scholarly journals PENERAPAN METODE GERAKAN OBYEK UNTUK PENGAMBILAN CITRA DIGITAL PADA OBTION REMOTE VERSI 1.0

Compiler ◽  
2012 ◽  
Vol 1 (1) ◽  
Author(s):  
Astika Ayuningtyas ◽  
Agus Basukesti ◽  
NurCahyani Dewi Retnowati

Development of the world's information and communication technology-based growing rapidly. The development of these technologies has given rise to another dimension in human life, namely the need for computer use. Application of machine vision applications where a computer has the ability to understand the data in the form of image and make decisions based on data obtained from a real object, in this case is generated through the capture image from webcam.            The images (digital images) of a real object through a webcam can be done in many ways capture the object. In this research object retrieval using an object of activity is captured on the webcam through the motions of objects. Digital image acquisition is performed with the tool in the form of software (Obtion Remote Version 1.0). Obtion (Object Detection) method works with the system of comparison between that time frame the previous frame captured by the camera at the time of recording the object. Comparison of the difference in the frame will be accommodated in a place that will be used to support the execution of an object by counting the number of pixels that exceed the value of the difference in number of field values with regulator frame to frame changes in the location of the object motionObtion Remote Version 1.0 will take a digital image of the object with trigger object motion detection performed. Digital image acquisition (capture the object with a webcam) will be done automatically if the object has been successfully detected. The detected object will be stored automatically in the directory are executed as a digital image storage.

2021 ◽  
Author(s):  
Ade Irma Stefi Ulil Amri

Evolution in information and communication technology (ICT) occurs so fast and dynamically that it brings extraordinary changes in various industries and human life. Public relations has also needed to be more responsive and ready with the use of communication technology. Government public relations teams need to be aware of the importance of information and how to manage it. They can use big data to develop communication strategies and as a tool to help make decisions, policies and programs. However, according to previous research, government public relations teams largely use big data for media monitoring. This conceptual paper aims to explore other potential uses of managing big data in government public relations to welcome the age of society 5.0. Keywords: Big data; media monitoring; communication strategy; government public relations


2020 ◽  
Vol 3 (2) ◽  
pp. 174
Author(s):  
Ifah Cholifah ◽  
Ansori Ansori ◽  
Dinno Mulyono

Abstract The development of information and communication technology (ICT) at this time cannot be avoided by various parties. This development has positive and negative impacts on human life. However, these impacts can be managed by humans themselves such as by studying and utilizing these developments in daily life, there will be many positive impacts felt, one of which facilitates the search and dissemination of information, as well as accelerating and facilitating work. However, in reality, utilizing ICT in daily life in accordance with the work of each individual has not been fully implemented. Therefore, this research was carried out with the aim to find out the profile of the use of ICT by Menelik in the Cimahi city education department. The instrument used was a questionnaire that was developed in accordance with ICT literacy level indicators. The results of his research show that the use of ICT by the Penilik in the Cimahi city education office is in the medium category or can be interpreted quite wellKeywords:  penilik, literacy, ICT  Abstrak Perkembangan teknologi informasi dan komunikasi (TIK) pada saat ini tidak dapat dihindari oleh berbagai pihak. Perkembangan ini memberikan dampak yang positif dan negatif bagi kehidupan manusia. Akan tetapi dampak tersebut dapat di kelola oleh manusia itu sendiri seperti dengan mempelajari dan memanfaatkan perkembangan tersebut dalam kehidupan sehari-hari maka akan banyak dampak positif yang dirasakan salah satunya mempermudah pencarian dan penyebaran informasi, serta mempercepat dan mempermudah pekerjaan. Akan tetapi dalam kenyataannya memanfaatkan TIK dalam kehidupan sehari-hari sesaui dengan pekerjaan masing-masing individu belum sepenuhnya dilaksanakan. Oleh karana itu, dilaksanakan penelitian ini dengan tujuan untuk mengetahui profil pemanfaatan TIK oleh penilik di lingkungan dinas pendidikan kota Cimahi. Intrumen yang digunakan adalah angket yang dikembangkan sesuai dengan indikator tingkat literasi TIK. Hasil penelitiannya menunjukan bahwa pemanfaatan TIK oleh penilik di lingkungan dinas pendidikan kota Cimahi berada pada kategori sedang atau dapat diartikan cukup baik.Kata Kunci: penilik, literasi, TIK


Author(s):  
Fauziyah Ikrimah ◽  
M. Alief Rindianto ◽  
Fikry Zahria Emeraldien ◽  
Muhammad Wahyu Pratama

The development of information and communication technology plays an important role in meeting the needs of people from various sectors of life, one of which is da'wah. Da'wa activities which are usually carried out face to face, can now be done anywhere and anytime without being constrained by time and place. Youtube is one of the platforms that is often used as a medium of da'wa because Youtube makes it easy to access and spread da'wa messages, especially when conflicts arise in the name of certain groups. This is because the resulting conflict is contrary to the principles of human life, harmony and peace. Therefore, to minimize the occurrence of these conflicts, the application of religious moderation is quite important and is expected to be a 'reducer' for the religious ways of extremist communities. To deal with this, we need some kind of da'wa content that invites people to tolerate and understand the differences, one of which is Shihab & Shihab's Youtube content "Wasathiyyah Islam, Islam in the middle."


2018 ◽  
Vol 1 (2) ◽  
pp. 197
Author(s):  
Reno Supardi

Abstrack - Information and communication technology has developed rapidly, giving a great influence to human life. The development of network and internet technology allows everyone to exchange data, information, or messages to others without limitation of distance and time. Security and confidentiality are important aspects needed in the process of exchanging messages / information. The author uses steganography with the Bit Matching method that will hide information in the form of text into other digital image media. After being analyzed and implemented using the Visual Basic 2010 programming language, it was found that the text that was inserted into the image still looked normal so that it did not raise suspicion for those who saw it. The size of the capacity of a digital image affects how many characters a text message can be hidden. The greater the number of text message characters that will be hidden, the greater the size of the digital image. It is expected that this application of steganography can be useful in the fields of education and science especially in concealing text messages and can be continued for future research. Keywords - Digital Image, Bit Matching, Visual Basic 2010


Author(s):  
Po-han Chiu

The goal of this research is to use information and communication technology (ICT) to develop so-called “virtual field trip” s ystem and the software follows the principles of the anchored instruction, whereby we can design a worksheet for outdoor education. The system combines the anchored instruction, worksheet, and image-based VR in order to make it as a supplementary tool for students before they have a field trip and to raise their learning motivation. Besides, the research also discusses the difference between traditional outdoor education and the model mentioned above.


2018 ◽  
Vol 1 (2) ◽  
pp. 118-124
Author(s):  
Arif Hidayat ◽  
Ismail Puji Saputra

Information and communication technology is something that is difficult to separate from human life in the present era. One example of information and communication technology is a network of proxy routers. This study uses the penetration testing method, which aims to analyze the security system of the proxy router that has been applied to Warnet Aulia.net. In analyzing network security, the Mikrotik Router is done by the method of penetration testing where the form of attacks on the network is simulated. In this study Python and Winboxpoc.py were successfully run on the Windows 10 operating system. The results of this study indicate that the network security owned by the Aulia.net cafe network still has many gaps to exploit. As for the results of some attacks, it shows serious things in terms of exploitation, such as the output of getting a proxy router password and username. Therefore, this study also provides a solution on how to prevent the mikrotik router from being exploited. Problem solving is explained using several alternative solutions, so that practitioners or network technicians are expected to be able to utilize knowledge related to the results of this study in order to secure the router.


2018 ◽  
Vol 1 (1) ◽  
pp. 70-90
Author(s):  
Mimi Fahmiyatri ◽  
Neni Efrita ◽  
Ernita Arif

Communication is very important in human life. Every time people communicate, with anyone, anywhere and anytime. In communicating, humans cannot be separated from verbal and nonverbal behavior. In the digital era like now, communication is becoming increasingly sophisticated with the creation of "contemporary" technology known as Information and Communication Technology (ICT). Technological advances have had a huge influence on human life, especially tenagers active gadget users. In the hands of teenagers, gadgets that basically have a function as a tool that can facilitate people in communicating can actually be the cause of the emergence of things that are not good.


2015 ◽  
Vol 8 (1) ◽  
pp. 69 ◽  
Author(s):  
Sarjit S. Gill ◽  
A. T. Talib ◽  
Choo Yeong Khong ◽  
Puvaneswaran Kunasekaran

<p class="1Body">The aim of this article is to investigate the current conditions of the adoption of Information and Communication Technology (ICT) in preserving cultural identity among the ethnic minorities in Peninsular Malaysia. ICT plays a crucial role in the present knowledge-based globalization era and the usage has become a basic necessity for all members of the society in managing their daily lives. It has pervaded every aspect of human life and has significantly changed the manner in which society communicate and interact with one another. This is particularly important as the ethnic minorities in Malaysia inevitably facing the great challenges of losing their cultural identity through the assimilation process into the larger mainstream society. ICT appear as an alternative which help in enhancing the efforts for cultural preservation. The penetration of ICT in ethnic minority everyday life has directly or indirectly provides a platform for them to express and share their ideas, thoughts, perceptions and knowledge about their existing culture. However, are the ethnic minorities have sufficient resources to adopt ICT to preserve their culture is still unexplored. The extent of the ethnic minorities' awareness of the advantages of ICT to preserve their cultural identity is still questionable.</p>


Author(s):  
Farkhod Ozodovich Abdullaev ◽  
Kuvvat Iskandarovich Khamraev ◽  
Shargul Ansatbayevna Arzuova ◽  
Abdumalik Nizomjonovich Abdukayumov

This article shows how the increasing prevalence of digital technologies into various spheres of human life has necessitated change in a number of institutions. First, it grapples with economic institutions that ensure the functioning of a market economy. In addition, the definition of digital economy, the concept of digital economy, the technological developments specific to digital economy, the share of Information and Communication Technology (ICT) in the gross national product of a country, and the analysis of certain indicators of communication and information are also covered in the article.


Sign in / Sign up

Export Citation Format

Share Document