- A. Muhammad, Z. U. Qayyum, W. I. Mirza, S. Tanveer, M-. Enriquez, and A. Z. Syed, “E-hafiz: Intelligent system to help muslims in recitation and memorization of Quran,” Life Science Journal, vol. 9, no. 1, pp. 534–541, 2012
- A. Elnagar, R. Ismail, B. Alattas, and A. Alfalasi, “Automatic classification of reciters of Quranic audio clips,” in 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications, Aqaba, Jordan, Nov. 2018, pp. 1-6. doi: 10.1109/AICCSA.2018.8612829
- M. Bezoui, A. Elmoutaouakkil, and A. Beni-Hssane, “Feature extraction of some Quranic recitation using mel-frequency cepstral coeficients (mfcc),” in International Conference on Multimedia Computing and Systems, Marrakech, Morocco, Oct. 2016, pp. 127–131. doi: 10.1109/ICMCS.2016.7905619
- N. R. R. Rashid, I. Venkat, F. Damanhoori, N. Mustaffa, W. Husain, and A. T. Khader, “Towards automating the evaluation of holy Quran recitations: a pattern recognition perspective,” in 2013 Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences, Madinah, Saudi Arabia, Dec. 2013, pp. 424–428. doi: 10.1109/NOORIC.2013.88
- Y. Afrillia, H. Mawengkang, M. Ramli, F. Fadlisyah, and R. P. Fhonna, “Performance measurement of mel frequency ceptral coefficient (mfcc) method in learning system of al-quran based in nagham pattern recognition,” Journal of Physics: Conference Series, vol. 930, no. 1, pp. 1-6, 2017. doi: 10.1088/1742-6596/930/1/012036
- A. Mustofa, “Sistem pengenalan penutur dengan metode mel-frequency wrapping,” Jurnal Teknik Elektro, vol. 7, no. 2, pp. 88-96, 2007. doi: 10.9744/jte.7.2.88-96
- N. W. Arshad et al., “Makhraj recognition for al-quran recitation using mfcc,” IJIIP: International Journal of Intelligent Information Processing, vol. 4, no. 2, pp. 45-53, 2013
- T. Nasution, “Metoda mel frequency cepstrum coefficients (mfcc) untuk mengenali ucapan pada bahasa indonesia,” SATIN - Sains dan Teknologi Informasi, vol. 1, no. 1, pp. 22-31, 2012
- O. Nurdiana, J. Jumadi, and D. Nursantika “Perbandingan metode cosine similarity dengan metode jaccard similarity pada aplikasi pencarian terjemah al-qur’an dalam bahasa Indonesia,” Jurnal Online Informatika, vol. 1, no. 1, pp. 59-63, 2016. doi: 10.15575/join.v1i1.12
- M. R. Maarif and C. Hadi, “Implementasi cosine similarity dalam aplikasi pencarian ayat al-quran berbasis android,” Jurnal Teknologi Informasi dan Komunikasi, vol. 6, no. 2, pp. 71-79, 2017
- I. Wijayanto, B. Hidayat, and Suyanto, “Pemisahan suara musik instrumental menggunakan metode independent component analysis dan pemodelan autoregressive moving average,” in Konferensi Nasional Sistem dan Informatika, Bali, Indonesia, Nov. 2011, pp. 61-68
- R. Wulandari, A. Izzuddin, and T. Asrori, “Pengenalan ucapan menggunakan algoritma back propagation,” Energy, vol. 6, no. 1, pp. 28-36, 2016
- K. Liu et al., “Endpoint detection of distributed fiber sensing systems based on STFT algorithm,” Optics & Laser Technology, vol. 114, pp. 122-126, 2019. doi: 10.1016/j.optlastec.2019.01.036
- N. N. Lokhande, N. S. Nehe, and P. S. Vikhe, “Voice activity detection algorithm for speech recognition applications,” International Journal of Computer Applications, vol. ICCIA, no. 6, pp. 5-7, 2012
- I. McLoughlin, Applied science and audio processing with matlab examples. Cambridge University Press, 2009
- H. Erokyar, “Age and gender recognition for speech applications based on support vector machines,” master thesis, University of South Florida, 2014
- I. H. Witten, E. Frank, and M. A. Hall, Data mining: practical machine learning tools and techniques. Morgan Kaufmann Publishers, 2016
Last update:
No citation recorded.
Last update: 2025-06-10 19:47:46
No citation recorded.
Copyright (c) 2020 Jurnal Teknologi dan Sistem Komputer

This work is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
Starting from 2021, the author(s) whose article is published in the JTSiskom journal attain the copyright for their article and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. By submitting the manuscript to JTSiskom, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that:
- their article is original, written by the mentioned author(s),
- has never been published before,
- does not contain statements that violate the law, and
- does not violate the rights of others, is subject to copyright held exclusively by the author(s), is free from the rights of third parties, and the necessary written permission to quote from other sources has been obtained by the author(s).
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
- Copyright and other proprietary rights related to the article, such as patents,
- The right to use the substance of the article in its own future works, including lectures and books,
- The right to reproduce the article for its own purposes,
- The right to archive all versions of the article in any repository, and
- The right to enter into separate additional contractual arrangements for the non-exclusive distribution of published versions of the article (for example, posting them to institutional repositories or publishing them in a book), acknowledging its initial publication in this journal (Jurnal Teknologi dan Sistem Komputer).
Suppose the article was prepared jointly by more than one author. Each author submitting the manuscript warrants that all co-authors have given their permission to agree to copyright and license notices (agreements) on their behalf and notify co-authors of the terms of this policy. JTSiskom will not be held responsible for anything arising because of the writer's internal dispute. JTSiskom will only communicate with correspondence authors.
Authors should also understand that their articles (and any additional files, including data sets and analysis/computation data) will become publicly available once published. The license of published articles (and additional data) will be governed by a Creative Commons Attribution-ShareAlike 4.0 International License. JTSiskom allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and JTSiskom to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.