Vol. 16 No. 1 2022

Dublin Core

Title

Vol. 16 No. 1 2022

Collection Items

Journal of ICT Research and Applications ITB Bandung Vol. 16 No. 1 2022<br /><br />
Mobile Robot Path Planning Optimization Based on Integration of Firefly Algorithm and Cubic Polynomial Equation
Abstract. Mobile Robot is an extremely essential technology in the industrial world. Optimal path planning is essential for the navigation of mobile robots. The firefly algorithm is a very promising tool of Swarm Intelligence, which is used in…

Journal of ICT Research and Applications ITB Bandung Vol. 16 No. 1 2022<br /><br />
A CNN-ELM Classification Model for Automated Tomato Maturity Grading
Abstract. Tomatoes are popular around the world due to their high nutritional value. Tomatoes are also one of the world’s most widely cultivated and profitable crops. The distribution and marketing of tomatoes depend highly on their quality.…

Journal of ICT Research and Applications ITB Bandung Vol. 16 No. 1 2022<br /><br />
Predicting the Extent of Sidoarjo Mud Flow Using Remote Sensing
Abstract. The Sidoarjo mud flow in East Java is the result of a natural phenomenon in which hot mudflow occurs due to volcanic activity. The Sidoarjo mud flow resulted in a considerable ecological disaster in the area. In this study, by using the…

Journal of ICT Research and Applications ITB Bandung Vol. 16 No. 1 2022<br /><br />
Wireless Vibration Monitoring System for Milling Process and Analysis of the Influence of Processing Parameters
Abstract. Milling is commonly applied in manufacturing industries to make engineering products. Vibrations that occur in the milling process can disturb the continuity of the process. Vibration monitoring systems are used in manufacturing industries…

Journal of ICT Research and Applications ITB Bandung Vol. 16 No. 1 2022<br /><br />
Automatically Detect Software Security Vulnerabilities Based on Natural Language Processing Techniques and Machine Learning Algorithms
Abstract. Nowadays, software vulnerabilities pose a serious problem, because cyber-attackers often find ways to attack a system by exploiting software vulnerabilities. Detecting software vulnerabilities can be done using two main methods: i)…

Journal of ICT Research and Applications ITB Bandung Vol. 16 No. 1 2022<br /><br />
A Classifier to Detect Profit and Non Profit Websites Upon Textual Metrics for Security Purposes
Abstract. Currently, most organizations have a defense system to protect their digital communication network against cyberattacks. However, these defense systems deal with all network traffic regardless if it is from profit or non-profit websites.…
View all 7 items

Collection Tree