Journal of Information Technology Education-Innovations in Practice最新文献

筛选
英文 中文
Stasiun Pemantau Kualitas Udara Berbasis Web 基于Web的空气质量监控站
IF 1.2
Journal of Information Technology Education-Innovations in Practice Pub Date : 2017-09-28 DOI: 10.31289/jite.v1i1.571
matius arihta sebayang
{"title":"Stasiun Pemantau Kualitas Udara Berbasis Web","authors":"matius arihta sebayang","doi":"10.31289/jite.v1i1.571","DOIUrl":"https://doi.org/10.31289/jite.v1i1.571","url":null,"abstract":"Stasiun Pemantau Kualitas Udara Berbasis Web adalah sebuah sistem yang dirancang khusus untuk dapat mengumpulkan, menginformasikan dan menyajikan data mengenai kualitas udara di titik atau daerah yang telah terpasang sensor dan telah terintegrasi dengan peranti lunak aplikasi web sehingga memudahkan pengguna untuk mengakses informasi tersebut kapanpun dan dimanapun pengguna berada.Semakin tingginya angka pengguna kendaraan bermotor mengakibatkan meningkatnya sumber pencemaran udara. Gas – gas hasil pembuangan kendaraan bermotor tersebut  dapat menimbulkan pencemaran dan apabila melebihi batas normal dapat berakibat buruk terhadap kesehatan manusia dan makhluk hidup disekitarnya. Semakin tinggi dan meningkatnya angka pencemaran udara maka sudah saatnya diperlukan suatu sistem yang dapat mengukur kadar kontaminan udara. Sistem ini telah dibangun dengan menggunakan mikrokontroler board Arduino Uno, sensor pendeteksi gas dan sensor pendeteksi suhu serta kelembaban udara, untuk perangkat lunaknya dibangun dengan menggunakan  bahasa C Arduino, bahasa pemrograman web berbasis PHP, web server Apache, dan database MySQL. Pemanfaatan database di dalam sistem ini bertujuan untuk menyimpan data yang telah dibaca atau dideteksi oleh sensor sehingga data dapat tetap tersimpan dan dapat ditampilkan ataupun disajikan apabila dikemudian hari data pengukuran ini diperlukan.Dengan demikian informasi ini dapat dijadikan acuan sehingga dapat dihindari dampak buruk udara yang tercemar. Kata Kunci : Apache; Arduino Uno; MySQL; Pencemaran Udara; PHP","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"160 1","pages":"24-33"},"PeriodicalIF":1.2,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87547940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
RANCANG BANGUN ALAT INFORMASI KODE ERROR MESIN GAME BERBASIS MIKROKONTROLER 设计一个编码信息工具基于微控制器的游戏机器错误
IF 1.2
Journal of Information Technology Education-Innovations in Practice Pub Date : 2017-09-28 DOI: 10.31289/jite.v1i1.570
N. Chandra
{"title":"RANCANG BANGUN ALAT INFORMASI KODE ERROR MESIN GAME BERBASIS MIKROKONTROLER","authors":"N. Chandra","doi":"10.31289/jite.v1i1.570","DOIUrl":"https://doi.org/10.31289/jite.v1i1.570","url":null,"abstract":"Mengisi kupon atau tiket adalah salah satu kegiatan yang sering dilakukan didalam arena permainan keluarga dan sering terjadi dalam proses permainan game tiba–tiba   error , sehingga customer  akan sibuk untuk mencari dan memanggil petugas yang berjaga. Oleh karena itu, untuk mengatasi masalah tersebut perlu adanya sistem kendali otomatis dengan cara membuat “Rancang Bangun Alat Informasi Kode Error Mesin Game Berbasis Mikrokontroler”. Alat informasi kode error mesin game ini sangat membantu dalam mengetahui apabila tiket habis atau tidak keluar, karena sistem ini bekerja berdasarkan tiket yang melewati sensor LDR yang terpasang pada dispenser tiket pada mesin game . Pada proses perancangan alat ini penulis menggunakan metode eksperimen dan perancangan yang mana dalam proses eksperimen didapatkan hasil perancangan alat keseluruhan, aplikasi mikrokontroler untuk mengirim informasi kode error mesin game dapat bekerja sesuai yang diharapkan karena dapat dengan cepat mengetahui mesin error tiket habis. Buzzer akan aktip sebagai alarm pemberitahuan tiket habis dan LCD akan menampilkan nama mesin game serta kode error mesin game tersebut. Kata kunci: Tampilan LCD, Mikrokontroler , Kode Error Mesin Game, Sensor LDR, Buzzer.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"42 1","pages":"14-23"},"PeriodicalIF":1.2,"publicationDate":"2017-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91391686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALISA ALGORITMA DATA MINING ECLAT dan HUI MINER
IF 1.2
Journal of Information Technology Education-Innovations in Practice Pub Date : 2017-08-09 DOI: 10.31289/jite.v1i1.519
Juanda Hakim Lubis
{"title":"ANALISA ALGORITMA DATA MINING ECLAT dan HUI MINER","authors":"Juanda Hakim Lubis","doi":"10.31289/jite.v1i1.519","DOIUrl":"https://doi.org/10.31289/jite.v1i1.519","url":null,"abstract":"Frequent pattern mining memainkan peran penting di dalam data mining. Salah satu metode yang digunakan adalah metode asosiasi. Metode asosiasi digunakan untuk mencari dan menganalisa data transaksi penjualan yang terjadi. Hal ini dapat dilakukan dengan memeriksa perilaku pelanggan terkait dengan produk - produk yang dibeli. Dengan menggunakan aturan asosiasi, kita dapat mengetahui seberapa sering item yang dibeli bersama-sama dalam suatu transaksi. Salah satu algoritma yang digunakan adalah Eclat. Eclat pada dasarnya adalah pencarian algoritma depth-first menggunakan persimpangan yang ditetapkan. Kelebihan dari Eclat adalah proses dan performa penghitungan support dari semua itemsets dilakukan dengan lebih efisien dibandingkan dengan algoritma HUI-miner apriori. Akan tetapi dalam penelitian ini diperoleh hasil algoritma HUI-miner lebih efektif dan lebih stabil dari segi waktu jika di bandingkan dengan eclat.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"15 1","pages":"8-13"},"PeriodicalIF":1.2,"publicationDate":"2017-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75542287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PERBANDINGAN METODE LOW BIT CODINGDENGAN PHASE CODING PADA DIGITAL AUDIO WATERMARKING 提出了一种基于低比特编码和相位编码的数字音频水印方法
IF 1.2
Journal of Information Technology Education-Innovations in Practice Pub Date : 2017-08-05 DOI: 10.31289/jite.v1i1.569
Zulfikar Sembiring
{"title":"PERBANDINGAN METODE LOW BIT CODINGDENGAN PHASE CODING PADA DIGITAL AUDIO WATERMARKING","authors":"Zulfikar Sembiring","doi":"10.31289/jite.v1i1.569","DOIUrl":"https://doi.org/10.31289/jite.v1i1.569","url":null,"abstract":"Penggunaan file audio sebagai media distribusi informasi digital sangat populer sekarang ini karena semakin canggihnya perangkat keras maupun perangkat lunak yang dapat mengolah file audio digital tersebut. Ditambah lagi dengan semakin mudahnya akses internet dimana saja baik melalui perangkat mobile ataupun tidak. Karena semakin banyaknya penggunaan file audio digital oleh perorangan atau perusahaan misalnya dalam produksi musik, atau video klip maka semakin sulit untuk menentukan keaslian suatu file audio digital dan sulitnya mencegah tingkat tindak pencurian atau pembajakan yang sangat merugikan pihak pememilik hak cipta. Ada beberapa metode dalam menentukan keaslian file audio digital dan mencegah tindak pembajakan terhadap media digital, yaitu digital watermarking. Pada jurnal ini akan dibahas dua buah metode watermarking yaitu metode low bit coding dan phase coding. Tujuannya ialah untuk mengetahui beberapa kelebihan dan kekurangan dalam penerapannya kedalam file audio digital. Karena ada beberapa aspek yang harus diketahui dalam menentukan baik atau tidaknya tingkat pengamanan pada file audio digital. Sehingga kita dapat menentukan metode yang mana yang pantas digunakan dalam menentukan keaslian file audio digital dalam mencegah tindak pencurian atau pembajakan. Kata kunci : audio, watermarking, low bit coding, phase coding","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"7 1","pages":"1-7"},"PeriodicalIF":1.2,"publicationDate":"2017-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75558179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Similarity transformation analysis of heat and mass transfer effects on steady buoyancy induced MHD free convection flow past an inclined surface 斜表面定常浮力诱导MHD自由对流传热传质效应的相似变换分析
IF 1.2
Journal of Information Technology Education-Innovations in Practice Pub Date : 2017-01-01 DOI: 10.12988/jite.2017.724
O. Otieno, A. Manyonge, J. Bitok
{"title":"Similarity transformation analysis of heat and mass transfer effects on steady buoyancy induced MHD free convection flow past an inclined surface","authors":"O. Otieno, A. Manyonge, J. Bitok","doi":"10.12988/jite.2017.724","DOIUrl":"https://doi.org/10.12988/jite.2017.724","url":null,"abstract":"The present work is devoted to the problem of a steady two dimensional hydromagnetic convective flow of a viscous, incompressible electrically conducting fluid past an inclined semi-infinite plate in the presence of magnetic field with heat and mass transfer (double diffusion). The convective flow starts under the simultaneous action of the buoyancy forces caused by the variations in density due to temperature and species concentration differences. A scaling group of similarity transformations is applied to the partial differential equations describing the problem under consideration, into a boundary value problem of coupled ordinary differential equations, which along with the boundary conditions are solved numerically by using shooting technique together with Runge-Kutta fourth order method and effects of various parameters on the flow fields are investigated and presented graphically.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"4 1","pages":"83-96"},"PeriodicalIF":1.2,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87470307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study the effect of outliers in Latin square design 研究拉丁方设计中异常值的影响
IF 1.2
Journal of Information Technology Education-Innovations in Practice Pub Date : 2017-01-01 DOI: 10.12988/JITE.2017.611
Layla A. Ahmed
{"title":"Study the effect of outliers in Latin square design","authors":"Layla A. Ahmed","doi":"10.12988/JITE.2017.611","DOIUrl":"https://doi.org/10.12988/JITE.2017.611","url":null,"abstract":"The present focuses on detecting and treating the outlier values in the Latin square design. The box plot method has been used to detect the outlier values, their effects have been studied either by keeping them in the data or by considering them missing values. From the practical work it is concluded that the outlier values have apparent and important effect on value of mean squares error, and the results of analysis of variance have been better after treating the outlier values.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"7 1","pages":"131-143"},"PeriodicalIF":1.2,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73047252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Numerical solution of non-linear boundary value problems of ordinary differential equations using the shooting technique 常微分方程非线性边值问题的数值解法
IF 1.2
Journal of Information Technology Education-Innovations in Practice Pub Date : 2017-01-01 DOI: 10.12988/jite.2017.61250
A. Manyonge, R. Opiyo, D. Kweyu, J. S. Maremwa
{"title":"Numerical solution of non-linear boundary value problems of ordinary differential equations using the shooting technique","authors":"A. Manyonge, R. Opiyo, D. Kweyu, J. S. Maremwa","doi":"10.12988/jite.2017.61250","DOIUrl":"https://doi.org/10.12988/jite.2017.61250","url":null,"abstract":"Ordinary Differential Equations (ODEs) of the Initial Value Problem (IVP) or Boundary Value Problem (BVP) type can model phenomena in wide range of fields including science, engineering, economics, social science, biology, business, health care among others. Often, systems described by differential equations are so complex that purely analytical solutions of the equations are not tractable. Therefore techniques for solving differential equations based on numerical approximations take centre stage. In this paper we review the shooting method technique as a method of solution to both linear and non-linear BVPs. Mathematics Subject Classification: 65L10","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"27 1","pages":"29-36"},"PeriodicalIF":1.2,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76367244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Why RSA? A Pedagogical Comment 为什么RSA ?教学评论
IF 1.2
Journal of Information Technology Education-Innovations in Practice Pub Date : 2017-01-01 DOI: 10.12988/JITE.2017.61248
P. Olague, O. Kosheleva, V. Kreinovich
{"title":"Why RSA? A Pedagogical Comment","authors":"P. Olague, O. Kosheleva, V. Kreinovich","doi":"10.12988/JITE.2017.61248","DOIUrl":"https://doi.org/10.12988/JITE.2017.61248","url":null,"abstract":"One of the most widely used cryptographic algorithms is the RSA algorithm in which a message m encoded as the remainder c of m modulo n, where n and e are given numbers – forming a public code. A similar transformation c mod n, for an appropriate secret code d, enables us to reconstruct the original message. In this paper, we provide a pedagogical explanation for this algorithm. 1 RSA Algorithm: A Pedagogical Puzzle RSA algorithm: a brief reminder. In many computer transaction, the communicated message is encoded, to avoid eavesdropping. This happens, e.g., every time a credit card information is passed over to some website. In most of such cases, a special RSA algorithm is used to encode the message m; see, e.g., [1]. In this algorithm, two specially selected and publicly available numbers n and e are used to encode the message. The encoded message c has the form of the remainder c = m mod n. The number n is usually at least 100 decimal digits long, and the number e is similarly large. For such large numbers, it is not feasible to compute m simply as m · . . . ·m, by starting with m and e− 1 times multiplying the result by m. Instead, the following much faster algorithm is performed. First, the number e is represented in the binary form, as the sum of powers of two: e = 21 + 22 + . . . + 2p for some k1 > k2 > . . . > kp. For example, 1110 is represented as 10112 = 2 3 + 2 + 2 = 8 + 2 + 1.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"30 1","pages":"19-24"},"PeriodicalIF":1.2,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81874263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
For Fuzzy Logic, Occam's Principle Explains the Ubiquity of the Golden Ratio and of the 80-20 Rule 对于模糊逻辑,奥卡姆原理解释了黄金比例和二八法则的普遍存在
IF 1.2
Journal of Information Technology Education-Innovations in Practice Pub Date : 2017-01-01 DOI: 10.12988/JITE.2017.61247
O. Kosheleva, V. Kreinovich
{"title":"For Fuzzy Logic, Occam's Principle Explains the Ubiquity of the Golden Ratio and of the 80-20 Rule","authors":"O. Kosheleva, V. Kreinovich","doi":"10.12988/JITE.2017.61247","DOIUrl":"https://doi.org/10.12988/JITE.2017.61247","url":null,"abstract":"In this paper, we show that for fuzzy logic, the Occam’s principle – that we should always select the simplest possible explanation – explains the ubiquity of the golden ratio and of the 80-20 rule. Mathematics Subject Classification: 03B52, 91P99","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"124 1","pages":"13-18"},"PeriodicalIF":1.2,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87911601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Why West-to-East Jetlag Is More Severe: A Simple Qualitative Explanation 为什么西向东时差更严重:一个简单的定性解释
IF 1.2
Journal of Information Technology Education-Innovations in Practice Pub Date : 2017-01-01 DOI: 10.12988/JITE.2017.7514
O. Kosheleva, V. Kreinovich
{"title":"Why West-to-East Jetlag Is More Severe: A Simple Qualitative Explanation","authors":"O. Kosheleva, V. Kreinovich","doi":"10.12988/JITE.2017.7514","DOIUrl":"https://doi.org/10.12988/JITE.2017.7514","url":null,"abstract":"Empirical data shows that the jetlag when traveling west-to-east feels more severe than the jetlag when traveling east-to-west. At present, the only explanation of this empirical phenomenon is based on a complex dynamical systems model. In this paper, we provide a simple alternative explanation. This explanation also explains – on the qualitative level – the empirical data on relative severity of different jetlags. 1 When Is the Jetlag More Severe: Empirical Facts and Their Current Explanation When is the jetlag more severe: empirical data. It is known that when we travel west-to-east, a jetlag feels more severe that after a similar east-to-west travel. A more specific data is given in [1]. In this paper, as a measure of severity of a jetlag, the authors selected the number of days that a body needs to fully adjust to the new time zone. The authors compared the recovery times for traveling 3, 9, and 12 time zones eastward and westward. These times are given in the following table: time shift recovery time recovery time west-east east-west 3 hours 4+ days 3− days 9 hours 14 days 8 days 12 hours 10 days 10 days Here, 4+ means a little more than 4 days, and 3− similarly means a little less than 3 days.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":"1 1","pages":"117-120"},"PeriodicalIF":1.2,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82993150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信