Articles
Signature Pattern Recognition using Kohonen Network
Nadia Roosmalita Sari, Mohammad Zoqi Sarwani, Yudha Alif Aulia, and Wayan Firdaus Mahmudy
https://doi.org/10.17977/um018v1i22018p39-45
pp. 39 - 45Digit Classification of Majapahit Relic Inscriptionusing GLCM-SVM
Tri Septianto, Endang Setyati, and Joan Santoso
https://doi.org/10.17977/um018v1i22018p46-54
pp. 46 - 54Profiling and Identifying Individual Usersby Their Command Line Usage and Writing Style
Darusalam Darusalam and Helen Ashman
https://doi.org/10.17977/um018v1i22018p55-63
pp. 55 - 63Energy Efficiency Metrics of University Data Centers
Leonel Hernandez, Genett Jimenez, and Piedad Marchena
https://doi.org/10.17977/um018v1i22018p64-73
pp. 64 - 73Change Vulnerability Forecasting for Southeast Asiausing Deep Learning Algorithm
Amelia Ritahani Ismail, Nur 'Atikah Binti Mohd Ali, and Junaida Sulaiman
https://doi.org/10.17977/um018v1i22018p74-78
pp. 74 - 78
