9 articles in this issue
(1) Pascal Maniriho (Rwanda Polytechnic - IPRC Karongi, Rwanda) (2) Leki Jovial Mahoro (Vaal University of Technology, South Africa) (3) Zephanie Bizimana (Rwanda Polytechnic-IPRC Karongi, Rwanda) (4) Ephrem Niyigaba (Rwanda Polytechnic-IPRC Karongi, Rwanda) (5) Tohari Ahmad (Institut Teknologi Sepuluh Nopember (ITS), Indonesia)
Maintaining the privacy and security of confidential information in data communication has always been a major concern. It is because the advancement of information technology is likely to be followed by an increase in cybercrime, such as illegal access t... see more
(1) Agus Sasmito Aribowo (Universitas Pembangunan Nasional "Veteran" Yogyakarta Indonesia, Indonesia) (2) Halizah Basiron (Universiti Teknikal Malaysia Melaka, Malaysia) (3) Noor Fazilla Abd Yusof (Universiti Teknikal Malaysia Melaka, Malaysia) (4) Siti Khomsah (Insitut Teknologi Telkom Purwokerto, Indonesia)
A cross-domain sentiment analysis (CDSA) study in the Indonesian language and tree-based ensemble machine learning is quite interesting. CDSA is useful to support the labeling process of cross-domain sentiment and reduce any dependence on the experts; how... see more
(1) Eihab Abdelkariem Bashir Ibrahim (Centre for Advanced Computing Technology, Universiti Teknikal Malaysia Melaka, Malaysia) (2) Ummi Raba'ah Hashim (Centre for Advanced Computing Technology, Universiti Teknikal Malaysia Melaka, Malaysia) (3) Lizawati Salahuddin (Centre for Advanced Computing Technology, Universiti Teknikal Malaysia Melaka, Malaysia) (4) Nor Haslinda Ismail (Centre for Advanced Computing Technology, Universiti Teknikal Malaysia Melaka, Malaysia) (5) Ngo Hea Choon (Centre for Advanced Computing Technology, Universiti Teknikal Malaysia Melaka, Malaysia) (6) Kasturi Kanchymalay (Centre for Advanced Computing Technology, Universiti Teknikal Malaysia Melaka, Malaysia) (7) Siti Normi Zabri (Centre for Telecommunication Research & Innovation, Universiti Teknikal Malaysia Melaka, Malaysia)
Wood defects detection has been studied a lot recently to detect the defects on the wood surface and assist the manufacturers in having a clear wood to be used to produce a high-quality product. Therefore, the defects on the wood affect and reduce the qua... see more
(1) Aween Abubakr Saeed (Sulaimani Polytechnic University, Iraq) (2) Noor Ghazi Mohammed Jameel (Sulaimani Polytechnic University, Iraq)
The explosive development of information technology is increasingly rising cyber-attacks. Distributed denial of service (DDoS) attack is a malicious threat to the modern cyber-security world, which causes performance disruption to the network servers. It ... see more
(1) Hanafi Hanafi (Universitas Amikom Yogyakarta, Indonesia) (2) Andri Pranolo (Universitas Ahmad Dahlan, Indonesia) (3) Yingchi Mao (Hohai University, China)
Since the first case in 2019, Corona Virus has been spreading all over the world. World Health Organization (WHO) announced that COVID-19 had become an international pandemic. There is an essential section to handle the spreading of the virus by immediate... see more
(1) Isnaini Rosyida (Department of Mathematics, Universitas Negeri Semarang, Indonesia) (2) Suryono Suryono (Department of Doctor of Information System, Universitas Diponegoro, Indonesia)
In a fuzzy set (FS), there is a concept of alpha-cuts of the FS for alpha in [0,1]. Further, this concept was extended into (alpha,delta)-cuts in an intuitionistic fuzzy set (IFS) for delta in [0,1]. One of the expansions of FS and IFS is the picture fuzz... see more
(1) Nabeel Hashim Al-Aaraji (Ministry of Higher Education, Iraq) (2) Safaa Obayes Al-Mamory (College of Business Informatics, University of Information Technology and Communications, Iraq) (3) Ali Hashim Al-Shakarchi (College of Information Technology, University of Babylon, Iraq)
A large spectrum of classifiers has been described in the literature. One attractive classification technique is a Naïve Bayes (NB) which has been relayed on probability theory. NB has two major limitations: First, it requires to rescan the dataset and ap... see more
(1) Nadia Roosmalita Sari (Institut Agama Islam Negeri (IAIN) Tulungagung, Indonesia) (2) Wayan Firdaus Mahmudy (Universitas Brawijaya, Indonesia) (3) Aji Prasetya Wibawa (Universitas Negeri Malang, Indonesia)
Forecasting is a method of predicting past and current data, most often by pattern analysis. A Fuzzy Takagi Sugeno Kang (TSK) study can predict Indonesia's inflation rate, yet with too high error. This study proposes an accuracy improvement based on Evolu... see more
(1) Rahmat Hidayat (Faculty of Computer and Information Technology, Universiti Tun Hussein Onn Malaysia, Malaysia) (2) Iwan Tri Riyadi Yanto (Faculty of Computer and Information Technology, Universiti Tun Hussein Onn Malaysia, Malaysia) (3) Azizul Azhar Ramli (Faculty of Computer and Information Technology, Universiti Tun Hussein Onn Malaysia, Malaysia) (4) Mohd Farhan Md. Fudzee (Faculty of Computer and Information Technology, Universiti Tun Hussein Onn Malaysia, Malaysia)
Phishing is a serious web security problem, and the internet fraud technique involves mirroring genuine websites to trick online users into stealing their sensitive information and taking out their personal information, such as bank account information, u... see more