14 research outputs found

    Smart hydroponic based on nutrient film technique and multistep fuzzy logic

    Get PDF
    Automation in hydroponics is have been a great change. Research with fuzzy logic control it’s designed to add to each parameter one by one. In a way microcontroller will activate one by one relay to regulate the parameters with fuzzy logic. While parameter calibration is done, calibration is needed for the next checking if the parameter were not optimal, until its parameter optimal. Multistep fuzzy is used to counter measure the same activation of the relay. With adding real time data monitoring to the system. From test result evaluating multistep fuzzy logic method were 100% works as expected. with another testing approach for best module for sending real time data monitoring for hydroponics. From the real time data transmission method, the success of sending data is 30% from the ESP82166 and 75% of the NRF24L01 with a shortage of the NRF24L01 data loss. For the relay activation can be accommodate with dynamic programming. As for multistep fuzzy logic for hydroponic tested to reach optimal water condition for kale crops resulting in average 12.8 iterations calibration from condition where researches add water only from the start

    Evaluation of network security based on next generation intrusion prevention system

    Get PDF
    Next Generation Intrusion Prevention System (NGIPS) is a system that works to monitor network traffic, to detect suspicious activity, and to conduct early prevention toward intrusion that can cause network does not run as it supposed to be, NGIPS provides vulnerability protection broader compared to the traditional IPS, especially in the application layer that has ability to detect and learn vulnerability asset and carried out layering inspection until layer 7 packet. This paper intended to analyze and evaluate the NGIPS to protect network from penetration system that utilize the weakness from firewall, that is exploitation to HTTP port. By the existence of NGIPS, it is expected can improve the network security, also network administrator could monitor and detect the threats rapidly. Research method includes scenario and topology penetration testing plan. The result of this research is the evaluation of penetration testing that utilizes HTTP port to exploit through malicious domain. The evaluation conducted to ensure the NGIPS system can secure the network environment through penetration testing. This study can be concluded that it can become reference to optimize network security with NGIPS as network security layer

    Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual Cryptography for Security of Handwritten Images

    Get PDF
    The secret sharing is a method to protect confidentiality and integrity of the secret messages by distributing the message shares into several recipients. The secret message could not be revealed unless the recipients exchange and collect shares to reconstruct the actual message. Even though the attacker obtain shares shadow during the share exchange, it would be impossible for the attacker to understand the correct share. There are few algorithms have been developed for secret sharing, e.g. secret splitting, Asmuth-Bloom secret sharing protocol, visual cryptography, etc. There is an unanswered question in this research about which method provides best level of security and efficiency in securing message. In this paper, we evaluate the performance of three methods, i.e. secret splitting, secret sharing, and recursive threshold visual cryptography for handwritten image security in terms of execution time and mean squared error (MSE) simulation. Simulation results show the secret splitting algorithm produces the shortest time of execution. On the other hand, the MSE simulation result that the three methods can reconstruct the original image very well

    Sleep Apnea Identification using HRV Features of ECG Signals

    Get PDF
    Sleep apnea is a common sleep disorder that interferes with the breathing of a person. During sleep, people can stop breathing for a moment that causes the body lack of oxygen that lasts for several seconds to minutes even until the range of hours. If it happens for a long period, it can result in more serious diseases, e.g. high blood pressure, heart failure, stroke, diabetes, etc. Sleep apnea can be prevented by identifying the indication of sleep apnea itself from ECG, EEG, or other signals to perform early prevention. The purpose of this study is to build a classification model to identify sleep disorders from the Heart Rate Variability (HRV) features that can be obtained with Electrocardiogram (ECG) signals. In this study, HRV features were processed using several classification methods, i.e. ANN, KNN, N-Bayes and SVM linear Methods. The classification is performed using subject-specific scheme and subject-independent scheme. The simulation results show that the SVM method achieves higher accuracy other than three other methods in identifying sleep apnea. While, time domain features shows the most dominant performance among the HRV features

    次世代地上波デジタルTVシステムに関する研究

    Get PDF
    九州工業大学博士学位論文(要旨) 学位記番号:情工博甲第282号 学位授与年月日:平成25年9月27日九州工業大

    Integrated SDN-NFV 5G Network Performance and Management-Complexity Evaluation

    No full text
    Digitalization is one of the factors that affects the acceleration of the application of telecommunications technologies such as 5G. The 5G technology that has been developed today does not yet meet different performance and manageability standards, particularly for data center networks as a supportive technology. Software-defined networking (SDN) and network function virtualization (NFV) are two complementary technologies that are currently used by almost all data centers in the telecommunications industry to rectify performance and manageability issues. In this study, we deliver an integrated SDN-NFV architecture to simplify network management activities in telecommunication companies. To improve network performance at the computing level, we performed a modification of a networking system at the computing level, underlying NFV devices by replacing the default virtual switch with a data plane development kit (DPDK) and single root I/O virtualization (SR-IOV). This study evaluated the proposed architecture design in terms of network performance and manageability. Based on 30 days of observation in prime time, the proposed solution increased throughput up to 200 Mbps for the server leaf and 1.6 Gbps for the border leaf compared to the legacy architecture. Meanwhile, the latency decreased to 12 ms for the server leaf and 17 ms for the border leaf. For manageability, we tested three different scenarios and achieved savings of 13 min for Scenario 1, 22 min for Scenario 2 and 9 min for Scenario 3
    corecore