Search Results - "Nugroho, A S"
-
1
Deep Vein Thrombosis in Elderly Patients following Surgery for Fracture of the Proximal Femur
Published in Malaysian Orthopaedic Journal (01-11-2014)“…The incidence of Deep Vein Thrombosis (DVT) is high in orthopaedic cases, associated with morbidity and mortality. This study was done to evaluate the…”
Get full text
Journal Article -
2
Life cycle greenhouse gas emissions assessment: converting an early retirement coal-fired power plant to a biomass power plant
Published in Renewable energy focus (01-10-2024)“…[Display omitted] Decommissioning aging coal-fired power plants (CFPPs) represents an effective strategy for reducing greenhouse gas (GHG) emissions,…”
Get full text
Journal Article -
3
Swedish Weight Sounding: A prospective portable soil investigation tools for liquefaction assessment of residential houses in Indonesia
Published in E3S web of conferences (01-01-2020)“…National Disaster Management Agency (BNPB) statistics show that the majority of earthquake affected buildings are residential houses, whereas in practice, soil…”
Get full text
Journal Article -
4
Pengamatan Lendutan dan Rambatan Retak pada Perkerasan Lentur Diperkuat Geosintetik Akibat Beban Siklik
Published in Jurnal Teknik Sipil (01-12-2010)“…Salah satu jenis kerusakan jalan adalah retak refleksi yaitu retak yang menggambarkan pola retakan di bawahnya. Retak ini terjadi karena perkerasan yang…”
Get full text
Journal Article -
5
Fungi Image Segmentation using Efficient U-Net Architecture with ImageNet Pre-trained Model
Published in 2024 4th International Conference of Science and Information Technology in Smart Administration (ICSINTESA) (12-07-2024)“…In recent years, deep learning techniques have shown remarkable performance in image segmentation tasks. Deep learning with a pre-trained model has been widely…”
Get full text
Conference Proceeding -
6
Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection
Published in 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies (01-12-2010)“…The increase of malware that are exploiting the Internet daily has become a serious threat. The manual heuristic inspection of malware analysis is no longer…”
Get full text
Conference Proceeding -
7
Enhancement of low quality thick blood smear microscopic images of malaria patients using contrast and edge corrections
Published in 2016 International Conference on Knowledge Creation and Intelligent Computing (KCIC) (01-11-2016)“…Malaria becomes one of the diseases that cause many deaths in Indonesia, particularly in Eastern Indonesia. Parasite readings in many fields of thick blood…”
Get full text
Conference Proceeding -
8
Traffic Condition Information Extraction & Visualization from Social Media Twitter for Android Mobile Application
Published in Proceedings of the 2011 International Conference on Electrical Engineering and Informatics (01-07-2011)“…Traffic jam in Jakarta, Indonesia has become a crucial problem for the society. A Traffic Management Center has been built by the police, in this case Polda…”
Get full text
Conference Proceeding -
9
Automated status identification of microscopic images obtained from malaria thin blood smears
Published in Proceedings of the 2011 International Conference on Electrical Engineering and Informatics (01-07-2011)“…Development of an accurate laboratory diagnostic tool, as recommended by WHO, is the key step to overcome the serious global health burden caused by malaria…”
Get full text
Conference Proceeding -
10
Evaluation of fingerprint orientation field correction methods
Published in 2011 International Conference on Advanced Computer Science and Information Systems (01-12-2011)“…The estimation of fingerprint Orientation Field (OF) plays an important role in most fingerprint feature extraction algorithms. Many of the later stages in…”
Get full text
Conference Proceeding -
11
Recursive Text Segmentation for color images for Indonesian Automated Document Reader
Published in 2011 International Conference on Advanced Computer Science and Information Systems (01-12-2011)“…Indonesian Automated Document Reader (I-ADR) is an assistive system for Indonesian citizens with visual impairment, which converts textual information on…”
Get full text
Conference Proceeding -
12
Evaluation of text-to-speech synthesizer for Indonesian language using semantically unpredictable sentences test: IndoTTS, eSpeak, and google translate TTS
Published in 2011 International Conference on Advanced Computer Science and Information Systems (01-12-2011)“…A text-to-speech (TTS) synthesizer aims to produce speech from the corresponding text input. For Indonesian language, IndoTTS, eSpeak, and text-to-speech on…”
Get full text
Conference Proceeding -
13
Automated status identification of microscopic images obtained from malaria thin blood smears using bayes decision: A study case in plasmodium falciparum
Published in 2011 International Conference on Advanced Computer Science and Information Systems (01-12-2011)“…Diagnosing malaria, as the first step to control the spread of the infectious disease, can be significantly optimized with a Computer Aided Diagnosis system…”
Get full text
Conference Proceeding -
14
Text Classification Techniques Used to Faciliate Cyber Terrorism Investigation
Published in 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies (01-12-2010)“…Rising of computer violence, such as Distributed Denial of Service (DDoS), web vandalism, and cyber bullying are becoming more serious issues when they are…”
Get full text
Conference Proceeding -
15
Implementation of Intelligent Searching Using Self-Organizing Map for Webmining Used in Document Containing Information in Relation to Cyber Terrorism
Published in 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies (01-12-2010)“…The terrorism activities are not only in real world as development of technology, but also in cyber world. Terrorism activities in cyber world are called cyber…”
Get full text
Conference Proceeding -
16
Integrating Dynamic Analysis Using Clustering Techniques for local Malware in Indonesia
Published in 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies (01-12-2010)“…The understanding and predict threats to the security of information systems become really important in order to protect critical systems. Protection against…”
Get full text
Conference Proceeding -
17
Profiling-based mobile advertisement as a marketing strategy for GPS- based online traffic map
Published in Proceedings of the 2011 International Conference on Electrical Engineering and Informatics (01-07-2011)“…The emergence of mobile computing is inevitably followed by mobile advertising: advertising that target mobile device, such as feature phones, smartphones and…”
Get full text
Conference Proceeding -
18
Recursive text segmentation for Indonesian Automated Document Reader for people with visual impairment
Published in Proceedings of the 2011 International Conference on Electrical Engineering and Informatics (01-07-2011)“…This research is conducted to accommodate the needs of visually impaired people through an intelligent system, which reads textual information on papers and…”
Get full text
Conference Proceeding -
19
Mapping of Information and Communication Technology (ICT) Progress Using Self Organizing Map (SOM)
Published in 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies (01-12-2010)“…Information and Communication Technology (ICT) is one of the most important aspect in a country. Good progress in ICT will be a valuable factor to compete with…”
Get full text
Conference Proceeding -
20
Intelligent Searching Using Association Analysis for law Documents of Indonesian Government
Published in 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies (01-12-2010)“…Information Retrieval (IR) technology helps people to search relevant and necessary documents from massive digital database. In the context of e-law…”
Get full text
Conference Proceeding