Klaim Artikel Anda
Verifikasi kepemilikan artikel akademik
Apakah artikel-artikel ini milik Anda?
Daftarkan diri Anda sebagai author untuk mengklaim artikel dan dapatkan profil akademik terverifikasi dengan fitur lengkap.
Badge Verifikasi
Profil terverifikasi resmi
Statistik Lengkap
H-index, sitasi, dan metrik
Visibilitas Tinggi
Tampil di direktori author
Kelola Publikasi
Dashboard artikel terpadu
Langkah-langkah Klaim Artikel:
- 1. Daftar akun author dengan email akademik Anda
- 2. Verifikasi email dan lengkapi profil
- 3. Login dan buka menu "Klaim Artikel"
- 4. Cari dan klaim artikel Anda
- 5. Tunggu verifikasi dari admin (1-3 hari kerja)
Menampilkan 1–10 dari 10 artikel
Predicting First-Year Student Performance with SMOTE-Enhanced Stacking Ensemble and Association Rule Mining for University Success Profiling
Kikunda, Philippe Boribo
; Kasongo, Issa Tasho
; Nsabimana, Thierry
; Ndikumagenge, Jérémie
; Ndayisaba, Longin
; Mushengezi, Elie Zihindula
; Kala, Jules Raymond
Journal of Computing Theories and Applications
Vol 3
, No 2
(2025)
This study examines the application of Educational Data Mining (EDM) to predict the academic per-formance of first-year students at the Catholic University of Bukavu and the Higher Institute of Edu-cation (ISP) in the Democratic Republic of Congo. The primary objective is to develop a model that can identify at-risk students early, providing the university with a tool to enhance student support and academic guidance. To address the challenges posed by data imbalance (where successful cases outnu...
Sumber Asli
Google Scholar
DOI
SOSIALISASI PERANCANGAN PLC MENGGUNAKAN RASPBERRY PICO UNTUK PEMBELAJARAN SISWA SMK
Inovasi Teknologi Informasi Dan Komputer Untuk Masyarakat
Vol 5
, No 2
(2025)
This community service program was implemented to introduce alternative learning of programming using Programmable Logic Controller. The problem of vocational high school students is the ability to have hardware independently and continuous learning outside of school hours. This activity includes socialization, theory and direct practice on how to make Raspberry Pico into Mitsubishi FX1N PLC. The methods used include socialization, theory and direct practice starting from configuring Raspberry P...
Sumber Asli
Google Scholar
DOI
Explainable Bayesian Network Recommender for Personalized University Program Selection
Journal of Computing Theories and Applications
Vol 3
, No 1
(2025)
In a context where students face increasingly complex academic choices, this work proposes a recommendation system based on Bayesian networks to guide new baccalaureate holders in their university choices. Using a dataset containing variables such as secondary school section, gender, type of school, percentage obtained, age, and first-year honors, we have constructed a probabilistic model capturing the dependencies between these characteristics and the option chosen. The data is collected at the...
Sumber Asli
Google Scholar
DOI
Penggunaan Audio Visual Wordwall dalam Peningkatan Motivasi Belajar Siswa di Sanggar Bimbingan Permai Kulim Malaysia
Karunia: Jurnal Hasil Pengabdian Masyarakat Indonesia
Vol 4
, No 1
(2025)
This research has objective to examine the use of audiovisual media, specifically the term platform wall, to motivate students at Permai Guidance Studio, Kulim, Malaysia. The method used was a participatory approach where both teachers and students are actively involved in the learning process. actively in the learning process. The activity started with socialisation on the importance of using audiovisual learning aids, followed by with training for teachers to use WordWall in their classrooms....
Sumber Asli
Google Scholar
DOI
A Comparative Analysis of Supervised Machine Learning Algorithms for IoT Attack Detection and Classification
Journal of Computing Theories and Applications
Vol 2
, No 3
(2025)
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges, necessitating robust attack detection mechanisms. This study presents a comprehensive comparative analysis of ten supervised learning algorithms for IoT attack detection and classification, addressing the critical challenge of balancing detection accuracy with practical deployment constraints. Using the CICIoT2023 dataset, encompassing data from 105 IoT devices and 33 attack types, we evaluate N...
Sumber Asli
Google Scholar
DOI
A Comprehensive Approach to Protocols and Security in Internet of Things Technology
Journal of Computing Theories and Applications
Vol 2
, No 3
(2024)
The exponential growth of the Internet of Things (IoT) introduces a multitude of security challenges, as a vast number of connected devices often operate with inadequate protection measures. This vulnerability heightens the risk of cyberattacks, data breaches, and hacking, exposing systems and sensitive information to increased threats. Ensuring security in the IoT ecosystem while considering this rapidly expanding technology's physical limitations and specific requirements is a complex task. Th...
Sumber Asli
Google Scholar
DOI
Behavior of Concrete Structures of 5-storey Shopping and Residence Buildings due to Earthquakes using Spectrum Response Analysis
Kusbiantoro, Arief
; Kusumawardani, Rini
; Taveriyanto, Arie
; Agung Hermawan, Indra
; Danuaji Syahdani, Raka
; Jati Priantoro, Wisnu
; Restu Bachtiar, M. Vicky
; Ageng, Sultan
; Rizaldi Fadillah, Akhmad
; Rio Pratama, Anggy
Jurnal Teknik Sipil
Vol 17
, No 1
(2024)
The 5-storey building with 20 meters high and is located in Jakarta, a building that functions as a shop and residence. As a high-rise building, earthquake analysis of the building is required to determine the seismic pattern using the response spectrum method. The spectrum response method is used to determine the structural performance and compare static analysis and dynamic analysis based on SNI 1726-2019. Then the results obtained for each frame use a combination of cases (static + seismic),...
Sumber Asli
Google Scholar
DOI
Pengaruh Positif Implementasi Kurikulum Merdeka pada Pembelajaran Anak di Ra An-Nur
Sinar Dunia: Jurnal Riset Sosial Humaniora dan Ilmu Pendidikan
Vol 3
, No 1
(2024)
One of the most important and often overlooked parts of education is the curriculum. The implementation of an independent curriculum program is demonstrated by the success of teachers and students who are able to contribute to learning success through collaboration. The purpose of this study is to determine the positive effects of the implementation of an independent (independent) curriculum on learning in RA Anna School in order to improve the implementation of the independent curriculum and ma...
Sumber Asli
Google Scholar
DOI
Web Phishing Classification using Combined Machine Learning Methods
Journal of Computing Theories and Applications
Vol 1
, No 1
(2023)
Phishing is a crime that uses social engineering techniques, both in deceptive statements and technically, to steal consumers' personal identification data and financial account credentials. With the new Phishing machine learning approach, websites can be recognized in real-time. K-Nearest Neighbor(KNN) and Naïve Bayes (NB) are popular machine learning approaches. KNN and NB have their own strengths and weaknesses. By combining the two, deficiencies can be covered. So this study proposes to comb...
Sumber Asli
Google Scholar
DOI
19 Sitasi
PENGAWASAN TERHADAP WARGA NEGARA ASING OLEH KANTOR IMIGRASI KELAS 1 SURAKARTA DALAM ASEAN ECONOMIC COMMUNITY
Transformasi: Jurnal Ilmu-Ilmu Sosial
Vol 1
, No 30
(2017)
The context of the ASEAN Economic Community led to the freedom of movement ofprofessionals, business people, and workers in the ASEAN region, and with that aspects of theseinterests has been the holding of the Meeting of the ASEAN Directors-General of ImmigrationDepartment and Heads of Consular Affairs Divicions of the Ministries of Foreighn Affairsregarding ASEAN Framework Agreement on visa Exemtion . The meeting was a transboundaryfacilities for workers, businesses, and professionals to undert...
Sumber Asli
Google Scholar