The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the challenges of the hand rehabilitation device is to create a smooth interaction between the device and user. The smooth interaction can be achieved by considering myoelectric signal generated by human's muscle. Therefore, the so-called myoelectric control system (MCS) has been developed since the 1940s. Various MCS's has been proposed, developed, tested, and implemented in various hand rehabilitation...
Software testing is one important aspect of the software development process. About 50% of the time and cost in the software development process used for software testing process. There are two methods of software testing, black-box testing and white-box testing. This research using white-box testing. Software testing can be done manually or automatically. Based on research conducted, genetic algorithm...
This study aimed to collect data and information of the Ethnobotany Dayak Tribe, in particular, development of the database which can be used as a media explorer for exchange information society on Borneo's biodiversity and in an attempt preserving of culture local wisdom in traditional medicine so that not extinction. Ethnobotany database collected from various scientific literature, results of report...
The explosion of digital data in the last two decades followed by the development of various types of data, including text, images, audio and video known as multimedia data. Multimedia Information Retrieval is required to search various type of media. There is comprehensive information need that can not be handled by the monolithic search engine like Google, Google Image, Youtube, or FindSounds. The...
Emotional identification is necessary for example in Brain Computer Interface (BCI) application and when emotional therapy and medical rehabilitation take place. Some emotional states can be characterized in the frequency of EEG signal, such excited, relax and sad. The signal extracted in certain frequency useful to distinguish the three emotional state. The classification of the EEG signal in real...
This paper proposes a new combination of Deep Belief Networks (DBN) and Bidirectional Long Short-Term Memory (Bi-LSTM) for Sleep Stage Classification. Tests were performed using sleep stages of 25 patients with sleep disorders. The recording comes from electroencephalography (EEG), electromyography (EMG), and electrooculography (EOG) represented in signal form. All three of these signals processed...
Glaucoma is a second leading cause of blindness after cataract. Glaucoma caused by unbalance absorption of aqueus humour so it increase intraocular pressure. As a result, it surpresses nerve cells so that nerve cells can not get enough blood flow as nutrition intake and can lead to permanent blindness. One of the treatment for glaucoma is by surgical procedure, called trabeculectomy. After the surgery...
High Altitude Platform Station (HAPs) is a new communications infrastructure that uses air balloon to carry high data rate service and wide bandwidth. One technique to make it happen is Long Term Evolution (LTE), LTE support capacity increasing, expand coverage area, data rate increasing, multi-antenna, and can be integrated with other systems. To improve the performance of LTE in capacity building,...
Anonymous network provides user privacy to protect identity. The onion routing (TOR) project is one kind of Internet anonymous networks which attracts many researchers and clients nowadays, because of its simplicity and scalability. However, there are some difficulties to analyze TOR performance within live TOR networks since it is distributed and its security nature. This paper presents a TOR network...
Banking crime is one of the widespread phenomena in 2016 are closely associated with the used of computer-based technology and internet networks that constantly evolving. One of them is the burglary of customer accounts through the internet banking facility. To overcome this, we need a method of how to detect a conspiracy of bank burglary case of customer accounts. The way to scalable is by get a...
Online business marketing applied to expand market shares is inextricably connected with availability and reliability of IT governance. This model of marketing covers activities and transactions with a digital mechanism. This research included the sample of 30 MSME (Micro, Small, and Medium Enterprises) businesses of traditional and finished clothes originated in Pontianak City. Stratified sampling...
Information security policies are not easy to create unless organizations explicitly recognize the various steps required in the development process of an information security policy, especially in institutions of higher education that use enormous amounts of IT. An improper development process or a copied security policy content from another organization might also fail to execute an effective job...
Powerpoint slides have become one of the essential teaching tools in academic for both offline and online modes. It may play a useful role to facilitate discussion and information exchange. However, in our teaching experience, we find many students utilizing Powerpoint slides beyond their traditional functions. Many students fully rely on the slides as the main learning materials and, in some cases,...
Today's network traffic are dynamic and fast. Conventional network traffic classification based on flow feature and data mining are not able to process traffic efficiently. Hardware based network traffic classifier is needed to be adaptable to dynamic network state and to provide accurate and updated classification at high speed. In this paper, a hardware architecture of online incremental semi-supervised...
This paper discusses a design of fuzzy logic algorithm in a robot. This algorithm is useful for the robot in seeking and reaching the target. The robot is also accomplished with an ability to avoid obstacles. Although the fuzzy rule that is embedded to the robot is very simple, it gives a good result in target seeking and obstacles avoiding task. The originality of this research is an approach to...
Carbon monoxide (CO) concentration reflects the environmental quality of an area. An instrument that measures CO level is very useful for mitigation of effects caused by it due to industrial development. The inherent problem of CO measurement is wide distribution of this gas that continuous measurement is difficult to do. This research proposes a CO measurement system using wireless sensor. The system...
This paper presents the development of new type of wearable robot namely Supernumerary Robotic Finger (SRF) as an assistive robot for healthy people or people with hemiparesis or hemiplegia. SRF comprises of two manipulators attached in user's wrist. Three flex sensors are utilized to measure the finger bending of the user's finger. The posture of SRF is driven by modified glove sensor. The kinematics...
Mobile robot are widely applied in various aspect of human life. The main issue of this type of robot is how to navigate safely to reach the goal or finish the assigned task when applied autonomously in dynamic and uncertain environment. The application of artificial intelligence, namely neural network, can provide a "brain" for the robot to navigate safely in completing the assigned task...
Humanoid Robot Soccer is an implementation of technology in robotics area that has the ability to mimic human activity to play football. Kicking is one of many abilities that the robot must have to play football nicely. The ability to kick in a various kind of kick also needed to enhance it's performance in the match. This research was conducted on a 20 degree of freedom humanoid robot soccer named...
This paper introduced a watermarking method using the CRT and Canny Algorithm that able to improve the imperceptibility of watermarked image and preserving the robustness of watermark image as well. The classical CRT algorithm is spread the watermark bits evenly on the image area. It causes significant degradation when the embedding location lies on the least significant region or in the homogeny...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.