- H. Salahuddin, “Bencana gempabumi,” in DRR Action Plan Workshop: Strengthened Indonesian Resilience: Reducing Risk from Disasters, Yogyakarta, Indonesia, Jan. 2016. doi: 10.13140/RG.2.1.1112.6808
- M. A. Massinai, K. R. Amaliah, L. Lantu, Virman, and M. F. Ismullah, “Analisis percepatan tanah maksimum, kecepatan tanah maksimum dan mmi di wilayah Sulawesi Utara,” in Seminar Nasional Fisika SNF-UNJ, Jakarta, Indonesia, Oct. 2016, pp. 33-36. doi: 10.21009/0305020407
- R. M. Taruna, S. Rohadi, A. Rudyanto, and D. T. Heryanto, “Penentuan ground motion prediction equations (GMPEs) dengan metode euclidean dan likelihood untuk wilayah Jawa Timur,” Jurnal Meteorologi dan Geofisika, vol. 17, no. 3, pp. 177-189, 2016
- C. Sulaeman and A. Cipta, “Model intensitas gempa bumi di Maluku Utara,” Jurnal Lingkungan dan Bencana Geologi, vol. 3 no. 2, pp. 79-88, 2012
- W. Wang, A. X. Liu, M. Shahzad, K. Ling, and S. Lu, “Device-free human activity recognition using commercial wifi devices,” IEEE Journal on Selected Areas in Communications, vol. 35 no. 5, pp. 1118-1131, 2017. doi: 10.1109/JSAC.2017.2679658
- O. C. Ann and L. B. Theng, “Human activity recognition: a review,” in IEEE International Conference on Control System, Computing and Engineering, Penang, Malaysia, Nov. 2014, pp. 389-393. doi: 10.1109/ICCSCE.2014.7072750
- S. A. Ronao and S. B. Cho, “Human activity recognition with smartphone sensors using deep learning neural networks,” Expert System With Application, vol. 59, pp. 235-244, 2016. doi: 10.1016/j.eswa.2016.04.032
- F. Attal, S. Mohammed, M. Dedabrishvilli, F. Chamroukhi, L. Oukhellou, and Y. Amirat, "Physical human activity recognition using wearable sensors," Sensors, vol. 15, no. 12, pp. 31314–31338, 2015. doi: 10.3390/s151229858
- F. J. Ordonez, and D. Roggen, “Deep convolutional and LSTM recurrent neural networks for multimodal wearable activity recognition,” Sensors, vol. 16, no. 1, pp. 1-25, 2016. doi: 10.3390/s16010115
- A. R. Musthafa and H. Tjandrasa, “Kombinasi sinyal EEG dan giroskop untuk kendali mobil virtual dengan menggunakan modifikasi ICA dan SVM,” Jurnal Buana Informatika, vol. 7, no. 3, pp. 169-178, 2016. doi: 10.24002/jbi.v7i3.655
- L. H. Ochoa, L. F. Nino, and C. A. Vargas, “Fast determination of earthquake depth using seismic records of a single station, implementing machine learning techniques,” Ingeniería e Investigación, vol. 38, no. 2, pp. 91-103, 2018. doi: 10.15446/ing.investig.v38n2.68407
- D. Anguita, A. Ghio, and L. Oneto, “A public domain dataset for human activity recognition using smartphones,” in European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, Bruges, Belgium, Apr. 2013, pp. 437-442
- A. Perdana, M. T. Furqon, and Indriati, “Penerapan algoritma support vector machine (SVM) pada pengklasifikasian penyakit kejiwaan skizofreni,” Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer, vol. 2, no. 9, pp. 3162-3167, 2018
- M. Hassouna, A. Tarhini, T. Elyas, and M. S. A. Trab, “Customer churn in mobile markets: a comparison of techniques,” International Business Research, vol. 8, no. 8, pp. 224-237, 2015. doi: 10.5539/ibr.v8n6p224
Last update: 2021-03-08 08:35:27
No citation recorded.
Last update: 2021-03-08 08:35:28
No citation recorded.
Copyright (c) 2019 Jurnal Teknologi dan Sistem Komputer

This work is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
Starting in 2021, the author(s) whose article is published in the JTSiskom journal attain the copyright for their article. By submitting the manuscript to JTSiskom, the author(s) agree with this policy. No special document approval is required.
The author(s) guarantee that their article is original, written by the mentioned author(s), has never been published before, does not contain statements that violate the law, does not violate the rights of others, is subject to copyright that is held exclusively by the author(s), and is free from the rights of third parties, and that the necessary written permission to quote from other sources has been obtained by the author(s).
The author(s) retain all rights to the published work, such as (but not limited to) the following rights:
- Copyright and other proprietary rights related to articles, such as patents,
- The right to use the substance of the article in its own future works, including lectures and books,
- The right to reproduce articles for its own purposes,
- The right to archive articles yourself (please read our deposit policy), and
- The right to enter into separate additional contractual arrangements for the non-exclusive distribution of published versions of articles (for example, posting them to institutional repositories or publishing them in a book), with acknowledgment of its initial publication in this journal (Journal of Technology and Computer Systems).
If the article was prepared jointly by more than one author, each author submitting the manuscript warrants that they have been given permission by all co-authors to agree to copyright and license notices (agreements) on their behalf, and agree to notify the co-authors of the terms of this policy. JTSiskom will not be held responsible for anything that may arise because of the writer's internal dispute. JTSiskom will only communicate with correspondence authors.
Authors should also understand that once published, their articles (and any additional files, including data sets, and analysis/computation data) will become publicly available. The license of published articles (and additional data) will be governed by the Creative Commons Attribution license as currently featured on the Creative Commons Attribution-ShareAlike 4.0 International License. JTSiskom allows users to copy, distribute, display and perform work under license. Users need to attribute the author(s) and JTSiskom to distribute works in journals and other publication media. Unless otherwise stated, the author(s) is a public entity as soon as the article is published.