Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Erwin Eko Wahyudi"'
Publikováno v:
ComTech, Vol 13, Iss 1, Pp 45-52 (2022)
Many world phenomena lead to nonlinear equations systems. For some applications, the non-linear equations which construct the non-linear equations system are interpolation functions. However, the interpolation functions are usually not represented as
Externí odkaz:
https://doaj.org/article/82f206ff6f3941f399f48d1856af242b
Publikováno v:
Jurnal Ilmiah ILKOMINFO - Ilmu Komputer & Informatika. 6:87-97
Geometri fraktal, juga dikenal sebagai "geometri alam", adalah jenis geometri yang mempelajari geometri tidak beraturan. Karakteristik utama dari geometri fraktal adalah self-similarity, yaitu bagian lain dari fraktal memiliki bentuk yang serupa pada
Numerous advanced techniques including machine learning models are widely used in landslide susceptibility zoning which result in very high accuracy. In some cases, very high accuracy represents an overfitting in the model, where a model adapts very
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a9e4775c0e00d9fbbdd4b3283dbe4f29
https://doi.org/10.5194/egusphere-egu23-11051
https://doi.org/10.5194/egusphere-egu23-11051
Autor:
Danang Sri Hadmoko, Guruh Samodra, Nanang Susyanto, Danang Eko Nuryanto, Andi Dharmawan, Muhammad Auzan, Erwin Eko Wahyudi
Publikováno v:
Journal of Informatics, Information System, Software Engineering and Applications (INISTA). 4:1-12
Akuisisi data, bertujuan untuk mengambil data awal, merupakan salah satu tahapan dalam metodologi penambangan data. Data awal akan diproses menjadi data akhir yang digunakan untuk proses pemodelan, seperti pembuatan model untuk memprediksi potensi te
Autor:
Dzikri Rahadian Fudholi, Erwin Eko Wahyudi, Novia Arum Sari, Linus Randu Danardya, Nurrizky Imani
Publikováno v:
2022 8th International Conference on Science and Technology (ICST).
Autor:
Erwin Eko Wahyudi, Reza Pulungan
Publikováno v:
2018 6th International Conference on Information and Communication Technology (ICoICT).
An improperly designed protocol for sending a message could be vulnerable to an active attacker. A protocol for sending a message is called secure if any attacker cannot obtain the original message. If a protocol is unsecure, an attacker may perform