This paper architecture analysis highlights the key components of the ADAS design, including the sensors, perception layer, decision-making layer, and action layer. It explains the flow of data through the system and how sensor fusion contributes to the creation of a comprehensive image of the car's surroundings. It goes on to cover further ADAS features and their advantages, such as automated braking, adaptive cruise control, traffic sign recognition, and blind-spot detection. The hopeful future of ADAS technology is highlighted in the article's conclusion, along with how it might change driving habits, boost traffic safety, and enhance driving in general. It draws attention to the critical issues that require more study and development in order to solve them and open the door for ADAS to be widely used in a variety of traffic situations, particularly in India.
{"title":"Exploring the Confluence of Technology and Driving: An Examination of Advanced Driver Assistance Systems","authors":"Editor, Sheela S Maharajpet, Chiranjeevi S","doi":"10.11594/ijer.v4i2.52","DOIUrl":"https://doi.org/10.11594/ijer.v4i2.52","url":null,"abstract":"This paper architecture analysis highlights the key components of the ADAS design, including the sensors, perception layer, decision-making layer, and action layer. It explains the flow of data through the system and how sensor fusion contributes to the creation of a comprehensive image of the car's surroundings. It goes on to cover further ADAS features and their advantages, such as automated braking, adaptive cruise control, traffic sign recognition, and blind-spot detection. The hopeful future of ADAS technology is highlighted in the article's conclusion, along with how it might change driving habits, boost traffic safety, and enhance driving in general. It draws attention to the critical issues that require more study and development in order to solve them and open the door for ADAS to be widely used in a variety of traffic situations, particularly in India.","PeriodicalId":308664,"journal":{"name":"Indonesian Journal of Engineering Research","volume":"1 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140435897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ghozi Restu Anggani, A. Arfianto, Arleiny Arleiny, Bambang Teguh Setiawan
One of the efforts to improve shipping safety is using the Automatic Identification System (AIS) according to the International Maritime Organization (IMO) recommendations. By utilizing Automatic Identification System (AIS) data, the system can monitor AIS ship movement patterns and compare them with the latest conditions. Information such as the ship's position, destination and speed is tracked. The author will create a real-time ship collision early warning system based on AIS data in this final project. The method used is the haversine formula to calculate the distance between two coordinate points on the earth's surface based on the ship's latitude and longitude. The results of AIS data in the form of latitude, longitude, and ID numbers will be processed using PHP to determine the distance and angle of the ship in real time. From 50 tests on two ships, two conditions can cause ship collisions. The results of these tests are that the percentage of collisions is 4%. The real-time system helps know the ship's actual movement based on current conditions
{"title":"Ship Collision Realtime Early Warning System Based on Automatic Identification System (AIS) Data","authors":"Ghozi Restu Anggani, A. Arfianto, Arleiny Arleiny, Bambang Teguh Setiawan","doi":"10.11594/ijer.v3i1.42","DOIUrl":"https://doi.org/10.11594/ijer.v3i1.42","url":null,"abstract":"One of the efforts to improve shipping safety is using the Automatic Identification System (AIS) according to the International Maritime Organization (IMO) recommendations. By utilizing Automatic Identification System (AIS) data, the system can monitor AIS ship movement patterns and compare them with the latest conditions. Information such as the ship's position, destination and speed is tracked. The author will create a real-time ship collision early warning system based on AIS data in this final project. The method used is the haversine formula to calculate the distance between two coordinate points on the earth's surface based on the ship's latitude and longitude. The results of AIS data in the form of latitude, longitude, and ID numbers will be processed using PHP to determine the distance and angle of the ship in real time. From 50 tests on two ships, two conditions can cause ship collisions. The results of these tests are that the percentage of collisions is 4%. The real-time system helps know the ship's actual movement based on current conditions","PeriodicalId":308664,"journal":{"name":"Indonesian Journal of Engineering Research","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115660383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lack of river and watershed management will cause problems and disasters. One of it is the flood that can cause physical, social and economic loss. So countermeasures or flood anticipation are needed by using the Early Warning System (EWS) to provide early information if a flood is going to occur. This study uses five input indicators: temperature, humidity, water discharge, water surface altitude and rainfall data that will produce output in the form of notifications and alarms for the Early Warning System (EWS). Then the input and output data configuration will be processed using a Backpropagation Neural Network. Data used is data recorded in real-time on the research object for two weeks with the composition of training and testing data with a percentage of 80% and 20%. The best backpropagation neural network model used has the input of 5 neurons layer architecture, 15 neurons as the hidden layer and three neurons as the output layer. The flood prediction result uses the Backpropagation Neural Network method, has an RMSE score performance of 2.16e-21 and a percentage success testing system of 91.33%. It shows that the model has an excellent accuracy level.
{"title":"Flood Detection Using Backpropagation Neural Network Method","authors":"Ani Dwi Ratnasari, Khoirul Hasin","doi":"10.11594/ijer.v3i1.40","DOIUrl":"https://doi.org/10.11594/ijer.v3i1.40","url":null,"abstract":"Lack of river and watershed management will cause problems and disasters. One of it is the flood that can cause physical, social and economic loss. So countermeasures or flood anticipation are needed by using the Early Warning System (EWS) to provide early information if a flood is going to occur. This study uses five input indicators: temperature, humidity, water discharge, water surface altitude and rainfall data that will produce output in the form of notifications and alarms for the Early Warning System (EWS). Then the input and output data configuration will be processed using a Backpropagation Neural Network. Data used is data recorded in real-time on the research object for two weeks with the composition of training and testing data with a percentage of 80% and 20%. The best backpropagation neural network model used has the input of 5 neurons layer architecture, 15 neurons as the hidden layer and three neurons as the output layer. The flood prediction result uses the Backpropagation Neural Network method, has an RMSE score performance of 2.16e-21 and a percentage success testing system of 91.33%. It shows that the model has an excellent accuracy level.","PeriodicalId":308664,"journal":{"name":"Indonesian Journal of Engineering Research","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132749370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Based on data obtained from Indonesian fisheries statistics, over ten years, it is known that 90% of the fishing fleet in Indonesia is dominated by fishing vessels under 30 GT. Generally, these vessels are not equipped with the calculations of the shipping architect or planning drawings. the large percentage of shipping disasters or vessel accidents in Indonesia, including fishing vessel accidents, is caused by several factors: 43.67% due to human error, 32.37% due to nature, 23.94% due to technical factors. Accidents due to bad weather cannot be avoided during fishing operations. However, with the quality of human resources and technical factors that have improved, it is hoped that vessel accidents can be avoided or minimized. According to the Global Maritime Distress and Safety System (GMDSS), vessels with the IMO standard are already based on satellite communications. Vessels required to use the GMDSS standard are vessels with a size of 300 GT and above. We develop a Vessel Safety Monitoring System (VSMS) which has a lower cost, which can be used to determine the vessel’s position and is added by using a distress button system such as the satellite-based GMDSS system. the communication from the coast guard post to the vessel uses the LoRA module based on radio frequency, although without pressing the distress button on the vessel, the device on the vessel will continue to send location, vessel's speed, and rpm to the coast guard station. If the distress button is pressed, the location will still be sent, the buzzer at the coast guard post will turn on, and the vessel's location can be seen on the local web server so that the coast guard post officers can immediately find out the coordinates of the vessel. It can minimize the time to search for the vessel's location because the vessel's coordinates are known. Based on the results of the Vessel Safety Monitoring System (VSMS) test, 10 data transmission from the vessel to the coast guard post can work on the land and the sea it can send nine types of data with 0 - 50 meters distance, it can send 1 type of data with a 0 - 100 meters distance, with an average delivery delay of 5 seconds. The amount of data and the delivery delay affects the working distance of the tool. The distress function or the danger signal requires data transmission for 0-15 seconds manually or automatically until the alarm goes off at the coast guard post since the vessel's danger signal is activated from the vessel to the coast guard post
{"title":"Vessel Safety Monitoring System (VSMS) Based on LoRA for the Safety of Indonesian Traditional Fishers","authors":"F. Nofandi, R. Mahendra, Endang Purwanti","doi":"10.11594/ijer.v3i1.36","DOIUrl":"https://doi.org/10.11594/ijer.v3i1.36","url":null,"abstract":"Based on data obtained from Indonesian fisheries statistics, over ten years, it is known that 90% of the fishing fleet in Indonesia is dominated by fishing vessels under 30 GT. Generally, these vessels are not equipped with the calculations of the shipping architect or planning drawings. the large percentage of shipping disasters or vessel accidents in Indonesia, including fishing vessel accidents, is caused by several factors: 43.67% due to human error, 32.37% due to nature, 23.94% due to technical factors. Accidents due to bad weather cannot be avoided during fishing operations. However, with the quality of human resources and technical factors that have improved, it is hoped that vessel accidents can be avoided or minimized. According to the Global Maritime Distress and Safety System (GMDSS), vessels with the IMO standard are already based on satellite communications. Vessels required to use the GMDSS standard are vessels with a size of 300 GT and above. We develop a Vessel Safety Monitoring System (VSMS) which has a lower cost, which can be used to determine the vessel’s position and is added by using a distress button system such as the satellite-based GMDSS system. the communication from the coast guard post to the vessel uses the LoRA module based on radio frequency, although without pressing the distress button on the vessel, the device on the vessel will continue to send location, vessel's speed, and rpm to the coast guard station. If the distress button is pressed, the location will still be sent, the buzzer at the coast guard post will turn on, and the vessel's location can be seen on the local web server so that the coast guard post officers can immediately find out the coordinates of the vessel. It can minimize the time to search for the vessel's location because the vessel's coordinates are known. Based on the results of the Vessel Safety Monitoring System (VSMS) test, 10 data transmission from the vessel to the coast guard post can work on the land and the sea it can send nine types of data with 0 - 50 meters distance, it can send 1 type of data with a 0 - 100 meters distance, with an average delivery delay of 5 seconds. The amount of data and the delivery delay affects the working distance of the tool. The distress function or the danger signal requires data transmission for 0-15 seconds manually or automatically until the alarm goes off at the coast guard post since the vessel's danger signal is activated from the vessel to the coast guard post","PeriodicalId":308664,"journal":{"name":"Indonesian Journal of Engineering Research","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131974048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-29DOI: 10.11594/10.11594/ijer.02.02.06
N. Rosyida, R. A. Atmoko, Galih Panji Handoko, I. M. Widia, Salnan Ratih Asriningtyas
Tourism is one of the sectors that have been hit hard during the current Covid-19 pandemic. However, in 2021 the tourism sector is slowly rising marked by the number of tourist attractions that are starting to open to the public with the implementation of strict health protocols. However, in practice there are still many cases of violations of health protocols in various tourist attractions, ranging from the undisciplined use of masks, not keeping a distance (social distancing), and the absence of setting the ideal number of visitors during a pandemic like the current one. Managers of tourist attractions tend to ignore restrictions on the number of visitors due to the absence of an management system to run. There needs to be an application that can inform the condition of visitors to tourist attractions in real-time so that people have self-awareness of their personal health so that people can make early plans before traveling. In good governance, this application contributes to controlling the risk of Covid-19 transmission originating from crowded centers (tourist spots). The government can easily monitor the distribution of tourist visitor density in the area so that it can then be used as a basis for carrying out policies and handling in the field. This study proposes the development of an application platform (software and hardware) monitoring the density of visitors to tourist attractions using the concept of object detection based on image processing and deep learning. The integration of hardware with web-based software will provide information on the density of visitors to tourist attractions that are easily accessible to the public so that they are expected to contribute to the handling of the current Covid-19 pandemic.
{"title":"Tourist Attractions Visitor Density Monitoring Platform","authors":"N. Rosyida, R. A. Atmoko, Galih Panji Handoko, I. M. Widia, Salnan Ratih Asriningtyas","doi":"10.11594/10.11594/ijer.02.02.06","DOIUrl":"https://doi.org/10.11594/10.11594/ijer.02.02.06","url":null,"abstract":"Tourism is one of the sectors that have been hit hard during the current Covid-19 pandemic. However, in 2021 the tourism sector is slowly rising marked by the number of tourist attractions that are starting to open to the public with the implementation of strict health protocols. However, in practice there are still many cases of violations of health protocols in various tourist attractions, ranging from the undisciplined use of masks, not keeping a distance (social distancing), and the absence of setting the ideal number of visitors during a pandemic like the current one. Managers of tourist attractions tend to ignore restrictions on the number of visitors due to the absence of an management system to run. There needs to be an application that can inform the condition of visitors to tourist attractions in real-time so that people have self-awareness of their personal health so that people can make early plans before traveling. In good governance, this application contributes to controlling the risk of Covid-19 transmission originating from crowded centers (tourist spots). The government can easily monitor the distribution of tourist visitor density in the area so that it can then be used as a basis for carrying out policies and handling in the field. \u0000This study proposes the development of an application platform (software and hardware) monitoring the density of visitors to tourist attractions using the concept of object detection based on image processing and deep learning. The integration of hardware with web-based software will provide information on the density of visitors to tourist attractions that are easily accessible to the public so that they are expected to contribute to the handling of the current Covid-19 pandemic.","PeriodicalId":308664,"journal":{"name":"Indonesian Journal of Engineering Research","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121984657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-27DOI: 10.11594/10.11594/ijer.02.02.05
Aris E. Ignacio, Mark Angelo A. Ligot
Autism has a very wide range that influences people, specifically children in general. Usually, it affects a child’s social interaction, communication, behaviors, and interests. Providing a complete device for treatment which is planned to be used by kids with autism needs to be taken into consideration. There is no software available that will adhere to the main areas of autism. The development a multidimensional software that focuses the main areas of kids with autism was a specific goal that the paper is being addressed. It is planned from the viewpoint of several specialists: more particularly speech therapist, occupational therapist, Special Education (SPED) educator and an Applied Behavior Analysis (ABA) specialist. The specialists’ focused objectives were lengthily included into the planning of the software. The development of an application for the young with autism that would completely attend to all the main areas that are initiated by autism and serves as an addendum to treatment is the primary goal of the study. Interviews from, speech therapist, occupational therapist, SPED teacher, ABA therapist and a SPED therapist will serve as a basis and the prototyping methodology for system development. With the implemented system, the intended users gave an approval on the application to be integrated in the teaching of children with autism. Suggestions on the improvement of the application comprises of including video recording for API 22, implementing the system in the iOS environment, and concentration on older autism cases were recommended.
{"title":"EmbrASD: Android Mobile Application for Children with Autism as a Supplemental Tool for Therapy","authors":"Aris E. Ignacio, Mark Angelo A. Ligot","doi":"10.11594/10.11594/ijer.02.02.05","DOIUrl":"https://doi.org/10.11594/10.11594/ijer.02.02.05","url":null,"abstract":"Autism has a very wide range that influences people, specifically children in general. Usually, it affects a child’s social interaction, communication, behaviors, and interests. Providing a complete device for treatment which is planned to be used by kids with autism needs to be taken into consideration. There is no software available that will adhere to the main areas of autism. The development a multidimensional software that focuses the main areas of kids with autism was a specific goal that the paper is being addressed. It is planned from the viewpoint of several specialists: more particularly speech therapist, occupational therapist, Special Education (SPED) educator and an Applied Behavior Analysis (ABA) specialist. The specialists’ focused objectives were lengthily included into the planning of the software. The development of an application for the young with autism that would completely attend to all the main areas that are initiated by autism and serves as an addendum to treatment is the primary goal of the study. Interviews from, speech therapist, occupational therapist, SPED teacher, ABA therapist and a SPED therapist will serve as a basis and the prototyping methodology for system development. With the implemented system, the intended users gave an approval on the application to be integrated in the teaching of children with autism. Suggestions on the improvement of the application comprises of including video recording for API 22, implementing the system in the iOS environment, and concentration on older autism cases were recommended.","PeriodicalId":308664,"journal":{"name":"Indonesian Journal of Engineering Research","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133514736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-27DOI: 10.11594/10.11594/ijer.02.02.04
Farizqi Panduardi, Herman Yuliandoko, Agus Priyo Utomo
Network security is now increasingly needed in the era of the industrial revolution 4.0. As technology grows, cybercrimes are becoming more and more common, including attacks on a resource. At this time, honeypots are also widely used by large industries for network security, besides that honeypots are also useful for them in developing intrusion and preventing systems. Honeypots are usually used in a virtual environment, they will stimulate a fake system to capture data packets on the network and be analysed offline later for all threats and attacks. This propose of this paper is to detect and prevent building attacks from computer network attackers using an android application. This application can monitor an attack on the server by installing a honeypot tool into the server as an attack detector, then the honeypot log is used as a Rest API using Django framework with MongoDB database. this application can find out if there is an attack on the server, and can block the attacker's IP address.
{"title":"Network Security Using Honeypot and Attack Detection with Android Application","authors":"Farizqi Panduardi, Herman Yuliandoko, Agus Priyo Utomo","doi":"10.11594/10.11594/ijer.02.02.04","DOIUrl":"https://doi.org/10.11594/10.11594/ijer.02.02.04","url":null,"abstract":"Network security is now increasingly needed in the era of the industrial revolution 4.0. As technology grows, cybercrimes are becoming more and more common, including attacks on a resource. At this time, honeypots are also widely used by large industries for network security, besides that honeypots are also useful for them in developing intrusion and preventing systems. Honeypots are usually used in a virtual environment, they will stimulate a fake system to capture data packets on the network and be analysed offline later for all threats and attacks. \u0000This propose of this paper is to detect and prevent building attacks from computer network attackers using an android application. This application can monitor an attack on the server by installing a honeypot tool into the server as an attack detector, then the honeypot log is used as a Rest API using Django framework with MongoDB database. this application can find out if there is an attack on the server, and can block the attacker's IP address.","PeriodicalId":308664,"journal":{"name":"Indonesian Journal of Engineering Research","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130460715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-27DOI: 10.11594/10.11594/ijer.02.02.03
Venny Novita Sari, Feri Hari Utami, Asnawati, Yupianti, Rizka Tri Alinse, Jhoanne Fredricka
This study aims to apply the vikor method in the selection of scholarship receipts at Bengkulu Dehasen University. Designing the process by describing how the VIKOR (Visekriterijumsko Kompromisno Rangeranje) method should be used based on criteria (indications, achievements, credits and living expenses) fulfilled by prospective scholarship recipients in accordance with the provisions of Dehasen Bengkulu University in selecting scholarship acceptance. Based on the results obtained it can be proven that the condition of Acceptable stability in decision making is fulfilled (Namely a smaller value than 1) and Intan P Can be proposed to be a compromise solution which is the best ranking of scholarship recipients ranking by this VIKOR (Visekriterijumsko Kompromisno Rangeranje) method.
{"title":"Decision Support System in Scholarship Acceptance Selection Using The Vikor Method","authors":"Venny Novita Sari, Feri Hari Utami, Asnawati, Yupianti, Rizka Tri Alinse, Jhoanne Fredricka","doi":"10.11594/10.11594/ijer.02.02.03","DOIUrl":"https://doi.org/10.11594/10.11594/ijer.02.02.03","url":null,"abstract":"This study aims to apply the vikor method in the selection of scholarship receipts at Bengkulu Dehasen University. Designing the process by describing how the VIKOR (Visekriterijumsko Kompromisno Rangeranje) method should be used based on criteria (indications, achievements, credits and living expenses) fulfilled by prospective scholarship recipients in accordance with the provisions of Dehasen Bengkulu University in selecting scholarship acceptance. Based on the results obtained it can be proven that the condition of Acceptable stability in decision making is fulfilled (Namely a smaller value than 1) and Intan P Can be proposed to be a compromise solution which is the best ranking of scholarship recipients ranking by this VIKOR (Visekriterijumsko Kompromisno Rangeranje) method.","PeriodicalId":308664,"journal":{"name":"Indonesian Journal of Engineering Research","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127396159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-27DOI: 10.11594/10.11594/ijer.02.02.01
A. Mahmudah, Syafi’i, D. Handayani, S. J. Legowo, Widia Hartono
The Covid-19 pandemic in 2020 has a significant impact on all countries' social and economic conditions, including Indonesia. It is fitting that social and economic changes also affect the transportation sector. The value of economic benefits in one public facility operation also depreciated due to the economic recession. One of the variables that can be reviewed is the time value of public passenger transportation users (AUP) to measure how much depreciation has occurred. This study specifically for travel is learning, using the bus mode Batik Solo Trans (BST) Corridor 4. Development of scenarios for questionnaires with stated preference methods, using the choice mode between motorbikes and AUP as an option, and the mode utility is approached with the equation multiple linear regression. The results of the analysis show that the time value of the user in the fleet is IDR 274.67 / hour for a distance of 8.35 km and the Time Value for a distance of 13.0 km = IDR 240.82 / hour with a Value of Activity (VoA) which is close to zero because the activity in the fleet has no financial value. This time value is considerably smaller than the AUP time value with the same intention of trip, studying, which was analyzed in 2015, which was IDR 4,708 / hour.
{"title":"Activity and Time Value of Public Passenger Transportation Users During the Covid-19 Pandemic in 2020 (Bus of Batik Solo Trans Corridor 4 in Surakarta)","authors":"A. Mahmudah, Syafi’i, D. Handayani, S. J. Legowo, Widia Hartono","doi":"10.11594/10.11594/ijer.02.02.01","DOIUrl":"https://doi.org/10.11594/10.11594/ijer.02.02.01","url":null,"abstract":"The Covid-19 pandemic in 2020 has a significant impact on all countries' social and economic conditions, including Indonesia. It is fitting that social and economic changes also affect the transportation sector. The value of economic benefits in one public facility operation also depreciated due to the economic recession. One of the variables that can be reviewed is the time value of public passenger transportation users (AUP) to measure how much depreciation has occurred. This study specifically for travel is learning, using the bus mode Batik Solo Trans (BST) Corridor 4. Development of scenarios for questionnaires with stated preference methods, using the choice mode between motorbikes and AUP as an option, and the mode utility is approached with the equation multiple linear regression. The results of the analysis show that the time value of the user in the fleet is IDR 274.67 / hour for a distance of 8.35 km and the Time Value for a distance of 13.0 km = IDR 240.82 / hour with a Value of Activity (VoA) which is close to zero because the activity in the fleet has no financial value. This time value is considerably smaller than the AUP time value with the same intention of trip, studying, which was analyzed in 2015, which was IDR 4,708 / hour.","PeriodicalId":308664,"journal":{"name":"Indonesian Journal of Engineering Research","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126760934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohamad Abdul Wahid Romadhoni, Naufal Majdi, Purwidi Asri
The development of Internet of Things technology today is overgrowing in various fields, one of which is security. Safe-deposit box system is considered less safe because there is no warning to the owner. This study proposes a safe deposit box system that has a token security feature based on the internet of things. This system uses a webcam that functions to take pictures automatically. The image is sent to the server via the FTP protocol. It has two levels of users, namely admin, and guest. This system has a warning alarm, and notifications feature that works when the safe door is opened by force. Keyword: internet of things, safe deposit box
{"title":"Smart Safe Deposit Box Based on Internet of Things","authors":"Mohamad Abdul Wahid Romadhoni, Naufal Majdi, Purwidi Asri","doi":"10.11594/ijer.02.01.04","DOIUrl":"https://doi.org/10.11594/ijer.02.01.04","url":null,"abstract":"The development of Internet of Things technology today is overgrowing in various fields, one of which is security. Safe-deposit box system is considered less safe because there is no warning to the owner. This study proposes a safe deposit box system that has a token security feature based on the internet of things. This system uses a webcam that functions to take pictures automatically. The image is sent to the server via the FTP protocol. It has two levels of users, namely admin, and guest. This system has a warning alarm, and notifications feature that works when the safe door is opened by force. Keyword: internet of things, safe deposit box","PeriodicalId":308664,"journal":{"name":"Indonesian Journal of Engineering Research","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133111506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}