Abstract is missing.
- Application of Natural Language Processing Using Cosine-Similarity Algorithm in Making Chatbot Information on the New Capital City of the Republic of IndonesiaHarry Tursulistyono Yani Achsan, Deni Kurniawan, Diki Gita Purnama, Quintin Kurnia Dikara Barcah, Yuri Yusyana Astoria. 1-6 [doi]
- Development of Ship Detection Using OPENCV YOLO Method on Unmanned Prototype Boat for Monitoring National SeaA. P. Wibby Aldryani, Hendrana Tjahjadi, Iqbal Ahmad Dahlan, Ikhwannul Kholis, Reza Istoni, Angelita Friskilla Bangun, Anry Christiano Tambunan, Jhon Kristel Sabathino Pigome. 7-12 [doi]
- Modeling Person's Creditworthiness over Their Demography and Personality Appearance in Social MediaAndry Alamsyah, Dian Puteri Ramadhani, Syifa Afina Ekaputri. 13-18 [doi]
- IndoKEPLER, IndoWiki, and IndoLAMA: A Knowledge-enhanced Language Model, Dataset, and Benchmark for the Indonesian LanguageInigo Ramli, Adila Alfa Krisnadhi, Radityo Eko Prasojo. 19-26 [doi]
- Influence of Relief Feature Selection on Random Forest and Support Vector Machine Classification AlgorithmIustisia Natalia Simbolon, Romual Naibaho. 27-32 [doi]
- Modified MultiResUNet for Left Ventricle Segmentation from Echocardiographic ImagesFityan Azizi, Akbar Fathur Sani, Rinto Priambodo, Wisma Chaerul Karunianto, Mgs M. Luthfi Ramadhan, Muhammad Febrian Rachmadi, Wisnu Jatmiko. 33-38 [doi]
- Hierarchical Vision Transformers for Cardiac Ejection Fraction EstimationLhuqita Fazry, Asep Haryono, Nuzulul Khairu Nissa, Sunarno, Naufal Muhammad Hirzi, Muhammad Febrian Rachmadi, Wisnu Jatmiko. 39-44 [doi]
- Mining Digital Traces to Uncover Global Perception of Bali's Topmost DestinationsAndry Alamsyah, Dian Puteri Ramadhani, Herlambang Septiaji Basuseno. 45-50 [doi]
- Change Detection from Areal Imagery Drones Using Siamese U-Net with Spatial Attention ModuleLalu Syamsul Khalid, Grafika Jati, Wahyu Caesarendra, Wisnu Jatmiko. 51-58 [doi]
- Large-scale 3D Point Cloud Semantic Segmentation with 3D U-Net ASPP Sparse CNNNaufal Muhammad Hirzi, Muhammad Anwar Ma'sum, Mahardhika Pratama, Wisnu Jatmiko. 59-64 [doi]
- Software Implementation Performances of Block Ciphers: A Systematic Literature ReviewBaris Berk Zorba, Ali Ziya Alkar, Murat Aydos, Ayça Kolukisa Tarhan. 65-74 [doi]
- Analysis of ECG Image File Encryption using ECDH and AES-GCM AlgorithmPrihatin Oktivasari, Maria Agustin, Rahmat Esa Mohammad Akbar, Asep Kurniawan, Ayu Rosyida Zain, Fachroni Arbi Murad. 75-80 [doi]
- Indonesian Digital Bank Adoption Defence Determination Post-Privacy Data Leakage IssuesMuhammad Alfarizi, Rini Kurnia Sari. 81-88 [doi]
- Implementation of Data Visualization in DefenseManan, Gathut Imam Gunadi, George Royke Deksino. 89-94 [doi]
- Digital Forensic Analysis on Caller ID Spoofing AttackAdam Waluyo, M. T. Setiyo Cahyono, Ahmad Zainudin Mahfud. 95-100 [doi]
- Blockchain Security for 5G Network using Internet of Things DevicesOthman Omran Khalifa, Muhammed Zaharadeen Ahmed, Rashid A. Saeed, Saleh Hussaini, Aisha-Hassan A. Hashim, Elmahdi A. El-Khazmi. 101-106 [doi]
- Anti-Phishing Game Framework Based on Extended Design Play Experience (DPE) Framework as an Educational MediaDikka Aditya Satria Wibawa, Hermawan Setiawan, Girinoto. 107-112 [doi]
- A Secure Lightweight Authentication Scheme in IoT Environment with Perfect Forward and Backward SecrecyE. Haodudin Nurkifli, Tzonelih Hwang. 113-118 [doi]
- OmeTV Pretexting Phishing Attacks: A Case Study of Social EngineeringGirinoto, Dimas Febriyan Priambodo, Tiyas Yulita, R. K. Adek Muhammad Zulkham, A. Fathurrahman Rifqi, A. Shakira Putri. 119-124 [doi]