Maman Abdurohman
YOU?
Author Swipe
View article: Performance Comparison of YOLOv8 and DETR in White Blood Cell Detection
Performance Comparison of YOLOv8 and DETR in White Blood Cell Detection Open
Automated detection and classification of white blood cells (WBCs) from microscopic images play a vital role in supporting the diagnosis of hematological diseases. Accurate and robust object detection algorithms are essential for handling …
View article: A New Method for Handling Large Missing Values from Rain Gauge Sensors
A New Method for Handling Large Missing Values from Rain Gauge Sensors Open
Many Internet of Things (IoT)-based systems transmit data quickly in a short time. Unfortunately, not all IoT devices transmit complete sensor data, resulting in data loss, which is a common problem faced by IoT-based systems. Additionally…
View article: TICKER SYMBOL IDENTIFICATION WITH CIMA ON NON-STATIONARY STOCK PRICE DATASET
TICKER SYMBOL IDENTIFICATION WITH CIMA ON NON-STATIONARY STOCK PRICE DATASET Open
Ticker symbol identification based on stock price data in investor decisions has been proven to be pivotal. Though research exists on stock price forecasting, ticker symbol identification is still a research opportunity. Meanwhile, some te…
View article: Temporal Sequential-Artificial Neural Network Enhancements for Improved Smart Lighting Control
Temporal Sequential-Artificial Neural Network Enhancements for Improved Smart Lighting Control Open
Several previous studies have proposed a temporal sequential-artificial neural network (TS-ANN) to convert PIR Sensor movement data into presence data and improve the performance of smart lighting control. However, such a temporal-sequenti…
View article: HUMAN ACTIVITY RECOGNITION IMPROVEMENT ON SMARTPHONE ACCELEROMETERS USING CIMA
HUMAN ACTIVITY RECOGNITION IMPROVEMENT ON SMARTPHONE ACCELEROMETERS USING CIMA Open
Human activity recognition (HAR) is a research field that focuses on detecting user activities and has wide applications. However, the problems that need to be solved are real-time constraints and imbalanced datasets due to different activ…
View article: Feasibility Study and the Development of MSME Business Incubator Mockup in Toba District
Feasibility Study and the Development of MSME Business Incubator Mockup in Toba District Open
Theoretical Framework: Toba Regency is one of the regions in North Sumatra that has considerable MSME potential. However, there are still many MSMEs that experience difficulties in developing their business due to constraints in capital, i…
View article: A Wearable Device for Enhancing Basketball Shooting Correctness with MPU6050 Sensors and Support Vector Machine Classification
A Wearable Device for Enhancing Basketball Shooting Correctness with MPU6050 Sensors and Support Vector Machine Classification Open
One of the impacts of Covid-19 is the delay of basketball sports competitions, which influences the athlete’s fitness and the athlete’s ability to play, especially for shooting techniques. Existing research in wearable devices for basketba…
View article: CIMA: A Novel Classification‐Integrated Moving Average Model for Smart Lighting Intelligent Control Based on Human Presence
CIMA: A Novel Classification‐Integrated Moving Average Model for Smart Lighting Intelligent Control Based on Human Presence Open
Smart lighting systems utilize advanced data, control, and communication technologies and allow users to control lights in new ways. However, achieving user comfort, which should be the focus of smart lighting research, is challenging. One…
View article: Implementasi Fuzzy Logic pada Penjadwalan Pengairan Irigasi (Studi Kasus : BPSDA Serayu Citanduy)
Implementasi Fuzzy Logic pada Penjadwalan Pengairan Irigasi (Studi Kasus : BPSDA Serayu Citanduy) Open
- Irrigation system is an activity to get water to facilitate agricultural activities. The activity is to drain and provide water regularly to the land and then use it for land needs. This irrigation system has been implemented by BPSDA Se…
View article: A Survey on Phishing Website Detection Using Hadoop
A Survey on Phishing Website Detection Using Hadoop Open
Phishing is an activity carried out by phishers with the aim of stealing personal data of internet users such as user IDs, password, and banking account, that data will be used for their personal interests. Average internet user will be ea…
View article: A Modified E-LEACH Routing Protocol for Improving the Lifetime of a Wireless Sensor Network
A Modified E-LEACH Routing Protocol for Improving the Lifetime of a Wireless Sensor Network Open
This paper proposes a modified end-to-end secure low energy adaptive clustering hierarchy (ME-LEACH) algorithm for enhancing the lifetime of a wireless sensor network (WSN). Energy limitations are a major constraint in WSNs, hence every ac…
View article: Increasing the Security of RFID-based Classroom Attendance System with Shamir Secret Share
Increasing the Security of RFID-based Classroom Attendance System with Shamir Secret Share Open
This paper proposes an attendance system for increasing the security based on Shamir Secret Share algorithm. The use of RFID devices for classroom attendance is still vulnerable to certain attacks. Students usually make use of existing loo…
View article: Basement Flood Control with Adaptive Neuro Fuzzy Inference System Using Ultrasonic Sensor
Basement Flood Control with Adaptive Neuro Fuzzy Inference System Using Ultrasonic Sensor Open
This paper proposes a basement flood management system based on Adaptive Neuro Fuzzy Inference System (ANFIS). Basement is one of the main parts of a building that has a high potential for flooding. Therefore, the existence of a flood cont…
View article: Context-Aware Smart Door Lock with Activity Recognition Using Hierarchical Hidden Markov Model
Context-Aware Smart Door Lock with Activity Recognition Using Hierarchical Hidden Markov Model Open
Context-Aware Security demands a security system such as a Smart Door Lock to be flexible in determining security levels. The context can be in various forms; a person’s activity in the house is one of them and is proposed in this research…
View article: IWBIS 2019 Index
IWBIS 2019 Index Open
Fire is a threat that is dangerous for the safety of residents.This research designs a fire early warning system that can ignite alerts for human.Technological advancements in the digital era, specifically in machine learning, can make the…
View article: Egg Quality Detection System Using Fuzzy Logic Method
Egg Quality Detection System Using Fuzzy Logic Method Open
Determining the quality of eggs in general is used by placing eggs on a flashlight. The detection system is very necessary to determine good egg quality or rotten eggs, so that the conditions of the eggs can be known by the chicken farm co…
View article: Performances Analysis of Heart Disease Dataset using Different Data Mining Classifications
Performances Analysis of Heart Disease Dataset using Different Data Mining Classifications Open
nowadays, heart disease is one of the major diseases that cause death. It is a matter for us to concern in today’s highly chaotic life style that leads to various diseases. Early prediction of identification to heart-related diseases has b…
View article: Increasing Smoke Classifier Accuracy using Naïve Bayes Method on Internet of Things
Increasing Smoke Classifier Accuracy using Naïve Bayes Method on Internet of Things Open
This paper proposes fire alarm system by implementing Naïve Bayes Method for increasing smoke classifier accuracy on Internet of Things (IoT) environment. Fire disasters in the building of houses are a serious threat to the occupants of th…
View article: Improving DDoS Detection Accuracy Using Six-Sigma in SDN Environment
Improving DDoS Detection Accuracy Using Six-Sigma in SDN Environment Open
This paper proposes the new method for improving the accuracy of detection of DDoS attacks on the SDN by utilizing control plane using Six-Sigma method. Software-Defined Networking (SDN) is a centralized network control system. This system…
View article: Improving Distributed Denial of Service (DDOS) Detection using Entropy Method in Software Defined Network (SDN)
Improving Distributed Denial of Service (DDOS) Detection using Entropy Method in Software Defined Network (SDN) Open
This research proposed a new method to enhance Distributed Denial of Service (DDoS) detection attack on Software Defined Network (SDN) environment. This research utilized the OpenFlow controller of SDN for DDoS attack detection using modif…
View article: M2M Device Connectivity Framework
M2M Device Connectivity Framework Open
S.441-454
View article: Improving Reliability of Wireless Sensor Network (WSN) Using Network Coding Multipath Routing
Improving Reliability of Wireless Sensor Network (WSN) Using Network Coding Multipath Routing Open
This research proposed new method to improve performance of WSN. It used network coding on transmission scheme. The researcher had modified the existing network coding multipath routing for a novel node selection to own residual power node…
View article: TCP LR-Newreno Congestion Control for IEEE 802.15.4-based Network
TCP LR-Newreno Congestion Control for IEEE 802.15.4-based Network Open
This paper proposes a new method of TCP congestion control for the IEEE 802.15.4 standard.This method, which evolved from TCP Newreno, is to be adopted on an IEEE 802.15.4 based network.The implementation of TCP Newreno on Wireless Sensor …