An Efficient Implementation of Sequential Detector in Spectrum Sensing Under Correlated Observations
An Efficient Implementation of Sequential Detector in Spectrum Sensing Under Correlated Observations Author : FIKY YOSEF SURATMAN; SIGIT PUSPITO WIGATI JAROT Published on : ICOICT 2015 Abstract Improvement on throughput of cognitive radio networks is possible by spectrum sensing when the required sample number (sensing time) is relatively small. This is due to […]
Website Design of EMS-SCADA for AC Usage on a Building
Website Design of EMS-SCADA for AC Usage on a Building Author : HARIS RACHMAT; TATANG MULYANA Published on : ICO ICT Abstract “the application of automation technology in the management of electrical energy is intended to limit the use of electrical energy in a building in order to avoid wasting energy sources and […]
Realistic Facial Animation on Speech Synchronization for Indonesian Language
Realistic Facial Animation on Speech Synchronization for Indonesian Language Author : MELLIA LIYANTHI; HERTOG NUGROHO Published on : IcoICT2015 Abstract Speech synchronisation is one of the studies in the field of facial animation that has been widely studied, which results in speech animation, but there are still many challenges that have not been […]
Design and Implementation of Regulatory Systems of Light, Temperature and Humidity Indoor Gardens Using Microcontroller
Design and Implementation of Regulatory Systems of Light, Temperature and Humidity Indoor Gardens Using Microcontroller Author : ARIANDO; RITA PURNAMASARI Published on : ICOICT Abstract Lighting, warming, and protecting from extreme climate can guarantee and improve a quality of plant. To determine how a good condition for growth of plant, it needs a […]
White Space Steganography on Text By Using lzw-Huffman Double Compression
White Space Steganography on Text By Using lzw-Huffman Double Compression Author : GELAR BUDIMAN; LEDYA NOVAMIZANTI Published on : International Journal of Computer Networks & Communications (IJCNC) Abstract Privacy, especially in a cellphone, is an important thing and should be protected. Steganography is a methodused to protect a sensitive information. The issue tried […]