scholarly journals Rancang Bangun Sistem Komunikasi antar UAV untuk Formasi UAV

Author(s):  
Rendra Dwi Firmansyah ◽  
Esa Apriaskar ◽  
Tika Erna Putri

UAV formation is one of techology development in UAV world. The UAV formation can be utilized in various fields including agriculture, mapping and defense security (HANKAM). Communication is one of the important components in making UAV formations. To make UAV formations, position and direction data (AHRS) from each UAV will be sent to other UAVs so that when forming UAV formation, no collisions occur between UAVs. This study uses a star topology like the one on a computer network. This method involves two or more UAVs, both of which will exchange data. In this study the data sent is in the form of a dummy data package using the xbee module. The purpose of this study is the initial model of communication between UAVs which can later be developed into more complex communication models for many UAVs. The results obtained in the form of maximum communication distance between UAVs is 50m and the recommended optimal distance is 10-20m.

2020 ◽  
Vol 8 (2) ◽  
pp. 177
Author(s):  
Ni Putu Ega Meiliana Wijaya ◽  
I Komang Ari Mogi

Smart school is a technology-based school concept used in the teaching and learning process in the classroom. The use of educational technology includes an integrated system that assists the educational community in carrying out their respective functions with the aim of developing the potential of students. The use of technology in the field of education is expected to help and facilitate students and schools in conducting learning so that technology is able to facilitate and solve problems in learning. In building smart schools, it is also necessary to design technology developed in technology. The concept of network development that will be used is to use the Top-Down method and the topology used is to use ring topology and star topology. With the development of smart schools, it is expected that education using technology will continue to develop.


Author(s):  
G. Golovko ◽  
Ye. Chaika ◽  
M. Luchko

The subject matter of the article is the process of matching the optimal solutions for improving the local computer network. The purpose is to update the existing local computer network of the enterprise Magnetic Corporation. The task is to justify the opportunity for using various types of network applications and components. Having applied knowledge about the characteristics of each viewing items’ properties, the obtained results are used to enter them into a single network. To summarize the conclusions: in order to maximize network productivity the local computer network with a dedicated server was selected, i.e. star topology, that has led to an increase in network security and an increase in the speed of fixing problems in any workstation without affecting the overall network health.


2013 ◽  
Vol 13 (4-5) ◽  
pp. 815-830 ◽  
Author(s):  
JIEFEI MA ◽  
FRANCK LE ◽  
DAVID WOOD ◽  
ALESSANDRA RUSSO ◽  
JORGE LOBO

AbstractThere is an increasing interest in using logic programming to specify and implement distributed algorithms, including a variety of network applications. These are applications where data and computation are distributed among several devices and where, in principle, all the devices can exchange data and share the computational results of the group. In this paper we propose a declarative approach to distributed computing whereby distributed algorithms and communication models can be (i) specified as action theories of fluents and actions; (ii) executed as collections of distributed state machines, where devices are abstracted as (input/output) automata that can exchange messages; and (iii) analysed using existing results on connecting causal theories and Answer Set Programming. Results on the application of our approach to different classes of network protocols are also presented.


2014 ◽  
Vol 631-632 ◽  
pp. 902-905
Author(s):  
Yan Wang ◽  
Jun Hui Zheng

By analyzing a variety of computer network architectures, we can find that researchers establish different computer network models from their different starting points and get different computer network architectures by different modularization methods. We establish a well modularized non-layered computer network architecture. This paper compares it with the layered architecture and obtains a conclusion that it is superior to the layered architecture. We have developed two framework prototypes of it. In the one of them we develop some application softwares of TCP/IP, including E-mail, FTP, Web and standard IP telephone, which have been tested by the third-party. It could show the accuracy and easily implemented property of this architecture.


Compiler ◽  
2013 ◽  
Vol 2 (2) ◽  
Author(s):  
Alfian Firdaus ◽  
Haruno Sajati ◽  
Yuliani Indrianingsih

Development o f information technology and computer networks in particular its services on the one hand facilitate the work of human beings, but as the very widespread use of the internet, the security level of digital data has become more vulnerable to exploitation. The problem arises when the attacks happened on a computer network in a relatively fast, so that an administrator must always keep an eye on the computer network security. Limitations o f an administrator is exactly what underlies thecreation o f a system capable o f detecting and prevention of these attacks, so the time efficiency can be actually implemented. The system is built to prevent attacks on computer networks such as port scanning, ftp, ssh and telnet brute force. This system will analyze the number o f errors that occur on login these services, and makes a decision system if the login error exceeds the tolerance of an administrator. I f the number o f errors exceeds the tolerance, it will automatically create the firewall rules in a very short duration is one minute, so the system is able to prevent the attacks which happened in a very quick time.


2019 ◽  
Author(s):  
Bayu Kurniawan

Computer network connection is a fundamental thing in a network because if a connection is problematic, then all types of applications that run through a computer network cannot be used. Cisco Packet Tracer can be used for simulations that reflect a picture of the computer network connection on the network system used. This paper designs two designs, namely the design with a star topology from one server using Cisco Packet Tracer software and connecting networks between computers. The results of this study are the connection between computer networks. This study was conducted to find out whether the server and client computers can communicate with each other


2020 ◽  
Vol 7 (1) ◽  
pp. 1-27
Author(s):  
Marta Mas-Machuca ◽  
◽  
Frederic Marimon

The objective of this paper is to analyse the process of the definition and deployment of a company’s mission, to obtain a better understanding of the employees’ role. On the basis of the literature investigating the dimensions of the internalization of a mission (leadership, importance, knowledge, co-workers’ engagement and implication), the paper proposes a model that shows the cause and effect relationships among these dimensions. A survey addressed to Spaniards was launched, and 400 valid responses were received. The data was analysed using Structural Equation Modelling (SEM) for an initial model that shows the causal relations among the dimensions for the internalization of a mission. An array of Lagrange multiplier tests suggested modifications for refining the model and proposed one with acceptable fit indices, where the last dimension to be accomplished is “Implication”. The findings show a direct effect between “Leadership” and “Implication”, and double mediation. On the one hand, there is second order mediation through “Knowledge” and “Importance”. On the other hand, there is mediation through “Co-workers’ engagement”. This sequencing among the five dimensions of the internalization of the mission gives new clues and evidence for managers that will help them to define and implement a successful mission statement.


Author(s):  
Made Sudarma

Computer network traffic is computer activity information in a network which explains interconnection between communication processes. The complexity of network traffic itself depends on the number of communication models used. The utilization of classification analyzing of network incident traffic is one of utilization forms of network traffic. The accuracy of classification model itself depends heavily on the formation of data training. The usage of C4.5 method in the establishment of decision tree in data training toward network incident traffic is with the basis to see the efficiency of decision tree formation. Wireshark tool is used as network capture tool to perform data acquisition in the formation of data training.


2012 ◽  
Vol 25 (2) ◽  
pp. 167-196
Author(s):  
J. Kiskiras ◽  
I. M. Jaimoukha ◽  
G. D. Halikias

2018 ◽  
Vol 2 (6) ◽  
Author(s):  
Qing Hu

Abstract: Following the advent of and continuous progress of technology, computer network and information management have gradually being incorporated into the daily operation and management of university libraries all around the world. The service system of university libraries have also transformed from the conventional reference consulting model into a knowledge-based service model. This transformation has improved the professionalism and individualism of university libraries. Therefore, establishing a competent one-stop information service model has significant and important values. In this work, we analysed the basic functionalities and the feasibility of one-stop information service model for university libraries. We also discussed in details the construction methodology for different modes, for reference only. 


Sign in / Sign up

Export Citation Format

Share Document