scholarly journals Analisis dan Perancangan Sistem Karcis Elektronik Pada Gerbang Masuk Busway Dengan Menggunakan RFID

Author(s):  
Suryadiputra Liawatimena

The aim of this study is to use Radio Frequency technology to facilitate human activities, especially used in Busway entrances. In this research methodologies used include field survey to the BP Transjakarta; literature study by reading manuals, text books, journals, and articles on the Internet, and conduct laboratory experiments on the Bina Nusantara University Hardware Research Laboratory in designing and making the minimum system . Based on the results of an experiment and taking data on the minimum system, it can be concluded in general the performance of the system is running well, but the response time was not optimal. Some improvements to the system needed to improve system performance, such as raising response time, improved data security, and online systems. 

Author(s):  
Bayu Kanigoro ◽  
Andy Wijaya ◽  
C. N. Firmana ◽  
Astari Jusman

Web and mobile technology help a lot of business activities since it can be accessed from the Internet and intranet networks so that flow of the information needed can reach out various locations. Web and mobile technology combined with E-CRM technology like helpdesk can be used to improve services. This study aims to design a web-based claim management system (supported with helpdesk system) and its BlackBerry® application for PT. Hoppecke Indonesia. An analysis through literature study and field survey (interview to the employees of PT. Hoppecke Indonesia) is implemented in this study based on the incremental method. The result achieved is a design web-based claims management system and the BlackBerry® application. The design is expected to maintain the relationship between customers and companies, especially in term of item maintenance and to make easy for customers to obtain information that will lead to loyalty to the company. Plus, the documentation of each interaction between customer and the company can be recorded properly. 


2017 ◽  
Vol 11 (3) ◽  
pp. 225
Author(s):  
Gabriella Calista Agnes

Abstract: A house is a basic need for every human’s life. It is not only a place for shelter, but also a place for a family to live, to have social interaction between them, to raise the children, and to give the values of life. Padma Residence is a modern residence which is built by PT. Surya Coco Jaya. Most of its residents make changes to their houses after they occupy it. The main purpose of this study is to observe changes toward the initial design by comparing the initial design and present condition, recording the present condition of the house when it has occupied by determine architectural elements which are changed, determining causal factors of changes, and finding out dominant causal factors toward alteration of architectural elements of the house at Padma Residence, Bantul, Yogyakarta while it is occupied. Methods used in data collecting are literature study and a field survey. A field survey includes observation, interview, and distributing questionnaires to 25 respondents who are the owners of houses in this residence. Data analysis used table which compare the initial design and nowadays condition. The result of data processing and analyzing reveals that the owners do physical changes at their houses while they occupy them, particularly at the front appearance of the house. The changes include the addition of canopies at carport and changes in the layout of the rooms, such as kitchen, dining room, and backyard. A dominant factor which has caused those changes is the function of rooms which is added to the house.Keywords: residence, physical changes, the additon of functionAbstrak : Rumah merupakan kebutuhan utama bagi kehidupan setiap manusia. Selain sebagai tempat untuk berlindung, rumah juga merupakan wadah atau tempat manusia atau sebuah keluarga melangsungkan kehidupannya. Perumahan Padma Residence merupakan sebuah hunian modern yang dibangun PT. Surya Coco Jaya dan sebagian besar penghuninya melakukan perubahan pada rumah tinggalnya saat ditempati. Tujuan utama penelitian ini adalah mengetahui perubahan terhadap desain awal rumah tinggal dan kondisi rumah tinggal tersebut saat ditempati dengan mengetahui unsur-unsur arsitektural yang berubah pada desain rumah tinggal saat ditempati di Perumahan Padma Residence, Bantul, Yogyakarta. Metode penelitian dilakukan dengan studi literatur dan survei lapangan. Survei lapangan meliputi pengamatan, wawancara, dan penyebaran kuesioner kepada 25 responden yang merupakan pemilik rumah tinggal di perumahan tersebut. Hasil dari pengolahan dan analisis data menunjukkan bahwa pemilik rumah melakukan perubahan fisik pada rumah tinggalnya saat ditempati, terutama pada tampilan depan bangunan, perubahan yang dilakukan adalah menambahkan kanopi pada carport, peletakan ruang seperti dapur, ruang makan, dan taman belakang. Faktor-faktor yang menjadi penyebab perubahan tersebut adalah pertambahan fungsi ruang.Kata kunci: rumah tinggal, perubahan fisik, pertambahan fungsi


2017 ◽  
Vol 3 (2) ◽  
pp. 76
Author(s):  
Octarina Nur Samijayani ◽  
Ibnu Fauzi

<p><em>Abstrak</em> - <strong>Keamanan rumah menjadi hal yang sangat penting ketika pemilik rumah meninggalkan rumah dalam keadaan kosong. Selain pencurian, kebakaran juga merupakan masalah yang sering kali terjadi ketika rumah ditinggal pemiliknya. Sebagai alternatif solusi untuk menjaga dan mengawasi rumah yang diajukan pada penelitian ini ialah menggunakan teknologi Jaringan Sensor Nirkabel yang terintegrasi dengan jaringan internet, sehingga pemilik rumah tetap dapat mengawasi keadaan rumah dari jarak jauh. Pada penelitian ini dirancang prototype sistem rumah pintar atau Smart Home yang memanfaatkan teknologi Jaringan Sensor Nirkabel menggunakan standard Zigbee. Beberapa node sensor ditempatkan pada peralatan rumah, dimana setiap node dapat saling berkomunikasi secara wireless dan terpusat di node kordinator. Selanjutnya node kordinatior akan terhubung ke jaringan internet sehingga pemilik rumah dapat membuka aplikasi smart home kapan saja dan dimana saja. Rancangan sistem <em>Smart Home</em> disimulasikan menggunakan rumah model untuk menguji kinerja perangkat <em>Smart Home</em>. Pengujian kinerja Smart Home dimulai dengan pengujian keakurasian masing masing data sensor hingga waktu respon komunikasi dari sensor ke pusat monitoring. Tingkat error pembacaan suhu disetiap ruangan ialah 1 - 4.27%. Sensor PIR berhasil mendeteksi keberadaan orang di suatu ruangan dengan waktu delay </strong><strong>adalah 2.8 detik dengan jarak maksimal 5 meter</strong><strong>. Fungsi kendali dan monitoring (<em>on/off</em>) perangkat elektronik bekerja dengan baik, dengan waktu respon kurang dari 1 detik. Dari hasil pengujian komunikasi nirkabel antar node, diperoleh bahwa jarak maksimal antar node ialah sekitar 20 m, dengan rata-rata waktu respon pengiriman data ialah 1-2 detik. Adapun waktu respon mengalami delay mencapai 2 detik apabila beberapa perintah kendali dilakukan pada waktu yang bersamaan.</strong></p><p> </p><p><strong><em>Kata Kunci - </em></strong><em>Smart Home</em>, Jaringan Sensor Nirkabel, Zigbee.</p><p> </p><p><em>Abstrak</em><strong> - Home security becomes very important when homeowners leave the house empty. In addition to theft, fire is also a problem that often occurs when the house left the owner. As an alternative solution to maintain and supervise the homes submitted in this study is to use Wireless Sensor Network technology integrated with the Internet network, so that homeowners can still monitor the state of the house remotely. In this study designed prototype smart home system or Smart Home which utilizes Wireless Sensor Network technology using Zigbee standard. Some sensor nodes are placed in the home equipment, where each node can communicate wirelessly and centrally at the coordinator node. Next node coordinate will be connected to the internet network so that homeowners can open smart home application anytime and anywhere. The Smart Home system design is simulated using a home model to test the performance of Smart Home devices. Smart Home performance testing begins with testing the accuracy of each sensor data until the communication response time from the sensor to the monitoring center. The error rate of temperature readings in each room is 1 - 4.27%. PIR sensor successfully detects the presence of people in a room with a delay time is 2.8 seconds with a maximum distance of 5 meters. The control and monitoring functions (on / off) of electronic devices work well, with a response time of less than 1 second. From the results of testing wireless communication between nodes, obtained that the maximum distance between nodes is about 20 m, with the average response time of data transmission is 1-2 seconds. The response time has a delay of 2 seconds if some control commands are done at the same time.</strong><strong></strong></p><p><strong> </strong></p><p><strong><em>Keywords - </em></strong> <em>Smart Home</em>, Jaringan Sensor Nirkabel, Zigbee.</p>


Author(s):  
Zoltán Rusák ◽  
Niels van de Water ◽  
Bram de Smit ◽  
Imre Horváth ◽  
Wilhelm Frederik Van Der Vegte

Brain signal and eye tracking technology have been intensively applied in cognitive science in order to study reading, listening and learning processes. Though promising results have been found in laboratory experiments, there are no smart reading aids that are capable to estimate difficulty during normal reading. This paper presents a new concept that aims to tackle this challenge. Based on a literature study and an experiment, we have identified several indicators for characterizing word processing difficulty by interpreting electroencelography (EEG) and electrooculography (EOG) signals. We have defined a computational model based on fuzzy set theory, which estimates the probability of word processing and comprehension difficulty during normal reading. The paper also presents a concept and functional prototype of a smart reading aid, which is used to demonstrate the feasibility of our solution. The results of our research proves that it is possible to implement a smart reading aid that is capable to detect reading difficulty in real time. We show that the most reliable indicators are related to eye movement (i.e. fixation and regression), while brain signals are less dependable sources for indicating word processing difficulty during continuous reading.


Author(s):  
Rohitkumar Rudrappa Wagdarikar ◽  
Sandhya P

<p>A WS provides the communication between heterogeneous systems. While performing this operation, we need to focus on QoS of consumer, provider and registry directory. There will be some parameters like WS selection, prediction and rank these are parameters need to consider while QoS implementation in web services. While performing integration in web services we need to focus on QoS requirements regarding server and network performance. Performance of WS is related to locations i.e the network distance and the Internet connections between consumer and provider. There will be more QoS approach which works on consumers collected QoS data, based on this data system can predict the QoS of WS. Throughput and response time are the QoS of WS. In this paper, we have proposed parallel XML parser, by which we can parse UDDI, WSDL and SOAP XML files parallel by which it will improve the response time and throughput of WS.</p>


Author(s):  
Ibrahim Mahmood Ibrahim ◽  
Siddeeq Y. Ameen ◽  
Hajar Maseeh Yasin ◽  
Naaman Omar ◽  
Shakir Fattah Kak ◽  
...  

Today, web services rapidly increased and are accessed by many users, leading to massive traffic on the Internet. Hence, the web server suffers from this problem, and it becomes challenging to manage the total traffic with growing users. It will be overloaded and show response time and bottleneck, so this massive traffic must be shared among several servers. Therefore, the load balancing technologies and server clusters are potent methods for dealing with server bottlenecks. Load balancing techniques distribute the load among servers in the cluster so that it balances all web servers. The motivation of this paper is to give an overview of the several load balancing techniques used to enhance the efficiency of web servers in terms of response time, throughput, and resource utilization. Different algorithms are addressed by researchers and get good results like the pending job, and IP hash algorithms achieve better performance.


Author(s):  
P. P. Joby

At present, the traditional healthcare system is completely replaced by the revolutionary technique, the Internet of Medical Things (IoMT). Internet of Medical Things is the IoT hub that comprises of medical devices and applications which are interconnected through online computer networks. The basic principle of IoMT is machine-to-machine communication that takes place online. The major goal of IoMT is to reduce frequent or unwanted visits to the hospitals which makes it comfortable and is also highly preferred by the older people. Another advantage of this methodology is that the interpreted or collected data is stored in cloud modules unlike amazon and Mhealth, making it accessible remotely. Although there are countless advantages in IoMT, the critical factor lies in data security or encryption. A surplus number of threat related to devices, connectivity, and cloud might occur under unforeseen or threatening circumstances which makes the person in the situation helpless. Yet, with the help of data security techniques designed especially for Internet of Medical Things, it is possible to address these challenges. In this paper, a review on data securing techniques for the internet of medical things is made along with a discussion on related concepts.


2020 ◽  
Vol 1 (1) ◽  
pp. 11-22
Author(s):  
Asaad A. Hani

There is a great research in the field of data security these days. Storing information digitally in the cloud and transferring it over the internet proposes risks of disclosure and unauthorized access; thus, users, organizations, and businesses are adapting new technology and methods to protect their data from breaches. In this paper, we introduce a method to provide higher security for data transferred over the internet, or information based in the cloud. The introduced method for the most part depends on the Advanced Encryption Standard (AES) algorithm, which is currently the standard for secret key encryption. A standardized version of the algorithm was used by The Federal Information Processing Standard 197 called Rijndael for the AES. The AES algorithm processes data through a combination of exclusive-OR operations (XOR), octet substitution with an S-box, row and column rotations, and MixColumn operations. The fact that the algorithm could be easily implemented and run on a regular computer in a reasonable amount of time made it highly favorable and successful. In this paper, the proposed method provides a new dimension of security to the AES algorithm by securing the key itself such that even when the key is disclosed; the text cannot be deciphered. This is done by enciphering the key using Output Feedback Block Mode Operation. This introduces a new level of security to the key in a way, in which deciphering the data requires prior knowledge of the key and the algorithm used to encipher the key for the purpose of deciphering the transferred text.


Author(s):  
Gloria Calhoun ◽  
Heath Ruff ◽  
Elizabeth Frost ◽  
Sarah Bowman ◽  
Jessica Bartik ◽  
...  

A key challenge facing automation designers is how to achieve an ideal balance of system automation with human interaction for optimal operator decision making and system performance. A performance-based adaptive automation algorithm was evaluated with two versus six monitored task types. Results illustrate the importance of level of automation choices in control schemes.


Sign in / Sign up

Export Citation Format

Share Document