Zobrazeno 1 - 10
of 58
pro vyhledávání: '"Achmad Imam Kistijantoro"'
Publikováno v:
IEEE Access, Vol 11, Pp 65787-65797 (2023)
Open-set face recognition on a small dataset with limited image samples per individual poses a significant challenge and is a topic of active research. Therefore, this study investigated the problems of open-set face verification and face identificat
Externí odkaz:
https://doaj.org/article/d30595d01493447a8e99ce6ec0bba567
Publikováno v:
Informatics, Vol 10, Iss 2, p 51 (2023)
In computer vision, ethnicity classification tasks utilize images containing human faces to extract ethnicity labels. Ethnicity is one of the soft biometric feature categories useful in data analysis for commercial, public, and health sectors. Ethnic
Externí odkaz:
https://doaj.org/article/ecd5a51f4a7e4bba9cd91c9d9c2160ed
Autor:
Mulya Agung, Achmad Imam Kistijantoro
Publikováno v:
Journal of ICT Research and Applications, Vol 10, Iss 2 (2016)
A call detail record (CDR) is a data record produced by telecommunication equipment consisting of call detail transaction logs. It contains valuable information for many purposes in several domains, such as billing, fraud detection and analytical pur
Externí odkaz:
https://doaj.org/article/ca0f9e10e77e4d069425eb53d0a5d45a
Autor:
Huaicheng Li, Martin L. Putra, Ronald Shi, Fadhil I. Kurnia, Xing Lin, Jaeyoung Do, Achmad Imam Kistijantoro, Gregory R. Ganger, Haryadi S. Gunawi
Publikováno v:
ACM Transactions on Storage. 19:1-33
Predictable latency on flash storage is a long-pursuit goal, yet unpredictability stays due to the unavoidable disturbance from many well-known SSD internal activities. To combat this issue, the recent NVMe IO Determinism (IOD) interface advocates ho
Publikováno v:
2022 9th International Conference on Advanced Informatics: Concepts, Theory and Applications (ICAICTA).
Publikováno v:
2022 9th International Conference on Advanced Informatics: Concepts, Theory and Applications (ICAICTA).
Publikováno v:
2022 9th International Conference on Advanced Informatics: Concepts, Theory and Applications (ICAICTA).
Autor:
Edi Abdurachman, Achmad Imam Kistijantoro, Antoine Doucet, Priati Assiroj, Harco Leslie Hendric Spits Warnars
The fingerprint is one kind of biometric. This biometric unique data have to be processed well and secure. The problem gets more complicated as data grows. This work is conducted to process image fingerprint data with a memetic algorithm, a simple an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::309050f8169946be3ece6a6b0649e92a
https://zenodo.org/record/5234436
https://zenodo.org/record/5234436
Autor:
Dina Shona Laila, Agung Harsoyo, Bambang Riyanto Trilaksono, Muhammad Riyansyah, Seno Adi Putra, Achmad Imam Kistijantoro
Publikováno v:
IEEE Internet of Things Journal. 6:5397-5410
This paper proposes the development of an autonomous system for dynamic response-based bridge condition assessment using wireless sensor network (WSN). The assessment identifies the bridge’s fundamental frequency and uses the information to determi
Autor:
Delian hendardi, Edi Abdurrachman, Achmad Imam Kistijantoro, Harco Leslie Hendric Spits Warnars, Antoine Doucet, Priati Assiroj, William Felix Josephen
Publikováno v:
Communications in Mathematical Biology and Neuroscience.
Swarm Intelligence is the meta-heuristic algorithm that is inspired by the natural behavior of some groups of animals (like dragonfly, ants, ducks, etc.) striving for their life existence. One of them is Dragonfly Algorithm. Dragonfly Algorithm has b