scholarly journals EVALUASI EKSTRAKSI FITUR KLASIFIKASI TEKS UNTUK PENINGKATAN AKURASI KLASIFIKASI MENGGUNAKAN NAIVE BAYES

2020 ◽  
Vol 13 (1) ◽  
pp. 161-171
Author(s):  
Aji Priyambodo ◽  
Prihati Prihati

Security Parking UIN Walisongo Semarang at this time can be said to be in poor condition. The high case of loss of a motor vehicle cause anxiety for the academic community. Parking system that is traditional that is doing the checking of identity cards at the exit of the campus is less effective. Hence the need for a system of security parking modern and computerized, so that activities out of the vehicle can be recorded and stored automatically. Based on these problems, the authors designed a parking Security System as a WEB-based form of increased security parking campus UIN Walisongo Semarang. By using RFID technology (Radio Frequency Identification) are planted on the card indentitasi, which can later be used as an authentication tool typing will enter and exit the campus area. To provide double security, there are Features of the Live Camera with the base website that serves as a tool for monitoring vehicles that are parked in real time. The output of this final project is to produce a prototype security system parking. Not only specialized hardware, but also software design of the System monitoring of vehicles in live Web-based. So the users of the parking facilities can monitor the vehicle anywhere  

2014 ◽  
Vol 2 (3) ◽  
pp. 187-194
Author(s):  
Muhammad Chamdun ◽  
Adian Fatchur Rochim ◽  
Eko Didik Widianto

This final project aims to design a door security device using RFID technology (Radio Frequency Identification) and the keypad as a method of access into the room. The system will automatically give warning when the code is entered incorrectly or burglars entered by breaking the door. The microcontroller that is used as the central data processing is ATMega 16 microcontroller ATMEL production and security sensors are used PIR (Passive Infra Red) and magnetic switches.The design begins with a schematic device hardware and software design using CodeVisionAVR programming. Implementation phase includes the implementation of the physical tools, programs, and sensors. The testing phase is done by testing the input sensors and exit switches, siren output devices, DC motor, LCD (Liquid Crystal Display), the RFID reader, keypad, and system controller.The results of room layered security system works according to design. PIR sensors can detect human activities and turn the LED lamp indicator on. Magnetic switch sensors will provide input to the microcontroller to enable or disable the DC motor as the room locking system. Admin menu that is accessed from the keypad is to add users, remove users, see registered users and change the password. User menu which is also accessed using the keypad, work as the room access using a username and password.This study resulted in the layered security. Room access is done using RFIDTag and password. The room piercing detection is done by sensor PIR (Passive Infra Red) and magnetic switches. Alarm used as a piercing action warning. This layered room safety device produces a better security system. 


This paper discourses about a very general problem that occurs in everyday life. In many universities, students are at risk of misplacement or theft of valuables. So, to avoid such mis happening, the development of security system was designed for providing the safety of university student belongings. The proposed security system contains some common information, methodology, schematics and some details related to technical field that is employed into the system, such as RFID (Radio Frequency Identification) and barcode readers along with the design of the established system. For the functioning of the system in a most effectively manner, assumptions with some specific requirements that is needed to be met are encompassed in this paper


Author(s):  
Amarpreet S. Kohli ◽  
Cheng Peng

This research examined the willingness of businesses and industries to adopt RFID. It was postulated that motivation to adopt RFID is influenced by the technological context, organizational factors, and perceived benefits of using RFID. Data was collected from Council of Supply Chain Management Professionals members using a 19-question web-based survey. Relative advantage that firms can achieve and the perceived benefits in improving product quality and information sharing along with better traceability in the supply chain were significant predictors of RFID adoption. Within the technological contexts, the visible obstacles of RFID adoption through quality of transmission and reliability, understanding of overly high investment costs, and importance of the privacy concerns were all significant. The IT readiness of a firm was also a significant predictor of RFID adoption in the organizational factor, however the size of an organization was not at all linked to the RFID adoption decisions. The results point to a number of important conclusions that are informative for various business and industries that might be contemplating to adopt RFID technology in their operations.


2019 ◽  
Vol 19 (1) ◽  
pp. 41
Author(s):  
I Gede Sujana Eka Putra ◽  
Ni Luh Putu Labasariyani

System security is important in information systems to prevent unauthorized users from accessing data. Login system applies security using encrypted passwords stored on RFID cards. This research designed login security system storing encrypted password using MD5 encryption into the Mifare Tag RFID card and equipped NFC reader to read data from RFID Card. By storing encrypted password characters on RFID cards, login system security is stronger and cannot be traced by unauthorized parties to log into systems. Some stage of system design are through study of literature, designing process flow, system algorithms, designing encryption methods and system interfaces, writing card module coding, card reading module coding, implementation, and system testing. The system login applied by scanning RFID card on the NFC reader, if the password on RFID matches then the user successfully logs into the system. Based on the testing of RFID Tag readings, the maximum distance from the reading of RFID Tag cards is up to 7 cm with a reading range of 00 to 300 with a success rate of 100% authentication. By using RFID Tag cards, increase security for logging into the system, because user cannot log in without having a card with the appropriate password.


2019 ◽  
Vol 5 (2) ◽  
Author(s):  
Muhammad Abdul Mujib ◽  
Irfan Rizky Ramadhan

AbstrakPenelitian ini dilatarbelakangi oleh tidak adanya sistem yang mampu untuk memonitoring seberapa banyak pengunjung laboratorium komputer prodi Teknik Komputer di STMIK AMIKBANDUNG . Hal ini menyebabkan tingkat kunjungan mahasiswa tidak terpantau dan bahkan seringkali terlihat ada orang asing yang masuk ke ruangan tersebut. Akibat yang ditimbulkan dari hal ini bisa saja berujung pada pencurian atau hal lain yang tidak diinginkan.Seiring berjalannya waktu, teknologi yang berkembang memunculkan sebuah inovasi baru di bidang keamanan sebuah ruangan. Yakni menggunakan alat yang disebut Radio Frequency Identification atau yang lebih dikenal dengan RFID. Penulis ber-inisiatif untuk membuat alat yang selain bisa untuk mengamankan sebuah ruangan namun juga bisa berfungsi sebagai sistem presensi berbasis web. Alat ini tentunya bisa memonitoring siapa saja mahasiswa yang masuk ke ruangan tersebut dan mampu untuk merekam catatan waktu di bagian log check in. Penerapan teknologi ini bisa disematkan pada kartu mahasiswa yang dimiliki oleh setiap anggota dari prodi Teknik Komputer. Hal ini tentunya sangat berguna jika sedang tidak ada dosen pembimbing di ruangan. Keamanan bisa terjamin dan dipantau dari jarak jauh melalui website. Hasil dari perancangan dan konfigurasi alat tersebut diujikan dengan melakukan uji coba masuk ke miniature pintu ruangan laboratorium komputer yang telah dibuat sebelumnya. Ada tiga sampel kartu yang disediakan penulis diantaranya : mahasiswa terdaftar, mahasiswa tidak terdaftar, dan visitor. Ketiga kartu tersebut mempunyai hak akses yang berbeda. Ada yang mempunyai akses masuk dan ada pula yang tidak.�Kata Kunci : Sistem Presensi, RFID RC522, Nodemcu, Laboratorium Komputer����������� ��AbstractThis research is motivated by the absence system that is not able to monitoring how many visitors are computer labs at the Computer Engineering study at STMIK AMIKBANDUNG. This causes the level of student visits not monitored and even often seen a stranger entering the room. The consequences of this can lead to theft or other undesirable things. Over time, developing technology led to a new innovation in the field of room security. Namely using a device called Radio Frequency Identification or better known as RFID. The author took the initiative to create a tool that besides being able to secure a room but also function as a web-based presence system. This tool can certainly monitor anyone who enters the room and is able to record the time in the log in check-in section. The application of this technology can be embedded on student cards owned by each member of the Computer Engineering study program. This is certainly very useful if there are no supervisors in the room. Security can be guaranteed and monitored remotely via the website. The results of the design and configuration of the tool are tested with conduct a trial entry into the miniature door of the computer laboratory room that has been made previously. There are three sample cards provided by the author including: registered students, unregistered students, and visitors. All three cards have different access rights. Some have access and some don't.�Keywords : Presence System, RFID RC522, Nodemcu, Computer Laboratory


Author(s):  
Sri Wiwoho Mudjanarko ◽  
Tubagus Purworusmiardi

The increasing number of motorcycles in Indonesia creates enormous problems because of the hectic involved; thus, parking management becomes a big challenge. The applicability and the possibility of a Radio Frequency Identification (RFID) were studied in finding the solution of this pressing issue. The study was conducted at Narotama University which is located in Surabaya, East Java. This study was expected to find solutions related to provide parking facilities using RFID method to identify motorcycles. The goal of this study is to determine the number of motorcycle vehicles which is being parked electronically to facilitate the management in organizing motorcycle in parking facilities. Hence, the management can arrange the requirement of parking system in the future. From the study, it can be concluded that RFID can make the process faster and easier so that the line can significantly be reduced and provide more user friendly system because the system will give the information about parking availability. Moreover, this RFID parking system and the software can be more reliable and secured due to more complete and accurate data in the registration process required to the users.


2013 ◽  
Vol 723 ◽  
pp. 877-884 ◽  
Author(s):  
Jia Ruey Chang ◽  
Shu Rong Yang ◽  
Kun Hu Lin

To provide certain level of serviceability, road authorities need to perform appropriate and timely maintenance and rehabilitation (M&R) activities. Manholes on roads are the most persecution for the evenness of pavements. Lowering manholes into road structures is a good approach to keep the serviceability of pavement. However, a vast expanse of road systems greatly increases the complexity of manhole identifications. Therefore, an emerging method to find the manholes beneath pavements is needed. In this study, radio frequency identification (RFID) technology was used to identify manholes. RFID tags stuck on the metal were buried in asphalt concrete at different depths and then were identified from laboratory experiments. On the other hand, location-based service (LBS) has been applied to mobile devices with mobile positioning functions to provide users with location-specific services for several years. Augmented reality (AR) can support users in manipulating virtual objects in real environments. In this study, a mobile manholes monitoring system (MMS) and a web-based MMS based on LBS and AR were developed. The RFID adhered to covers of manholes beneath pavements can be easily monitored by the mobile MMS. The location and information of neighboring manholes will be transmitted from the web-based MMS and be shown on the mobile MMS based on the AR technology. By using RFID and AR technologies, the time and costs of manhole identifications can be significantly decreased and then pavement maintenance activities also can be timely processed.


Sign in / Sign up

Export Citation Format

Share Document