Speaker Recognition Implementation for Authentication Using Filtered MFCC ??? VQ and a Thresholding Method
Speaker Recognition Implementation for Authentication Using Filtered MFCC ??? VQ and a Thresholding Method Author : REZA AULIA SADEWA; TJOKORDA AGUNG BUDI WIRAYUDA; SITI SAADAH, ST. Published on : International Conference on Information and Communication Technology 2015 Abstract This paper explains about authentication mechanism using one of the unique biometric component, the human […]
Design and Implementation of Voice Command Using MFCC and HMMs Method
Design and Implementation of Voice Command Using MFCC and HMMs Method Author : MUSLIM SIDIQ; TJOKORDA AGUNG BUDI WIRAYUDA; SITI SAADAH, ST. Published on : International Conference on Information and Communication Technology 2015 Abstract The more frequent human interaction to technology demands the development of methods of interaction with the machine to a […]
Implementation Classification And Regression Tree (CART) and Fuzzy Logic Algorithm for Intrusion Detection System
Implementation Classification And Regression Tree (CART) and Fuzzy Logic Algorithm for Intrusion Detection System Author : ASRY FAIDHUL ASHAARI PINEM; ERWIN BUDI SETIAWAN Published on : ICOICT 2015 Abstract Intrusion detection system is a system that can detect the presence intrusion or attack in a computer network. There are 2 type of intrusion […]
Sentiment Analysis on Twitter Using the Combination of Lexicon-Based and Support Vector Machine for Assessing the Performance of a Television Program
Sentiment Analysis on Twitter Using the Combination of Lexicon-Based and Support Vector Machine for Assessing the Performance of a Television Program Author : MIRA KANIA SABARIAH; VERONIKHA EFFENDY Published on : ICOICT 2015 Abstract The development of social media, especially twitter is growing rapidly. Twitter is usually used to comment on a product, […]
The Implementation User Experience Model in Applications Early Childhood Education Using Hierarchical Task Analysis Method (Case Study: Introduction Learning to Read)
The Implementation User Experience Model in Applications Early Childhood Education Using Hierarchical Task Analysis Method (Case Study: Introduction Learning to Read) Author : MIRA KANIA SABARIAH; VERONIKHA EFFENDY; AVIAN RINANDHI Published on : ICOICT 2015 Abstract Interactive media using application is a solution to provide early childhood learning in today’s technological era, one […]
Feature Extraction Analysis on Indonesian Speech Recognition System
Feature Extraction Analysis on Indonesian Speech Recognition System Author : UNTARI NOVIA WISESTY; ADIWIJAYA Published on : ICOICT 2015 Abstract “Speech recognition is widely applied to speech to text, speech to emotion, in order to make gadget and computer easier to use, or to help people with hearing disability. Feature extraction is one […]
Modularizing RESTful Web Service Management with Aspect Oriented Programming
Modularizing RESTful Web Service Management with Aspect Oriented Programming Author : WIDHIAN BRAMANTYA; BAYU MUNAJAT Published on : ICoICT 2015 Abstract REST is one type of web services that uses standardized HTTP and runs on top of website-like protocol. In web application, functionalities spread in tiers or layers. Using Object Oriented Programming (OOP), […]
Recommender System Based on User Functional Requirements Using Euclidean Fuzzy
Recommender System Based on User Functional Requirements Using Euclidean Fuzzy Author : KEN ARNETT DS; Z K ABDURAHMAN BAIZAL; ADIWIJAYA Published on : The 3rd International Conference of Information and Communication Technology 2015 (ICoICT 2015) Abstract Customer often feels difficult to describe what he needs when he intends to buy a high-tech product […]
The Combination of Agglomerative Clustering and K-Means Algorithm for Website Visitor Segmentation
The Combination of Agglomerative Clustering and K-Means Algorithm for Website Visitor Segmentation Author : YUDHA AGUNG WIRAWAN; INDWIARTI; YULIANT SIBARONI Published on : GTAR Conference 2015 Abstract Clustering is an important aspect in the use of website mining for web visitor segmentation. In this writing, we classify visitors using hierarchical and non-hierarchical clustering […]
Redefining E-Learning Readiness Model
Redefining E-Learning Readiness Model Author : YANUAR FIRDAUS ARIE WIBOWO; KUSUMA AYU LAKSITOWENING Published on : ICoICT 2015 Abstract In order to bring out the highest advantages of e-learning, e-learning implementation need well-prepared strategic plan. It is expected that the implementation of e-learning is considered not only limited to investment and technology adoption, […]