Telkom Institute of Technology


Telkom Institute of Technology

Time filter
Source Type

Trisetyarso A.,Telkom Institute of Technology
2013 International Conference of Information and Communication Technology, ICoICT 2013 | Year: 2013

We present the recent works [1] on the application of Darboux transformation on one-dimensional Dirac equation related to the field of Quantum Information and Computation (QIC). The representation of physical system in one-dimensional equation and its transformation due to the Bagrov, Baldiotti, Gitman, and Shamshutdinova (BBGS)-Darboux transformation showing the possibility admitting the concept of relativity and the trade-off of concurrent condition of quantum and classical physics play into the area of QIC. The applications in cavity quantum electrodynamics and on the proposal of quantum transistor are presented. © 2013 IEEE.

Rachman Z.A.,Telkom Institute of Technology | Maharani W.,Telkom Institute of Technology | Adiwijaya,Telkom Institute of Technology
2013 International Conference of Information and Communication Technology, ICoICT 2013 | Year: 2013

Social Network like Twitter, Facebook, Plurk and Linkedin has million users that constantly evolving and has good information both explicit and implicit information that needs to be explored. Social Network Analysis is the study of social networking with an emphasis on mapping relationships, patterns of interaction between user and content information. One analysis that often be explored is centrality measures that are useful to find the important people in a community by representing in a graph. Kretschmer method is one method of measuring centrality. It is the development of the degree centrality, where the centrality measurement is to find influential people not only involves the number of degree of the user, but also involves the relation weights based on the number of interactions. Therefore, representing the weight graph is very necessary in finding the influential people. Kretschmer method is more suitable for the case of twitter. It is because the most important thing to note is the proximity of the user based on the relationship following/followed and the number of tweet interaction such as mention, retweet and reply. Deeper discussion about the analysis of Kretschmer methods and implementation techniques on twitter is the main discussion of this journal. © 2013 IEEE.

Sasongko A.,Bandung Institute of Technology | Abdurohman M.,Telkom Institute of Technology | Kuspriyanto,Bandung Institute of Technology | Sutikno S.,Bandung Institute of Technology
International Journal on Electrical Engineering and Informatics | Year: 2011

Gap between designer productivity and IC technology is a challenge for improving embedded system design methodology. Register Transfer Level (RTL) is a current design abstraction that no longer adequate as the starting abstraction level. It needs a new methodology for facing the lack of RTL. Transaction Level Modeling (TLM) is a candidate design methodology to improve designer productivity. It offers many advantages especially on process time reduction. In this paper, a new model transformation method is proposed for transforming TLM model to RTL model design incrementally. TMC (TLM-RTL Model Communicator) is used as a key component in this method. TMC communicates between TLM and RTL model. GCD (Greatest Common Divisor) processor is designed to show transformation process from TLM to RTL model. The experiment results show that model transformation method using TMC is effective for transforming TLM model to RTL model incrementally. These results show the design process improvement using this method.

Pratomo W.,Telkom Institute of Technology | Barmawi A.M.,Telkom Institute of Technology
2013 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2013 | Year: 2013

Recently, Indonesian Health Ministry has problems with interpreting health surveillance chart, because they need experts for interpreting the chart. Since it is difficult to provide experts especially in rural area, intelligent system for interpreting the health surveillance chart is necessary. This paper proposed a method to generate sentences in Indonesian language which is extracted from the chart image (e.g. health surveillance chart). The sentences is used to interpret the chart in Indonesian Language. In order to generate sentences, lexicalization based on image features data is proposed to provide some 'seed words'. These words are used by the NLG system to generate sentences. After obtaining the seed words, the lexical selection is conducted and the main topic of the paragraph is determined. Finally, the main topic was determined and furthermore the sentence in Indonesian Language is ready to be generated. There were some methods for interpreting data such as [1][2][3], but this method could not be used in Indonesian Health Ministry case because most of the chart which should be interpreted are in the form of chart image. Therefore, the proposed method uses NLG based on image extraction and pattern abstraction, such that it can be used for interpreting the chart image. © 2013 IEEE.

Munadi R.,Telkom Institute of Technology | Zaimi A.,Telkom Institute of Technology | Naning S.,Telkom Institute of Technology
Proceedings of the International MultiConference of Engineers and Computer Scientists 2010, IMECS 2010 | Year: 2010

MPLS network as IP backbone hascapacity constraint and routing mechanism constraint.Thelatest constraint, which based on Shortest Path First scheme (OSPF), results in best-shortest calculated path.This scheme produces resource with unfair consumed. Some subsets ofnetworkmay get congested while others remain free. As a consequence, the new routing management scheme is proposed using Minimum Interference Routing Algorithm (MIRA). MIRA puts higher priority on some ingress egress pair according to SLA of some traffics. This new method covers critical links in the network. The critical links identifiedin3 ways:Critical Links based on Maxflow, Critical Links based on Threshold, and the EnhancementofCritical Links based on Threshold. From the simulation results, it isshownthatthe performance of new method could be minimized congestion, reducing demand loss about 124.79Mbpsand increasing some parameters of the network performance such as throughput, packet received and delay.

Yulita I.N.,Telkom Institute of Technology | The H.L.,Telkom Institute of Technology | Adiwijaya,Telkom Institute of Technology
Journal of Advanced Computational Intelligence and Intelligent Informatics | Year: 2012

Indonesia has many tribes, so that there are many dialects. Speech classification is difficult if the database uses speech signals from various people who have different characteristics because of gender and dialect. The different characteristics will influence frequency intonation, amplitude, and period of the speech. It makes the system must be trained for the various templates reference of speech signal. Therefore, this study has been developed for Indonesian speech classification. The solution is a new combination of fuzzy on hidden Markov models. The result shows a new version of fuzzy hiddenMarkovmodels is better than hidden Markov model.

Ciptasari R.W.,Kyushu University | Ciptasari R.W.,Telkom Institute of Technology | Rhee K.H.,Pukyong National University | Sakurai K.,Kyushu University
Digital Investigation | Year: 2013

At the moment, image forgery in the mainstream media has become common. The degree of manipulation is facilitated by image editing software. Hence, there are many outstanding images which have no provenance information or certainty of authenticity. Therefore, constructing a scientific and automatic way for evaluating image authenticity is an important task. In spite of having outstanding performance, all the image forensics schemes developed so far have not provided verifiable information about source of tampering. This paper aims to propose a different kind of scheme, by exploiting a group of similar images, to verify the source of tampering. We begin with slightly modifying Robert's detector to enhance the detection results. The usage of membership function used to classify the suspicious region from the authentic one is introduced as well. Inspired by the image registration concept, we exploit the correlation-based alignment method to automatically identify the spliced region in any fragment of the reference images. Although the scheme is applicable under particular conditions, the efficacy of the proposed scheme on revealing the source of spliced regions is considerable. We anticipate this scheme to be the first concrete technique toward appropriate tools which are necessary for exposing digital image forgeries. © 2013 Elsevier Ltd. All rights reserved.

Loading Telkom Institute of Technology collaborators
Loading Telkom Institute of Technology collaborators