Browse Items (9247 total)

3913-Article Text-13523-1-10-20220831.pdf
The pandemic has caused a shift in the tourism industry's drive towards comprehensive digitization. This approach is used to
prevent the spread of the Covid-19 virus. The impact of Pemberlakuan Pembatasan Kegiatan Masyarakat (PPKM) limiting the…

6_A+Study+on+Wearable+Tech+Interfaces+and+Perception+Cognitive+AI-Enabled+Device.pdf
In our paper, we explore the possibility of utilizing state-of-the-art hardware architecture to develop an interactive Artificial Intelligence(AI) based virtual agent in an Internet of Things (IoT) enabled smart glass. In contrast to the traditional…

5_A+Centrality+Maximization+Approach+for+Link.pdf
In social networks, the goal of link recommendation is to recommend links for nodes and add them to the network, thereby satisfying the potential link interests of the nodes. The centrality of nodes in social networks typically quantifies the…

4_User+Rating+Prediction+Method+Based+on+Fine-tuning+of+Large+Language+Models.pdf
Online reviews in social networks reflect users' preferences for specific attributes of products. Accurate predictions of user ratings based on these reviews can help businesses better understand genuine user feedback. The purpose of this study is to…

3_The+Evolution+of+Software+Engineering+From+Prehistoric+Beginnings+to+the+Age+of+Artificial+Intelligence.pdf
This article presents a thorough overview of the historical background of software engineering, tracing its roots from antiquity to the contemporary time dominated by artificial intelligence (AI). Beginning with the basic programming languages of the…

4142-Article Text-12802-1-10-20220715.pdf
This study proposes several methods to analyze the performance of the hybrid machine learning method using Voting and
Stacking on rainfall classification. The two hybrid methods will combine five classification methods, namely Logistic…

2_An+Android-Based+Smart+RSU+Framework+for+Enhanced.pdf
This paper addresses critical challenges in the deployment and effectiveness of traditional Roadside Units (RSUs) in traffic monitoring systems and proposes a novel, cost-effective approach using Android-based smart RSUs. Leveraging mobile phone…

1_Detailed+Analyses+and+Efficient+Identification+of+Malware+Evidence.pdf
Malware is a malicious software that is used to launch attacks of different types in computer networks and cyber space. Several signature and machine learning-based approaches have been used for the identification of malware types in the past.…

4131-Article Text-12803-1-10-20220715.pdf
With background of Covid-19 pandemic, Indonesian state trying to make various efforts, so people comply health protocols.
One of them is through PeduliLindungi application. PeduliLindungi has 3 main functions, namely tracing, tracking, warning…

4125-Article Text-12536-1-10-20220630.pdf
Twitter is one of the popular microblogs that allow users to write posts. Retweeting is one of the mechanisms for the diffusion
of information on Twitter. One way to understand the spread of information is to learn about retweet predictions. This…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2