Search Results - "Sari, Anny Kartika"
-
1
Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution
Published in Digital communications and networks (01-11-2020)“…There are a few issues related to the existing symmetric encryption models for color image data, such as the key generation and distribution problems. In this…”
Get full text
Journal Article -
2
Enhancing Spam Comment Detection on Social Media with Emoji Feature and Post-Comment Pairs Approach using Ensemble Methods of Machine Learning
Published in IEEE access (01-01-2023)“…Every time a well-known public figure posts something on social media, it encourages many users to comment. Unfortunately, not all comments are relevant to the…”
Get full text
Journal Article -
3
Ontology-based Complementary Breastfeeding Search Model
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (31-07-2022)“…Children's nutritional requirements differ from those of adults. The health ministry's Indonesian data shows that in 2017, there were 17.8% of malnourished…”
Get full text
Journal Article -
4
Error Action Recognition on Playing The Erhu Musical Instrument Using Hybrid Classification Method with 3D-CNN and LSTM
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (31-07-2023)“…Erhu is a stringed instrument originating from China. In playing this instrument, there are rules on how to position the player's body and hold the instrument…”
Get full text
Journal Article -
5
Steganographic Model for encrypted messages based on DNA Encoding
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (31-01-2021)“…Information has become an inseparable part of human life. Some information that is considered important, such as state or company documents, require more…”
Get full text
Journal Article -
6
Spam Comments Detection on Instagram Using Machine Learning and Deep Learning Methods
Published in Lontar komputer (10-08-2022)“…The more popular a public figure on Instagram (IG), the number of followers also increase. When a public figure posts something, there are many comments from…”
Get full text
Journal Article -
7
Integrated AHP, Profile Matching, and TOPSIS for selecting type of goats based on environmental and financial criteria
Published in International journal of advances in intelligent informatics (01-03-2018)“…Goat farm businessman should considered environmental and financial criteria in breeding their commodities. The environmental factors are temperature,…”
Get full text
Journal Article -
8
Challenges of Sarcasm Detection for Social Network : A Literature Review
Published in Juita : jurnal informatika (Online) (16-11-2020)“…Nowadays, sarcasm recognition and detection simplified with various domains knowledge, among others, computer science, social science, psychology, mathematics,…”
Get full text
Journal Article -
9
Optimization of ARIMA Forecasting Model using Firefly Algorithm
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (30-04-2019)“… Time series prediction aims to control or recognize the behavior of the system based on the data in a certain period of time. One of the most widely used…”
Get full text
Journal Article -
10
Sarcasm Detection For Sentiment Analysis in Indonesian Tweets
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (31-01-2019)“…Twitter is one of the social medias that are widely used at the moment. Tweet conversations can be classified according to their sentiments. The existence of…”
Get full text
Journal Article -
11
The K-Means Clustering Algorithm With Semantic Similarity To Estimate The Cost of Hospitalization
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (31-10-2019)“… The cost of hospitalization from a patient can be estimated by performing a cluster of patient. One of the algorithms that is widely used for clustering is…”
Get full text
Journal Article -
12
Comparison of Hybrid Intrusion Detection System
Published in 2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE) (06-10-2020)“…IDS have an important role in dispelling and preventing an intrusion or abuse of access rights. In its development, research on IDS is growing. IDS consist of…”
Get full text
Conference Proceeding -
13
A Web Based Expert System for Identifying Bloomed Plants
Published in IJCCS (Indonesian Journal of Computing and Cybernetics Systems) (14-06-2009)“…This research discusses the development of a web based expert system for identifying bloomed plants. The identification is based on the seven visible features…”
Get full text
Journal Article -
14
Automatic Requirements Engineering: Activities, Methods, Tools, and Domains – A Systematic Literature Review
Published in Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (Online) (01-06-2023)“…Requirements engineering (RE) is an initial activity in the software engineering process that involves many users. The involvement of various users in the RE…”
Get full text
Journal Article -
15
An approach for sub-ontology evolution in a distributed health care enterprise
Published in Information systems (Oxford) (01-07-2013)“…In response to the changing nature of health issues, standardized health ontologies such as SNOMED CT and UMLS incline to change more frequently than most…”
Get full text
Journal Article -
16
Archetype sub-ontology: Improving constraint-based clinical knowledge model in electronic health records
Published in Knowledge-based systems (01-02-2012)“…► We present an approach to develop an archetype sub-ontology for an archetype. ► An archetype sub-ontology is extracted from health ontology (SNOMED CT). ►…”
Get full text
Journal Article -
17
Integrated AHP, profile matching, and TOPSIS for selecting type of goats based on environmental and financial criteria
Published in International journal of advances in intelligent informatics (01-03-2018)“…Goat farm businessman should considered environmental and financial criteria in breeding their commodities. The environmental factors are temperature,…”
Get full text
Journal Article -
18
Compression-Encryption Model for Digital Images Based on GAN and Logistic Map
Published in 2021 International Seminar on Intelligent Technology and Its Applications (ISITIA) (21-07-2021)“…The problem of digital image transmission lies on the size of the image which tends to get bigger, and how to satisfy the confidentiality aspects when images…”
Get full text
Conference Proceeding -
19
Security Issues and Vulnerabilities On A Blockchain System: A Review
Published in 2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI) (01-12-2019)“…In recent years, we have seen very significant development in software technologies. Many new and more sophisticated technologies such as Artificial…”
Get full text
Conference Proceeding -
20
Linear Support Vector Regression in Cloud Computing on Data Encrypted using Paillier Cryptosystem
Published in 2019 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI) (01-12-2019)“…The use of linear support vector regression on private data in cloud computing must consider data privacy. Homomorphic encryption is an approach to address the…”
Get full text
Conference Proceeding