The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In today's web based IT environment response time and availability are of major concerns, a few seconds delay in response time or non-availability of a resource can significantly impact customer satisfaction. Replication provides better performance and higher availability by maintaining multiple copies of data called replicas at various strategic locations. An important issue that must be addressed...
As the game development process is a very tedious one, a good knowledge of which game animation technique that work best in practice is very essential. In this paper we study the performance of two popular animation models - the skeletal and key frame animation models. We have done some experiments using a test bed program to measure the performance, memory usage and hard disk space used by the two...
This paper presents a Simulink implementation of the CMAC controller which was proposed by J.S. Albus. The controller was implemented using the MatlAB S-function so that it can be used by a control engineer working on the Simulink platform to study the feasibility of using the CMAC controller for his control application. Simulations with various quantization levels and learning rates were done for...
This paper chooses and evaluates three feature vectors and their augmented feature vector for recognizing the styles of Indonesian paintings. The three feature extraction methods include the Gabor wavelet, histogram analysis, and number-of-edge analysis. The recognition purpose is to discriminate between the abstractionism and the realism styles of Indonesian paintings. The experimental results using...
With the support of semantic annotation and domain ontology, semantic web is able to assist people in querying rich documents. However, generating queried semantic documents without ranking them in a right order is ineffective. In this paper, we are extending FF-ICF algorithm with the concept spreading. For experimentation, this algorithm is applied into a research prototype retrieval engine, PicoDoc...
This paper presents a novel static and moving obstacles avoidance method in indoor environment for service robot. This method uses combination of information about static obstacles on the landmark, speed and direction of people that walks as moving obstacle obtained by single camera, then calculated the probability of collision using Bayesian Filtering. In this research, 2 stopping point in landmark...
Web mining consists of three aspects: Web content mining, Web structure mining, and web usage mining. The most important application of web mining is targeted advertising. Sequential mining is the process of applying data mining techniques to a sequential database for the purposes of discovering the correlation relationships that exist among an ordered list of events. An important application of sequential...
Breast cancer is reported to be the second deadliest cancer among cancerous woman. Statistics show that the case of breast cancer in the world is increasing every year. By analyzing a mammogram, pathologists could detect the presence of micro calcification in ones breast. However, micro calcification could be classified into benign and malignant. The later indicates the presence of cancer. Computer-Aided...
The understanding and predict threats to the security of information systems become really important in order to protect critical systems. Protection against the threat of computer threats have been adequately considered with anti-virus software which resulted in an increase in world surveys from CSI Survey 2008 for the use of security technologies against malware is that the use of antivirus stand...
This paper presents a preliminary study of the existing MDT-based taxi dispatch system at Blue Bird Taxi, the leading taxi service provider in Indonesia. The aim of Global Positioning System (GPS)-based Mobile Data Transfer (MDT) system implementation in Blue Bird Taxi is to address passenger waiting time reduction, taxi dispatch time reduction, and increase passenger satisfaction. Although numerous...
The massively parallel computing using graphical processing unit (GPU), which based on tens of thousands of parallel threats within hundreds of GPU's streaming processors, has gained broad popularity and attracted researchers in a wide range of application areas from finance, computer aided engineering, computational fluid dynamics, game physics, numerics, science, medical imaging, life science, and...
Neural Network is a network that resembles a human brain tissue, which may infer a result based on the facts or experience that happened. Many applications have implemented neural network. In this thesis, we compared the stock forecasting result of ANTM (PT Aneka Tam bang) using Artificial Neural Network and ARIMA. ARIMA is a technique of time-series forecasting, which means forecast based on the...
Nowadays, teaching and learning process are changes drastically. Everything changes to be more digitalized and simpler. The way teacher addressing the materials, the way the student record the materials from the teacher, the way to communicate between teachers and parents, has changed. How will the education institutions support the changes if they do not have a proper IT system? How will they have...
Information and Communication Technology (ICT) is one of the most important aspect in a country. Good progress in ICT will be a valuable factor to compete with other countries. The progress in DKI Jakarta province is considered as a measurement or representation, that the ICT in Indonesia has been developed well or not. This research will use data mining method with clustering, using Self Organizing...
Demand data can be viewed as a number series from time to time. The series may be a pattern that can be analyzed for the next demand prediction if the slice of time is constant. The demand series which the time slice is constant can forecast the next demand valued by applying a formula. There are many methods to forecast the next demand. All formulas calculate the next demand by using the fact of...
The purpose of this study is to measure how big the risk level associated existing information technology at PT. Phintraco and how to minimize the risk of information technology. The research methodology used involves library research, documentation studies and interviews, collected data were analyzed using the NIST method. Results from this study indicate there are 13 types of risks that might occur,...
The terrorism activities are not only in real world as development of technology, but also in cyber world. Terrorism activities in cyber world are called cyber terrorism. One of methodology for cyber terrorism detection is by applying data mining algorithm to textual content of terrorism related web pages. Web mining is technology applied to extract information from the web. By using web mining, cyber...
Rising of computer violence, such as Distributed Denial of Service (DDoS), web vandalism, and cyber bullying are becoming more serious issues when they are politically motivated and intentionally conducted to generate fear in society. These kinds of activity are categorized as cyber terrorism. As the number of such cases increase, the availability of information regarding these actions is required...
The increase of malware that are exploiting the Internet daily has become a serious threat. The manual heuristic inspection of malware analysis is no longer considered effective and efficient compared against the high spreading rate of malware. Hence, automated behavior-based malware detection using machine learning techniques is considered a profound solution. The behavior of each malware on an emulated...
To increase the number of customer, companies create some programs. loyalty program is the one way to increase number of customer. Most of the companies merge, cooperate, and acquired with other companies that leads to integration of their system. The purpose of this research is to show an alternative solution to these integrations, an alternative that is easy to implement and undemanding in terms...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.