Jurnal Infotel最新文献

筛选
英文 中文
Optimum Polarization Configuration of Planar Circular Patch MIMO Antenna 平面圆形贴片MIMO天线的最佳极化配置
Jurnal Infotel Pub Date : 2022-02-26 DOI: 10.20895/infotel.v14i1.748
R. P. Astuti, Eva Lucky Wijaya, T. Yunita, H. H. Ryanu
{"title":"Optimum Polarization Configuration of Planar Circular Patch MIMO Antenna","authors":"R. P. Astuti, Eva Lucky Wijaya, T. Yunita, H. H. Ryanu","doi":"10.20895/infotel.v14i1.748","DOIUrl":"https://doi.org/10.20895/infotel.v14i1.748","url":null,"abstract":"Multiple Input Multiple Output (MIMO) is a key technology that plays an important role in achieving the 5G requirement due to its capability to increase channel capacity. However, the increase of channel capacity is influenced by several aspects such as mutual coupling. Many methods are done to decrease the mutual coupling effect such as polarization arrangement of the MIMO antennas. This study on the polarization arrangement of a circular patch MIMO antenna at 3.5 GHz was performed. Four elements of the MIMO antenna are arranged with several polarization configurations both in Co-Polarization and Cross-Polarization. Both simulation and measurement results showed that MIMO with Co-Polarization has a slightly wider bandwidth equal to 295.25 MHz compared to Cross-Polarization with a bandwidth of 274.63 MHz, due to better return loss performed by the former. However, from the mutual coupling perspective, it is observed that MIMO with Cross-Polarization can reduce the mutual coupling from -17.6676dB into -22.462 dB compared to Co-Polarization with the same element distance.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43605281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Field Experiments to Analyze Changes in Electronic Data Capture Adoption Decisions 利用现场实验分析电子数据捕获采用决策的变化
Jurnal Infotel Pub Date : 2022-02-26 DOI: 10.20895/infotel.v14i1.729
Irwan Susanto
{"title":"Using Field Experiments to Analyze Changes in Electronic Data Capture Adoption Decisions","authors":"Irwan Susanto","doi":"10.20895/infotel.v14i1.729","DOIUrl":"https://doi.org/10.20895/infotel.v14i1.729","url":null,"abstract":"Lacovou presented research results in a framework that describes the role of the determinants of technology, organization, and environment simultaneously influencing the innovation adoption decision-making process. The Lacovou framework is an extension study of the Tornatzky framework. Tornatzky's framework addresses three determinants that influence innovation adoption. Unfortunately, Lacovou did not present how the decision process took place. Decisions can be rational or irrational. Ajzen and several other studies defined rational decisions as decisions based on considered information or for a reason as. Previous research had not revealed empirically the rational calculation process in making innovation adoption decisions. Innovation adoption is someone's choice when he/she perceive the benefit and feel appropriate the innovation and will use or intend to use it. This study intends to reveal how the process of rational calculation in the decision-making adoption of innovations through the field experiment method. This study also reveals whether the decision of Small Medium Enterprises (SMEs) to adopt Electronic Data Capture (EDC) is rational. Research analysis using descriptive analysis method. The results show that the rational calculation process can be observed through the field experiment method. The shift in decisions represented by changes in the data on the number of subjects who make adoption decisions illustrate the rational calculation process. The results show that the decision of SMEs in adopting EDC is mostly rational. The yields of this field experiment- research was confirming Lacovou framework. The research illustrates the simulation of the effect of a combination of perceived benefits, organizational readiness, and environmental factors simultaneously \u0000 ","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41579653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An implementation of smart agriculture for optimizing growth using sonic bloom and IoT integrated 利用声波开花和物联网集成实现智能农业优化增长
Jurnal Infotel Pub Date : 2022-02-26 DOI: 10.20895/infotel.v14i1.725
M. Galina, Cutifa Safitri, Iksan Bukhori, Arthur Silitonga, A. Suhartomo
{"title":"An implementation of smart agriculture for optimizing growth using sonic bloom and IoT integrated","authors":"M. Galina, Cutifa Safitri, Iksan Bukhori, Arthur Silitonga, A. Suhartomo","doi":"10.20895/infotel.v14i1.725","DOIUrl":"https://doi.org/10.20895/infotel.v14i1.725","url":null,"abstract":"This paper proposes the implementation of IoT-based agriculture monitoring with audio growth (sonic bloom) to optimize the growth of plants and harvest. Sonic bloom is a technology that combines high-frequency sound waves from living things, nature or music, and organic nutrients, which aims to make plants grow more optimally so that they can increase productivity. The method’s main advantage is implementing an innovative IoT monitoring hybrid with audio growth systems to boost the plantation growth and maximize the yield. Our experiment in 10 planters using chilies, has proven the proposed procedure. This work is backed up with literature studies of the audio growth (sonic bloom) in IoT technologies. To validate our findings, four parameters were measured through different sensors such as light sensors, temperature, humidity, and soil moisture. It was found that the proposed method can achieve significant results against the comparison in terms of plant heights and new sprouts for the harvest.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43488173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance of the K-Nearest Neighbors Method on Identification of Maize Plant Nutrients K近邻法在玉米植株营养成分鉴定中的应用
Jurnal Infotel Pub Date : 2022-02-26 DOI: 10.20895/infotel.v14i1.735
B. K. Khotimah
{"title":"Performance of the K-Nearest Neighbors Method on Identification of Maize Plant Nutrients","authors":"B. K. Khotimah","doi":"10.20895/infotel.v14i1.735","DOIUrl":"https://doi.org/10.20895/infotel.v14i1.735","url":null,"abstract":"Maize is one kind of commodity consumption in domestic as well as export that has high economic value. However, the low productivity is caused by the main factor, namely the decreased level of soil fertility, so that it has the same effect on crop yields. These problems require the application of technology with the K-Nearest Neighbor (KNN) method. The method of study is based on 17 signs of nutrient deficiencies with Minkowski distance calculation process, calculation of deficiency of soil nutrients based on the value of K determined. The test results of the research use K = 75 to get an accuracy of 92.40. Comparative analysis of the K-nearest neighbor (K-NN) and NB methods by looking for the closeness between the criteria for new cases and old case criteria based on the criteria for the closest cases. The results showed that the K-Nearest Neighbor (K-NN) Algorithm had a better accuracy value than NB.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43416202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Frequency Domain Analysis of MFCC Feature Extraction in Children’s Speech Recognition System 儿童语音识别系统中MFCC特征提取的频域分析
Jurnal Infotel Pub Date : 2022-02-26 DOI: 10.20895/infotel.v14i1.740
Risanuri Hidayat
{"title":"Frequency Domain Analysis of MFCC Feature Extraction in Children’s Speech Recognition System","authors":"Risanuri Hidayat","doi":"10.20895/infotel.v14i1.740","DOIUrl":"https://doi.org/10.20895/infotel.v14i1.740","url":null,"abstract":"Abstract —The research on speech recognition systems currently focuses on the analysis of robust speech recognition systems. When the speech signals are combined with noise, the recognition system becomes distracted, struggling to identify the speech sounds. Therefore, the development of a robust speech recognition system continues to be carried out. The principle of a robust speech recognition system is to eliminate noise from the speech signals and restore the original information signals. In this paper, researchers conducted a frequency domain analysis on one stage of the Mel Frequency Cepstral Coefficients (MFCC) process, the Fast Fourier Transform (FFT), in children's speech recognition system. The FTT analysis in the feature extraction process determined the effect of frequency value characteristics utilized in the FFT output on the noise disruption. The analysis method was designed into three scenarios based on the value of the employed FFT points. The differences between scenarios were based on the number of shared FFT points. All FFT points were divided into four, three, and two parts in the first, second, and third scenarios, respectively. This study utilized children's speech data from the isolated TIDIGIT English digit corpus. As comparative data, the noise was added manually to simulate real-world conditions. The results showed that using a particular frequency portion following the scenario designed on MFCC affected the recognition system performance, which was relatively significant on the noisy speech data. The designed method in the scenario 3 (C1) version generated the highest accuracy, exceeded the accuracy of the conventional MFCC method. The average accuracy in the scenario 3 (C1) method increased by 1% more than all the tested noise types. Using various noise intensity values (SNR), the testing process indicates that scenario 3 (C1) generates a higher accuracy than conventional MFCC in all tested SNR values. It proves that the selection of specific frequency utilized in MFCC feature extraction significantly affects the recognition accuracy in a noisy speech.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47939881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Greedy Perimeter Stateless Routing Protocol Network Simulation using Bird Flocking Algorithm 利用鸟群算法仿真贪婪周界无状态路由协议网络分析
Jurnal Infotel Pub Date : 2022-02-26 DOI: 10.20895/infotel.v14i1.706
D. Perdana, Albion Apta Zaim, A. Hikmaturokhman, Ananda Irsyad, Nindy Ayu Marthaliana
{"title":"Analysis of Greedy Perimeter Stateless Routing Protocol Network Simulation using Bird Flocking Algorithm","authors":"D. Perdana, Albion Apta Zaim, A. Hikmaturokhman, Ananda Irsyad, Nindy Ayu Marthaliana","doi":"10.20895/infotel.v14i1.706","DOIUrl":"https://doi.org/10.20895/infotel.v14i1.706","url":null,"abstract":"The purpose of this study is to simulate the GPSR protocol network on NS3 using the bird flocking algorithm and to analyze the comparison of performance measurements obtained from the simulation results. The Greedy Perimeter Stateless Routing network was simulated using NS-3 in this simulation. The simulation area is created in length, width. The distance between nodes is 50 meters and is simulated in an area of 1000m x 300m for 30 seconds and 802.11 MAC protocol is used. This simulation was successfully implemented in finding the location of the nearest node using the GPSR protocol with the PSO / BFA algorithm. The number of nodes used in the simulation is 150 nodes and 2 nodes, so it can be concluded that the performance of Quality of Service (QoS) is greatly affected by the number of nodes and the algorithm used in the simulation.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45492590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
All-in-one computation vs computational-offloading approaches: a performance evaluation of object detection strategies on android mobile devices 一体化计算与计算卸载方法:android移动设备上对象检测策略的性能评估
Jurnal Infotel Pub Date : 2021-12-09 DOI: 10.20895/infotel.v13i4.700
Muhammad Abdullah Rasyad, Favian Dewanta, Sri Astuti
{"title":"All-in-one computation vs computational-offloading approaches: a performance evaluation of object detection strategies on android mobile devices","authors":"Muhammad Abdullah Rasyad, Favian Dewanta, Sri Astuti","doi":"10.20895/infotel.v13i4.700","DOIUrl":"https://doi.org/10.20895/infotel.v13i4.700","url":null,"abstract":"Object detection gives a computer ability to classify objects in an image or video. However, high specified devices are needed to get a good performance. To enable devices with low specifications performs better, one way is offloading the computation process from a device with a low specification to another device with better specifications. This paper investigates the performance of object detection strategies on all-in-one Android mobile phone computation versus Android mobile phone computation with computational offloading on Nvidia Jetson Nano.  The experiment carries out the video surveillance from the Android mobile phone with two scenarios, all-in-one object detection computation in a single Android device and decoupled object detection computation between an Android device and an Nvidia Jetson Nano. Android applications send video input for object detection using RTSP/RTMP streaming protocol and received by Nvidia Jetson Nano which acts as an RTSP/RTMP server. Then, the output of object detection is sent back to the Android device for being displayed to the user. The results show that the android device Huawei Y7 Pro with an average FPS performance of 1.82 and an average computing speed of 552 ms significantly improves when working with the Nvidia Jetson Nano, the average FPS becomes ten and the average computing speed becomes 95 ms. It means decoupling object detection computation between an Android device and an Nvidia Jetson Nano using the system provided in this paper successfully improves the detection speed performance.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45433286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart card security mechanism with dynamic key 智能卡安全机制与动态密钥
Jurnal Infotel Pub Date : 2021-12-09 DOI: 10.20895/infotel.v13i4.652
N. Noprianto, V. N. Wijayaningrum
{"title":"Smart card security mechanism with dynamic key","authors":"N. Noprianto, V. N. Wijayaningrum","doi":"10.20895/infotel.v13i4.652","DOIUrl":"https://doi.org/10.20895/infotel.v13i4.652","url":null,"abstract":"As a currently popular technology, the use of smart cards continues to increase in various fields and the rapid development of technology. Therefore, data security stored on a smart card needs to focus on avoiding misuse of data by unauthorized parties. However, it is not enough for the security mechanism to be carried out only during the communication process of sending data. Then, the mechanism for securing data on the smart card also needs to be done. In this study, a data security technique using dynamic keys is proposed by changing the key and access conditions on the smart card according to predetermined rules. Dynamic keys are a new mechanism proposed to authenticate smart cards using a different key on each card. This technique ensures that the keys used to access each smart card are different so that the risk of data duplication and modification threats can be minimized. In addition, this mechanism is a low-cost security privacy protection. The test results show that the data security technique using dynamic keys ensures that read and write access to the smart card can only be done if the keys match the rules.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46236760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing a microcontroller-based half-duplex interface device drove by the touch-tone signal 设计了一种基于微控制器的按键信号驱动半双工接口器件
Jurnal Infotel Pub Date : 2021-12-09 DOI: 10.20895/infotel.v13i4.712
Arief Goeritno, Ika Setyawibawa, Dwi Suhartono
{"title":"Designing a microcontroller-based half-duplex interface device drove by the touch-tone signal","authors":"Arief Goeritno, Ika Setyawibawa, Dwi Suhartono","doi":"10.20895/infotel.v13i4.712","DOIUrl":"https://doi.org/10.20895/infotel.v13i4.712","url":null,"abstract":"The interface device for communicating (IDC) as a bridge for the merger between two different systems based on different protocols and standards can be made of several electronic modules. The two Arduino boards (UNO R3 and MEGA2560 R3) have been constructed as the electronic modules of a gateway become a haft-duplex IDC, and are driven by the touch-tone signal. The research objectives, i.e., assembling some of the hardware for the embodiment of the adapter system, making a program structure, and performing a test of the IDC system. The haft-duplex IDC has been carried out by integrating all components by wiring to form an embedded system. Then, programming the microcontroller modules based on the Arduino software is carried outin six stages. Finally, the simulation test with the provision of conditions is carried out and obtained of six conditions for (i) the circuit of ring detection, (ii) the circuit of voice-operated transmit, (iii) the circuit off/on the hook of the telephone module, (iv) the circuit of tone decoder, (v) dial-up telephone numbers via push buttons and switching IC circuits, and (vi) the circuits of voice recording and storage in the form to playback. The test's success with six conditions has been an indication that the microcontroller-based IDC system is functioning as expected. Completing, the conclusion, and recommendationsrelated to measurement on the various purposes and the real conditions for the half-duplex interface adapter can be implemented.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45837386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Fuzzy based sensorless tracking controller on the dual-axis PV panel for optimizing the power production 基于模糊的双轴光伏板无传感器跟踪控制器优化发电
Jurnal Infotel Pub Date : 2021-12-09 DOI: 10.20895/infotel.v13i4.738
B. Aprilia, M. Z. Romdlony, J. Raharjo, Yogi Ghifari Sidik
{"title":"Fuzzy based sensorless tracking controller on the dual-axis PV panel for optimizing the power production","authors":"B. Aprilia, M. Z. Romdlony, J. Raharjo, Yogi Ghifari Sidik","doi":"10.20895/infotel.v13i4.738","DOIUrl":"https://doi.org/10.20895/infotel.v13i4.738","url":null,"abstract":"In general active sun trackers move because they respond to light sensors that measure the intensity of sunlight. However, sensor based trackers are usually more expensive than sensor less trackers. In addition, based on several studies, a comparison between sensor and sensorless based tracker only reports lower tracking error and higher power generation for sensor based than sensorless tracker but does not include an analysis of energy use on the sensor. Therefore, this study aims to design a sensorless closed loop tracking system for solar panels with two degrees of freedom. The tracking controller in this study is based on the Fuzzy Logic Controller (FLC) method. In this study, a dual-axis PV can increase power output by 20.2% compared to a fixed PV (0 ° axis position). This is because, in comparison to a fixed PV, dual axis PV adjusts the solar panel perpendicular to the sun's position to optimize electrical conversion.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43696408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信