Pub Date : 2022-02-26DOI: 10.20895/infotel.v14i1.748
R. P. Astuti, Eva Lucky Wijaya, T. Yunita, H. H. Ryanu
Multiple Input Multiple Output (MIMO) is a key technology that plays an important role in achieving the 5G requirement due to its capability to increase channel capacity. However, the increase of channel capacity is influenced by several aspects such as mutual coupling. Many methods are done to decrease the mutual coupling effect such as polarization arrangement of the MIMO antennas. This study on the polarization arrangement of a circular patch MIMO antenna at 3.5 GHz was performed. Four elements of the MIMO antenna are arranged with several polarization configurations both in Co-Polarization and Cross-Polarization. Both simulation and measurement results showed that MIMO with Co-Polarization has a slightly wider bandwidth equal to 295.25 MHz compared to Cross-Polarization with a bandwidth of 274.63 MHz, due to better return loss performed by the former. However, from the mutual coupling perspective, it is observed that MIMO with Cross-Polarization can reduce the mutual coupling from -17.6676dB into -22.462 dB compared to Co-Polarization with the same element distance.
{"title":"Optimum Polarization Configuration of Planar Circular Patch MIMO Antenna","authors":"R. P. Astuti, Eva Lucky Wijaya, T. Yunita, H. H. Ryanu","doi":"10.20895/infotel.v14i1.748","DOIUrl":"https://doi.org/10.20895/infotel.v14i1.748","url":null,"abstract":"Multiple Input Multiple Output (MIMO) is a key technology that plays an important role in achieving the 5G requirement due to its capability to increase channel capacity. However, the increase of channel capacity is influenced by several aspects such as mutual coupling. Many methods are done to decrease the mutual coupling effect such as polarization arrangement of the MIMO antennas. This study on the polarization arrangement of a circular patch MIMO antenna at 3.5 GHz was performed. Four elements of the MIMO antenna are arranged with several polarization configurations both in Co-Polarization and Cross-Polarization. Both simulation and measurement results showed that MIMO with Co-Polarization has a slightly wider bandwidth equal to 295.25 MHz compared to Cross-Polarization with a bandwidth of 274.63 MHz, due to better return loss performed by the former. However, from the mutual coupling perspective, it is observed that MIMO with Cross-Polarization can reduce the mutual coupling from -17.6676dB into -22.462 dB compared to Co-Polarization with the same element distance.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43605281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-26DOI: 10.20895/infotel.v14i1.729
Irwan Susanto
Lacovou presented research results in a framework that describes the role of the determinants of technology, organization, and environment simultaneously influencing the innovation adoption decision-making process. The Lacovou framework is an extension study of the Tornatzky framework. Tornatzky's framework addresses three determinants that influence innovation adoption. Unfortunately, Lacovou did not present how the decision process took place. Decisions can be rational or irrational. Ajzen and several other studies defined rational decisions as decisions based on considered information or for a reason as. Previous research had not revealed empirically the rational calculation process in making innovation adoption decisions. Innovation adoption is someone's choice when he/she perceive the benefit and feel appropriate the innovation and will use or intend to use it. This study intends to reveal how the process of rational calculation in the decision-making adoption of innovations through the field experiment method. This study also reveals whether the decision of Small Medium Enterprises (SMEs) to adopt Electronic Data Capture (EDC) is rational. Research analysis using descriptive analysis method. The results show that the rational calculation process can be observed through the field experiment method. The shift in decisions represented by changes in the data on the number of subjects who make adoption decisions illustrate the rational calculation process. The results show that the decision of SMEs in adopting EDC is mostly rational. The yields of this field experiment- research was confirming Lacovou framework. The research illustrates the simulation of the effect of a combination of perceived benefits, organizational readiness, and environmental factors simultaneously
{"title":"Using Field Experiments to Analyze Changes in Electronic Data Capture Adoption Decisions","authors":"Irwan Susanto","doi":"10.20895/infotel.v14i1.729","DOIUrl":"https://doi.org/10.20895/infotel.v14i1.729","url":null,"abstract":"Lacovou presented research results in a framework that describes the role of the determinants of technology, organization, and environment simultaneously influencing the innovation adoption decision-making process. The Lacovou framework is an extension study of the Tornatzky framework. Tornatzky's framework addresses three determinants that influence innovation adoption. Unfortunately, Lacovou did not present how the decision process took place. Decisions can be rational or irrational. Ajzen and several other studies defined rational decisions as decisions based on considered information or for a reason as. Previous research had not revealed empirically the rational calculation process in making innovation adoption decisions. Innovation adoption is someone's choice when he/she perceive the benefit and feel appropriate the innovation and will use or intend to use it. This study intends to reveal how the process of rational calculation in the decision-making adoption of innovations through the field experiment method. This study also reveals whether the decision of Small Medium Enterprises (SMEs) to adopt Electronic Data Capture (EDC) is rational. Research analysis using descriptive analysis method. The results show that the rational calculation process can be observed through the field experiment method. The shift in decisions represented by changes in the data on the number of subjects who make adoption decisions illustrate the rational calculation process. The results show that the decision of SMEs in adopting EDC is mostly rational. The yields of this field experiment- research was confirming Lacovou framework. The research illustrates the simulation of the effect of a combination of perceived benefits, organizational readiness, and environmental factors simultaneously \u0000 ","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41579653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-26DOI: 10.20895/infotel.v14i1.725
M. Galina, Cutifa Safitri, Iksan Bukhori, Arthur Silitonga, A. Suhartomo
This paper proposes the implementation of IoT-based agriculture monitoring with audio growth (sonic bloom) to optimize the growth of plants and harvest. Sonic bloom is a technology that combines high-frequency sound waves from living things, nature or music, and organic nutrients, which aims to make plants grow more optimally so that they can increase productivity. The method’s main advantage is implementing an innovative IoT monitoring hybrid with audio growth systems to boost the plantation growth and maximize the yield. Our experiment in 10 planters using chilies, has proven the proposed procedure. This work is backed up with literature studies of the audio growth (sonic bloom) in IoT technologies. To validate our findings, four parameters were measured through different sensors such as light sensors, temperature, humidity, and soil moisture. It was found that the proposed method can achieve significant results against the comparison in terms of plant heights and new sprouts for the harvest.
{"title":"An implementation of smart agriculture for optimizing growth using sonic bloom and IoT integrated","authors":"M. Galina, Cutifa Safitri, Iksan Bukhori, Arthur Silitonga, A. Suhartomo","doi":"10.20895/infotel.v14i1.725","DOIUrl":"https://doi.org/10.20895/infotel.v14i1.725","url":null,"abstract":"This paper proposes the implementation of IoT-based agriculture monitoring with audio growth (sonic bloom) to optimize the growth of plants and harvest. Sonic bloom is a technology that combines high-frequency sound waves from living things, nature or music, and organic nutrients, which aims to make plants grow more optimally so that they can increase productivity. The method’s main advantage is implementing an innovative IoT monitoring hybrid with audio growth systems to boost the plantation growth and maximize the yield. Our experiment in 10 planters using chilies, has proven the proposed procedure. This work is backed up with literature studies of the audio growth (sonic bloom) in IoT technologies. To validate our findings, four parameters were measured through different sensors such as light sensors, temperature, humidity, and soil moisture. It was found that the proposed method can achieve significant results against the comparison in terms of plant heights and new sprouts for the harvest.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43488173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-26DOI: 10.20895/infotel.v14i1.735
B. K. Khotimah
Maize is one kind of commodity consumption in domestic as well as export that has high economic value. However, the low productivity is caused by the main factor, namely the decreased level of soil fertility, so that it has the same effect on crop yields. These problems require the application of technology with the K-Nearest Neighbor (KNN) method. The method of study is based on 17 signs of nutrient deficiencies with Minkowski distance calculation process, calculation of deficiency of soil nutrients based on the value of K determined. The test results of the research use K = 75 to get an accuracy of 92.40. Comparative analysis of the K-nearest neighbor (K-NN) and NB methods by looking for the closeness between the criteria for new cases and old case criteria based on the criteria for the closest cases. The results showed that the K-Nearest Neighbor (K-NN) Algorithm had a better accuracy value than NB.
{"title":"Performance of the K-Nearest Neighbors Method on Identification of Maize Plant Nutrients","authors":"B. K. Khotimah","doi":"10.20895/infotel.v14i1.735","DOIUrl":"https://doi.org/10.20895/infotel.v14i1.735","url":null,"abstract":"Maize is one kind of commodity consumption in domestic as well as export that has high economic value. However, the low productivity is caused by the main factor, namely the decreased level of soil fertility, so that it has the same effect on crop yields. These problems require the application of technology with the K-Nearest Neighbor (KNN) method. The method of study is based on 17 signs of nutrient deficiencies with Minkowski distance calculation process, calculation of deficiency of soil nutrients based on the value of K determined. The test results of the research use K = 75 to get an accuracy of 92.40. Comparative analysis of the K-nearest neighbor (K-NN) and NB methods by looking for the closeness between the criteria for new cases and old case criteria based on the criteria for the closest cases. The results showed that the K-Nearest Neighbor (K-NN) Algorithm had a better accuracy value than NB.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43416202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-26DOI: 10.20895/infotel.v14i1.740
Risanuri Hidayat
Abstract —The research on speech recognition systems currently focuses on the analysis of robust speech recognition systems. When the speech signals are combined with noise, the recognition system becomes distracted, struggling to identify the speech sounds. Therefore, the development of a robust speech recognition system continues to be carried out. The principle of a robust speech recognition system is to eliminate noise from the speech signals and restore the original information signals. In this paper, researchers conducted a frequency domain analysis on one stage of the Mel Frequency Cepstral Coefficients (MFCC) process, the Fast Fourier Transform (FFT), in children's speech recognition system. The FTT analysis in the feature extraction process determined the effect of frequency value characteristics utilized in the FFT output on the noise disruption. The analysis method was designed into three scenarios based on the value of the employed FFT points. The differences between scenarios were based on the number of shared FFT points. All FFT points were divided into four, three, and two parts in the first, second, and third scenarios, respectively. This study utilized children's speech data from the isolated TIDIGIT English digit corpus. As comparative data, the noise was added manually to simulate real-world conditions. The results showed that using a particular frequency portion following the scenario designed on MFCC affected the recognition system performance, which was relatively significant on the noisy speech data. The designed method in the scenario 3 (C1) version generated the highest accuracy, exceeded the accuracy of the conventional MFCC method. The average accuracy in the scenario 3 (C1) method increased by 1% more than all the tested noise types. Using various noise intensity values (SNR), the testing process indicates that scenario 3 (C1) generates a higher accuracy than conventional MFCC in all tested SNR values. It proves that the selection of specific frequency utilized in MFCC feature extraction significantly affects the recognition accuracy in a noisy speech.
{"title":"Frequency Domain Analysis of MFCC Feature Extraction in Children’s Speech Recognition System","authors":"Risanuri Hidayat","doi":"10.20895/infotel.v14i1.740","DOIUrl":"https://doi.org/10.20895/infotel.v14i1.740","url":null,"abstract":"Abstract —The research on speech recognition systems currently focuses on the analysis of robust speech recognition systems. When the speech signals are combined with noise, the recognition system becomes distracted, struggling to identify the speech sounds. Therefore, the development of a robust speech recognition system continues to be carried out. The principle of a robust speech recognition system is to eliminate noise from the speech signals and restore the original information signals. In this paper, researchers conducted a frequency domain analysis on one stage of the Mel Frequency Cepstral Coefficients (MFCC) process, the Fast Fourier Transform (FFT), in children's speech recognition system. The FTT analysis in the feature extraction process determined the effect of frequency value characteristics utilized in the FFT output on the noise disruption. The analysis method was designed into three scenarios based on the value of the employed FFT points. The differences between scenarios were based on the number of shared FFT points. All FFT points were divided into four, three, and two parts in the first, second, and third scenarios, respectively. This study utilized children's speech data from the isolated TIDIGIT English digit corpus. As comparative data, the noise was added manually to simulate real-world conditions. The results showed that using a particular frequency portion following the scenario designed on MFCC affected the recognition system performance, which was relatively significant on the noisy speech data. The designed method in the scenario 3 (C1) version generated the highest accuracy, exceeded the accuracy of the conventional MFCC method. The average accuracy in the scenario 3 (C1) method increased by 1% more than all the tested noise types. Using various noise intensity values (SNR), the testing process indicates that scenario 3 (C1) generates a higher accuracy than conventional MFCC in all tested SNR values. It proves that the selection of specific frequency utilized in MFCC feature extraction significantly affects the recognition accuracy in a noisy speech.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47939881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-26DOI: 10.20895/infotel.v14i1.706
D. Perdana, Albion Apta Zaim, A. Hikmaturokhman, Ananda Irsyad, Nindy Ayu Marthaliana
The purpose of this study is to simulate the GPSR protocol network on NS3 using the bird flocking algorithm and to analyze the comparison of performance measurements obtained from the simulation results. The Greedy Perimeter Stateless Routing network was simulated using NS-3 in this simulation. The simulation area is created in length, width. The distance between nodes is 50 meters and is simulated in an area of 1000m x 300m for 30 seconds and 802.11 MAC protocol is used. This simulation was successfully implemented in finding the location of the nearest node using the GPSR protocol with the PSO / BFA algorithm. The number of nodes used in the simulation is 150 nodes and 2 nodes, so it can be concluded that the performance of Quality of Service (QoS) is greatly affected by the number of nodes and the algorithm used in the simulation.
{"title":"Analysis of Greedy Perimeter Stateless Routing Protocol Network Simulation using Bird Flocking Algorithm","authors":"D. Perdana, Albion Apta Zaim, A. Hikmaturokhman, Ananda Irsyad, Nindy Ayu Marthaliana","doi":"10.20895/infotel.v14i1.706","DOIUrl":"https://doi.org/10.20895/infotel.v14i1.706","url":null,"abstract":"The purpose of this study is to simulate the GPSR protocol network on NS3 using the bird flocking algorithm and to analyze the comparison of performance measurements obtained from the simulation results. The Greedy Perimeter Stateless Routing network was simulated using NS-3 in this simulation. The simulation area is created in length, width. The distance between nodes is 50 meters and is simulated in an area of 1000m x 300m for 30 seconds and 802.11 MAC protocol is used. This simulation was successfully implemented in finding the location of the nearest node using the GPSR protocol with the PSO / BFA algorithm. The number of nodes used in the simulation is 150 nodes and 2 nodes, so it can be concluded that the performance of Quality of Service (QoS) is greatly affected by the number of nodes and the algorithm used in the simulation.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45492590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-09DOI: 10.20895/infotel.v13i4.700
Muhammad Abdullah Rasyad, Favian Dewanta, Sri Astuti
Object detection gives a computer ability to classify objects in an image or video. However, high specified devices are needed to get a good performance. To enable devices with low specifications performs better, one way is offloading the computation process from a device with a low specification to another device with better specifications. This paper investigates the performance of object detection strategies on all-in-one Android mobile phone computation versus Android mobile phone computation with computational offloading on Nvidia Jetson Nano. The experiment carries out the video surveillance from the Android mobile phone with two scenarios, all-in-one object detection computation in a single Android device and decoupled object detection computation between an Android device and an Nvidia Jetson Nano. Android applications send video input for object detection using RTSP/RTMP streaming protocol and received by Nvidia Jetson Nano which acts as an RTSP/RTMP server. Then, the output of object detection is sent back to the Android device for being displayed to the user. The results show that the android device Huawei Y7 Pro with an average FPS performance of 1.82 and an average computing speed of 552 ms significantly improves when working with the Nvidia Jetson Nano, the average FPS becomes ten and the average computing speed becomes 95 ms. It means decoupling object detection computation between an Android device and an Nvidia Jetson Nano using the system provided in this paper successfully improves the detection speed performance.
{"title":"All-in-one computation vs computational-offloading approaches: a performance evaluation of object detection strategies on android mobile devices","authors":"Muhammad Abdullah Rasyad, Favian Dewanta, Sri Astuti","doi":"10.20895/infotel.v13i4.700","DOIUrl":"https://doi.org/10.20895/infotel.v13i4.700","url":null,"abstract":"Object detection gives a computer ability to classify objects in an image or video. However, high specified devices are needed to get a good performance. To enable devices with low specifications performs better, one way is offloading the computation process from a device with a low specification to another device with better specifications. This paper investigates the performance of object detection strategies on all-in-one Android mobile phone computation versus Android mobile phone computation with computational offloading on Nvidia Jetson Nano. The experiment carries out the video surveillance from the Android mobile phone with two scenarios, all-in-one object detection computation in a single Android device and decoupled object detection computation between an Android device and an Nvidia Jetson Nano. Android applications send video input for object detection using RTSP/RTMP streaming protocol and received by Nvidia Jetson Nano which acts as an RTSP/RTMP server. Then, the output of object detection is sent back to the Android device for being displayed to the user. The results show that the android device Huawei Y7 Pro with an average FPS performance of 1.82 and an average computing speed of 552 ms significantly improves when working with the Nvidia Jetson Nano, the average FPS becomes ten and the average computing speed becomes 95 ms. It means decoupling object detection computation between an Android device and an Nvidia Jetson Nano using the system provided in this paper successfully improves the detection speed performance.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45433286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-09DOI: 10.20895/infotel.v13i4.652
N. Noprianto, V. N. Wijayaningrum
As a currently popular technology, the use of smart cards continues to increase in various fields and the rapid development of technology. Therefore, data security stored on a smart card needs to focus on avoiding misuse of data by unauthorized parties. However, it is not enough for the security mechanism to be carried out only during the communication process of sending data. Then, the mechanism for securing data on the smart card also needs to be done. In this study, a data security technique using dynamic keys is proposed by changing the key and access conditions on the smart card according to predetermined rules. Dynamic keys are a new mechanism proposed to authenticate smart cards using a different key on each card. This technique ensures that the keys used to access each smart card are different so that the risk of data duplication and modification threats can be minimized. In addition, this mechanism is a low-cost security privacy protection. The test results show that the data security technique using dynamic keys ensures that read and write access to the smart card can only be done if the keys match the rules.
{"title":"Smart card security mechanism with dynamic key","authors":"N. Noprianto, V. N. Wijayaningrum","doi":"10.20895/infotel.v13i4.652","DOIUrl":"https://doi.org/10.20895/infotel.v13i4.652","url":null,"abstract":"As a currently popular technology, the use of smart cards continues to increase in various fields and the rapid development of technology. Therefore, data security stored on a smart card needs to focus on avoiding misuse of data by unauthorized parties. However, it is not enough for the security mechanism to be carried out only during the communication process of sending data. Then, the mechanism for securing data on the smart card also needs to be done. In this study, a data security technique using dynamic keys is proposed by changing the key and access conditions on the smart card according to predetermined rules. Dynamic keys are a new mechanism proposed to authenticate smart cards using a different key on each card. This technique ensures that the keys used to access each smart card are different so that the risk of data duplication and modification threats can be minimized. In addition, this mechanism is a low-cost security privacy protection. The test results show that the data security technique using dynamic keys ensures that read and write access to the smart card can only be done if the keys match the rules.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46236760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-09DOI: 10.20895/infotel.v13i4.712
Arief Goeritno, Ika Setyawibawa, Dwi Suhartono
The interface device for communicating (IDC) as a bridge for the merger between two different systems based on different protocols and standards can be made of several electronic modules. The two Arduino boards (UNO R3 and MEGA2560 R3) have been constructed as the electronic modules of a gateway become a haft-duplex IDC, and are driven by the touch-tone signal. The research objectives, i.e., assembling some of the hardware for the embodiment of the adapter system, making a program structure, and performing a test of the IDC system. The haft-duplex IDC has been carried out by integrating all components by wiring to form an embedded system. Then, programming the microcontroller modules based on the Arduino software is carried outin six stages. Finally, the simulation test with the provision of conditions is carried out and obtained of six conditions for (i) the circuit of ring detection, (ii) the circuit of voice-operated transmit, (iii) the circuit off/on the hook of the telephone module, (iv) the circuit of tone decoder, (v) dial-up telephone numbers via push buttons and switching IC circuits, and (vi) the circuits of voice recording and storage in the form to playback. The test's success with six conditions has been an indication that the microcontroller-based IDC system is functioning as expected. Completing, the conclusion, and recommendationsrelated to measurement on the various purposes and the real conditions for the half-duplex interface adapter can be implemented.
通信接口设备(interface device for communication, IDC)可以由多个电子模块组成,作为两个基于不同协议和标准的不同系统之间融合的桥梁。将两块Arduino板(UNO R3和MEGA2560 R3)构建为网关的电子模块,成为半双工IDC,由按键信号驱动。本研究的目标是,为适配器系统的实施例组装部分硬件,制作程序结构,并对IDC系统进行测试。半双工IDC是通过布线将所有组件集成成一个嵌入式系统来实现的。然后,基于Arduino软件对单片机模块进行了六个阶段的编程。最后,在提供条件的情况下进行了仿真测试,得到了(i)振铃检测电路、(ii)话音操作传输电路、(iii)电话模块开/挂电路、(iv)语音解码器电路、(v)通过按键和切换IC电路拨号电话号码、(vi)以回放形式录制和存储语音的电路等6个条件。测试在六个条件下的成功表明基于微控制器的IDC系统按预期运行。完成了对半双工接口适配器的各种用途和实际条件进行测量的相关结论和建议。
{"title":"Designing a microcontroller-based half-duplex interface device drove by the touch-tone signal","authors":"Arief Goeritno, Ika Setyawibawa, Dwi Suhartono","doi":"10.20895/infotel.v13i4.712","DOIUrl":"https://doi.org/10.20895/infotel.v13i4.712","url":null,"abstract":"The interface device for communicating (IDC) as a bridge for the merger between two different systems based on different protocols and standards can be made of several electronic modules. The two Arduino boards (UNO R3 and MEGA2560 R3) have been constructed as the electronic modules of a gateway become a haft-duplex IDC, and are driven by the touch-tone signal. The research objectives, i.e., assembling some of the hardware for the embodiment of the adapter system, making a program structure, and performing a test of the IDC system. The haft-duplex IDC has been carried out by integrating all components by wiring to form an embedded system. Then, programming the microcontroller modules based on the Arduino software is carried outin six stages. Finally, the simulation test with the provision of conditions is carried out and obtained of six conditions for (i) the circuit of ring detection, (ii) the circuit of voice-operated transmit, (iii) the circuit off/on the hook of the telephone module, (iv) the circuit of tone decoder, (v) dial-up telephone numbers via push buttons and switching IC circuits, and (vi) the circuits of voice recording and storage in the form to playback. The test's success with six conditions has been an indication that the microcontroller-based IDC system is functioning as expected. Completing, the conclusion, and recommendationsrelated to measurement on the various purposes and the real conditions for the half-duplex interface adapter can be implemented.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45837386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-09DOI: 10.20895/infotel.v13i4.738
B. Aprilia, M. Z. Romdlony, J. Raharjo, Yogi Ghifari Sidik
In general active sun trackers move because they respond to light sensors that measure the intensity of sunlight. However, sensor based trackers are usually more expensive than sensor less trackers. In addition, based on several studies, a comparison between sensor and sensorless based tracker only reports lower tracking error and higher power generation for sensor based than sensorless tracker but does not include an analysis of energy use on the sensor. Therefore, this study aims to design a sensorless closed loop tracking system for solar panels with two degrees of freedom. The tracking controller in this study is based on the Fuzzy Logic Controller (FLC) method. In this study, a dual-axis PV can increase power output by 20.2% compared to a fixed PV (0 ° axis position). This is because, in comparison to a fixed PV, dual axis PV adjusts the solar panel perpendicular to the sun's position to optimize electrical conversion.
{"title":"Fuzzy based sensorless tracking controller on the dual-axis PV panel for optimizing the power production","authors":"B. Aprilia, M. Z. Romdlony, J. Raharjo, Yogi Ghifari Sidik","doi":"10.20895/infotel.v13i4.738","DOIUrl":"https://doi.org/10.20895/infotel.v13i4.738","url":null,"abstract":"In general active sun trackers move because they respond to light sensors that measure the intensity of sunlight. However, sensor based trackers are usually more expensive than sensor less trackers. In addition, based on several studies, a comparison between sensor and sensorless based tracker only reports lower tracking error and higher power generation for sensor based than sensorless tracker but does not include an analysis of energy use on the sensor. Therefore, this study aims to design a sensorless closed loop tracking system for solar panels with two degrees of freedom. The tracking controller in this study is based on the Fuzzy Logic Controller (FLC) method. In this study, a dual-axis PV can increase power output by 20.2% compared to a fixed PV (0 ° axis position). This is because, in comparison to a fixed PV, dual axis PV adjusts the solar panel perpendicular to the sun's position to optimize electrical conversion.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43696408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}