Pub Date : 2016-10-19DOI: 10.1109/ICITACEE.2016.7892472
Trianggoro Wiradinata, B. Iswandi
In today's technology driven world, not all technologies could be adopted easily. There are many factors that affect its level of adoption; the most common factors are the perception of usefulness and perceived ease of use. Instagram is a picture-based social media tools or applications which also offer a photo-editing features to create a better desirable results. The theory that is appropriate to test the level of adoption and factors that influence Instagram is Technology Acceptance Model (TAM). TAM explains the behavior of users towards technology adoption. The population of this research is the Instagram users residing in Indonesia. Samples will be obtained using non-probability purposive (judgmental) sampling. Data analysis will be done using path analysis. The result of this research could determine the factors that significantly affect the acceptance of technology similar to Instagram and hence applications can achieve a similar adoption rate as Instagram.
{"title":"The analysis of Instagram Technology adoption as marketing tools by small medium enterprise","authors":"Trianggoro Wiradinata, B. Iswandi","doi":"10.1109/ICITACEE.2016.7892472","DOIUrl":"https://doi.org/10.1109/ICITACEE.2016.7892472","url":null,"abstract":"In today's technology driven world, not all technologies could be adopted easily. There are many factors that affect its level of adoption; the most common factors are the perception of usefulness and perceived ease of use. Instagram is a picture-based social media tools or applications which also offer a photo-editing features to create a better desirable results. The theory that is appropriate to test the level of adoption and factors that influence Instagram is Technology Acceptance Model (TAM). TAM explains the behavior of users towards technology adoption. The population of this research is the Instagram users residing in Indonesia. Samples will be obtained using non-probability purposive (judgmental) sampling. Data analysis will be done using path analysis. The result of this research could determine the factors that significantly affect the acceptance of technology similar to Instagram and hence applications can achieve a similar adoption rate as Instagram.","PeriodicalId":161691,"journal":{"name":"2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130042275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-19DOI: 10.1109/ICITACEE.2016.7892490
W. Syafei, Zuhrotul Maulida, I. Santoso
Exponential growing of wireless multimedia communications has forced the IEEE802.11 workgroup to define new standard of WLAN. It is named a Very High Throughput WLAN IEEE 802.11ac which exploits MIMO-OFDM technology to provide up to 6,9Gbps of throughput. MIMO decoder is the vital part of WLAN 802.11ac. It decodes the received signals to get back the transmitted information. There are many methods can be implemented in MIMO Decoder. The linear methods, such as Zero Forcing (ZF) and Minimum Mean Square Error (MMSE) are simple but low in performance. At the other side, the well-known non-linear method called Maximum Likelihood Detection (MLD) measures the likelihood of the received signal to all symbol candidates. It gives an optimum performance by the cost of very high complexity. Between them, there are some sub-optimal methods, such as K-best, Trellis, and Sphere Detection. These three methods are low in complexity but give performance close to optimum. This paper is adressed to compare the performance and complexity of above methods as MIMO decoders for 8×8 WLAN 802.11ac. Observation is conducted under small room channel model.
{"title":"Methods of MIMO decoders for very high throughput WLAN IEEE802.11ac","authors":"W. Syafei, Zuhrotul Maulida, I. Santoso","doi":"10.1109/ICITACEE.2016.7892490","DOIUrl":"https://doi.org/10.1109/ICITACEE.2016.7892490","url":null,"abstract":"Exponential growing of wireless multimedia communications has forced the IEEE802.11 workgroup to define new standard of WLAN. It is named a Very High Throughput WLAN IEEE 802.11ac which exploits MIMO-OFDM technology to provide up to 6,9Gbps of throughput. MIMO decoder is the vital part of WLAN 802.11ac. It decodes the received signals to get back the transmitted information. There are many methods can be implemented in MIMO Decoder. The linear methods, such as Zero Forcing (ZF) and Minimum Mean Square Error (MMSE) are simple but low in performance. At the other side, the well-known non-linear method called Maximum Likelihood Detection (MLD) measures the likelihood of the received signal to all symbol candidates. It gives an optimum performance by the cost of very high complexity. Between them, there are some sub-optimal methods, such as K-best, Trellis, and Sphere Detection. These three methods are low in complexity but give performance close to optimum. This paper is adressed to compare the performance and complexity of above methods as MIMO decoders for 8×8 WLAN 802.11ac. Observation is conducted under small room channel model.","PeriodicalId":161691,"journal":{"name":"2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128300572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-10-01DOI: 10.1109/ICITACEE.2016.7892478
A. Prasetijo, Eko Didik Widianto, Ersya T. Hidayatullah
Popular websites such as Google and Facebook must have an extremely large clients and providing such clients only with a single web server is absolutely insufficient. To support service availability, two or more servers are required. This, however, needs a load balancing system. A load balancing server receives web traffic and distributes the requests to such multiple servers. Load balancing can be implemented with special hardware, software or a combination of both. The purpose of this research is to develop a load balancing system with HAProxy as a software-based load balancer and Heartbeat as failover software and provides comparisons of the performance of several balancing algorithms on it. The results show that without a load balancer, the load cannot equally be distributed. The system average failover time when an active server down is 10ms. The Leastconn algorithm, in general, outperformed the Round-Robin and Source algorithms in terms of connection rate, response time, throughput, and failed connection.
{"title":"Performance comparisons of web server load balancing algorithms on HAProxy and Heartbeat","authors":"A. Prasetijo, Eko Didik Widianto, Ersya T. Hidayatullah","doi":"10.1109/ICITACEE.2016.7892478","DOIUrl":"https://doi.org/10.1109/ICITACEE.2016.7892478","url":null,"abstract":"Popular websites such as Google and Facebook must have an extremely large clients and providing such clients only with a single web server is absolutely insufficient. To support service availability, two or more servers are required. This, however, needs a load balancing system. A load balancing server receives web traffic and distributes the requests to such multiple servers. Load balancing can be implemented with special hardware, software or a combination of both. The purpose of this research is to develop a load balancing system with HAProxy as a software-based load balancer and Heartbeat as failover software and provides comparisons of the performance of several balancing algorithms on it. The results show that without a load balancer, the load cannot equally be distributed. The system average failover time when an active server down is 10ms. The Leastconn algorithm, in general, outperformed the Round-Robin and Source algorithms in terms of connection rate, response time, throughput, and failed connection.","PeriodicalId":161691,"journal":{"name":"2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122571176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-10DOI: 10.1109/ICITACEE.2016.7892443
K. Adi, C. E. Widodo, A. Sugiharto, B. S. Q. Maulana, A. Pamungkas
CT scan is a radiological examination that uses X-ray to produce cross-sectional images of an object. Its aim is to determine abnormalities such as cancers in human organs using ionizing radiation X-ray. Cancer is a term that refers to abnormal cell growth. Currently there are more than 100 types of cancer. Cancer cells can form any body tissue and continue to grow uncontrolled. Cancer cells are derived from normal body cells' damaged DNA (deoxyribonucleic acid), a cellular material that controls the characteristics and growth of cells. Approximately 14.1 million new cancer patients are diagnosed every year and about 8.2 million of them die it. The top five cancers in men are lung, prostate, colon, stomach and liver cancers, whereas in women, there are breast, colon, cervix, lung and uterus cancers. On the other hand, available cancer treatment modalities include surgery, chemotherapy, radiation therapy, hormonal therapy, immune therapy and stem cell transplant. Cancer treatment options depend on the type, stage of cancer, patient's physical condition and preferences. In general, different treatment options come with different results and side effects. Recently, there has been rapid development in cancer therapy modalities and a decrease in cancer related mortality. Calculation of volume changes in cancer treatment processes is very important to know the success level of the therapy. Therefore, cancer volume calculations prior and after treatment are important. This research developed a method of image processing to calculate phantom volume. The phantom material which is used is polymethyl methacrylate (PMMA). This phantom is assumed as cancer cell in patient's body that the volume will be calculated. Image processing and area calculation were conducted on each phantom image slice by thresholding and trapezoidal integration method. Then phantom volume was calculated by integrating all areas with slice thickness. These calculation results were then compared with those from manual calculation. This yielded an error value of 3.63%.
{"title":"Calculation of phantom volume for computed tomography (CT) scan images","authors":"K. Adi, C. E. Widodo, A. Sugiharto, B. S. Q. Maulana, A. Pamungkas","doi":"10.1109/ICITACEE.2016.7892443","DOIUrl":"https://doi.org/10.1109/ICITACEE.2016.7892443","url":null,"abstract":"CT scan is a radiological examination that uses X-ray to produce cross-sectional images of an object. Its aim is to determine abnormalities such as cancers in human organs using ionizing radiation X-ray. Cancer is a term that refers to abnormal cell growth. Currently there are more than 100 types of cancer. Cancer cells can form any body tissue and continue to grow uncontrolled. Cancer cells are derived from normal body cells' damaged DNA (deoxyribonucleic acid), a cellular material that controls the characteristics and growth of cells. Approximately 14.1 million new cancer patients are diagnosed every year and about 8.2 million of them die it. The top five cancers in men are lung, prostate, colon, stomach and liver cancers, whereas in women, there are breast, colon, cervix, lung and uterus cancers. On the other hand, available cancer treatment modalities include surgery, chemotherapy, radiation therapy, hormonal therapy, immune therapy and stem cell transplant. Cancer treatment options depend on the type, stage of cancer, patient's physical condition and preferences. In general, different treatment options come with different results and side effects. Recently, there has been rapid development in cancer therapy modalities and a decrease in cancer related mortality. Calculation of volume changes in cancer treatment processes is very important to know the success level of the therapy. Therefore, cancer volume calculations prior and after treatment are important. This research developed a method of image processing to calculate phantom volume. The phantom material which is used is polymethyl methacrylate (PMMA). This phantom is assumed as cancer cell in patient's body that the volume will be calculated. Image processing and area calculation were conducted on each phantom image slice by thresholding and trapezoidal integration method. Then phantom volume was calculated by integrating all areas with slice thickness. These calculation results were then compared with those from manual calculation. This yielded an error value of 3.63%.","PeriodicalId":161691,"journal":{"name":"2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122268233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-09DOI: 10.1109/ICITACEE.2016.7892429
A. Hazmi, P. Emeraldi, M. I. Hamid, N. Takagi
In this study, we have examined electric field records from 10 thunderstorm days containing 13 positive narrow bipolar pulses (PNBPs). It was found that PNBP occurrences have a strong relationship with thunderstorm activities. The mechanism of the NBPs was very different from intracloud (IC) and cloud-to-ground (CG) flashes. We also found that the AM values of rise time, full width at maximum time, zero crossing time, overshoot time, pulse duration and overshoot to peak amplitude ratio of the PNBPs were 1.64 μs, 1.32 μs, 9.38 μβ, 15.06 μ« and 0.31 μs, respectively. The pulse duration range was from 8.45 to 29.06 μs. Comparison with values from previous studies reported by other researchers showed that the mentioned parameters had no strong relationship with latitude or geographic location.
{"title":"Research on positive narrow bipolar events in Padang","authors":"A. Hazmi, P. Emeraldi, M. I. Hamid, N. Takagi","doi":"10.1109/ICITACEE.2016.7892429","DOIUrl":"https://doi.org/10.1109/ICITACEE.2016.7892429","url":null,"abstract":"In this study, we have examined electric field records from 10 thunderstorm days containing 13 positive narrow bipolar pulses (PNBPs). It was found that PNBP occurrences have a strong relationship with thunderstorm activities. The mechanism of the NBPs was very different from intracloud (IC) and cloud-to-ground (CG) flashes. We also found that the AM values of rise time, full width at maximum time, zero crossing time, overshoot time, pulse duration and overshoot to peak amplitude ratio of the PNBPs were 1.64 μs, 1.32 μs, 9.38 μβ, 15.06 μ« and 0.31 μs, respectively. The pulse duration range was from 8.45 to 29.06 μs. Comparison with values from previous studies reported by other researchers showed that the mentioned parameters had no strong relationship with latitude or geographic location.","PeriodicalId":161691,"journal":{"name":"2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133486711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-09DOI: 10.1109/ICITACEE.2016.7892433
Budi Azhari, F. Danang Wijaya, Wassy Prawinnetou, H. Dewangga Adhyaksa
In this paper, sea wave power plant was designed to be applied in southern coast of Yogyakarta, Indonesia. The plant was expected to generate 700 Wp output. It had two components: tubular linear permanent magnet generator (TLPMG) and floater buoy. The buoy and the ocean wave were assumed moving continuously. By this condition, the generator was then simulated using finite element software of FEMM. Analytical calculation was performed later, which shows that the generator could generate induced voltage and output power up to 68.243 Vp and 674.811 Wp respectively. Furthermore, the generator only generated power at certain times, due to different length between the wave magnitude and translation path of the translator.
{"title":"Analytical design of sea wave energy power plant using tubular linear PM generator in southern coast of Yogyakarta, Indonesia","authors":"Budi Azhari, F. Danang Wijaya, Wassy Prawinnetou, H. Dewangga Adhyaksa","doi":"10.1109/ICITACEE.2016.7892433","DOIUrl":"https://doi.org/10.1109/ICITACEE.2016.7892433","url":null,"abstract":"In this paper, sea wave power plant was designed to be applied in southern coast of Yogyakarta, Indonesia. The plant was expected to generate 700 Wp output. It had two components: tubular linear permanent magnet generator (TLPMG) and floater buoy. The buoy and the ocean wave were assumed moving continuously. By this condition, the generator was then simulated using finite element software of FEMM. Analytical calculation was performed later, which shows that the generator could generate induced voltage and output power up to 68.243 Vp and 674.811 Wp respectively. Furthermore, the generator only generated power at certain times, due to different length between the wave magnitude and translation path of the translator.","PeriodicalId":161691,"journal":{"name":"2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115229825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-09DOI: 10.1109/ICITACEE.2016.7892401
D. Hutabarat, Darma Patria, Santoso Budijono, Robby Saleh
Human tracking applications with a Global Positioning System (GPS) can get the user's position in real time on the open area. But if the user goes into the room or building, then the human tracking application cannot get the user's position as the GPS signal cannot get through the wall. By using RFID, human tracking application can perform tracking in a certain closed area by providing room's or building's information that is entered. The IP camera as part of the system will send the images as visualization inside the room. In this research, human tracking system is built on a specific area that has lots of room or building such as a theme park or sports club. System is designed using an RFID reader, RFID tags, IP Camera, the database server and Android smartphones. The research was done inside Syahdan Campus, Bina Nusantara University — Jakarta. The result shows that the application is working with 100% tapping and mapping accuracy.
{"title":"Human tracking application in a certain closed area using RFID sensors and IP camera","authors":"D. Hutabarat, Darma Patria, Santoso Budijono, Robby Saleh","doi":"10.1109/ICITACEE.2016.7892401","DOIUrl":"https://doi.org/10.1109/ICITACEE.2016.7892401","url":null,"abstract":"Human tracking applications with a Global Positioning System (GPS) can get the user's position in real time on the open area. But if the user goes into the room or building, then the human tracking application cannot get the user's position as the GPS signal cannot get through the wall. By using RFID, human tracking application can perform tracking in a certain closed area by providing room's or building's information that is entered. The IP camera as part of the system will send the images as visualization inside the room. In this research, human tracking system is built on a specific area that has lots of room or building such as a theme park or sports club. System is designed using an RFID reader, RFID tags, IP Camera, the database server and Android smartphones. The research was done inside Syahdan Campus, Bina Nusantara University — Jakarta. The result shows that the application is working with 100% tapping and mapping accuracy.","PeriodicalId":161691,"journal":{"name":"2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117191763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICITACEE.2016.7892419
I. Sakti, D. Prajitno
Networked Control System (NCS) is a control system that adds communication network on its loop. As known there are several parameter on communication network that could make control design become more complex, some of these parameter are : packet delay, packet dropout, bandwidth limit, etc. In lab experiment there is needed to build a network emulator that can emulate the real communication network and manipulate packet data transmission for control system response analysis. In this paper we use a built-in Linux kernel 2.6 NetEm to build a network emulator for our NCS. In this experiment we will analyze the behavior of the NCS due to packets dropout occurs on a communication network. A dc-motor equipped with motor drive was used as a plant. NCS built as a client-server, which a set-point will be provided from the client through a network emulator to the server plan. Motor speed output then were compared to the set-point.
{"title":"Experiment of Networked Control System (NCS) using network emulator","authors":"I. Sakti, D. Prajitno","doi":"10.1109/ICITACEE.2016.7892419","DOIUrl":"https://doi.org/10.1109/ICITACEE.2016.7892419","url":null,"abstract":"Networked Control System (NCS) is a control system that adds communication network on its loop. As known there are several parameter on communication network that could make control design become more complex, some of these parameter are : packet delay, packet dropout, bandwidth limit, etc. In lab experiment there is needed to build a network emulator that can emulate the real communication network and manipulate packet data transmission for control system response analysis. In this paper we use a built-in Linux kernel 2.6 NetEm to build a network emulator for our NCS. In this experiment we will analyze the behavior of the NCS due to packets dropout occurs on a communication network. A dc-motor equipped with motor drive was used as a plant. NCS built as a client-server, which a set-point will be provided from the client through a network emulator to the server plan. Motor speed output then were compared to the set-point.","PeriodicalId":161691,"journal":{"name":"2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117260438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICITACEE.2016.7892425
Juningtyastuti, Fransiskus Allan Gunawan
The education process is a system covering input, process and output. Input is represented by the learners who will carry out the learning activities, the process is found in teaching and learning activities, and the output is the result of the process undertaken. In globalization era, the demand for qualified labor has become a major issue. One of the issues is high Cumulative Performance Index (CPI) requirement. Due to this requirement, educational institution i.e. university or college has to be organized professionally to conduct appropriate learning in order to graduate all their students with high GPA. Several factors affecting student achievement are learning methods, facilities within universities and faculty, discipline, motivation and environment. It is necessary to find the correlation as a driving factor to improve student achievement. Based on investigation, it was found that motivation, discipline and learning methods are the key factors to student achievement. To conduct analysis, Fuzzy logic was implemented. The results showed that discipline and motivation of lectures and student wee greater than 3.5 and it considered as good. Learning methods score was below 2.5 and it was considered as less. While motivation did not affect achievement and the study period. This early finding showed learning method needs improvement.
{"title":"Fuzzy-mamdani inference system in predicting the corelation between learning method, discipline and motivation with student's achievement","authors":"Juningtyastuti, Fransiskus Allan Gunawan","doi":"10.1109/ICITACEE.2016.7892425","DOIUrl":"https://doi.org/10.1109/ICITACEE.2016.7892425","url":null,"abstract":"The education process is a system covering input, process and output. Input is represented by the learners who will carry out the learning activities, the process is found in teaching and learning activities, and the output is the result of the process undertaken. In globalization era, the demand for qualified labor has become a major issue. One of the issues is high Cumulative Performance Index (CPI) requirement. Due to this requirement, educational institution i.e. university or college has to be organized professionally to conduct appropriate learning in order to graduate all their students with high GPA. Several factors affecting student achievement are learning methods, facilities within universities and faculty, discipline, motivation and environment. It is necessary to find the correlation as a driving factor to improve student achievement. Based on investigation, it was found that motivation, discipline and learning methods are the key factors to student achievement. To conduct analysis, Fuzzy logic was implemented. The results showed that discipline and motivation of lectures and student wee greater than 3.5 and it considered as good. Learning methods score was below 2.5 and it was considered as less. While motivation did not affect achievement and the study period. This early finding showed learning method needs improvement.","PeriodicalId":161691,"journal":{"name":"2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114577932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICITACEE.2016.7892422
Sumardi, Lanang Febriramadhan, A. Triwiyatno
Arm manipulator is one type of robot that is widely applied in the industrial world. Robots of this type are commonly used to help people in the hard work, dangerous or repetitive work. Arm manipulator application that has been widely used are for welding, painting, drilling, and displacement. There are two methods of motion in the arm manipulator development, they are forward kinematics and inverse kinematics. In this research, a 3 DOF arm manipulator prototype designed as sorting object by color. The arm manipulator's prototype using inverse kinematics motion in determining the position of the sorted object transfer. In sorting this object is used as a sensor photodiode detector and distinguishing colors object are sorted. The output of this research is to produce a 3 DOF arm manipulator prototype that can move and sort object by it's color. In this research, the average yield on a standard deviation is 0.866 cm for X axis and the Y axis is 1.197 cm. The standard deviation is obtained from 4 kinds of the test site sorting of object variations.
{"title":"Design of color based object sorting through arm manipulator with inverse kinematics method","authors":"Sumardi, Lanang Febriramadhan, A. Triwiyatno","doi":"10.1109/ICITACEE.2016.7892422","DOIUrl":"https://doi.org/10.1109/ICITACEE.2016.7892422","url":null,"abstract":"Arm manipulator is one type of robot that is widely applied in the industrial world. Robots of this type are commonly used to help people in the hard work, dangerous or repetitive work. Arm manipulator application that has been widely used are for welding, painting, drilling, and displacement. There are two methods of motion in the arm manipulator development, they are forward kinematics and inverse kinematics. In this research, a 3 DOF arm manipulator prototype designed as sorting object by color. The arm manipulator's prototype using inverse kinematics motion in determining the position of the sorted object transfer. In sorting this object is used as a sensor photodiode detector and distinguishing colors object are sorted. The output of this research is to produce a 3 DOF arm manipulator prototype that can move and sort object by it's color. In this research, the average yield on a standard deviation is 0.866 cm for X axis and the Y axis is 1.197 cm. The standard deviation is obtained from 4 kinds of the test site sorting of object variations.","PeriodicalId":161691,"journal":{"name":"2016 3rd International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130537247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}