Due to the rapid growth in the amount of biological data, data mining techniques have become common and efficient tools in extracting and analyzing valuable information within those data. Biologica…
As the Ancient Javanese Manuscript grows old, the risk of the document disappearingrnbecomes greater and greater. Digitalization of these invaluable documents isrninevitable. Once the documents are…
The rising of computer violence, such as Distributed Denial of Service (DDoS), web vandalism, and cyber bullying become more serious issues when they are politically motivated and intentionally con…
The terrorism activities are not only in real world as development of technology,rnbut also in cyber world. Terrorism activities in cyber world are called cyber terrorism.rnOne of methodology for c…
Visual impairment is a vision loss is caused by trauma, disease, and congenital or degenerative conditions. This disability condition makes visual impairment people difficult or even could not unde…
The estimation of ?ngerprint Orientation Field (OF) plays an important role in most ?ngerprint feature extraction algorithms. Many of the later stages in ?ngerprint feature extraction process (e.g.…
Traffic jam in Jakarta has become a crucial problem for society. A TrafficrnManagement Center has been built by Polda Metro Jaya, police unit in Jakarta, to helprnpeople to get the latest informati…
In developing countries such as Indonesia, textual information is carried mostly byrnpaper medium. Such information, however, is not available to citizens with visualrnimpairment. To assist them, A…
Development of an accurate laboratory diagnostic tool, as recommended by WHO, isrnthe key step to overcome the serious global health burden caused by malaria. Thisrnstudy aims to explore the possib…
Increasing threats in security has led identification technology to the era of biometrics identification. With identification in forms of physical traits that are distinctive to each individual, bi…