Search Results - "Khabib Mustofa"
-
1
Phishing Detection System through Hybrid Machine Learning Based on URL
Published in IEEE access (01-01-2023)“…Currently, numerous types of cybercrime are organized through the internet. Hence, this study mainly focuses on phishing attacks. Although phishing was first…”
Get full text
Journal Article -
2
Product image retrieval using category-aware siamese convolutional neural network feature
Published in Journal of King Saud University. Computer and information sciences (01-06-2022)“…Product image retrieval in the customer-to-shop setting uses similarity learning instead of a predefined distance to address the cross-domain matching problem…”
Get full text
Journal Article -
3
Requirements Conflict Detection and Resolution in AREM Using Intelligence System Approach
Published in Juita : jurnal informatika (Online) (14-11-2022)“…Requirements engineering (RE) is the process of defining user requirements that are used as the main reference in the system development process. The quality…”
Get full text
Journal Article -
4
Determination of Temporal Association Rules Pattern Using Apriori Algorithm
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (30-04-2020)“…A supermarket must have good business plan in order to meet customer desires. One way that can be done to meet customer desires is to find out the pattern of…”
Get full text
Journal Article -
5
An extended approach of weight collective influence graph for detection influence actor
Published in International journal of advances in intelligent informatics (31-03-2022)“…Over the last decade, numerous methods have been developed to detect the influential actors of hate speech in social networks, one of which is the Collective…”
Get full text
Journal Article -
6
Comparison of Filter and Wrapper Based Feature Selection Methods on Spam Comment Classification
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (31-07-2021)“…The continuous growth of the internet has led to the use of social media for various purposes increase. For instance, some irresponsible parties take advantage…”
Get full text
Journal Article -
7
A Support Vector Machine-Firefly Algorithm for Movie Opinion Data Classification
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (31-07-2019)“…The sentiment analysis used in this study is the process of classifying text into two classes, namely negative and positive classes. The classification method…”
Get full text
Journal Article -
8
Goal-Oriented Requirements Engineering: State of the Art and Research Trend
Published in Juita : jurnal informatika (Online) (22-05-2021)“…The Goal-Oriented Requirements Engineering (GORE) is one approach that is widely used for the early stages of software development. This method continues to…”
Get full text
Journal Article -
9
Selenium-Based Multithreading Functional Testing
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (31-01-2018)“…In a software development projects, testing is an activity that can spend time, effort or cost up to 35%. To reduce this, developers can choose automatic…”
Get full text
Journal Article -
10
Platform Gamifikasi untuk Perkuliahan
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (31-07-2017)“…Gamification in lecturing has a lot of variety designs. A flexible platform is needed for that matter. This research aims to develop a gamification platform…”
Get full text
Journal Article -
11
Review of Intent Diversity in Information Retrieval : Approaches, Models and Trends
Published in JITeCS (Journal of Information Technology and Computer Science) (Online) (05-11-2018)“…The fast increasing volume of information databases made some difficulties for a user to find the information that they need. Its important for researchers to…”
Get full text
Journal Article -
12
Pencarian Aturan Asosiasi Semantic Web Untuk Obat Tradisional Indonesia
Published in JNTETI (Jurnal Nasional Teknik Elektro dan Teknologi Informasi) (Online) (15-09-2016)“…Indonesia has more than 2000 types of plants that can be used for medicine. Indonesian traditional medicine called jamu utilizes various of medicinal plants…”
Get full text
Journal Article -
13
Pencarian Lowongan Pekerjaan Berbasis Agen Berdasarkan Profil Pencari Kerja dengan Pendekatan Semantic Web Service
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (31-01-2016)“…Currently, job searching service still has many weaknesses and often fails to provide relevant job information that matches the needs of job seekers. This is…”
Get full text
Journal Article -
14
Ekstraksi Informasi Halaman Web Menggunakan Pendekatan Bootstrapping pada Ontology-Based Information Extraction
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (31-07-2015)“…AbstrakEkstraksi informasi merupakan suatu bidang ilmu untuk pengolahan bahasa alami, dengan cara mengubah teks tidak terstruktur menjadi informasi dalam…”
Get full text
Journal Article -
15
Purwarupa Framework Aplikasi Desktop Menggunakan Teknologi Web
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (31-01-2015)“…AbstrakAplikasi desktop adalah aplikasi yang berjalan lokal dalam lingkungan desktop dan hanya dapat diakses oleh pengguna desktop. Ini berbeda dengan aplikasi…”
Get full text
Journal Article -
16
Perancangan dan Analisis Kinerja Private Cloud Computing dengan Layanan Infrastructure-As-A-Service (IAAS)
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (31-07-2014)“…AbstrakMesin server merupakan salah satu penunjang dan komponen utama yang harus ada dalam mengembangkan suatu karya ilmiah dengan berbasis web. Mahalnya…”
Get full text
Journal Article -
17
Pengukuran Fungsionalitas Perangkat Lunak Menggunakan Metode Function Point Berdasarkan Dokumentasi Desain
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (31-07-2013)“…AbstrakPerkiraan nilai perangkat lunak yang disepakati oleh end user dan tim pengembang harus dinyatakan dalam besaran tertentu, salah satunya adalah dalam u…”
Get full text
Journal Article -
18
Detecting A Botnet By Reverse Engineering
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (12-06-2013)“…Abstract— Botnet malware is a malicious program. Botnet that infects computers, called bots, will be controlled by a botmaster to do various things such as:…”
Get full text
Journal Article -
19
Latent Dirichlet Allocation for Medical Records Topic Modeling: Systematic Literature Review
Published in 2021 Sixth International Conference on Informatics and Computing (ICIC) (03-11-2021)“…The fast growth of Electronic Medical Records (EMR) has improved its functionalities and increase its use in secondary functions. EMRs can be used to improve…”
Get full text
Conference Proceeding -
20
An extended approach of weight collective influence graph for detection influence actor
Published in International journal of advances in intelligent informatics (01-03-2022)“…Over the last decade, numerous methods have been developed to detect the influential actors of hate speech in social networks, one of which is the Collective…”
Get full text
Journal Article