VOL. 23, NO.3 2025

Dublin Core

Title

VOL. 23, NO.3 2025

Collection Items

Indonesian continuous speech recognition optimization with convolution bidirectional long short-term memory architecture
Speech recognition can be defined as converting voice signals into text or lines of words by using algorithms implemented in computer programs. There are several types of speech recognition, including recognition for isolated word speech, continuous…

Jacobian approximation of the Sum-Alpha stopping criterion
This article will report the development of new application of the Sum-Alpha stopping criterion to the case of log – maximum a posterioru Log-MAP turbo decoding. It shows how to adapt Sum-Alphas quantities when using the Log-MAP algorithm and how to…

Convolutional neural network-based real-time drowsy<br /><br />
driver detection for accident prevention
Drowsy driving significantly threatens road safety, contributing to many accidents
globally. This paper presents a convolutional neural network (CNN)-based
real-time drowsy driver detection system aimed at preventing such accidents,
particularly…

A compact triband patch antenna design at terahertz frequencies
The rapid evolution of terahertz (THz) technology has fueled an increasing demand for efficient, compact, and adaptable antennas that can function for a number of frequency bands in the THz spectral regime. This research outlines the analyses and…

Leveraging technology to improve tuberculosis patient adherence: a comprehensive review
Tuberculosis (TB) is a chronic disease that requires long-term treatment, generally for at least 6 to 9 months. Patients should follow the recommended treatment scheme regularly and completely. Poor adherence to treatment can cause patients to remain…

Implementation of ICMP flood detection and mitigation system based on software-defined network and sFlow-RT
This study evaluates internet control message protocol (ICMP) flood detection and mitigation in software-defined networks (SDN) using an SDN architecture with sFlow-RT for real-time traffic monitoring. OpenFlow switches and sFlow agents detect…

Reversible data hiding with selective bits difference expansion and modulus function
The integration of the internet of things (IoT) has significantly enhanced human life but also raises concerns about information security and privacy. Information security can be achieved through cryptography, which encrypts data to make it…

Design and simulation of rectangular patch antenna arrays with high bandwidth for 2.4 GHz ISM band applications
Ongoing advancements in microstrip patch antenna (MPA) development research is driven by its compact size, cost-effectiveness and ease of fabrication. This paper presents a flexible design of patch antenna array (PAA) to address bandwidth (BW)…

Integrating artificial intelligence into accounting systems: a qualitative study on user experiences and challenges
This research explores the integration of artificial intelligence (AI) in accounting systems, focusing on user experiences and challenges faced by accountants and financial professionals. Using qualitative methods, in-depth interviews with diverse…

Website-based: smart goat farm monitoring cages
Goat farming holds significant profit potential due to high community demand for goat meat and its role in supporting national food security. To optimize its development, proper and efficient farm management is essential. This study aims to design a…
View all 26 items

Collection Tree