68
DAFTAR PUSTAKA
Ahmed, M. & Hossain, M.A. 2014. Cloud Computing and Security Issues in The Cloud.
Internation Journal of Network Security and Its Application (IJNSA) 6(1): 25-36.
Amri, Khoirul. dan Sihombing, Toguan. 2008. Mengenal & Mengendalikan Predator
Benih Ikan. Jakarta: Gramedia Pustaka Utama.
Astuti, W., Aibinu, A.M., Salami, M.J.E., Akmelawati, R., & Muthalif, G.A. 2011.
Animal Sound Activity Detection Using Multi-Class Support Vector Machines.
Fourth Edition International Conference on Mechatronics (ICOM) 4(9): 978-983.
Chang, C.-C. & Wu, W.-C. 2007. Fast Planar-oriented Ripple Search Algorithm for
Hyperspace VQ Codebook. IEEE Transaction on Image Processing 16(6): 38-47.
Chen, H.-M., Huang, C.-J., Chen, Y.-J., & Chien, S.-Y. 2015. An Intelligent Nocturnal
Animal Vocalization Recognition System. International Journal of Computer & Communication Engineering (IJCCE) 4(1): 39-45.
Davis, S.B. & Mermelstein, L. 1980. Comparison of Parametric Representations for
Monosyllabic Word Recognition in Continuously Spoken Sentences. IEEE Transaction on Accoustics, Speech and Signal Processing 28(4): 357-366.
Dhingra, S.D., Nijhawan, G., & Pandit, P. 2013. Isolated Speech Recognition Using
MFCC & DWT. International Journal of Advanced Research in Electrical, Electronics & Insutrumentation Engineering 2(8): 4085-4092.
Djatmiko. 2005. Kodok Sawah. (Online) https://id.wikipedia.org/wiki/Kodok_sawah (10 Oktober 2016).
Duellman, W.R. dan Trueb, L. 1986. Biology of Amphibians. New York: McGraw-Hill.
Goh, C. & Leon, K. 2009. Robust Computer Voice Recognition Using Improved MFCC
Algorithm. International Conference New Trends Information Science, pp. 835-840.
69
Gunasekaran, S. & Revathy, K. 2011. Automatic Recognition and Retrieval of Wild
Animal Vocalizations. International Journal of Computer Theory and Engineering 3(1): 1793-1811.
Hamad, H., Saad, M., & Abed, R. 2010. Performance Evaluation of RESTful Web
Services for Mobile Devices. International Arab Journal of Technology 1:72-78.
Hu, F., Qiu, M., Li, J., Grant, T., Tylor, D., McCaleb, S., Butler, L., & Hammer, R.
2011. A Review on Cloud Computing: Design Challenges in Architecture and
Security. Journal of Computing and Information Technology 19(1): 25-55.
Ismail, A., Idris, M.Y.A., Noor, M.A., Razak, Z., & Yussof, Z.M. 2014. MFCC-VQ
Approach for Qalqalah Tajweed Rule Checking. Malaysian Journal of Computer Science 27(4): 275-293.
Jaafar, H., Ramli, D.A., & Shahrudin, S. 2013. MFCC Based Frog Identification System
In Noisy Environment. International Conference on Signal and Image Processing Applications (ICSIPA) 13: 123-127.
Kubakaddi, S., Anu, L.B., & Suresh, D. 2015. Person Identification Using MFCC &
Vector Quantization. IPASJ International Journal of Electronics & Communication (IIJEC) 3(6): 19-24.
Linde, Y., Buzo, A., & Gray, R.M. 1980. An Algorithm for Vector Quantizer Design.
IEEE Transaction on Communications 28(1): 84-95.
Rudrapal, D., Das, S., Debbarma, S., Kar, N., & Debbarma, N. Voice Recognition and
Authentication as a Proficient Biometric Tool and Its Application in Online Exam
for P.H People. International Journal of Computer Applications 39(2): 6-12.
Singh, N., Khan. R.A., & Shree, Raj. 2012. Application of Speaker Recognition.
International Conference on Modelling, Optimisation and Computing (ICMOC)
38: 3122-3126.
Tan, C. & Jantan, A. 2004. Digit Recognition Using Neural Networks. Malaysian Journal Computer Science 17(2): 40-54.