Description, Inclusion, Exclusion, Coding Hint, Note, Index Terms and Cross References

2021 ◽  
pp. 16-20
Author(s):  
Kees van Boven ◽  
Huib Ten Napel
Keyword(s):  
Author(s):  
Mukhil Azhagan M. S ◽  
Dhwani Mehta ◽  
Hangwei Lu ◽  
Sudarshan Agrawal ◽  
Mark Tehranipoor ◽  
...  

Abstract Globalization and complexity of the PCB supply chain has made hardware assurance a challenging task. An automated system to extract the Bill of Materials (BoM) can save time and resources during the authentication process, however, there are numerous imaging modalities and image analysis techniques that can be used to create such a system. In this paper we review different imaging modalities and their pros and cons for automatic PCB inspection. In addition, image analysis techniques commonly used for such images are reviewed in a systematic way to provide a direction for future research in this area. Index Terms—Component Detection, PCB, Authentication, Image Analysis, Machine Learning


2017 ◽  
Vol 9 (1) ◽  
pp. 30-35
Author(s):  
Sunderi Pranata ◽  
Hargyo Tri Nugroho ◽  
Hirofumi Yamaki

It is known that password itself is not enough for formidable authentication method since it has a lot of vulnerabilities. Multi factor authentication (MFA) is introduced for the next generation for good authentication to address that issue. MFA combines two or more of three principles of good security, “something you know”, “something you have”, and “something you are”. Most MFA mechanisms work as one time passwords (OTP). However, they can still be vulnerable to phishing and MiTM attack. On top of that, OTP can be hard to use as it requires user to input another password given by the device (SMS, token, authenticator). Implemented in small USB U2F device, FIDO U2F delivers easier yet stronger security on authentication process which implements public key cryptography, challenge-response protocol, and phishing and MitM protection.  Index Terms— Authentication protocol, FIDO U2F, Multi factor authentication, OTP


2016 ◽  
Vol 7 (2) ◽  
pp. 76-82
Author(s):  
Hugeng Hugeng ◽  
Edbert Hansel

We have built an application of speech recognition for Indonesian geography dictionary based on Android operating system, named GAIA. This application uses a smartphone as a device to receive input in the form of a spoken word from a user. The approach used in recognition is Hidden Markov Model which is contained in the Pocketsphinx library. The phonemes used are Indonesian phonemes’ rule. The advantage of this application is that it can be used without internet access. In the application testing, word detection is done with four conditions to determine the level of accuracy. The four conditions are near silent, near noisy, far silent, and far noisy. From the testing and analysis conducted, it can be concluded that GAIA application can be built as a speech recognition application on Android for Indonesian geography dictionary; with the results in the near silent condition accuracy of word recognition reaches an average of 52.87%, in the near noisy reaches an average of 14.5%, in the far silent condition reaches an average of 23.2%, and in the far noisy condition reaches an average of 2.8%. Index Terms—speech recognition, Indonesian geography dictionary, Hidden Markov Model, Pocketsphinx, Android.


2016 ◽  
Vol 7 (1) ◽  
pp. 12-18
Author(s):  
Joko Haryanto ◽  
Seng Hansun

This paper describes the development of decision support system application to assist students who want to enter college so that no one choose the majors incorrectly. This application uses fuzzy logic method because fuzzy logic is very flexible in data which are vague and can be represented as a linguistic variable. The purpose of this application is to assist students to choose available majors at University Multimedia Nusantara which are appropriate with his/her capabilities. This application accepts five kinds of input values i.e. Mathematics, Indonesian, English, Physics, and TIK. Received input will be processed by the calculation of the system for decision-making and the application will generate output that shows how great a match for each majors. With this application, prospective students can find out where the majors that match his/her capabilities. This application has ninety nine percentage of match result accuracy. Index Terms—fuzzy logic, decision support system, UMN, selection of major


2014 ◽  
Vol 6 (1) ◽  
pp. 33-38
Author(s):  
Aditia Rinaldi

Cryptographic hash value has long been used as a database of signatures to identify malware. The most widely used is the MD5 and/or SHA256. In addition, there are fuzzy hashing that slightly different from the traditional hash: length hash value is not fixed and hash value can be used to calculate the degree of similarity of some malware that may still be a variant. This research use ssdeep tool to calculate fuzzy hash. Database signature with fuzzy hash is smaller than SHA256 and larger than MD5. The level of accuracy for the detection of script-based malware variants is greater than the executable-based malware variants. Index Terms—file signature, fuzzy hashing, malware signature, rolling hashing, sha


2017 ◽  
Vol 9 (1) ◽  
pp. 33-36
Author(s):  
Valencia Wirawan ◽  
Yustinus Eko Soelistio

Telah banyak penelitian pada citra medis telah diadopsi oleh sebagian besar ilmuwan dan dokter yang dapat membantu dalam mendeteksi gangguan pada mata terutama katarak. Namun, umumnya penelitian tersebut menggunakan citra medis atau digital yang relatif mahal dan sulit didapatkan oleh sebagian orang, dan metode yang rentan akan translasi (pergeseran), serta perubahan ukuran gambar dan bentuk objek. Penelitian ini mengembangkan sebuah metode menggunakan model histogram untuk mengklasifikasi mata katarak dari citra digital dengan (1) format yang lebih umum seperti JPEG dan (2) lebih toleranterhadap translasi dan perubahan ukuran. Metode ini juga mampu bekerja dengan baik menggunakan citra digital dalam citra mata yang tidak tegak lurus terhadap kamera. Metode ini mencapai akurasi 79,03% dalam kondisi bebas dan 88.47% dalam kondisi mata tegak lurus terhadap kamera. Metode ini mempunyai kompleksitas yang rendah sehingga dapat digunakan pada komputer dengan spesifikasi rendah dan sistem yang membutuhkan kecepatan mendekati real-time. Index Terms—Image processing, cataract, classification, histogram


2017 ◽  
Vol 9 (1) ◽  
pp. 25-32
Author(s):  
Nandi Syukri ◽  
Eko Budi Setiawan

Business Card is the most efficient, effective and appropriate tool for every business men no matter they are owners, employees, more over marketers to provide information about their businesses. Unfortunately, it is very difficult to bring and manage business card in large numbers also to remember the face of the business card owner. A Business Card application need to be built to solve all those issues mentioned above. The Application or software must be run in media which can be accessed anywhere and anytime such as smart phone. Kuartu is as business card application run in mobile devices. Kuartu is developed using object base modeling for mobile sub system. The platform of the mobile sub system is android, as it is the most widely used platform in the world. The Kuartu application utilizing NFC and QR Code technology to support the business card information exchange and the Chatting feature for communication. Based on the experiment and test using black box methodology, it can be concluded that Kuartu application makes business card owner to communicate each other easily, business card always carried, easy to manage the cards and information of the business card owner can be easily obtained. Index Terms— Business Card, Android, Kuartu, NFC, QrCode, Chatting.


Sign in / Sign up

Export Citation Format

Share Document