ORCID Profile
0000-0003-2534-809X
Current Organisation
Sampoerna University
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: American Scientific Publishers
Date: 30-04-2012
Publisher: IEEE
Date: 04-2011
Publisher: IEEE
Date: 09-2013
Publisher: IEEE
Date: 04-2011
Publisher: IGI Global
Date: 2011
DOI: 10.4018/978-1-60960-042-6.CH035
Abstract: In smart environment, making a location-aware personal computing working accurately is a way of getting close to the pervasive computing vision. The best candidate to determine a user location in indoor environment is by using IEEE 802.11 (Wi-Fi) signals, since it is more and more widely available and installed on most mobile devices used by users. Unfortunately, the signal strength, signals quality and noise of Wi-Fi, in worst scenario, it fluctuates up to 33% because of the reflection, refraction, temperature, humidity, the dynamic environment, etc. We present our current development on a light-weight algorithm, which is easy, simple but robust in producing the determination of user location using WiFi signals. The algorithm is based on “multiple observers” on ?k-Nearest Neighbour. We extend our approach in the estimation indoor-user location by using combination of different technologies, i.e. WiFi, GPS, GSM and Accelerometer. The algorithm is based on opportunistic localization algorithm and fuse different sensor data in order to be able to use the data which is available at the user position and processable in a mobile device.
Publisher: International Association of Online Engineering (IAOE)
Date: 26-06-2015
Abstract: The use of Information Communication Technology (ICT) in the classroom activities has become more famous to the teachers over the last decade. Many great deals of studies have proven the benefits of using ICT in the classroom. Unfortunately, there are evidences that the ICT reform efforts have failed due to teacher’s beliefs, skills and attitudes were never taken into consideration. The evidences found that most research only concern on students’ behalftowards ICT. Departing from that, this study tries to investigate the teachers’ perspectives and practices toward the use of ICT in their classroom activities. A survey was conducted to collect the data of the research. Using a revised expectancy-value theory called the Technology Implementation Questionnaire (TIQ), a questionnaire was administered among 20 elementary teachers. The findings revealed that there are still teachers who have more than 10 years experiences in teaching but they never got any formal training on using ICT. The lack of proficiency in ICT such as in using software, lack of technical support from the school also make them feel stressed out even though they have positive perspectives in applying ICT in their classroom activities.
Publisher: IEEE
Date: 05-2012
Publisher: IGI Global
Date: 2011
DOI: 10.4018/978-1-60960-042-6.CH036
Abstract: Context-aware computing is a class of mobile computing that can sense its physical environment and adapt its behavior accordingly it is a component of the ubiquitous or pervasive computing environment that has become apparent with innovations and challenges. This chapter reviews the concept of context-aware computing, with focus on the user activities that benefit from context history. How user activities in the smart environment can make use of context histories in applications that apply the concept of context prediction integrated with user pro-activity is explored. A brief summary of areas which benefit from these technologies as well as corresponding issues are also investigated.
Publisher: IEEE
Date: 11-2011
Publisher: IEEE
Date: 12-2010
Publisher: IEEE
Date: 10-2010
Publisher: IEEE
Date: 2005
Publisher: IEEE
Date: 10-2010
Publisher: IEEE
Date: 04-2011
Publisher: IEEE
Date: 06-2010
Publisher: Institute of Advanced Engineering and Science
Date: 08-2020
DOI: 10.11591/IJEECS.V19.I2.PP1000-1009
Abstract: span Every language has unique characteristics, structures, and grammar. Thus, different styles will have different processes and result in processed in Natural Language Processing (NLP) research area. In the current NLP research area, Data Mining (DM) or Machine Learning (ML) technique is popular, especially for Deep Learning (DL) method. This research aims to classify text data in the Indonesian language using Convolutional Neural Network (CNN) as one of the DL algorithms. The CNN algorithm used modified following the Indonesian language characteristics. Thereby, in the text pre-processing phase, stopword removal and stemming are particularly suitable for the Indonesian language. The experiment conducted using 472 Indonesian News text data from various sources with four categories: ‘hiburan’ (entertainment), ‘olahraga’ (sport), ‘tajuk utama’ (headline news), and ‘teknologi’ (technology). Based on the experiment and evaluation using 377 training data and 95 testing data, producing five models with ten epoch for each model, CNN has the best percentage of accuracy around 90,74% and loss value around 29,05% for 300 hidden layers in classifying the Indonesian News data. /span
Publisher: IEEE
Date: 05-2012
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: IEEE
Date: 12-2014
Publisher: IEEE
Date: 12-2014
Publisher: IGI Global
Date: 07-2013
Abstract: Pathway analysis provided by current 3D maps in mobile devices that are intended for an interactive navigation aid, is simulated for what-if experiments against task and functional analysis, based on the problems faced from both technical and user-practices views. The aim of a navigation aid, in general, is to provide an optimal route from the current position to the destination. Unfortunately, the problem of most mobile device’s GPS signal accuracy and the display of pathways on 3D maps in the small screen of mobile devices affects the pathway architectural design from generating accurate initial positions to destinations. This paper presents both conceptual and experimental analysis of pathway determination designed for 3D maps in mobile devices for an interactive navigation aid, which is going to be added to an existing in idual cognitive map. The analytical outcomes are aimed at providing how environmental conditions come to be detected and how problems are resolved in helping people to navigate in unfamiliar locations by having positions and paths corrected to a reasonable degree of accuracy in order to overcome the problems of generating in-accurate locations and the weaknesses of conventional 2D maps, which requires users to interpret its various symbols and legends. Bent functions and fuzzy logic type 2 are used for simulating signal deviations from the precise values and Voronoi diagram/Delaunay triangulation are used for establishing experimental paths and locations. Finally, this technique will contribute to a well-defined positioning and pathway establishment of 3D maps in mobile devices for navigation aid.
Publisher: Universitas Ahmad Dahlan
Date: 12-2012
Publisher: Institute of Advanced Engineering and Science
Date: 05-2020
DOI: 10.11591/IJEECS.V18.I2.PP1004-1014
Abstract: Hadith is the second source of Islamic law after Qur’an which make many types and references of hadith need to be studied. However, there are not many Muslims know about it and many even have difficulties in studying hadiths. This study aims to build a hadith search engine from reliable source by utilizing Information Retrieval techniques. The structured representation of the text that used is Bag of Word (1-term) with the Weighted Inverse Document Frequency (WIDF) method to calculate the frequency of occurrence of each term before being converted in vector form with the Vector Space Model (VSM). Based on the experiment results using 380 texts of hadith, the recall value of WIDF and VSM is 96%, while precision value is just around 35.46%. This is because the structured representation for text that used is bag of words (1-gram) that can not maintain the meaning of text well).
Publisher: IEEE
Date: 11-2010
Publisher: IEEE
Date: 06-2010
Publisher: IEEE
Date: 03-2012
Publisher: Emerald
Date: 28-06-2011
DOI: 10.1108/17427371111146446
Abstract: Prediction accuracies are usually affected by the techniques and devices used as well as the algorithms applied. This work aims to attempt to further devise a better positioning accuracy based on location fingerprinting taking advantage of two important mobile fingerprints, namely signal strength (SS) and signal quality (SQ) and subsequently building a model based on extreme learning machine (ELM), a new learning algorithm for single‐hidden‐layer neural networks. Prediction approach to location determination based on historical data has attracted a lot of attention in recent studies, the reason being that it offers the convenience of using previously accumulated location data to subsequently determine locations using predictive algorithms. There have been various approaches to location positioning to further improve mobile user location determination accuracy. This work examines the location determination techniques by attempting to determine the location of mobile users by taking advantage of SS and SQ history data and modeling the locations using the ELM algorithm. The empirical results show that the proposed model based on the ELM algorithm noticeably outperforms k‐Nearest Neighbor approaches. WiFi's SS contributes more in accuracy to the prediction of user location than WiFi's SQ. Moreover, the new framework based on ELM has been compared with the k‐Nearest Neighbor and the results have shown that the proposed model based on the extreme learning algorithm outperforms the k‐Nearest Neighbor approach. A new computational intelligence modeling scheme, based on the ELM has been investigated, developed and implemented, as an efficient and more accurate predictive solution for determining position of mobile users based on location fingerprint data (SS and SQ).
Publisher: IEEE
Date: 09-2012
Publisher: IEEE
Date: 05-2012
Publisher: ACM
Date: 05-12-2011
Publisher: IEEE
Date: 10-2009
Publisher: IEEE
Date: 12-2013
Publisher: IGI Global
Date: 2013
Abstract: Internet Protocol version 6 (IPv6) is created to occupy the insufficient current Internet addresses. Consequently this significant contribution offers huge number of Internet addresses. Besides, the security also has been improved to challenge today threats in competent on IPv6 network. As alternative, an automatic tunneling was introduced along with other transition mechanisms to ensure smooth implementation on existing network. However, it’s believed that the implementation of automatic tunneling has altered the form of the IPv4 threats. Then the gained information from this mechanism is exploited to attempt the target network. As a concern, this paper thoroughly describes on potential of reconnaissance attack reach through automatic tunneling named 6to4 Tunneling. The preference development tools and networking defense mechanism suite, is setup to conduct proposed attack method under 6to4 tunnel testbed environment. As a result, the attacking method is feasible to attempt and 6to4 tunnel showed their influence on the achievement of DoS attack in current internet.
Publisher: IGI Global
Date: 04-2012
Abstract: Hajj is a huge congregation of Muslims from all over the world which happens annually in Makkah, Kingdom of Saudi Arabia (KSA). It is one of the pillars of Islam and every able Muslim must perform this act at least once in their lifetime. Many challenges are faced by the organizers as well as the pilgrims during this massive religious gathering. Cases of missing Hajj pilgrims are not uncommon and although several tracking and navigation devices have been introduced, there is still a need for a better solution in overcoming the issue. There are several factors that prevent widespread use of the system, such as the operational costs, availability of the connections and the use in uncommon platform. This paper proposes a framework for tracking Hajj pilgrims in a crowded pervasive environment using a system called HajjLocator. A discussion on the prototype of HajjLocator, as a system to track and monitor pilgrims while performing Hajj and to save lives, with an SOS mechanism, is also presented in this paper.
Publisher: IEEE
Date: 03-2013
Publisher: ACM
Date: 05-12-2011
Publisher: IEEE
Date: 09-2012
Publisher: IEEE
Date: 12-2014
Publisher: IEEE
Date: 11-2014
Publisher: IGI Global
Date: 10-2011
Abstract: The widespread of Internet usage has resulted in a greater number and variety of applications involving different types of private information. In order to diminish privacy concerns and strengthen user trust, security improvements in terms of authentication are necessary. The solutions need to be convenient, entailing ease of use and higher mobility. The suggested approach is to make use of the already popular mobile phone and to involve the mobile network, benefiting from Subscriber Identity Module (SIM) card’s t er resistance to become trusted entities guarding personal information and identifying users. Mobile phone’s SIM card is convenient for safely storing security parameters essential for secured communication. It becomes secure entity compulsory for getting access to privacy sensitive Internet applications, like those involving money transfers. Utilizing the NFC interface passes the personal user keys only when needed, giving additional strength to the traditional public key cryptography approach in terms of security and portability.
Publisher: IGI Global
Date: 10-2013
DOI: 10.4018/IJMCMC.2013100105
Abstract: Face recognition has been used in various applications where personal identification is required. Other methods of person's identification and verification such as iris scan and finger print scan require high quality and costly equipment. The objective of this research is to present an extended principal component analysis model to recognize a person by comparing the characteristics of the face to those of new in iduals for different dimension of face image. The main focus of this research is on frontal two dimensional images that are taken in a controlled environment i.e. the illumination and the background is constant. This research requires a normal camera giving a 2-D frontal image of the person that will be used for the process of the human face recognition. An Extended Principal Component Analysis (EPCA) technique has been used in the proposed model of face recognition. Based on the experimental results it is expected that proposed the EPCA performs well for different face images when a huge number of training images increases computation complexity in the database.
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: IEEE
Date: 04-2011
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: IEEE
Date: 12-2010
Publisher: Elsevier BV
Date: 2012
Publisher: IEEE
Date: 11-2011
Publisher: International Association of Online Engineering (IAOE)
Date: 25-01-2015
Abstract: In this paper, popular routing protocols for Wireless Sensor Networks (WSNs) are studied. There are many issues and challenges that effect routing of data. First, high energy is consumed which reduces network lifetime. Second, security of routing path is another issue due to development in the cryptanalysis against nodes. The aim of this paper is to propose an energy aware routing approach that considers energy level for sensors during cluster heads and routing path selections. Performance, network efficiency and maximizing network lifetime are measured by simulation, analysis and comparison with other well-known mechanisms.
Publisher: ACM Press
Date: 2012
Publisher: IEEE
Date: 04-2014
Publisher: ACM
Date: 14-12-2009
Publisher: IEEE
Date: 03-2011
Publisher: IEEE
Date: 10-2009
Publisher: IEEE
Date: 12-2014
Publisher: IGI Global
Date: 07-2012
Abstract: Robot soccer is a challenging platform for multi-agent research, involving topics such as real-time image processing and control. A team of robots must work together to put the ball in the opponent’s goal while at the same time defending their own goal. A good strategy for the robot defenders can determine who wins the robotic soccer game. Therefore, the goal of this study is to propose a strategy for the defenders using a production rule based on state diagrams. The rule can facilitate easy and rapid comprehension of certain behaviors with respect to two indicators, such as condition and action. The authors determine five key aspects as conditions, including the positions of two defender robots, the position of the goalkeeper and the ball, and coordination between two defender robots and the goalkeeper robot. Each robot has been set its own defence area and specific actions. They conducted three experiments namely simulator testing, real time testing, and ping pong testing to evaluate their proposed defence strategy. The experimental results show that the authors’ proposed strategy versus three state of the art strategies can defeat up to 92% of all types of attack modes. Meanwhile, in the ping pong testing, their proposed strategy can still protect any goal entering from different attacking modes even though only one or two robots are active in the defence area.
Publisher: IGI Global
Date: 07-2012
Abstract: For the different types of license plates being used, the requirement of an automatic license plate recognition system is different for each country. In this paper, an automatic license plate detection system is proposed for Malaysian vehicles with standard license plates based on image processing and clustering. Detecting the location of license plate is a vital issue when dealing with uncontrolled environments and illumination difficulty. Therefore, a proposed algorithm called Cluster Run Length Smoothing Algorithm (CRLSA) was applied to locate the license plates at the right position. CRLSA consisted of two separate proposed algorithms which applied run length edge detector algorithm using kernel masks and 128 grayscale offset plus a three-dimensional way to calculate run length smoothing algorithm, which can improve clustering techniques in segmentation phase. Six separate experiments were performed Morphology, CRLSA, Clustering, Square/Contour Detection, Hough, and Radon Transform. From those experiments, analysis based on segmentation errors was constructed. The prototyped system has accuracy more than 96%.
Publisher: ACM
Date: 14-12-2009
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: IEEE
Date: 03-2013
Publisher: IEEE
Date: 12-2010
Publisher: Wiley
Date: 11-10-2013
Publisher: IEEE
Date: 12-2010
Publisher: IGI Global
Date: 2019
DOI: 10.4018/978-1-5225-5693-0.CH010
Abstract: 3D maps have become an essential tool for navigation aid. The aim of a navigation aid is to provide an optimal route from the current position to the destination. Unfortunately, most mobile devices' GPS signal accuracy and the display of pathways on 3D maps in the small screen of mobile devices affects the pathway architectural from generating accurate initial positions to destinations. This chapter proposed a technique for visualizing pathway on 3D maps for an interactive user navigation aid in mobile devices. This technique provides visualization of 3D maps in virtual 3D workspace environments which assists a user to navigate to a target location. The Bi-A* path-finding algorithm was used for establishing dynamic target location in Voronoi diagram/Delaunay triangulation. This approach could navigate more than two users in a 3D walk-space and at the same time showing their whereabouts on 3D projections mapped. The map shows the users' location in the scene to navigate from source to the target and the target also moves to the source to meet on the same physical location and image plane.
Publisher: IEEE
Date: 09-2011
Publisher: IEEE
Date: 12-2010
Publisher: IEEE
Date: 09-2011
Publisher: Wiley
Date: 30-01-2012
DOI: 10.1111/J.1438-8677.2011.00545.X
Abstract: The non-invasive leaf patch cl pressure (LPCP) probe measures the attenuated pressure of a leaf patch, P(p) , in response to an externally applied magnetic force. P(p) is inversely coupled with leaf turgor pressure, P(c) , i.e. at high P(c) values the P(p) values are small and at low P(c) values the P(p) values are high. This relationship between P(c) and P(p) could also be verified for 2-m tall olive trees under laboratory conditions using the cell turgor pressure probe. When the laboratory plants were subjected to severe water stress (P(c) dropped below ca. 50 kPa), P(p) curves show reverse diurnal changes, i.e. during the light regime (high transpiration) a minimum P(p) value, and during darkness a peak P(p) value is recorded. This reversal of the P(p) curves was completely reversible. Upon watering, the original diurnal P(p) changes were re-established within 2-3 days. Olive trees in the field showed a similar turnover of the shape of the P(p) curves upon drought, despite pronounced fluctuations in microclimate. The reversal of the P(p) curves is most likely due to accumulation of air in the leaves. This assumption was supported with cross-sections through leaves subjected to prolonged drought. In contrast to well-watered leaves, microscopic inspection of leaves exhibiting inverse diurnal P(p) curves revealed large air-filled areas in parenchyma tissue. Significantly larger amounts of air could also be extracted from water-stressed leaves than from well-watered leaves using the cell turgor pressure probe. Furthermore, theoretical analysis of the experimental P(p) curves shows that the propagation of pressure through the nearly turgorless leaf must be exclusively dictated by air. Equations are derived that provide valuable information about the water status of olive leaves close to zero P(c) .
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: ACM
Date: 14-12-2009
Publisher: ACM
Date: 14-12-2009
Publisher: IEEE
Date: 08-2012
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: IEEE
Date: 10-2009
No related grants have been discovered for Teddy Mantoro.