The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Industrial realize that SCADA System was built without considering the security aspect. It was believe that there will be no attacks go to the SCADA plant using malware, such as botnet. Botnets are now the key platform for many Internet attacks, such as spam, distributed denial-of-service (DDoS), identity theft, and phishing. Most of the current botnet detection approaches work only on specific botnet...
Bitcoin is a digital payment system empowered by a distributed database called blockchain. The blockchain is an open ledger containing records of every transaction within Bitcoin system maintained by Bitcoin nodes all over the world. Because of its availability and robustness, the blockchain could be utilized as a record-keeping tool for information not related to any Bitcoin transactions. We propose...
With the increase in automobile use, the highway traffic have only surged. At the current rate of increasing automobiles, speed determination has become a major concern in avoiding fatal accidents. Radar technology is the current productive way used for speed detection. In this paper we have come up with an alternative method of using image and video processing which can overcome the drawbacks of...
Every year forests degrade because of illegal logging and forest fires. The worst forest and land fires are also found on peatlands. This research aims to identify hotspot sequences as fire indicator on Sumatra peatlands on the year 2014 using SPADE algorithm. There are 28 sequences generated with a minimal of two days occurrences with minimum support of 0.01. The sequence patterns showed that majority...
Deep learning algorithms modelled with deep architectures have demonstrated impressive results to alleviate common problems of Feedforward Neural Networks, i.e. escaping poor solutions of local minima. Basic architecture concepts behind these powerful models have been set up by preliminary research on Neural Networks, including the application of unsupervised pretraining algorithms and greedy layer-wise...
Circles detection is an important part of object recognition in image processing and computer vision. In this paper, we propose an adaptive method based on Hough transform to detect the circle shapes in digital image. The Mexican Hat filter derived from edge filter is used to concentrate the peaks of Hough local maxima. So, the circle center and its radius can be extracted easily and accurate. The...
This paper studies the use of word embeddings for POS tagging in Bahasa Indonesia. The experiments are conducted with an architecture based on neural network model, that is a simple feed forward neural network with one hidden layer. The word embeddings (i.e., CBOW, skip-gram, and GloVe) are trained on unlabelled text corpus created from Wikipedia Bahasa Indonesia. The results show that word embeddings...
In this paper, the new approach to automatization of non-rigid parts machining at their deformation is proposed and analyzed. This approach bases on application of multilink manipulators with vision system and allows not using the expensive individual equipment for exact fixing of parts before machining. Two different algorithms of intelligent path planning of manipulator's working tool based on vision...
Nowadays, the trend of drugs leads to multi-target drug. A drug compound may have one or more protein targets. Drugs that have multi-target protein considered to be more potential in the future. Virtual screening (VS) is a computational technique used in drug discovery to find the protein target of drugs. Virtual screening is usually based on compound similarity or database docking. Thus, the identification...
Autonomous underwater vehicle (AUV) are complex nonlinear dynamic objects with variable and uncertain parameters, operating in conditions of significant interacting between their degrees of freedom in the presence of external influences. For high-precision path-control of AUV the control system (CS) consisting of two loops is offered in this paper. First loop is the loop of tracking a target point...
We developed the Wi-Fi based temperature monitoring system which determines the melting point of a material caused by thermal events in a material. The system is consisting of a furnace combined with digital PID controller, embedded microcontroller and two K-type thermocouple sensors for measuring both reference and sample temperature. In this paper, we performed the measurement by combining the common...
Both tracking and robust performance are important issues in control engineering. Tracking performance represents how precise the actuator can follow the reference, while robust performance shows how far the actuator can function properly when plant uncertainty and disturbance appear. This works assess both tracking and robust performance of two popular control algorithms i.e Sliding Mode Control...
FPGA, or Field Programmable Gate Array, has been widely used for several applications such as digital signal and image processing, video processing, software-defined radio, radar processing, medical imaging and so on. Currently, with the significance growth of parallel computing and cloud computing application, FPGA provides another solution for high performance computing instead of CPU or GPGPU due...
This research was carried out in order to use image processing techniques to detect, track, classify, and count vehicles in a real-time traffic video. Additionally this research also focuses on occlusion detection and handling, which involves detecting and handling the states when one vehicle superimposes the other or when two superimposed vehicles split, and lane categorization i.e. dividing the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.