The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The identification of ethical violations committed by the auditor is very difficult to do. Artificial intelligence offers anomaly detection as an alternative method for detecting the opinion anomaly which can be an early indicator of the opinion trading occurrence. This paper proposes the use of original features from public sector rather than the use of modified features from the private sector to...
In the last few years, with the emergence of ambient assisted living, the study of human behavioral pattern took a wide interest from research communities around the world. In many literatures, pattern recognition was widely adopted approach to implements in human behavior study from computing perspective. Pattern recognition brings a promising results in terms of accuracy for modeling human behavior...
Knowledge Management System (KMS) might be a transformation from Library Management System (LMS). This transformation is possible when we add several knowledge processes from KMS not available in LMS. When a KMS is a transformation from a LMS, functionalities derived from librarian system will be also available in KMS. One of this functionality is recommendation system, where patron may receive related...
Falling is an external aspect that can lead to death for the elderly. With so many activities they can do will increase the likelihood of falling. A fall detection device is designed to minimize post-fall risk. An MPU6050 sensor with 3 axis accelerometer and 3 gyroscope axis is used to detect the activities of the elderly. This research is expected to recognize the falling forward movement, falling...
Recently, UAVs (Unmanned Aerial Vehicles) gain a wider acceptance from many disciplines. One major application is for monitoring and mapping. Flying beyond eye sight autonomously and collecting data over large areas are their obvious advantages. To support a large scale urban city mapping, we have developed a UAV system which can carry a compact digital camera as well as a navigational grade of a...
To prevent counterfeit face image on face presence system, we can use dual vision camera in face recognition system. Dual vision camera is used to produce detectable face images from two positions of the left lens and the right lens. Image retrieval at the two corners of the left lens and the right lens can produce a merged face image database of left lens face image and right lens face image. The...
Radio-over-fiber (RoF) technologies address wireless communication's need for high data rate, protocol-transparency, and flexibility. One of challenge in RoF access point design is RF amplifier requirement that match to microwave-photonic link chosen and service range needed. This paper proposes a graphical approach as systematic method to solve the challenge. The method identifies two regions, i...
In recent years, process mining is important to discover process model from event logs; however the existing methods have not achieved good in overall fitness. In this context, this paper proposes a combination of the Evolutionary Tree Miner (ETM) and Simulated Annealing (SA). The ETM aims to reduce randomness of population so that it can improved the quality of individuals. SA aims to increase overall...
Over the last two decades, research about IT value has been done. The main purpose of IT values research is to determine how IT investment gives impact and value to organization performance. Because of vital role and function of IT, the organization required to understand how IT could create business value. Therefore, an understanding of IT value is needed. Systematic literature review in meta-analysis...
The scalability of business process model shows the ability of a system to handle the amount of provided business process activity. In business process management, scalability is used to compare the size of a business process model to other business process models. This research focused on measuring the scalability of business process models. Every business processes were modeled using Petri Net....
The development of smart city operation room of Makassar possesses several equally important stages which are equally important. There are four stages of development that are 1) data center construction, 2) camera distribution around the city, 3) wall room monitoring construction, and 4) smart operation room architecture construction. Since the time and cost are limited, it forces the project manager...
One of the growth factors of corn plant is fertilizer according to nitrogen fertilizer requirement. The identification of nitrogen fertilizer requirement in corn plant can be done by measuring the green leaf level using Color Leaf Manual, using TCS3200 color sensor combined with Arduino Uno Board microcontroller, and information. In this study a tool was created that could automatically measure the...
The Hadith is one of the two sources of Islamic law after the Qur'an. It is a fact that there are a number of false hadith, recognised by Muslim scholars since the end of the first century of Hijra, and even earlier. In addition to the breadth of false hadith circulating among the public at this time, it is difficult to determine the source of authenticity and distinguish false from genuine. This...
Centralized e-Learning technology has dominated the learning ecosystem that brings a lot of potential usage on media rich learning materials. However, the centralized architecture has their own constraint to support large number of users for accessing large size of learning contents. On the other hand, Content Delivery Network (CDN) solution which relies on distributed architecture provides an alternative...
One of the complications of diabetes can lead to vision problems when it occurs in the retina which is known as diabetic retinopathy (DR). In practice, to diagnose and monitor DR severity, ophthalmologists observe the presence of several pathologies in colour retinal fundus images. However, this approach is tedious and time consuming, especially in the case of screening for early detection. Several...
The use of E-Government in achieving good governance has been done by government to serve citizen nowadays. However, not all local government were able to implement it. PeGI that has been used as a benchmark to check government's readiness rate in implementing E-Government can't describe all process that need to be assessed in developing local E-Government. Moreover, the emergence of social problems,...
The currency exchanges rate is one of the most important things in the economy. The currency exchange rate is needed in the business word for example, investment and profit assessment. Prediction of rupiah rate is done to get the price of the rupiah against US dollar in the future to be used as consideration in decision-making, thereby reducing the risk of loss. Therefore, we need a method that can...
Nowadays, security is a part that consent by many institution including academic for example in University campus, some of campus have been implement automatic system in campus area to control visitor to enter University also for the staffs and students, but the system is in standalone with introduce new gate pass. Most of University has been use Information Technology (IT) in application for academic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.