A review of accelerometer sensor and gyroscope sensor in IMU sensors on motion capture IA Faisal, TW Purboyo, ASR Ansori J. Eng. Appl. Sci 15 (3), 826-829, 2019 | 75 | 2019 |
Disaster victims detection system using convolutional neural network (CNN) method DR Hartawan, TW Purboyo, C Setianingsih 2019 IEEE International Conference on Industry 4.0, Artificial Intelligence …, 2019 | 47 | 2019 |
Efficient tag-to-tag near field communication (NFC) protocol for secure mobile payment E Husni, N Basjaruddin, T Purboyo, S Purwantoro, H Ubaya 2011 2nd International Conference on Instrumentation, Communications …, 2011 | 45 | 2011 |
A review of data compression techniques LA Fitriya, TW Purboyo, AL Prasasti International Journal of Applied Engineering Research 12 (19), 8956-8963, 2017 | 40 | 2017 |
Steganography methods on text, audio, image and video: A survey A Febryan, TW Purboyo, RE Saputra International Journal of Applied Engineering Research 12 (21), 10485-10490, 2017 | 33 | 2017 |
A review of image enhancement methods RD Putra, TW Purboyo, LA Prasasti International Journal of Applied Engineering Research 12 (23), 13596-13603, 2017 | 28 | 2017 |
Experimental model for load balancing in cloud computing using throttled algorithm G Ramadhan, TW Purboyo, R Latuconsina, AR Robin International Journal of Applied Engineering Research 13 (2), 1139-1143, 2018 | 27 | 2018 |
A survey on the implementation of image enhancement MN Aziz, TW Purboyo, AL Prasasti Int. J. Appl. Eng. Res 12 (21), 11451-11459, 2017 | 27 | 2017 |
Stomach disorder detection through the iris image using backpropagation neural network AK Dewi, A Novianty, TW Purboyo 2016 international Conference on Informatics and Computing (ICIC), 192-197, 2016 | 27 | 2016 |
A study of histogram equalization techniques for image enhancement B Oktavianto, TW Purboyo International Journal of Applied Engineering Research 13 (2), 1165-1170, 2018 | 26 | 2018 |
A review of various handwriting recognition methods SS Rosyda, TW Purboyo International Journal of Applied Engineering Research 13 (2), 1155-1164, 2018 | 26 | 2018 |
A survey paper of distributed denial-of-service attack in software defined networking (SDN) AP Fajar, TW Purboyo Int. J. Appl. Eng. Res. ISSN 13 (1), 973-4562, 2018 | 22 | 2018 |
A survey paper on botnet attacks and defenses in software defined networking R Hadianto, TW Purboyo Int. J. Appl. Eng. Res 13 (1), 483-489, 2018 | 17 | 2018 |
Heart disorder detection based on computerized iridology using support vector machine LI Permatasari, A Novianty, TW Purboyo 2016 International Conference on Control, Electronics, Renewable Energy and …, 2016 | 17 | 2016 |
A new approach of data hiding in BMP image using LSB steganography and caesar vigenere cipher cryptography I Dewangga, TW Purboyo, RA Nugrahaeni International Journal of Applied Engineering Research 12 (21), 10626-10636, 2017 | 16 | 2017 |
Security metrics: A brief survey TW Purboyo, B Rahardjo 2011 2nd International Conference on Instrumentation, Communications …, 2011 | 16 | 2011 |
Experimental model for load balancing in cloud computing using equally spread current execution load algorithm IN Falisha, TW Purboyo, R Latuconsina, AR Robin Int J Appl Eng Res 13 (2), 1134-1138, 2018 | 12 | 2018 |
Cotton texture segmentation based on image texture analysis using gray level co-occurrence matrix (GLCM) and Euclidean distance FD Aferi, TW Purboyo, RE Saputra Int. J. Appl. Eng. Res 13 (1), 449-455, 2018 | 12 | 2018 |
A proposed design of traffic congestion prediction using ultrasonic sensors MA Prasetyo, R Latuconsina, TW Purboyo Int J Appl Eng Res 13 (1), 434-441, 2018 | 11 | 2018 |
Implementation of image compression using discrete cosine transform (DCT) and discrete wavelet transform (DWT) A Kurniawan, TW Purboyo, AL Prasasti International Journal of Applied Engineering Research 12 (23), 13951-13958, 2017 | 11 | 2017 |