The accuracy comparison among word2vec, glove, and fasttext towards convolution neural network (cnn) text classification EM Dharma, FL Gaol, H Warnars, B Soewito J Theor Appl Inf Technol 100 (2), 31, 2022 | 142 | 2022 |
A Proposed surveillance model in an Intelligent Transportation System (ITS) AS Putra, HLHS Warnars, FL Gaol, B Soewito, E Abdurachman 2018 Indonesian association for pattern recognition international conference …, 2018 | 105 | 2018 |
A systematic literature review: Critical success factors to implement enterprise architecture R Ansyori, N Qodarsih, B Soewito Procedia Computer Science 135, 43-51, 2018 | 98 | 2018 |
Software metrics for fault prediction using machine learning approaches: A literature review with PROMISE repository dataset S Karim, HLHS Warnars, FL Gaol, E Abdurachman, B Soewito 2017 IEEE international conference on cybernetics and computational …, 2017 | 81 | 2017 |
Attendance system on Android smartphone B Soewito, FL Gaol, E Simanjuntak, FE Gunawan 2015 International Conference on Control, Electronics, Renewable Energy and …, 2015 | 58 | 2015 |
Smart mobile attendance system using voice recognition and fingerprint on smartphone B Soewito, FL Gaol, E Simanjuntak, FE Gunawan 2016 International Seminar on Intelligent Technology and Its Applications …, 2016 | 52 | 2016 |
Logistic models for classifying online grooming conversation H Pranoto, FE Gunawan, B Soewito Procedia Computer Science 59, 357-365, 2015 | 51 | 2015 |
Websocket to support real time smart home applications B Soewito, FE Gunawan, IGP Kusuma Procedia Computer Science 157, 560-566, 2019 | 49 | 2019 |
A review of collisions in cryptographic hash function used in digital forensic tools ZE Rasjid, B Soewito, G Witjaksono, E Abdurachman Procedia computer science 116, 381-392, 2017 | 49 | 2017 |
Survey on threats and risks in the cloud computing environment E Abdurachman, FL Gaol, B Soewito Procedia Computer Science 161, 1325-1332, 2019 | 47 | 2019 |
Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework K Razikin, B Soewito Egyptian Informatics Journal 23 (3), 383-404, 2022 | 45 | 2022 |
A systematic literature Review: Risk analysis in cloud migration B Soewito, FL Gaol, E Abdurachman Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022 | 45 | 2022 |
Django web framework software metrics measurement using radon and pylint S Liawatimena, HLHS Warnars, A Trisetyarso, E Abdurahman, B Soewito, ... 2018 Indonesian Association for Pattern Recognition International Conference …, 2018 | 40 | 2018 |
Information security maturity model: A best practice driven approach to PCI DSS compliance S Yulianto, C Lim, B Soewito 2016 IEEE Region 10 Symposium (TENSYMP), 65-70, 2016 | 39 | 2016 |
IoT security system with modified Zero Knowledge Proof algorithm for authentication B Soewito, Y Marcellinus Egyptian Informatics Journal 22 (3), 269-276, 2021 | 38 | 2021 |
Automatic sleep stage classification using weighted ELM and PSO on imbalanced data from single lead ECG OK Utomo, N Surantha, SM Isa, B Soewito Procedia Computer Science 157, 321-328, 2019 | 31 | 2019 |
Software quality model for Internet of Things governance JJC Tambotoh, SM Isa, FL Gaol, B Soewito, HLHS Warnars 2016 International Conference on Data and Software Engineering (ICoDSE), 1-6, 2016 | 31 | 2016 |
Quality measurement for serious games LKP Suryapranata, B Soewito, GP Kusuma, FL Gaol, HLHS Warnars 2017 International Conference on Applied Computer and Communication …, 2017 | 30 | 2017 |
Usability testing method in augmented reality application H Pranoto, C Tho, HLHS Warnars, E Abdurachman, FL Gaol, B Soewito 2017 International Conference on Information Management and Technology …, 2017 | 28 | 2017 |
Detecting online child grooming conversation FE Gunawan, L Ashianti, S Candra, B Soewito 2016 11th International Conference on Knowledge, Information and Creativity …, 2016 | 28 | 2016 |