Monitoring and Controlling of EMS-SCADA via SMS Gateway
Monitoring and Controlling of EMS-SCADA via SMS Gateway Author : RINO ANDIAS A.; TATANG MULYANA Published on : IcoICT Abstract “General manufacturing process automation system is intended for electrical energy savings. This automation is created using a SCADA system. System monitoring and control from a distance in real time can be accessed through […]
Pricing Bermudan option via Evolutionary discrete morse flow approach
Pricing Bermudan option via Evolutionary discrete morse flow approach Author : IRMA PALUPI Published on : International Conference On Information and Communication Technology Abstract Bermudan option is an options that possible to make an early exercise as in American options. It differs from American option in only one characteristic. The option restricts the […]
Detection of Ovarian Follicle for Polycystic Ovary Syndrome in Ultrasound Images of Ovaries
Detection of Ovarian Follicle for Polycystic Ovary Syndrome in Ultrasound Images of Ovaries Author : BEDY PURNAMA; ADIWIJAYA; UNTARI NOVIA WISESTY; fhira nitha Published on : ICoICT 2015 Abstract In the female in their reproductive cycle, Polycystic Ovary Syndrome (PCOS) is endocrine disorders that occurred on the adult female. In this paper, an […]
Performance Improvement of Palm Vein Identity Recognition Using Adaptive Filtering and Retinex Method
Performance Improvement of Palm Vein Identity Recognition Using Adaptive Filtering and Retinex Method Author : MUHAMMAD SHAFHI KASYFILLAH; TJOKORDA AGUNG BUDI WIRAYUDA Published on : International Conference on Information and Communication Technology 2015 Abstract Biometric is identification technology system based on feature from specific physiological or behavioral characteristic as authentication, one of it […]
Analysis and Implementation Scale Invariant Feature Transform (SIFT) for Authentication System Using Palm Vein
Analysis and Implementation Scale Invariant Feature Transform (SIFT) for Authentication System Using Palm Vein Author : GHOFINKA PUTRI; TJOKORDA AGUNG BUDI WIRAYUDA; SITI SAADAH, ST. Published on : International Conference on Information and Communication Technology 2015 Abstract Data increasing every day become trigger to theft of personal data by those who don’t responsible […]