• Tidak ada hasil yang ditemukan

Untitled - Universitas Diponegoro

N/A
N/A
Protected

Academic year: 2023

Membagikan "Untitled - Universitas Diponegoro"

Copied!
35
0
0

Teks penuh

The development of computer technology today plays an important role in the process of developing interaction in computer applications. Augmented reality is a technological model of human-computer interaction using the model of merging the real world with the virtual world. This development can certainly help people or communities in various fields, especially in the field of shooting.

Shooting is one of the many activities carried out by members of TNI, POLRI and PERBAKIN. The use of this method is to create a reliable system so that the system can perform as needed. Based on testing the functionality of the system meets the initial needs, the system works according to the scenario.

The minimum distance between the camera and the marker to be recognized is 20 cm and the maximum distance is 300 cm. Using virtual reality simulators for security and defense training programmes: a systematic review. Augmented reality technology as one of the media in therapy for children with special needs Martono, K.T. Design of learning media for fish classification with augmented reality technology.

Augmented Reality Technology Computer Graphics Technology Computer Technology Computer Applications Development Process Marker Technology in Practice Training.

Technical Program Committee

Munadi, Henry Kristianto, Mochammad Ariyanto, Ismoyo Haryanto, Hari Peni Julianti 100 Experiment of Networked Control System (NCS) Using Network Emulator

Juningtyastuti, Fransiskus Allan Gunawan

220 Phantom Volume Calculation for Computed Tomography (CT) Scanned Images Kusworo Adi, Catur Edi Widodo, Aris Sugiharto, Qidir Maulana B.S., Adi Pamungkas 224 Design and Development of an Android-Based Cloud ECG Monitoring System.

Kahlil F., Muhammad Hamdani Rizal, Muhammad Raid Mukhtar, Riri Fitri Sari

  • Ibrahim, Lela Nurpulaela

317 Deteksi rambu lalu lintas berbasis HOG dan PHOG menggunakan biner SVM dan k-NN Aris Sugiharto, Agus Harjoko. Kurniawan Teguh Martono, Cahya Setya Utama, Bambang Sulistiyanto, Merry Christiyanto 327 Modul Clustering ST-DBSCAN di SpagoBI untuk sebaran hotspot di Indonesia. 336 Penilaian Pengelolaan Teknologi Informasi untuk Mendukung Operasional Teknologi Informasi yang Excellent berdasarkan COBIT 4.1 di PT Timah Tbk.

340 Uncovering the Automation of Higher Education Quality Assurance System (QAS-HE) in Indonesia Using DevOps Approach. 351 Information Technology Trends in e-Agriculture: A Systematic Literature Review Erick Fernando, Setiawan Assegaff, Hetty Rohayani AH. 361 An Analysis of the Adoption of Instagram Technology as a Marketing Tool by Small Medium Enterprises Trianggoro Wiradinata, Bobby Iswandi.

367 Commodity Complex Using Linux/Kerrighed-Based Single System Image for High-Performance Computing. Rizal Isnanto, Rinta Kridalukmana, Kurniawan Teguh Martono 388 Information Technology Audit for Management Assessment Using COBIT and IT Security. 434 Evaluation of path loss model based on off-body and in-body communication measurements using textile antenna at 2.45 GHz.

Basari, Novi Yohanna, Ria Aprilliyani, Rian Gilang Prabowo

Summary: One clock cycle is the ideal latency for a network-on-chip (NoC) router to pass the received flash in the current cycle to its requested destination output port when there. One clock cycle is the ideal latency for a network-on-chip (NoC) router to pass the received flash to its requested destination output port in the current cycle when there is no contention with other flashes. An abandoned object detection system based on dual background segmentation 2009 Sixth IEEE International Conference on Advanced Video and Signal-Based Surveillance.

Based on testing whether the functionality of the system meets the initial needs, the system works. A clear positive P300 peak typically occurs about 300 milliseconds after stimulus onset, represented by the so-called “unusual paradigm,” in which low-probability target stimuli are intermixed with high-probability nontargets. The efficiency of gap arresters is determined by the electrical and thermal properties of the ZnO block.

This condition can lead to the risk of thermal flooding [3], resulting in extensive damage to the ZnO arresters. The peak signal-to-noise ratio (PSNR) and normalized correlation (NC) are used to evaluate the performance of the algorithm. Simulations on different images are performed to evaluate the invisibility and robustness of the proposed scheme.

The rapid development of the Internet has resulted in new challenges in protecting copyrighted digital products. In the watermarking technique, by inserting hidden information into a digital product, the extracted hidden information can be used to protect the copyright of the digital product. Motivated by the benefits of the contourlet transformation, we will focus on the image watermarking technique in the contourlet domain.

Different from the conventional methods which are based on sum-rate maximization or sum-mean-square error minimization, this paper focuses on maximizing the energy efficiency (EE) of the system. We seek the optimal beamformers that maximize the EE of the system, subject to the current limitation per user, while we guarantee the quality of service for each user in relation to the user rate. The numerical results show that the proposed method outperforms the existing methods in terms of the achievable EE.

Optimal designs of the precoding and postcoding matrices for interference channels are mathematically challenging due to the non-convexity associated with the optimization problems. Extensive studies have focused on designing the transmit beamformers to maximize the sum rate of the systems [1], [3]. The NMSE shows a very good result and is close to the result of the previous study.

Cognitive radio appears to be one of the solutions to existing spectrum limitations.

Referensi

Dokumen terkait

It is revealed that the ferroelectric domains associated with both the -plane CS order and -plane CS order align in the 180 -domain pattern with polarization parallel with domain