[vc_empty_space][vc_empty_space][vc_row layout=”boxed” css=”.vc_custom_1624509994608{margin-top: 90px !important;}”][vc_column width=”1/3″ css=”.vc_custom_1624519913689{border-right-width: 1px !important;border-right-color: #dbdbdb !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_row_inner layout=”boxed”][vc_column_inner]
[vc_empty_space][vc_btn title=”Lihat Profil Scopus” style=”gradient-custom” gradient_custom_color_1=”#00316d” gradient_custom_color_2=”#2071ea” size=”sm” align=”center” css_animation=”bounceInDown” link=”url:https%3A%2F%2Fwww.scopus.com%2Fauthid%2Fdetail.uri%3FauthorId%3D35176324300||target:%20_blank|”][/vc_column_inner][/vc_row_inner][vc_row_inner css=”.vc_custom_1624510077690{border-right-width: 1px !important;padding-top: 32px !important;border-right-color: #b2b2b2 !important;border-right-style: solid !important;border-radius: 1px !important;}”][/vc_row_inner][/vc_column][vc_column width=”2/3″][vc_row_inner][vc_column_inner css=”.vc_custom_1624509956940{border-left-width: 1px !important;border-left-color: #969696 !important;border-left-style: solid !important;border-radius: 1px !important;}”][megatron_heading title=”Rinaldi” size=”size-md” sub_title=”STEI” text_align=”text-left”][vc_separator][/vc_column_inner][/vc_row_inner][vc_column_text]Energy Engineering and Power Technology • Biomedical Engineering • Electrical and Electronic Engineering • Computer Vision and Pattern Recognition • Software • Social Sciences (miscellaneous) • Instrumentation • Artificial Intelligence • Computational Theory and Mathematics • Education • Information Systems • Water Science and Technology • Computer Science Applications • Control and Optimization • Human-Computer Interaction • Computer Networks and Communications • Decision Sciences (miscellaneous) • Information Systems and Management • Management Information Systems • Control and Systems Engineering • Computer Science (miscellaneous) • Signal Processing • Computer Graphics and Computer-Aided Design • Theoretical Computer Science • Industrial and Manufacturing Engineering • Health Informatics • Communication • Hardware and Architecture • Media Technology • Engineering (all) • Physics and Astronomy (all) • Computer Science (all)[/vc_column_text][/vc_column][/vc_row][vc_row layout=”boxed” css=”.vc_custom_1624522217430{margin-top: 20px !important;}”][vc_column][vc_tta_tabs style=”classic” color=”blue” spacing=”5″ active_section=”1″ no_fill_content_area=”true”][vc_tta_section i_type=”fontawesome” i_icon_fontawesome=”fa fa-book” add_icon=”true” title=”Karya” tab_id=”karya”][vc_empty_space height=”20px”][vc_column_text]
Comparison of secret color image sharing based on XOR operation in RGB and YCbCr color model
Rinaldi Munir
Proceedings of the 2017 6th International Conference on Electrical Engineering and Informatics: Sustainable Society Through Digital Innovation, ICEEI 2017 vol:2017-November, issue:ICEEI.2017.8312445, page:1-6
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Video Encryption by Using Visual Cryptography Based on Wang’s Scheme
Rinaldi Munir,None Harlili
2018 4th International Conference on Electrical, Electronics and System Engineering, ICEESE 2018 vol:, issue:ICEESE.2018.8703567, page:1-22
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
A chaos-based fragile watermarking method in spatial domain for image authentication
Rinaldi Munir
2015 International Seminar on Intelligent Technology and Its Applications, ISITIA 2015 – Proceeding vol:, issue:ISITIA.2015.7219983, page:1-231
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
A block-based image encryption algorithm in frequency domain using chaotic permutation
Rinaldi Munir
Proceedings of 2014 8th International Conference on Telecommunication Systems Services and Applications, TSSA 2014 vol:, issue:TSSA.2014.7065906, page:1-
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
A Secure Fragile Video Watermarking Algorithm for Content Authentication Based on Arnold Cat Map
Rinaldi Munir,None Harlili
Proceedings of 2019 4th International Conference on Information Technology: Encompassing Intelligent Technology and Innovation Towards the New Era of Human Life, InCIT 2019 vol:, issue:INCIT.2019.8912074, page:1-37
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Derivation of Barni Algorithm into its asymmetric watermarking technique using statistical approach
Rinaldi Munir,Bambang Riyanto Tan,Sarwono Sutikno,Wiseto P. Agung
Proceedings of the 2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009 vol:1, issue:ICEEI.2009.5254778, page:1-268
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Chaos-based modified “ezStego” algorithm for improving security of message hiding in GIF image
Rinaldi Munir
Proceeding – 2015 International Conference on Computer, Control, Informatics and Its Applications: Emerging Trends in the Era of Internet of Things, IC3INA 2015 vol:, issue:IC3INA.2015.7377750, page:1-84
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Derivation of Barni Algorithm into its asymmetric watermarking technique using statistical approach
Rinaldi Munir,T. Bambang Riyanto,Sarwono Sutikno,Wiseto P. Agung
International Journal on Electrical Engineering and Informatics vol:1, issue:ijeei.2009.1.2.4, page:1-136
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
A fragile watermarking scheme for authentication of GIF images
Rinaldi Munir
International Journal on Electrical Engineering and Informatics vol:9, issue:ijeei.2017.9.2.7, page:1-312
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Visual Cryptography of Animated GIF Image Based on XOR Operation
Rinaldi Munir
Proceedings – 2017 International Conference on Advanced Computing and Applications, ACOMP 2017 vol:, issue:ACOMP.2017.14, page:1-121
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Application of the modified EzStego algorithm for hiding secret messages in the animated GIF images
Rinaldi Munir
Proceeding – 2016 2nd International Conference on Science in Information Technology, ICSITech 2016: Information Science for Green Society and Environment vol:, issue:ICSITech.2016.7852608, page:1-62
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Security analysis of selective image encryption algorithm based on chaos and CBC-like mode
Rinaldi Munir
2012 7th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2012 vol:, issue:TSSA.2012.6366039, page:1-146
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Blind steganalysis for digital images using support vector machine method
Marcelinus Henry Menori,Rinaldi Munir
2016 International Symposium on Electronics and Smart Devices, ISESD 2016 vol:, issue:ISESD.2016.7886706, page:1-136
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Traffic Congestion Model: Challenges and Opportunities
M.D. Enjat Munajat,Rinaldi Munir,Dwi H. Widyantoro
Journal of Physics: Conference Series vol:801, issue:012048, page:1-
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Text and file encryption application for blackberry using cipher feedback 8-bit mode
Matthew Wangsadiredja,Rinaldi Munir
Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011 vol:, issue:ICEEI.2011.6021761, page:1-
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Image Graph Matching Based on Region Adjacency Graph
None Akmal,Rinaldi Munir,Judhi Santoso
Proceeding – 2019 5th International Conference on Science in Information Technology: Embracing Industry 4.0: Towards Innovation in Cyber Physical System, ICSITech 2019 vol:, issue:ICSITech46713.2019.8987480, page:1-181
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Steganographic-algorithm and length estimation classification on MP3 steganalysis with convolutional neural network
Muhammad Rizki Duwinanto,Rinaldi Munir
2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering, ICITISEE 2019 vol:, issue:ICITISEE48480.2019.9004022, page:1-215
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Secure E-payment method based on visual cryptography
Trihastuti Yuniati,Rinaldi Munir
Proceedings – 2018 3rd International Conference on Information Technology, Information Systems and Electrical Engineering, ICITISEE 2018 vol:, issue:ICITISEE.2018.8720999, page:1-135
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Dynamic background video forgery detection using Gaussian mixture model
Nugroho Satriyanto,Rinaldi Munir,None Harlili
Proceeding – 2019 International Conference of Artificial Intelligence and Information Technology, ICAIIT 2019 vol:, issue:ICAIIT.2019.8834463, page:1-383
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Full-Text Search on data with access control using generalized suffix tree
Ahmad Zaky,Rinaldi Munir
Proceedings of 2016 International Conference on Data and Software Engineering, ICoDSE 2016 vol:, issue:ICODSE.2016.7936112, page:1-
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Community and important actors analysis with different keywords in social network
Nanang Cahyana,Rinaldi Munir
Proceeding – 2017 3rd International Conference on Science in Information Technology: Theory and Application of IT for Education, Industry and Society in Big Data Era, ICSITech 2017 vol:2018-January, issue:ICSITech.2017.8257163, page:1-502
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Mobile Application of Video Watermarking Using Discrete Cosine Transform on Android Platform
Moch Ginanjar Busiri,Rinaldi Munir
Proceedings of 2017 5th International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering, ICICI-BME 2017 vol:, issue:ICICI-BME.2017.8537779, page:1-212
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Intrusion detection against unauthorized file modification by integrity checking and recovery with HW/SW platforms using programmable system-on-chip (SoC)
S Mochamad Julianto,Rinaldi Munir
2018 International Conference on Information and Communications Technology, ICOIACT 2018 vol:2018-January, issue:ICOIACT.2018.8350742, page:1-179
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Implementation of fuzzy inference system in children skin disease diagnosis application
Aditya Agung Putra,Rinaldi Munir
Proceedings – 5th International Conference on Electrical Engineering and Informatics: Bridging the Knowledge between Academic, Industry, and Community, ICEEI 2015 vol:, issue:ICEEI.2015.7352528, page:1-370
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
A new string matching algorithm based on logical indexing
Daniar Heri Kurniawan,Rinaldi Munir
Proceedings – 5th International Conference on Electrical Engineering and Informatics: Bridging the Knowledge between Academic, Industry, and Community, ICEEI 2015 vol:, issue:ICEEI.2015.7352533, page:1-399
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Message hiding in animated GIF using multibit assignment method
Mario Tressa Juzar,Rinaldi Munir
2016 International Symposium on Electronics and Smart Devices, ISESD 2016 vol:, issue:ISESD.2016.7886723, page:1-229
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Secured video streaming development on smartphones with Android platform
Danang Tri Massandy,Ir. Rinaldi Munir
2012 7th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2012 vol:, issue:TSSA.2012.6366079, page:1-344
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Selective encryption algorithm implementation for video call on Skype client
Alwi Alfiansyah Ramdan,Rinaldi Munir
2012 7th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2012 vol:, issue:TSSA.2012.6366035, page:1-124
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Double Chaining Algorithm: A secure symmetric-key encryption algorithm
Daniar Heri Kurniawan,Rinaldi Munir
4th IGNITE Conference and 2016 International Conference on Advanced Informatics: Concepts, Theory and Application, ICAICTA 2016 vol:, issue:ICAICTA.2016.7803097, page:1-
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
SAML single sign-on protocol development using combination of speech and speaker recognition
Patrick Telnoni,Rinaldi Munir,Yusep Rosmansyah
Proceedings – 2014 International Conference on Advanced Informatics: Concept, Theory and Application, ICAICTA 2014 vol:, issue:ICAICTA.2014.7005958, page:1-304
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Arithmetic coding modification to compress SMS
Ario Yudo Husodo,Rinaldi Munir
Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011 vol:, issue:ICEEI.2011.6021688, page:1-
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Interaction between fluid and solid body surfaces in fluid simulation using material-point method
Dody Dharma,Rinaldi Munir,Tito D. Kesumo Siregar
2018 International Conference on Information and Communications Technology, ICOIACT 2018 vol:2018-January, issue:ICOIACT.2018.8350797, page:1-714
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Graph Steganography Based on Multimedia Cover to Improve Security and Capacity
Ilham Firman Ashari,Rinaldi Munir
Proceedings of ICAITI 2018 – 1st International Conference on Applied Information Technology and Innovation: Toward A New Paradigm for the Design of Assistive Technology in Smart Home Care vol:, issue:ICAITI.2018.8686741, page:1-201
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Email client application with rabbit algorithm for Android smart phone
Muhammad Anwari Leksono,Rinaldi Munir
2012 7th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2012 vol:, issue:TSSA.2012.6366037, page:1-135
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
A Comparative Study of Deepfake Video Detection Method
Kurniawan Nur Ramadhani,Rinaldi Munir
2020 3rd International Conference on Information and Communications Technology, ICOIACT 2020 vol:, issue:ICOIACT50329.2020.9331963, page:1-399
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Vehicle detection and tracking based on corner and lines adjacent detection features
M.D. Enjat Munajat,Dwi H. Widyantoro,Rinaldi Munir
Proceeding – 2016 2nd International Conference on Science in Information Technology, ICSITech 2016: Information Science for Green Society and Environment vol:, issue:ICSITech.2016.7852641, page:1-249
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Security system for surveillance radar network communication using chaos algorithm
Nova Hadi Lestriandoko,Tutun Juhana,Rinaldi Munir
Proceedings of 2014 8th International Conference on Telecommunication Systems Services and Applications, TSSA 2014 vol:, issue:TSSA.2014.7065947, page:1-
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
IntelligEnSia based electricity consumption prediction analytics using regression method
Angreine Kewo,Aditya Kalua Lapu,Rinaldi Munir
Proceedings – 5th International Conference on Electrical Engineering and Informatics: Bridging the Knowledge between Academic, Industry, and Community, ICEEI 2015 vol:, issue:ICEEI.2015.7352556, page:1-528
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Generic animation method for multi-objects in IFS fractal form
Tedjo Darmanto,Iping Supriana,Rinaldi Munir
Journal of ICT Research and Applications vol:10, issue:itbj.ict.res.appl.2016.10.3.1, page:1-208
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
E-Learning Application of Tarsier with Virtual Reality using Android Platform
H.N. Oroh,D. Paseru,R. Munir
Journal of Physics: Conference Series vol:801, issue:012007, page:1-
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Hybrid animation model of multi-object in fractal form based on metamorphic interpolation and partitioned-random iteration algorithms
Tedjo Darmanto,Iping Supriana Suwardi,Rinaldi Munir
International Journal on Electrical Engineering and Informatics vol:5, issue:ijeei.2013.5.3.4, page:1-296
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Hybrid rotational and revolving simulation of propeller in aircraft with two propellers by fractal animation model: Based on shifting centroid method in double mode from a fixed point
Tedjo Darmanto,Iping Supriana Suwardi,Rinaldi Munir
Proceeding – 2014 International Conference on Computer, Control, Informatics and Its Applications: “New Challenges and Opportunities in Big Data”, IC3INA 2014 vol:, issue:IC3INA.2014.7042621, page:1-171
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Animation simulation of shooting aircraft events by combination of metamorphic animation on multi-object and on object of IFS fractal model: Based on cloning and collision detection techniques
Tedjo Darmanto,Iping Supriana Suwardi,Rinaldi Munir
Proceeding – 2014 International Conference on Computer, Control, Informatics and Its Applications: “New Challenges and Opportunities in Big Data”, IC3INA 2014 vol:, issue:IC3INA.2014.7042619, page:1-159
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Road detection system based on RGB histogram filterization and boundary classifier
M. D. Enjat Munajat,Dwi H. Widyantoro,Rinaldi Munir
ICACSIS 2015 – 2015 International Conference on Advanced Computer Science and Information Systems, Proceedings vol:, issue:ICACSIS.2015.7415163, page:1-200
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Metamorphic animation of 3D fern-like fractal images based on a family of transitional 3D IFS code approach
Tedjo Darmanto,Iping Supriana Suwardi,Rinaldi Munir
2013 International Conference of Information and Communication Technology, ICoICT 2013 vol:, issue:ICoICT.2013.6574586, page:1-276
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
A Novel Approach to Make Presentation Using PowerPoint Without Projector in Local Area Network
Daniel Silli Bataona,Jemsrado Sine,Rinaldi Munir,Tutun Juhana,Gloria Christiana Manulangga
International Conference on Ubiquitous and Future Networks, ICUFN vol:2018-July, issue:ICUFN.2018.8436832, page:1-474
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
A survey on multisperm tracking for sperm motility measurement
Priyanto Hidayatullah,Tati L.E.R. Mengko,Rinaldi Munir
International Journal of Machine Learning and Computing vol:7, issue:ijmlc.2017.7.5.637, page:1-151
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
A new method for analyzing congestion levels based on road density and vehicle speed
M. D. Enjat Munajat,Dwi H. Widyantoro,Rinaldi Munir
Journal of Theoretical and Applied Information Technology vol:95, issue:, page:1-6471
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Weaving effects in metamorphic animation of treelike fractal based on a family of multi-transitional iterated function system code
Tedjo Darmanto,Iping S. Suwardi,Rinaldi Munir
Proceeding – 2013 International Conference on Computer, Control, Informatics and Its Applications: “Recent Challenges in Computer, Control and Informatics”, IC3INA 2013 vol:, issue:IC3INA.2013.6819150, page:1-70
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Cyclical metamorphic animation of fractal images based on a family of multi-transitional IFS code approach
Tedjo Darmanto,Iping Supriana Suwardi,Rinaldi Munir
Proceedings of 2012 IEEE Conference on Control, Systems and Industrial Informatics, ICCSII 2012 vol:, issue:CCSII.2012.6470506, page:1-234
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Fan temperature detection using microcontroller
Cindi Rori,Debby Paseru,Rinaldi Munir,Pinrolinvic Manembu
Proceeding of 2015 1st International Conference on Wireless and Telematics, ICWT 2015 vol:, issue:ICWT.2015.7449223, page:1-
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
A Semiautomatic Sperm Cell Data Annotator for Convolutional Neural Network
Priyanto Hidayatullah,Tati Erawati Rajab Mengko,Rinaldi Munir,Anggraini Barlian
Proceeding – 2019 5th International Conference on Science in Information Technology: Embracing Industry 4.0: Towards Innovation in Cyber Physical System, ICSITech 2019 vol:, issue:ICSITech46713.2019.8987471, page:1-216
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Scenes categorization based on appears objects probability
None Marzuki,Egi Muhamad Hidayat,Rinaldi Munir,P Ary Setijadi,Carmadi Machbub
Proceedings of the 2016 6th International Conference on System Engineering and Technology, ICSET 2016 vol:, issue:FIT.2016.7857552, page:1-136
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Powerplan: The alternative software for presentations at local area network using VirtualTreeViewand omnithread
Daniel Silli Bataona,Gloria Christiana Manulangga,Jemsrado Sine,Rinaldi Munir,Tutun Juhana
International Journal of Electrical and Computer Engineering vol:10, issue:ijece.v10i1.pp947-961, page:1-961
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][vc_column_text]
Tracking online fraud using regular expression
Fiftin Noviyanto,Dewi Soyusiawaty,Nur Rochmah,Dyah Puji Astuti,Rinaldi Munir,Masayu Leylia Khodra
Proceeding – 2017 3rd International Conference on Science in Information Technology: Theory and Application of IT for Education, Industry and Society in Big Data Era, ICSITech 2017 vol:2018-January, issue:ICSITech.2017.8257202, page:1-700
[/vc_column_text]
[vc_column_text css=”.vc_custom_1624700225847{padding-top: 10px !important;}”]
PlumX Widget
[/vc_column_text]
[vc_separator css=”.vc_custom_1624506709952{padding-top: 10px !important;padding-bottom: 15px !important;}”][/vc_tta_section][vc_tta_section i_type=”fontawesome” i_icon_fontawesome=”fa fa-handshake-o” add_icon=”true” title=”Proyek” tab_id=”proyek”][vc_empty_space height=”20px”][/vc_tta_section][vc_tta_section i_type=”fontawesome” i_icon_fontawesome=”fa fa-users” add_icon=”true” title=”Jejaring” tab_id=”jejaring”][vc_empty_space height=”20px”][/vc_tta_section][/vc_tta_tabs][/vc_column][/vc_row]