Various EU regulations have established rules for accessing the electricity exchange grid in order to ensure proper functioning of the electricity market while maintaining a proper level of system security. system sec...
详细信息
Most people in the world have the habit of watching television, sometimes watching television can be a necessity for the community and some people assume that watching television at home can improve their quality of l...
详细信息
ISBN:
(纸本)9781538669228
Most people in the world have the habit of watching television, sometimes watching television can be a necessity for the community and some people assume that watching television at home can improve their quality of life. But being too close to watching television is not good for eye health because the eyes focus on the television, so the eye muscles will become tense. This is what can cause a decrease in eye function, especially watching in a dark room. The risk of eye pain is much greater. This is a problem that occurs in our environment so there needs to be equipment or detectors that can inform the safe distance for watching television. The purpose of this study is to produce detectors that can inform the safe distance of watching television. The detector has been designed consisting of a motion sensor (PIR sensor) that detects moving objects (humans), proximity sensors (ultrasonic sensors) detects a safe distance to watch television, the keypad to enter the diagonal size of the television screen, LCD to display safe distance and the bell produces sound if the distance is not safe to watch television. Test results show that this detector can work well to inform safe or unsafe distances when someone is watching in front of the television. This detector is ready for use in the community to prevent damage to the eyes.
Visual feature clustering is one of the cost-effective approaches to segment objects in videos. However, the assumptions made for developing the existing algorithms prevent them from being used in situations like segm...
详细信息
This study aims to formulate a model for adopting the LAPOR! application technology. based on the user's perspective. The method used is a comprehensive literature review of the previous two best practice models, ...
This study aims to formulate a model for adopting the LAPOR! application technology. based on the user's perspective. The method used is a comprehensive literature review of the previous two best practice models, TRI and UTAUT. The results showed that there were 13 hypotheses and 10 constructs from the proposed combination model. The entire construct is optimism, innovativeness, discomfort, insecurity, performance expectancy, effort expectancy, social influence, facilitating conditions, behavioral intention and use behavior. In the TRUTAUT combination model, the personality traits aspects of TRI became antacedents of the cognitive aspects of the UTAUT model. The implication of this research is that government institutions can better understand what factors influence the use of technology, especially the LAPOR! application in Indonesia.
JNE has a pickup service program to pick up a package of loyal online shop customers. This system still has limitations in terms of interaction with customers and JNE customer service. This causes less than the maximu...
JNE has a pickup service program to pick up a package of loyal online shop customers. This system still has limitations in terms of interaction with customers and JNE customer service. This causes less than the maximum number of customers or partners to get better service. Based on these problems starting with the manufacture of input-output design with the tracking location method will facilitate customers in the package pick-up process. This research will produce a package pickup application on the Android platform that is created using the Java programming language and uses the MySQL database so that JNE can do its business activities in a shorter and timely manner. With the use of this application can cause process time savings reaching package pick-up more efficiently, this application can be a better substitute for the previous system.
Currently, the Database Management system (DBMS) keeps growing and is available on various platforms. The use of various types of DBMS in a system can cause problems with limitations in the synchronization process bec...
Currently, the Database Management system (DBMS) keeps growing and is available on various platforms. The use of various types of DBMS in a system can cause problems with limitations in the synchronization process because each DBMS only provides synchronization methods for similar DMBS. Previous research has examined heterogeneous database synchronization algorithms on mobile devices using the Message Digest 5 (MD5) method. The process of synchronization with this method is done by comparing the hash values of each record data in the source table with the data hash values in the destination table. If a different hash value is obtained, the synchronization process is based on the type of transaction that has been determined. Based on the principle of work, this algorithm requires a long synchronization time for large-scale databases because it has to check the hash values of each data record. This study examined the performance analysis of the DBMS synchronization method using MD5. The testing was performed by observing the parameters of execution time of synchronization ptocess for the MySQL DBMS and PostgreSQL types. The results showed that the execution time of the MD5 synchronization process was proportional to the number of data records that need to be synchronized. This is because the hashing process that must be done on every data record and synchronization mechanism requires all data to be sent to check and compare the hash values of each data record in the destination synchronization database even though the data has not changed.
Data collected by PLN staff on customer's complaints in the usage of electricity are very huge and accumulate. Previously, there was no information about these kinds of complaints in all sub-districts included ins...
详细信息
In Mobile Ad hoc Networks (MANET), Ad hoc On Demand Distance Vector (AODV) protocol suffers from the black hole attacks that disrupts the functionality of the network by displaying false information during routing pro...
详细信息
In Mobile Ad hoc Networks (MANET), Ad hoc On Demand Distance Vector (AODV) protocol suffers from the black hole attacks that disrupts the functionality of the network by displaying false information during routing process. Such an attack eventually affects the network performance. In this paper, an authentication mechanism based on lightweight encryption algorithm and Media Access Control (MAC) authentication are proposed for black hole and Distributed Denial of Service (DDoS) attacks. The proposed technique is validated in Network Simulator 2 (NS2) whose results show that the approach offers prompt route verification with high throughput and generating less routing overhead avoiding black hole attacks.
暂无评论