The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Copy-move forgery detection is one of the most popular type of forgery in multimedia forensics. The attacks copy and paste desired area in the same images. In this paper, we aim to reduce the false matches of detected area of forgery by using the pre-processing methods, such as histogram equalization, smoothing filter with median and Gaussian filter and sharpening filter, combined with the SIFT algorithm...
The Hadith is one of the two sources of Islamic law after the Qur'an. It is a fact that there are a number of false hadith, recognised by Muslim scholars since the end of the first century of Hijra, and even earlier. In addition to the breadth of false hadith circulating among the public at this time, it is difficult to determine the source of authenticity and distinguish false from genuine. This...
Software testing is one important aspect of the software development process. About 50% of the time and cost in the software development process used for software testing process. There are two methods of software testing, black-box testing and white-box testing. This research using white-box testing. Software testing can be done manually or automatically. Based on research conducted, genetic algorithm...
There are so many applications using Crowdsource techniques in retrieving data, especially data on the traffic density of vehicles on certain roads, sample applications that already implementing the concept Crowdsourced data such as Waze, Google Maps, Bing Maps, etc. However, from that Crowdsouced data it will arise the question, whether the given data valid? Or how accurate the data provided by the...
Religious Courts of South Jakartais responsible for managing the filing of cases. However, the submission process uses manual and semi-automated systems that cause some problems, such as difficulties when requiring the exchange and accessing information between units in real-time. With regard to this problem, the performance of the system needs to be analyzed. In order to find the optimal modeling...
Today's Internet technology is not free from problems. Unfortunately, it is used by people who have no right to steal important data. The National ICT Training and Research Center (PUSTIKNAS) Ministry of Communication and Information Technology the Republic of Indonesia is one of the government agencies that often suffer experimental intrusion by outsiders. One solution is to implement a honeypot...
The growth of Wireless Sensor Network (WSN) in the late years, encourages a lot of research in it. The most investigated topics are energy consumption, coverage, and connectivity in WSN. This paper discusses connectivity for WSN with the presence of simple obstacles. The LEACH protocol is used and is modified based on the obstacle, to improve the clustering process. We propose an algorithm based on...
The need of pathologist to analyze tissue samples from remote, constrained by the high initial cost of the initial investment both hardware and software. Therefore researchers are trying to analysis the cost-benefit and QoS of the dynamic Telecytology system in Indonesia. The researchers have built the Telecytology systems with hardware and software, that are as an initial cost of the system. The...
Spectrum sharing using licensed shared access is one method of spectrum usage to be more optimal and efficient. In this paper we propose techno economic approach to know investment value and economic feasibility of using spectrum sharing at radar 2700–2900MHz band. Coverage area of spectrum sharing decided about 15km outside radar coverage at Soekarno Hatta international airport. By spectrum sharing,...
An Internet of Things (IoT) application that employs wireless transmission data such as Wireless Sensor Node need to be designed well enough, So its data doesn't loss in its transmission between the node. Therefore to build an IoT application such as Wireless Sensor Node path loss propagation model is a must. In this paper, we proposed a new path loss model to be used on a near ground 2.4 GHz Wireless...
The development of Cloud Computing is growing and becoming a trend that is widely used in the world of telecommunications today. In education, cloud computing becomes something that is needed to support the teaching and learning process. We analyze and design the network infrastructure in schools to implement cloud computing in local area schools. Then we built a system to create a server for cloud...
Marketing has a broad range of strategies according to the needs of the company. One marketing strategy is cross-selling. The strategy can be done by offering new products. However, too many offers to customers who are not appropriate, make marketing nonoptimal. It is necessary for classification of existing telephone customers and speedy for cross-selling strategy IndiHome PT. TELKOM Jakarta. This...
Nowadays major interest in the field of Dynamic Telecytology is growing rapidly. The need of the pathologist to analyze the specimens remotely both hardware and software[1][2]. Therefore, authors are trying to do a study to examine the Quality of Service (QoS) feasibility of the Telecytology system using Wireshark, Essential NetTools and Ping Plotter. This research was conducted in Greater Jakarta,...
As one of the top ten countries that has highest internet users, Indonesia is a land of opportunities for service provider companies to grow their market. Indonesian people also love to use their gadget and grow attach to them. To maintain the customers' satisfaction, the service provider companies need to balance the quality of product and the quality perceived by the customers, especially when using...
This paper aims to analyze the interference between wireless traffic light controller and remote keyless entry for vehicles. Both systems are located closely to each other at the frequency 433–434 MHz. During the analysis, broadcast variant time delay on wireless traffic light versus distances between and RKE determined to ensure their interference. The interference impact is evaluated in a scenario...
Nowadays, world is on going to “Convergence Era”, where data, voice, and video overcome to pass through same network, like IP network. Unfortunately, the fast growth of application technology has not been supported yet by default IP network in the case of quality of service. We have known, that voice over IP services have sensitivity to delay, jitter and latency. And it require of different bandwidth...
Increasing demand on data center and computer labs in Indonesia affected by the increasing number of users who use the computer for business or education. One of the main requirements that can not be separated from the use of a computer is a storage area in the form of a USB Flash Disk, External HD, HD to Internal HD for the need for a large-scale computer servers located in the data center, laboratory...
Three dimension computer graphics has become important to present virtual objects to be more realistic and physically correct. One way to enhancing realism is by representing the physics simulation. We tried to implement physics simulation into a serious game. It is because of ability to increase realism in synthesis on virtual object motion. We design a serious game called “Traffic Drive”. Traffic...
This paper carried out to develop the concept of CBIR by using Wavelet Transform Methods for feature form and texture extraction and adaptive histogram for feature color extraction. The method is not only recognize the images that have been stored in database, but also be able to find some resemblance ornament image or texture as well as form. Although They are different size, direction of slope,...
E-Government implementation is growing widely follows dramatic enhancement in Information Technology exploitation. It also fosters on transferring information exchanges among the people who need a kind of services including advantages or benefits can be fully used and utilized. In other word, e-Government is an infrastructure applied to serve and to ease citizens or people in accessing related needs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.