Room 1 |
1 |
Aditya Pradana |
Enhancing IoT Security: A Comprehensive Review of Lightweight Security Mechanisms for IoT |
1 |
1 |
13.00-13.40 |
2 |
Ati Suci Dian Martha |
Examining Usability and Student Experience of ChatGPT as a Learning Tool on Moodle in Higher Education |
1 |
1 |
13.00-13.40 |
3 |
sonny hendra sudaryana |
Strategic Policy for Enhancing the Success Rate of Digital Startups in Indonesia |
1 |
1 |
13.00-13.40 |
4 |
Octavia, Win Ce |
Smart Wearable and Application for Health Monitoring Purposes Utilizing Arduino Sensors |
1 |
2 |
13.40-14.20 |
5 |
Imam Syafganti |
Examining the orientation of sustainability communication on official tourism websites by using an automated checklist |
1 |
2 |
13.40-14.20 |
6 |
M.Fajri Davyza Chaniago |
What Non-User-Generated Content Drives Instagram Influencer Fame?: A Data-Driven Perspective |
1 |
2 |
13.40-14.20 |
7 |
Muhammad Dzifii Hasibuan |
Analyzing the Impact of Cybersecurity Policies on Individual's Behavior Through the Lens of Regulatory Focus Theory |
1 |
3 |
14.20-15.00 |
8 |
Generosa Lukhayu Pritalia |
An Empirical Study on Internet Gaming Disorder (IGD) Among Indonesian Esports Players |
1 |
3 |
14.20-15.00 |
9 |
Glory Cornelia Patining Kurik |
Sign Language System For The Deaf Using Mediapipe Based On The Long-Short Term Memory Method |
1 |
3 |
14.20-15.00 |
10 |
Jennifer Patricia and Ghinaa Zain Nabiilah |
Mental Disorder Indication Detection With Transformer Model Architecture |
1 |
4 |
15.00-15.40 |
Room 2 |
1 |
Abdullah Billman |
The Influence of Social Adaptability Skills and Social Environment on Students Towards AIEd and the Learning Environment Both Directly and Indirectly |
2 |
1 |
13.00-13.40 |
2 |
Ahmad Julian Rifqi |
Comparison of Convolutional Neural Network and MobileNetV2 for Potato Leaf Disease Detection |
2 |
1 |
13.00-13.40 |
3 |
Alfonsius Berly |
Data Quality Metrics for State Civil Apparatus: A Disparity Perspective |
2 |
1 |
13.00-13.40 |
4 |
Aliya Fakhira Zahra |
Factors Influencing Student Compliance With University Information Security Policies in Indonesia Using the Unified Model Information Security Policy Compliance (UM-ISPC) |
2 |
2 |
13.40-14.20 |
5 |
Andri Wijaya |
A Novel Cyber Threat Intelligence (CTI) Framework for Detecting Android Malware: Work on Progress |
2 |
2 |
13.40-14.20 |
6 |
Andria Arisal |
HPC in Containers - A Containerized Parallel Environment for Parallel Programming Learning Using Docker |
2 |
2 |
13.40-14.20 |
7 |
Arif Rahman Hakim |
A Comparative Analysis of Cross-Classifiers with Resampled Datasets for Exfiltration Attacks |
2 |
3 |
14.20-15.00 |
8 |
Asep Deffy Ciftady |
Cross-Domain Ontology Keyword Detection for Paper Recommendation |
2 |
3 |
14.20-15.00 |
9 |
Audi Shafa Rani |
Online Security Behavior Among Students : Factors Influencing Intention to Adopt Two-Factor Authentication (2FA) With Protection Motivation Theory |
2 |
3 |
14.20-15.00 |
10 |
Bilal Hidayaturrohman |
Exploring CNN-BiLSTM in Forecasting Tourist Arrivals |
2 |
4 |
15.00-15.40 |
11 |
Btari Salwa Larasati |
Train Arrival Delay Prediction by Capturing Spatial and Temporal Features of Train Data Sensor |
2 |
4 |
15.00-15.40 |
12 |
Calista Esperanza, Dede Nursofa Amatuloh, Iston Dwija Utama, Kevin Nathaniel and Ivan Diryana Sudirman |
How Affiliate Marketing Impacts Buying Behavior in E-Commerce |
2 |
4 |
15.00-15.40 |
13 |
Devi Pratami |
An Evaluation of Lean Six Sigma Readiness in IT Department of Higher Education Institution |
2 |
5 |
15.40-16.20 |
14 |
Drajat Cahya Diningrat |
Systematic Literature Review of Multi-Cloud Aspects |
2 |
5 |
15.40-16.20 |
15 |
Julnila Husna Lubis |
Classification of Spine X-ray Image using Neural Networks Models based on Haar Wavelet Features |
2 |
5 |
15.40-16.20 |
Room 3 |
1 |
Elin Cahyaningsih |
Leveraging Value Proposition Canvas for Civil Service Analytics Dashboard |
3 |
1 |
13.00-13.40 |
2 |
Fahnun Nisa |
Tax Digitalization and Transparency: The Role of Core Tax Administration System (CTAS) In Indonesia’s Tax Reform |
3 |
1 |
13.00-13.40 |
3 |
Fairuz Athallah Bachri |
Development of a Fuzzy Logic and IoT-Based Automated Irrigation System for Water Spinach Cultivation |
3 |
1 |
13.00-13.40 |
4 |
Faqih Hamami |
Enhancing Mangrove Mapping in Malang Regency Through K-Means Clustering |
3 |
2 |
13.40-14.20 |
5 |
Farah Ahmed |
Exploring the Integration of Virtual Assistant Using Large Language Models in Learning Management System: Enhancing Educational Accessibility and Efficiency |
3 |
2 |
13.40-14.20 |
6 |
Fathimah Azzahra |
Near Real-Time Train Location Prediction Using LSTM Neural Network With Attention Mechanism |
3 |
2 |
13.40-14.20 |
7 |
Gagatsatya Adiatmaja |
Comparative Analysis of LSTM and GRU Models for Indonesian Stock Price Prediction with Integrated Technical and Fundamental Indicators |
3 |
3 |
14.20-15.00 |
8 |
Ginus Pandhu Setyawan |
Designing a Habit Forming Mobile Application for Disaster Preparedness Using the Hooked Model |
3 |
3 |
14.20-15.00 |
9 |
Hamidah Maulida Khasanah |
Machine Learning Classification of FNA-Derived Cell Nuclei Features for Breast Cancer Prediction |
3 |
3 |
14.20-15.00 |
10 |
Hendra Kurniawan |
A Comparative Performance Analysis of SVM Kernels in Automated Breast Cancer Diagnosis |
3 |
4 |
15.00-15.40 |
11 |
Hero Yudo Martono; Andhik Ampuh Yunanto; Dian Septiani Santoso |
Satu Sehat Interoperability Agent |
3 |
4 |
15.00-15.40 |
12 |
Imsagi Hendi Setiawan |
Sentiment Analysis of Tokopedia Application Reviews on Google Play Store Using BERT |
3 |
4 |
15.00-15.40 |
13 |
Jessica |
An Ensemble Approach Combining LSTM and Random Forest for Forecasting Product Stock Expenditure in Retail |
3 |
5 |
15.40-16.20 |
14 |
Jos Timanta Tarigan |
Hybrid Approach for Procedural Level Generation for 2D Platformer Game' |
3 |
5 |
15.40-16.20 |
15 |
Ismail Setiawaan |
Systematic Analysis of Student Academic Performance Prediction: Prediction Model, Optimization, Data Augmentation, and Educational Policy Implications |
3 |
5 |
15.40-16.20 |
Room 4 |
1 |
Kamilatu Qurrotu'aini Hanifah |
The Importances of Teachers' Digital Competence in Digital Learning Process: A Systematic Review |
4 |
1 |
13.00-13.40 |
2 |
Kartika Purwandari |
A Web-Based Application Development for Efficient Warehouse Management |
4 |
1 |
13.00-13.40 |
3 |
Kurnia Prayogi |
The Role of Digital Marketing in Driving Growth and Competitiveness of SMEs in the Digital Transformation Era: Systematic Literature Review |
4 |
1 |
13.00-13.40 |
4 |
Laura Tsanaullailla |
Enhancing Road Maintenance Efficiency through Comparative Evaluation of Pothole Detection Models |
4 |
2 |
13.40-14.20 |
5 |
Luthfia Cucu Aminah |
Geometric Features for Vowel Recognition in Lipreading |
4 |
2 |
13.40-14.20 |
6 |
M.Alif Gibran A Bossa |
TCP Westwood Simulation and Analysis on Wireless Sensor Network for Building Structure Condition Monitoring Topology |
4 |
2 |
13.40-14.20 |
7 |
Minwir Al-Shammari |
A Proposed Knowledge-enabled Production Value Chain Model (1571077636) |
4 |
3 |
14.20-15.00 |
8 |
Mochammad Farrell |
Designing a Cloud Architecture for SLA Requirements in Bulk Payment Case Queries Comparative analysis |
4 |
3 |
14.20-15.00 |
9 |
Muhamad Alfarisy |
Designing a Service-Oriented Platform on Digital Campus Using SCSE Framework |
4 |
3 |
14.20-15.00 |
10 |
Muhammad Banin Basit |
Comparative Feature Extraction in KNN-Based Pneumonia Detection: PCA, HOG, SIFT, and LBP Analysis |
4 |
4 |
15.00-15.40 |
11 |
Muhammad Farhan |
Cattle Anomaly Behavior Detection System Based on IoT and Computer Vision in Precision Livestock Farming |
4 |
4 |
15.00-15.40 |
12 |
Muhammad Giat |
Convolutional Neural Network In Human Eye Disease Classification |
4 |
4 |
15.00-15.40 |
13 |
Muhammad Tohir Rafly |
Multi User Centered Design (MUCD) in UI/UX Mobile Development for Kampung Batik Laweyan |
4 |
5 |
15.40-16.20 |
14 |
Nurul Fitri Aliyah |
Analysis Track Condition Trends Through Sensor Data and Clustering Techniques |
4 |
5 |
15.40-16.20 |
15 |
Raditya Aditama |
One-Shot Verification for Paper Certificates in Public Service System |
4 |
5 |
15.40-16.20 |
Room 5 |
1 |
RAHMA SAHWAHITA |
Factors Influencing Gen Z Awareness of Computer Security Using Protection Motivation Theory (PMT) |
5 |
1 |
13.00-13.40 |
2 |
Rana Zaini Fathiyana |
BLOCKCHAIN INTEROPERABILITY IN SECURE E-GOVERNANCE: A Systematic Literature Review |
5 |
1 |
13.00-13.40 |
3 |
Raymond Sutjiadi |
Generating High-Quality Synthetic Mammogram Images Using Denoising Diffusion Probabilistic Models: A Novel Approach for Augmenting Deep Learning Datasets |
5 |
1 |
13.00-13.40 |
4 |
Renny Sari Dewi |
Machine Learning Implementation in Use Case Points Method: A 30-Year Perspective |
5 |
2 |
13.40-14.20 |
5 |
Restu Alsyafiq Selian |
Comparative Analysis of Architectures for Classifying Malicious and Benign TLS Traffic |
5 |
2 |
13.40-14.20 |
6 |
Ricky Alamsyah |
Integrated Framework for IT Asset Physical Security: A Risk Management Approach Using NIST and ISO Standards |
5 |
2 |
13.40-14.20 |
7 |
Ridha Radhitya |
Usability Analysis of Digital Signature Application Based on ISO 9241-11 Using Retrospective Think Aloud and User Experience Questionnaire |
5 |
3 |
14.20-15.00 |
8 |
Ririn Ikana Desanti |
Efficiency Comparison of Employee Management Automation Using Selenium and Playwright: a Case Study of Technology Consulting Company |
5 |
3 |
14.20-15.00 |
9 |
Rizaldi Pratama |
The Evaluations of Cross-Cultural User Experience for Indonesian E-Marketplace: Facilitating MSME (Micro, Small, and Medium Enterprises) Export to MERCOSUR |
5 |
3 |
14.20-15.00 |
10 |
Rizky Dwiputra Restavie Bujung |
IT Governance & Management for Smart City: Aligning COBIT 2019 with SPBE Policies for Traditional Market Digitalization Initiatives |
5 |
4 |
15.00-15.40 |
11 |
Ryan Pratama Salazar |
Analysis of the Influence of AI Generated Art on Job Opportunities, Copyright Ownership and Creative Process of Illustrators |
5 |
4 |
15.00-15.40 |
12 |
Saadeh Z. Sweidan |
Accessibility to Public Buildings for Wheelchair Users: An Innovative Android Application |
5 |
4 |
15.00-15.40 |
13 |
Saadeh Z. Sweidan |
Children with Aphasia (Inability to Speak Well) An Android Application for Voice Augmentation and Alternative Communication |
5 |
5 |
15.40-16.20 |
14 |
Riyanthi Angrainy Sianturi |
Reengineering of Markopi Mobile Application |
5 |
5 |
15.40-16.20 |
Room 6 |
1 |
Sevito Fernanda Pambudi |
Lip Movement Recognition Based on Keypoint Vector using Deep Learning |
6 |
1 |
13.00-13.40 |
2 |
Shofa Wardatul Jannah |
Visual Aspect-Based Sentiment Analysis for Tourist Reviews using Deep Learning Method |
6 |
1 |
13.00-13.40 |
3 |
Steven Andrew Halim |
Understanding Fun in Cooking: Preliminary Study of Serious Games on Cooking Domain |
6 |
1 |
13.00-13.40 |
4 |
Sumirah |
Internet Service Assessment in Lombok Barat Regency |
6 |
2 |
13.40-14.20 |
5 |
Surya Michrandi Nasution |
DeteClass: A Car Classification for Parking System Management |
6 |
2 |
13.40-14.20 |
6 |
Taufan Zandy Andrian |
Invisible Watermark Embedding and Retrieval for Facial Image Copyright Protection and Forensics |
6 |
2 |
13.40-14.20 |
7 |
Tiara Shyifa Rachmayanti |
Understanding What Motivates Students to Use Digital Platforms for Cybersecurity Learning and Awareness: A Conceptual Model |
6 |
3 |
14.20-15.00 |
8 |
Timothy John Pattiasina |
Pioneering a New Era in Mental Health Treatment: A Framework for Virtual Reality Serious Game Design |
6 |
3 |
14.20-15.00 |
9 |
Yovita Tunardi |
Web-Based Application for GUI Programming Learning Through Reverse Engineering Method |
6 |
3 |
14.20-15.00 |
10 |
Yunus Dwi Santoso |
Modification of YOLOv9 With Bi-Level Routing Attention for Student Behavior Monitoring in Crowded Classrooms |
6 |
4 |
15.00-15.40 |
11 |
Yvesta Haliandra |
Analysis of Online Shoppers' Perceptions of Electronic Transaction Security Through Two-Factor Authentication (2FA) With the Security Belief Model Approach |
6 |
4 |
15.00-15.40 |
12 |
Zhivora Amelia Haq |
The Role of Electronic Word-of-Mouth in Heritage Tourism: A Systematic Review |
6 |
4 |
15.00-15.40 |
13 |
Ahmad Syamil |
Reimagining E-Learning Systems: Aligning Factors Influencing Student Expectations |
6 |
5 |
15.40-16.20 |
14 |
Siwi Piranti Rahayu |
A Systematic Review of Gamification and Their Impact on E-Commerce Applications |
6 |
5 |
15.40-16.20 |