Didih Rizki Chandranegara
Sepuluh Nopember Institute of Technology
PasswordLoginAlgorithmEuclidean distanceInformation technologyPhysicsData miningData collectionCharacter (computing)Process ontologyOpen Biomedical OntologiesMathematics educationOntology componentsArtificial intelligencePsychologyNetwork packetKeystroke loggingNeighbor Discovery ProtocolOntology (information science)AuthenticationPattern recognitionBiometricsResponse timeOpenFlowClass (computer programming)Ontology-based data integrationStandard deviationInformation retrievalRisk of mortalityHeart failureAnemiaDiseaseNetwork administratorProxy (statistics)Speech recognitionManhattan Distance MethodAcceptance rateSecurity measurementUse of technologyChange over timeNational levelBoarding schoolClassification methodsWaiting timeComputer networkMulticastDescriptive statisticsComputer scienceProcess (engineering)Incidence (epidemiology)DBSCANSuggested Upper Merged OntologyDiabetes mellitusMedicineEjection fractionUpper ontologyControl theoryBlood pressureIPv6Protocol (object-oriented programming)Ontology alignment
12Publications
2H-index
4Citations
Publications 12
Newest
Source
Last. Wildan SuharsoH-Index: 3
view all 3 authors...
Kontrol keuangan yang baik merupakan cara untuk memahami kondisi finansial selain untuk perencanaan masa depan. Salah satu upaya yang dapat dilakukan untuk mengkontrol keuangan adalah dengan cara membuat catatan keuangan yang detil dan cermat. Pencatatan keuangan tersebut dapat membantu seseorang untuk tetap berada pada kondisi keuangan yang stabil sehingga dapat bisa melihat apakah perlu ada pengeluaran yang dikurangi atau menambah tabungan. Namun pada umumnya pencatatan laporan keuangan sepert...
Source
The use of information technology media becomes very important when the needs are increasingly complex or schools are in the development stage because with the use of information technology media teaching and learning activities can be carried out quickly and centrally. In female boarding schools, the use of technology really needs to be considered considering the activities that are so dense both intraculricular and extracurricular activities, on the other hand, Aisyiyah Boarding School Malang ...
Source
view all 3 authors...
Madrasah Muhammadiyah Al-Munawarroh adalah madrasah yang terletak di Malang dan salah satu madrasah yang berkembang. Untuk menunjang perkembangan tersebut, dibuat sebuah website profile yang dapat memberikan informasi kepada masyarakat secara cepat. Metode yang digunakan dalam pembuatan website adalah metode RAD (Rapid Application Development). Metode ini digunakan karena kami ingin melibatkan pihak madrasah dalam pembuatan website, agar website yang dibuat dapat bermanfaat secara penuh dan sesu...
Source
#2Sofyan ArifiantoH-Index: 1
Last. Hardianto WibowoH-Index: 2
view all 3 authors...
Perkembangan transportasi udara saat ini semakin meningkat, sehingga data yang disediakan juga semakin banyak. Oleh karena itu perlu dilakukan analisa-analisa terkait data penerbangan yang ada. Sehingga hasil analisa tersebut sangat berguna sebagai bahan evaluasi pihak otoritas penerbangan. Penelitian ini melakukan analisa terhadap data pesawat yang di sebarkan secara periodik menggunakan sistem yang bernama Automatic Dependent Surveillance-Broadcast (ADS-B). Hasil dari penelitian ini menunjukka...
Source
Account security was determined by how well the security techniques applied by the system were used. There had been many security methods that guaranteed the security of their accounts, one of which was Keystroke Dynamic Authentication. Keystroke Dynamic Authentication was an authentication technique that utilized the typing habits of a person as a security measurement tool for the user account. From several research, the average use in the Keystroke Dynamic Authentication classification is not ...
2 CitationsSource
#2Wildan SuharsoH-Index: 3
view all 5 authors...
Laptop adalah komputer bergerak (bisa dipindahkan dengan mudah) yang berukuran relatif kecil dan ringan, beratnya berkisar dari 1-6 kg, tergantung ukuran, bahan, dari spesifikasi laptop tersebut, laptop dapat digunakan dalam lingkungan yang berbeda dari bermain game, desain grafis dll. Dengan berkembangnya teknologi mobile saat ini menjadikan jenis dan merk laptop semakin banyak. Tujuan dari penelitian ini menerapkan metode weighted product pada sistem pendukung keputusan pemilihan pembelian lap...
Source
view all 4 authors...
The implementation of Neighbor Discovery Protocol (NDP) in OpenFlow network was handled specifically by three different methods including the learning switch, reactive proxy, and proactive mechanism. All of the specified approaches still raised problems either consuming the controller’s resources or forcing manual adjustment by the network administrator. This paper combined both reactive and proactive manner by deploying an application called Hybrid NDP proxy (HNDPP). The controller stored all i...
Source
A significant method should be deployed in OpenFlow environment for reducing the complexity during the implementation of IPv6 neighbor discovery protocol (NDP) in multicast manner. This paper was performed for deploying reactive-based application in controller’s northbound layer for handling as well as cutting the Neighbor solicitation packet’s journey. The application had a capability for storing each of the incoming Neighbor Solicitation (NS) and Neighbor Advertisement (NA) packet information....
2 CitationsSource
Keystroke Dynamic Authentication used a behavior to authenticate the user and one of biometric authentication. The behavior used a typing speed a character on the keyboard and e very user had a unique behavior in typing. To improve classification between user and attacker of Keystroke Dynamic Authentication i n this research, we proposed a combination of MHR (Mean of Horner’s Rules) and standard deviation. The results of this research showed that our proposed method gave a high accuracy ( 93.872...
Source