Today, free trade could no langer be contained so that foreign products in circulations and into the local market in the region of the country. This condition has an impact on the products of local…
Multiple sequence alignment (MSA) is a cornestone proces is computational biology and bioinformatics and it is necessary for sequence analysis. Through decades of extensive to solve the MSA problem…
Research regarding Indonesian languange document similarity measurenment has not yet broad to do. Mostly those research using Karp Rabin algorithm and string matching method, and the documents used…
This paper developes neural network(NN) method using conjugate gradient (CG) with combination of particle swarm optimazitation (PSO) and genetic algorithm (GA). The combination of PSO and GA is use…
Computer network has made it easy to echange data;however, there is a security challenge raising from it. This is because the transmitting data can be intercepted by an attacker. Steganography can …
Peer-to-Peer (P2P) computing is the fast emenrgent overlay network distribution system,yhe main gains of P2P is each peer in the network can act autonomous. Super peer network representation is an …
In this paper, a novel parastic element structure is proposed to reduce the mutual coupling produced in a compact (2*1) multi-input multi-output (MIMO) antenna system working at 2.4 GHz for wireles…
Eliptic curves cryptography (ECC) algorithm is well-known powerfull approach of implementing public key cryptography created by Victor Miler and Neil Kobilitz. ECC is a modular arithmetic based alg…
Eliptic curves cryptography (ECC) algorithm is well-known powerful approcah of implementing public key cryptography created by Victor Miller and Neil Koblitz. ECC is a modular arithmetic based algo…
Today,free trade could no langer be contained so that foreign products in circulation and into the local market in the region of the country. This condition has an impact on the products of local e…
Building secure siftware is about taking security into account during all phases of software development. However,the major problem in agile methods is the lack of basic security elements in their …
The goal of this paper is to discover and implement a method of encoding an audio data from a MIDI audio file format into a special type of Quick Response (QR) code 2D barcode called Color Quick Re…
This paper presents key features and challanges for the development of the next generation ontology matcher. Matching elements of two data instances plays an important role in e-business,multilingu…
With the wide spread popularity of social networking sites (SNS),enterprise organizations have strees to explore the busines opportunities is SNS such as Facebook to conduct targated marketing and …
Thanks to the 6LoWPAN technology, each object will get the opportunity to obtain an IPv6 address and integrete the world of the Internet of Things. this provides the ability to collect and monitor …
This paper deals with the performance analysis of WLAN under variable number of nodes using the adjustable prameters such as TXOPLimit,CWmin,CWmax and AIFS in EDCA. The comperative analysis is done…
This research aims at measuring the quality of E-Service and its impact on student satisfaction at Jordanian universities. Toward this aim, a resesearch model was developed and tested withim the co…
Among all the features which can be extracted from videos, we propose to use Space-Time Interest Points (STIP),these ones are particulary interisting because they are simple and robust. They allow…
In wireless sensor network (WSN) data gathering causes more energy consumption.Also most of the exisiting literature work on data gathering process considers only distance and node density and skip…
Segmented blood vessel from the fundus image provides useful clinical information for the diagnosis and monitoring of eye disease. In this paper,blood vessels from the green channel of the fundus i…
The existing test method for properties of UAV data-link is usually the actual flight test or field"distance" test,which has long test cycle and difficulty for the extraction of test data. In view …
Several applications of mobile ad hoc networks select geographical routing especially the Greedy Perimeter Stateless Routing (GPSR) protocol due to its scability and ability to support location bas…
Rapid advancements in technology have imperative effect on consumerism. Technological advancements change the way the world operats. The shifting of customer buying patterns is made viable and sust…
With the wide spread popularity of social networking sites (SNS),enterprise organization have started to explore the business oppotuines in SNS such as Facebook to conduct targeted marketing and re…
Thanks to the 6LoWPAN (IPv6 over Low power Wirelesss Personal Area Network) technology,each object will get the popportunity to obtain an IPv6 adress and integrate the world of the Internet of thin…
Electro Encephalo Gram based Brain-Computer Interface mobile robpts can help as powerful support for seferly disabled people in their regular activities, especially to aid them to move woluntarily.…
Cyber-Ohysical System (CPS) consist of a combination of different embededd subsystem,which work independently of each other and also interact with the external environment. Such embedded system ope…
The wireless network technologies have been popping up everywhere and becoming more popular day by day. Wireless Mesh Network (WMN) is one of the promising wireless technologies that provide effect…
In the past few years, it is observed and noticed that we are utilizing Wireless Sensor Networks with greater interest fo0r varios popular and crucial applications. It represents an emerging set of…
This study was designed to investigate methods to calculate the coeffient of varience is short-term tranffic count (hereafer called STC) point to examine the sample size of the STC, a sample survey…