scholarly journals Application of the Knuth-Morris-Pratt Algorithm on Android-based Money Recognition Applications for the Blind

2021 ◽  
Vol 13 (2) ◽  
pp. 82-93
Author(s):  
Yoga Prasetia ◽  
Ghulam Asrofi Buntoro ◽  
Dwiyono Ariyadi

Blind is a term used to define the human condition given a privilege by God in the sense of sight, this condition makes blind people have a little difficulty in carrying out daily activities. Money is a primary human need and is very important for daily buying and selling transactions. Indonesian money, especially paper money, has an embossed line that can help people with visual impairments a little, but there is some money circulating in the market that is damaged or missing lines of appearance which makes it difficult for blind people to recognize the nominal of the money. The research was conducted at the “AISYIYAH” Orphanage for the Blind in Ponorogo by conducting several interviews with blind people, the informants provided information that they could recognize money on a daily basis but only applies to banknotes with good condition and the latest output, for damaged banknotes. or the old output is hard to identify. To help the blind recognize money, an android-based application was designed with the Knuth-Morris-Pratt algorithm which is a type of string matching algorithm. This algorithm is a development algorithm from the previous algorithm, namely the Brute Force algorithm. The final result of this study shows that the android application designed using the Knuth-Morris-Pratt algorithm is able to recognize nominal money with an accuracy rate of 100%.

2020 ◽  
Vol 8 (4) ◽  
pp. 389-397
Author(s):  
Meghan J. Dudley ◽  
Jenna Domeischel

ABSTRACTAlthough we, as archaeologists, recognize the value in teaching nonprofessionals about our discipline and the knowledge it generates about the human condition, there are few of these specialists compared to the number of archaeologists practicing today. In this introductory article to the special section titled “Touching the Past to Learn the Past,” we suggest that, because of our unique training as anthropologists and archaeologists, each of us has the potential to contribute to public archaeology education. By remembering our archaeological theory, such as social memory, we can use the artifacts we engage with on a daily basis to bridge the disconnect between what the public hopes to gain from our interactions and what we want to teach them. In this article, we outline our perspective and present an overview of the other three articles in this section that apply this approach in their educational endeavors.


2021 ◽  
Vol 1 (2) ◽  
pp. 54-60
Author(s):  
Candra Irawan ◽  
Mudafiq Riyan Pratama

String matching is an algorithm for matching a text to another text or also known as a text search. There are several algorithms that can be used for string matching, including the Boyer-Moore algorithm and the Brute Force algorithm. The Boyer-Moore algorithm is a string matching algorithm published by Robert S. Boyer and J. Strother Moore in 1977. This algorithm is considered the most efficient algorithm in general applications. The Boyer-Moore algorithm starts matching characters from the pattern on the right. While the Brute Force algorithm is an algorithm that matches a pattern with all text between 0 and n-m to find the existence of a pattern in the text. These two algorithms have different patterns in the search process. In this article, a comparative analysis of the performance of the Boyer-Moore and Brute Force algorithms is carried out in a case study of the search for the Big Indonesian Dictionary (KBBI) based on Android. The search process is carried out by searching based on words and word descriptions. The results of this study indicate that the criteria for running time, the Brute Force algorithm is faster than the Boyer-Moore algorithm with the total running time of the Brute Force algorithm is 168.3 ms in words, 6994.16 ms in word descriptions, while the Boyer-Moore algorithm for running time reached 304.7 ms on the word, 8654.77 ms on the word description. In the testing criteria based on related keywords, the two algorithms can display the same list of related keywords.


-At present the currency recognition for visually impaired and blind people has becomes a vital topic for the researchers in the different applications. The money exchange is an important part of our daily life activities. But it becomes very difficult for visually impaired and blind people to recognize the currency values in the financial exchanges and they easily betrayed by the other people. Accordingly, there seems an urgent requirement to scheme a framework that is useful in recognizing paper money notes accurately. There is a huge area for currency differential detection and it has evolved over many years. The paper explores currency identification and provides a comprehensive overview of the current literature on techniques for identifying currency notes, encouraging the survey effort to provide an effective system for blind and visually impaired people


Author(s):  
Longzhuang Li ◽  
Ajay K. Katangur ◽  
Naga Nandini Karuturi

This article describes how it is impractical for a person to remember everything that they do on a day-to-day basis. To address this issue, an android location based reminder system (SmartNotify) that function on users' activities and points of interest are developed. SmartNotify automatically updates preferences of the user based on location behavior on a daily basis using validation from the stay detection algorithm. In addition, SmartNotify provides suggestions for the best locations that people visit frequently in the nearby area by making use of the DBSCAN algorithm and the Apriori algorithm. The utilization of data mining techniques in the android application makes the reminder application more efficient than the traditional way of notifying the user about their events.


2019 ◽  
Vol 5 (2) ◽  
pp. 140
Author(s):  
Rachmad Fitriyanto ◽  
Anton Yudhana ◽  
Sunardi Sunardi

Management of jpeg/exif file fingerprint with Brute Force string matching algorithm and Hash Function SHA256Metode pengamanan berkas gambar jpeg/exif saat ini hanya mencakup aspek pencegahan, belum pada aspek deteksi integritas data. Digital Signature Algorithm (DSA) adalah metode kriptografi yang digunakan untuk memverifikasi integritas data menggunakan hash value. SHA256 merupakan hash function yang menghasilkan 256-bit hash value yang berfungsi sebagai file fingerprint. Penelitian ini bertujuan untuk menyusun file fingerprint dari berkas jpeg/exif menggunakan SHA256 dan algoritma Brute Force string matching untuk verifikasi integritas berkas jpeg/exif. Penelitian dilakukan dalam lima tahap. Tahap pertama adalah identifikasi struktur berkas jpeg/exif. Tahap kedua adalah akuisisi konten segmen. Tahap ketiga penghitungan hash value. Tahap keempat adalah eksperimen modifikasi berkas jpeg/exif. Tahap kelima adalah pemilihan elemen dan penyusunan file fingerprint. Hasil penelitian menunjukkan sebuah jpeg/exif file fingerprint tersusun atas tiga hash value. SOI (Start of Image) segment hash value digunakan untuk mendeteksi terjadinya modifikasi berkas dalam bentuk perubahan tipe berkas dan penambahan objek pada konten gambar. Hash value segmen APP1 digunakan untuk mendeteksi modifikasi pada metadata berkas. Hash value segmen SOF0 digunakan untuk mendeteksi gambar yang dimodifikasi dengan teknik recoloring, resizing, dan cropping. The method of securing jpeg/exif image files currently has covered only the prevention aspect instead of the data integrity detection aspect. Digital Signature Algorithm is a cryptographic method used to verify the data integrity using hash value. SHA256 is a hash function that produces a 256-bit hash value functioning as a fingerprint file. This study aimed at compiling fingerprint files from jpeg/exif files using SHA256 and Brute Force string matching algorithm to verify the integrity of jpeg/exif files. The research was conducted in five steps. The first step was identifying the jpeg/exif file structure. The second step was the acquisition of the segment content. The third step was calculating the hash value. The fourth step was the jpeg/exif file modification experiment. The fifth step was the selection of elements and compilation of fingerprint files. The obtained results showed a jpeg/exif fingerprint file which was compiled in three hash values. The hash value of SOI segment was used to detect the occurrence of file modification in the form of file type changing and object addition on the image content. The hash value of APP1 segment was used to detect the metadata file modification. The hash value of SOF0 segment was used to detect the images modified by recoloring, resizing, and cropping techniques.


2020 ◽  
Vol 6 (1 (10)) ◽  
pp. 57-72
Author(s):  
Milena Wiśniewska

The article presents the characteristics of music education for visually impaired people. It is largely conditioned by the use of Braille’s music notation featuring a number of differences when compared to the notation used by sighted musicians. Visually impaired students can receive music education both at schools dedicated exclusively to the blind and in public institutions, together with sighted students. What may play a significant role in the provision of the best possible learning conditions for blind people is support given by educational institutions and by various organizations (in our country, the latter form of aid is relatively narrow in scope). What matters most is, however, teachers’ attitude, their willingness to understand a blind student’s situation, and frequently their readiness to introduce modifications to the methods applied on a daily basis. In order to determine what exactly is needed by visually impaired people learning music in Poland, the author of the article explored educational experiences of 24 blind people, bearing in mind the context of music education system in our country. Conclusions drawn from the conducted surveys, as well as from the subject literature, helped to formulate a number of guidelines concerning blind people’s education, directed at teachers of various music subjects; they constitute the main part of the article in question.


2019 ◽  
Vol 6 (2) ◽  
pp. 83-91
Author(s):  
Hidayat Hidayat ◽  
Boni Al Amin

Braille codes are letters that are known by blind people to be able to obtain information through books including the Qur'an. The availability of media to learn to read the Qur'an in Braille code for blind people is very limited. In addition, the availability of teachers of the Koran for the blind is very limited because not many people can see normally who understands the Qur'anic letters in Braille code, so it is necessary to design and implement an Iqra Electronic Braille device to facilitate the reading process. the Qur'an in Braille code for blind people. One of the Koran learning methods applied in this design is the Iqra method. This device consists of two parts, namely a device for teachers / instructors in the form of an android application and a device for students / blind people who will learn in the form of electronic devices Braille cell viewers using piezoelectric mechanics. Communication between the Teacher's device and the Student's device uses wireless communication media, namely Bluetooth. The Iqra electronic device for the visually impaired is expected to facilitate teachers to teach blind people to read the Qur'an in the Braille code using the Iqra method as an effort to reduce the illiteracy of the Qur'an, especially blind people. Keywords – Iqra Braille Electronic; Braille codes; Android; Blind People.


2020 ◽  
Vol 7 (3) ◽  
pp. 415
Author(s):  
Sri Sugiarti ◽  
Berto Nadeak

A brand can reflect a product, but also has another dimension that is able to distinguish it from other products and is designed to meet the same needs. Digital cameras are devices for making images of objects for refraction through lenses on CCD sensors and more recently on BSI-CMOS (Back Side Illuminated) sensors that are more power efficient for more sophisticated cameras whose results are then recorded in digital format to in digital save media. The development of an era when someone more often captures his life's journey by expressing every activity into a photo using a digital camera because with that process can be done easily and good results for a photo that can capture the journey of one's life. With the increasing time of digital camera users more and more and digital camera brands are also increasingly sold in markets such as malls or shops, but to go to malls or shops will require transportation costs and not everyone has a free time to see new digital camera brands to the mall or shop because of its many work activities and other things. To overcome these problems the author builds an application that is the Implementation of the Zhu-Takaoka Algorithm in the Digital Camera Olshop Application. The zhu-takaoka algorithm is a string matching algorithm that can search words by shifting characters using 2 (two) dimensional arrays. The core process of searching for the zhu-takaoka algorithm is to search for words using the Right-to-left scan rule technique. Each shift in the word search process is determined by the shift values in the Good Suffix Shift Rule and Bad-Charcter Shift Rule tables. The expected results of this research are that it can help someone who wants to have a digital camera see or search for a digital camera brand using an Android application so that it can be done anywhere without having to go to the mall or shop.


At present the currency recognition for visually impaired and blind people has become a vital topic for the researchers in the different applications. The money exchange is an important part of our daily life activities. But it becomes very difficult for visually impaired and blind people to recognize the currency values in the financial exchanges and they easily betrayed by the other people. Accordingly, there seems an urgent requirement to scheme a framework that is useful in recognizing paper money notes accurately. There is a huge area for currency differential detection and it has evolved over many years. The paper explores currency identification and provides a comprehensive overview of the current literature on techniques for identifying currency notes, encouraging the survey effort to provide an effective system for blind and visually impaired people


Sign in / Sign up

Export Citation Format

Share Document