PROSIDING Judul Karya Ilmiah : Calculation of Phantom
-
Upload
khangminh22 -
Category
Documents
-
view
4 -
download
0
Transcript of PROSIDING Judul Karya Ilmiah : Calculation of Phantom
LEMBAR
HASIL PENILAIAN SEJAWAT SEBIDANG ATAU PEER REVIEW
KARYA ILMIAH : PROSIDING
Judul Karya Ilmiah : Calculation of Phantom Volume for Computed Tomography (CT) Scan Images
Penulis/ Jumlah Penulis : Kusworo Adi, Catur Edi Widodo, Aris Sugiharto, Qidir Maulana B. S., Adi Pamungkas/
5 orang
Status Pengusul : Penulis ke-1
Identitas Prosiding : a. Judul Prosiding : The 3rd International Conference on
Information Technology, Computer and
Electrical Engineering (ICITACEE 2016)
b. ISBN/ISSN : 978-1-5090-0890-2
c. Thn Terbit, Tempat Pelaks. : 2016, Semarang
d. Penerbit/Organiser : Department of Electrical Engineering Universitas
Diponegoro/ IEEE
e. Alamat Repository/Web : https://www.icitacee.undip.ac.id/index.php/icitace
e/2016
Alamat Artikel : https://ieeexplore.ieee.org/document/7892443
f. Terindeks di (jika ada) : Scopus SJR: 0,13 (2018)
https://www.scimagojr.com/journalsearch.php?q=
21100812376&tip=sid&clean=0
Kategori Publikasi Makalah : √ Prosiding Forum Ilmiah Internasional
(beri pada kategori yang tepat) Prosiding Forum Ilmiah Nasional
Hasil Penilaian Peer Review :
Komponen Yang Dinilai Nilai Reviewer
Nilai Rata-rata Reviewer 1 Reviewer 2
a. Kelengkapan unsur isi prosiding (10%)
2,40 2,70 2,55
b. Ruang lingkup dan kedalaman
pembahasan (30%)
7,40 8,80 8,10
c. Kecukupan dan kemutahiran
data/informasi dan metodologi (30%)
7,40 8,90 8,15
d. Kelengkapan unsur dan kualitas
terbitan/jurnal (30%)
7,40 8,90 8,15
Total = (100%)
24,60 29,30 26,95
Semarang, 8 Mei 2020
Reviewer 1
Prof. Dr. Muhammad Nur, DEA
NIP. 195711261990011001
Unit Kerja : Departemen Fisika - FSM UNDIP
Reviewer 2
Prof. Dr. Heri Sutanto, SSi, MSi
NIP. 197502151998021001
Unit Kerja : Departemen Fisika - FSM UNDIP
LEMBAR
HASIL PENILAIAN SEJAWAT SEBIDANG ATAU PEER REVIEW
KARYA ILMIAH : PROSIDING
Judul Karya Ilmiah : Calculation of Phantom Volume for Computed Tomography (CT) Scan Images
Penulis/ Jumlah Penulis : Kusworo Adi, Catur Edi Widodo, Aris Sugiharto, Qidir Maulana B. S., Adi Pamungkas/
5 orang
Status Pengusul : Penulis ke-1
Identitas Prosiding : a. Judul Prosiding : The 3rd International Conference on
Information Technology, Computer and
Electrical Engineering (ICITACEE 2016)
b. ISBN/ISSN : 978-1-5090-0890-2
c. Thn Terbit, Tempat Pelaks. : 2016, Semarang
d. Penerbit/Organiser : Department of Electrical Engineering Universitas
Diponegoro/ IEEE
e. Alamat Repository/Web : https://www.icitacee.undip.ac.id/index.php/icitace
e/2016
Alamat Artikel : https://ieeexplore.ieee.org/document/7892443
f. Terindeks di (jika ada) : Scopus SJR: 0,13 (2018)
https://www.scimagojr.com/journalsearch.php?q=
21100812376&tip=sid&clean=0
Kategori Publikasi Makalah : √ Prosiding Forum Ilmiah Internasional
(beri pada kategori yang tepat) Prosiding Forum Ilmiah Nasional
Hasil Penilaian Peer Review :
Komponen
Yang Dinilai
Nilai Maksimal Prosiding Nilai Akhir
Yang
Diperoleh
Internasional
Nasional
a. Kelengkapan unsur isi prosiding (10%) 3,00 2,40
b. Ruang lingkup dan kedalaman pembahasan
(30%)
9,00 7,40
c. Kecukupan dan kemutahiran data/informasi dan
metodologi (30%)
9,00 7,40
d. Kelengkapan unsur dan kualitas terbitan
/prosiding (30%)
9,00 7,40
Total = (100%) 30,00 24,60
Nilai Pengusul =
Catatan Penilaian artikel oleh Reviewer :
1. Kelengkapan unsur isi prosiding:
Artikel ini ditulis sesuai dengan standard IEEE. Kebaruan dikemukan dengan jelas
2. Ruang lingkup dan kedalaman pembahasan:
Ruang lingkup cukup luas dan dibahas dengan baik
3. Kecukupan dan kemutakhiran data/informasi dan metodologi:
Referensi mutakhir, data dan informasi yang masih baru saat penerbitan serta metoda standard yang dapat
direflikasi oleh mereka yang sebidang
4. Kelengkapan unsur dan kualitas terbitan:
Penerbitan sudah standard IEEE, lengkap dengan unsur unsur yang menjadi persyaratan IEEE. Penerbitan di IEEE
Explore terindex Scopus SJR: 0,13 (2018), nilai makismum 25
Semarang, 8 Mei 2020
Reviewer 1
Prof. Dr. Muhammad Nur, DEA
NIP. 195711261990011001
Unit Kerja : Departemen Fisika - FSM UNDIP
√
LEMBAR
HASIL PENILAIAN SEJAWAT SEBIDANG ATAU PEER REVIEW
KARYA ILMIAH : PROSIDING
Judul Karya Ilmiah : Calculation of Phantom Volume for Computed Tomography (CT) Scan Images
Penulis/ Jumlah Penulis : Kusworo Adi, Catur Edi Widodo, Aris Sugiharto, Qidir Maulana B. S., Adi Pamungkas/
5 orang
Status Pengusul : Penulis ke-1
Identitas Prosiding : a. Judul Prosiding : The 3rd International Conference on
Information Technology, Computer and
Electrical Engineering (ICITACEE 2016)
b. ISBN/ISSN : 978-1-5090-0890-2
c. Thn Terbit, Tempat Pelaks. : 2016, Semarang
d. Penerbit/Organiser : Department of Electrical Engineering Universitas
Diponegoro/ IEEE
e. Alamat Repository/Web : https://www.icitacee.undip.ac.id/index.php/icitace
e/2016
Alamat Artikel : https://ieeexplore.ieee.org/document/7892443
f. Terindeks di (jika ada) : Scopus SJR: 0,13 (2018)
https://www.scimagojr.com/journalsearch.php?q=
21100812376&tip=sid&clean=0
Kategori Publikasi Makalah : √ Prosiding Forum Ilmiah Internasional
(beri pada kategori yang tepat) Prosiding Forum Ilmiah Nasional
Hasil Penilaian Peer Review :
Komponen
Yang Dinilai
Nilai Maksimal Prosiding Nilai Akhir
Yang
Diperoleh
Internasional
Nasional
a. Kelengkapan unsur isi prosiding (10%) 3,00 2,70
b. Ruang lingkup dan kedalaman pembahasan (30%) 9,00 8,80
c. Kecukupan dan kemutahiran data/informasi dan
metodologi (30%)
9,00 8,90
c. Kelengkapan unsur dan kualitas terbitan /prosiding
(30%)
9,00 8,90
Total = (100%) 30,00 29,30
Nilai Pengusul =
Catatan Penilaian artikel oleh Reviewer :
1. Kelengkapan unsur isi jurnal: Artikel telah ditulis secara lengkap mulai dari judul, abstrak, pendahuluan hingga referensi dan sebagian sesuai
template penerbit IEEE secara online. Penulisan author belum mengikuti template online IEEE. Scope prosiding IEEE
relevan dengan topik artikel yang ditulis.
2. Ruang lingkup dan kedalaman pembahasan: Ruang lingkup dan kedalaman pembahasan sudah baik dan mendalam. Perhitungan volume fantom dengan CT scan
sudah dilakukan dengan baik dan jelas. Paper belum mengkaitkan hasil dari peneliti lain.
3. Kecukupan dan kemutakhiran data/informasi dan metodologi: Data penelitian yang diperoleh sangat memadai. Hasil penelitian sudah sesuai dengan metodologi riset yang dilakukan.
Artikel disusun berdasarkan referensi yang masih minim dengan total 6 referensi dan 50% kategori tidak mutakhir.
4. Kelengkapan unsur dan kualitas terbitan: Secara umum kelengkapan unsur artikel lengkap. Kualitas penerbit IEEE baik. Prosiding IEEE terindeks Scopus, SJR
(2018) 0.13.
Semarang, 4 Mei 2020
Reviewer 2
Prof. Dr. Heri Sutanto, SSi, MSi
NIP. 197502151998021001
Unit Kerja : Departemen Fisika - FSM UNDIP
√
FOREWORD FROM CHIEF OF ELECTRICAL ENGINEERING DEPARTMENT DIPONEGORO UNIVERSITY, SEMARANG-INDONESIA
In the Name of Allah, the Most Gracious, Most Merciful.
All the praises and thanks to Allah.
Welcome all of the participants and keynote speakers to the International Conference on
Information Technology, Computer, and Electrical Engineering (ICITACEE 2016) in Semarang.
This is the third international conference held together by Electrical Engineering Department and
Computer Engineering Department of Engineering Faculty, Universitas Diponegoro. I would like
to appreciate the measureless work in this conference as a collaborative effort among Electrical
Engineering Department, Computer Engineering Department, IEEE Student Branch of
Universitas Diponegoro, and IEEE Indonesia Section. I would like to express my deep
appreciation to Organizing Committee members, staffs, and students of Electrical Engineering and
Computer Engineering Department for their effort and support. I would like to extend our
appreciation to Rector of Universitas Diponegoro and Dean of Engineering Faculty.
I hope that this conference will be a prestige forum to communicate and sharing the findings, and
precious researches among experts in field of computer engineering, information technology, and
electrical engineering. We are extremely happy that this event will give contribution to global
development of Computer Engineering, Information Technology, and Electrical Engineering.
Dr. Wahyudi, S.T., M.T. Chief of Electrical Engineering Department Engineering Faculty Universitas Diponegoro, Semarang – Indonesia.
CONFERENCE COMMITTEE
General Chair : Abdul Syakur (Universitas Diponegoro)
Co-Chair : R. Rizal Isnanto (Universitas Diponegoro)
Secretary : M. Arfan
Organizing Committee:
Trias Andromeda
Eko Didik Widianto
Teguh Prakoso
Achmad Hidayatno
Ajub Ajulian Zahra
Agung Budi P.
Aghus Sofwan
Yuli Christyono
Sukiswo
Dania Eridani
Rinta Kridalukmana
Steering Committee:
Hermawan (Diponegoro University)
Muhammad Nadzir Marsono (Universiti Teknologi Malaysia)
Riri Fitri Sari (Universitas Indonesia)
Yanuarsyah Haroen (Institut Teknologi Bandung)
Taufik (California Polytechnic State, USA)
Satriyo Dharmanto (IEEE Indonesia Section Chair)
Technical Program Committee:
Mochammad Facta (Diponegoro University, Indonesia)
Masayuki Kurosaki (Kyushu University, Japan)
Trio Adiono (Bandung Institute of Technology, Indonesia)
P. Insap Santosa (Gadjah Mada University, Indonesia)
Mauridhi Heri Purnomo (Sepuluh Nopember Institute of Technology, Indonesia)
Khoirul Anwar (Japan Advanced Institute of Science and Technology, Japan)
Wahyudi (Diponegoro University, Indonesia)
Wahyul Amien Syafei (Diponegoro University, Indonesia)
Munawar Agus Riyadi (Diponegoro University, Indonesia)
Sidiq Syamsul Hidayat (Semarang State Polytechnics, Indonesia)
Supari (Semarang University, Indonesia)
Slamet Riyadi (Soegijapranoto Katholic University, Indonesia)
M. Hadin (Sultan Agung Islamic University, Indonesia)
Onil Nazra Persada (CEA, France)
Zolkafle Buntat (Universiti Teknologi Malaysia)
Taufik (California Polytechnic State University, USA)
Hashim Uledi Iddi (University of Dar es Salaam, Tanzania)
Aris Triwiyatno (Diponegoro University, Indonesia)
Pandu Sandi Pratama (Pusan National University, South Korea)
Razali Ismail (Universiti Teknologi Malaysia, Malaysia)
Ismail Saad (University Malaysia Sabah, Malaysia)
Oky Dwi Nurhayati (Diponegoro University, Indonesia)
TABLE OF CONTENTS
Keynote Speakers1 Hydro, Solar, and Wind Energy as Potential Electrical Power Plant in Indonesia - Past Conditions and
Future Prospects
Yanuarsyah Haroen
2 Low Latency Network-on-Chip Router Using Static Straight Allocator
Alireza Monemi, Chia Yee Ooi, Maurizio Palesi, Muhammad Nadzir Marsono
10 Smart Video-Based Surveillance: Opportunities and Challenges from Image Processing Perspectives
Syed Abdurrahman
Electronic Circuit and Control11 Human Tracking Application in a Certain Closed Area Using RFID Sensors and IP Camera
Daniel Patricko Hutabarat, Darma Patria, Santoso Budijono, Robby Saleh
17 Designing and Implementation of Autonomous Quadrotor as Unmanned Aerial Vehicle
Felix Yustian Setiono, Anthony Candrasaputra, Tobias Bimo Prasetyo, Kho Lukas Budi Santoso
21 Multi Channel Electromyography (EMG) Signal Acquisition using Microcontroller with Rectifier
Florentinus Budi Setiawan, S. Siswanto
25 ECG Signal Processing using Offline-Wavelet Transform Method based on ECG-IoT Device
M. Faizal Amri, Muhammad Ilham R, Arjon Turnip
31 Trans-impedance Amplifier (TIA) Design for Visible Light Communication (VLC) using Commercially
Available OP-AMP
Syifaul Fuada, Angga Pratama Putra, Yulian Aska, Trio Adiono
37 Robot ARM Controlled by Muscle Tension Based on Electromyography and PIC18F4550
Ricky Fajar Adiputra, Florentinus Budi Setiawan
42 A Low Cost Anthropomorphic Prosthetic hand Using DC Micro Metal Gear motor
Mochammad Ariyanto, M. Munadi, Gunawan D. Haryadi, Rifky Ismail, Jonny A. Pakpahan, Khusnul A.Mustaqim
47 New Watershed Segmentation Algorithm based on Hybrid Gradient and Self-Adaptive Marker Extraction
Yuan Li, Yu Qingsong, Shen Chaomin, Hu Wenxin
52 Variations on Load and Distance Controller for Modern Elevator with Fuzzy
Ainil Syafitri, Iwa Garniwa MK, Ridwan Gunawan, I Made Ardita
56 Fuzzy-PID Simulations on Ropeless Elevator Performance
Ainil Syafitri, Iwa Garniwa MK, Ridwan Gunawan, I Made Ardita
60 A Simple Proportional plus PD Sign for Asymptotically Stable Robot Manipulators
Adha Imam Cahyadi, Samiadji Herdjunanto, H. Herianto
64 Arrival Time Field Based Path Planning Algorithm for Mobile Robot
Imaduddin A. Majid, Adha Imam Cahyadi, Igi Ardiyanto, Muhammad Saifussalam
68 Design of Soft Contact Lens Indexer Inspection Semi-Automatic
Didi Istardi, Kemas Syaiful
74 Yuarm: A Low Cost Android Platform for Vision Based Manipulators Control
Sisdarmanto Adinandra, Dany Erfawan
79 Development of Unmanned Aerial Vehicle (UAV) Ornithopter with Wireless Radio Control
Farika T. Putri, Mochammad Ariyanto, Ismoyo Haryanto, Moh. Arozi, Wahyu Caesarendra, M. RizkiIbrahim Hanan
85 Comparison Methods of Edge Detection for USG Images
M. Khairudin, Dessy Irmawati
89 Ultrasonic Signal Denoising Based on Wavelet Haar Decomposition Level
H. Herlinawati, Umi Murdika, Grienda Elan, Titin Yulianti
95 Sliding Mode Control for Therapeutic Pool Model Control System
M. Munadi, Henry Kristianto, Mochammad Ariyanto, Ismoyo Haryanto, Hari Peni Julianti
100 Experiment of Networked Control System (NCS) Using Network Emulator
Indra Sakti, Dicky Rianto Prajitno
106 Brainwave-Controlled Applications with the Emotiv EPOC Using Support Vector Machine
Ha Hoang Kha, Vo Anh Kha, Dinh Quoc Hung
112 Development of Hovercraft Prototype with Stability Control System using PID Controller
Munawar A. Riyadi, Lazyo Rahmando, Aris Triwiyatno
117 Design of Color Based Object Sorting Through Arm Manipulator with Inverse Kinematics Method
S. Sumardi, Lanang Febriramadhan, Aris Triwiyatno
123 Designing Internal-External Control Method for Delta Robot Prototype to Manipulate Non-Linear Move-
ment Object
Aris Triwiyatno, Muhammad Fikko Fadjrimiratno, S. Sumardi
129 Real Time Classification of SSVEP Brain Activity with Adaptive Feedforward Neural Networks
Arjon Turnip, M. Ilham Rizgyawan, Dwi Esti K., Jasman Pardede, Sandi Yanyoan, Edi Mulyana
134 Fuzzy-Mamdani Inference System in Predicting the Correlation Between Learning Method, Discipline
and Motivation with Student’s Achievement
J. Juningtyastuti, Fransiskus Allan Gunawan
Electric and Power System140 Investigation of Temperature Rise Considering the Stator Parameters in a High-Speed Spindle Motor
Wawan Purwanto, Jerry Chih Tsong Su
147 Voltage Balancing Circuits for Five-Level Power Inverter With A Single DC Voltage Source
S. Suroso, Abdullah Nur Aziz
151 The Use of Neural Network (NN) to Predict Voltage Drop during Starting of Medium Voltage Induction
Motor
Fidelis Galla Limbong
156 Research on Positive Narrow Bipolar Events in Padang
Ariadi Hazmi, Primas Emeraldi, M. Imran Hamid, Nobuyaki Takagi
160 Minimization of Cogging Torque Based on Different Shape of Anti-Notch Method
H. Herlina, Rudy Setiabudy, Uno Bintang Sudibyo
164 Investigation of the Influence of Variations in the Number and Width of Anti-Notch depending on Cogging
Torque Reduction
Rudy Setiabudy, H. Herlina
168 Voltage Drop Simulation at Southern Sulawesi Power System Considering Composite Load Model
Ardiaty Arief, Muhammad Bachtiar Nappu
172 Analytical Design of Sea Wave Energy Power Plant Using Tubular Linear PM Generator in Southern
Coast of Yogyakarta, Indonesia
Budi Azhari, Fransisco Danang Wijaya, Dewangga Adhyaksa, Wassy Prawinnetou
177 Reduction on Cogging Torque in Dual Stator Radial Flux Permanent Magnet Generator for Low Speed
Wind Turbine
Adeguna Ridlo Pramurti, Eka Firmansyah, S. Suharyanto
181 Network Losses Reduction Due To New Hydro Power Plant Integration
Muhammad Bachtiar Nappu, Muhammad Imran Bachtiar, Ardiaty Arief
186 Electrical and Temperature Correlation to Monitor Fault Condition of ZnO Surge Arrester
N. Novizon, Zulkurnain Abdul-Malek
191 Discrimination of Particle-Initiated Defects in Gas-Insulated System Using C4.5 Algorithm
Firmansyah Nur Budiman, Elvira Sukma Wahyuni
197 Enhanced Fault Ride – Through Ability of DFIG-Based Wind Energy System Using Superconducting
Fault Current Limiter
Chandan Kumar Sharma, Subhendu Sekhar Sahoo, Kalyan Chatterjee
202 Design of Photovoltaic BLDC Motor-Water Pump System with Single Converter
Slamet Riyadi
208 Integrated LC Resonant Converter and Silent Discharge Ozonizer for Colour Removal
Mochammad Facta, H. Hermawan, Zolkafle Buntat
213 A Prototype of Multistage Dynamic Braking of Three Phase Squirrel Cage Induction Motor
Tejo Sukmadi, Syauqie Candra Buana, Trias Andromeda, Mochammad Facta
216 Application of Dielectric Barrier Discharge Plasma for Reducing Chemical Oxygen Demand (COD) on
Industrial Rubber Waste Treatment
Abdul Syakur, Badrus Zaman, F. Fauzan, Nur Jannah, Nurmaliakasih Dias Yunita
Information and Computer Technologies220 Calculation of Phantom Volume for Computed Tomography (CT) Scan Images
Kusworo Adi, Catur Edi Widodo, Aris Sugiharto, Qidir Maulana B.S., Adi Pamungkas
224 Design and Development of Android-based Cloud ECG Monitoring System
Muhammad Ilham Rizqyawan, M. Faizal Amri, Rian Putra Pratama, Arjon Turnip
229 Designing Framework for Software Reuse Maturity Improvement
Bagus Setyawan Wijaya, Yudi Satria Gondokaryono
234 Performance Evaluation of Teleprotection using OpenDSS
M. Kahlil F., Muhammad Hamdani Rizal, Muhammad Raid Mukhtar, Riri Fitri Sari
239 Design Architecture Enterprise Service Bus to Support Multi-Tenant Client and Resource Provider
Taufik Sulaeman, A. Albarda
244 Data Envelopment Analysis - Analytic Hierarchy Process Method for Performance Evaluation Study
Program
Ali Wedo Sarjono, F. Farikhin, Catur Edi Wibowo
249 Eating for physical rather than emotional: A Bayesian Belief Network Approach for Android- Based
Intuitive Eating Measurement
Anggita Dian Cahyani, M. Meiliana, Widodo Budiharto
253 Detection of the Beef Quality Using Mobile-Based K-Mean Clustering Method
Oky Dwi Nurhayati, Kusworo Adi, Sri Pujiyanto
260 English – Indonesian Phrase Translation using Recurrent Neural Network and ADJ Technique
Wenty Octoviani, Muhammad Fachrurrozi, Novi Yusliani
264 IT Adoption Strategy to Promote Batik Micro-Scale Industry in Central Java, Indonesia
Rinta Kridalukmana, Naili Farida, Hari Susanta Nugraha
269 The Study of Theory of Planned Behavior of Building Automation System in Industrial Sector
Shu-Chiang Lin, Jacky Chin
274 A Literature Review of Question Answering System using Named Entity Recognition
Rini Wongso, M. Meiliana, Derwin Suhartono
278 The Benefit of the Web 2.0 Technologies in Higher Education: Student’s Perspectives
Yohana Dewi Lulu Widyasari, Lukito Edi Nugroho, Adhistya Erna Permanasari
283 A New Image Watermarking Scheme Using Contourlet Transforms
Sy C. Nguyen, Kha H. Ha, Hoang M. Nguyen
289 Detection Plagiarism Documents on Indonesian using Min-Hash and Synonym Recognition
Muhammad Badriansyah Putra
293 Nearest Tourism Site Searching using Haversine Method
Zainal Arifin, Muhammad Rivani Ibrahim, Heliza Rahmania Hatta
297 Decision Support System For New Employee Recruitment Using Weighted Product Method
Dyna Marisa Khairina, Muhammad Reski Asrian, Heliza Rahmania Hatta
302 Ontology Model For Complementary Breastfeeding Recipes
Sari Widya Sihwi, A. Athiyah, Afrizal Doewes
308 Development of Conceptual Model in Understanding The Role of Organizational Factor in KMS Accep-
tance
Hetty Rohayani, Setiawan Assegaff, K. Kurniabudi
313 Pattern Discovery of Indonesian Customers in an Online Shop: A Case of Fashion Online Shop
R. Rianto, Lukito Edi Nugroho, P. Insap Santosa
317 Traffic Sign Detection Based On HOG and PHOG Using Binary SVM And k-NN
Aris Sugiharto, Agus Harjoko
322 Utilization of Social Media in Livestock Product Marketing Group of Cattle
Kurniawan Teguh Martono, Cahya Setya Utama, Bambang Sulistiyanto, Merry Christiyanto
327 ST-DBSCAN Clustering Module in SpagoBI for Hotspots Distribution in Indonesia
Sarah Shanaz Shaztika, Rina Trisminingsih
331 CBE : Corpus-Based of Emotion for Emotion Detection in Text Document
Fika Hastarita Rachman, Riyanarto Sarno, Chastine Fatichah
336 Evaluation of IT Governance to Support IT Operation Excellent Based on COBIT 4.1 at the PT Timah
Tbk
I. Ibrahim, Lela Nurpulaela
340 Disclosing the Automation of Quality Assurance System of Higher Education (QAS-HE) in Indonesia
Using DevOps Approach
Acep Taryana, S. Setiawan
345 Implementation of Honeypot to Detect and Prevent Distributed Denial of Service Attack
Irwan Sembiring
351 Trends Information Technology in E-Agriculture: A Systematic Literature Review
Erick Fernando, Setiawan Assegaff, Hetty Rohayani AH
356 Parameter Optimization of Brown’s and Holt’s Double Exponential Smoothing Using Golden Section
Method for Predicting Indonesian Crude Oil Price (ICP)
Nurrahim Dwi Saputra, Abdul Aziz, Bambang Harjito
361 The Analysis of Instagram Technology Adoption as Marketing Tools by Small Medium Enterprise
Trianggoro Wiradinata, Bobby Iswandi
367 Commodity Cluster Using Single System Image Based on Linux/Kerrighed for High-Performance Com-
puting
Iwan Setiawan, Eko Murdyantoro
373 Noise Removal on Batak Toba Handwritten Script using Artificial Neural Network
Novie Theresia Br Pasaribu, M. Jimmy Hasugian
377 Shooting Simulator System Design Based on Augmented Reality
Kurniawan Teguh Martono, Oky Dwi Nurhayati
383 Optimizing MySQL Database System on Information Systems Research, Publications and Community
Service
Kodrat Iman Satoto, R. Rizal Isnanto, Rinta Kridalukmana, Kurniawan Teguh Martono
388 Information Technology Audit For Management Evaluation Using COBIT and IT Security
Assaf Arief, Iis Hamsir Ayub Wahab
393 Performance Comparisons of Web Server Load Balancing Algorithms on HAProxy and Heartbeat
Agung B. Prasetijo, Eko D. Widianto, Ersya T. Hidayatullah
397 Performance Analysis of MAC Protocol for Resource Sharing D2D and M2M in Unlicensed Channel
Aghus Sofwan
403 Mobile Cloud Computing Security Using Cryptographic Hash Function Algorithm
M. Arfan
408 On The Implementation of ZFS (Zettabyte File System) Storage System
Eko D. Widianto, Agung B. Prasetijo, Ahmad Ghufroni
Telecommunication and Radio Frequency414 Improving Accuracy In International Direct Dial (IDD) Call Fraud Suspect using Hybrid NBTree Algo-
rithm and Kullback Leibler Divergence
Aries Yulianto, A. Adiwijaya, M. Arif Bijaksana
421 Implementation of Ultrasonic Communication for Wireless Body Area Network Using Amplitude Shift
Keying Modulation
Muhammad Harry Bintang Pratama, Khusnil Mujib, Ajub Ajulian Zahra, Arif Munandar, Erizco SatyaWicaksono
425 Energy Efficiency Beamformers for K-User MIMO Interference Channels with Interference Alignment
Ha Hoang Kha, Tuan Do-Hong429 Cyclic Prefix-based Noise Estimation with DVB-T Input for Spectrum Sensing in Cognitive Radio
Dzata Farahiyah, Trung Thanh Nguyen, Thomas Kaiser434 Path Loss Model Estimation Based on Measurements of Off-Body and On-Body Communication Using
Textile Antenna at 2.45 GHz
B. Basari, Novi Yohanna, Ria Aprilliyani, Rian Gilang Prabowo439 Signal Analysis of GMSK Modulation-based CubeSat Automatic Identification System Receiver
Achmad Munir, Nazmi Febrian, Antrisha Daneraici Setiawan, C. Chairunnisa443 Coupling Analysis of Isotropic and Anisotropic Dielectric Materials in Rectangular Waveguide
Muhammad Reza Hidayat, Achmad Munir447 Effect of Element Number of SRR-based BPF to Its Characteristics
Mohammad Syahral, Achmad Munir451 Methods of MIMO Decoders for Very High Throughput WLAN IEEE802.11ac
Wahyul Amien Syafei, Zuhrotul Maulida, Imam Santoso455 Pattern Recognition on Herbs Leaves Using Region-Based Invariants Feature Extraction
R. Rizal Isnanto, Ajub Ajulian Zahra, Patricia Julietta
Source details
Advanced Science LettersScopus coverage years: from 2010 to 2017
Publisher: American Scientific PublishersISSN: 1936-6612 E-ISSN: 1936-7317Subject area: Energy: General Energy Environmental Science: General Environmental Science
Engineering: General Engineering Social Sciences: Education Social Sciences: Health (social science)
Mathematics: General Mathematics
(coverage discontinued in Scopus)
View all
View all documents ▻ Set document alert Save to source list
CiteScore 2016
0.21
SJR 2018
0.117
SNIP 2018
0.280
CiteScore CiteScore rank & trend CiteScore presets Scopus content coverage
Calculated using data from 31 May, 2017CiteScore
*CiteScore includes all available document types
0.21 =
Citation Count 2016
Documents 2013 -2015*
=
Metrics displaying this icon are compiled according to , a collaboration between industry
and academia.
2016
▻455 Citations
▻2,166 Documents
▻View CiteScore methodology ▻CiteScore FAQ
↗ Snowball Metrics
CiteScore rank
Category Rank Percentile
Energy #42/58 27th
EnvironmentalScience
#148/185 19th
GeneralEnergy
GeneralEnvironmentalScience
▻View CiteScore trends
🔗Add CiteScore to your site
About Scopus
What is Scopus
Content coverage
Scopus blog
Scopus API
Privacy matters
Language
⽇本語に切り替える切换到简体中文
切換到繁體中文
Русский язык
Customer Service
Help
Contact us
Copyright © . All rights reserved. Scopus® is a registered trademark of Elsevier B.V.
↗Terms and conditions ↗Privacy policy
↗Elsevier B.V
Brought to you by Universitas Diponegoro
Search Sources Lists ↗SciVal Create account Sign in
Document details
21 of 35
Calculation of phantom volume for computed tomography (CT) scanimages (Conference Paper)
, , , ,
Department of Physics, Faculty of Science and Mathematics, Diponegoro University, Semarang, Indonesia
AbstractCT scan is a radiological examination that uses X-ray to produce cross-sectional images of an object. Its aim is todetermine abnormalities such as cancers in human organs using ionizing radiation X-ray. Cancer is a term that refersto abnormal cell growth. Currently there are more than ��� types of cancer. Cancer cells can form any body tissue andcontinue to grow uncontrolled. Cancer cells are derived from normal body cells' damaged DNA (deoxyribonucleicacid), a cellular material that controls the characteristics and growth of cells. Approximately ��.� million new cancerpatients are diagnosed every year and about �.� million of them die it. The top five cancers in men are lung, prostate,colon, stomach and liver cancers, whereas in women, there are breast, colon, cervix, lung and uterus cancers. On theother hand, available cancer treatment modalities include surgery, chemotherapy, radiation therapy, hormonaltherapy, immune therapy and stem cell transplant. Cancer treatment options depend on the type, stage of cancer,patient's physical condition and preferences. In general, different treatment options come with different results andside effects. Recently, there has been rapid development in cancer therapy modalities and a decrease in cancer relatedmortality. Calculation of volume changes in cancer treatment processes is very important to know the success level ofthe therapy. Therefore, cancer volume calculations prior and after treatment are important. This research developed amethod of image processing to calculate phantom volume. The phantom material which is used is polymethylmethacrylate (PMMA). This phantom is assumed as cancer cell in patient's body that the volume will be calculated.Image processing and area calculation were conducted on each phantom image slice by thresholding and trapezoidalintegration method. Then phantom volume was calculated by integrating all areas with slice thickness. Thesecalculation results were then compared with those from manual calculation. This yielded an error value of �.��%. ©���� IEEE.
SciVal Topic Prominence
Topic:
Prominence percentile: 90.389
Author keywordsct scan image processing phantom volume trapezoidal integration
Indexed keywords
◅ Back to results ◅ Previous ▻Next
Export Download Print E-mail Save to PDF ⋆ Add to List ▻More...
View at Publisher
Proceedings - 2016 3rd International Conference on Information Technology, Computer, andElectrical Engineering, ICITACEE 20164 April 2017, Article number 7892443, Pages 220-2223rd International Conference on Information Technology, Computer, and Electrical Engineering,ICITACEE 2016; Hom HotelSemarang; Indonesia; 19 October 2016 through 21 October 2016;Category numberCFP1689Z-PRT; Code 127215
Adi, K. Widodo, C.E. Sugiharto, A. Maulana, B.S.Q. Pamungkas, A.
View references (6)
Proton Therapy | Radiation | Secondary cancer
Metrics
1 Citation in Scopus
45th percentile
0.33 Field-Weighted
Citation Impact
Cited by 1 document
, ,
(2019) Journal of Physics:Conference Series
Inform me when this documentis cited in Scopus:
Related documents
, ,
(2016) Journal of Physics:Conference Series
(1998) Radiographics
,
(2017) AIP ConferenceProceedings
❓ ▻View all metrics
Detecting driver drowsinessusing total pixel algorithm
Adi, K. Widodo, A.P. Widodo,C.E.
View details of this citation
Set citation alert ▻
▻Set citation feed
Parameter-based estimation ofCT dose index and image qualityusing an in-house android™-based software
Mubarok, S. Lubis, L.E. Pawiro,S.A.
The AAPM/RSNA Physics Tutorialfor Residents: X-ray Interactions
Bushberg, J.T.
Estimation of mean glandulardose for patients who undergomammography and studying thefactors affecting it
Barzanje, S.L.N.H. Harki,E.M.T.N.
Brought to you by Universitas Diponegoro
Search Sources Lists ↗SciVal Create account Sign in
References (6)
Engineeringcontrolled terms:
Biological organs Cells Chemotherapy Cytology Diseases Image processing
Ionizing radiation Nucleic acids Patient treatment Polymethyl methacrylates
Radiotherapy Stem cells
Engineeringuncontrolled terms
Calculation results Computed tomography scan Cross sectional image Different treatments
Integration method phantom volume Physical conditions Treatment modality
Engineering mainheading:
Computerized tomography
Bushberg, J.T.(2002) The Essential Physic of Medical Imaging. .2nd ed, Lippincott Williams & Wilkins, Philedelphia USA
Bushong, S.C.(2001) Radiologic Science for Technologist Physic, Biologic and Protection. .The CV. Mosby Company, United States of America
(2011) American Association of Physicist in Medicine, Size-Spesific Dose Estimate (SSDE) in Pediatric andAdult Body CT Examinations, America. .[AAPM Report No.204]
Carderquist, B.(2008) Evaluation of Two Thin CT Dose Profiler Detector and New Way to Perform QA in A CTDI HeadPhantom. .Departement of Radiation Physics Goteborg University: Sweden
Gonzalez, R.C., Woods, R.E.(2002) Digital Image Processing. .2nd ed. Prentice-Hall Inc., New Jersey
ISBN: 978-150901434-7Source Type: Conference ProceedingOriginal language: English
DOI: 10.1109/ICITACEE.2016.7892443Document Type: Conference PaperVolume Editors: Widianto E.D.,Arfan M.,Riyadi M.A.,Facta M.Sponsors:Publisher: Institute of Electrical and Electronics Engineers Inc.
▻View in search results format
All Export Print E-mail Save to PDF Create bibliography
1Cited 1644 times
2Cited 269 times
3Cited 18 times
4
Cited 7 times
5Cited 32163 times
Find more related documents inScopus based on:
View all related documents basedon references
▻Authors ▻Keywords
21 of 35
Chaptra, S.C.(2012) Applied Numerical Methods with MATLAB. .3rd ed. McGraw-Hill, New York
© Copyright ���� Elsevier B.V., All rights reserved.
6Cited 267 times
◅ Back to results ◅ Previous ▻Next Top of page
About Scopus
What is Scopus
Content coverage
Scopus blog
Scopus API
Privacy matters
Language
⽇本語に切り替える切换到简体中文
切換到繁體中文
Русский язык
Customer Service
Help
Contact us
Copyright © . All rights reserved. Scopus® is a registered trademark of Elsevier B.V.
We use cookies to help provide and enhance our service and tailor content. By continuing, you agree to the.
↗Terms and conditions ↗Privacy policy
↗Elsevier B.V
use of cookies
SUBSCRIBEIEEE.org IEEE Xplore IEEE-SA IEEE Spectrum More Sites SUBSCRIBE Cart Create Account
Personal Sign In
Conferences > 2016 3rd International Confer...
4 Author(s) Ariadi Hazmi ; Primas Emeraldi ; M. Imran Hamid ; Nobuyuki Takagi All Authors
Research on positive narrow bipolar events in Padang
Publisher: IEEE Cite This Cite This PDF
2PaperCitations
37FullText Views
Abstract
Document Sections
I. Introduction
II. Observation and Data
III. Results and Discussion
IV. Conclusion
Authors
Figures
References
Citations
Keywords
Metrics
More Like This
Abstract: In this study, we have examined electric field records from 10 thunderstorm days containing 13
positive narrow bipolar pulses (PNBPs). It was found that PNBP occurrences ... View more
Metadata
Published in: 2016 3rd International Conference on Information Technology, Computer, and Electrical
Engineering (ICITACEE)
Authors
Abstract:
In this study, we have examined electric field records from 10 thunderstorm days containing 13 positive
narrow bipolar pulses (PNBPs). It was found that PNBP occurrences have a strong relationship with
thunderstorm activities. The mechanism of the NBPs was very different from intracloud (IC) and cloud-to-
ground (CG) flashes. We also found that the AM values of rise time, full width at maximum time, zero crossing
time, overshoot time, pulse duration and overshoot to peak amplitude ratio of the PNBPs were 1.64 μs, 1.32
μs, 9.38 μβ, 15.06 μs and 0.31 μs, respectively. The pulse duration range was from 8.45 to 29.06 μs.
Comparison with values from previous studies reported by other researchers showed that the mentioned
parameters had no strong relationship with latitude or geographic location.
Date of Conference: 19-20 Oct. 2016
Date Added to IEEE Xplore: 06 April 2017
ISBN Information:
INSPEC Accession Number: 16791805
DOI: 10.1109/ICITACEE.2016.7892429
Publisher: IEEE
Conference Location: Semarang, Indonesia
Ariadi Hazmi
Dept. of Electrical Engineering, Andalas University, Padang, Indonesia
Primas Emeraldi
Dept. of Electrical Engineering, Andalas University, Padang, Indonesia
M. Imran Hamid
Dept. of Electrical Engineering, Andalas University, Padang, Indonesia
Nobuyuki Takagi
Dept. of Electrical and Electronic Engineering, Gifu University, Gifu City, Japan
I. Introduction
Narrow bipolar pulses (NBPs) are identified as one of the intracloud (IC) lightning discharge
activities inside thunderclouds. However, the physical mechanism of NBPs remains a
mystery. Many researchers have reported that there were two types of NBPs, namely
positive narrow bipolar pulses (PNBP) and negative narrow bipolar pulses (NNBP). NBPs
have strong radio frequency radiation at several MHz and a short duration with zero
crossing (initial positive half cycle) and overshoot (negative half cycle) within several
microseconds, followed by or not followed by any other signals [1]–[4]. NBPs may not be
related to ground and cloud flash activities and originate inside the most active
thundercloud areas [2]. PNBPs usually occur at lower latitudes than NNBPs. In addition,
PNBP occurrences are rare compared to NNBP events [5]. This study is to clarify the
relationship between thunderstorm activity and PNBP occurrence. We examined an electric
field change data set with 13 PNBPs that were recorded during thunderstorm days in 2015.
The characteristics of the PNBPs were statistically analyzed based on electric field change
as presented in this paper. All data were also compared to previous researches at different
locations and latitudes.
Sign in to Continue Reading
Ariadi Hazmi
More Like This
Effects of solar eclipse of July 22, 2009 on VLF signalsand atmospheric electricity parameters over Kolkata
2009 4th International Conference on Computers andDevices for Communication (CODEC)
Published: 2009
Research on Distribution of Electric Field near Groundduring Thunderstorm Process
2007 International Symposium on ElectromagneticCompatibility
Published: 2007
Show More
Top Organizations with Patents on
Technologies Mentioned in This Article
Browse My Settings Help Institutional Sign In
Institutional Sign In
Contents
All
Research on positive narrow bipolar events in Padang - IEEE Conferen... https://ieeexplore.ieee.org/document/7892429/authors#authors
1 of 2 07/06/2020, 19:38
SUBSCRIBEIEEE.org IEEE Xplore IEEE-SA IEEE Spectrum More Sites SUBSCRIBE Cart Create Account
Personal Sign In
Conferences > 2016 3rd International Confer...
4 Author(s) Alireza Monemi ; Chia Yee Ooi ; Maurizio Palesi ; Muhammad Nadzir Marsono All Authors
Low latency network-on-chip router using static straight allocator
Publisher: IEEE Cite This Cite This PDF
3PaperCitations
242FullText Views
Abstract
Document Sections
I. Introduction
II. Related Works
III. Static Straight Allocator
IV. Router Architecture
V. Experimental Results
Authors
Figures
References
Citations
Keywords
Metrics
More Like This
Footnotes
Abstract: One clock cycle is the ideal latency for a network-on-chip (NoC) router to pass the received flit in
the current cycle to its requested destination output port when there... View more
Metadata
Published in: 2016 3rd International Conference on Information Technology, Computer, and Electrical
Engineering (ICITACEE)
Authors
Abstract:
One clock cycle is the ideal latency for a network-on-chip (NoC) router to pass the received flit in the current
cycle to its requested destination output port when there is no contention with other flits. In order to achieve
this goal, a newly arrived flit is required to go through all router's pipeline stages to the switch traversal stage.
In this paper, we present a low latency synchronized NoC router micro-architecture that achieves single clock
cycle latency for packets traveling to the same direction using a static straight VC/SW allocator (SSA). In
comparison to existing single clock cycle latency routers which require more complex VC/SW allocator or
crossbar switch architectures, our proposed SSA has simpler architecture and works in parallel with the
previously proposed baseline VC/SW allocator. The simulation results using six different synthetic traffic
patterns shows SSA reduces the communication latency of a 2-cycle latency baseline router by 24% in
average.
Date of Conference: 19-20 Oct. 2016
Date Added to IEEE Xplore: 06 April 2017
ISBN Information:
INSPEC Accession Number: 16791855
DOI: 10.1109/ICITACEE.2016.7892399
Publisher: IEEE
Conference Location: Semarang, Indonesia
Alireza Monemi
Faculty of Electrical Engineering, Universiti Teknologi Malaysia, 81310 Johor Bahru, Malaysia
Chia Yee Ooi
Malaysia-Japan International, Institute of Technology (MJIIT), Universiti Teknologi Malaysia, 54100, Kuala
Lumpur, Malaysia
Maurizio Palesi
University of Enna, KORE, Italy
Muhammad Nadzir Marsono
Faculty of Electrical Engineering, Universiti Teknologi Malaysia, 81310 Johor Bahru, Malaysia
I. Introduction
Network-on-Chip (NoC) [1] provides a flexible and extensible inter-core-communication
infrastructure for many-core system-on-chips. However, due to multiple number of routers a
packet has to traverse between a source and destination cores, as well as each individual
router buffering, NoC-based systems can suffer from high inter-core communication
latency. Reducing NoC communication latency is important as many-core based
applications are highly sensitive to inter-core communication latency. However, designing a
low latency NoC router can be a challenge.
Sign in to Continue Reading
Alireza Monemi
Faculty of Electrical Engineering, Universiti Teknologi Malaysia, 81310 Johor Bahru, Malaysia
Chia Yee Ooi
Malaysia-Japan International, Institute of Technology (MJIIT), Universiti Teknologi Malaysia, 54100, Kuala
Lumpur, Malaysia
More Like This
A configurable, programmable and software-definednetwork on chip
2014 IEEE Workshop on Advanced Research andTechnology in Industry Applications (WARTIA)
Published: 2014
HiWA: A hierarchical Wireless Network-on-Chiparchitecture
2014 International Conference on High PerformanceComputing & Simulation (HPCS)
Published: 2014
Show More
Top Organizations with Patents on
Technologies Mentioned in This Article
Browse My Settings Help Institutional Sign In
Institutional Sign In
Contents
All
Low latency network-on-chip router using static straight allocator - IE... https://ieeexplore.ieee.org/document/7892399/authors#authors
1 of 2 07/06/2020, 19:32
SUBSCRIBEIEEE.org IEEE Xplore IEEE-SA IEEE Spectrum More Sites SUBSCRIBE Cart Create Account
Personal Sign In
Conferences > 2016 3rd International Confer...
3 Author(s) Ha Hoang Kha ; Vo Anh Kha ; Dinh Quoc Hung All Authors
Brainwave-controlled applications with the Emotiv EPOC using support vectormachine
Publisher: IEEE Cite This Cite This PDF
1PaperCitation
446FullText Views
Abstract
Document Sections
I. Introduction
II. The Proposed
Brainwave-Controlled
System
III. Experimental Results
and Discussion
IV. Conclusion
Authors
Figures
References
Citations
Keywords
Metrics
More Like This
Abstract: Electroencephalography (EEG) which is the electrical signal recorded by the sensors attached on
the human scalp to detect brain activities has been the emerging trends in... View more
Metadata
Published in: 2016 3rd International Conference on Information Technology, Computer, and Electrical
Engineering (ICITACEE)
Authors
Abstract:
Electroencephalography (EEG) which is the electrical signal recorded by the sensors attached on the human
scalp to detect brain activities has been the emerging trends in digital signal processing. As compared to
processing other types of digital data such as speech or audio signals, EEG signal processing is more
challenging. However, EEG signals have practically found a wide range of important applications. In this
paper, we propose a design of a brain-computer interface (BCI) using EEG's P300 component to a control
application. First, we use the Emotiv EPOC headset to capture the raw EEG signals. Then, we adopt a
classification algorithm by invoking support vector machine along with the selected extracted features to
classify the two-class EEG trials (with and without P300 component). The algorithm is developed to help
people express their selection of one among four commands. The experimental results are provided evaluate
the classification accuracy.
Date of Conference: 19-20 Oct. 2016
Date Added to IEEE Xplore: 06 April 2017
ISBN Information:
INSPEC Accession Number: 16791810
DOI: 10.1109/ICITACEE.2016.7892420
Publisher: IEEE
Conference Location: Semarang, Indonesia
Ha Hoang Kha
Ho Chi Minh city University of Technology, VNU-HCM
Vo Anh Kha
Ho Chi Minh city University of Technology, VNU-HCM
Dinh Quoc Hung
Ho Chi Minh city University of Technology, VNU-HCM
I. Introduction
Brain-computer interface (BCI) systems are designed for people with difficulties in
communication or with severe motor disabilities to express the thoughts by using their bare
EEG signals. On top of that, the P300 wave, which is an event-related-potential (ERP) of
EEG or say in another way, a specific component of our brain signals, is used in many BCI
systems thanks to its clear distinctively observable characteristics among the noisy
background of EEG signals. The P300 is an endogenous component of EEG signals
elicited by human's brains in the process of decision making. P300's clearly positive
voltage peak usually occurs typically approximately at 300 milliseconds after stimulus onset
presented by the socalled ‘oddball paradigm’, in which the low-probability target stimuli are
mixed with high-probability non-target ones. Each stimulus is implemented on the computer
screen by visual flashing (or intensification) its symbol image. Four images corresponding 4
controlled devices are shown in the screen, on which the subject would focus their eyesight
at only one image as their intention, and it is implicitly known as his or her target stimuli,
while the other 3 images are the non-target ones. The subject is presented with two
categories of stimulus (target and non-target), and he or she is instructed to visually focus
on the target stimuli to determine his or her intention.
Sign in to Continue Reading
More Like This
Comparison between the Canonical CorrelationAnalysis and the Support Vector Machines asclassification algorithms in an SSVEP-based Brain-Computer Interface
2017 14th International Conference on ElectricalEngineering, Computing Science and AutomaticControl (CCE)
Published: 2017
Classification of motor imagery ecog signals usingsupport vector machine for brain computer interface
2013 Fifth International Conference on AdvancedComputing (ICoAC)
Published: 2013
Show More
Top Organizations with Patents on
Technologies Mentioned in This Article
Browse My Settings Help Institutional Sign In
Institutional Sign In
Contents
All
Brainwave-controlled applications with the Emotiv EPOC using suppor... https://ieeexplore.ieee.org/document/7892420/authors#authors
1 of 2 07/06/2020, 19:35
SUBSCRIBEIEEE.org IEEE Xplore IEEE-SA IEEE Spectrum More Sites SUBSCRIBE Cart Create Account
Personal Sign In
Conferences > 2016 3rd International Confer...
3 Author(s) Sy C. Nguyen ; Kha H. Ha ; Hoang M. Nguyen All Authors
A new image watermarking scheme using contourlet transforms
Publisher: IEEE Cite This Cite This PDF
1PaperCitation
162FullText Views
Abstract
Document Sections
I. Introduction
II. Contourlet Transform
III. Proposed Algorithm
IV. Experiments and
Results
V. Conclusion
Authors
Figures
References
Citations
Keywords
Metrics
More Like This
Abstract: Digital watermarking has been recognized as an effective technique to protect intellectual property
by embedding secret information into the digital products. This paper ... View more
Metadata
Published in: 2016 3rd International Conference on Information Technology, Computer, and Electrical
Engineering (ICITACEE)
Abstract:
Digital watermarking has been recognized as an effective technique to protect intellectual property by
embedding secret information into the digital products. This paper presents a new watermarking technique for
digital image applications by using the contourlet domain. The contourlet transform is a powerful tool to
capture singularities along smooth object boundaries with different elongated shapes and directions that
helps the watermarking technique to achieve high performance. Specifically, the host image is decomposed
into subbands by using the contourlet transform. Then, the mid frequency subbands are chosen to embed
watermark with suitable embedment factors. The peak signal-to-noise ratio (PSNR) and normalized
correlation (NC) are used to evaluate the performance of the algorithm. Simulations on different images are
carried out to evaluate the invisibility and robustness of the proposed scheme. The experimental results show
that the proposed method outperforms the others in terms of invisibility and robustness for the lossy JPEG
compression.
Date of Conference: 19-20 Oct. 2016
Date Added to IEEE Xplore: 06 April 2017
ISBN Information:
INSPEC Accession Number: 16791858
DOI: 10.1109/ICITACEE.2016.7892456
Publisher: IEEE
Conference Location: Semarang, Indonesia
Sy C. Nguyen
Faculty of Electrical & Electronics Engineering, Ho Chi Minh City University of Technology, VNU-HCM,
Vietnam
Kha H. Ha
Faculty of Electrical & Electronics Engineering, Ho Chi Minh City University of Technology, VNU-HCM,
Vietnam
Hoang M. Nguyen
Faculty of Management Information Systems, Banking University of HCM City, Vietnam
I. Introduction
The rapid development of the Internet has resulted in new challenges in protecting
copyrighted digital products. Watermarking is a potential technique to resolve this problem.
In watermarking technique, by inserting hidden information into an digital product, the
extracted hidden information can be used to protect the copyright ownership of the digital
product. It is desired that the extra information is embedded should cause imperceptible
degradation of digital host product. Then, the watermarking in the transform domain is of
great importance. The wavelet transform has much success in many signal processing and
communication applications such as it is used as the key transform for the new image-
compression standard, JPEG-2000 [22]. However, wavelets provide an optimal
representation for these signals in a certain sense for example: one-dimensional piecewise
smooth signals [21] [4]. In addition to the 1-D bases, wavelets in 2-D are good at capturing
the discontinuities at edge points, but will not capture the smoothness along the contours
well [4]. Likewise, the directional information of signals is limited when the signals are
processed by separable wavelets. Thus, we need a power tool to represent signals in
higher dimensions. Here are some well-known systems that provide multi-scale and
directional image representations, for example: 2-D Gabor wavelets [5], the cortex
transform [6], the steerable pyramid [7], 2-D directional wavelets [8], brushlets [9], complex
wavelets [10], and the contourlet transform [4]. However, the contourlet transform is flexible
Sign in to Continue Reading
More Like This
New Object Detection for On-board Robot Vision byLifting Complex Wavelet Transforms
2011 IEEE 11th International Conference on DataMining Workshops
Published: 2011
Salient Segmentation based Object Detection andRecognition using Hybrid Genetic Transform
2019 International Conference on Applied andEngineering Mathematics (ICAEM)
Published: 2019
Show More
Top Organizations with Patents on
Technologies Mentioned in This Article
Browse My Settings Help Institutional Sign In
Institutional Sign In
Contents
All
A new image watermarking scheme using contourlet transforms - IEE... https://ieeexplore.ieee.org/document/7892456/authors#authors
1 of 2 07/06/2020, 19:40
a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a a ao oa a a a a a a a a a a a aa a a a a a a a a a a a a a a a a a a a a a o a a a a a a a a a a a o o a a aaa
\oHo>N. ^r!6gs<Viige
rD .==(6E 7-\
<t.'r
ABq)
o
+Ja'ia).zCDo!oU)a)coooc/)
'ia)q)CE')cI!
(+{o
#
orga)
J-.P
oc(60)o
aaaa
a a a a a a a a a a o o a a a a a a a a a a a a a t a a a a a a a a a a a a a a a a a a a a a a a a a a a a a aa
oO.da
>o3o€B
zO5U)
!:rJ)
L*il
z.::)
\o
N
No\
q-t
$(-)
q-l
o
5.R
S
q..)q
a
A.q..)sr
\o
NtrtrQQF
\i6.Sa.)q.)
5.Eq
(-)
S'+-l(Jq.)
r!S
Sa.)*rE)\
rl
o.l
uF q.)
+rR
S\
a_)()q,)S, q..)
Ur+
S
Sq.)*r
Sooq)
F
+.Fa vt\) t\aI€ ns< rbF P SE!E SgeB 5s..3 3 ;d.3v ss Eir
r
IJIIJJIJJI
@
a)+JCUU(H
op{+rS{a)U
F'yA,S
d J';x
E.. \3
Calculation of Phantom Volume for Computed
Tomography (CT) Scan Images
Kusworo Adi, Catur Edi Widodo, Aris Sugiharto, Qidir Maulana B. S., Adi Pamungkas
Department of Physics, Faculty of Science and Mathematics
Diponegoro University
Semarang, Indonesia
Abstract— CT scan is a radiological examination that uses X-
ray to produce cross-sectional images of an object. Its aim is to
determine abnormalities such as cancers in human organs using
ionizing radiation X-ray. Cancer is a term that refers to
abnormal cell growth. Currently there are more than 100 types
of cancer. Cancer cells can form any body tissue and continue to
grow uncontrolled. Calculation of volume changes in cancer
treatment processes is very important to know the success level of
the therapy. Therefore, cancer volume calculations prior and
after treatment are important. In this research we are using
phantom. This phantom is assumed as cancer cell in patient’s
body that the volume will be calculated. The phantom material
which is used is polymethyl methacrylate (PMMA). This research
developed a method of image processing to calculate phantom
volume. Image processing and area calculation were conducted
on each phantom image slice by thresholding and trapezoidal
integration method. Then phantom volume was calculated by
integrating all areas with slice thickness. These calculation results
were then compared with those from manual calculation. This
yielded an error value of 3.63%. This method only process the
the CT scan output image, not embedded in CT-Scan system.
Keywords: phantom volume; ct scan; image processing;
trapezoidal integration
INTRODUCTION
CT scan is a diagnostic imaging modality that uses the tomographic principle to produce body parts images in axial, sagittal, coronal, or 3D format [1]. The aim of which is to determine abnormalities in human organs such as cancer using ionizing radiation X-ray.
Cancer is a term that refers to abnormal cell growth. Currently there are more than 100 types of cancer. Cancer cells can form any body tissue and continue to grow uncontrolled. Cancer cells are derived from normal body cells’ damaged DNA (deoxyribonucleic acid), a cellular material that controls the characteristics and growth of cells. Approximately, 14.1 million new cancer patients are diagnosed every year and about 8.2 million of them die from it. Top five cancers in men are lung, prostate, colon, stomach and liver cancer, while in women; there are breast, colon, cervix, lung and uterus cancers [2].
Available cancer therapy modalities include surgery, chemotherapy, radiation therapy, hormonal therapy, immune therapy and stem cell transplant. Cancer treatment options
depend on the type and stage of cancer, patient’s physical condition and preferences. In general, different treatment options come with different results and side effects. Recently, there has been rapid development in cancer therapy modalities and a decrease in cancer related mortality [3]. Calculation of volume changes in cancer treatment processes is very important to know the success level of the therapy. Hence, cancer volume calculations prior and after treatment are important. Several studies of cancer or phantom volume calculation has been conducted by some researchers [4,5,6]. Thresholding method of grayscale image has been conducted by researchers in previous studies [7,8,9]. Calculating method of cancer volume in MRI images using active contour segmentation has been developed and got good results [10]. The method can be applied in CT-Scan image, but this method required modification in order to work well on a CT-Scan image. In this study, phantom is assumed as cancer and to be homogeneous.
I. THEORITICAL BACKROUND
A. CT Scan
CT scan is a radiological examination that uses X-ray to produce cross-sectional images of an object. CT scan uses the attenuation principle of X-ray in an object. The human body is composed of various organs and tissues with different composition and density. The composition and density of the tissues are crucial in determining the X-ray radiation value absorbed by those tissues [11]. The scanning method used for this purpose consists of the sequential and spiral methods. In the sequential method, data acquisition is carried out without moving the table, while in the spiral method, an X-ray tube rotates continuously around the patient and an examination table also moves at a constant velocity.
B. Binary Image
Binary image is an image that has only two levels of gray value (black and white). Grayscale images can be converted into a binary image by using thresholding method. In this operation, the level of gray value of each pixel is grouped into two classes, black (0) and white (1) [12]. The equations used in a thresholding operation are:
1, ,
,0, ( , )
f i j Tg i j
f i j T
(1)
Where
( , )g i j is the binary image,
( , )f i j is the grayscale image, and
T is the threshold value
C. Trapezoidal Integration
Trapezoidal integration method is applied by integrating the linear interpolation formula, written as follows [13]:
2
b
a
b aI f x dx f a f b
(2)
Equation (2) can be extended to many intervals. For N interval
with step distance h, the expansion of the trapezoidal rule is as
follows:
(3)
where
( )b ah
N
(4)
The equation can be written in an equivalent form as:
0 1 2 12 2 22
N N
hI f f f f f (5)
where,
0f f a (6)
1f f a h (7)
( )if f a ih (8)
II. METHOD
This research uses the following instruments: a CT scanner as the radiation source and an acrylic cylindrical PMMA phantom as the object. This phantom is assumed as cancer cell in patient’s body that the volume will be calculated. The equipment used is shown in Figure 1.
(a) CT Scan (b) Body Phantom PMMA
Figure 1. Research instruments
The phantom is mounted perpendicular to the central ray.
It is then scanned and figured out that its phantom body
specifications are; 320 mm in diameter, 130 kV in voltage, has a tube current of 93 mAs, and a slice thickness of 8 mm. Once the image data is acquired, the phantom volume can be calculated. Calculation of phantom volume employs the trapezoidal integration method. A flowchart of this research is shown in Figure 2.
Figure 2. Research flowchart.
III. RESULT AND DISCUSSION
This research uses two instruments: a CT scanner as the radiation source and an acrylic cylindrical PMMA phantom as the object. The equipment used is shown in Figure 1.
A. Image Processing
Phantom image processing begins with the acquisition of
CT Scan images in DICOM format. Acquired images consist
of 18 slices, each with 512 x 512 pixels and 8 mm slice
thickness. Each slice area is then calculated, before being
integrated with the slice thickness to obtain its volume. Image
processing is conducted by the process of transforming gray
scale image into binary images. One of the gray scale images
of the samples and its resulting binary image is shown in
Figure 3. In Figure 3 (a) shows the gray scale image of a
phantom that is assumed to be homogeneous form of cancer.
Then the gray scale image is converted into a binary image, so
it will be visible boundaries of the cancer as in Figure 3 (b).
Results of a binary image in Figure 3 (b) will be used to
calculate the slice area of the phantom.
(a) Grayscale Image (b) Binary Image
Figure 3. Image processing results of phantom image
B. Phantom Slice Area
Calculation of phantom slices area is done by calculating each area of the image using the following equation:
0 1 2 511 5122 2 22
hA L L L L L (9)
Where,
A is the area of phantom slice
h is the spacing between pixels
L is the area of each column
The resulting phantom slice area is still in pixel unit.
Therefore, it must be converted into 2mm unit with the
following formula:
2
2
A pixelA mm
spatialresolution (10)
The resulting area is then compared to phantom slice area manual calculation results. This manual calculation itself employs the following formula:
21
4A d (11)
where A is the area of phantom slice (manual) and d is the
diameter of phantom (manual). Comparisons between manual and automated calculation results are shown in Table I.
TABLE I. AREA OF PHANTOM SLICE
C. Phantom Volume
Calculation of phantom volume is carried out by integrating each area of phantom slice with its slice thickness using the following equation:
V slice thickness A (12)
Where V is the volume of phantom, while A is area of
phantom slice.
The resulting phantom volume is them compared to the manual phantom volume calculation results. This manual calculation itself employs the following formula:
V A h (13)
Where V is the volume of phantom (manual), A is the area of phantom slice (manual), and h is the height of phantom (manual)
TABLE II. VOLUME OF PHANTOM
Comparisons between manual and developed method calculation results are shown in Table II. Calculation results of phantom volume show that the method developed is capable to calculation of phantom volume. The errors resulting from miscalculations area, slice thickness and the distance between the slice of the phantom image. Error value 3.67% is obtained from the comparison of manual calculation and results of calculation using developed method.
IV. CONCLUSION
In this research, it is successfully developed an image processing method that calculates phantom volumes. This method utilizes thresholding operation and trapezoidal integration for each image slice of the phantom. Phantom volume is then subsequently calculated by integrating all area with the slice thickness. Compared to phantom volume calculation with the manual method, this developed method has an error value of only 3.63%. Hence, this method is highly accurate. This method only process the the CT scan output image, not embedded in CT-Scan system.
ACKNOWLEDGMENT
This research was funded by the Indonesian Directorate General of Higher Education Program in 2016.
REFERENCES
[1] J.T. Bushberg, The Essential Physic of Medical Imaging, 2nd ed, Lippincott Williams & Wilkins, Philedelphia USA, 2002.
[2] S.C. Bushong, Radiologic Science for Technologist Physic, Biologic and Protection, The CV. Mosby Company, United States of America, 2001.
[3] American Association of Physicist in Medicine, Size-Spesific Dose Estimate (SSDE) in Pediatric and Adult Body CT Examinations, America, 2011 [AAPM Report No.204].
[4] J.M. Goo, T. Tongdee, R. Tongdee, K. Yeo, C.F. Hildebolt, K.T. Bae, K.T., “Volumetric measurement of synthetic lung nodules with multi-detector row CT: effect of various image reconstruction parameters and segmentation thresholds on measurement accuracy”. Radiology. 2005;235(3):850–56.
[5] K. Marten, F. Auer, S. Schmidt, G. Kohl, E.J. Rummeny, and C. Engelke, “Inadequacy of manual measurements compared to automated CT volumetry in assessment of treatment response of pulmonary metastases using RECIST criteria”. Eur Radiol. 2006;16(4):781–90
Slice
number
Area (mm2) Error (%)
Manual System
1 80424.77 79921.34 0.63
2 80424.77 79748.25 0.84
3 80424.77 79756.47 0.83
4 80424.77 79738.66 0.85
5 80424.77 79732.73 0.86
6 80424.77 79723.59 0.87
7 80424.77 79718.57 0.88
8 80424.77 79699.85 0.90
9 80424.77 79697.11 0.90
10 80424.77 79691.17 0.91
11 80424.77 79690.71 0.91
12 80424.77 79679.75 0.93
13 80424.77 79679.29 0.93
14 80424.77 79669.70 0.94
15 80424.77 79671.07 0.94
16 80424.77 79664.22 0.95
17 80424.77 79675.64 0.93
18 80424.77 79859.23 0.70
Slice
Number
Volume (mm3) Error (%)
Manual Developed Method
1 to 18 11581167.16 11160708 3.63
[6] J.G. Ravenel, W.M. Leue, P.J. Nietert, J.V. Miller, K.K Taylor, G.A.
Silvestri, “Pulmonary nodule volume: effects of reconstruction parameters on automated measurements – a phantom study”. Radiology. 2008;247(2):400–08.
[7] K. Adi, S. Pujiyanto, R. Gernowo, A. Pamungkas, and A.B. Putranto, “Identifying the developmental phase of plasmodium falciparum in malaria-infected red blood cells using adaptive color segmentation and back propagation neural network”, International Journal of Applied Engineering Research, 2016, 11 (15), pp. 8754-8759.
[8] K. Adi, S. Pujiyanto, R. Gernowo, A. Pamungkas, and A.B. Putranto, “Identification of plasmodium falciparum phase in red blood cells using artificial neural networks”, International Journal of Applied Engineering Research, 2014, 9 (22), pp. 13917-13924.
[9] K. Adi, T.L.R. Mengko, A.B. Suksmono, and H. Gunawan, “Phase unwrapping using energy minimization methods for MRI phase image”,
International Journal of E-Health and Medical Communications, 2010, 1 (3), pp. 50-56.
[10] C.E. Widodo, K. Adi, A. Sugiharto, Q.M.B. Soesanto, and A. Pamungkas, “Volume target delineation for brain tumor in MRI images using active contour segmentation method”, International Journal of Applied Engineering Research, 2016, 11 (16), pp. 9031-9036.
[11] B. Carderquist, “Evaluation of Two Thin CT Dose Profiler Detector and New Way to Perform QA in a CTDI Head Phantom”, Departement of Radiation Physics Goteborg University: Sweden, 2008.
[12] R.C. Gonzalez, and R.E. Woods, Digital Image Processing, 2nd ed, Prentice-Hall Inc., New Jersey, 2002.
[13] S.C. Chaptra, Applied Numerical Methods with MATLAB, 3rd ed, McGraw-Hill, New York, 2012.