{"title":"Stasiun Pemantau Kualitas Udara Berbasis Web","authors":"matius arihta sebayang","doi":"10.31289/jite.v1i1.571","DOIUrl":"https://doi.org/10.31289/jite.v1i1.571","url":null,"abstract":"Stasiun Pemantau Kualitas Udara Berbasis Web adalah sebuah sistem yang dirancang khusus untuk dapat mengumpulkan, menginformasikan dan menyajikan data mengenai kualitas udara di titik atau daerah yang telah terpasang sensor dan telah terintegrasi dengan peranti lunak aplikasi web sehingga memudahkan pengguna untuk mengakses informasi tersebut kapanpun dan dimanapun pengguna berada.Semakin tingginya angka pengguna kendaraan bermotor mengakibatkan meningkatnya sumber pencemaran udara. Gas – gas hasil pembuangan kendaraan bermotor tersebut dapat menimbulkan pencemaran dan apabila melebihi batas normal dapat berakibat buruk terhadap kesehatan manusia dan makhluk hidup disekitarnya. Semakin tinggi dan meningkatnya angka pencemaran udara maka sudah saatnya diperlukan suatu sistem yang dapat mengukur kadar kontaminan udara. Sistem ini telah dibangun dengan menggunakan mikrokontroler board Arduino Uno, sensor pendeteksi gas dan sensor pendeteksi suhu serta kelembaban udara, untuk perangkat lunaknya dibangun dengan menggunakan bahasa C Arduino, bahasa pemrograman web berbasis PHP, web server Apache, dan database MySQL. Pemanfaatan database di dalam sistem ini bertujuan untuk menyimpan data yang telah dibaca atau dideteksi oleh sensor sehingga data dapat tetap tersimpan dan dapat ditampilkan ataupun disajikan apabila dikemudian hari data pengukuran ini diperlukan.Dengan demikian informasi ini dapat dijadikan acuan sehingga dapat dihindari dampak buruk udara yang tercemar. Kata Kunci : Apache; Arduino Uno; MySQL; Pencemaran Udara; PHP","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"160 1","pages":"24-33"},"PeriodicalIF":1.2,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87547940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RANCANG BANGUN ALAT INFORMASI KODE ERROR MESIN GAME BERBASIS MIKROKONTROLER","authors":"N. Chandra","doi":"10.31289/jite.v1i1.570","DOIUrl":"https://doi.org/10.31289/jite.v1i1.570","url":null,"abstract":"Mengisi kupon atau tiket adalah salah satu kegiatan yang sering dilakukan didalam arena permainan keluarga dan sering terjadi dalam proses permainan game tiba–tiba error , sehingga customer akan sibuk untuk mencari dan memanggil petugas yang berjaga. Oleh karena itu, untuk mengatasi masalah tersebut perlu adanya sistem kendali otomatis dengan cara membuat “Rancang Bangun Alat Informasi Kode Error Mesin Game Berbasis Mikrokontroler”. Alat informasi kode error mesin game ini sangat membantu dalam mengetahui apabila tiket habis atau tidak keluar, karena sistem ini bekerja berdasarkan tiket yang melewati sensor LDR yang terpasang pada dispenser tiket pada mesin game . Pada proses perancangan alat ini penulis menggunakan metode eksperimen dan perancangan yang mana dalam proses eksperimen didapatkan hasil perancangan alat keseluruhan, aplikasi mikrokontroler untuk mengirim informasi kode error mesin game dapat bekerja sesuai yang diharapkan karena dapat dengan cepat mengetahui mesin error tiket habis. Buzzer akan aktip sebagai alarm pemberitahuan tiket habis dan LCD akan menampilkan nama mesin game serta kode error mesin game tersebut. Kata kunci: Tampilan LCD, Mikrokontroler , Kode Error Mesin Game, Sensor LDR, Buzzer.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"42 1","pages":"14-23"},"PeriodicalIF":1.2,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91391686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANALISA ALGORITMA DATA MINING ECLAT dan HUI MINER","authors":"Juanda Hakim Lubis","doi":"10.31289/jite.v1i1.519","DOIUrl":"https://doi.org/10.31289/jite.v1i1.519","url":null,"abstract":"Frequent pattern mining memainkan peran penting di dalam data mining. Salah satu metode yang digunakan adalah metode asosiasi. Metode asosiasi digunakan untuk mencari dan menganalisa data transaksi penjualan yang terjadi. Hal ini dapat dilakukan dengan memeriksa perilaku pelanggan terkait dengan produk - produk yang dibeli. Dengan menggunakan aturan asosiasi, kita dapat mengetahui seberapa sering item yang dibeli bersama-sama dalam suatu transaksi. Salah satu algoritma yang digunakan adalah Eclat. Eclat pada dasarnya adalah pencarian algoritma depth-first menggunakan persimpangan yang ditetapkan. Kelebihan dari Eclat adalah proses dan performa penghitungan support dari semua itemsets dilakukan dengan lebih efisien dibandingkan dengan algoritma HUI-miner apriori. Akan tetapi dalam penelitian ini diperoleh hasil algoritma HUI-miner lebih efektif dan lebih stabil dari segi waktu jika di bandingkan dengan eclat.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"15 1","pages":"8-13"},"PeriodicalIF":1.2,"publicationDate":"2017-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75542287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PERBANDINGAN METODE LOW BIT CODINGDENGAN PHASE CODING PADA DIGITAL AUDIO WATERMARKING","authors":"Zulfikar Sembiring","doi":"10.31289/jite.v1i1.569","DOIUrl":"https://doi.org/10.31289/jite.v1i1.569","url":null,"abstract":"Penggunaan file audio sebagai media distribusi informasi digital sangat populer sekarang ini karena semakin canggihnya perangkat keras maupun perangkat lunak yang dapat mengolah file audio digital tersebut. Ditambah lagi dengan semakin mudahnya akses internet dimana saja baik melalui perangkat mobile ataupun tidak. Karena semakin banyaknya penggunaan file audio digital oleh perorangan atau perusahaan misalnya dalam produksi musik, atau video klip maka semakin sulit untuk menentukan keaslian suatu file audio digital dan sulitnya mencegah tingkat tindak pencurian atau pembajakan yang sangat merugikan pihak pememilik hak cipta. Ada beberapa metode dalam menentukan keaslian file audio digital dan mencegah tindak pembajakan terhadap media digital, yaitu digital watermarking. Pada jurnal ini akan dibahas dua buah metode watermarking yaitu metode low bit coding dan phase coding. Tujuannya ialah untuk mengetahui beberapa kelebihan dan kekurangan dalam penerapannya kedalam file audio digital. Karena ada beberapa aspek yang harus diketahui dalam menentukan baik atau tidaknya tingkat pengamanan pada file audio digital. Sehingga kita dapat menentukan metode yang mana yang pantas digunakan dalam menentukan keaslian file audio digital dalam mencegah tindak pencurian atau pembajakan. Kata kunci : audio, watermarking, low bit coding, phase coding","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"7 1","pages":"1-7"},"PeriodicalIF":1.2,"publicationDate":"2017-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75558179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Similarity transformation analysis of heat and mass transfer effects on steady buoyancy induced MHD free convection flow past an inclined surface","authors":"O. Otieno, A. Manyonge, J. Bitok","doi":"10.12988/jite.2017.724","DOIUrl":"https://doi.org/10.12988/jite.2017.724","url":null,"abstract":"The present work is devoted to the problem of a steady two dimensional hydromagnetic convective flow of a viscous, incompressible electrically conducting fluid past an inclined semi-infinite plate in the presence of magnetic field with heat and mass transfer (double diffusion). The convective flow starts under the simultaneous action of the buoyancy forces caused by the variations in density due to temperature and species concentration differences. A scaling group of similarity transformations is applied to the partial differential equations describing the problem under consideration, into a boundary value problem of coupled ordinary differential equations, which along with the boundary conditions are solved numerically by using shooting technique together with Runge-Kutta fourth order method and effects of various parameters on the flow fields are investigated and presented graphically.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"4 1","pages":"83-96"},"PeriodicalIF":1.2,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87470307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study the effect of outliers in Latin square design","authors":"Layla A. Ahmed","doi":"10.12988/JITE.2017.611","DOIUrl":"https://doi.org/10.12988/JITE.2017.611","url":null,"abstract":"The present focuses on detecting and treating the outlier values in the Latin square design. The box plot method has been used to detect the outlier values, their effects have been studied either by keeping them in the data or by considering them missing values. From the practical work it is concluded that the outlier values have apparent and important effect on value of mean squares error, and the results of analysis of variance have been better after treating the outlier values.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"7 1","pages":"131-143"},"PeriodicalIF":1.2,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73047252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical solution of non-linear boundary value problems of ordinary differential equations using the shooting technique","authors":"A. Manyonge, R. Opiyo, D. Kweyu, J. S. Maremwa","doi":"10.12988/jite.2017.61250","DOIUrl":"https://doi.org/10.12988/jite.2017.61250","url":null,"abstract":"Ordinary Differential Equations (ODEs) of the Initial Value Problem (IVP) or Boundary Value Problem (BVP) type can model phenomena in wide range of fields including science, engineering, economics, social science, biology, business, health care among others. Often, systems described by differential equations are so complex that purely analytical solutions of the equations are not tractable. Therefore techniques for solving differential equations based on numerical approximations take centre stage. In this paper we review the shooting method technique as a method of solution to both linear and non-linear BVPs. Mathematics Subject Classification: 65L10","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"27 1","pages":"29-36"},"PeriodicalIF":1.2,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76367244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why RSA? A Pedagogical Comment","authors":"P. Olague, O. Kosheleva, V. Kreinovich","doi":"10.12988/JITE.2017.61248","DOIUrl":"https://doi.org/10.12988/JITE.2017.61248","url":null,"abstract":"One of the most widely used cryptographic algorithms is the RSA algorithm in which a message m encoded as the remainder c of m modulo n, where n and e are given numbers – forming a public code. A similar transformation c mod n, for an appropriate secret code d, enables us to reconstruct the original message. In this paper, we provide a pedagogical explanation for this algorithm. 1 RSA Algorithm: A Pedagogical Puzzle RSA algorithm: a brief reminder. In many computer transaction, the communicated message is encoded, to avoid eavesdropping. This happens, e.g., every time a credit card information is passed over to some website. In most of such cases, a special RSA algorithm is used to encode the message m; see, e.g., [1]. In this algorithm, two specially selected and publicly available numbers n and e are used to encode the message. The encoded message c has the form of the remainder c = m mod n. The number n is usually at least 100 decimal digits long, and the number e is similarly large. For such large numbers, it is not feasible to compute m simply as m · . . . ·m, by starting with m and e− 1 times multiplying the result by m. Instead, the following much faster algorithm is performed. First, the number e is represented in the binary form, as the sum of powers of two: e = 21 + 22 + . . . + 2p for some k1 > k2 > . . . > kp. For example, 1110 is represented as 10112 = 2 3 + 2 + 2 = 8 + 2 + 1.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"30 1","pages":"19-24"},"PeriodicalIF":1.2,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81874263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"For Fuzzy Logic, Occam's Principle Explains the Ubiquity of the Golden Ratio and of the 80-20 Rule","authors":"O. Kosheleva, V. Kreinovich","doi":"10.12988/JITE.2017.61247","DOIUrl":"https://doi.org/10.12988/JITE.2017.61247","url":null,"abstract":"In this paper, we show that for fuzzy logic, the Occam’s principle – that we should always select the simplest possible explanation – explains the ubiquity of the golden ratio and of the 80-20 rule. Mathematics Subject Classification: 03B52, 91P99","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"124 1","pages":"13-18"},"PeriodicalIF":1.2,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87911601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why West-to-East Jetlag Is More Severe: A Simple Qualitative Explanation","authors":"O. Kosheleva, V. Kreinovich","doi":"10.12988/JITE.2017.7514","DOIUrl":"https://doi.org/10.12988/JITE.2017.7514","url":null,"abstract":"Empirical data shows that the jetlag when traveling west-to-east feels more severe than the jetlag when traveling east-to-west. At present, the only explanation of this empirical phenomenon is based on a complex dynamical systems model. In this paper, we provide a simple alternative explanation. This explanation also explains – on the qualitative level – the empirical data on relative severity of different jetlags. 1 When Is the Jetlag More Severe: Empirical Facts and Their Current Explanation When is the jetlag more severe: empirical data. It is known that when we travel west-to-east, a jetlag feels more severe that after a similar east-to-west travel. A more specific data is given in [1]. In this paper, as a measure of severity of a jetlag, the authors selected the number of days that a body needs to fully adjust to the new time zone. The authors compared the recovery times for traveling 3, 9, and 12 time zones eastward and westward. These times are given in the following table: time shift recovery time recovery time west-east east-west 3 hours 4+ days 3− days 9 hours 14 days 8 days 12 hours 10 days 10 days Here, 4+ means a little more than 4 days, and 3− similarly means a little less than 3 days.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"1 1","pages":"117-120"},"PeriodicalIF":1.2,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82993150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}