Results (486)
Search Parameters:
Keyword: ImplementProbabilistic Method for Anomalies Detection Based on the Analysis of Cyber Parameters in a Group of Mobile Robots
This article is devoted to the issues of ensuring the security of a group of mobile robots in the implementation of attacks aimed at the property of accessibility of information and the availability of network nodes. The article presents a method for detecting an abnormal behavior of a network node based on the analysis by…
Read MoreStudent Performance Evaluation Using Data Mining Techniques for Engineering Education
In this research work, we are implementing a student performance evaluation model using Mamdani Fuzzy Inference System (FIS) and Neuro Fuzzy system and comparing the results with classical averaging method for Network Analysis (NA) course studied by third semester Electronics and Communication Engineering students. This work explains the designing of scoring rubrics using Bloom’s levels…
Read MoreiSensA – A System for Collecting and Integrating Sensor Data
The idea of monitoring several types of parameters in various environments has been motivating significant research works in Internet of Things (IoT). This paper presents the design and construction of iSensA, a system for integrating and collecting information from sensors. The solution implements a multi-sensor monitoring system and then expands the monitoring concept to an…
Read MoreA Resolution-Reconfigurable and Power Scalable SAR ADC with Partially Thermometer Coded DAC
Power consumption is becoming more and more important in the Internet of Things (IOT). The ADC is the main power hungry in multi-sensor electronic systems and effectively reducing ADC power consumption without affecting ADC characteristics is an important. This paper is extended from the conference paper. The segmented SAR ADC presents reconfigurable 9 to 12-bit…
Read MoreTowards Adoption of Authentication and Authorization in Identity Management and Single Sign On
Identity and Access Management (IAM) and Single Sign on (SSO) are two security concepts that are related to each other. IAM governs the user access in an organization whereas SSO facilitates the user by authenticating to one centralized application and not having to re-authenticate when trying to access other applications. This paper addresses the different…
Read MoreElliptical Printed Dipole Antenna Design using ANN Based on Levenberg–Marquardt Algorithm
A design of elliptical printed dipole antenna based on neural network approach is presented in this paper for recent WiMAX, Bluetooth, WLAN, LTE, and future 5G applications. The dipole patch is printed on top of substrate which has relative permittivity of 2.2 and 0.787mm of thickness. The elliptical dipole antenna is single band and the…
Read MoreVirtual Watershed System: A Web-Service-Based Software Package For Environmental Modeling
The physically-based environmental model is a crucial tool used in many scientific inquiries. With physical modeling, different models are used to simulate real world phenomena and most environmental scientists use their own devices to execute the models. A complex simulation can be time-consuming with limited computing power. Also, sharing a scientific model with other researchers…
Read MoreNonLinear Control via Input-Output Feedback Linearization of a Robot Manipulator
This paper presents the input-output feedback linearization and decoupling algorithm for control of nonlinear Multi-input Multi-output MIMO systems. The studied analysis was motivated through its application to a robot manipulator with six degrees of freedom. The nonlinear MIMO system was transformed into six independent single-input single-output SISO linear local systems. We added PD linear controller…
Read MoreProtecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm
Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through the unsecure network. However, many attackers try to store private data by using various attacks. Most of the organizations use password based encryption algorithm (PBE) to protect their private data. However, the existing PBE methods are vulnerable…
Read MoreThe Model Development of an Effective Triggering System of Production Kanban Size towards Just-In-Time (JIT) Production
The contents of this article consist of an extension original work presented at the 4th International Conference on Control, Automation and Robotics (ICCAR 2018) and aims to develop the systematic model of an effective triggering system of production Kanban size towards Just-In-Time (JIT) production system. The developed model was introduced based on the philosophy of…
Read MoreDeveloping Students’ Motivation for Learning through Practical Problems in School
This paper is an extension of work originally presented in the 19th International Conference on Computer Supported Education and Information Technology. This paper identifies motivational factors that ensure the initiation and effective implementation of mathematical activity. These factors are in subordination to each other, forming a hierarchical dependence. At the heart of this hierarchy is…
Read MoreTowards an Efficient Federated Cloud Service Selection to Support Workflow Big Data Requirements
Cloud Computing is considered nowadays an attractive solution to serve the Big Data storage, processing, and analytics needs. Given the high complexity of Big Data workflows and their contingent requirements, a single cloud provider might not be able alone to satisfy these needs. A multitude of cloud providers that offer myriad of cloud services and…
Read MoreSpatial Modeling of Flood Risk in Karawang
Conceptually, flood modeling can be done based on process and data availability (data driven model). The implementation of flood mitigation requires accurate data, which can be obtained from high resolution satellite imagery, vertical air photos and high-resolution Digital Elevation Model (DEM). Modeling using high accuracy DEM data can detect landforms in more detail. The objective…
Read MoreNemoMap: Improved Motif-centric Network Motif Discovery Algorithm
Network motif analysis has several applications in many different fields such as biological study and social network modeling, yet motif detection tools are still limited by the intensive computation. Currently, there are two categories for network motif detection method: network-centric and motif-centric approach. While most network-centric algorithms excel in enumerating all potential motifs of a…
Read MoreSDN-based Network Control Method for Distributed Storage Systems
With the increasing need for effective storage management due to ever-growing content-generation over the Internet, Distributed Storage Systems (DSS) has arisen as a valuable tool. Although DSS has considerably improved in the past years, it still leverages legacy techniques in its networking. To cope with the demanding requirements, Software Defined Networking (SDN) has revolutionized the…
Read MoreDeveloping A Conceptual Framework of Product-Service System Management Toward Firms’ Sustainability for Indonesian Industrial Estate Firms
Industrial estate firms have important roles in national development through the industrial development. In the course of their life, industrial estate firms ought to follow the firm life cycle pattern. The common pattern shows that the period, in which the firm experiences profit increase, will be directly followed by consistent profit and profit decrease. Should…
Read MoreVirtual Output Queues Architecture for High Throughput Data Center Nodes
The latest design approach for Data Centers (DCs) follows the direction of exploiting optical switching to connect Top-of-Rack (ToR) switches that serve thousands of data storing and computing devices. A ToR’s usual function is the Virtual Output Queues (VOQs), which is the prevalent solution for the head-of-line blocking problem of the DC switches. An effective…
Read MoreAn Optical-based Fingertip Force Sensor
This work introduces the design and prototype development of a novel optical-based fingertip force sensor, which is integrated in a bio-mimetic finger for robotic and prosthetic manipulation. Given the optical nature of the sensor, the proposed device is free of any electrical and metal components. Accordingly, the design improves manipulation of objects with high electromagnetic…
Read MoreSynthesis of QDI Combinational Circuits using Null Convention Logic Based on Basic Gates
Currently, synchronous digital circuits (SDC) may require certain design conditions, such as power consumption, robustness, performance, etc. These design conditions are more difficult to satisfy when SDC are implemented in VLSI (Very Large Scale Integration) technology and in the deep-sub-micron MOS (DSM-MOS) technology. The asynchronous design style has properties that serve as an alternative to…
Read MoreA Dual-Band 90-Degree SiGe HBT Active Phase Shifter Based on Band-Pass and Band-Stop Designs Using Dual-Band Resonators
A dual-band 90-degree SiGe HBT active phase shifter based on band-pass and band-stop designs using dual-band resonators is presented in this paper. The active phase shifter employs differential configuration and has band-pass and band-stop filters in the load circuit. By switching two output ports of the differential amplifier, 90-degree phase shifting has been realized at…
Read MoreDesign of smart chess board that can predict the next position based on FPGA
The abilities of human brain to discover solutions for many problems is a great gift that motivate the scientists to develop the revolution of the artificial intelligence and using it in many areas. This paper proposed an intelligent chessboard which works in a way that similar to the human brain that predicts the next positions…
Read MoreSupporting Active Aging Through A Home Automation Infrastructure for Social Internet of Things
The number of smart devices inside the living environments grows more and more every day, and with it the need to interface them in order to share data and activate functions. Each day, new scenarios and new applications emerge to make our lives easier in many different contexts. The AAL SOCIALIZE project aims to create…
Read MoreTheory Building of Quattro Bottom Line Approach for Sustainable Reverse Logistics from Government Perspective: The Indonesia Evidence
Reverse logistics activities are widely used application to preserve the environment in many developed countries from e-waste problem. Due to lack of public awareness in many emerging countries, implementation of reverse logistics program must be initiated by government. Besides that, reverse logistics practices often fail to balance among profit target achievement, the environmental conservation, and…
Read MoreStream Cipher by Reed-Solomon Codes
Stream cipher can be used in constrained environments to provide information security and reduce energy expense at data transmission. In this paper, it is shown that Reed-Solomon (RS) code can be used to implement stream cipher, which is widely used for error corrections of data in transmission and storages. The proposed stream cipher combines the…
Read MoreSimulation Strategy to Enhance Oxygen Uptake and Reaction Forces at Leg Joints and Vertebral Bodies During Ergometer Exercise Under Altered Gravity
Moderate exercise has been implemented in spaceflight programs to prevent muscle and joint damage under extreme circumstances such as microgravity. Although the physical effects of exercise have been investigated experimentally, advanced modeling and simulation techniques are powerful tools that could provide insight into the physical limitations, optimal conditions, and mechanisms that might lead to muscle…
Read More
