{"id":25266,"date":"2025-07-09T21:23:57","date_gmt":"2025-07-09T14:23:57","guid":{"rendered":"https:\/\/stei.itb.ac.id\/?page_id=25266"},"modified":"2025-07-09T21:23:57","modified_gmt":"2025-07-09T14:23:57","slug":"magister-informatika","status":"publish","type":"page","link":"https:\/\/stei.itb.ac.id\/en\/semarak2025\/magister-informatika\/","title":{"rendered":"Master Program of Informatics"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"fullwidth\" ><div class=\"vc_row wpb_row vc_row-fluid kepala vc_custom_1734236300248 vc_row-has-fill\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"container\" ><div class=\"vc_row wpb_row vc_inner vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_btn3-container vc_btn3-inline vc_do_btn\" ><a class=\"vc_general vc_btn3 vc_btn3-size-lg vc_btn3-shape-rounded vc_btn3-style-modern vc_btn3-icon-left vc_btn3-color-white\" href=\"https:\/\/stei.itb.ac.id\/en\/semarak2025\/\" title=\"\" onclick=\"history.back()\"><i class=\"vc_btn3-icon\"><\/i> Kembali ke Beranda<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fullwidth\" ><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1723278896125\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>MAGISTER INFORMATIKA<\/p>\n<p>The Master of Informatics study program aims to equip its graduates with critical, innovative, and professional thinking skills to compete globally in the field of Informatics, as well as to develop research-based knowledge and technology for the field of Informatics. The scientific fields of the Master of Informatics study program include the basic scientific fields of computing (Fundamentals of Computing) and scientific fields according to their options. There are eight options, namely Computer Science (CS), Software Engineering (SE), Media and Mobile Technology (MMT), Data Science (DS), Artificial Intelligence (AI), Cyber \u200b\u200bSecurity (CSec), Information Systems (IS), and Information Technology (IT). The types of programs in the Master of Informatics study program consist of: Regular, By Research\/Project, Executive and Multidisciplinary<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/goitb.id\/MagisterInformatika\/qr\" \/><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fullwidth\" ><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1723451097585\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_tta-container\" data-vc-action=\"collapse\"><div class=\"vc_general vc_tta vc_tta-tabs vc_tta-color-grey vc_tta-style-tab_style1 vc_tta-shape-rounded vc_tta-spacing-1 vc_tta-tabs-position-top vc_tta-controls-align-left\"><div class=\"vc_tta-tabs-container\"><ul class=\"vc_tta-tabs-list\" role=\"tablist\"><li class=\"vc_tta-tab vc_active\" data-vc-tab role=\"presentation\"><a href=\"#1723450977521-527a80b6-1027\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1723450977521-527a80b6-1027\"><span class=\"vc_tta-title-text\">Curriculum<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1723450977528-3d6530a0-4381\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1723450977528-3d6530a0-4381\"><span class=\"vc_tta-title-text\">Track Compulsory<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1723451006597-a3f0159d-b2fb\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1723451006597-a3f0159d-b2fb\"><span class=\"vc_tta-title-text\">Student Admission &amp; Selection<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1723451005487-b58812aa-e7b5\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1723451005487-b58812aa-e7b5\"><span class=\"vc_tta-title-text\">Thesis Poster<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1723451230324-d5e2dec0-7178\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1723451230324-d5e2dec0-7178\"><span class=\"vc_tta-title-text\">Integrated Bachelor's and Master's Program<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1741591122372-7f596078-b8fa\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1741591122372-7f596078-b8fa\"><span class=\"vc_tta-title-text\">Dual Degree or Double Degree Program<\/span><\/a><\/li><li class=\"vc_tta-tab\" data-vc-tab role=\"presentation\"><a href=\"#1723451007300-4b3918fb-8e8a\" data-vc-tabs data-vc-container=\".vc_tta\" role=\"tab\" aria-selected=\"false\" id=\"tab-1723451007300-4b3918fb-8e8a\"><span class=\"vc_tta-title-text\">Administrative Form<\/span><\/a><\/li><\/ul><\/div><div class=\"vc_tta-panels-container\"><div class=\"vc_tta-panels\"><div class=\"vc_tta-panel vc_active\" id=\"1723450977521-527a80b6-1027\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1723450977521-527a80b6-1027\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Curriculum<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4><b>General Description &amp; Curriculum<\/b><\/h4>\n<p>Master Program in Informatics has some objectives to produce graduates with profiles as Engineers, Managers, Consultants, or Researchers in the field of Informatics who have the following general competences during the early stages of their careers (3-5 years after graduation), namely:<\/p>\n<ol>\n<li>\u00a0 \u00a0 Our graduates will have critical thinking, innovative, and professional aspects to compete globally in the field of informatics.<\/li>\n<li>\u00a0 \u00a0 Our graduates will successfully pursue advanced study or engage in professional development.<\/li>\n<li>\u00a0 \u00a0 Our graduates will have managerial capabilities in research in the field of informatics.<\/li>\n<\/ol>\n<p>Student outcomes of the Master Program in Informatics are as follows.<\/p>\n<ol>\n<li>Students will be able to analyze problems in the field of Informatics or other fields of science to identify computing-based solutions.<\/li>\n<li>Students will be able to design and build computing-based solutions through an interdisciplinary or multidisciplinary approach<\/li>\n<li>Students will be able to evaluate computing-based solutions that fulfill the requirements through an interdisciplinary or multidisciplinary approach.<\/li>\n<li>Students will be able to develop research-based knowledge and technology in the field of informatics by engineering and developing specific scientific fields, including:<br \/>\na.  algorithms or computational theory to solve actual and contemporary problems (computer science track), or<br \/>\nb.  software engineering, including developing reliable, innovative, and easy-to-maintain large-scale software (software engineering track), or<br \/>\nc.  the concept, architecture, and technology of media and mobile devices, including developing the media and mobile device applications using the principles of human and computer interaction as well as good and appropriate software engineering methodologies (media and mobile technology track), or<br \/>\nd. management, processing, and interpretation of large and complex datasets for extraction of critical information and knowledge (data science track), or<br \/>\ne. artificial intelligence concepts, technologies, and applications, including using the suitable tools to deliver an effective and efficient artificial intelligence solution (artificial intelligence track), or<br \/>\nf. the development, operation, and testing of cybersecurity systems (cybersecurity track), or<br \/>\ng. information system governance at the enterprise level to maximize the potential of the system and to minimize its risks using information technology resources efficiently (information systems track), or<br \/>\nh. the analysis, modeling, design, construction, and development of information technology-based systems (information technology track)<br \/>\ni. Development, operation, and security testing of cyber systems (CSec option).<\/li>\n<li>Students will be able to communicate effectively in diverse professional and academic contexts.<\/li>\n<li>Students will be able to function effectively in team activities by their field of knowledge.<\/li>\n<\/ol>\n<p>There are 8 (eight) tracks, as follows Computer Science (CS), Software Engineering (SE), Media and Mobile Technology (MMT), Data Science (DS), Cyber Security (CSec), Artificial Intelligence (AI), Information System (IS), and Information Technology (IT).<a href=\"https:\/\/stei.itb.ac.id\/wp-content\/uploads\/MagisterInformatika-en-Kurikulun.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-24340\" src=\"https:\/\/stei.itb.ac.id\/wp-content\/uploads\/MagisterInformatika-en-Kurikulun.jpg\" alt=\"\" width=\"560\" height=\"186\" \/><\/a><\/p>\n<p>The curriculum of the Master Program in Informatics, comprising a total of 54 credits, is divided into 3 semesters with a maximum load of 18 credits per semester, following the composition below. For the multidisciplinary program scheme and the Double Degree program scheme, the curriculum is structured over 4 semesters.<\/p>\n<p>ITB mandatory\t\t\t: 7 credits<br \/>\nStudy Program mandatory\t: 12 credits of structured courses + 12 credits of Thesis<br \/>\nTrack mandatory\t\t: 12-19 credits<br \/>\nElective\t\t\t: 4-11 credits<\/p>\n<p><a href=\"https:\/\/stei.itb.ac.id\/wp-content\/uploads\/OpsiIF.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-24341\" src=\"https:\/\/stei.itb.ac.id\/wp-content\/uploads\/OpsiIF.jpg\" alt=\"\" width=\"560\" height=\"408\" \/><\/a><\/p>\n<p>The study period is scheduled within 3 to 4 semesters. The course structure of the Master Program in Informatics for 3 semesters is as follows. Students take 18 credits per semester.<\/p>\n<p><a href=\"https:\/\/stei.itb.ac.id\/wp-content\/uploads\/WaktuStudiIF.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-24342\" src=\"https:\/\/stei.itb.ac.id\/wp-content\/uploads\/WaktuStudiIF.jpg\" alt=\"\" width=\"560\" height=\"459\" \/><\/a><\/p>\n<table style=\"width: 100%;\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"width: 5%;\"><b>No<\/b><\/td>\n<td style=\"width: 10%;\"><b>Code<\/b><\/td>\n<td style=\"width: 79%;\"><b>Course<\/b><\/td>\n<td style=\"width: 6%;\"><b>Credits<\/b><\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>IF5001<\/td>\n<td>\n<details>\n<summary>Research Methodology<\/summary>\n<ol>\n<li>The nature and objectives of research, and elements of research methodology<\/li>\n<li>Determining research topics, identifying and formulating problems, novelty and\/or innovative value of research<\/li>\n<li>Research questions, hypothesis formulation, and research design<\/li>\n<li>Experimental design, concepts of independent and dependent variables, or other data collection methods relevant to the nature of the discipline<\/li>\n<li>Sampling, sample, sampling error, sample size, characteristics of a good sample, and practical considerations in sampling<\/li>\n<li>Pengolahan data, analisis, pembahasan. dan kesimpulan Data processing, analysis, discussion, and conclusion<\/li>\n<li>Scientific report writing<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>WI7001<\/td>\n<td>\n<details>\n<summary>Digital Literacy and Academic Ethics<\/summary>\n<ol>\n<li>Concepts of digital technology, models and strategies of communication, digital searching, and effective and positive digital collaboration<\/li>\n<li>Utilization of digital tools<\/li>\n<li>Principles of data literacy, artificial intelligence, machine learning, and deep learning<\/li>\n<li>Utilization of AI for research and scientific writing<\/li>\n<li>Academic integrity and ethics<\/li>\n<li>Integrity and ethics in research, projects, and scientific publications<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>IF5100<\/td>\n<td>\n<details>\n<summary>Programming for Data Analytics<\/summary>\n<ol>\n<li>Programming fundamentals and data structures<\/li>\n<li>Object-oriented programming<\/li>\n<li>Algorithm complexity<\/li>\n<li>Algorithm strategies \/ computational problem-solving techniques<\/li>\n<li>Data exploration<\/li>\n<li>Introduction to machine learning<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>IF5101<\/td>\n<td>\n<details>\n<summary>Data Management<\/summary>\n<ol>\n<li>General principles and concepts of data management and organization<\/li>\n<li>Data management systems<\/li>\n<li>Enterprise data infrastructure management<\/li>\n<li>Data governance<\/li>\n<li>Large-scale data storage<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>IF5002<\/td>\n<td>\n<details>\n<summary>Proposal Preparation<\/summary>\n<ol>\n<li>Determining research topics, identifying and formulating problems, novelty and\/or innovative value of research<\/li>\n<li>Research questions, hypothesis formulation, and research design<\/li>\n<li>Development of problem-solving methods for research<\/li>\n<li>Scientific report writing<\/li>\n<li>Scientific presentation<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td>IF5091<\/td>\n<td>\n<details>\n<summary>Thesis 1<\/summary>\n<ol>\n<li>Implementation and development of research problem-solving methods<\/li>\n<li>Academic communication<\/li>\n<li>Scientific report writing<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>4<\/td>\n<\/tr>\n<tr>\n<td>7<\/td>\n<td>IF5200<\/td>\n<td>\n<details>\n<summary>Applied Research Project<\/summary>\n<ol>\n<li>Basic Research Skills in Computing Science<\/li>\n<li>Software delivery, mencakup: software development lifecycle, Agile methodologies, dan best practices for efficient delivery (termasuk di dalamnya CI\/CD)<\/li>\n<li>Project Management<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>2<\/td>\n<\/tr>\n<tr>\n<td>8<\/td>\n<td>IF6098<\/td>\n<td>\n<details>\n<summary>Thesis 2<\/summary>\n<ol>\n<li>Implementation and development of research problem-solving methods<\/li>\n<li>Academic communication<\/li>\n<li>Scientific report writing<\/li>\n<li>Scientific presentation<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>6<\/td>\n<\/tr>\n<tr>\n<td>9<\/td>\n<td>IF6099<\/td>\n<td>\n<details>\n<summary>Master's Session<\/summary>\n<ol>\n<li>Research completion<\/li>\n<li>Scientific report writing<\/li>\n<li>Scientific presentation<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>2<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The course structure of the Master Program in Informatics for 4 semesters is as follows. Students take 11\u201316 credits per semester.<\/p>\n<p><a href=\"https:\/\/stei.itb.ac.id\/wp-content\/uploads\/WaktuStudiIF-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-24378\" src=\"https:\/\/stei.itb.ac.id\/wp-content\/uploads\/WaktuStudiIF-1.jpg\" alt=\"\" width=\"560\" height=\"424\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Specifically for the Research-based Master's track, the course composition is arranged according to the following structure, and the curriculum is designed over 4 semesters.<\/span><br \/>\n<span style=\"font-weight: 400;\">ITB mandatory\t\t\t: 7 credits<\/span> <span style=\"font-weight: 400;\">: 7 sks<\/span><br \/>\n<span style=\"font-weight: 400;\">Required Study Program<\/span> <span style=\"font-weight: 400;\">Study Program mandatory\t: 12 credits of structured courses + 16 credits of Thesis<\/span><br \/>\n<span style=\"font-weight: 400;\">Choice<\/span> <span style=\"font-weight: 400;\">Electives\t\t\t: 19 credits<br \/>\n<span style=\"font-weight: 400;\">The course structure of the Master Program in Informatics for the Research-based Master's track is as follows.<\/span><\/span><\/p>\n<p><a href=\"https:\/\/stei.itb.ac.id\/wp-content\/uploads\/WaktuStudiIF-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-24379\" src=\"https:\/\/stei.itb.ac.id\/wp-content\/uploads\/WaktuStudiIF-2.jpg\" alt=\"\" width=\"561\" height=\"399\" \/><\/a><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><div class=\"vc_tta-panel\" id=\"1723450977528-3d6530a0-4381\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1723450977528-3d6530a0-4381\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Track Compulsory<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Students in the Computer Science (CS) track are expected to develop research-based knowledge and technology in the field of Informatics by designing and developing algorithms or computational theories that can address current and real-world problems.<\/p>\n<p>Compulsory courses for the Computer Science (CS) track:<\/p>\n<table style=\"width: 100%;\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"width: 4%;\"><b>No<\/b><\/td>\n<td style=\"width: 9%;\"><b>Code<\/b><\/td>\n<td style=\"width: 78%;\"><b>Matakuliah<\/b><\/td>\n<td style=\"width: 6%;\"><b>Credits<\/b><\/td>\n<td style=\"width: 3%;\"><b>P<\/b><\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>IF5110<\/td>\n<td>\n<details>\n<summary>Algorithm Design<\/summary>\n<ol>\n<li>Review basic concepts of algorithms: time complexity, data structures, heaps &amp; disjoint sets data structures<\/li>\n<li>Techniques based on recursion: induction, divide &amp; conquer, dynamic programming<\/li>\n<li>First cut techniques: greedy, graph traversal<\/li>\n<li>Complexity of problems: NP-complete problems, computational complexity, lower bounds<\/li>\n<li>Coping with hardness: backtracking, randomized algorithms, approximation algorithm<\/li>\n<li>Iterative improvement for domain-specific problems: network flow, matching<\/li>\n<li>Techniques in Computational Geometry: Geometric sweeping,Voronoi diagrams<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>IF5111<\/td>\n<td>\n<details>\n<summary>Mathematics for Computer Science<\/summary>\n<ol>\n<li>Proofs<\/li>\n<li>Structures<\/li>\n<li>Counting<\/li>\n<li>Statistics and Probability<\/li>\n<li>Recurrences<\/li>\n<li>Algorithm complexity<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>IF5210<\/td>\n<td>\n<details>\n<summary>Compiler Design<\/summary>\n<ol>\n<li>Lexical analysis<\/li>\n<li>Syntax analysis<\/li>\n<li>Scopes and symbol tables<\/li>\n<li>Interpretation<\/li>\n<li>Type checking<\/li>\n<li>Intermediate code generation<\/li>\n<li>Machine code generation<\/li>\n<li>Register allocation<\/li>\n<li>Functions<\/li>\n<li>Data flow analysis and optimisation<\/li>\n<li>Optimisation for loops<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>IF5112<\/td>\n<td>\n<details>\n<summary>Advanced Distributed Systems<\/summary>\n<ol>\n<li>Model sistem terdistribusi<\/li>\n<li>Failure detectors<\/li>\n<li>reliable delivery<\/li>\n<li>atomic &amp; reliable broadcast<\/li>\n<li>shared memory model<\/li>\n<li>consensus<\/li>\n<li>Distributed commitment protocol &amp; atomic transactions<\/li>\n<li>Group membership<\/li>\n<li>View synchrony<\/li>\n<li>Cloud computing &amp; virtualization<\/li>\n<li>Distributed ledger &amp; blockchain<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Students in the Software Engineering (SE) track are expected to develop research-based knowledge and technology in the field of Informatics by designing and developing large-scale software products that are reliable, innovative, and maintainable.<\/p>\n<p>Compulsory courses for the Software Engineering (SE) track:<\/p>\n<table style=\"width: 100%;\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"width: 4%;\"><b>No<\/b><\/td>\n<td style=\"width: 9%;\"><b>Code<\/b><\/td>\n<td style=\"width: 78%;\"><b>Matakuliah<\/b><\/td>\n<td style=\"width: 6%;\"><b>Credits<\/b><\/td>\n<td style=\"width: 3%;\"><b>P<\/b><\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>IF5120<\/td>\n<td>\n<details>\n<summary>Software Requirement Engineering<\/summary>\n<ol>\n<li>Fundamentals of software requirements<\/li>\n<li>Requirements engineering process<\/li>\n<li>Requirements elicitation<\/li>\n<li>Requirements analysis<\/li>\n<li>Requirements specification<\/li>\n<li>Requirements validation<\/li>\n<li>Practical considerations<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>IF5121<\/td>\n<td>\n<details>\n<summary>Software Design<\/summary>\n<ol>\n<li>Fundamentals of software design<\/li>\n<li>Software architecture<\/li>\n<li>Design patterns<\/li>\n<li>User interface design<\/li>\n<li>Analysis and evaluation of software design quality<\/li>\n<li>Software design notations<\/li>\n<li>Software design strategies and methods<\/li>\n<li>Software design tools<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>IF5220<\/td>\n<td>\n<details>\n<summary>Software Quality<\/summary>\n<ol>\n<li>Fundamentals of software quality<\/li>\n<li>Software quality management process<\/li>\n<li>Practical considerations<\/li>\n<li>Software quality tools<\/li>\n<li>Fundamentals of software testing<\/li>\n<li>Levels of testing<\/li>\n<li>Testing techniques<\/li>\n<li>Testing-related metrics<\/li>\n<li>Testing process<\/li>\n<li>Software testing tools<\/li>\n<li>Specification languages<\/li>\n<li>Program refinement and derivation<\/li>\n<li>Verifikasi Formal<\/li>\n<li>Logical inference<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>IF5221<\/td>\n<td>\n<details>\n<summary>Software Product Innovation<\/summary>\n<ol>\n<li>Introduction to software product innovation<\/li>\n<li>Topic and problem identification<\/li>\n<li>Market needs identification and analysis<\/li>\n<li>System requirements identification and analysis<\/li>\n<li>Requirements modeling<\/li>\n<li>Software product and quality planning<\/li>\n<li>Commercialization planning<\/li>\n<li>Proposal presentation<\/li>\n<li>Software product development implementation<\/li>\n<li>Presentation and demo<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>1<\/td>\n<td>3<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>IF6120<\/td>\n<td>\n<details>\n<summary>Software Evolution<\/summary>\n<ol>\n<li>SCM process management<\/li>\n<li>Software configuration identification<\/li>\n<li>Software configuration control<\/li>\n<li>Software configuration status<\/li>\n<li>Software configuration audit<\/li>\n<li>Software release management and delivery<\/li>\n<li>SCM tools<\/li>\n<li>Fundamentals of software maintenance<\/li>\n<li>Issues in software maintenance<\/li>\n<li>Software maintenance process<\/li>\n<li>Software maintenance techniques<\/li>\n<li>Software maintenance tools<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Students in the Media and Mobile Technology (MMT) track are expected to develop research-based knowledge and technology in the field of Informatics by designing and developing concepts, architectures, and technologies for media and mobile devices, as well as developing applications for media and mobile devices using principles of human-computer interaction and proper software engineering methodologies.<\/p>\n<p>Compulsory courses for the Media and Mobile Technology (MMT) track:<\/p>\n<table style=\"width: 100%;\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"width: 4%;\"><b>No<\/b><\/td>\n<td style=\"width: 9%;\"><b>Code<\/b><\/td>\n<td style=\"width: 78%;\"><b>Matakuliah<\/b><\/td>\n<td style=\"width: 6%;\"><b>Credits<\/b><\/td>\n<td style=\"width: 3%;\"><b>P<\/b><\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>IF5130<\/td>\n<td>\n<details>\n<summary>Software Engineering for Game Domain<\/summary>\n<ol>\n<li>Software engineering for the game domain<\/li>\n<li>Game design<\/li>\n<li>Game engine architecture<\/li>\n<li>Game testing<\/li>\n<li>Game analytics<\/li>\n<li>Ethics in game development<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>IF5131<\/td>\n<td>\n<details>\n<summary>Multimedia Data Processing and Management<\/summary>\n<ol>\n<li>Introduction to multimedia data and applications<\/li>\n<li>Review of signal processing (Discrete Fourier Transform and Fast Fourier Transform)<\/li>\n<li>Review of multimedia data representation<\/li>\n<li>Automated analysis of multimedia data (preprocessing, feature extraction, recognition, and similarity retrieval)<\/li>\n<li>Multimedia data management and indexing methods<\/li>\n<li>Case studies of multimedia data-based applications<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>IF5230<\/td>\n<td>\n<details>\n<summary>Mobile Technology and Application<\/summary>\n<ol>\n<li>Introduction to mobile devices<\/li>\n<li>Activities in mobile application development (requirements analysis, design principles and patterns, user interface (UI) design, technology implementation, testing, and quality)<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>IF6130<\/td>\n<td>\n<details>\n<summary>Interactive Media Technology &amp; Application<\/summary>\n<ol>\n<li>Introduction to interactive media<\/li>\n<li>Introduction to games (concepts, design, process)<\/li>\n<li>Gameplay<\/li>\n<li>Game production<\/li>\n<li>The art of game design<\/li>\n<li>Game implementation<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Students in the Data Science (DS) track are expected to develop research-based knowledge and technology in the field of Informatics by designing and developing the management, processing, and interpretation of large and complex datasets for the extraction of important information and knowledge.<\/p>\n<p>Compulsory courses for the Data Science (DS) track:<\/p>\n<table style=\"width: 100%;\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"width: 4%;\"><b>No<\/b><\/td>\n<td style=\"width: 9%;\"><b>Code<\/b><\/td>\n<td style=\"width: 78%;\"><b>Matakuliah<\/b><\/td>\n<td style=\"width: 6%;\"><b>Credits<\/b><\/td>\n<td style=\"width: 3%;\"><b>P<\/b><\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>IF5140<\/td>\n<td>\n<details>\n<summary>Machine Learning<\/summary>\n<ol>\n<li>Introduction to Machine Learning<\/li>\n<li>Supervised Learning<\/li>\n<li>Neural Networks<\/li>\n<li>Learning Theory<\/li>\n<li>Unsupervised Learning<\/li>\n<li>Reinforcement Learning<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>2<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>IF5141<\/td>\n<td>\n<details>\n<summary>Data Mining<\/summary>\n<ol>\n<li>Process models for data mining (CRISP-DM)<\/li>\n<li>Basic concepts of data, statistics, and data visualization; measurement; and data pre-processing<\/li>\n<li>Basic techniques in pattern mining for frequent patterns, associations, and correlations<\/li>\n<li>Recall: Classification and cluster analysis using machine learning techniques<\/li>\n<li>Overview of advanced machine learning techniques for various types of data<\/li>\n<li>Data mining model evaluation<\/li>\n<li>Deployment of data mining models<\/li>\n<li>Case study on building a machine learning model for a specific problem\/organization: business understanding, data understanding, data preparation, model building, model evaluation, deployment<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>1<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>IF5240<\/td>\n<td>\n<details>\n<summary>Business Intelligence and Analytics<\/summary>\n<ol>\n<li>Fundamental concepts of business intelligence and business analytics: data, statistical models, decision-making, and decision support systems<\/li>\n<li>Management and operations of business analytics: business processes and operations, planning and control, requirements analysis and design, solution evaluation<\/li>\n<li>Data warehousing: concepts of data warehousing, data integration, data warehouse development, business analytics using data warehouses, data visualization<\/li>\n<li>Data warehouse technologies: platforms and tools for data warehousing, data integration, reporting, and visualization<\/li>\n<li>Business analytics using data mining techniques<\/li>\n<li>Case study on system development using a business intelligence approach and utilizing business analytics<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>1<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>IF5241<\/td>\n<td>\n<details>\n<summary>Big Data System<\/summary>\n<ol>\n<li>Fundamental concepts of big data<\/li>\n<li>Big data infrastructure and technologies: big data technology stack, cloud computing, large-scale storage and file systems, NoSQL databases, data processing models: batch, streaming, and parallel<\/li>\n<li>Organization and management of big data systems: big data algorithms for large-scale data processing, data preprocessing algorithms, data ingestion and visualization, management and operation of big data systems<\/li>\n<li>Big data system development for data science: platforms and tools for big data analytics, design and development of big data systems and cloud-based systems, operation and management of big data and cloud services, and their relation to enterprise information systems<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>IF6097<\/td>\n<td>\n<details>\n<summary>Industrial Internship<\/summary>\n<ol>\n<li>Method implementation<\/li>\n<li>Scientific report writing<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Students in the Artificial Intelligence (AI) track are expected to develop research-based knowledge and technology in the field of Informatics by designing and developing concepts, technologies, and applications of artificial intelligence, including appropriate tools as effective and efficient AI solutions.<\/p>\n<p>Compulsory courses for the Artificial Intelligence (AI) track:<\/p>\n<table style=\"width: 100%;\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"width: 4%;\"><b>No<\/b><\/td>\n<td style=\"width: 9%;\"><b>Code<\/b><\/td>\n<td style=\"width: 78%;\"><b>Matakuliah<\/b><\/td>\n<td style=\"width: 6%;\"><b>Credits<\/b><\/td>\n<td style=\"width: 3%;\"><b>P<\/b><\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>IF5150<\/td>\n<td>\n<details>\n<summary>Advanced Artificial Intelligence<\/summary>\n<ol>\n<li>Introduction and History of AI - Topics: Introduction to AI and its historical development, Basic concepts of AI<\/li>\n<li>Intelligent Agent - Topics: Concepts and architecture of intelligent agents, Implementation of intelligent agents<\/li>\n<li>Decision Making - Topics: Decision-making techniques in AI, Decision-making models<\/li>\n<li>Heuristic Algorithms - Topics: Concepts and applications of heuristic algorithms, Heuristic search techniques<\/li>\n<li>Descriptive, Propositional, and Predicate Logic - Topics: Descriptive, propositional, and predicate logic, Applications of logic in AI<\/li>\n<li>Answer Set and Ontology - Topics: Concepts of answer set, Ontology and its applications in AI<\/li>\n<li>Linked Data, Semantic Web, and Probabilistic Networks - Topics: Linked data and the semantic web, Bayesian networks and Markov decision networks<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>IF5151<\/td>\n<td>\n<details>\n<summary>Mathematics for Artificial Intelligence<\/summary>\n<ol>\n<li>Introduction to Mathematics for Machine Learning<\/li>\n<li>Linear Algebra<\/li>\n<li>Calculus<\/li>\n<li>Statistics and Probability<\/li>\n<li>Optimization Methods<\/li>\n<li>Applied Mathematics for Machine Learning<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>IF5250<\/td>\n<td>\n<details>\n<summary>Deep Learning<\/summary>\n<ol>\n<li>Introduction to Deep Learning<\/li>\n<li>Fundamentals of Neural Networks<\/li>\n<li>Convolutional Neural Networks (CNN)<\/li>\n<li>Recurrent Neural Networks (RNN) and LSTM<\/li>\n<li>Optimization and Regularization Techniques<\/li>\n<li>Deep Learning Applications<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>1<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>IF5251<\/td>\n<td>\n<details>\n<summary>Artificial Intelligence in Production<\/summary>\n<ol>\n<li>Introduction to AI in Production \u2013 Challenges and considerations in deploying AI to production, Overview of MLOps and the model development lifecycle, Differences between development and production environments<\/li>\n<li>Data Management \u2013 Data collection, labeling, and storage, Data processing and feature engineering, Data versioning and lineage<\/li>\n<li>Model Development and Training \u2013 Algorithm and model architecture selection, Experimentation and model tracking, Distributed training and hardware acceleration<\/li>\n<li>Model Evaluation and Validation \u2013 Evaluation metrics and cross-validation, Error analysis and model interpretability, Data testing and validation<\/li>\n<li>Model Deployment \u2013 Deployment strategies (shadow, canary, blue-green), Containerization and orchestration, Scaling and performance optimization<\/li>\n<li>Model Monitoring and Supervision \u2013 Monitoring metrics and dashboards, Anomaly and data drift detection, Monitoring data integrity and model quality<\/li>\n<li>Security and Privacy \u2013 Adversarial attacks and defenses, Data encryption and anonymization, Security audits and compliance<\/li>\n<li>Ethical and Legal Considerations \u2013 Bias and fairness in AI, Transparency and accountability, Regulations and industry standards<\/li>\n<li>Case Studies and Industrial Applications \u2013 Case studies of AI implementation across industries, Best practices and lessons learned, Trends and future directions<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>IIF6150<\/td>\n<td>\n<details>\n<summary>Trustworthy Artificial Intelligence<\/summary>\n<ol>\n<li>Introduction to Trustworthy AI \u2013 Topics: Introduction to the concept of Trustworthy AI, The importance of transparency, fairness, and robustness in AI<\/li>\n<li>Explainable AI (X-AI) \u2013 Concepts and Methods \u2013 Topics: Basic concepts of explainable AI, Methods for AI model interpretability<\/li>\n<li>Interpretability and Explanation Evaluation \u2013 Topics: Techniques for interpretability evaluation, Case studies on explainable AI applications<\/li>\n<li>Fairness in AI \u2013 Concepts and Challenges \u2013 Topics: Concepts of fairness in AI, Challenges in detecting and mitigating bias<\/li>\n<li>Techniques for Fairness in AI \u2013 Topics: Techniques for detecting bias, Methods for mitigating bias in AI models<\/li>\n<li>Robustness in AI \u2013 Concepts and Methods \u2013 Topics: Concepts of robustness in AI, Techniques to improve model robustness<\/li>\n<li>Ethical and Legal Considerations in AI \u2013 Topics: Ethical considerations in AI development, Legal implications of fairness and robustness in AI<\/li>\n<li>Final Project and Presentation \u2013 Topics: Implementation of innovative projects in Trustworthy AI, Project documentation and presentation, Evaluation and discussion of project results<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td>IF6151<\/td>\n<td>\n<details>\n<summary>Artificial Intelligence Individual Project<\/summary>\n<ol>\n<li>Current topics in Artificial Intelligence issues<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Students in the Cybersecurity (CSec) track are expected to develop research-based knowledge and technology in the field of Informatics, particularly in the development, operation, and testing of cybersecurity systems.<\/p>\n<p>Compulsory courses for the Cybersecurity (CSec) track:<\/p>\n<table style=\"width: 100%;\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"width: 4%;\"><b>No<\/b><\/td>\n<td style=\"width: 9%;\"><b>Code<\/b><\/td>\n<td style=\"width: 78%;\"><b>Matakuliah<\/b><\/td>\n<td style=\"width: 6%;\"><b>Credits<\/b><\/td>\n<td style=\"width: 3%;\"><b>P<\/b><\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>IF5161<\/td>\n<td>\n<details>\n<summary>Data and Software Security<\/summary>\n<ol>\n<li>Overview on Traffic, Vulnerability and Malware Analysis<\/li>\n<li>Access Control Enhancement to deal with malicious and buggy software<\/li>\n<li>Usable Integrity Protection<\/li>\n<li>User Authentication<\/li>\n<li>Virtual Private Databases<\/li>\n<li>Overview of Public-Key Cryptography<\/li>\n<li>Preventing SQL Injection Attacks<\/li>\n<li>Vulnerability Assessment and Management<\/li>\n<li>Code Inspection for Finding Security Vulnerabilities and Exposures<\/li>\n<li>Architectural Risk Analysis<\/li>\n<li>Penetration Testing, Concolic Testing<\/li>\n<li>Risk-Based Security Testing and Verification<\/li>\n<li>Withstanding adversarial tactics and techniques<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>IF6160<\/td>\n<td>\n<details>\n<summary>System Security &amp; Privacy<\/summary>\n<ol>\n<li>Cybersecurity and privacy regulations<\/li>\n<li>Security Building Block<\/li>\n<li>Cyber-Physical System Engineering<\/li>\n<li>Management &amp; Incident<\/li>\n<li>Legal Issues &amp; Ethics<\/li>\n<li>Malware<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>IF5260<\/td>\n<td>\n<details>\n<summary>Digital Forensics<\/summary>\n<ol>\n<li>Introduction to Digital Forensics<\/li>\n<li>Computer crime and Legal issues<\/li>\n<li>Digital forensic tools<\/li>\n<li>Investigatory process<\/li>\n<li>Analysis of evidence<\/li>\n<li>Presentation of results<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>IF5160<\/td>\n<td>\n<details>\n<summary>Cybersecurity Operations<\/summary>\n<ol>\n<li>Security concepts in organizations<\/li>\n<li>Network security<\/li>\n<li>Security operations<\/li>\n<li>Threat hunting<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>IF6161<\/td>\n<td>\n<details>\n<summary>Cybersecurity Individual Project<\/summary>\n<ol>\n<li>Current topics in cybersecurity issues<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Students in the Information Systems (IS) track are expected to develop research-based knowledge and technology in the field of Informatics by designing and developing Information Systems governance at the enterprise level to maximize system potential and minimize risks through the efficient use of Information Technology resources.<\/p>\n<p>Compulsory courses for the Information Systems (IS) track:<\/p>\n<table style=\"width: 100%;\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"width: 4%;\"><b>No<\/b><\/td>\n<td style=\"width: 9%;\"><b>Code<\/b><\/td>\n<td style=\"width: 78%;\"><b>Matakuliah<\/b><\/td>\n<td style=\"width: 6%;\"><b>Credits<\/b><\/td>\n<td style=\"width: 3%;\"><b>P<\/b><\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>IF5170<\/td>\n<td>\n<details>\n<summary>Digital Strategy<\/summary>\n<ol>\n<li>Strategic thinking<\/li>\n<li>Predicting the direction of IT development<\/li>\n<li>Information technology adoption<\/li>\n<li>Change management and policy development<\/li>\n<li>Management and governance<\/li>\n<li>IT governance model<\/li>\n<li>Maturity and capability maturity models<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>IF5171<\/td>\n<td>\n<details>\n<summary>System Thinking<\/summary>\n<ol>\n<li>Philosophy of systems<\/li>\n<li>Basic principles of systems<\/li>\n<li>Sociocultural systems<\/li>\n<li>Development<\/li>\n<li>Systems methodology<\/li>\n<li>Operational thinking<\/li>\n<li>Design thinking<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>IF5270<\/td>\n<td>\n<details>\n<summary>Applied Artificial Intelligence for Enterprise<\/summary>\n<ol>\n<li>Artificial Intelligence<\/li>\n<li>Business Value of AI<\/li>\n<li>Leveraging Business Value Chain<\/li>\n<li>Development Methodology: CRISP-DM<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>1<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>IF5271<\/td>\n<td>\n<details>\n<summary>Information System Sustainability<\/summary>\n<ol>\n<li>Sustainability concepts<\/li>\n<li>Regulations<\/li>\n<li>Green in OS<\/li>\n<li>Green by IS<\/li>\n<li>Product longevity<\/li>\n<li>Data center Design<\/li>\n<li>Software Optimization<\/li>\n<li>Power Management<\/li>\n<li>Material Recycling<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>IF6170<\/td>\n<td>\n<details>\n<summary>Data Governance<\/summary>\n<ol>\n<li>Information and the role of data for organizations<\/li>\n<li>Data principles<\/li>\n<li>Data policies and procedures<\/li>\n<li>Data organizational structure<\/li>\n<li>Data privacy<\/li>\n<li>Data sharing<\/li>\n<li>Data Protection<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Students in the Information Technology (IT) track are expected to develop research-based knowledge and technology in the field of Informatics by designing and developing the analysis, modeling, design, construction, and advancement of information technology-based systems.<\/p>\n<p>Compulsory courses for the Information Technology (IT) track:<\/p>\n<table style=\"width: 100%;\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td style=\"width: 4%;\"><b>No<\/b><\/td>\n<td style=\"width: 9%;\"><b>Code<\/b><\/td>\n<td style=\"width: 78%;\"><b>Matakuliah<\/b><\/td>\n<td style=\"width: 6%;\"><b>Credits<\/b><\/td>\n<td style=\"width: 3%;\"><b>P<\/b><\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>IF5180<\/td>\n<td>\n<details>\n<summary>Digital Twin Technology<\/summary>\n<ol>\n<li>Digital Twin Concept<\/li>\n<li>Digital Twin Framework<\/li>\n<li>Data Acquisition &amp; Capturing<\/li>\n<li>Data Processing &amp; Analytics<\/li>\n<li>Modelling &amp; Simulation<\/li>\n<li>Data Visualization<\/li>\n<li>User Interaction<\/li>\n<li>Digital Twin Development<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>IF5181<\/td>\n<td>\n<details>\n<summary>Information Technology Platform<\/summary>\n<ol>\n<li>Fundamental concepts and key components of Information Technology platforms<\/li>\n<li>Business needs analysis and methods for selecting appropriate IT platforms<\/li>\n<li>System integration<\/li>\n<li>Security and scalability<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>IF5280<\/td>\n<td>\n<details>\n<summary>Digital Security, Privacy, and Forensics<\/summary>\n<ol>\n<li>Reference models and principles of digital security<\/li>\n<li>Digital security vulnerabilities<\/li>\n<li>Digital threats and attacks<\/li>\n<li>Defensive and offensive digital security engineering<\/li>\n<li>Digital privacy requirements and regulations<\/li>\n<li>Implementation of digital privacy compliance<\/li>\n<li>Reactive digital forensics<\/li>\n<li>Proactive digital forensics<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>IF6180<\/td>\n<td>\n<details>\n<summary>Digital Transformation and Enterprise Architecture<\/summary>\n<ol>\n<li>Basic Concepts and Relationship between Digital Transformation, Enterprise Architecture (EA), and Smart System<\/li>\n<li>Digital Transformation and It\u2019s Frameworks<\/li>\n<li>Enterprise Architecture and It\u2019s Frameworks<\/li>\n<li>Design Transformation Strategy and Plan<\/li>\n<li>Aligning Enterprise Architecture with Transformation Plan<\/li>\n<li>Design aligned Enterprise Architecture<\/li>\n<li>Case Studies<\/li>\n<\/ol>\n<\/details>\n<\/td>\n<td>3<\/td>\n<td>0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><div class=\"vc_tta-panel\" id=\"1723451006597-a3f0159d-b2fb\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1723451006597-a3f0159d-b2fb\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Student Admission &amp; Selection<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<h5><strong>General Information<\/strong><\/h5>\n<\/div>\n<div class=\"su-spoiler su-spoiler-style-default su-spoiler-icon-plus\" data-anchor=\"pendaftarans2if\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\">\n<div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<p>The registration schedule for prospective students of the Master Program in Informatics follows the Graduate Program Admission Schedule of ITB for Semester I of the 2025\/2026 academic year, which can be accessed at: <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/admission.itb.ac.id\/info\/program-magister\/\">https:\/\/admission.itb.ac.id\/info\/program-magister\/<\/a><\/span><\/p>\n<p>Selection Test Plan for New Students of the Master Program in Informatics:<\/p>\n<p><strong>Batch 1:<\/strong><br \/>\nRegistration: January 23 \u2013 February 11, 2025<br \/>\nSelection test: Thursday, February 13, 2025, 09:00\u201313:00 (on-site)<\/p>\n<p><strong>Batch 2:<\/strong><br \/>\nRegistration: February 19 \u2013 March 12, 2025 (until 3:00 PM WIB)<br \/>\nSelection test: Friday, March 14, 2025, 09:00\u201311:00 and 13:00\u201315:00 (on-site)<\/p>\n<p><strong>Batch 4:<\/strong><br \/>\nRegistration: April 22 \u2013 May 20, 2025 (until 3:00 PM WIB)<br \/>\nSelection test: Thursday, May 22, 2025, 09:00\u201313:00 (on-site)<\/p>\n<p><strong>Batch 6:<\/strong><br \/>\nRegistration: July 1 \u2013 17, 2025 (until 3:00 PM WIB)<br \/>\nSelection test: Monday, July 21, 2025, 09:00\u201313:00 (on-site)<\/p>\n<p>Specifically for the MBR program of the Master Program in Informatics, the selection of MBR prospective students is conducted based on documents, written examination, and interview, as follows:<\/p>\n<ol>\n<li>Selection based on documents:<\/li>\n<\/ol>\n<p>\u2013 TPA and TOEFL scores must comply with ITB regulations<br \/>\n&#8211; Berlatar belakang pendidikan Sains dan Teknik (ijazah S1)<br \/>\n&#8211; Portofolio yang mencantumkan publikasi dalam 5 tahun, pengalaman penelitian selama 5 tahun, predikat kelulusan (minimum IPK 3.0), pengalaman di institusi penelitian, dan riwayat hidup.<br \/>\n&#8211; Draft proposal riset yang telah didiskusikan dan disetujui oleh calon pembimbing dari prodi Magister Informatika.<br \/>\n&#8211; Direkomendasikan oleh calon pembimbing. Rekomendasi calon pembimbing berisi penilaian berdasarkan hasil pengamatan terkait kualitas calon mahasiswa (Pasal 12 ayat 3 Peraturan Rektor) dan track riset calon mahasiswa. Pembimbing dapat merekomendasikan jika calon mahasiswa memiliki\u00a0 publikasi minimal makalah prosiding konferensi internasional, atau minimal memiliki konten riset pada tugas akhir S1, atau pengalaman riset yang dianggap lebih tinggi.<\/p>\n<ol start=\"2\">\n<li>A written exam specifically assesses basic competency in Informatics. This is the same as the regular pathway. For MBR students, it can be used to confirm their undergraduate degree.<\/li>\n<li>Interview\u00a0 (includes presentation of draft research proposal)<\/li>\n<\/ol>\n<p>-- Interview panel (minimum of 3 people): Head of the study program or representative, prospective supervisor, and a member of the selection team<br \/>\n&#8211; Wawancara menilai kesiapan mahasiswa melakukan penelitian mandiri, dan penentuan kelayakan mahasiswa mengikuti matakuliah secara mandiri terutama untuk matakuliah wajib prodi.<br \/>\nProspective students are declared to have passed the MBR selection process if they meet the requirements for passing the regular selection process (TPA, TOEFL, Science and Engineering educational background, written test), have a draft proposal signed by the prospective supervisor, and are recommended by the prospective supervisor. The supervisor's role in the selection process is very important, especially since recommendations can only be given after evaluating the prospective student's potential based on the portfolio and observations during the discussion of the draft research proposal.<\/p>\n<p>Specifically for PISM students who will take part in the MBR program, there are the following requirements:<\/p>\n<p>&#8211; Di akhir semester 7, ada rekomendasi dari dosen pembimbing S1.<br \/>\n&#8211; Topik penelitian Tesis harus merupakan kelanjutan dari topik penelitian S1<br \/>\n&#8211; Minimal satu orang anggota tim pembimbing Tesis S2 adalah bagian dari tim pembimbing TA S1.<\/p>\n<h5><strong>New Student Admission Consultation Services<\/strong><\/h5>\n<p>For prospective graduate students and non-regular students who wish to consult about the new student admission administration at ITB, consultations can be made via Zoom, according to the information provided in the following link.<\/p>\n<p><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/admission.itb.ac.id\/home\/kontak\">https:\/\/admission.itb.ac.id\/home\/kontak<\/a><\/span><\/p>\n<p>Consultation schedule: Tuesday and Thursday from 13:30 to 14:30 WIB.<\/p>\n<p><strong style=\"color: inherit; font-size: 20px; letter-spacing: 0.05em; text-transform: uppercase;\">Other Information<\/strong><\/div>\n<\/div>\n<div class=\"su-spoiler su-spoiler-style-default su-spoiler-icon-plus\" data-anchor=\"informasilains2if\" data-scroll-offset=\"0\" data-anchor-in-url=\"no\">\n<div class=\"su-spoiler-content su-u-clearfix su-u-trim\">\n<p><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/drive.google.com\/file\/d\/1h3SUDo94mxemMqug2XoR0Z1WJXrX54kn\/view?usp=sharing\">Topic Coverage in the ITB Master of Informatics S2 Selection Test<\/a><\/span><\/p>\n<p><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/drive.google.com\/file\/d\/1Ya4KPQALnzUWCunUFohTwxH-JWF__Dhz\/view?usp=sharing\">List of Supervisors for MBR S2 IF<\/a><\/span><\/div>\n<\/div>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><div class=\"vc_tta-panel\" id=\"1723451005487-b58812aa-e7b5\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1723451005487-b58812aa-e7b5\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Thesis Poster<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><strong>Wisudawan Program Magister Informatika, Oktober 2023<\/strong><\/p>\n<p><strong>\n<table id=\"tablepress-42\" class=\"tablepress tablepress-id-42\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">No.<\/th><th class=\"column-2\">Student Identification Number (NIM)<\/th><th class=\"column-3\">NAMA<\/th><th class=\"column-4\">Jalur Pilihan<\/th><th class=\"column-5\">Thesis Poster<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">23519014<\/td><td class=\"column-3\">Fakhri Aunurrahim<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\">Penerapan WOAmM pada Pelatihan FLANN untuk Meningkatkan Akurasi pada Software Effort Estimation<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">23519016<\/td><td class=\"column-3\">Iswahyudi<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1YGtPxrxIFG1uvrA1LIH4cC4AMhrWC1q0\/view?usp=drive_link\">Alat Bantu Identifikasi Permasalahan Kinerja I\/O Pada Aplikasi Berbasis Web<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">23519031<\/td><td class=\"column-3\">Raden Alf Fajrus Shuluh<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\">Penerapan Algoritme Block Nested Loop Join Menggunakan <br \/>\nMetode Server-Side Processing untuk Basis Data MongoDB pada Lingkungan yang <br \/>\nTerdistribusi<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">23520016<\/td><td class=\"column-3\">Rossevine Artha Nathasya<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1YILUwC0b6bQB0mnkVGsbklkYlAHkxHwq\/view?usp=drive_link\">Sistem Pengenal Suara Untuk Bahasa Indonesia Menggunakan Transfer Learning Berbasis Wav2Vec2 Pada Beberapa Domain Spesifik<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">23520028<\/td><td class=\"column-3\">Ratih Aflita Rahmawati<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1SG2R8U64Lvu4n4oJG7HkEBf2CVwtKYGA\/view?usp=drive_link\">Klasifikasi Data Time Series Berbasis Latent Motif untuk Prediksi Cuaca Ekstrem<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">23520030<\/td><td class=\"column-3\">Daniel Tanta Christopher Sirait<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1btwi0eUbPXi4Q-heLwhVnjbjQ7xVUEnQ\/view?usp=drive_link\">Deteksi Penyakit Kanker Menggunakan Principal Component Analysis dan Long-Short Term Memory<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\">23520034<\/td><td class=\"column-3\">Gabriel Jonathan<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1GqJmdQADb-HALZLJvSRNCCRoa-ecDJ9i\/view?usp=drive_link\">Implementasi Agen Reinforcement Learning Untuk Permainan Video Strategi Berbasis Giliran<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">8<\/td><td class=\"column-2\">23520052<\/td><td class=\"column-3\">Raden Haryo Pandu Prakoso<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/16xtw5zXkdUBtNKr6hKGsTKIlHTEzsbcY\/view?usp=drive_link\">Studi Metodologi Pemodelan Data untuk Basis Data Berorientasi Kolom<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">9<\/td><td class=\"column-2\">23521004<\/td><td class=\"column-3\">Ricky Yuliawan<\/td><td class=\"column-4\">Media Technology and Mobile Devices<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/10n1FMmV4UbHvgZhRsEuHMLZ5D6cmN1zn\/view?usp=drive_link\">Rancang Bangun Aplikasi Gawai OpenCourseWare Menggunakan Pendekatan Player-Centered Design<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">10<\/td><td class=\"column-2\">23521009<\/td><td class=\"column-3\">Muhammad Ikhsan<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1UjeocyLjUbJN9DoL-G6s9OHdGav4nS34\/view?usp=drive_link\">Path Selection Prioritization pada Control Flow Testing dengan Metode Clustering<\/a><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">11<\/td><td class=\"column-2\">23521011<\/td><td class=\"column-3\">Dionisius Pratama<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1e2vcACou1_pMDAERzgtyA_DPpxdUDU3K\/view?usp=drive_link\">Analisis Opini Publik tentang Transportasi di Kota Bandung dan Jakarta pada Media Sosial Twitter dengan Model Bidirectional Encoder Representations from Transformers<\/a><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">12<\/td><td class=\"column-2\">23521020<\/td><td class=\"column-3\">Zalina Fatima Azzahra<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/14M168-1kpLL7xpp4qvvhCfixCsHzjlDl\/view?usp=drive_link\">Manajemen Service Level Agreement (SLA) menggunakan Smart Contract berbasis Blockchain Untuk Meningkatkan Kualitas Manajemen Layanan Teknologi Informasi<\/a><\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">13<\/td><td class=\"column-2\">23521024<\/td><td class=\"column-3\">Ihsan Fauzi<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1jkoo9iNckI6TRk44mSixcWeKCUvi8Zrp\/view?usp=drive_link\">Metode Resampling Bauran Menggunakan DBSCAN dan Particle Swarm Optimization (PSO) untuk Menangani Ketidakseimbangan Data pada Proses Klasifikasi<\/a><\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">14<\/td><td class=\"column-2\">23521025<\/td><td class=\"column-3\">Vincent Joel Sinatra<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/15gKsrIjkOhAmiz-E0gO2hWhcwab8g911\/view?usp=drive_link\">Analisis Keterkaitan antara Code Review dan Bug dalam Software Release dengan Menggunakan Teknik Mining Software Repositories<\/a><\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">15<\/td><td class=\"column-2\">23521027<\/td><td class=\"column-3\">Kadek Denaya Rahadika Diana<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1TJeZdiqCKFGYeN6vZHHAgugpvjWmMY9Q\/view?usp=drive_link\">Extractive Summarization dengan Text Encoder Sentence-Bert dan Reinforcement Learning untuk Teks Bahasa Indonesia<\/a><\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">16<\/td><td class=\"column-2\">23521030<\/td><td class=\"column-3\">Dhiya Ulhaq Dewangga<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1htuoHqLV7eNU6MuogX1HY6T2fjBNZBaf\/view?usp=drive_link\">Sistem Text To Speech Untuk Gangguan Bicara Disfonia Menggunakan Arsitektur Adversarial Networks Dengan Pendekatan Kloning Suara<\/a><\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\">17<\/td><td class=\"column-2\">23521049<\/td><td class=\"column-3\">Faisal Ridwan Siregar<\/td><td class=\"column-4\">Media Technology and Mobile Devices<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1Ayrm7WlmDVDXw8jFW9CgEBeqblQwhTP2\/view?usp=drive_link\">Pembelajaran Berbasis Aplikasi Gawai Bergamifikasi dalam Belajar Membaca Al-Qur'an<\/a><\/td>\n<\/tr>\n<tr class=\"row-19\">\n\t<td class=\"column-1\">18<\/td><td class=\"column-2\">23521050<\/td><td class=\"column-3\">Ginanjar Septian Adhitia<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1TErJSW2I9jvXqelgnMSvYm3bKPW5x8oE\/view?usp=drive_link\">Operator Agregasi OLAP Cube pada Basis Data NoSQL Berorientasi Kolom Dengan Pendekatan Resilient Distributed Dataset<\/a><\/td>\n<\/tr>\n<tr class=\"row-20\">\n\t<td class=\"column-1\">19<\/td><td class=\"column-2\">23521054<\/td><td class=\"column-3\">Muhammad Fadhlan Putranto<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1ZRnHrM-WjCc0WOI91Kv_GoV0_7ifNbI3\/view?usp=drive_link\">Model Deep Learning Untuk Prediksi Curah Hujan Ekstrim Dengan Memanfaatkan Data Satelit Himawari dan Data Model Rapidly Development Cumulus Area (RDCA)<\/a><\/td>\n<\/tr>\n<tr class=\"row-21\">\n\t<td class=\"column-1\">20<\/td><td class=\"column-2\">23521063<\/td><td class=\"column-3\">Anranur Uwaisy Marchiningrum<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1MKQFrUIrgMbHnnSnYuS6VAdcCBKxvHyE\/view?usp=drive_link\">Predictive Maintenance Mesin Turbin Uap pada Proses Pengolahan Kelapa Sawit dengan Pendekatan Konsep Digital Twin<\/a><\/td>\n<\/tr>\n<tr class=\"row-22\">\n\t<td class=\"column-1\">21<\/td><td class=\"column-2\">23521071<\/td><td class=\"column-3\">Insan Ganang Putranda<\/td><td class=\"column-4\">Media Technology and Mobile Devices<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1XmR5pY8ytp55FnGvJFeh6ABaFZJekxqb\/view?usp=drive_link\">Penggunaan Teknologi Mixed Reality dengan Pemrosesan Sinyal Audio dalam Melatih dan Meningkatkan Motivasi Pembelajaran Alat Musik Tuts<\/a><\/td>\n<\/tr>\n<tr class=\"row-23\">\n\t<td class=\"column-1\">22<\/td><td class=\"column-2\">23521072<\/td><td class=\"column-3\">Ahmad Tarmizan Kusuma<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1PJMDLib2pZftddmZ0oOZF1DtMHLUrNjS\/view?usp=drive_link\">Desain Integrasi Blockchain dan Metaverse Berbasis API untuk Layanan Publik (Studi Kasus: Pendataan Identitas Digital)<\/a><\/td>\n<\/tr>\n<tr class=\"row-24\">\n\t<td class=\"column-1\">23<\/td><td class=\"column-2\">23521079<\/td><td class=\"column-3\">Nima Rohmalia<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1MLOv2FXLZ7SULDeD5aeNLn7-wL23d7UK\/view?usp=drive_link\">Perancangan Model Central Bank Digital Currency (CBDC) Retail Sebagai Sistem Pembayaran<\/a><\/td>\n<\/tr>\n<tr class=\"row-25\">\n\t<td class=\"column-1\">24<\/td><td class=\"column-2\">23521083<\/td><td class=\"column-3\">Wawan Indrawan Madda<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1Mz-f6xY7Pw72trhS6Tf6dXPw2EzvnrjH\/view?usp=drive_link\">RDB2OL dan RDB2FHIR: Bahasa dan Kakas untuk Memetakan Basis Data Relasional ke Fast Healthcare Interoperability Resources<\/a><\/td>\n<\/tr>\n<tr class=\"row-26\">\n\t<td class=\"column-1\">25<\/td><td class=\"column-2\">23521090<\/td><td class=\"column-3\">Syfa Nur Lathifah<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1vWxDQsedWnWyzAEl3hg0bHo9G0XmFCF7\/view?usp=drive_link\">Optimalisasi Sistem Pemantauan Budidaya Jamur Tiram Melalui Implementasi Konsep Digital Twin<\/a><\/td>\n<\/tr>\n<tr class=\"row-27\">\n\t<td class=\"column-1\">26<\/td><td class=\"column-2\">23521093<\/td><td class=\"column-3\">Mochammad Farrell<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1PKwDBoWYvl0cyYTSqOFQasGmmdWZTwlH\/view?usp=drive_link\">Penerapan Event Driven Architecture dalam Memenuhi Kebutuhan SLA Query Information DAN Query Transaction pada Studi Kasus Bulk Payment<\/a><\/td>\n<\/tr>\n<tr class=\"row-28\">\n\t<td class=\"column-1\">27<\/td><td class=\"column-2\">23521094<\/td><td class=\"column-3\">Muhammad Harun<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1w_cO4DA9SKxARMvqZNNM5DJHcTRv5rb5\/view?usp=drive_link\">Gamifikasi Berbasis Personalized Learning untuk Menghasilkan Rekomendasi Jalur Belajar Ejaan Bahasa Indonesia<\/a><\/td>\n<\/tr>\n<tr class=\"row-29\">\n\t<td class=\"column-1\">28<\/td><td class=\"column-2\">23521095<\/td><td class=\"column-3\">Jatmiko Herjati<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1ukkc0mvBxfsz6Tr5AEvnbknC2SZrFKwC\/view?usp=drive_link\">Perancangan dan Implementasi Kakas Pembangkitan Diagram Arsitektur dari Deskriptor Sistem<\/a><\/td>\n<\/tr>\n<tr class=\"row-30\">\n\t<td class=\"column-1\">29<\/td><td class=\"column-2\">23522006<\/td><td class=\"column-3\">Radhinansyah Hemsa Ghaida<\/td><td class=\"column-4\">Data Science and Artificial Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1LYxR6NLgqruGxpY1yVYfCAhOSDCZNPLD\/view?usp=drive_link\">Pengembangan Metode DTLPLP untuk Prediksi Link pada<br \/>\nNetwork Heterogen Dinamis dengan Pendekatan Heter-LP<\/a><\/td>\n<\/tr>\n<tr class=\"row-31\">\n\t<td class=\"column-1\">30<\/td><td class=\"column-2\">23522011<\/td><td class=\"column-3\">Michael Hans<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/12L1NYDJZriNRc85m3OI9NNQe-A7PFGS9\/view?usp=drive_link\">Predictive Analytics untuk Optimasi Emisi Karbon dari Aktivitas Pembelajaran Mahasiswa (Studi Kasus: Institut Teknologi Bandung)<\/a><\/td>\n<\/tr>\n<tr class=\"row-32\">\n\t<td class=\"column-1\">31<\/td><td class=\"column-2\">23522012<\/td><td class=\"column-3\">Anindya Prameswari Ekaputri<\/td><td class=\"column-4\">Data Science and Artificial Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1Z8Cm2zBg-5Fwjp2OWlXaXKBS4eIIwCyY\/view?usp=drive_link\">Pengembangan Model Pencari Pakar dengan Propagasi Nilai Graf dan Ekspansi Query Berbasis Semantik<\/a><\/td>\n<\/tr>\n<tr class=\"row-33\">\n\t<td class=\"column-1\">32<\/td><td class=\"column-2\">23522013<\/td><td class=\"column-3\">Hollyana Puteri Haryono<\/td><td class=\"column-4\">Data Science and Artificial Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1TdboWHBtMaS6fzgUPJh_WA95aCPvUJZK\/view?usp=drive_link\">Dynamic Heter-LP: Pengembangan Algoritma Heter-LP sebagai Solusi Link Prediction untuk Graf Heterogen Dinamis dengan Integrasi DTLPLP<\/a><\/td>\n<\/tr>\n<tr class=\"row-34\">\n\t<td class=\"column-1\">33<\/td><td class=\"column-2\">23522015<\/td><td class=\"column-3\">Adriel Gustino Parlinggoman Situmorang<\/td><td class=\"column-4\">Data Science and Artificial Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1Ak7OTNkRgnZtv1fnpo2lftWAX1Yl6F67\/view?usp=drive_link\">Studi Komparasi Estimasi Nilai Reproduction Number dari penyakit COVID-19 pada Model Kompartemen SIR Menggunakan Algoritma Kalman Filter dan Optuna untuk Tata Kelola Berbasis Data<\/a><\/td>\n<\/tr>\n<tr class=\"row-35\">\n\t<td class=\"column-1\">34<\/td><td class=\"column-2\">23522018<\/td><td class=\"column-3\">Patrick Segara<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1gLMMTgUWQvTQnFgyL3FGVAVi7q949PGr\/view?usp=drive_link\">Framework Implementasi Green IT pada Perguruan Tinggi (Studi Kasus: Institut Teknologi Bandung)<\/a><\/td>\n<\/tr>\n<tr class=\"row-36\">\n\t<td class=\"column-1\">35<\/td><td class=\"column-2\">23522020<\/td><td class=\"column-3\">Danendra Athallariq Harya Putra<\/td><td class=\"column-4\">Data Science and Artificial Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1O6pad5GMNuC5YfwtcSnYV7Doa4V_Euoa\/view?usp=drive_link\">Ekstraksi Tuple Opini Menggunakan Pendekatan Generatif Berbasis Model Bahasa Pra-latih untuk Analisis Sentimen Berbasis Aspek<\/a><\/td>\n<\/tr>\n<tr class=\"row-37\">\n\t<td class=\"column-1\">36<\/td><td class=\"column-2\">23522023<\/td><td class=\"column-3\">Christovito Hidajat<\/td><td class=\"column-4\">Data Science and Artificial Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/14M0Vy5qp1dKXMqTKH7sZwe-BPuJjdF6X\/view?usp=drive_link\">Model Pendeteksian Fraud pada Transaksi Keuangan Menggunakan Algoritma Least-Squares Support Vector Machine Probabilistik Berbasis Ekspektasi dan Kuantil dengan Data Simbolis<\/a><\/td>\n<\/tr>\n<tr class=\"row-38\">\n\t<td class=\"column-1\">37<\/td><td class=\"column-2\">23522043<\/td><td class=\"column-3\">Vhydie Gilang Christianto The<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1V5RBsojuH7XFerNVmTL9b6WIr7PAsiYC\/view?usp=drive_link\">Sistem Pendukung Keputusan Cerdas untuk Pengelolaan Peralatan Teknologi Informasi (Studi Kasus: Institut Teknologi Bandung)<\/a><\/td>\n<\/tr>\n<tr class=\"row-39\">\n\t<td class=\"column-1\">38<\/td><td class=\"column-2\">23522044<\/td><td class=\"column-3\">Byan Sakura Kireyna Aji<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/16VK6xZHv6ZMsCZ75Vb2r20iohJm1RML6\/view?usp=drive_link\">Model Pemantauan Cerdas Carbon Footprint untuk Bangunan di Institut Teknologi Bandung Ganesha<\/a><\/td>\n<\/tr>\n<tr class=\"row-40\">\n\t<td class=\"column-1\">39<\/td><td class=\"column-2\">23522045<\/td><td class=\"column-3\">Muhammad Farid Adilazuarda<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\">Pembangunan Metode LanguageFusion untuk Mengatasi Language Identification Bottleneck pada Modular Multilingual Language Models<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-42 from cache --><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Wisudawan Program Magister Informatika, Juli 2023<\/strong><\/p>\n<p><strong>\n<table id=\"tablepress-41\" class=\"tablepress tablepress-id-41\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">No.<\/th><th class=\"column-2\">Student Identification Number (NIM)<\/th><th class=\"column-3\">Name<\/th><th class=\"column-4\">Jalur Pilihan<\/th><th class=\"column-5\">Thesis Poster<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">23521017<\/td><td class=\"column-3\">Hilmi Aziz Bukhori<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1Oj10Xj0UD16j-P6yPM26Ttxj-eylvtYr\/view?usp=sharing\">Sistem Deteksi Anomali pada Transaksi Perbankan menggunakan Model Pembelajaran Mesin Berbasis Graph Neural Network <\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">23521023<\/td><td class=\"column-3\">Dimmas Mulya<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1BH2Wc1eI5yEDh1oySyxsCIkNVWexfTvi\/view?usp=drive_link\">Ekstraksi Kejadian Biomedis Menggunakan Klasifikasi Multi-Label dan BERT Pra-Latih <\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">23521028<\/td><td class=\"column-3\">Rizal Kusuma Putra<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1qbJRY3IgG5QX7A7cWHMZTup9hzDPtE8d\/view?usp=drive_link\">Pengenalan Objek Berbahaya Berbasis Kemiripan Menggunakan Siamese Network Pada Pemeriksaan X-Ray Bagasi <\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">23521077<\/td><td class=\"column-3\">Muhammad Faris Muzakki<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1n51VOdnKIly_aDGlHSmvBf33VtGqdfXb\/view?usp=drive_link\">Image Synthesis Menggunakan Generative Adversarial Network Untuk Mengatasi Permasalahan Imbalance Pada Kasus Klasifikasi X-Ray Dada <\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">23521085<\/td><td class=\"column-3\">Aaz Muhammad Hafidz Azis<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1dPdnWTTnp81qxizW3bVrxsVzNHmswfbG\/view?usp=drive_link\">Klasifikasi Pelafalan Huruf Hijaiyah Sesuai Sanad Menggunakan Metode SVM, CNN dan LSTM <\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">23522007<\/td><td class=\"column-3\">Moch. Nafkhan Alzamzami<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1dehG-gJE6C7OkZE5UpQQCa-mlFgFF2Nu\/view?usp=drive_link\">Pengembangan Abstract Meaning Representation Parser Lintas Bahasa Indonesia-Inggris dengan BART, Konkatenasi Input, dan Augmentasi Data <\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\">23522033<\/td><td class=\"column-3\">Ilham Syahid Syamsudin<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/17ouJtGaqsl-ymnon871xSN8Yi1R03gSu\/view?usp=drive_link\">Adaptasi Penerapan Layer-wise Adaptive Rate Scaling (LARS) Pada Model Pembelajaran Mesin Terdistribusi <\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-41 from cache --><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Wisudawan Program Magister Informatika, April 2023<\/strong><\/p>\n<p><strong>\n<table id=\"tablepress-40\" class=\"tablepress tablepress-id-40\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">No.<\/th><th class=\"column-2\">Student Identification Number (NIM)<\/th><th class=\"column-3\">Name<\/th><th class=\"column-4\">Jalur Pilihan<\/th><th class=\"column-5\">Thesis Poster<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">23520009<\/td><td class=\"column-3\">Arian Nurrifqhi<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/104USx2WYju-3qe2pd02ZabMsdm_tzeKK\/view?usp=share_link\">Pengembangan Model Penilaian Risiko Manajemen Proyek Aplikasi pada GX PMBOK Menggunakan Checklist Scenario Analysis dan Simple Additive Weighting (Studi Kasus: Pemerintah Daerah Kabupaten Bandung)<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">23520013<\/td><td class=\"column-3\">Faishol Muzaky Dwi Putra<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1SfX3AqrBfQ61g433yfkpX5EzcXypeCIX\/view?usp=share_link\">Penentuan Lokasi Ponsel Pintar di Dalam Ruangan Dengan Menggunakan WLAN<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">23520029<\/td><td class=\"column-3\">Safara Cathasa Riverinda Rijadi<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/18nX9Ymnj7l2Wdvc_Zl7Xj5H3570UMuZy\/view?usp=share_link\">Perancangan Tata Kelola Penanganan Pandemi COVID-19 di Indonesia<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">23520050<\/td><td class=\"column-3\">Muhammad Anwari Leksono<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1gmvzBzAL8LA75VCPiJawDVWKTVREXo0t\/view?usp=share_link\">Penerapan Pelabelan Sekuensial dan DNABERT untuk Memprediksi Splice Sites pada DNA Homo Sapiens<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">23521006<\/td><td class=\"column-3\">Muhammad Isfan Rahadi<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1gPv-aK14K0DkUjwi7gEaVXuao7W7g7fL\/view?usp=share_link\">Prediksi Angka Kasus Covid-19 Setelah Program Vaksinasi Menggunakan Model SEIVR dan Latin Hypercube Sampling<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">23521021<\/td><td class=\"column-3\">Miftahul Mahfuzh<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1OSmoN8WN1c5n30EJc0WgH31vgJrSx643\/view?usp=share_link\">Klasifikasi Multi-Label Pada Pemrosesan Teks Menggunakan Arsitektur Transformer Dengan Pendekatan Multi-Task Learning<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\">23521062<\/td><td class=\"column-3\">Anggastya Diah Andita H.P<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1zCNTkyTmdnQkhbil8UR0JPeNlnoVkt1B\/view?usp=share_link\">Penelusuran Ketercapaian Sasaran Mutu Dalam Penerapan Sistem Manajemen Mutu (ISO 9001) Berbasis Blockchain<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-40 from cache --><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Wisudawan Program Magister Informatika, Oktober 2022<\/strong><\/p>\n<p><strong>\n<table id=\"tablepress-38\" class=\"tablepress tablepress-id-38\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">No.<\/th><th class=\"column-2\">Student Identification Number (NIM)<\/th><th class=\"column-3\">Name<\/th><th class=\"column-4\">Jalur Pilihan<\/th><th class=\"column-5\">Thesis Poster<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">23520001<\/td><td class=\"column-3\">Muhammad Ulfi<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1_TfC208tomIvpL9L2bdxKb5nDN-dYmCM\/view?usp=sharing\">Sistem Query by Humming Menggunakan Ekstraksi Melodi Frequency-Temporal Attention Network dan Modifikasi Unified Algorithm<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">23520002<\/td><td class=\"column-3\">Yusuf Luthfi Ramdhani<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1emTTrFuiZbhr8D-aHSZ9pY3IjMinonhL\/view?usp=sharing\">Pengembangan Model Tata Kelola AI di Perusahaan Berdasarkan Struktur Model CMMI (Studi Kasus: Bidang Kesehatan)<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">23520007<\/td><td class=\"column-3\">Labib Izzatur Rahman<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1qPHJaTKhw3sAoaOC84EQPX89wODM-02w\/view?usp=sharing\">Pengembangan Domain-Specific Languange Untuk Spesifikasi Smart Contract<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">23520012<\/td><td class=\"column-3\">Fairuz Astra Pratama<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/15W-M8qrVXLfAqBSL0rF1IQup6hjEUqZh\/view?usp=sharing\">Pembuatan Wang Tiles Otomatis Menggunakan Pendekatan Parametrik<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">23520014<\/td><td class=\"column-3\">Josua Crishan Mintamanis<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1C7R7N_tcFIs2YccH8dEwzsoVoSLFG6Bs\/view?usp=sharing\">Analisis Semantic Textual Similarity antara Headline dan Content pada Deteksi Berita Clickbait menggunakan ColBERT dengan Arsitektur Siamese Network<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">23520017<\/td><td class=\"column-3\">Widya Puteri Aulia<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/18QzV4lykhVm26bzdEt102ldOjsEfLAww\/view?usp=sharing\">Deteksi Dini Penderita Depresi Melalui Teks Berbahasa Indonesia dengan Transfer Learning dan Fitur Metadata Linguistik<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\">23520026<\/td><td class=\"column-3\">Walim Abdul Somad<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/129sq44TxSb3MhqOUDsWfZsjzXvH2Dur1\/view?usp=sharing\">Perancangan Arsitektur Integrasi Aplikasi Menggunakan Service-Oriented Architecture Studi Kasus Pendaftaran Pelaku Usaha<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">8<\/td><td class=\"column-2\">23520047<\/td><td class=\"column-3\">Harits Abdurrohman<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1bR0hFSQ-dHy5UxHulZPfMeTr-kGxOtD8\/view?usp=sharing\">Adopsi Knowledge Distillation dan Siamese Network Dalam Segmentasi Semantik Berbasis Semi-Supervised Learning<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">9<\/td><td class=\"column-2\">23521005<\/td><td class=\"column-3\">Rayza Mahendra Guntara Harsono<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1DnUOB1Qst9lZBDbePpU21JxtplHdZNbS\/view?usp=sharing\">Zero-shot dan Few-shot Learning Pada Klasifikasi Teks Domain Bahasa Indonesia<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">10<\/td><td class=\"column-2\">23521014<\/td><td class=\"column-3\">Firdausi Aditya Darmawan<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1tw6kVx9ZUBVLLYRIXpisOt4JRgFfJ4B9\/view?usp=sharing\">Pengembangan Sistem Prediksi Mahasiswa yang Berpotensi Dropout Menggunakan Data Mining<\/a><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">11<\/td><td class=\"column-2\">23521052<\/td><td class=\"column-3\">Moch Azhar Dhiaulhaq<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1sNTSpROYeFAPk2y044lJA5znxkqUXn50\/view?usp=sharing\">Post-Control Prosodi dan Emosi untuk Sistem Text to Speech Bahasa Indonesia<\/a><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">12<\/td><td class=\"column-2\">23521067<\/td><td class=\"column-3\">Aisyah Nurul Izzah Adma<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1yrr-9KhkqcDsdWnlNlmLduQPxBEZdwMk\/view?usp=sharing\">Diarisasi Emosi pada Audio Percakapan Bahasa Indonesia Menggunakan Kode Peran Pembicara dan Model Hybrid RNN-CRF<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-38 from cache --><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Wisudawan Program Magister Informatika, Juli 2022<\/strong><\/p>\n<p><strong>\n<table id=\"tablepress-37\" class=\"tablepress tablepress-id-37\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">No<\/th><th class=\"column-2\">Student Identification Number (NIM)<\/th><th class=\"column-3\">NAMA<\/th><th class=\"column-4\">Jalur Pilihan<\/th><th class=\"column-5\">Thesis Poster<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">23519024<\/td><td class=\"column-3\">Giffari Alfarizy<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1B9UCrUet4I5f55ugdutmvNhWr0E9B2UJ\/view?usp=sharing\">Verifikasi Unanswerable Question pada Sistem Question Answering Menggunakan Sentence-BERT dan Cosine Similarity<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">23519033<\/td><td class=\"column-3\">Hadi Permana<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1REOMnHM3tFrlAEZXqHJ8oaoaUaPb8IvM\/view?usp=sharing\">Analisis Sentimen pada Bahasa Sunda Menggunakan Pre-trained Language Model Multi Bahasa<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">23519036<\/td><td class=\"column-3\">Ayu Komalasari<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1g341RdaLA4Zx3v-MKoIPuZs2_9x5ZhyI\/view?usp=sharing\">Optimasi Prediksi Defect Menggunakan Kombinasi Metrik Perangkat Lunak<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">23520020<\/td><td class=\"column-3\">Oktefvia Aruda Lisjana<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1uLJmDMnMf9zW-XRHtw7T5ItTAoSwY-32\/view?usp=sharing\">Klasifikasi dan Clustering untuk Mendapatkan Struktur Teks Laporan Masyarakat<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">23520032<\/td><td class=\"column-3\">Aditya Rachman Putra<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1XLaM1noM1fKSSMp49S317r5aOULXgCA5\/view?usp=sharing\">Pembangkitan Abstract Meaning Representation Lintas Bahasa dari Kalimat Berbahasa Indonesia<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">23520036<\/td><td class=\"column-3\">Sigit Widodo<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1YuauKCR2m4xT-7XQRktcFddT5Yi5HUef\/view?usp=sharing\">Pengembangan Kakas Bantu Deteksi Design Smell dengan Menggunakan UML Class Diagram<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\">23520038<\/td><td class=\"column-3\">Gisela Kurniawati<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1ALsMhM_1orcp7APlt5OCgZkAZ8M0nAmm\/view?usp=sharing\">Prediksi Performa Akademik dan Waktu Kelulusan Mahasiswa Menggunakan LSTM dan GRU<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">8<\/td><td class=\"column-2\">23520046<\/td><td class=\"column-3\">I Nyoman Switrayana<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1bDoV5lXrxk9WFpSVqRgU_2iLzbMO6YIn\/view?usp=sharing\">Sistem Rekomendasi Paper Menggunakan Pendekatan Hybrid untuk Mengatasi Data Sparsity<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">9<\/td><td class=\"column-2\">23520049<\/td><td class=\"column-3\">Hasna Karimah<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1qXhUlk54FjiA68V_AMGFlueuoqsn_XLi\/view?usp=sharing\">Perancangan Dan Implementasi Sistem QAR Untuk Pembelajaran Sejarah Dengan Teknologi Marker Based Augmented Reality<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">10<\/td><td class=\"column-2\">23521044<\/td><td class=\"column-3\">Fajar Muslim<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1Emas850Q6L8Wn--66N-vShKdsrtaOjYH\/view?usp=sharing\">Penyelesaian Coreference Resolution Bahasa Indonesia Menggunakan Arsitektur Word Level Coreference Resolution<\/a><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">11<\/td><td class=\"column-2\">23521045<\/td><td class=\"column-3\">Marsa Thoriq Ahmada<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1JK3kFS1vZrtNsgTxsusbaplAZoGJ8FvM\/view?usp=sharing\">Image Captioning Dengan Text Augmentation dan Transformer. Studi Kasus: Data Pariwisata<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-37 from cache --><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Wisudawan Program Magister Informatika, April 2022<\/strong><\/p>\n<p><strong>\n<table id=\"tablepress-36\" class=\"tablepress tablepress-id-36\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">No<\/th><th class=\"column-2\">Student Identification Number (NIM)<\/th><th class=\"column-3\">NAMA<\/th><th class=\"column-4\">Jalur Pilihan<\/th><th class=\"column-5\">Thesis Poster<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">23518031<\/td><td class=\"column-3\">Kukuh Muhammad<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href =\"https:\/\/drive.google.com\/file\/d\/1yVoxCXHtOiMo8-oKQtSIDJtDc67ZE60v\/view?usp=sharing\">Pengembangan Protokol Komunikasi Data Aman pada Sistem IoT dengan Skema Autentikasi Mutual Berbasis HMAC untuk Menjamin Integritas Data<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">23518038<\/td><td class=\"column-3\">Goklas Henry Agus Panjaitan<\/td><td class=\"column-4\">Information Technology<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1AWrCVivhjOwU8ShVriC4PTlcTU7InYz6\/view?usp=sharing\">Platform Deteksi Penyakit Daun Berbasis Komputasi Tepi Pada Sistem Multimedia IoT<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">23518039<\/td><td class=\"column-3\">Izuardo Zulkarnain<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1zbPW1yjeZS85GH-I3Cn27oKe_vwoEtmg\/view?usp=sharing\">Ekstraksi Informasi Tabel Menggunakan Data Augmentation pada Deep Learning dan Image Processing<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">23519008<\/td><td class=\"column-3\">Muhammad Haris Maulana<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1IFqTSkAE6kc378AFl-Z6mp56Keqs0Ljf\/view?usp=sharing\">Kategorisasi Aspek Tanpa Supervisi Untuk Analisis Sentimen Menggunakan Aspect Embedding dan Pruning<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">23519028<\/td><td class=\"column-3\">Irvan Ariyanto<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1KEB-Wafm9_fBoJ_W0jpiYKqMO4V7pcgP\/view?usp=sharing\">Klasifikasi Mood Multilabel Berbasis Fitur Lirik Lagu Bahasa Indonesia<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">23519035<\/td><td class=\"column-3\">Arrival Dwi Sentosa<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1pBVeqsc0EkGwxfptIcfFiB6QcgLBSIgw\/view?usp=sharing\">Prediksi Resiko White Spot Syndrome Virus pada Udang Vannamei<br \/>\ndengan Pendekatan Machine Learning dan Expert Knowledge<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\">23520011<\/td><td class=\"column-3\">Fauzan Firdaus<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1Olw6OCV2fYqTXpm6D-K3hedFA1UjXq19\/view?usp=sharing\">Pengenalan Wajah Bermasker menggunakan Deep Learning<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">8<\/td><td class=\"column-2\">23520022<\/td><td class=\"column-3\">Made Raharja Surya Mahadi<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1knQAUWMhn6RwyTKWRj8FbGYtfZ5XO1VZ\/view?usp=sharing\">Membangkitkan Gambar Dari Teks Deskripsi Bahasa Indonesia Menggunakan Generative Adversarial Networks<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">9<\/td><td class=\"column-2\">23520039<\/td><td class=\"column-3\">Nadya Aditama<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1UMt67eP0zkbVT1vIHyKV8rHGF3I-HX5f\/view?usp=sharing\">Estimasi Kalori pada Jajanan Pasar di Indonesia Menggunakan Mask R-CNN dan Regresi Linear Berganda<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">10<\/td><td class=\"column-2\">23520044<\/td><td class=\"column-3\">Haris Orizadi<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1Qf9yQ912i-Buz2520qGby71yYWbKwLUc\/view?usp=sharing\">Prediksi Multivariate Time Series Domain Finansial Menggunakan Spectral Temporal Graph Neural Network<\/a><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">11<\/td><td class=\"column-2\">23520053<\/td><td class=\"column-3\">I Putu Eka Surya Aditya<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1fHT5X3V41M2D73OJYKz2MYggTDaopzx7\/view?usp=sharing\">Pembelajaran Transfer dengan Post Training untuk Analisis Sentimen Berbasis Aspek Berbahasa Indonesia<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-36 from cache --><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Wisudawan Program Magister Informatika, Oktober 2021<\/strong><\/p>\n<p><strong>\n<table id=\"tablepress-29\" class=\"tablepress tablepress-id-29\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">No.<\/th><th class=\"column-2\">Student Identification Number (NIM)<\/th><th class=\"column-3\">Name<\/th><th class=\"column-4\">Jalur Pilihan<\/th><th class=\"column-5\">Thesis Poster<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">23517003<\/td><td class=\"column-3\">Eki Saputra<\/td><td class=\"column-4\">Information Technology<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1bjG6EnsNqISj72H_1rj_KOLrJWL2Crvf\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Implementasi Algoritma Fuzzy Topsis untuk Penjadwalan dan Sebaran Penerima Bantuan BST Di Kota Bandung Pada Masa Pandemi<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">23518021<\/td><td class=\"column-3\">Jadequeline Marsha Pricila<\/td><td class=\"column-4\">Computer Science<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1xNCsIqOhhGKr34AqOIrqtIqs5ofF-3wZ\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Pembangkit Keterangan Gambar Dengan SeqGAN Menggunakan Augment-Reinforce (AR) Estimator<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">23518035<\/td><td class=\"column-3\">Wisnu Arya Dipa<\/td><td class=\"column-4\">Information Systems<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1BKGGKOzCacJeMxRZmOlhGvdCx4ZuLltJ\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Prediksi Defect Perangkat Lunak Menggunakan SMOTE dan Artificial Neural Network<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">23519004<\/td><td class=\"column-3\">Muhammad Husni Mubarak<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1JXYU_yNq_s8dBXQ7T-xVLuHQ8BW4Cm7I\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Peramalan Konsumsi Listrik Bulanan dengan Metode Hybrid ARIMA-RF dan Teknik Dekomposisi CEEMDAN-SSA<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">23519010<\/td><td class=\"column-3\">Oky Rahmanto<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1SBqKlMU5eIsiOoXiUbQusJ54LzkMu5ob\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Trust Management Dalam Heterogeneous IoT System<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">23519013<\/td><td class=\"column-3\">Zalid Qomalita Hijriana<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1K3A6iDYnRS1g9KXFNDq6wr6CKAF-ksmz\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Verifikasi Wajah 3D dari Gambar Tunggal Beresolusi Rendah Berdasarkan Eksploitasi Deep Convolutional Feature<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\">23519015<\/td><td class=\"column-3\">Muhammad Adrinta Abdurrazzaq<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1WPcrHkt42aednRwJ1q83JckX9Sqm0LM7\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Optimasi Arsitektur MAGNET dalam Klasifikasi Teks Multi-Label<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">8<\/td><td class=\"column-2\">23519021<\/td><td class=\"column-3\">Muhammad Sidik Asyaky<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1aNeNE_uH5mwfdZdUgqjGivUSS83lD-GU\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Penerapan Word Embeddings dan UMAP Untuk Meningkatkan Kinerja HDBSCAN Pada Clustering Teks Pendek<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">9<\/td><td class=\"column-2\">23519026<\/td><td class=\"column-3\">Adnan Setiawan AR<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1g_4tOdLllMqGoVsllnPzSb76qRpzcpz3\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Sistem E-voting Berbasis Blockchain<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">10<\/td><td class=\"column-2\">23519034<\/td><td class=\"column-3\">Mokhamad Arfan Wicaksono<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/18Owu6-DddvvwX4Uh9-iKOz1tl-dmu5pY\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Analisis Statistik dan Model Prediksi Throughput pada Wireless Sensor Network Multimedia Menggunakan Pembelajaran Mesin Mendalam dengan Arsitektur Long Short-Term Memory<\/a><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\">11<\/td><td class=\"column-2\">23520008<\/td><td class=\"column-3\">Hani'ah\u00a0Wafa<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/13RrBRn9u1l9et3i6ij1TLzjBOSU3IerG\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Implementasi Reinforcement Learning dengan Pendekatan Komputasi Kuantum<\/a><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\">12<\/td><td class=\"column-2\">23520018<\/td><td class=\"column-3\">Kurniandha Sukma Yunastrian<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1JbGrOqM9CCRHL4WmFNeoVCKgj1cSiFhM\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Penentuan Prioritas Kebutuhan Perangkat Lunak Dengan Metode Collaboration Value Oriented Prioritization<\/a><\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\">13<\/td><td class=\"column-2\">23520019<\/td><td class=\"column-3\">Ranindya Paramitha<\/td><td class=\"column-4\">Software engineering<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1cEPn-7m9nAl4d81P0RMP-pwxSETJl4Xc\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Studi Security Smell pada Aplikasi Berbahasa Java<\/a><\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\">14<\/td><td class=\"column-2\">23520025<\/td><td class=\"column-3\">Irfan Ihsanul Amal<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1hqp8AFL7oUdt5sHUQA8F-2U_XgV2l7do\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Pembangkitan Teks Judul Spesifik untuk Gambar Produk Menggunakan Atribut Semantik<\/a><\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\">15<\/td><td class=\"column-2\">23520033<\/td><td class=\"column-3\">Rifo Ahmad Genadi<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1SmrhB_pvngxtEs-VJPmuNNnDGsaT4Kw4\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Pembelajaran Transfer dan Representasi Berbasis Span untuk Ekstraksi Triplet Opini untuk Analisis Sentimen Berbasis Aspek<\/a><\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\">16<\/td><td class=\"column-2\">23520043<\/td><td class=\"column-3\">Dandy Arif Rahman<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1nMzpXuMlOTdOS-nI5QshkWvfxhmYcyd2\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Pemanfaatan Shallow Learning untuk Klasifikasi COVID-19 Berdasarkan Suara Batuk<\/a><\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\">17<\/td><td class=\"column-2\">23520302<\/td><td class=\"column-3\">Dinda Yora Islami<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/11z3mgLC95SADtahou4vgLsNvsjhwr45S\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Pengembangan Model Akustik Menggunakan DNN Berbasis Chain Model Pada Sistem Pengenal Ucapan (Studi Kasus: Percakapan Kedokteran Gigi)<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-29 from cache --><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Wisudawan Program Magister Informatika, Juli 2021<\/strong><\/p>\n<p><strong>\n<table id=\"tablepress-30\" class=\"tablepress tablepress-id-30\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">No.<\/th><th class=\"column-2\">Student Identification Number (NIM)<\/th><th class=\"column-3\">Name<\/th><th class=\"column-4\">Jalur Pilihan<\/th><th class=\"column-5\">Thesis Poster<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">23518013<\/td><td class=\"column-3\">Setyo Legowo<\/td><td class=\"column-4\">Computer Science<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1OckdcVRCevwTw6g2ejuHZKwVxpib6YO9\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Studi Peningkatan Kecepatan Inferensi Model BERT pada CPU x86 Menggunakan Apache TVM<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">23519001<\/td><td class=\"column-3\">Amany Akhyar<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1D_hvcSBpYEmZ1TG-C3NMsBs-b70z6Md2\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Peringkasan Otomatis Berita Berbahasa Indonesia Dengan Abstract Meaning Representation<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">23519003<\/td><td class=\"column-3\">Paulus Setiawan Suryadjaja<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1jsaHT0_4RVf1YtuNsQTX8bn0WS-spOoX\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Penerapan Sentence-BERT untuk Meningkatkan Kinerja Peringkasan Teks Ekstraktif Berbasis Density Peaks Clustering<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">23519005<\/td><td class=\"column-3\">Triana Dewi Salma<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1fGCILXA5N2ACtOnZMDEaYiRXi7IugJqI\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Klasifikasi Teks Menggunakan XLNet dengan Proses Pelabelan Otomatis Infomap<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">23519011<\/td><td class=\"column-3\">Annisa Muzdalifa<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1NXa4cTb1_5NJYbZsCGXVFiSRIyhvwdOP\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Abstraksi Kluster dengan Graph Reduced Summarization terhadap Hasil Pencarian Kata Kunci Berbasis Metode Klustree<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">23519012<\/td><td class=\"column-3\">Gayuh Giliyuwana<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/15dCEVwPtUg74CVZCoIYJZaDSp9YszoAX\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Optimasi Clustering dengan Variable Weighting K-Means dan Antlion Optimizer untuk Pengelompokkan Feeder 20 kV Berdasarkan Indeks Keandalan Sistem Distribusi Tenaga Listrik<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">7<\/td><td class=\"column-2\">23519018<\/td><td class=\"column-3\">Keenan Adiwijaya Leman<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1mRZ0AT8SdrOu7_g5v24LZBESP3AwcunQ\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Aplikasi Pengenalan Aktivitas Manusia Sebagai Sistem Pendeteksi Kekerasan Fisik<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">8<\/td><td class=\"column-2\">23519027<\/td><td class=\"column-3\">Suwardiman<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1VKh6T_pmOm2F6vhSiKD_vaGsH7TQy4I3\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Adaptive Ridge Regression-FS dengan Normalisasi Pembobotan pada Prediksi Pertumbuhan PDB Indonesia dengan Google Trends<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">9<\/td><td class=\"column-2\">23520003<\/td><td class=\"column-3\">Nabila Rahmi Maulida<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/1bfR5da7KD_eIG0-fSN-cCfPSAtKmM-Y4\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Pembelajaran Mesin Menggunakan Gabungan Model ARIMA dan LSTM Untuk Prediksi Kepadatan Lalu Lintas<\/a><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\">10<\/td><td class=\"column-2\">23520027<\/td><td class=\"column-3\">Hamdi Ahmad Zuhri<\/td><td class=\"column-4\">Business Intelligence<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/file\/d\/13t1XCIPis6W-8LCZv8b0V9IFjzZUnP2w\/view?usp=sharing\" target=\"_blank\" rel=\"noopener\">Sistem Rekomendasi Produk pada E-commerce Menggunakan Multi Task Two Tower Retrieval Model<\/a><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td><td class=\"column-5\"><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\"><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td><td class=\"column-5\"><\/td>\n<\/tr>\n<tr class=\"row-14\">\n\t<td class=\"column-1\"><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td><td class=\"column-5\"><\/td>\n<\/tr>\n<tr class=\"row-15\">\n\t<td class=\"column-1\"><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td><td class=\"column-5\"><\/td>\n<\/tr>\n<tr class=\"row-16\">\n\t<td class=\"column-1\"><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td><td class=\"column-5\"><\/td>\n<\/tr>\n<tr class=\"row-17\">\n\t<td class=\"column-1\"><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td><td class=\"column-5\"><\/td>\n<\/tr>\n<tr class=\"row-18\">\n\t<td class=\"column-1\"><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td><td class=\"column-5\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-30 from cache --><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Wisudawan Program Magister Informatika, April 2021<\/strong><\/p>\n<p><strong>\n<table id=\"tablepress-31\" class=\"tablepress tablepress-id-31\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">No.<\/th><th class=\"column-2\">Student Identification Number (NIM)<\/th><th class=\"column-3\">Name<\/th><th class=\"column-4\">Jalur Pilihan<\/th><th class=\"column-5\">Thesis Poster<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">1<\/td><td class=\"column-2\">23516006<\/td><td class=\"column-3\">Adhe Setya Pramayoga<\/td><td class=\"column-4\">Software System Security<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/uc?export=download&amp;id=1hA-oUKZoLLpHrov-OYiAAhE_HPWpQuUC\" target=\"_blank\" rel=\"noopener\">Pengamanan Pesan Pada Protokol MQTT-SN Berbasis Teknologi LoRa Menggunakan Skema Authenticated Encryption with Associated Data<\/a><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">2<\/td><td class=\"column-2\">23518002<\/td><td class=\"column-3\">Andreas Novian Dwi Triastanto<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/uc?export=download&amp;id=1CYdxC9ipnyhwxACzsI1XCUzQIoMRUG_n\" target=\"_blank\" rel=\"noopener\">Query by Humming Music Information Retrieval dengan Menggunakan Ekstraksi Melodi Berbasis DNN-LSTM dan Filtrasi Derau<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">3<\/td><td class=\"column-2\">23518015<\/td><td class=\"column-3\">Inkreswari Retno Hardini<\/td><td class=\"column-4\">Information Technology<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/uc?export=download&amp;id=1U2HKVjzK6WgfgttzCTaKkFYpbBJ0xIc8\" target=\"_blank\" rel=\"noopener\">Pengembangan Sistem Pelacakan Wajah Berbasis Mean-Shift dengan Optimasi Locust Search Algorithm<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">4<\/td><td class=\"column-2\">23518025<\/td><td class=\"column-3\">Zilfikri Yulfiandi Rachmat<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/uc?export=download&amp;id=1BC2TT_G-RV3BECNbGBAwPI06oJfNqVPH\" target=\"_blank\" rel=\"noopener\">Peningkatan Performansi Algoritma Virus Colony Search Pada Permasalahan Travelling Salesman Problem<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">5<\/td><td class=\"column-2\">23518037<\/td><td class=\"column-3\">Fais Zharfan Azif<\/td><td class=\"column-4\">Media Technology and Mobile Devices<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/uc?export=download&amp;id=1kvNJZ8EqvEtDYSZyfmKWPG-XTqBv7dQk\" target=\"_blank\" rel=\"noopener\">Perancangan Kerangka Kerja Evaluasi Game Edukasi Berdasarkan Mekanik Game<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">6<\/td><td class=\"column-2\">23519009<\/td><td class=\"column-3\">Isjhar Kautsar<\/td><td class=\"column-4\">Intelligence System<\/td><td class=\"column-5\"><a href=\"https:\/\/drive.google.com\/uc?export=download&amp;id=1lxbcD-y8EJOJMebu8wQkacvE2l7bev9a\" target=\"_blank\" rel=\"noopener\">Model Akustik mGRUIP dengan Temporal Convolution pada Sistem Pengenalan Suara untuk Evaluasi Bacaan Alquran<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-31 from cache --><\/strong><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><div class=\"vc_tta-panel\" id=\"1723451230324-d5e2dec0-7178\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1723451230324-d5e2dec0-7178\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Integrated Bachelor's and Master's Program<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"font-weight: 400;\">The Bachelor and Master's Integration Program (PPSM) aims to increase the number of ITB undergraduate students who continue their studies in the Master's Program, with a study period that meets the integration program's target. This is done to achieve one of the indicators of the ITB Strategic Plan 2021-2025, namely a 40% postgraduate student percentage by 2025. Based on the fulfillment of basic competencies. <\/span><i><span style=\"font-weight: 400;\">computing<\/span><\/i><span style=\"font-weight: 400;\">, there is a general scheme or unification of cognate and non-cognate Bachelor-Masters degrees with the Informatics Masters Study Program, which is divided into three categories as follows:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Linear<\/b><span style=\"font-weight: 400;\">, for undergraduate students who have met all basic competencies. Based on the curriculum, undergraduate programs that meet these requirements are those from STEI-K (Informatics Engineering and Information Systems &amp; Technology).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Semi-linear<\/b><span style=\"font-weight: 400;\">, for undergraduate students who have fulfilled some of the basic competencies. Based on the curriculum, the undergraduate programs that fulfill this requirement are those from STEI-R (Electrical Engineering, Telecommunication Engineering, Biomedical Engineering, Electrical Power Engineering).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Non-linear<\/b><span style=\"font-weight: 400;\">, for undergraduate students who do not yet have basic competencies. Other study programs outside of STEI can generally be categorized as non-linear, except for those that have basic competencies. <\/span><i><span style=\"font-weight: 400;\">computing<\/span><\/i><span style=\"font-weight: 400;\">. Evaluation of study programs outside the STEI environment whether they are included in the semi-linear or non-linear category will be carried out on a case-by-case basis when the related undergraduate study program students register for this program.<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Basic Competency Table <\/span><i><span style=\"font-weight: 400;\">Computing<\/span><\/i><\/p>\n<table>\n<thead>\n<tr>\n<th><b>Basic competencies<\/b><\/th>\n<th><b>Description<\/b><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">Programming<\/span><\/td>\n<td>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Students recognize and understand the concepts and basics of data structures.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Students are able to use available data structure packages.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Students are able to design and implement data structure packages.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Students are able to perform problem solving (with procedural programming, medium scale) using algorithms, data structures, and databases by using available APIs\/libraries or by building their own libraries.<\/span><\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Database<\/span><\/td>\n<td>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Students have an understanding of the role of database systems in fulfilling information needs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Students are able to perform small-medium scale data modeling using the entity-relationship model.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Students are able to design relational database schemes<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Students are able to implement a database using Relational DBMS<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Students are able to create queries and manipulate data in databases using SQL.<\/span><\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Discrete Mathematics<\/span><\/td>\n<td>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Students are able to understand the basic concepts of discrete mathematics\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Students are able to model problems using discrete mathematics concepts.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Students are able to apply discrete mathematics methods in the field of computing<\/span><\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Computer System<\/span><\/td>\n<td>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Know the development of modern computer architecture<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">understand the abstraction of computer systems, including components, structure and functions of computers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Understanding the representation of numeric and non-numeric data on computers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Understanding instruction execution on a Von Neumann Machine<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Can identify types of memory technology and principles of memory management<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Can explain the use of interrupts in implementing I\/O control and data transfer<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Explains how the operating system manages hardware<\/span><\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The course structure of the PPSM Informatics Masters Study Program is as follows.<\/p>\n<p><a href=\"https:\/\/stei.itb.ac.id\/wp-content\/uploads\/MataKuliah-PPSM-2025.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-24469\" src=\"https:\/\/stei.itb.ac.id\/wp-content\/uploads\/MataKuliah-PPSM-2025.jpg\" alt=\"\" width=\"630\" height=\"449\" \/><\/a><span style=\"font-weight: 400;\">PPSM students are required to undertake a continuous TA Thesis, which is the implementation of TA in the undergraduate program and thesis in the master's program with a continuous topic so that it is part of the work\/research in the same area. Related to the category of PPSM program participants, the rules for implementing a Continuous TA Thesis are defined as follows.\u00a0<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Linear<\/b><span style=\"font-weight: 400;\">: students are required to carry out a Continuing Thesis TA with the same topic and supervisor.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Semi-linear<\/b><span style=\"font-weight: 400;\">: Students are advised to undertake a Continuous Thesis TA with a topic that is possibly multidisciplinary in nature with the student's undergraduate program field and with a supervisory team that can come from the student's undergraduate study program and from the Informatics Master's study program. However, if not, then students are required to undertake a TA with a topic in the field of computing, even though it is not continuous with the thesis topic in the Informatics Master's Study Program and can be carried out with a different supervisor.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Non-linear<\/b><span style=\"font-weight: 400;\">: students are advised to undertake a Continuous Thesis TA with a topic that is possibly multidisciplinary in nature with the student's undergraduate program field and with a supervisory team that can come from the student's undergraduate study program and from the Informatics Master's Study Program. However, if not, then students are advised to take a TA topic in the field of computing, although it is still possible to take another topic outside the field of computing according to the field of their study program, so that it can be carried out with a different supervisor than the thesis.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The general management plan for the Continuous Thesis TA is as follows.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Supervisor requirements:<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">The Continuous Thesis TA is carried out with the same supervisor for both the TA and the Thesis. The maximum number of supervisors is 2 people, both for the TA and the Thesis. If there is only 1 supervisor, then the supervisor must be eligible as the main supervisor in the undergraduate study program and the Master of Informatics Study Program. If there are 2 supervisors, then one of the supervisors must be eligible as the main supervisor in the Master of Informatics Study Program and the rules for the order of the main and assistant supervisors follow the rules in the undergraduate study program and the Master of Informatics Study Program. The list of supervisors for the Master of Informatics Study Program can be accessed at <\/span><a href=\"https:\/\/docs.google.com\/spreadsheets\/d\/1KMApdBzwAf66vavXLvbWtwuFAzf8VQc11YrWlkA3rG8\/edit?usp=sharing\"><span style=\"font-weight: 400;\">Dosen Pembimbing Tesis Magister Informatika ITB<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Topic requirements:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">The topic of the Continuing Thesis TA must be within the scope of the computing field.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">The topic of the Continuing Thesis TA must consider the appropriate level of knowledge and depth and must <\/span><b>can be divided clearly<\/b><span style=\"font-weight: 400;\"> target untuk proses TA di program sarjana dan target proses tesis di program magister.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">The topic of the Continuing Thesis TA must consider the appropriate level of knowledge and depth and must<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Thesis topics for Continuing Thesis Projects can come from prospective supervisors or from student proposals. If the proposal originates from the student, it must be consulted with and approved by the supervisor.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Student data collection:<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">Before the 7th semester of the undergraduate student program begins, the PPSM implementation team held a meeting and socialization with all students participating in the PPSM program who were due to take their TA in the 7th semester. Students were asked to submit their TA Thesis taking plan to get information about participants who would take the Continuous Thesis TA, especially for students from the semi-linear and non-linear categories.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Topic and supervisor allocation procedures:<\/span><\/li>\n<\/ol>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">For all students who will undertake a Continuous Thesis TA, the PPSM implementation team coordinates with all TA implementation teams in all related student study programs and the thesis implementation team of the Master of Informatics Study Program to coordinate the allocation of Thesis TA topics and supervisors for the students concerned.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The process of allocating the topic and TA Thesis supervisor can be a special case in the allocation of the topic and TA supervisor in the student's undergraduate study program and the procedure can be adjusted to the procedure in each undergraduate study program provided that the topic requirements (see point 2) and supervisor (see point 1) are met.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">After students are allocated a topic and supervisor, students report the Continuing Thesis TA planning proposal that has been signed by the student and supervisor to the PPSM implementation team.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The topic and supervisor allocation process can begin before semester 7 begins and must be completed no later than the 7th week of semester 7 of the student's undergraduate program.\u00a0<\/span><\/li>\n<\/ul>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Taking related courses:<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">a. Taking <\/span><b>TA course<\/b><span style=\"font-weight: 400;\"> in undergraduate study programs<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Assumption: There are TA-I courses in semester 7 and TA-II in semester 8 in each undergraduate study program.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Students carry out the Continuous Thesis TA portion for the undergraduate program by following the TA implementation procedures in their respective study programs with the following note: in submitting the TA proposal, the topic and planning for the implementation of the Thesis must also be included.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Students take the TA-I course in semester 7. All or part of the topic and supervisor allocation process can be done in this semester (see point 4.d.)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">TA-II courses are taken in semester 8.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<ol>\n<li><span style=\"font-weight: 400;\"> Taking <\/span><b>Research Methodology and Thesis course<\/b><span style=\"font-weight: 400;\"> This is implemented after the student changes status to a Master of Informatics student. The Research Methodology course is taken in semester 1 and the Thesis course is taken in semester 2 and is implemented according to the procedures and regulations applicable in the Master of Informatics study program.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Note: In submitting the thesis proposal, the results of the TA must be submitted which will be continued in the thesis.<\/span><\/li>\n<\/ol>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">During the Continuing Thesis TA implementation, students are not permitted to change topics and supervisors, especially from TA to Thesis. Changing topics or supervisors may be done for certain emergency reasons and follow procedures established by the Informatics Master's Program and acknowledged by the PPSM implementation team.<\/span><\/li>\n<\/ol>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><div class=\"vc_tta-panel\" id=\"1741591122372-7f596078-b8fa\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1741591122372-7f596078-b8fa\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Dual Degree or Double Degree Program<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"font-weight: 400;\">The Master Program in Informatics at the School of Electrical Engineering and Informatics, ITB, offers a Dual \/ Double Degree Program (DDP) in collaboration with several partner universities abroad. Students participating in the DDP can obtain degrees from both institutions\u2014one from ITB and one from ITB\u2019s partner university overseas.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Students may begin their studies in the Master Program in Informatics at ITB and attend courses at ITB during the first year, following the ITB Master in Informatics curriculum. In the second year, they will continue their studies at a partner university abroad. The reverse also applies for students from partner universities: they will follow the curriculum at their home university during the first year, and then continue their second year of study at ITB.<\/span><\/p>\n<p><a href=\"https:\/\/stei.itb.ac.id\/wp-content\/uploads\/Program-Double-Degre.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-24471\" src=\"https:\/\/stei.itb.ac.id\/wp-content\/uploads\/Program-Double-Degre.jpg\" alt=\"\" width=\"448\" height=\"159\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Currently, the Master Program in Informatics at ITB offers a Dual \/ Double Degree Program (DDP) in collaboration with the following four partner universities:\u00a0<\/span><\/p>\n<p>1. Toyohashi University of Technology &#8211; Computer Science &amp; Engineering (Japan)<\/p>\n<p><span style=\"font-weight: 400;\">Toyohashi University of Technology \u2013 Computer Science &amp; Engineering (Japan) \nThe TUT-ITB DDP was formally initiated with the Agreement for Double Master\u2019s Degrees between Toyohashi University of Technology (TUT) and Institut Teknologi Bandung (ITB) on August 18, 2023, and the Addendum Agreement for Double Master\u2019s Degrees between the Department of Computer Science and Engineering, TUT and the Informatics Program, ITB on August 22, 2023. Website link: https:\/\/www.tut.ac.jp\/english\/introduction\/publications.html <\/span><i><span style=\"font-weight: 400;\">Agreement for Double Master\u2019s Degrees between Toyohashi University of Technology (TUT) and Institut Teknologi Bandung (ITB)<\/span><\/i><span style=\"font-weight: 400;\"> August 18, 2023, and <\/span><i><span style=\"font-weight: 400;\">Addendum Agreement for Double Master\u2019s Degrees between Computer Science and Engineering TUT and Informatics ITB<\/span><\/i><span style=\"font-weight: 400;\"> August 22, 2023.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Link web<span style=\"color: #0000ff;\">: <\/span><\/span><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.tut.ac.jp\/english\/introduction\/publications.html\"><span style=\"font-weight: 400;\">https:\/\/www.tut.ac.jp\/english\/introduction\/publications.html<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/span><\/p>\n<p>2. Singapore Management University &#8211; Master of IT in Business (Singapore)<\/p>\n<p><span style=\"font-weight: 400;\">This program is officially listed under the LPDP Double Degree Scholarship Program.<\/span><\/p>\n<p><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/lpdp.kemenkeu.go.id\/storage\/beasiswa\/kebijakan-umum\/file\/public_policy_file_1737168598.pdf\"><span style=\"font-weight: 400;\">https:\/\/lpdp.kemenkeu.go.id\/storage\/beasiswa\/kebijakan-umum\/file\/public_policy_file_1737168598.pdf<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Other scholarships:<\/span><span style=\"color: #0000ff;\"> <a style=\"color: #0000ff;\" href=\"https:\/\/masters.smu.edu.sg\/programme\/master-of-it-in-business#admissions-tab\"><span style=\"font-weight: 400;\">Soegiarto Adikosoemo Postgraduate Scholarship<\/span><\/a><\/span><\/p>\n<p><span style=\"font-weight: 400;\">Website Link: <\/span><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/masters.smu.edu.sg\/programme\/master_of_it_in_business\/community-stories\/bridging_borders_and_minds_smuitb_double\"><span style=\"font-weight: 400;\">https:\/\/masters.smu.edu.sg\/programme\/master_of_it_in_business\/community-stories\/bridging_borders_and_minds_smuitb_double<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/span><\/p>\n<p>3. Grand Valley State University &#8211; College of Computing<\/p>\n<p><span style=\"font-weight: 400;\">Website Link: <\/span><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.gvsu.edu\/computing\/itb-international-agreements-191.htm\"><span style=\"font-weight: 400;\">https:\/\/www.gvsu.edu\/computing\/itb-international-agreements-191.htm<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/span><\/p>\n<p>4. La Trobe University &#8211;<\/p>\n<h4>INFORMATION FOR FOREIGN STUDENTS<\/h4>\n<h5><b>1. Study Permit &amp; Visa Application<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Necessary documents: <\/span><a href=\"https:\/\/partnership.itb.ac.id\/pre-arrival\/\"><span style=\"font-weight: 400;\">https:\/\/partnership.itb.ac.id\/pre-arrival\/<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><strong>Visa Fee : IDR 6,500,000,00 (subject to change)<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Process flow:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400;\">Procedures<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Applicant<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Receive the Letter of Acceptance (LoA) from ITB<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Applicant<\/span><\/td>\n<td>\n<p><span style=\"font-weight: 400;\">send all required documents to IRO ITB.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Necessary documents:<\/span> <a href=\"https:\/\/partnership.itb.ac.id\/pre-arrival\/\"><span style=\"font-weight: 400;\">https:\/\/partnership.itb.ac.id\/pre-arrival\/<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After IRO ITB receives all required documents, it takes 2-3 months for your study permit and visa. Visa fee is about 6.5 &#8211; 9 millions IDR<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">.<\/span><\/td>\n<td>\n<p><span style=\"font-weight: 400;\">Process study permit online to Director of Institutional Affairs, DIKTI, Jakarta.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After obtaining a study permit from DIKTI, proceed with online application for E-Visa C-316 to the Directorate General of Immigration, Jakarta.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Applicant<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Receive E-Visa C-316 approval from The International Relations Office Institut Teknologi Bandung (IRO ITB).<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h5><b>2. Guide for ITB accommodation<\/b><\/h5>\n<p>ITB Student dormitory information : <a href=\"https:\/\/asrama\/ditsp.itb.ac.id\/asrama\/1\/\">https:\/\/asrama\/ditsp.itb.ac.id\/asrama\/1\/<\/a><\/p>\n<p><span style=\"font-weight: 400;\">Necessary information &amp; documents: photo, phone number, birthday, birthplace, current addres (with postcode), guardian name, guardian phone number, emergency contact<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Process flow:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><\/td>\n<td><span style=\"font-weight: 400;\">Procedures<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Applicant<\/span><\/td>\n<td>\n<p><span style=\"font-weight: 400;\">provide all required information to STEI Office.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After STEI Office receives all required information, it takes 1-2 weeks . Dormitory rent is about 1.5 millions IDR per month.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">The Directorate of Facilities and Infrastructure, through the Housing Service Section\u00a0<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Applicant<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Receive accommodation confirmation from STEI officer.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><div class=\"vc_tta-panel\" id=\"1723451007300-4b3918fb-8e8a\" data-vc-content=\".vc_tta-panel-body\"><div class=\"vc_tta-panel-heading\"><h4 class=\"vc_tta-panel-title\"><a href=\"#1723451007300-4b3918fb-8e8a\" data-vc-accordion data-vc-container=\".vc_tta-container\"><span class=\"vc_tta-title-text\">Administrative Form<\/span><\/a><\/h4><\/div><div class=\"vc_tta-panel-body\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<h4>Administrative Form<\/h4>\n<ol>\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1MybcBZa_RIw171ekp0L3EIrhe4oXfmqv\/view?usp=sharing\">Supervisor Form from Outside ITB<\/a><\/li>\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1sjOmvMSvJWorqAUdhZ-dS25jAXklaJOv\/view?usp=sharing\">Topic\/Supervisor\/Add Supervisor Change Form<\/a><\/li>\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1dM0GwRd4iDWgKdoKjMvlr_SjAlYkvhlK\/view?usp=sharing\">Master's Informatics Thesis Seminar Proposal Form (offline)<\/a><\/li>\n<li><a href=\"https:\/\/docs.google.com\/forms\/d\/e\/1FAIpQLSfa8gFFeoSxrj7OXgmtdMbseFIwhk3UOeBx9DcEEaVMtwNvCA\/viewform\">Master's Informatics Thesis Seminar Proposal Form (online)<\/a><\/li>\n<li><a href=\"https:\/\/drive.google.com\/drive\/folders\/1K-ItIxXM_-2aN9ro9IGrmveaq9ORh-fp?usp=sharing\">Thesis Defense Requirements Form<\/a><\/li>\n<li><a href=\"https:\/\/drive.google.com\/open?id=10zlz7QuUGNilfm4yxCjg6LHjZNX_nbsB\">Master's Informatics Thesis Defense Proposal Form (offline)<\/a><\/li>\n<li><a href=\"https:\/\/forms.gle\/wenRbiV37KN7q9yC8\">Master's Informatics Thesis Defense Proposal Form (online)<\/a><\/li>\n<li><a href=\"https:\/\/forms.gle\/cTZ2NVU48cemiQaNA\">Link to the plagiarism check upload form for Master of Informatics students' papers<\/a><\/li>\n<\/ol>\n<h4>Guidelines and Rules<\/h4>\n<ol>\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1iDenmnz2oWpGTg4BXIr2At0SjaIw5PZ0\/view?usp=sharing\">Online Thesis Seminar Guide<\/a><\/li>\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1_PSTYvuPmsrbwim3kfWfi2-2ybtWzNRr\/view?usp=sharing\">Online Thesis Defense Guide<\/a><\/li>\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1WjBSyRxoKN-9_vntJzh3NOysY3zmwBMN\/view\">Guidelines for Implementing Postgraduate Seminars\/Seminars<\/a><\/li>\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1lcB806xutIJJYKkmjH3YX04l5UQjGxLA\/view\">Master's Thesis Proposal Template IF<\/a><\/li>\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1CiNZ9PxFDa2DnF4fTT0mKNoaV09RoN7k\/view?usp=sharing\">Systematics of Progress Report IF5091\/IF5092 Research Implementation 1\/ 2<\/a><\/li>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/1h8sbn0nwSOMbUu0DO4BYqo_MQkX7jjiHefyohWN8fc4\/edit?usp=sharing\">MBR Research Proposal Template<\/a><\/li>\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1T0Txa-91R5oev4ldYtVq1DLXoIUT2RrT\/view?usp=sharing\">MBR Interview Guide<\/a><\/li>\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1UfgN817PNaC4e04KvudLkRdOv5Gz-O9N\/view?usp=sharing\">Master's Thesis Implementation Guide for IF (2022)<\/a><\/li>\n<li><a href=\"https:\/\/drive.google.com\/drive\/folders\/1SznL058eV0yzGRS5pqG7Nc-kBUfaS1Wm\">Industrial KP Guidelines S2 IF &amp; Administration<\/a><\/li>\n<\/ol>\n<h4>SK \/ IF Master's Accreditation Certificate<\/h4>\n<ol>\n<li><a href=\"https:\/\/spm.itb.ac.id\/wp-content\/uploads\/sites\/64\/sites\/42\/2022\/12\/Surat_Sertifikat_LAMINFOKOM_S2Informatika.pdf\">SK Unggul 2022<\/a><\/li>\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1YvD_AOE8cTir5yoaVLk6K4PWwrncPent\/view?usp=sharing\">SK Unggul<\/a><\/li>\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1cKZfOYlCOvN1drr1StKhbf3p5zTEBX9r\/view?usp=sharing\">SK 2017<\/a><\/li>\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1UBYeHXUaLwjJH6JaGzNlBfDnL3uc7wCB\/view?usp=sharing\">SK 2018<\/a><\/li>\n<\/ol>\n<h4><strong>Server IF<\/strong><\/h4>\n<ol>\n<li><a href=\"https:\/\/drive.google.com\/file\/d\/1nQaaYq5DY17_VC2O0pGHW-iWir7w33up\/view?usp=sharing\" target=\"blank\" rel=\"noopener\">IF Server Specifications\u00a0<\/a><\/li>\n<\/ol>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fullwidth\" ><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"Kembali ke Beranda MAGISTER INFORMATIKA Program studi Magister Informatika bertujuan agar lulusannya memiliki aspek berpikir kritis, inovatif, dan profesional untuk bersaing secara global di bidang Informatika, serta mengembangkan pengetahuan dan [...]","protected":false},"author":1,"featured_media":0,"parent":25248,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-25266","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/pages\/25266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/comments?post=25266"}],"version-history":[{"count":1,"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/pages\/25266\/revisions"}],"predecessor-version":[{"id":25267,"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/pages\/25266\/revisions\/25267"}],"up":[{"embeddable":true,"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/pages\/25248"}],"wp:attachment":[{"href":"https:\/\/stei.itb.ac.id\/en\/wp-json\/wp\/v2\/media?parent=25266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}