Godunov Method for Computerized Lung Cancer Cryosurgery Planning with Efficient Freezing Time

Godunov Method for Computerized Lung Cancer Cryosurgery Planning with Efficient Freezing Time   Author : DEDE TARWIDI Published on : The 3rd International Conference of Information and Communication Technology   Abstract Cryosurgery is a technique of cancer treatment by providing extremely cold temperature to destroy abnormal cells. In this article, cryosurgery simulation of lung cancer […]

By ppm | Info Publikasi
DETAIL

Enhancing Performance of Block Diagonalization Precoding in Multi User MIMO (MU-MIMO) Downlink

Enhancing Performance of Block Diagonalization Precoding in Multi User MIMO (MU-MIMO) Downlink   Author : FAHRI WISNU MURTI; RINA PUDJI ASTUTI; BAMBANG SETIA NUGROHO Published on : International Conference On Information and Communication Technology (ICOICT)   Abstract Rapid development of Broadband Wireless Access (BWA) requires improvement of system capacity. MU-MIMO is considered as a benefit […]

By ppm | Info Publikasi
DETAIL

A Photo Composite Detection Based on Eye Specular Highlight Using Pixel-based Approach

A Photo Composite Detection Based on Eye Specular Highlight Using Pixel-based Approach   Author : PRASTYAWAN AJI NUGRAHA; RIMBA WHIDIANA CIPTASARI; BAMBANG PUDJOATMODJO Published on : The 3rd International Conference on Information and Communication Technology (ICoICT)   Abstract There are several types of photo manipulation. For example, combining objects from different sources into a single […]

By ppm | Info Publikasi
DETAIL

The analysis of perception of useness, ease, social influence, trust, and cost and the effect on interest of using Alfa Online.

The analysis of perception of useness, ease, social influence, trust, and cost and the effect on interest of using Alfa Online.   Author : ASTRI WULANDARI; ATI MUSTIKASARI; SRI WIDANINGSIH Published on : 2nd International Conference on Global Trends in Academic Research   Abstract “As a result of the lifestyle changes in Indonesia, many companies […]

By ppm | Info Publikasi
DETAIL

Design and Implementation of Secure Fingerprint Template Using Key Binding Scheme and Random Triangle Hashing Scheme

Design and Implementation of Secure Fingerprint Template Using Key Binding Scheme and Random Triangle Hashing Scheme   Author : ERWID MUSTHOFA JADIED Published on : ICOICT 2015   Abstract One problem in biometric fingerprint technology is template protection. Template is individuals digital reference extracted from biometric sample. The objective of template protection is to protect […]

By ppm | Info Publikasi
DETAIL