Results (1611)
Search Parameters:
Keyword: UseDesigning and Using a MySQL Database for Human Resource Management
In this paper, we would like to discuss the methods and ideologies used to create a database to be used for Human Resource purposes. Because we want this database to be accessible anywhere at any time, it is safe to conclude that an internet-based (web-based) database would work best, therefore we chose MySQL as the…
Read MoreSmart Ambulance: Speed Clearance in the Internet of Things paradigm using Voice Chat
In recent years, researchers have focused on the development of many applications of information and communication which could lead to enhance human life. The congestion and road traffic are one of the most problems facing the ambulance transportation to provide fast healthcare services for patients. In this work, a tracking and data transfer system has…
Read MoreMultiscale Texture Analysis and Color Coherence Vector Based Feature Descriptor for Multispectral Image Retrieval
Content Based Image Retrieval (CBIR) for remote sensing image data is a tedious process due to high resolution and complexity of image interpretation. Development of feature extraction technique is a major portion to represent the image content in an optimal way. In this paper, we propose a feature descriptor which combines the color coherent pixel…
Read MorePrediction of Demersal Fishing Ground Associated with Coral Reefs in the Coastal Jepara Regency, Central Java, Indonesia Based on Sentinel 2a Imagery
Map of prediction of fishing ground that already exists in Indonesia issued by the Bali Marine Research and Observation Center (BPOL) and the National Aeronautics and Space Agency (LAPAN) of Jakarta, there are still many weaknesses including the spatial aspect of the point of forecasting far from the coast and the unclear type of fish…
Read MoreOptimization of the Electrical Discharge Machining of Powdered Metallurgical High-Speed Steel Alloy using Genetic Algorithms
Through the Electrical Discharge Machining, the temperature is very high, which can lead to the material phase’s transformation and affects material properties, which can lead to failure of the products in the industry. This study aims to investigate the effect of a new input parameter (pulse cycle time Tc), with other parameters on the EDM…
Read MoreAttacks classification and security mechanisms in Wireless Sensor Networks
This paper proposes a new classification model distinguishing four classes of attacks in Wireless Sensor Networks (WSNs) namely: attacks based on the protocol stack, on the capability of the attacker, on the attack impacts and on the attack target. Then, it presents and classifies the most known attacks in WSNs based the proposed model. Simulations…
Read MoreDevelopment of Evaluation Metrics for Learners in Unplugged Activity
As well as physical computing, unplugged activity is important in ICT (Information and Communication Technology) education, that uses information and communications technology to support, enhance, and optimize the delivery of information, and software education. In order to achieve educational objectives in unplugged activity, evaluation metrics of learners are necessary. However, there is little work on…
Read MoreThe Correlation of the Specific and Global Performance of Teachers in UNTELS Engineering Schools
This article presents an analysis on the existing correlation of the specific and global performance of teachers in UNTELS engineering schools, whose data collection was carried out during the development of the first academic semester of the year 2019, using the Survey technique; which presents indicators classified in two dimensions: “Specific Dimension of Teaching Performance”…
Read MoreIntegration of Third-Party Routing Stack to NetScaler CPX
The Citrix NetScaler CPX, is one of the many Application Delivery Controllers (ADCs), which is used mainly for load balancing between the application servers in a datacenter network. ADCs are typically placed in the demilitarized zone in an organization’s network, handling the connectivity of the external clients to the organization’s servers. While performing load balancing…
Read MoreData Dashboard for Decision Support Systems for Intrapreneurship in A Company
Nowadays, as the Information and Technology rapidly growing all across the world, Indonesia as one of many developed countries always tries to keep up relating to this trend. Regarding to this situation, the use of Information and Technology in various fields are greatly enhanced, and not to mention businesses. There are a lot of businesses…
Read MoreQuranic Reciter Recognition: A Machine Learning Approach
Recitation and listening of the Holy Quran with Tajweed is an essential activity as a Muslim and is a part of the faith. In this article, we use a machine learning approach for the Quran Reciter recognition. We use the database of Twelve Qari who recites the last Ten Surah of Quran. The twelve Qari…
Read MoreEvaluation of Classroom Furniture Design for Ecuadorian University Students: An Anthropometry-Based Approach
It is widely known that students’ exposure to poor postures due to inappropriate classroom furniture design may contribute to the increase of the prevalence of musculoskeletal disorders symptoms that if not identified on time could lead to severe health issues. In this context, due to the unavailability of scientific studies related to this topic in…
Read MoreSimulation and Reproduction of a Manipulator According to Classical Arm Representation and Trajectory Planning
The technical and vocational institutions are the key feeders for skilled human capital in the robotic revolution economy. It is essential to engage the students by creating new, affordable robotics at a fraction of the cost. This study presents the design and simulation of a six-axis robot manipulator specifically made for education and training. The…
Read MoreCoordination between Heterogeneous Models Using a Meta-model Composition Approach
The technological advance as well as needs of human beings made that systems became more and more complex. In contrast, the use and creation of new modelling languages became simple and no more reserved for a handful of language experts. Consequently, many new practices of systems implementation emerged, among them, the use of different domain…
Read MoreA New Wire Optimization Approach for Power Reduction in Advanced Technology Nodes
In advanced technologies nodes, starting from 28 nm to 7 nm and below, the power consumed of integrated circuits (ICs) becomes a big concern. Consequently, actual electronic design automation (EDA) tools are facing many challenges to have low power, reduced area and keep having required performance. To reach required success criteria, and because each picosecond…
Read MoreSpiral Curve for Revocable Touchless Fingerprint Template Securisation
Fingerprint data is really protected by cancelable fingerprint template because it can be revoked when compromise and a new one can be reissued. We develop a touchless cancelable fingerprint template whose algorithm was published in our previous work. We implement here the algorithm and conducted several tests on several databases to confirm the stability of…
Read MoreThe Potential of Ocean Current as Electrical Power Sources Alternatives in Karimunjawa Islands Indonesia
Electrical energy shortage and expensive basic electricity costs are one of the problems that are occurred in Karimunjawa Island, Indonesia. The purpose of this research is to identify the potential of ocean currents energy as one of the alternatives to reduce the problem related to energy needs and to predict the electrical energy that can…
Read MoreA Word Spotting Method for Arabic Manuscripts Based on Speeded Up Robust Features Technique
The diversity of manuscripts according to their contents, forms, organizations and presentations provides a data-rich structures. The aim is to disseminate this cultural heritage in the images format to the general public via digital libraries. However, handwriting is an obstacle to text recognition algorithms in images, especially cursive writing of Arabic calligraphy. Most current search…
Read MoreThe Influence of Adhesive on Roof Tiles Product from Water Hyacinth Fiber Residues
Problem statement: In general, the water hyacinth is a biennial aquatic plant for many seasons with propagated quickly to become serious weeds in general water sources. The water hyacinth is caused carbon dioxide in the atmosphere as a greenhouse effect, which leads to climate change, the environmental concerns of the world today. The agricultural residue…
Read MoreMulti Biometric Thermal Face Recognition Using FWT and LDA Feature Extraction Methods with RBM DBN and FFNN Classifier Algorithms
Person recognition using thermal imaging, multi-biometric traits, with groups of feature filters and classifiers, is the subject of this paper. These were used to tackle the problems of biometric systems, such as a change in illumination and spoof attacks. Using a combination of, hard and soft-biometric, attributes in thermal facial images. The hard-biometric trait, of…
Read MoreFast Determination of Tsunami Source Parameters
Source parameters of tsunami waves are an essential part of any modern tsunami warning system. Recalculation of a measured time series (wave profile obtained by a seabed-based pressure sensor) in terms of initial sea surface displacement at tsunami source is among the most (or) one of the promising approaches to be applied in a warning…
Read MoreCreating a Digital Twin: Simulation of a Business Model Design Tool
Digitization forces industry players to adapt to transforming market situations and buyer behavior. Technological advances, buyer power, and sharpened competitive intensity imply that businesses are confronted with the menace of commoditization. For companies to perform successfully in the market, outdated business models ought to be rethought and new business models should be created. Unique selling…
Read MoreThe Relationship of Coalition on Employee Spiritual Engagement: Interplay of Organisational Politics
The objective of the study was to establish the relationship between coalition and employee spiritual engagement. The research was quantitative, and data was administered and retrieved from employees at the selected private radio firms. Content validity was utilised to ascertain the validity of the instrument, and the reliability of the instrument was established using Cronbach’s…
Read MoreA Proposal of TCP Fairness Control Method for Two-Host Concurrent Communications in Elastic WLAN System Using Raspberry Pi Access-Point
The IEEE802.11n based Wireless Local Area Networks (WLANs) have been extensively deployed due to the flexible coverage, the easy installation, and the lower cost. To reduce the energy consumption while increasing the performance, the elastic WLAN system has been studied, such that it can dynamically change the network configuration according to traffic demands. As well,…
Read MoreQ2 YouTube: Quantitative and Qualitative Information Analysis based Influencer-aware YouTube Channel Ranking Scheme
With the development of big data, artificial intelligence and deep learning, various social information networks are becoming exponentially intelligent. Of all the various social networks, YouTube is so popular that it is called the YouTube era. Not only video viewers, but also actual video producers, influencer youtubers, are increasing, allowing individuals as well as operators…
Read More
