24 research outputs found

    COMPARATIVE ANALYSIS ON BLOCKING PROBABILITY OF PLMN AND PSTN

    Get PDF
    Nowadays, the rapid development of telecommunication and information technology is happened. Also, many methods and analysis are used to solve the problem. One of the example is traffic load. As the vital point of telecommunication industry, traffic load is must be considered well. So, there will be less blocking probability for each of subscriber. This problem is also applied for two famous communication system, PLMN and PSTN. Where PLMN is a wireless network and PSTN is wired network. The literature study has been done. All the result has been presented below. In conclusion, PSTN blocking probability is determined by number of available trunks. On the other hand, PLMN has two type of blocking probability, first call blocking and hand over blocking. In addition, both PLMN and PSTN has another reason of blocking which happen when the targetted subscriber does not answered a call. Moreover, the interconnecting and exchange connection PLMN and PSTN is similiar.Saat ini, pesatnya perkembangan telekomunikasi dan teknologi informasi sedang terjadi. banyak metode dan analisis yang digunakan untuk menyelesaikan masalah dalam telekomunikasi. Salah satu contohnya adalah beban lalu lintas. Sebagai titik vital industri telekomunikasi, beban lalu lintas harus diperhatikan dengan baik. Jadi, akan ada lebih sedikit kemungkinan pemblokiran untuk setiap pelanggan. Masalah ini juga berlaku untuk dua sistem komunikasi terkenal, PLMN dan PSTN. Dimana PLMN adalah jaringan nirkabel dan PSTN adalah jaringan kabel. Studi literatur telah dilakukan. Semua hasilnya telah disajikan. Kesimpulannya, probabilitas pemblokiran PSTN ditentukan oleh jumlah batang yang tersedia. Di sisi lain, PLMN memiliki dua jenis probabilitas pemblokiran, pemblokiran dari pertama dan pemblokiran ketika terjadi hand-over. Selain itu, baik PLMN dan PSTN memiliki alasan lain untuk memblokir yaitu ketika pelanggan yang ditargetkan tidak menjawab panggilan. Selain itu, koneksi dalam dan pertukaran koneksi dari PLMN dan PSTN serupa

    COMPARATIVE ANALYSIS ON BLOCKING PROBABILITY OF PLMN AND PSTN

    Get PDF
    Nowadays, the rapid development of telecommunication and information technology is happened. Also, many methods and analysis are used to solve the problem. One of the example is traffic load. As the vital point of telecommunication industry, traffic load is must be considered well. So, there will be less blocking probability for each of subscriber. This problem is also applied for two famous communication system, PLMN and PSTN. Where PLMN is a wireless network and PSTN is wired network. The literature study has been done. All the result has been presented below. In conclusion, PSTN blocking probability is determined by number of available trunks. On the other hand, PLMN has two type of blocking probability, first call blocking and hand over blocking. In addition, both PLMN and PSTN has another reason of blocking which happen when the targetted subscriber does not answered a call. Moreover, the interconnecting and exchange connection PLMN and PSTN is similiar.Saat ini, pesatnya perkembangan telekomunikasi dan teknologi informasi sedang terjadi. banyak metode dan analisis yang digunakan untuk menyelesaikan masalah dalam telekomunikasi. Salah satu contohnya adalah beban lalu lintas. Sebagai titik vital industri telekomunikasi, beban lalu lintas harus diperhatikan dengan baik. Jadi, akan ada lebih sedikit kemungkinan pemblokiran untuk setiap pelanggan. Masalah ini juga berlaku untuk dua sistem komunikasi terkenal, PLMN dan PSTN. Dimana PLMN adalah jaringan nirkabel dan PSTN adalah jaringan kabel. Studi literatur telah dilakukan. Semua hasilnya telah disajikan. Kesimpulannya, probabilitas pemblokiran PSTN ditentukan oleh jumlah batang yang tersedia. Di sisi lain, PLMN memiliki dua jenis probabilitas pemblokiran, pemblokiran dari pertama dan pemblokiran ketika terjadi hand-over. Selain itu, baik PLMN dan PSTN memiliki alasan lain untuk memblokir yaitu ketika pelanggan yang ditargetkan tidak menjawab panggilan. Selain itu, koneksi dalam dan pertukaran koneksi dari PLMN dan PSTN serupa

    IMPLEMENTASI PROGRAMMABLE LOGIC CONTROL (PLC) OMRON CP1E PADA SISTEM KENDALI MOTOR INDUKSI STAR-DELTA UNTUK KEBUTUHAN INDUSTRI

    Get PDF
    The star delta control circuit is a sistem used to control an induction motor with a minimum power of 7.5 kW. Most industries still use conventional control sistems or without the use of PLC (Programmable Logic Controller). The purpose of this research is to apply PLC (Programmable Logic Controller) OMRON CP1E E-30-DR-A as an automatic control sistem on a star delta induction motor, whose working sistem is designed using a ladder diagram. In this study also added a safety sistem that will provide more protection to the components and the sistem as a whole. The main components of the PLC used have a working voltage range of 100 - 240 VAC. The design of this sistem uses two main sistems, namely a control sistem consisting of an ON/OFF pushbutton with a working voltage of 24 VDC. The power sistem consists of a contactor with a working voltage at terminal A1 of 220 VAC and a manual motor starter as a safety for the induction motor. The results of testing this sistem show that all sistem components can function properly with a supply voltage according to specifications, namely the working voltage at the L1 PLC terminal is 241.1 VAC, the voltage on the ON pushbutton control sistem is 24.53 VDC and the OFF pushbutton is 24,6 VDC. The working voltage on the power sistem at the contactor A1 terminal is 241.1 VAC

    Design and Implementation of Image Capture for Cluster Housing Security System Based on IoT

    Get PDF
    The performance of IoT platforms to security systems has been implemented by some researchers in various scopes such as door, garage, and house gates. Implementing an IoT platform to the gate residential cluster is performed for entering and exiting the gate. Having an interactive system, sending an image of the visitor to the resident, and operating an automatic gate are three main features developed in this work. Using Arduino board to MATLAB and Arduino to Blynk interconnections is implemented to perform those three features. This work describes the entire process of its creation from hardware requirements, through the system's design, up to the simulation test from the running process. From the simulation test, the device can interact with the incoming visitor within 1.33 seconds on average, with the accuracy of the played voice being 100% correct, and the image sent to the 100% proper corresponding resident is done within the time taken to respond to permission granted is 1.56 seconds, while the permission denied takes 1.39 seconds.  

    Light-Fidelity as Next Generation Network Technology: A Bibliometric Survey and Analysis

    Get PDF
    This paper delivers a systematic review and a bibliometric survey analysis of Light-Fidelity (Li-Fi) indoor implementation in Next Generation Network (NGN). The main objective of this study is to design a communication network based on NGN-Li-Fi for the indoor implementation which aims to increase user Quality of Service (QoS). The main merits and contributions of this study are the thorough and detailed analysis of the review, both in literature surveys and bibliometric analysis, as well as the discussion of the implementation model challenges of Li-Fi in both indoor and outdoor environments. The issue articulated in an indoor communication network is the possibility of intermittent connectivity due to barriers caused by line-of-sight (LOS) between the LED transmitter and receiver, handover due to channel overlap, and other network reliability issues. To realize the full potential and significant benefits of the Next Generation Network, challenges in indoor communication such as load-balancing and anticipating network congestion (traffic congestion) must be addressed. The main benefit of this study is the in-depth investigation of surveys in both selected critical literatures and bibliometric approach. This study seeks to comprehend the implications of Next Generation networks for indoor communication networks, particularly for visible light communication channels

    Access Control and Security System via Bluetooth Application on Android Smartphone

    Get PDF
    Smartphone technology can be applied not only to establish communication needs but also to support other purposes. One of them is related to personal safety and security functions. It is undeniable that criminal acts can occur anytime and anywhere. Even in a private or residential area, theft could happen. Smartphone and sensor technology can be used as a solution to encounter this problem. In this case, it can be utilized to improve the security control system of the gate or garage door at home. This research presents a prototype of a gate and garage door control and security system that operates through an application on an android smartphone. The application of HC-05 Bluetooth is used to send signals from the smartphone to the Arduino Uno microcontroller, while the micro servo acts as a locking mechanism on the gate itself. The buzzer function is presented to notify homeowners when the gate or garage door is open for more than 15 seconds. This prototype can control gates and garage doors with an average connection time of only about 5 seconds. Thus, this prototype is feasible to use as an alternative to control and improve housing security systems

    Multi-Security System Based on RFID Fingerprint and Keypad to Access the Door

    Get PDF
    It is necessary to prepare for the increasing crime rate of household theft with a modern home security system that allows customers to monitor home security remotely. This can be accomplished by replacing the standard lock with a solenoid door lock, which is more difficult to duplicate and reduces the likelihood of theft when the house is unoccupied. The Authors developed a three-tiered home security system prototype that includes fingerprint, the RFID, and keypad biometric sensors. The device's finished prototype was tested ten times after it was designed. The Arduino Uno microcontroller, which also serves as the door-locking mechanism, turns on the door-lock solenoid. When authentication is successful, someone will be granted access to the door. The preliminary findings indicate that the fingerprint. The fingerprint sensor's ability to read fingerprints in 3.7 seconds on average demonstrates its effectiveness. Second, the RFID sensor detects the e-KTP, and the RFID scans the card in an average of 2.4 seconds. The third keypad contains the password for unlocking the door. After ten repetitions, the experiment input yields an average time of 3.66 seconds. Opening a door with a 3-level multi-sensor typically takes 9.8 seconds. In this study, the installation of each sensor is notified via a GSM SIM800L module, allowing customers to monitor security remotely

    The Obesity-Associated Polymorphisms FTO rs9939609 and MC4R rs17782313 and Endometrial Cancer Risk in Non-Hispanic White Women

    Get PDF
    Overweight and obesity are strongly associated with endometrial cancer. Several independent genome-wide association studies recently identified two common polymorphisms, FTO rs9939609 and MC4R rs17782313, that are linked to increased body weight and obesity. We examined the association of FTO rs9939609 and MC4R rs17782313 with endometrial cancer risk in a pooled analysis of nine case-control studies within the Epidemiology of Endometrial Cancer Consortium (E2C2). This analysis included 3601 non-Hispanic white women with histologically-confirmed endometrial carcinoma and 5275 frequency-matched controls. Unconditional logistic regression models were used to assess the relation of FTO rs9939609 and MC4R rs17782313 genotypes to the risk of endometrial cancer. Among control women, both the FTO rs9939609 A and MC4R rs17782313 C alleles were associated with a 16% increased risk of being overweight (p = 0.001 and p = 0.004, respectively). In case-control analyses, carriers of the FTO rs9939609 AA genotype were at increased risk of endometrial carcinoma compared to women with the TT genotype [odds ratio (OR)  = 1.17; 95% confidence interval (CI): 1.03–1.32, p = 0.01]. However, this association was no longer apparent after adjusting for body mass index (BMI), suggesting mediation of the gene-disease effect through body weight. The MC4R rs17782313 polymorphism was not related to endometrial cancer risk (per allele OR = 0.98; 95% CI: 0.91–1.06; p = 0.68). FTO rs9939609 is a susceptibility marker for white non-Hispanic women at higher risk of endometrial cancer. Although FTO rs9939609 alone might have limited clinical or public health significance for identifying women at high risk for endometrial cancer beyond that of excess body weight, further investigation of obesity-related genetic markers might help to identify the pathways that influence endometrial carcinogenesis

    Adaptive Lighting System for Presence Detection and Indoor Room Brightness Control

    No full text
    According to the survey, 10% of the electricity used is for lights. Adaptive lighting is a term used to describe innovations that reduce energy consumption for lighting. Generally speaking, adaptive lighting is a highly developed system built with built-in sensors to react automatically without the assistance of the people to make a decision. The research aims to develop an adaptive lighting system with two main functions presence detection and fuzzy logic implementations for automatic brightness adjustments. Increased sensitivity in detecting the presence and movement of items, monitoring the lighting conditions in the room, and consideration of the system's energy efficiency, which was not the main emphasis of the previous study, are some improvements over earlier studies. The device was tested for five days to calculate the energy consumption efficiency of a 4.5 W bulb for 10 hours in total. With a 98.4 % accuracy rate, the adaptive lighting system has proven 74% more efficient than regular lighting

    English

    Get PDF
    Aquaculture of Litopenaeus Vannamei shrimp is one of Indonesia's most crucial commodity export shrimp. Aquaculture feed management and environmental management are essential factors in determining shrimp sustainability. To maximize shrimp farming results, proper feeding, water quality control, and con-tinuous monitoring of three critical parameters: temperature, power of hydrogen (pH), and salinity levels in ponds are required. This study aims to feed the shrimp automatically at predetermined times (07.00, 11.00, 16.00 and 20.00). At the same time, it will monitor pond water quality parameters. Temperature, pH and salinity are all factors monitored. Every 10 minutes, monitored data is stored in ThingSpeak using IoT technology. The design goal has a specific threshold to avoid future problems. A Telegram notification is sent every 10 seconds when the water condition exceeds the threshold. The overall accuracy rate of 98.81%, pH of 96.6%, and salinity of 99.17% demonstrate that the system works correctly
    corecore