default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 39 matches
- 2016
- Mohd Azwan Abbas, Halim Setan, Zulkepli Majid, Albert K. Chong, Khairulnizam M. Idris, Mohd Farid Mohd Ariff, Anuar Aspuri, Lau Chong Luh, Abd. Manan Samad:
Data quality assurance for hybrid and panoramic scanners via self-calibration. ICSET 2016: 77-82 - Ramli Adnan, Abd. Manan Samad, Fazlina Ahmat Ruslan:
A 3-hours river water level flood prediction model using NNARX with improves modelling strategy. ICSET 2016: 23-27 - Dian Anggraini, Wisnu Siswantoko, Diotra Henriyan, Devie Pratama Subiyanti, Mochamad Vicky Ghani Aziz, Ary Setijadi Prihatmanto:
Design and implementation of system prediction and traffic conditions visualization in two dimensional map (Case study: Bandung city). ICSET 2016: 87-91 - Annisa Istiqomah Arrahmah, Yudi Satria Gondokaryono, Kyung-Hyune Rhee:
Fast non-random chaff point generator for fuzzy vault biometric cryptosystems. ICSET 2016: 199-204 - A. Ihsan Auditia, Pranoto Hidaya Rusmin:
Structure health monitoring using fourier transform and neural network. ICSET 2016: 160-162 - Aditya Candra, Yusuf Kurniawan, Kyung-Hyune Rhee:
Security analysis testing for secure instant messaging in Android with study case: Telegram. ICSET 2016: 92-96 - Jonathan Chandra, Ary Setijadi Prihatmanto:
Stereo visual odometry system design on humanoid robot Nao. ICSET 2016: 34-38 - Amri Danades, Devie Pratama Subiyanti, Dian Anggraini, Diny Anggriani:
Comparison of accuracy level K-Nearest Neighbor algorithm and support vector machine algorithm in classification water quality status. ICSET 2016: 137-141 - Hilmi Fadli, Egi Hidayat, Carmadi Machbub:
Design and implementation of walking pattern and trajectory compensator of NAO humanoid robot. ICSET 2016: 184-188 - Maria Shusanti Febrianti, Egi Hidayat, Aciek Ida Wuryandari, Ary Setijadi Prihatmanto, Carmadi Machbub:
Preliminary result on gesture recognition of Sigeh Penguten Dance using Hidden Markov Model. ICSET 2016: 169-172 - Febrian Hadiatna, Hilwadi Hindersah, Desta Yolanda, Muhammad Agus Triawan:
Design and implementation of data logger using lossless data compression method for Internet of Things. ICSET 2016: 105-108 - Devi Handaya, Hanif Fakhruroja, Egi Muhammad Idris Hidayat, Carmadi Machbub:
Comparison of Indonesian speaker recognition using vector quantization and Hidden Markov Model for unclear pronunciation problem. ICSET 2016: 39-45 - Zaky Hassani, Aciek Ida Wuryandari:
Music generator with Markov Chain: A case study with Beatme Touchdown. ICSET 2016: 179-183 - Diotra Henriyan, Devie Pratama Subiyanti, Rizki Fauzian, Dian Anggraini, Mochamad Vicky Ghani Aziz, Ary Setijadi Prihatmanto:
Design and implementation of web based real time chat interfacing server. ICSET 2016: 83-87 - Yusnira Husaini, Arnan Mitchell, Gary Rosengarten, Juliana Johari:
Manifold design for uniform fluid distribution in parallel microchannels. ICSET 2016: 57-60 - Emi Iryanti, Ridwan Pandiya:
Evaluating the quality of e-learning using consistent fuzzy preference relations method. ICSET 2016: 61-66 - Didit Andri Jatmiko, Ary Setijadi Prihatmanto:
Traffic signs text recognition and error correction. ICSET 2016: 123-127 - Hendri Karisma, Dwi Hendratmo Widyantoro:
Comparison study of neural network and deep neural network on repricing GAP prediction in Indonesian conventional public bank. ICSET 2016: 116-122 - Wan Mohd Nazmin Wan Mahmud, Ruhani Ab Rahman, Murizah Kassim, Mat Ikram Yusof:
Performance comparison analysis of E2E Dual-Stack IP protocol method over wired and Wi-Fi broadband access. ICSET 2016: 7-12 - Marzuki, Egi Muhammad Idris Hidayat, Rinaldi Munir, P. Ary Setijadi, Carmadi Machbub:
Scenes categorization based on appears objects probability. ICSET 2016: 132-136 - Fadhil Mochammad, Aditya Rachman Putra, Bambang Riyanto Trilaksono:
Implementation of hazardous chemical gas monitoring system using unmanned aerial vehicle (UAV). ICSET 2016: 163-168 - S. P. L. Aditya Pramanta, Ary Setijadi Prihatmanto, Man-Gon Park:
A study on the stress identification using observed heart beat data. ICSET 2016: 149-152 - Hanif F. Prasetyo, Arief Syaichu-Rohman, Farkhad Ihsan-Hariadi, Hilwadi Hindersah:
Controls of BLDC motors in electric vehicle testing simulator. ICSET 2016: 173-178 - Ariana Tulus Purnomo, Yudi Satria Gondokaryono, Chang-Soo Kim:
Mutual authentication in securing mobile payment system using encrypted QR code based on public key infrastructure. ICSET 2016: 194-198 - Aditya Rachman Putra, Fadhil Mochammad, Hans Herdian:
FPGA implementation of template matching using binary sum of absolute difference. ICSET 2016: 13-17 - Gilang Ramadhan, Yusuf Kurniawan, Chang-Soo Kim:
Design of TCP SYN Flood DDoS attack detection using artificial immune systems. ICSET 2016: 72-76 - Fazlina Ahmat Ruslan, Abd. Manan Samad, Ramli Adnan:
River water level prediction modelling for flood monitoring using NNARX. ICSET 2016: 18-22 - Fazlina Ahmat Ruslan, Abd. Manan Samad, Ramli Adnan:
3 Hours flood water level prediction using NNARX structure: Case study Kuala Lumpur. ICSET 2016: 53-56 - Bima Sahbani, Widyawardana Adiprawita:
Kalman filter and iterative-hungarian algorithm implementation for low complexity point tracking as part of fast multiple object tracking system. ICSET 2016: 109-115 - Yoga S. Satriawan, Carmadi Machbub, Egi Muhammad Idris Hidayat:
Comparison of prediction methods for moving objects in 3D coordinates using Kalman Filter and least square. ICSET 2016: 128-131
skipping 9 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-07 03:48 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint