Researchers
Staff Details
- ICT ~ Information, Computer And Communications Technology (ICT) ~ Database Technology ~ Data Mining
C0MPUTING SYSTEMS & PROGRAMMING | 2005/2006 |
COMPUTER AND INFORMATION ENG. LABII | 2018/2019 |
COMPUTER AND INFORMATION ENGINEERING LAB I | 2021/2022 2022/2023 |
COMPUTER INFORMATION ENGINEERING LAB II | 2018/2019 |
COMPUTING SYSTEMS & PROGRAMMING | 2006/2007 |
DATA MINING | 2021/2022 2022/2023 |
DATA STRUCTURE AND ALGORITHM DESIGN | 2021/2022 |
DATA STRUCTURE AND PROGRAMMING | 2021/2022 2022/2023 2023/2024 2024-2025 2024/2025 |
DATABASE SYSTEMS | 2019/2020 2022/2023 2023/2024 2024-2025 2024/2025 |
ENGINEERING LAB I | 2006/2007 |
ENGINEERING LAB II | 2006/2007 |
FINAL YEAR PROJECT 1 | 2019/2020 |
FINAL YEAR PROJECT I | 2018/2019 2019/2020 2020/2021 2023/2024 |
FINAL YEAR PROJECT II | 2018/2019 2021/2022 2022/2023 |
INTEGRATED DESIGN PROJECT | 2013/2014 2014/2015 2015/2016 2016/2017 2017/2018 |
MICROPROCESSORS AND INTERFACING | 2013/2014 |
OBJECT ORIENTED PROGRAMMING | 2006/2007 |
OBJECT ORIENTED PROGRAMMING FOR ENGINEERS | 2006/2007 |
OBJECT ORIENTED PROGRAMMING WITH JAVA | 2018/2019 2019/2020 2022/2023 2023/2024 |
OPERATING SYSTEMS | 2012/2013 2013/2014 2014/2015 2015/2016 2016/2017 |
PROGRAMMING FOR ENGINEERS | 2012/2013 2013/2014 2014/2015 2015/2016 2016/2017 2017/2018 |
SELECTED TOPICS IN COMPUTER AND INFORMATION ENGINEERING | 2018/2019 |
SELECTED TOPICS IN COMPUTER TECHNOLOGY | 2015/2016 2016/2017 2017/2018 2018/2019 |
SEMINAR | 2005/2006 |
SOFTWARE ENGINEERING | 2018/2019 |
SOFTWARE ENGINEERING DESIGN | 2018/2019 |
Completed |
|
---|---|
2016 - 2019 | Investigation of Novel Algorithm using Features of Respiratory Sounds Abnormalities for Detection of Lung Cancer |
2016 - 2019 | Investigation of Novel Algorithm using Features of Respiratory Sounds Abnormalities for Detection of Lung Cancer |
2015 - 2018 | An Efficient Algorithm on Lossless Audio Compression using Optimized Linear Predictor and Entropy Coding for Multichannel Quranic Audio Recitation |
2015 - 2018 | An Efficient Algorithm on Lossless Audio Compression using Optimized Linear Predictor and Entropy Coding for Multichannel Quranic Audio Recitation |
2014 - 2019 | An Efficient Algorithm to Discover Large and Frequent Itemset in High Dimensional Data |
2014 - 2019 | An Efficient Algorithm to Discover Large and Frequent Itemset in High Dimensional Data |
2013 - 2016 | Discovering Colossal Closed Itemsets from High Dimensional Datasets |
2013 - 2016 | Discovering Colossal Closed Itemsets from High Dimensional Datasets |
Article |
|
---|---|
2021 | An efficient fuzzy C-least median clustering algorithm. IOP Conference Series: Materials Science and Engineering , 1070 pp.1-11 |
2019 | Improved BVBUC algorithm to discover closed itemsets in long biological datasets. Applied Mechanics and Materials , 892 pp.157-167 |
2018 | On the review and setup of security audit using Kali Linux. Indonesian Journal of Electrical Engineering and Computer Science , 11 (1) pp.51-59 |
2018 | RARE: mining colossal closed itemset in high dimensional data. Knowledge-Based Systems , 161 pp.1-11 |
2017 | Towards scalable algorithm for closed itemset mining in high-dimensional data. Indonesian Journal of Electrical Engineering and Computer Science , 8 (2) pp.487-494 |
2017 | The distribution of path loss exponent in 3D indoor environment. International Journal of Applied Engineering Research , 12 (18) pp.7154-7161 |
Conference or Workshop Item |
|
2019 | Frequent itemset mining in high dimensional data: a review. In: 5th International Conference on Computational Science and Technology (ICCST 2018) |
2018 | Analysis of THUG: a low-interaction client honeypot to identify malicious websites and malwares. In: 2018 7th International Conference on Computer and Communication Engineering (ICCCE) |
2018 | HYBRID: an efficient unifying process to mine frequent itemsets. In: 2017 IEEE 3rd International Conference on Engineering Technologies and Social Sciences (ICETSS) |
2017 | STCM: Secured trust-based communication method in vulnerable mobile adhoc network. In: The 9th International Conference on Robotic, Vision, Signal Processing and Power Applications (RoViSP 2016) |
2017 | JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in mobile adhoc network. In: SAI Intelligent Systems Conference (IntelliSys) 2016 |
2016 | STCM: secured trust-based communication method in vulnerable mobile adhoc network. In: 9th International Conference on Robotic, Vision, Signal Processing and Power Applications, RoViSP 2016 |
2015 | SSM: Secure-Split-Merge data distribution in cloud infrastructure. In: 2015 IEEE Conference on Open Systems (ICOS) |
Book |
|
Book Section |
|
2021 | Identification of interested web users using decision tree classifier. In: Advances in electrical and computer technologies Springer Nature Singapore . ISBN 978-981-15-9018-4 , pp.143-156 |
2013 | DisClose: Discovering colossal closed itemsets via a memory efficient compact row-tree. In: Emerging Trends in Knowledge Discovery and Data Mining Springer Berlin Heidelberg . ISBN 978-3-642-36777-9 , pp.141-156 |
Advanced Search