Tahun 2020
|
- |
GRAYSCALE IMAGE ENHANCEMENT FOR ENHANCING FEATURES DETECTION IN MARKER-LESS AUGMENTED REALITY TECHNOLOGY |
Journal of Theoretical and Applied Information Technology 98 (13) |
0 |
|
Tahun 2019
|
Journal
Scopus Q4 |
A study on the performance metrics for evaluating stepping stone detection (Ssd) |
International Journal of Innovative Technology and Exploring Engineering |
0 |
|
- |
Marker Quality Improvement in Augmented Reality Using Grey-scale Method |
International Journal of Electrical, Energy and Power System Engineering 2 … |
0 |
|
Tahun 2018
|
- |
Digitalisasi Mumifikasi Suku Dani Di Papua Menggunakan Teknologi Augmented Reality Berbasis Android |
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains 5, 1-9 |
0 |
|
- |
Penerapan Teknologi Augmented Reality Sebagai Media Pengenalan Noken Papua Berbasis Android |
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains 5, 1-7 |
0 |
|
Tahun 2017
|
Journal
Scopus Q4 |
Expert system of quail disease diagnosis using forward chaining method |
Indonesian Journal of Electrical Engineering and Computer Science |
17 |
|
Journal
Scopus Q3 |
Big data s tools for internet data analytics: Modelling of system dynamics |
International Journal on Advanced Science, Engineering and Information Technology |
8 |
|
- |
Big Data’s Tools for Internet Data Analytics: Modelling of System Dynamics |
International Journal on Advanced Science, Engineering and Information … |
12 |
|
Tahun 2016
|
- |
A DEPTH PRE-PROCESSING DATA ANALYSIS FOR INTRUSION DETECTION SYSTEM USING OUTLIER DETECTION AND BOX-COX TRANSFORMATION TECH... |
Jurnal Sains dan Teknologi 13 (1) |
0 |
|
- |
A Feature Selection Algorithm for Anomaly Detection in Grid Environment Using k-fold Cross Validation Technique |
International Conference on Soft Computing and Data Mining, 619-630 |
0 |
|
- |
Bank Notes Originality Detection Based on Security Features Extraction |
International Conference on Electrical Engineering and Informatics 2016 … |
0 |
|
- |
Deteksi Keaslian Uang Kertas Rupiah Berdasarkan Ekstraksi Fitur Keamanan Menggunakan Teknik Image Processing |
Seminar Nasional Universitas Pasir Pengaraian |
0 |
|
- |
Perancangan OLLA (Online Learning Lecturer Assistance): Model E-Learning Interaktif Pengganti Kuliah Tatap Muka |
Riau Journal Of Computer Science 2 (2), 39-44 |
0 |
|
Tahun 2015
|
- |
On measurements of progress on palm oil industrial estate , Sumatera Coridor |
International Seminar on Development of Industrial Park |
0 |
|
Tahun 2014
|
- |
Enhancing Anomalies Traffic Detection in Grid Using Support Vector Machine |
Universiti Teknologi Malaysia |
0 |
|
Tahun 2009
|
- |
Queuing System for Fluctuation Control by Place Billing Method |
Asia Pacific Industrial Engineering & Management System Conference |
0 |
|
Tahun 2008
|
Conference Proceedin
Scopus Q- |
A novel method for unsupervised anomaly detection using unlabelled data |
Proceedings - The International Conference on Computational Sciences and its Applications, ICCSA 200 |
10 |
|
Tahun 2004
|
- |
A Data Analysis for Intrusion Detection Using Principal Component |
1st Conference on Telematics System, Services, and Applications 2004 (TSSAÂ … |
0 |
|
- |
A Data Reduction for Intrusion Detection Using Principal Component Analysis |
ECTI Annual Conference (ECTI-CON 2004) |
0 |
|
- |
Algorithm Enchancement for Host-based Intrusion Detection System Using Discriminant Analysis |
Universiti Teknologi Malaysia |
0 |
|
- |
Algorithm enhancement for host-based intrusion detection system using discriminant analysis |
Universiti Teknologi Malaysia |
0 |
|
- |
Detecting Outlier on Intrusion Detection System Using Data Set of System Calls |
International Conference on Information & Computer Science (ICICS’04) |
0 |
|
Tahun 2003
|
- |
A Methodology to Detect Intrusion Using System Call Based On Discriminant Analysis |
International Symposium on Information Technology (ITSIM'03) |
0 |
|
- |
Intrusion Detection Based On Discriminant Analysis |
Seminar Quality in Research (QIR’03) |
0 |
|
- |
Intrusion Detection Using System Calls Based On Discriminant Analysis |
Conference on Computer Integrated Systems (Concis’03) |
0 |
|
- |
Counting the Number of System Calls to Detect Intrusiong Using Discriminant Analysis |
Quality in Research, EL-TEL-23-1 - EL-TEL-23-8 |
0 |
|
- |
Detecting Intrusion Using System Calls Based On Discriminant Analysis |
Aerospace Information Technology and Communications (ASITT’03) |
0 |
|
Tahun 2002
|
- |
A Methodology to Detect Intrusion Using Discriminant Analysis |
National Conference on Computer Graphics and Multimedia (CoGRAMM’02) |
0 |
|
Tahun 1996
|
- |
The Application of BGC-8088 Micro Engineer V3.1 as a Water Value Controller for Automatic Dispenser Supported by the Design of PPI 8255 Interface and Assembl... |
Universitas Putra Indonesia Padang |
0 |
|
- |
The Application of BGC-8088 Micro Engineer V3.1 as a Water Value Controller for Automatic Dispenser Supported by the Design of PPI 8255 Interface and Assembly Programming Language |
Universitas Putra Indonesia Padang |
0 |
|
Unknown
|
- |
A DEPTH PRE-PROCESSING DATA ANALYSIS FOR INTRUSION DETECTION SYSTEM USING OUTLIER DETECTION AND BOX-COX TRANSFORMATION TECHNIQUE |
Jurnal Sains dan Teknologi 13 (1) |
0 |
|
- |
Cooperative Intrusion Detection System (CIDS) in Grid Environment on Unlabelled data |
|
0 |
|
- |
Identifying Intrusive Host-Based Activities Using Discriminant Analysis |
International Conference on Computer Theory and Applications (ICCTA’2004) |
0 |
|
- |
Measuring the Progress on Palm Oil Industrial Estate, Sumatera Corridor (MP3EI) |
INTERNATIONAL JOURNAL OF ECONOMICS, BUSINESS AND APPLICATIONS 1 (1), 17-23 |
0 |
|
- |
Pemanfaatan Layanan Google Drive untuk Menjalankan Aplikasi Pengontrolan Peralatan Listrik Menggunakan Usb Comm Port |
Jurnal Online Mahasiswa Fakultas Teknik Universitas Riau 2 (2), 1-13 |
0 |
|