Pub Date : 2017-08-01DOI: 10.1109/ICECOS.2017.8167164
Gita Fadila Fitriana, Husnawati, S. Nurmaini
This paper proposes formation control in leader-follower robot using interval type-2 fuzzy logic controller (IT2FLC). The controller gives the robots position and orientation between desire pose and actual pose. The IT2FLC is advantageous in comparison with type-1 fuzzy logic controller (T1FLC). Experimental result show by using IT2FLC produce good performance compare to T1FLC. In open space environment, produce small data only 836 for fuzzy process, fast response about 107.8 and smooth movement of the leader-follower posture to accomplish the target without collision.
{"title":"Formation control of leader-follower robot using interval type-2 fuzzy logic controller","authors":"Gita Fadila Fitriana, Husnawati, S. Nurmaini","doi":"10.1109/ICECOS.2017.8167164","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167164","url":null,"abstract":"This paper proposes formation control in leader-follower robot using interval type-2 fuzzy logic controller (IT2FLC). The controller gives the robots position and orientation between desire pose and actual pose. The IT2FLC is advantageous in comparison with type-1 fuzzy logic controller (T1FLC). Experimental result show by using IT2FLC produce good performance compare to T1FLC. In open space environment, produce small data only 836 for fuzzy process, fast response about 107.8 and smooth movement of the leader-follower posture to accomplish the target without collision.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"2 1","pages":"44-49"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78426381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/ICECOS.2017.8167162
T. Dewi, P. Risma, Y. Oktarina, A. Taqwa
Wireless or contactless electrical energy transfer is a method of utilizing electromagnetic induction to transfer electrical power from the source (transmitter) to the loads (receivers) without using the conventional media, such as wires. This method had been investigated since end of 18 century, and Nikola Tesla was the first scientist to realize it. The development of technology increases the usage of electronics devices such as lamps, cellphone charger etc. More electronics mean more cable, therefore the application of wireless electrical power transfer is necessary to overcome the problems caused by wires. This paper discussed the design and realization of a transmitter (source) powering multiple receiver (loads), a 12 V lamps, a cellphone charger and a DC fan. In this research, the angles occurs due to the position of receiver relative to transmitter is also investigated since in real life, the transmitter will not always be parallel with the receiver(s). This paper shows a simple design that everyone is expected to recreate and applied in any offices or homes.
{"title":"Wireless electrical source for mobile application","authors":"T. Dewi, P. Risma, Y. Oktarina, A. Taqwa","doi":"10.1109/ICECOS.2017.8167162","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167162","url":null,"abstract":"Wireless or contactless electrical energy transfer is a method of utilizing electromagnetic induction to transfer electrical power from the source (transmitter) to the loads (receivers) without using the conventional media, such as wires. This method had been investigated since end of 18 century, and Nikola Tesla was the first scientist to realize it. The development of technology increases the usage of electronics devices such as lamps, cellphone charger etc. More electronics mean more cable, therefore the application of wireless electrical power transfer is necessary to overcome the problems caused by wires. This paper discussed the design and realization of a transmitter (source) powering multiple receiver (loads), a 12 V lamps, a cellphone charger and a DC fan. In this research, the angles occurs due to the position of receiver relative to transmitter is also investigated since in real life, the transmitter will not always be parallel with the receiver(s). This paper shows a simple design that everyone is expected to recreate and applied in any offices or homes.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"33 1","pages":"338-343"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81279621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/ICECOS.2017.8167131
Ermatita, D. Budianta
Knowledge Management system is a system that can provide accommodation and storage of knowledge. Storage of useful knowledge for the business processes necessary to sustain existing knowledge. Knowledge management system can accommodate knowledges, so that if needed at any time can be reused. Storage of knowledge in this system, to get it back to do a search string to facilitate the search for knowledge needed. String search method in this study with Fuzzy Algorithm Knuth Morris pratt. In this study, Fuzzy Knuth Morris Pratt algorithm used for modeling knowledge management system in the heavy metal content of oil crops. Application of fuzzy search string vague where the string matched only have similar characters determined by the method Knuth Morriss Pratt. The analysis of the heavy metal content can be performed to determine the content of heavy metal in the oil palm. By knowing the content of heavy metals in soil, plants and oil palm fresh fruit bunches then mitigation solutions can be determined accurately. The results of this research is the search string matching method with Fuzzy Algorithm Knuth Morriss Pratt on the model of Knowledge Management System that stores a variety of knowledge and experience about the metal content and solutions to overcome them. Novelty in this research is the application of Knuth Morris pratt algorithm combined with fuzzy knowledge on modeling heavy metal content in the palm. So the search for the Knowledge Management System can be done more quickly and accurately.
{"title":"Fuzzy Knuth Moris pratt algorithm for knowledge management system model on knowledge heavy metal content in oil plants","authors":"Ermatita, D. Budianta","doi":"10.1109/ICECOS.2017.8167131","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167131","url":null,"abstract":"Knowledge Management system is a system that can provide accommodation and storage of knowledge. Storage of useful knowledge for the business processes necessary to sustain existing knowledge. Knowledge management system can accommodate knowledges, so that if needed at any time can be reused. Storage of knowledge in this system, to get it back to do a search string to facilitate the search for knowledge needed. String search method in this study with Fuzzy Algorithm Knuth Morris pratt. In this study, Fuzzy Knuth Morris Pratt algorithm used for modeling knowledge management system in the heavy metal content of oil crops. Application of fuzzy search string vague where the string matched only have similar characters determined by the method Knuth Morriss Pratt. The analysis of the heavy metal content can be performed to determine the content of heavy metal in the oil palm. By knowing the content of heavy metals in soil, plants and oil palm fresh fruit bunches then mitigation solutions can be determined accurately. The results of this research is the search string matching method with Fuzzy Algorithm Knuth Morriss Pratt on the model of Knowledge Management System that stores a variety of knowledge and experience about the metal content and solutions to overcome them. Novelty in this research is the application of Knuth Morris pratt algorithm combined with fuzzy knowledge on modeling heavy metal content in the palm. So the search for the Knowledge Management System can be done more quickly and accurately.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"239 1","pages":"188-192"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76776422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/ICECOS.2017.8167112
H. Iida
This paper presents the game refinement theory and its applications to serious games. A measure of game refinement is derived from the theory based on the game outcome uncertainty. The previous study with a focus on fun games such as boardgames and sports indicates that the game with a zone value (0.07–0.08) of game refinement measure has a good balance between chance and skill, in which people may feel comfortable and then the game is sophisticated or fascinating. The recent work focusing on the serious games suggests that the game refinement measure enables to quantify the gamified elements of serious games. Two examples from the language learning platform DUOLINGO and sales promotion ‘Discount’ are given to confirm the effectiveness.
{"title":"Serious games discover game refinement measure","authors":"H. Iida","doi":"10.1109/ICECOS.2017.8167112","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167112","url":null,"abstract":"This paper presents the game refinement theory and its applications to serious games. A measure of game refinement is derived from the theory based on the game outcome uncertainty. The previous study with a focus on fun games such as boardgames and sports indicates that the game with a zone value (0.07–0.08) of game refinement measure has a good balance between chance and skill, in which people may feel comfortable and then the game is sophisticated or fascinating. The recent work focusing on the serious games suggests that the game refinement measure enables to quantify the gamified elements of serious games. Two examples from the language learning platform DUOLINGO and sales promotion ‘Discount’ are given to confirm the effectiveness.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"205 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77034651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/ICECOS.2017.8167129
N. A. Putri, D. Stiawan, Ahmad Heryanto, T. W. Septian, L. Siregar, R. Budiarto
Visualization became one of the solutions in showing the attack on the network. With Visualize the attack, it would be easier in recognizing and conclude the pattern from the complex image visual. The target of DoS attacks can be addressed to the various parts of the network, it can be routing, web, electronic mail or DNS servers (Domain Name System). The purpose of the DoS attacks create a server shutdown, reboot, crashes or not responding. The pattern of DoS attacks on the dataset ISCX form a pattern where much of his host's IP just to exploit to a single server. Snort detects a DoS attack on testbed ISCX dataset as much as 42 alert HttpDoS attack. Percentage accuracy of the clustering algorithm using k-means of 97,83%, to its rate of detection 98,63%, and the false alarm of the programme amounting to 0.02%. Meanwhile, the value of the percentage accuracy of the clustering algorithm using k-means with tool WEKA of 99,69%, the detection rate of 99.01% and false alarms of 3.70%. The difference in accuracy between value and clustering tool WEKA caused the value of the centroid is used in mneg-cluster data packets randomly selected from a data value pack.
{"title":"Denial of service attack visualization with clustering using K-means algorithm","authors":"N. A. Putri, D. Stiawan, Ahmad Heryanto, T. W. Septian, L. Siregar, R. Budiarto","doi":"10.1109/ICECOS.2017.8167129","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167129","url":null,"abstract":"Visualization became one of the solutions in showing the attack on the network. With Visualize the attack, it would be easier in recognizing and conclude the pattern from the complex image visual. The target of DoS attacks can be addressed to the various parts of the network, it can be routing, web, electronic mail or DNS servers (Domain Name System). The purpose of the DoS attacks create a server shutdown, reboot, crashes or not responding. The pattern of DoS attacks on the dataset ISCX form a pattern where much of his host's IP just to exploit to a single server. Snort detects a DoS attack on testbed ISCX dataset as much as 42 alert HttpDoS attack. Percentage accuracy of the clustering algorithm using k-means of 97,83%, to its rate of detection 98,63%, and the false alarm of the programme amounting to 0.02%. Meanwhile, the value of the percentage accuracy of the clustering algorithm using k-means with tool WEKA of 99,69%, the detection rate of 99.01% and false alarms of 3.70%. The difference in accuracy between value and clustering tool WEKA caused the value of the centroid is used in mneg-cluster data packets randomly selected from a data value pack.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"12 1","pages":"177-183"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76442019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/ICECOS.2017.8167145
Heldi Alfiadi, Dini Fauziah, Rachmawati, Suwarno
This research is conducted to assess condition of ceramic insulator with and without silicone rubber coating after 5 years naturally aged in Pangandaran coastal area, West Java, Indonesia. Laboratory testing is also conducted by applying voltage 11–50 kV with high humidity salt fog to the insulator and measuring the leakage current. From the data of magnitude and leakage current waveform of the leakage current, the harmonic content was taken to characterize surface condition of insulator. For higher voltage, it was found that the coating significantly reduced the corona intensity. From the result, ceramic insulator coated with silicone rubber has significant effect especially when installed in a coastal area.
{"title":"Study on leakage current characteristics of naturally aged silicon rubber coated ceramic insulator","authors":"Heldi Alfiadi, Dini Fauziah, Rachmawati, Suwarno","doi":"10.1109/ICECOS.2017.8167145","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167145","url":null,"abstract":"This research is conducted to assess condition of ceramic insulator with and without silicone rubber coating after 5 years naturally aged in Pangandaran coastal area, West Java, Indonesia. Laboratory testing is also conducted by applying voltage 11–50 kV with high humidity salt fog to the insulator and measuring the leakage current. From the data of magnitude and leakage current waveform of the leakage current, the harmonic content was taken to characterize surface condition of insulator. For higher voltage, it was found that the coating significantly reduced the corona intensity. From the result, ceramic insulator coated with silicone rubber has significant effect especially when installed in a coastal area.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"17 1","pages":"259-263"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87802284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Child abuse has been one of global issue recently. There are big number of child abuse case in every country in the world. It drives most of country in this world form their private organization to handle the child abuse issue. While running their organization, they also form child abuse policy. Recently, the presence of technology has changed the way people in doing activities. In this paper, we added technology such as mobile technology, digital map, and geofencing technique to help government to run more effective way in protecting children. It is also able to provide solution for parents to monitor their children activities. The proposed model in this paper aims to prevent the growth of number child abuse cases.
{"title":"Geofencing based technology towards child abuse prevention","authors":"Sarifah Putri Raflesia, Dinda Lestarini, Taufiqurrahman, Firdaus","doi":"10.1109/ICECOS.2017.8167125","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167125","url":null,"abstract":"Child abuse has been one of global issue recently. There are big number of child abuse case in every country in the world. It drives most of country in this world form their private organization to handle the child abuse issue. While running their organization, they also form child abuse policy. Recently, the presence of technology has changed the way people in doing activities. In this paper, we added technology such as mobile technology, digital map, and geofencing technique to help government to run more effective way in protecting children. It is also able to provide solution for parents to monitor their children activities. The proposed model in this paper aims to prevent the growth of number child abuse cases.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"9 1","pages":"160-162"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87841134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/ICECOS.2017.8167163
F. Puspita, Maijance Oktaryna
In this paper, an improved Bundle Pricing model was developed in the internet wireless pricing scheme to serve multiple QoS networks. The model formed is a combination of Bundling problem model, consumer problem and quasi-linear utility function on multiple QoS network. The model used is solved with the aid of LINGO 13.0 program to get optimal solution. Based on the results of each case, both ISP and internet users get maximum benefit when ISP applies the model with utility function and QoS attribute compared to original model. The optimal solution is in the BER attribute QoS with a value of 3.04 × 108 on a flat fee and two-part tariff internet pricing scheme.
{"title":"Improved bundle pricing model on wireless internet pricing scheme in serving multiple qos network based on quasi-linear utility function","authors":"F. Puspita, Maijance Oktaryna","doi":"10.1109/ICECOS.2017.8167163","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167163","url":null,"abstract":"In this paper, an improved Bundle Pricing model was developed in the internet wireless pricing scheme to serve multiple QoS networks. The model formed is a combination of Bundling problem model, consumer problem and quasi-linear utility function on multiple QoS network. The model used is solved with the aid of LINGO 13.0 program to get optimal solution. Based on the results of each case, both ISP and internet users get maximum benefit when ISP applies the model with utility function and QoS attribute compared to original model. The optimal solution is in the BER attribute QoS with a value of 3.04 × 108 on a flat fee and two-part tariff internet pricing scheme.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"1 1","pages":"38-43"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86482709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/ICECOS.2017.8167122
I. S. Sitanggang, A. D. Asti, L. Syaufina, H. Khotimah
Haze is a negative consequence of forest and land fires that caused many health problems and contributed on global warming. This study aims to generate haze trajectory from peatland fires in South Sumatra in October 2015. We used the HYPLIT model to generate haze trajectories with hotspot sequences as the initial points of trajectory. The simulation was performed using the package Opentraj which is available in R. The experimental results show that haze from fires in South Sumatra affected not only people in this province but also in neighboring provinces namely Jambi and Riau. Haze also reached West Sumatra, North Sumatra and moved to Indian Ocean. K-Means clustering on the dataset with 119,808 haze positions results two dense clusters with the average of height 65.06 m AGL and 22.21 m AGL. Dense clusters cover about 27% to 29% members of all haze trajectories. Haze in two dense clusters are located at low height near initial points of the simulation which is dangerous for human health.
雾霾是森林和土地火灾的负面后果,它造成了许多健康问题,并加剧了全球变暖。本研究旨在生成2015年10月南苏门答腊泥炭地火灾的雾霾轨迹。我们使用HYPLIT模型生成了以热点序列作为轨迹初始点的霾轨迹。实验结果表明,南苏门答腊岛火灾产生的雾霾不仅影响了本省的居民,还影响了邻近的占比省和廖内省。雾霾也到达西苏门答腊、北苏门答腊并向印度洋移动。K-Means聚类在119,808个雾霾位置的数据集上得到两个密集的聚类,平均高度分别为65.06 m AGL和22.21 m AGL。密集的星团覆盖了所有雾霾轨迹的27%到29%。两个密集簇中的雾霾位于模拟初始点附近的低高度,对人体健康有危害。
{"title":"Haze trajectory clusters in South Sumatra in 2015 A simulation using Opentraj","authors":"I. S. Sitanggang, A. D. Asti, L. Syaufina, H. Khotimah","doi":"10.1109/ICECOS.2017.8167122","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167122","url":null,"abstract":"Haze is a negative consequence of forest and land fires that caused many health problems and contributed on global warming. This study aims to generate haze trajectory from peatland fires in South Sumatra in October 2015. We used the HYPLIT model to generate haze trajectories with hotspot sequences as the initial points of trajectory. The simulation was performed using the package Opentraj which is available in R. The experimental results show that haze from fires in South Sumatra affected not only people in this province but also in neighboring provinces namely Jambi and Riau. Haze also reached West Sumatra, North Sumatra and moved to Indian Ocean. K-Means clustering on the dataset with 119,808 haze positions results two dense clusters with the average of height 65.06 m AGL and 22.21 m AGL. Dense clusters cover about 27% to 29% members of all haze trajectories. Haze in two dense clusters are located at low height near initial points of the simulation which is dangerous for human health.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"75 1","pages":"149-153"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77945467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-01DOI: 10.1109/ICECOS.2017.8167124
Vitri Tundjungsari, A. Sabiq
Mobile devices supported by mobile ad-hoc network (MANET) make possible communication and coordination among mobile devices during emergency situation. In this paper, we develop a prototype of Android-based application that work using MANET. The prototype has purpose to provide communication and information required for search and rescue operations for emergency scenarios. There are several emergency cases should be handled rapidly during disaster, however the infrastructure and communication network often damaged as the result of the disaster. We believe that the proposed prototype can solve the problem of communication problems, mainly during search and rescue operation. The prototype has been developed under Android operating system and has been tested in limited environment. The result shows that the prototype can work well within 50 m distance range.
{"title":"Android-based application using mobile adhoc network for search and rescue operation during disaster","authors":"Vitri Tundjungsari, A. Sabiq","doi":"10.1109/ICECOS.2017.8167124","DOIUrl":"https://doi.org/10.1109/ICECOS.2017.8167124","url":null,"abstract":"Mobile devices supported by mobile ad-hoc network (MANET) make possible communication and coordination among mobile devices during emergency situation. In this paper, we develop a prototype of Android-based application that work using MANET. The prototype has purpose to provide communication and information required for search and rescue operations for emergency scenarios. There are several emergency cases should be handled rapidly during disaster, however the infrastructure and communication network often damaged as the result of the disaster. We believe that the proposed prototype can solve the problem of communication problems, mainly during search and rescue operation. The prototype has been developed under Android operating system and has been tested in limited environment. The result shows that the prototype can work well within 50 m distance range.","PeriodicalId":6528,"journal":{"name":"2017 International Conference on Electrical Engineering and Computer Science (ICECOS)","volume":"62 1","pages":"16-21"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73704644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}