Tito Waluyo Purboyo
Tito Waluyo Purboyo
Verified email at telkomuniversity.ac.id
Title
Cited by
Cited by
Year
Efficient tag-to-tag Near Field Communication (NFC) protocol for secure mobile payment
E Husni, N Basjaruddin, T Purboyo, S Purwantoro, H Ubaya
2011 2nd International Conference on Instrumentation, Communications …, 2011
392011
Steganography methods on text, audio, image and video: A survey
A Febryan, TW Purboyo, RE Saputra
International Journal of Applied Engineering Research 12 (21), 10485-10490, 2017
192017
STOMACH DISORDER DETECTION THROUGH THE IRIS IMAGE USING BACKPROPAGATION NEURAL NETWORK
A Dewi, A Novianty, T Purboyo
International Conference on Informatics & Computing (ICIC) 2016, 2016
142016
Disaster victims detection system using convolutional neural network (CNN) method
DR Hartawan, TW Purboyo, C Setianingsih
2019 IEEE International Conference on Industry 4.0, Artificial Intelligence …, 2019
132019
A survey on the implementation of image enhancement
MN Aziz, TW Purboyo, AL Prasasti
Int. J. Appl. Eng. Res 12 (21), 11451-11459, 2017
132017
Security metrics: A brief survey
TW Purboyo, B Rahardjo
2011 2nd International Conference on Instrumentation, Communications …, 2011
132011
A survey paper on botnet attacks and defenses in software defined networking
R Hadianto, TW Purboyo
International Journal of Applied Engineering Research 13 (1), 483-489, 2018
122018
Experimental model for load balancing in cloud computing using throttled algorithm
G Ramadhan, TW Purboyo, R Latuconsina
International Journal of Applied Engineering Research 13 (2), 1139-1143, 2018
112018
A review of data compression techniques
LA Fitriya, TW Purboyo, AL Prasasti
International Journal of Applied Engineering Research 12 (19), 8956-8963, 2017
112017
Near Field Communication (NFC) Protocol Using Tag for Secure Mobile Payment
E Husni, K Kuspriyanto, N Basjaruddin, T Purboyo, S Purwantoro, ...
102012
A study of histogram equalization techniques for image enhancement
B Oktavianto, TW Purboyo
International Journal of Applied Engineering Research 13 (2), 1165-1170, 2018
92018
A survey paper of distributed denial-of-service attack in software defined networking (sdn)
AP Fajar, TW Purboyo
International Journal of Applied Engineering Research 13 (1), 476-82, 2018
92018
A review of accelerometer sensor and gyroscope sensor in IMU sensors on motion capture
IA Faisal, TW Purboyo, ASR Ansori
Journal of Engineering and Applied Sciences 15 (3), 826-829, 2020
82020
A review of various handwriting recognition methods
SS Rosyda, TW Purboyo
International Journal of Applied Engineering Research 13 (2), 1155-1164, 2018
82018
A new approach of data hiding in BMP image using LSB steganography and caesar vigenere cipher cryptography
I Dewangga, TW Purboyo, RA Nugrahaeni
International Journal of Applied Engineering Research 12 (21), 10626-10636, 2017
82017
A proposed design of traffic congestion prediction using ultrasonic sensors
MA Prasetyo, R Latuconsina, TW Purboyo
Int J Appl Eng Res 13 (1), 434-441, 2018
62018
Cotton texture segmentation based on image texture analysis using gray level co-occurrence matrix (GLCM) and Euclidean distance
FD Aferi, TW Purboyo, RE Saputra
Int. J. Appl. Eng. Res 13 (1), 449-455, 2018
52018
A Review of Image Enhancement Methods
RD Putra, TW Purboyo, AL Prasasti
International Journal of Applied Engineering Research 12 (23), 13596-13603, 2017
52017
Security on GIF images using steganography with LSB method, spread spectrum and the vigenere cipher
A Amirulhaqi, TW Purboyo, RA Nugrahaeni
International Journal of Applied Engineering Research 12 (23), 13604-13609, 2017
52017
Heart disorder detection based on computerized iridology using support vector machine
LI Permatasari, A Novianty, TW Purboyo
2016 International Conference on Control, Electronics, Renewable Energy and …, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20