22   Artículos

 
en línea
Muhammad Idris, Iwan Syarif, Idris Winarno     Pág. 246 - 261
The trend of API-based systems in web applications in the last few years keeps steadily growing. API allows web applications to interact with external systems to enable business-to-business or system-to-system integration which leads to multiple applicat... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Aidil Saputra Kirsan, Udin Harun Al Rasyid, Iwan Syarif, Dian Neipa Purnamasari     Pág. 1 - 18
Energy usage on nodes is still a hot topic among researchers on wireless sensor networks. This is due to the increasing technological development increasing information requirements and caused the occurrence of information exchange continuously without s... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Agus Priyo Utomo, Idris Winarno, Iwan Syarif     Pág. 49 - 66
Currently, cloud computing technology is implemented by many industries in the world. This technology is very promising due to many companies only need to provide relatively smaller capital for their IT infrastructure. Virtualization is the core of cloud... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Masfu Hisyam, Ali Ridho Barakbah, Iwan Syarif, Ferry Astika S     Pág. 83 - 104
Internet attacks are a frequent occurrence and the incidence is always increasing every year, therefore Matagaruda project is built to monitor and analyze internet attacks using IDS (Intrusion Detection System). Unfortunately, the Matagaruda project has ... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Mohammad Robihul Mufid, M. Udin Harun Al Rasyid, Iwan Syarif     Pág. 176 - 199
A number of routing protocol algorithms such as Low-Energy Adaptive Clustering Hierarchy (LEACH) and Power-Efficient Gathering in Sensor Information Systems (PEGASIS) have been proposed to overcome the problem of energy consumption in Wireless Sensor Net... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Muhlis Tahir, Tessy Badriyah, Iwan Syarif     Pág. 236 - 253
Preeclampsia is a pregnancy abnormality that develops after 20 weeks of pregnancy characterized by hypertension and proteinuria.  The purpose of this research was to predict the risk of preeclampsia level in pregnant women during pregnancy process ... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Hilmy Assodiky, Iwan Syarif, Tessy Badriyah     Pág. 75 - 91
Arrhythmia is a heartbeat abnormality that can be harmless or harmful. It depends on what kind of arrhythmia that the patient suffers. People with arrhythmia usually feel the same physical symptoms but every arrhythmia requires different treatments. For ... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Yufri Isnaini Rochmat Maulana, Tessy Badriyah, Iwan Syarif     Pág. 151 - 167
Diabetes is a very serious chronic. Diabetes can occurs when the pancreas doesn't produce enough insulin (a hormone used to regulate blood sugar), cause glucose in the blood to be high. The purpose of this study is to provide a different approach in deal... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Tresna Maulana Fahrudin, Iwan Syarif, Ali Ridho Barakbah     Pág. 36 - 71
Breast cancer is the second highest cancer type which attacked Indonesian women. There are several factors known related to encourage an increased risk of breast cancer, but especially in Indonesia that factors often depends on the treatment routinely. T... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Iwan Syarif     Pág. 277 - 290
This paper describes the advantages of using Evolutionary Algorithms (EA) for feature selection on network intrusion dataset. Most current Network Intrusion Detection Systems (NIDS) are unable to detect intrusions in real time because of high dimensional... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »