Author Guidelines
Use the following template to write an article.
All Paper must can be submitted in BAHASA or in ENGLISH |
The template has all the styles needed for writing. Save your article in *.docx format. Do not use *.pdf format, so that it will be easier to edit the paper for reviewing and editing purpose.
TITLE
Written in Title Case, maximum 20 words, Times New Roman, 16pt, bold, and centered.
ABSTRACT
The abstract provides an overview of the paper's content and must be written in Times New Roman, 10pt, in a single-column format with 1.0 line spacing. The abstract should be between 150 and 200 words. Foreign terms that have not been standardized must be written in italic. Citations are not allowed in the abstract section.
INTRODUCTION
The introduction should provide the background, objectives, problem identification, and a brief overview of the research methods, presented implicitly. Apart from the Introduction and Conclusion sections, chapter titles should explicitly reflect their content. It is not necessary to state them implicitly as a basis for theory, design, etc. The introduction should generally cover 10-20% of the total paper. Ensure that the research objectives are clearly stated in this section.
METHOD
The Method section should detail the problem formulation being studied, with mathematical representation wherever possible. It should also explain the proposed method clearly. If an algorithm is used, it must be described in this section along with relevant state-of-the-art references. This section typically constitutes 20-30% of the total paper.
RESULT AND DISCUSSION
This section presents the research findings and the tests conducted. It should also include a discussion of the research and test results. The Results and Discussion section is expected to be the most substantial part of the paper, typically constituting 50-65% of the total content. This section discusses the research findings, providing an in-depth analysis and comparing the results with similar studies from previous journals or conferences. This section is mandatory as it highlights the significance of the research findings. The discussion typically constitutes 10-20% of the total paper.
CONCLUSION
The conclusion represents the core of the entire paper. It should be written in paragraph form and not as a list. The conclusion must not repeat sentences from the abstract but should succinctly summarize the key findings and implications of the research.
CITATION AND BIBLIOGRAPHY
This journal follows the IEEE citation style. In-text citations must use Arabic numerals inside square brackets and be ordered based on their occurrence in the text. Ensure that every reference cited in the text is included in the reference list and vice versa. The reference list should include a minimum of 15 references, primarily from journals, conferences, or books published within the last 5 years.
REFERENCES MANAGEMENT SOFTWARE
We strongly recommend using a reference management tool, such as Mendeley or Zotero, when preparing your article. These tools are available as open-source software or at a minimal cost, making them accessible and convenient for managing citations and references.
EXAMPLE OF BIBLIOGRAPHY LIST
Examples of bibliographies for various sources include journal articles, represented by numbers 1, 2, and 3. Conference papers are represented by numbers 4, 5, and 6. Books are exemplified in number 7. Web sources are illustrated in number 8. Theses or dissertations are exemplified in number 9.
[1] J. Ahmad, A. ul Hasan, T. Naqvi, and T. Mubeen, “A Review on Software Testing and Its Methodology,” Manag. J. Softw. Eng., vol. 13, no. 1, pp. 32–38, 2019, doi: 10.26634/jse.13.3.15515.
[2] E. A. Shams and A. Rizaner, “A novel support vector machine based intrusion detection system for mobile ad hoc networks,” Wirel. Networks, vol. 24, no. 5, pp. 1821–1829, 2018, doi: 10.1007/s11276-016-1439-0.
[3] S. Aljawarneh, M. Aldwairi, and M. B. Yassein, “Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model,” J. Comput. Sci., vol. 25, no. 1, pp. 152–160, 2018, doi: 10.1016/j.jocs.2017.03.006.
[4] M. N. Akbar and G. A. P. Saptawati, “Scalable sequential pattern mining based on PrefixSpan for high dimensional data,” in 2016 International Conference on Data and Software Engineering (ICoDSE), Denpasar: IEEE, Oct. 2016, pp. 1–6. doi: 10.1109/ICODSE.2016.7936122.
[5] Y. Guo, S. Han, Y. Li, C. Zhang, and Y. Bai, “K-Nearest Neighbor combined with guided filter for hyperspectral image classification,” in International COnference On Identification, Information and Knowledge in the Internet of Things, 2018, pp. 159–165.
[6] Y. I. Kurniawan, E. Soviana, and I. Yuliana, “Merging Pearson Correlation and TAN-ELR algorithm in recommender system,” in AIP Conference Proceedings, 2018, vol. 1977, doi: 10.1063/1.5042998.
[7] M. Sridevi, S. Aishwarya, A. Nidheesha, and D. Bokadia, Anomaly Detection by Using CFS Subset and Neural Network with WEKA Tools. Springer Singapore.
[8] C. Low, “NSL-KDD Dataset,” 2015. https://github.com/defcom17/NSL_KDD (accessed Sep. 13, 2019).
[9] D. Handoko, “Sistem Pendukung Keputusan Seleksi Penentuan Penerima Beasiswa Dengan Metode Simple Additive Weighting (SAW),” Universitas Muhammadiyah Surakarta, 2016.
Privacy Statement
The names and email addresses entered in this journal site will be used exclusively for the stated purposes of this journal and will not be made available for any other purpose or to any other party.