Setiadi Yazid

According to our database1, Setiadi Yazid authored at least 20 papers between 1992 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Blockchain Based Halal Food Production Tracking.
Proceedings of the 6th International Workshop on Big Data and Information Security, 2021

A Review of Internet Topology Research at the Autonomous System Level.
Proceedings of Sixth International Congress on Information and Communication Technology, 2021

2020
Integrated DLT and non-DLT system design for central bank digital currency.
Proceedings of the SIET '20: 5th International Conference on Sustainable Information Engineering and Technology, 2020

Design of Blockchain-based Electronic Health Records for Indonesian Context: Narrative Review.
Proceedings of the International Workshop on Big Data and Information Security, 2020

Phishing Web Page Detection Methods: URL and HTML Features Detection.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence System, 2020

2019
Performance Analysis of the Symmetric Proxy Re-encryption Scheme.
Proceedings of the 2019 International Workshop on Big Data and Information Security, 2019

Customer Churn Analysis and Prediction Using Data Mining Models in Banking Industry.
Proceedings of the 2019 International Workshop on Big Data and Information Security, 2019

2018
Image Preparation For Steganography Capacity Estimation for Specific Image Genre.
Proceedings of the 2018 International Workshop on Big Data and Information Security, 2018

2017
Telebiometric system for infant and toddler fingerprint recognition.
Proceedings of the International Symposium on Micro-NanoMechatronics and Human Science, 2017

Improving data quality through big data: Case study on big data-mobile positioning data in Indonesia tourism statistics.
Proceedings of the International Workshop on Big Data and Information Security, 2017

Mitigation strategy of sinkhole attack in Wireless Sensor Network.
Proceedings of the International Workshop on Big Data and Information Security, 2017

On preventing bitcoin transaction from money laundering in Indonesia: Analysis and recommendation on regulations.
Proceedings of the International Workshop on Big Data and Information Security, 2017

Identification of Gene Expression Linked to Malignancy of Human Colorectal Carcinoma using Restricted Boltzmann Machines.
Proceedings of the 7th International Conference on Bioscience, 2017

2016
Design DDoS attack detector using NTOPNG.
Proceedings of the International Workshop on Big Data and Information Security, 2016

Comparative study of lightweight secure multiroute communication system in low cost wireless sensor network for CO2 monitoring.
Proceedings of the International Workshop on Big Data and Information Security, 2016

Cancer subtype identification using deep learning approach.
Proceedings of the 2016 International Conference on Computer, 2016

2014
Can smartphones be used to detect an earthquake? Using a machine learning approach to identify an earthquake event.
Proceedings of the IEEE International Systems Conference, 2014

Wavelet denoising and fractal feature selection for classifying simulated earthquake signal from mobile phone accelerometer.
Proceedings of the IEEE 11th International Multi-Conference on Systems, Signals & Devices, 2014

1994
Resource management simulator: a simulation tool for fast reservation protocols.
Proceedings of the Fifth IEEE International Workshop on Computer-Aided Modeling, 1994

1992
Congestion control methods for BISDN.
IEEE Commun. Mag., 1992


  Loading...