ID : 56401
Name : Teknik Komputer
Web : dipkom@unsri.ac.id
Grade : D3
Sinta Score
All Year : 29
5 Year V1: 10
3 Year V2: 6
Scopus Documents
Total : 46
Q4 Implementation of ram based neural networks on maze mapping algorithms for wall follower robot Authors : AHMAD ZARKASI,HUDA UBAYA Citation : 6 Cover Date : 2019-04-16 Type Doc : Conference Proceeding Publication Name : Journal of Physics: Conference Series ISSN : 17426588 DOI : 10.1088/1742-6596/1196/1/012043 |
Q4 The Indoor Positioning System Using Fingerprint Method Based Deep Neural Network Authors : HUDA UBAYA Citation : 6 Cover Date : 2019-01-01 Type Doc : Conference Proceeding Publication Name : IOP Conference Series: Earth and Environmental Science ISSN : 17551307 DOI : 10.1088/1755-1315/248/1/012077 |
- Denial of service attack visualization with clustering using K-means algorithm Authors : TRI WANDA SEPTIAN Citation : 5 Cover Date : 2017-01-01 Type Doc : Conference Proceeding Publication Name : ICECOS 2017 - Proceeding of 2017 International Conference on Electrical Engineering and Computer Sci ISSN : DOI : 10.1109/ICECOS.2017.8167129 |
- Analysis of custody transfer on moving bundle protocol of wireless router in delay tolerant network (DTN) Authors : TRI WANDA SEPTIAN Citation : 5 Cover Date : 2017-07-01 Type Doc : Conference Proceeding Publication Name : Proceedings - 2017 4th International Conference on Information Technology, Computer, and Electrical ISSN : DOI : 10.1109/ICITACEE.2017.8257674 |
Q2 An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection Authors : TRI WANDA SEPTIAN Citation : 5 Cover Date : 2023-01-01 Type Doc : Journal Publication Name : Computer Systems Science and Engineering ISSN : 02676192 DOI : 10.32604/csse.2023.034047 |
Q4 Dual-channel lora gateway using channel assignment on raspberry Pi Authors : HUDA UBAYA Citation : 4 Cover Date : 2019-04-16 Type Doc : Conference Proceeding Publication Name : Journal of Physics: Conference Series ISSN : 17426588 DOI : 10.1088/1742-6596/1196/1/012075 |
Q2 Combining Oversampling with Recurrent Neural Networks for Intrusion Detection Authors : TRI WANDA SEPTIAN Citation : 4 Cover Date : 2021-01-01 Type Doc : Book Series Publication Name : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and ISSN : 03029743 DOI : 10.1007/978-3-030-73216-5_21 |
- Multilayer processing architecture of RAM based neural network with memory optimization for navigation system Authors : AHMAD ZARKASI Citation : 3 Cover Date : 2013-01-01 Type Doc : Conference Proceeding Publication Name : Proceedings of the 2013 Joint International Conference on Rural Information and Communication Techno ISSN : DOI : 10.1109/rICT-ICeVT.2013.6741494 |
- Evaluation of greedy perimeter stateless routing protocol on vehicular ad hoc network in palembang city Authors : HUDA UBAYA Citation : 3 Cover Date : 2017-07-02 Type Doc : Conference Proceeding Publication Name : Proceedings of 2017 International Conference on Data and Software Engineering, ICoDSE 2017 ISSN : DOI : 10.1109/ICODSE.2017.8285873 |
Q4 Development of low cost EIT equipment for educational purposes Authors : AHMAD ZARKASI Citation : 3 Cover Date : 2019-02-26 Type Doc : Conference Proceeding Publication Name : Journal of Physics: Conference Series ISSN : 17426588 DOI : 10.1088/1742-6596/1153/1/012041 |