The purpose of this research is to control home electrical appliances while also monitor the electricity consumption using web based application using laravel php framework and MySQL database. It also provides a diagn...
详细信息
The purpose of this research is to control home electrical appliances while also monitor the electricity consumption using web based application using laravel php framework and MySQL database. It also provides a diagnostic feedback in case of electrical appliance's failure. It aims to lower the energy usage of the electrical appliances by cutting off the power completely during standby. Many kinds of approaches like literature studies, research and experiments were conducted to develop the prototype of the system. RaspberryPi, Arduino, relay board and CT current sensors are the hardware that used to control the use of electrical devices’ energy and monitor how much it consume the energy. The application is mainly built using Laravel PHP framework and JavaScript with MySQL database. The result is a system prototype that capable to control, monitor and diagnose electrical appliances power, and lowering the total energy usage of the appliances by up to 59%.
This paper presents an overview of customizable microcontroller using a Xilinx Zynq XC7Z020 FPGA as an alternative to increase its performance as user need. This alternative arises due to many of the systems, which de...
详细信息
This paper presents an overview of customizable microcontroller using a Xilinx Zynq XC7Z020 FPGA as an alternative to increase its performance as user need. This alternative arises due to many of the systems, which developed mostly by using microcontroller are not giving any room for customization to increase its performance or I/O ports. There is any possibility that the system designed to be used by using general processor such as PC to increase its performance but it will give another problem such as interface difficulty for high speed I/O, real time processing, increases complexity, and many more. Customization is introduced by combining hard IP processor and FPGA in one chip instead of practicing two separate devices, processor and FPGA, which is commonly use in high performance embedded design. This approach allows seamless design development and development time reduction for customization.
The purpose of the research was to develop a visualization application for analyzing data of public company financial statements which may help user to simplify and to classify the data base on their need. The aplicat...
详细信息
The purpose of the research was to develop a visualization application for analyzing data of public company financial statements which may help user to simplify and to classify the data base on their need. The aplication was developed by using extreme programming which allows rapid development process and be able to adapt in evironment or technical varible change that occur during the development process. The result of the research was an application that can visualize financial statement data which supported by filter feature to help user clasify data base on their need. It could be concluded that data visualization application for analyzing public company's financial statement help user to understand the data and help user to clasify the data base on their need.
The objective of this study is to develop learning media by using the computer Based Instruction (CBI) model for GOST algorithm cryptographic material (Gosudarstvennyi Standard). Besides, the study serves to present l...
The objective of this study is to develop learning media by using the computer Based Instruction (CBI) model for GOST algorithm cryptographic material (Gosudarstvennyi Standard). Besides, the study serves to present learning using computer media, especially in the Informatics Engineering study program. The method used in this study uses the Research and Development (R & D) method. The results of this development research are learning media products in the form of tutorial CDs with the contents of the material: GOST Cryptographic Theory, Encryption Process and Decryption process using alphabet text data. Based on the results of the application and testing of the program, it can be concluded that this application is easy to use. Learning the Gost algorithm in the encoding method utilizing the computer Based Instructions (CBI) method helps to understand the material and facilitate the learning process.
One of interpersonal human communication is facial expression which is used to manifest emotions. If computers could recognize these emotional inputs, the interaction between human and computers will bemore natural. C...
详细信息
One of interpersonal human communication is facial expression which is used to manifest emotions. If computers could recognize these emotional inputs, the interaction between human and computers will bemore natural. Currently, video game is one of the applications that use facial expression detection to increase natural interaction. Kinect is motion sensor for game controller that can track the detected face using Active Appearance Model (AAM). AAM is the method that adjusts shape and texture model in a new face, when there is variation of shape and texture comparing to the training result. The aim of this research is to detect facial expression by observing the change of key features in AAM using Fuzzy Logic. Fuzzy Logic is used to determine the current emotions based on prior knowledge derived from Facial Action Coding System (FACS). The experimental results on user-generated dataset show that: (i) FACS does not provide any information about the degree of muscle activation, thus the degree of the key features have to infer from specific dataset, (ii) detection accuracy of emotions depend on the kind of emotion itself.
Characteristic of sperm movement or sperm motility is one of important quality of sperm. computer-aided Sperm Analysis (CASA) systems have attempted to give more accurate information about sperm motility. For collecti...
详细信息
Characteristic of sperm movement or sperm motility is one of important quality of sperm. computer-aided Sperm Analysis (CASA) systems have attempted to give more accurate information about sperm motility. For collecting a single good sperm in Intracytoplasmic Sperm Injection (ICSI) procedures, achieving correct sperm trajectory is necessary. On the other hand, visual tracking of a sperm is a challenging issue because: (i) sperms have similar size and shape, (ii) a good sperm moves fast and has unpredictable motions. Furthermore, our sperm videos were taken by regular cameras which have low frame rate (about 20 fps), which cause the sperm-motion more abrupt. To address this problem, we propose searching driven stochastic sampling framework for visual tracking of abrupt motions. In here, searching algorithm will give promising regions of the target, and thus can replace the role of transition model in tracking system. For searching, we employ Coherency Sensitive Hashing (CSH) in a window to constrain search space in each frame, called as Search Window. And then for stochastic sampling framework, we adopt Smoothing Stochastic Approximate Monte Carlo (SSAMC) to specifically finding the target. The experimental results on human-sperm sequences show that: (i) comparing to our previous tracker which use geometric transition dynamic model, the proposed tracker can handle abrupt motions robustly, (ii) by using appropriate Search Window, the tracker can localize the sperm target and restrict observation of other similar sperms.
Android Malware is a threat that needs to be considered by the Android OS user because it can interfere with the performance of the smartphone being used. Many applications that are scattered on the Google Store is a ...
详细信息
Android Malware is a threat that needs to be considered by the Android OS user because it can interfere with the performance of the smartphone being used. Many applications that are scattered on the Google Store is a point of weakness for the user to determine which applications containing malware or not. This comprehesive study can explain about many applications that are scattered on the Google Store is a point of weakness for the user to determine which applications containing malware or not using several methods and display the comparison results between all previous study in the review of Android Mobile Malware. Till now there the optimal method suggested solution that could be considered as standard mechanism for Android Malware Detection is Bayesian classification algorithm based on the methods of previous research used in the detection of Android Malware. For this reason we intended to make our work as a survey paper to make it easier for Android user to determine installed application contains malicious program or not.
Suspicious financial transactions that lead to money laundering in Indonesia is increasing every year. One of the causes money laundering in Indonesia is because the lack of information that bank use to know their cus...
详细信息
Suspicious financial transactions that lead to money laundering in Indonesia is increasing every year. One of the causes money laundering in Indonesia is because the lack of information that bank use to know their customers (Know Your Customer) that doing unusual transaction. To decide when the unusual transaction become suspicious financial transaction bank need a data which is complete, accurate, fast to access and have some depiction of relationship between high-risk customers in graph. To produce trusting information, a country needs an integrated data that has strong security management to protect the data. HTML5, JavaScript Library, Graph Database and AJAX is use to make system work faster and show data in graph so the data will be easier to access. The results of this study is to produce an application to provide a complete data that created specifically for conditions in Indonesia in order to facilitate the analysis of suspicious financial transactions of banks so the suspicious transactions that are reported will became more valid.
The Gregg and Walczak definition about e-image has been inspired us to examine their theoretical model in a different digital marketplace environment. As a novelty, we introduced the Real-Time Support Assistance (RTOS...
详细信息
The major issue in power system is economic dispatch (ED) problem. The Economic dispatch problem is aim to distribute electrical power generators in some active electrical system to minimize the total of cost of gener...
The major issue in power system is economic dispatch (ED) problem. The Economic dispatch problem is aim to distribute electrical power generators in some active electrical system to minimize the total of cost of generators. Here, the purpose of this paper is to achieve the combination of power output, maximum total of demand with the transmission losses, minimum the total cost of generating unit and design web based application to simplify the calculation of economic dispatch problem for user at PT. Indonesia Power. This paper introduces a solution to ED problem using Dr. Xin She Yang developed firefly algorithm. The result obtained by the proposed algorithm have been compared with the result from the data source and that results is more optimal using firefly algorithm than the results of the data source. Based on the result, it can be concluded that this web based application is very useful to user in calculating the economic dispatch problem with transmission losses at PT. Indonesia Power.
暂无评论