -
4
Students Activity Recognition by Heart Rate Monitoring in Classroom using K-Means Classification
Published in Journal of information systems engineering and business intelligence (27-04-2020)“…Background: Heartbeat playing the main roles in our life. With the heartbeat, the anxiety level can be known. Most of the heartbeat is used in the exercise…”
Get full text
Journal Article -
5
Customer Satisfaction Analysis of Online Taxi Mobile Apps
Published in Journal of information systems engineering and business intelligence (25-04-2019)“…Background: High number of complaints that have been filed about the performance of online taxi services has prompted research on customer satisfaction factor…”
Get full text
Journal Article -
6
PEMBUATAN MODEL SEQUENCE DIAGRAM DENGAN REVERSE ENGINEERING APLIKASI BASIS DATA PADA SMARTPHONE UNTUK MENJAGA KONSISTENSI DESAIN PERANGKAT LUNAK
Published in JUTI (Jurnal Ilmiah Teknologi Informasi) (online) (01-07-2015)“…Konsistensi desain sequence diagram dengan implementasi sering menjadi masalah dalam pembangunan perangkat lunak, penelitian ini akan menerapkan hasil reverse…”
Get full text
Journal Article -
7
AsCDPR: a novel framework for ratings and personalized preference hotel recommendation using cross-domain and aspect-based features
Published in Data technologies and applications (15-04-2024)“…PurposeThe explosion of data due to the sophistication of information and communication technology makes it simple for prospective tourists to learn about…”
Get full text
Journal Article -
8
Pelatihan Aplikasi Inventaris Barang Untuk Poliklinik Pemulung Di Kawasan Pemakaman Rangkah, Surabaya
Published in Jurnal pengabdian masyarakat MIPA dan pendidikan MIPA (15-03-2022)“…Poliklinik ‘Pemulung” merupakan poliklinik yang berdiri atas kerjasama YDSF (Yayasan Dana Sosial Al-Falah) dan BSMI (Bulan Sabit Merah Indonesia). Pokliklinik…”
Get full text
Journal Article -
9
Automatic Related Work Section in Scientific Article: Research Trends and Future Directions
Published in 2022 International Seminar on Intelligent Technology and Its Applications (ISITIA) (20-07-2022)“…Related work plays an important role in the scientific article to track the history of topic evolution and demonstrate the improvement of the proposed method…”
Get full text
Conference Proceeding -
10
A Campaign Mining in Social Media using Improved K-Means: The Perspective of Candidate President's Mission
Published in 2022 5th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI) (08-12-2022)“…The presidential candidate socializes the vision and mission to persuade supporters and voters as much as possible during the campaign. Since 2010,…”
Get full text
Conference Proceeding -
11
Applying IT Services Business Relationship Management on Security Outsource Company
Published in 2018 5th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI) (01-10-2018)“…Most outsource security companies have not implemented information technology optimally. A company must implement information technology that is oriented to…”
Get full text
Conference Proceeding