The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A wide variety of current attendance system can be found easily in the market, but there are still some deficiencies in the attendance system; how the company will control employees are outside the office building and how employees can take advantage of the attendance system to view a variety of information needed. The modern attendance system must integrated with a human resources management and...
Technology Enhanced Learning is one of the most dynamic areas of inquiry in education. One form of TELs, that is on-screen learning, has become the topic of interest of many works. It is popular mainly with young people despite all findings, which undoubtedly suggest that it is detrimental to learning. The method hinders learning experience due to the reading spatial instability, difficulties in establishing...
The capability to detect the drop of attention as early as possible has many practical applications including for the development of the early warning system for those who involve in high-risk works that require a constant level of concentration. This study intends to develop such the capability on the basis of the data of the brain waves: delta, theta, alpha, beta, and gamma. For the purpose, a number...
Powerpoint slides have become one of the essential teaching tools in academic for both offline and online modes. It may play a useful role to facilitate discussion and information exchange. However, in our teaching experience, we find many students utilizing Powerpoint slides beyond their traditional functions. Many students fully rely on the slides as the main learning materials and, in some cases,...
The use of the Internet has become very important in our daily life. Therefore, the quality of the network is becomes very important. There are several protocol and technology in the Internet network. In this paper we analyzed Multi-Protocol Label Switching (MPLS) compared to Non MPLS. We compared the throughput, packet loss, and Jitter. We used the tools such as Iperf, Wireshark and routing table...
Automatic emotion recognition from human speech signal has many important practical applications. For the reason, a number of studies has been performed on the basis of English, German, Mandarin, Persian, and Danish languages. This work intends to develop automatic emotion recognition system on the basis of speech signal in Indonesia language. The study is limited to four emotional states, namely,...
This research focused on distance measurement using Received Signal Strength Indicator (RSSl) that utilizing Pythagoras theory to get the position of a smartphone with the help of 4 Access Point (AP) in indoor environment. There were many research have been done in this area, but the issue is about the accuracy. From studies that have been done before, there are differences between the results of...
Technology Enhanced Learning is one of the most dynamic areas of inquiry in education. One form of TELs, that is on-screen learning, has been well understood to hinder learning experience due to the reading spatial instability, difficulties in establishing mental map, and poor visual ergonomics. This work intends to study to which extend a learning a recommendation system improving on-screen learning...
Bluetooth Low Energy (BLE) or Bluetooth Smart is a wireless device that can be connected to many wireless devices with many applications. In this paper, we analyzed the accuracy of BLE for measuring distance in order to build the indoor positioning application. The problem of BLE in distance measurement and indoor position are low accuracy that is caused by the fading effect. We discussed about the...
Massive proliferation of social media has opened possibilities for perpetrator to conduct the crime of online child grooming. Because the pervasiveness of the problem scale, it may only be tamed effectively and efficiently by using an automatic grooming conversation detection system. Previously, Pranoto, Gunawan, and Soewito [1] had developed a logistic model for the purpose and the model was able...
In order to avoid intruder steals sensitive information over the network, one thing that we may consider is to encrypt the sensitive information beside install an antivirus on the devices or networks. The problem is the strong encryption algorithm is very complex and required intensive computational that need huge power consumption and others resources in mobile devices. Furthermore, people have been...
Automatic handwriting recognition system is very important for various areas of application such as banking and logistics sectors. The performance of such system strongly depends on its feature extraction methods. So far, many extraction methods have independently been studied and proposed, and the three widely adopted methods are Geometric Moment Invariant (GMI), United Moment Invariant (UMI), and...
Heart disease is known to be one of the main cause of death worldwide. In the United States, the disease is the leading cause of death for people of most ethnicity. In Indonesia, the disease contributes 17% of the total mortality. It is also well-known that a regular or continuous monitoring the heart rate is important to minimize the fatality. At the current technological state, the monitoring method...
The attendance system has been known for a long time, ranging from manual system to automated and complicated system such as attendance system using biometrics. All those attendance system have several weakness, especially to control of employees who work outside the office. In this paper we introduced a attendance system that can be used to record the attendance of employees who are duty outside...
Attendance system which is currently excist still has weaknesses. The first is the long queues in front of the attendace machine at the time to come to work and leave work. The second is cheating, employees can ask her/his friend to do attendance process. The third is mostly attendance system has not been connected with the payment system in human resouces software or in the finance department. The...
The machine text summarization is of necessary with the existing of the enormous amount of popular articles. This work evaluates the latent semantic analysis technique to summarize popular articles in Indonesia language. The summarization performance are evaluated with respect to precision, recall, and F-measure. As results, the performance seems to be reasonably high particularly when the summarization...
Automatic system to monitor the road condition is importance to minimize losses due to traffic accidents. The system is required considering the size of the road network in many modern metropolitan cities. Various monitoring techniques have been proposed and in this work, we evaluate the use of vehicle acceleration data in the longitudinal and lateral directions to detect the road anomalies particularly...
The floating car data (FCD) method is an example of the applications of the Intelligent Transportation Systems (ITS) where the traffic data are provided by means of the information and communication technology. In the FCD method, the traffic data are collected, manipulated, and transmitted by probe vehicles via a wireless network to a designated server where the data are stored, manipulated, and displayed...
This paper presents a model-based optimization algorithm for short-term energy trading in a multi-microgrid system. The multi-microgrid system has a hierarchical design architecture which is based on the Multi-Agent System (MAS) concept. Mixed-integer linear programming (MILP) which takes into consideration multiple constraints is used to obtain the optimum amount of power that will be generated,...
The virtual trip line (VTL) has been proposed in conjunction with the floating car data method to minimize the potential breach of the probe vehicle privacy. However, a long VTL, as well as a short one, may have unintended consequences; thus, the VTL length should be optimized. This article intends to propose a method to establish the optimum length of the VTL. The optimal length of VTL is determined...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.