10 research outputs found

    PERANCANGAN DAN REALISASI KOPLING OPTIK PADA SISTEM POWER LINE COMMUNICATION TEGANGAN RENDAH

    Get PDF
    ABSTRAKSI: Kanal PLC merupakan media transmisi yang cukup buruk. Karakteristik kanal ini adalah banyaknya noise, multipath propagation, impedansi yang cukup rendah dan berubah terhadap waktu, distorsi dan lain sebagainya. Selain itu, kanal tesebut telah ada sinyal power 50 Hz dengan amplitudo yang besar sehingga dapat merusak perangkat transmisi jika keluaran langsung dihubungkan ke kanal tanpa adanya suatu rangkaian adapter.Salah satu solusi untuk mengatasi hal tersebut adalah menggunakan rangkaian kopling. Rangkaian ini berfungsi untuk meredam sinyal power 50 Hz dan meloloskan sinyal informasi dari dan ke kanal PLC. Selain itu, rangkaian ini juga berfungsi memberikan isolasi terhadap dua buah sistem.Tugas Akhir ini membahas perancangan dan realisasi kopling optik dan sistem pengujian kinerja kopling optik. Sistem ini merupakan suatu prototype transmitter dan receiver data digital dengan modulasi FSK menggunakan standard Cenelec Band EN 50065 sebagai spectrum yang digunakan dalam kanal PLC untuk satu macam uji kecepatan data sebesar 763,4 bps (bit per second).Hasil penelitian ini cukup baik di mana kopling optik memiliki bandwidth cukup lebar (900 kHz) walau tidak selebar kopling magnetik (2,24 MHz) serta memiliki ketahanan terhadap noise yang cukup bagus dengan pemberian beban domestik rumah tangga seperti: bor listrik, dispenser, dan komputer. Hal tersebut membuka peluang untuk mengembangkan riset penggunaan kopling optik ini untuk aplikasi yang lebih bervariasi dan bermanfaat ke depannya.Kata Kunci : Kata Kunci: Kopling Magnetik, Kopling Optik, Noise, BandwidthABSTRACT: PLC channel is a bad transmission media. The characteristics of this channel are too much noise, multipath propagation, time varying low impedance, distortion and any other. in that channel also exist 50 Hz power signal with high amplitude so that can break the transmission set if directly connected to the channel without adapter circuit.One solution to solve that problem is by using coupling circuit. The function of this circuit are dumping the power signal and escaping the information signal from and to PLC channel. Another function is giving isolation of two different system.This Final Project discuss about design of optical couplier and examination performance system and also compare to magnetic coupler performance. This system is like a prototype of digital signal transmitter and receiver with FSK modulation that is a simulation for the later real system. This research limits the problem in Cenelec Band EN 50065 spectrum in PLC channel.The result is good enough that the bandwidth of optical coupler is wide (900 kHz) although not the same wide with magnetic coupling (2.24 MHz) and also has an immunity to noise. That can make an opportunity to develop this research for the vary and useful application next time.Keyword: Keyword: Magnetic Coupling, Optic Coupling, Noise, Bandwidt

    Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localization Schemes in Wireless Sensor Networks

    Get PDF
    In the field of high-risk observation, the nodes in Wireless Sensor Network (WSN) are distributed randomly. The result from sensing becomes meaningless if it is not known from where the originating node is. Therefore, a sensor node positioning scheme, known as the localization scheme, is required. The localization scheme consists of distance estimation and position computing. Thus, this research used connectivity as distance estimation within range free algorithm DV-Hop and Amorphous, and then trilateral algorithm for computing the position. Besides that, distance estimation using the connectivity between nodes is not needed for the additional hardware ranging as required by a range-based localization scheme. In this research compared the localization algorithm based on range free localization, which are DV-Hop algorithm and Amorphous algorithm. The simulation result shows that the amorphous algorithm have achieved 13.60% and 24.538% lower than dv-hop algorithm for each parameter error localization and energy consumption. On node density variations, dv-hop algorithm gained a localization error that is 26.95% lower than amorphous algorithm, but for energy consumption parameter, amorphous gained 14.227% lower than dv-hop algorithm. In the communication range variation scenario, dv-hop algorithm gained a localization error that is50.282% lower than amorphous. However, for energy consumption parameter, amorphous algorithm gained 12.35%. lower than dv-hop algorithm

    All-in-one computation vs computational-offloading approaches: a performance evaluation of object detection strategies on android mobile devices

    Get PDF
    Object detection gives a computer ability to classify objects in an image or video. However, high specified devices are needed to get a good performance. To enable devices with low specifications performs better, one way is offloading the computation process from a device with a low specification to another device with better specifications. This paper investigates the performance of object detection strategies on all-in-one Android mobile phone computation versus Android mobile phone computation with computational offloading on Nvidia Jetson Nano.  The experiment carries out the video surveillance from the Android mobile phone with two scenarios, all-in-one object detection computation in a single Android device and decoupled object detection computation between an Android device and an Nvidia Jetson Nano. Android applications send video input for object detection using RTSP/RTMP streaming protocol and received by Nvidia Jetson Nano which acts as an RTSP/RTMP server. Then, the output of object detection is sent back to the Android device for being displayed to the user. The results show that the android device Huawei Y7 Pro with an average FPS performance of 1.82 and an average computing speed of 552 ms significantly improves when working with the Nvidia Jetson Nano, the average FPS becomes ten and the average computing speed becomes 95 ms. It means decoupling object detection computation between an Android device and an Nvidia Jetson Nano using the system provided in this paper successfully improves the detection speed performance

    AUTO SCALING DATABASE SERVICE WITH MICRO KUBERNETES CLUSTER

    Get PDF
    Data storage media, or what is often referred to as a database is something that is quite vital for technological developments. As the amount of data increases, it allows database services to experience downtime. For this reason, it is necessary to build an infrastructure that can replicate itself, so that it will avoid downtime. This infrastructure can be built using a container orchestration tool called Kubernetes which has high availability and autoscaler features, so it can replicate and guarantee service availability, to avoid downtime. This research builds a MongoDB NoSQL database service. This service is built using micro Kubernetes clusters from several different data centers. This service also implements a horizontal pod autoscaler feature that is capable of replicating pods, to increase high availability and avoid downtime. The autoscaling process will be tested by providing a load request for the service. Testing is done several times on each server. This study will compare the MongoDB service that was built monolithically with a micro Kubernetes cluster, and with HPA features and without HPA features by paying attention to several things. Based on Response Time, Response Code per Seconds, and CPU Usage, the results obtained are that the service built on a micro Kubernetes cluster with HPA features is the best, with a constant response time value below 100 ms, Response Code per Seconds reaches 500 threads per second. seconds, and CPU Usage in the range of 30 – 55%

    Extending Monitoring Area of Production Plant Using Synchronized Relay Node Message Scheduling

    Get PDF
    Abstract—Low rate  wireless sensor  network  has been used in industrial plant  for  certain  production monitorings  which  have slow production rate. In the case of adding production line in the different  building within one factory area, relay nodes are needed to increase monitoring coverage and connectivity among all nodes in the plant  area.  This paper  presents  the performance of relay node message scheduling  scheme for extending  monitoring area of production plan  by  using  low rate  wireless  sensor  network. The simulation  results demonstrate that the distance and number of hop  from  certain  relay nodes to the  sink  affect message  end to end delay. Furthermore, increasing  message rate  generated by relay nodes  also  contributes in  leveraging  end  to  end  delay  of each message due to increasing  queueing  delay

    A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment

    No full text
    Handover schemes play a vital role on fog computing service (FCS) provided through vehicular network. It not only determines the quality of services (QoSs) but also the security and safety of vehicular network system against adversaries. As a part of handover process, authentication between vehicles and a new fog node (FN) significantly contributes to protecting private information and infrastructure of vehicular network at once. In this paper, we propose a lightweight and secure mutual authentication scheme for handover process considering limited access FCS in the vehicular network environment and also service reservation scenario at login and service request phase. In the proposed scheme, mutual authentication process is assisted by a cloud server (CS) during login and service request phase in which CS distributes the credentials for on-the-road authentication between the vehicles and FN installed on road side unit (RSU). We demonstrate that our proposed scheme is lightweight due to employing one-way hash function and exclusive-or operation extensively. In addition, our scheme is efficient in terms of computational cost as well as computation cost. We show that our scheme achieves 1.1-56.67 times faster computation and also reduces the total message size by 30%-58.21% in comparison with the previous authentication schemes in the most relevant environment. The informal and formal security analyses show that this authentication scheme can protect the secrecy of transactions of all interacting entities against various known attacks. In addition, validation using SPAN software based on AVISPA also confirms that the proposed authentication scheme can satisfy mutual authentication goal and, at the same time, also protect against replay and man-in-the-middle attack

    Undesignated Academic Mosque Response Toward COVID--19 Pandemic

    No full text
    Mosque is a unique building by the function as muslim prayer room. Indonesia as the world biggest muslim country has mandated each building to provide prayer room especially mosque by issuance of Ministry of Public Work- Housing Settlement decree no.14/2017. Academic building like cam-puss also mandated to have the campus mosque to facilitate the Muslim’s civitas academia performing their prayer. However, the campus buildings commonly were not designed with mosque facility in purpose. Thus, campus designer performed remodelling their building to meet this demand. During the pandemic COVID--19 in Indonesia, some of undesignated academic mosques in Architecture Undip were responded it with various adaptation. This study purposed to investigate the responses of those mosque and try to figure the scheme of adaptation phase using descriptive analysis. The result of this study found that the places were follow the government advices and brought alone prayer into common practice

    Construction of cardiac arrhythmia prediction model using deep learning and gradient boosting

    No full text
    Arrhythmia is a condition in which the rhythm of heartbeat becomes irregular. This condition in extreme cases can lead to fatal heart attack accidents. In order to reduce heart attack risk, appropriate early treatments should be conducted right after getting results of Arrhythmia condition, which is generated by electrocardiography ECG tools. However, reading ECG results should be done by qualified medical staff in order to diagnose the existence of arrhythmia accurately. This paper proposes a deep learning algorithm method to classify and detect the existence of arrhythmia from ECG reading. Our proposed method relies on Convolutional Neural Network (CNN) to extract feature from a single lead ECG signal and also Gradient Boosting algorithm to predict the final outcome of single lead ECG reading. This method achieved the accuracy of 96.18% and minimized the number of parameters used in CNN Layer.Arrhythmia is a condition in which the rhythm of heartbeat becomes irregular. This condition in extreme cases can lead to fatal heart attack accidents. In order to reduce heart attack risk, appropriate early treatments should be conducted right after getting results of Arrhythmia condition, which is generated by electrocardiography ECG tools. However, reading ECG results should be done by qualified medical staff in order to diagnose the existence of arrhythmia accurately. This paper proposes a deep learning algorithm method to classify and detect the existence of arrhythmia from ECG reading. Our proposed method relies on Convolutional Neural Network (CNN) to extract feature from a single lead ECG signal and also Gradient Boosting algorithm to predict the final outcome of single lead ECG reading. This method achieved the accuracy of 96.18% and minimized the number of parameters used in CNN Layer

    Spatial Analysis of Distribution Pattern of Covid-19 Cases in Batang Regency

    No full text
    The pandemic of covid-19 had brought many responses from every institution. As one of the religious institutions, Mosque was reported various adaptations in aims to support their activities. The adaptations were related to strategies in physical designs, health protocols implementations, and embedded technologies. The interaction between each strategy also shown different patterns of mosques’ innovation in serving their communities. These mosque studies consist of literature reviews and site observations to elaborate the communal mosque adaptations against the pandemic. The shifting of mosques is closely related to environments and technologies

    A study of secure communication scheme in MQTT: TLS vs AES cryptography

    Get PDF
    The Internet of Things (IoT) technology requires low latency communications. One of the lightweight protocols in the IoT is the MQTT protocol. However, the MQTT protocol is not equipped with the appropriate security mechanism. As a consequence, the MQTT messages are easily eavesdropped and modified by the attackers. This research studies the use of AES cryptography-based communication scheme against the TLS-based communication scheme, which can be used to create end-to-end secure communication channels from the MQTT publishers to the MQTT subscribers. Experimental results show that the TLS-based communication scheme possess the highest cost in terms of communication delay and network cost among all schemes in the experiment. Eventually, the AES-based MQTT communication scheme is more appropriate for IoT environments because of its communication delay and network cost, which are considerably equal to the plaintext-based MQTT communications. &nbsp
    corecore