ID : 56401
Name : Teknik Komputer
Web : dipkom@unsri.ac.id
Grade : D3
Sinta Score
All Year : 29
5 Year V1: 10
3 Year V2: 6
Scopus Documents
Total : 46
Q2 Behavior pattern recognition of game Dragon Nest using bloom filter method Authors : TRI WANDA SEPTIAN Citation : 1 Cover Date : 2019-01-01 Type Doc : Journal Publication Name : International Journal of Communication Networks and Information Security ISSN : 20760930 DOI : |
Q4 The Indoor Positioning System Using Fingerprint Method Based Deep Neural Network Authors : HUDA UBAYA Citation : 6 Cover Date : 2019-01-01 Type Doc : Conference Proceeding Publication Name : IOP Conference Series: Earth and Environmental Science ISSN : 17551307 DOI : 10.1088/1755-1315/248/1/012077 |
- Evaluation of greedy perimeter stateless routing protocol on vehicular ad hoc network in palembang city Authors : HUDA UBAYA Citation : 3 Cover Date : 2017-07-02 Type Doc : Conference Proceeding Publication Name : Proceedings of 2017 International Conference on Data and Software Engineering, ICoDSE 2017 ISSN : DOI : 10.1109/ICODSE.2017.8285873 |
- Disaster mitigation management using geofencing in Indonesia Authors : HUDA UBAYA Citation : 1 Cover Date : 2017-07-01 Type Doc : Conference Proceeding Publication Name : Proceeding of 2017 11th International Conference on Telecommunication Systems Services and Applicati ISSN : DOI : 10.1109/TSSA.2017.8272909 |
- Analysis of custody transfer on moving bundle protocol of wireless router in delay tolerant network (DTN) Authors : TRI WANDA SEPTIAN Citation : 5 Cover Date : 2017-07-01 Type Doc : Conference Proceeding Publication Name : Proceedings - 2017 4th International Conference on Information Technology, Computer, and Electrical ISSN : DOI : 10.1109/ICITACEE.2017.8257674 |
- Payload recognition and detection of Cross Site Scripting attack Authors : TRI WANDA SEPTIAN Citation : 6 Cover Date : 2017-04-19 Type Doc : Conference Proceeding Publication Name : 2017 2nd International Conference on Anti-Cyber Crimes, ICACC 2017 ISSN : DOI : 10.1109/Anti-Cybercrime.2017.7905285 |
Q3 Formation control optimization for odor localization Authors : ADITYA PUTRA PERDANA PRASETYO Citation : 0 Cover Date : 2017-01-01 Type Doc : Book Series Publication Name : Advances in Intelligent Systems and Computing ISSN : 21945357 DOI : 10.1007/978-3-319-51281-5_6 |
Q4 A new swarm source seeking behavior based-on pattern recognition approach Authors : ADITYA PUTRA PERDANA PRASETYO Citation : 1 Cover Date : 2017-01-01 Type Doc : Journal Publication Name : Journal of Telecommunication, Electronic and Computer Engineering ISSN : 21801843 DOI : |
- Denial of service attack visualization with clustering using K-means algorithm Authors : TRI WANDA SEPTIAN Citation : 5 Cover Date : 2017-01-01 Type Doc : Conference Proceeding Publication Name : ICECOS 2017 - Proceeding of 2017 International Conference on Electrical Engineering and Computer Sci ISSN : DOI : 10.1109/ICECOS.2017.8167129 |
Q4 Pattern recognition approach for swarm robots reactive control with fuzzy-kohonen networks and particle swarm optimization algorithm Authors : ADITYA PUTRA PERDANA PRASETYO Citation : 7 Cover Date : 2016-01-01 Type Doc : Journal Publication Name : Journal of Telecommunication, Electronic and Computer Engineering ISSN : 21801843 DOI : |