Yesi Novaria Kunang
Sriwijaya University
AutoencoderHyperparameter optimizationDeep learningEngineering managementEfficient XML InterchangeMachine learningEngineeringWorld Wide WebArtificial intelligencePattern recognitionInformation systemInformation retrievalRelational database management systemData scienceXml dataWeather dataIntrusion detection systemComputer scienceStreaming XMLArtificial neural networkFeature extractionDocumentationDatabaseIdentification (information)HyperparameterServer
52Publications
4H-index
48Citations
Publications 43
Newest
The rapid development of deep learning improves the detection and classification of attacks on intrusion detection systems. However, the unbalanced data issue increases the complexity of the architecture model. This study proposes a novel deep learning model to overcome the problem of classifying multi-class attacks. The deep learning model consists of two stages. The pre-tuning stage uses automatic feature extraction with a deep autoencoder. The second stage is fine-tuning using deep neural net...
Source
#1Yesi Novaria Kunang (Sriwijaya University)H-Index: 4
#2Siti Nurmaini (Sriwijaya University)H-Index: 10
Last. Bhakti Yudho SupraptoH-Index: 4
view all 4 authors...
Abstract A network intrusion detection system (NIDS) is a solution that mitigates the threat of attacks on a network. The success of a NIDS depends on the success of its algorithm and the performance of its method in recognizing attacks. We propose a deep learning intrusion detection system (IDS) using a pretraining approach with deep autoencoder (PTDAE) combined with a deep neural network (DNN). Models were developed using hyperparameter optimization procedures. This research provides an altern...
6 CitationsSource
#2Siti Nurmaini (Sriwijaya University)H-Index: 10
Last. Bhakti Yudho Suprapto (Sriwijaya University)H-Index: 4
view all 4 authors...
The growth of the Internet of Things (IoT) presents challenges in the field of security. The Intrusion Detection System is an alternative to protecting the internet of things. In this study, we propose an intrusion detection system model that combines unsupervised algorithm and a deep neural network. Autoencoder as unsupervised learning algorithm has a function as a feature extractor that speeds up the learning process on a deep neural network. The performance of a deep learning model depends he...
Source
This research is a case study of Search Engine Optimization (SEO) in Palembang Polytechnic of Tourism website. The main objective of this research is to establish a plan for SEO in Palembang Polytechnic of Tourism (http://poltekpar-palembang.ac.id/), to improve online visibility and ranking position in search engines (Google). It aims to bring in more international traffic and international students to visit the website. SEO is a digital marketing technique that contributes to increasing web acc...
3 CitationsSource
#1Beni BraharaH-Index: 1
#2Dedy SyamsuarH-Index: 2
Last. Yesi Novaria KunangH-Index: 4
view all 3 authors...
University of Bina Darma Palembang has its own DNS server and in this study using log data from the Bina Darma University DNS server as data in the study, DNS log server data is analyzed by network traffic, using Network Analyzer tools to see the activity of a normal traffic or anomaly traffic, or even contains DGA Malware (Generating Algorthm Domain).DGA malware produces a number of random domain names that are used to infiltrate DNS servers. To detect DGA using DNS traffic, NXDomain. The resul...
1 CitationsSource
#2Dedy SyamsuarH-Index: 2
Last. Yesi Novaria KunangH-Index: 4
view all 3 authors...
Abstract: The inability of students to complete their studies on time is faced by most of higher education institution. STMIK Bina Nusantara Jaya Lubuklinggau is one of those which is experienced with this matter. In most cases, the students could complete their studies longer than the expected duration. From 162 students of Sistem Informasi study program in the year 2013 and 2014 there were 117 students completed their studies on time, while 45 students were late. As a result, it could prevent ...
Source
#2Dedy SyamsuarH-Index: 2
Last. Yesi Novaria KunangH-Index: 4
view all 3 authors...
Information technology has become an essential part of human life so as to facilitate a business activity. However, the use of information technology is not separated from the risks that can affect the process of the activity. As for the purpose of this study was to conduct an assessment of risk against potential vulnerabilities and threats that can attack the academic information system E-University all at once mempersiapan action anticipation towards things that can interfere with the the syst...
Source
Last. Susan Dian PurnamasariH-Index: 2
view all 3 authors...
Weather is a short air condition. Therefore, the role of weather forecasting is very much needed considering the number of activities and activities of humans that depend on the weather. Because of this, the processing of weather data must be done quickly and accurately. Therefore, the use of data mining is needed to solve this problem, one of them is a regression model. Regression models are a type of method that predicts predictive data through straight lines as a correlation between 2 variabl...
Last. Ari MuzakirH-Index: 2
view all 3 authors...
Weather station/alat pemantau cuaca adalah alat yang digunakan untuk mengukur, memantau, mendekteksi perubahan cuaca secara realtime, biasanya memenuhi beberapa fungsi, arah dan kecepatan angin, kelembapan udara, suhu udara,data yang dihasilkan oleh alat weather station, berupa output angka sehingga akan kesulitan dalam membaca data tersebut. Alat weather staion tersebut terletak di salah satu universitas dipalembang, yaitu universitas Bina Darma Palembang, akan tetapi data yang dihasilkan alat ...
#2Dedy SyamsuarH-Index: 2
Last. Yesi Novaria KunangH-Index: 4
view all 3 authors...
Hampir semua organisasi menggunakan Teknologi Informasi untuk menjalankan bisnisnya. Dengan menerapkan teknologi informasi diharapkan mampu meningkatkan efisiensi dan efektifitas dari kegiatan bisnis. Selain memberikan manfaat tentunya tidak bisa di pungkiri penerapan teknologi rentan terhadap risiko yang merugikan yang dapat mengganggu keberlangsungan proses bisnis bersangkutan begitu pula dengan penerapan teknologi informasi di perguruan tinggi. Maka dari itu, penelitian ini dilakukan untuk me...