Alamat repositori/web: https://www.icitacee.undip.ac.id/index.php/icitace e/2016. https://www.scimagojr.com/journalsearch.php?q amp;tip=sid&clean=0 Kategori publikasi artikel: √ Prosiding Forum Ilmiah Internasional. Referensi terkini, data dan informasi yang masih baru pada saat dipublikasikan, serta metode standar yang dapat ditiru oleh para profesional di bidangnya. Artikel ditulis lengkap mulai dari judul, abstrak, pengantar literatur dan sebagian sesuai usulan penerbit online IEEE.
Welcome all participants and keynote speakers to the International Conference on Information Technology, Computer and Electrical Engineering (ICITACEE 2016) in Semarang. This is the third international conference jointly held by the Department of Electrical Engineering and the Department of Computer Engineering of the Faculty of Engineering, Universitas Diponegoro. I would like to acknowledge the outstanding work in this conference as a collaborative effort between the Department of Electrical Engineering, Department of Computer Engineering, IEEE Student Branch of Universitas Diponegoro and IEEE Indonesia Section.
I would like to express my deep appreciation to organizing committee members, staff and students of Electrical Engineering and Computer Engineering Department for their efforts and support. I would like to express our appreciation to Rector of Universitas Diponegoro and Dean of Faculty of Engineering. I hope that this conference will be a prestigious forum to communicate and share the findings and valuable research among experts in the field of computer engineering, information technology and electrical engineering.
We are very happy that this event will contribute to the global development of computing, information technology and electrical engineering.
A%'#&
6' '&*
2*2 '&'
37 Robot ARM controlled by muscle tension based on electromyography and PIC18F4550 Ricky Fajar Adiputra, Florentinus Budi Setiawan. 47 New Watershed Segmentation Algorithm Based on Hybrid Gradient and Self-Adaptive Marker Extraction Yuan Li, Yu Qingsong, Shen Chaomin, Hu Wenxin. 164 Investigation of the influence of variations in the number and width of anti-notches depending on tooth rotation reduction.
253 Beef Quality Detection Using Mobile Based K-Means Clustering Method Oky Dwi Nurhayati, Kusworo Adi, Sri Pujiyanto. 278 Benefits of Web 2.0 Technologies in Higher Education: Students' Perspectives Yohana Dewi Lulu Widyasari, Lukito Edi Nugroho, Adhistya Erna Permanasari 283 A New Image Stamping Scheme Using Contour Transforms. 317 Traffic Sign Detection Based on HOG and PHOG Using Binary SVM and k-NN Aris Sugiharto, Agus Harjoko.
336 Evaluation of IT governance to support IT operations Excellent Based on COBIT 4.1 at PT Timah Tbk. 367 Commodity Cluster using single system image based on Linux/Kerrighed for high performance computing. 434 Path Loss Model Estimation based on measurements of off-body and on-body communication using textile antenna at 2.45 GHz.
The calculation of volume changes in cancer treatment processes is very important for knowing the success of the therapy. The mechanism of NBP was very different from intra-cloud (IC) and cloud-to-ground (CG) flashes. We also found that the AM values of rise time, full width at peak time, zero crossing time, overshoot time, pulse duration, and ratio of overshoot to peak PNBP amplitude were 1.64 μs, 1.32 μs, 9, 38 μβ, 15.06 μs and 0.31 μs, respectively.
The characteristics of the PNBPs were statistically analyzed based on electric field change as presented in this paper. The peak signal-to-noise ratio (PSNR) and normalized correlation (NC) are used to evaluate the performance of the algorithm. Simulations on different images are performed to evaluate the invisibility and robustness of the proposed scheme.
The rapid development of the Internet has led to new challenges in the protection of copyrighted digital products. In watermarking technique, by inserting hidden information into a digital product, the extracted hidden information can be used to protect the copyright ownership of the digital product.
IJJ IJJ I
Diponegoro University Semarang, Indonesia [email protected] Abstract— CT scan is a radiological examination that uses X-. This method only processes the CT scan output image, not embedded in CT-Scan system. CT scanning is a diagnostic imaging modality that uses the tomographic principle to produce images of body parts in axial, sagittal, coronal or 3D format [1].
The method can be applied in CT scan image, but this method required modification to work well on a CT scan image. CT scan is a radiological examination that uses X-ray to produce cross-sectional images of an object. The composition and density of the tissues are decisive in determining the X-ray radiation value absorbed by those tissues [11].
Image processing is done through the process of converting grayscale images into binary images. One of the grayscale images of the samples and its binary image are shown in Figure 3. Figure 3(a) shows the grayscale image of a phantom assumed to be a homogeneous form of cancer.
Then, the grayscale image is converted to a binary image so that it will be visible borders of the cancer as in Figure 3 (b). The results of a binary image in Figure 3 (b) will be used to calculate the slice area of the phantom. a) Grayscale image (b) Binary image Figure 3. Calculation results of phantom volume show that the developed method is able to calculate phantom volume.
Errors resulting from incorrect calculations of the area, slice thickness, and slice distance of the phantom image. This method uses a thresholding operation and trapezoidal integration for each image slice of the phantom. Compared with the calculation of the phantom volume using the manual method, this developed method has an error value of only 3.63%.