The accuracy comparison among word2vec, glove, and fasttext towards convolution neural network (cnn) text classification EM Dharma, FL Gaol, H Warnars, B Soewito J Theor Appl Inf Technol 100 (2), 31, 2022 | 135 | 2022 |
A Proposed surveillance model in an Intelligent Transportation System (ITS) AS Putra, HLHS Warnars, FL Gaol, B Soewito, E Abdurachman 2018 Indonesian association for pattern recognition international conference …, 2018 | 104 | 2018 |
A systematic literature review: Critical success factors to implement enterprise architecture R Ansyori, N Qodarsih, B Soewito Procedia Computer Science 135, 43-51, 2018 | 94 | 2018 |
Software metrics for fault prediction using machine learning approaches: A literature review with PROMISE repository dataset S Karim, HLHS Warnars, FL Gaol, E Abdurachman, B Soewito 2017 IEEE international conference on cybernetics and computational …, 2017 | 79 | 2017 |
Attendance system on Android smartphone B Soewito, FL Gaol, E Simanjuntak, FE Gunawan 2015 International Conference on Control, Electronics, Renewable Energy and …, 2015 | 57 | 2015 |
Smart mobile attendance system using voice recognition and fingerprint on smartphone B Soewito, FL Gaol, E Simanjuntak, FE Gunawan 2016 International Seminar on Intelligent Technology and Its Applications …, 2016 | 52 | 2016 |
Logistic models for classifying online grooming conversation H Pranoto, FE Gunawan, B Soewito Procedia Computer Science 59, 357-365, 2015 | 51 | 2015 |
A review of collisions in cryptographic hash function used in digital forensic tools ZE Rasjid, B Soewito, G Witjaksono, E Abdurachman Procedia computer science 116, 381-392, 2017 | 48 | 2017 |
Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework K Razikin, B Soewito Egyptian Informatics Journal 23 (3), 383-404, 2022 | 44 | 2022 |
A systematic literature Review: Risk analysis in cloud migration B Soewito, FL Gaol, E Abdurachman Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022 | 44 | 2022 |
Websocket to support real time smart home applications B Soewito, FE Gunawan, IGP Kusuma Procedia Computer Science 157, 560-566, 2019 | 44 | 2019 |
Survey on threats and risks in the cloud computing environment E Abdurachman, FL Gaol, B Soewito Procedia Computer Science 161, 1325-1332, 2019 | 42 | 2019 |
Django web framework software metrics measurement using radon and pylint S Liawatimena, HLHS Warnars, A Trisetyarso, E Abdurahman, B Soewito, ... 2018 Indonesian Association for Pattern Recognition International Conference …, 2018 | 38 | 2018 |
Information security maturity model: A best practice driven approach to PCI DSS compliance S Yulianto, C Lim, B Soewito 2016 IEEE Region 10 Symposium (TENSYMP), 65-70, 2016 | 35 | 2016 |
IoT security system with modified Zero Knowledge Proof algorithm for authentication B Soewito, Y Marcellinus Egyptian Informatics Journal 22 (3), 269-276, 2021 | 33 | 2021 |
Software quality model for Internet of Things governance JJC Tambotoh, SM Isa, FL Gaol, B Soewito, HLHS Warnars 2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016 | 31 | 2016 |
Automatic sleep stage classification using weighted ELM and PSO on imbalanced data from single lead ECG OK Utomo, N Surantha, SM Isa, B Soewito Procedia Computer Science 157, 321-328, 2019 | 29 | 2019 |
Usability testing method in augmented reality application H Pranoto, C Tho, HLHS Warnars, E Abdurachman, FL Gaol, B Soewito 2017 International Conference on Information Management and Technology …, 2017 | 28 | 2017 |
Detecting online child grooming conversation FE Gunawan, L Ashianti, S Candra, B Soewito 2016 11th International Conference on Knowledge, Information and Creativity …, 2016 | 28 | 2016 |
Software size measurement of knowledge management portal with use case point K Iskandar, FL Gaol, B Soewito, HLHS Warnars, R Kosala 2016 International Conference on Computer, Control, Informatics and its …, 2016 | 27 | 2016 |