Skip to main content
  • Sritrusta Sukaridhoto received the B.E. degree in electrical engineering, computer science program from Sepuluh Nopem... moreedit
The current air quality monitoring system cannot cover a large area, not real-time and has not implemented big data analysis technology with high accuracy. The purpose of an integration Mobile Sensor Network and Internet of Things system... more
The current air quality monitoring system cannot cover a large area, not real-time and has not implemented big data analysis technology with high accuracy. The purpose of an integration Mobile Sensor Network and Internet of Things system is to build air quality monitoring system that able to monitor in wide coverage. This system consists of Vehicle as a Mobile Sensors Network (VaaMSN) as edge computing and Smart Environment Monitoring and Analytic in Real-time (SEMAR) cloud computing. VaaMSN is a package of air quality sensor, GPS, 4G Wi-Fi modem and single board computing. SEMAR cloud computing has a time-series database for real-time visualization, Big Data environment and analytics use the Support Vector Machines (SVM) and Decision Tree (DT) algorithm. The output from the system are maps, table, and graph visualization. The evaluation obtained from the experimental results shows that the accuracy of both algorithms reaches more than 90{\%}. However, Mean Square Error (MSE) value of SVM algorithm about 0.03076293, but DT algorithm has 10x smaller MSE value than SVM algorithm.
Disaster multi-robot has a significant role in a disaster area to do many tasks like detection of fire, search and rescue of victims, etc. It needs to build good communication between the operator and multi-robot and among multi-robot... more
Disaster multi-robot has a significant role in a disaster area to do many tasks like detection of fire, search and rescue of victims, etc. It needs to build good communication between the operator and multi-robot and among multi-robot themselves to perform their tasks quickly and efficiently. This relates with the queue message protocol system. In this research, we implemented the queue message protocol on mesh topology and integrated it on the robot platform. Recently, development of IoT (Internet of Things) Technology causes development of communication protocol. MQTT and CoAP are among the communication protocols used for IoT needs. Both protocols performance were compared when used and implemented into disaster multi-robot. We also integrated MQTT protocol and robot platform python based (UNR-PF). The result shows that MQTT protocol is easier to be implemented on to disaster multi-robot platform (UNR-PF) on mesh topology than CoAP, and that data transfer rate of MQTT protocol has data transfer rate higher than CoAP.
As a flexible and cost-efficient scalable Internet access network, we studied architectures, protocols, and design optimizations of the Wireless Internet-access Mesh NETwork (WIMNET). WIMNET is composed of multiple access points (APs)... more
As a flexible and cost-efficient scalable Internet access network, we studied architectures, protocols, and design optimizations of the Wireless Internet-access Mesh NETwork (WIMNET). WIMNET is composed of multiple access points (APs) connected through multihop wireless communications on IEEE 802.11 standards. The increasing popularity of real-time applications such as IP-phones and IP-TV means that they should be supported in WIMNET. However, the contention resolution mechanism using a random backoff-time in the CSMA/CA protocol of 802.11 standards is not sufficient for handling real-time traffic in multihop wireless communications. In this paper, we propose a Fixed Backoff-time Switching (FBS) method for the CSMA/CA protocol to improve the real-time traffic performance in WIMNET by giving the necessary activation chances to each link. We implement our proposal on the QualNet simulator, and verify its effectiveness through simulations on three network topologies with four scenarios.
\textless}p{\textgreater}The purpose of multimedia devices development is controlling through voice. Nowdays voice that can be recognized only in English. To overcome the issue, then recognition using Indonesian language model and... more
\textless}p{\textgreater}The purpose of multimedia devices development is controlling through voice. Nowdays voice that can be recognized only in English. To overcome the issue, then recognition using Indonesian language model and accousticc model and dictionary. Automatic Speech Recognizier is build using engine CMU Sphinx with modified english language to Indonesian Language database and XBMC used as the multimedia player. The experiment is using 10 volunteers testing items based on 7 commands. The volunteers is classifiedd by the genders, 5 Male {\&} 5 female. 10 samples is taken in each command, continue with each volunteer perform 10 testing command. Each volunteer also have to try all 7 command that already provided. Based on percentage clarification table, the word ``Kanan'' had the most recognize with percentage 83{\%} while ``pilih'' is the lowest one. The word which had the most wrong clarification is ``kembali'' with percentagee 67{\%}, while the word ``kanan'' is the lowest one. From the result of Recognition Rate by male there are several command such as ``Kembali'', ``Utama'', ``Atas `` and ``Bawah'' has the low Recognition Rate. Especially for ``kembali'' cannot be recognized as the command in the female voices but in male voice that command has 4{\%} of RR this is because the command doesn't have similar word in english near to ``kembali'' so the system unrecognize the command. Also for the command ``Pilih'' using the female voice has 80{\%} of RR but for the male voice has only 4{\%} of RR. This problem is mostly because of the different voice characteristic between adult male and female which male has lower voice frequencies (from 85 to 180 Hz) than woman (165 to 255 Hz).The result of the experiment showed that each man had different number of recognition rate caused by the difference tone, pronunciation, and speed of speech. For further work needs to be done in order to improving the accouracy of the Indonesian Automatic Speech Recognition system.Keywords: Automatic Speech Recognizer, Indonesian Acoustic Model, CMU Sphinx, indonesian Language Model, Recognition Rate, XBMC.{\textless}/p{\textgreater
Wireless mesh networks is a network which has high mobility and flexibility network. In Wireless mesh networks nodes are free to move and able to automatically build a network connection with other nodes. High mobility, heterogeneous... more
Wireless mesh networks is a network which has high mobility and flexibility network. In Wireless mesh networks nodes are free to move and able to automatically build a network connection with other nodes. High mobility, heterogeneous condition and intermittent network connectivity cause data packets drop during wireless communication and it becomes a problem in the wireless mesh networks. This condition can happen because wireless mesh networks use connectionless networking type such as IP protocol which it is not tolerant to delay. To solve this condition it is needed a technology to keep data packets when the network is disconnect. Delay tolerant technology is a technology that provides store and forward mechanism and it can prevent packet data dropping during communication. In our research, we proposed a test bed wireless mesh networks implementation by using proactive routing protocol and combining with delay tolerant technology. We used Batman-adv routing protocol and IBR-DTN on our research. We measured some particular performance aspect of networking such as packet loss, delay, and throughput of the network. We identified that delay tolerant could keep packet data from dropping better than current wireless mesh networks in the intermittent network condition. We also proved that IBR-DTN and Batman-adv could run together on the wireless mesh networks. In The experiment throughput test result of IBR-DTN was higher than Current TCP on the LoS (Line of Side) and on environment with obstacle.
HPC (High Performance Computing) has become more popular in the last few years. With the benefits on high computational power, HPC has impact on industry, scientific research and educational activities. Implementing HPC as a curriculum in... more
HPC (High Performance Computing) has become more popular in the last few years. With the benefits on high computational power, HPC has impact on industry, scientific research and educational activities. Implementing HPC as a curriculum in universities could be consuming a lot of resources because well-known HPC system are using Personal Computer or Server. By using PC as the practical moduls it is need great resources and spaces. This paper presents an innovative high performance computing cluster system to support education learning activities in HPC course with small size, low cost, and yet powerful enough. In recent years, High Performance computing usually implanted in cluster computing and require high specification computer and expensive cost. It is not efficient applying High Performance Computing in Educational research activiry such as learning in Class. Therefore, our proposed system is created with inexpensive component by using Embedded System to make High Performance Computing applicable for leaning in the class. Students involved in the construction of embedded system, built clusters from basic embedded and network components, do benchmark performance, and implement simple parallel case using the cluster. In this research we performed evaluation of embedded systems comparing with i5 PC, the results of our embedded system performance of NAS benchmark are similar with i5 PCs. We also conducted surveys about student learning satisfaction that with embedded system students are able to learn about HPC from building the system until making an application that use HPC system.
This paper presents a heterogeneous model of real time task system with novel processing rate work parameter. The model considers the precedence constraint with implicit deadline. Global EDF scheduling algorithm was applied on this model... more
This paper presents a heterogeneous model of real time task system with novel processing rate work parameter. The model considers the precedence constraint with implicit deadline. Global EDF scheduling algorithm was applied on this model and analyzed in the context of its schedulability and capacity augmentation bound. By combining parallel tasks analysis upon identical multiprocessor and their processing rate upon heterogeneous system, we derived utilization augmentation, which is useful for extending capacity augmentation bound. Our experiments showed that there was a schedulable task system which is characterized by utilization augmentation upon heterogeneous system under Global EDF with capacity augmentation bound of (4-m/2)(1 + v(U-Aug)). Our model with processing rate is also useful for practical consideration.
--- Human eyes can recognize an object just by looking at the environment; this capability is very useful for designing the reference of a humanoid robot with the ability for adapting to its environment. By knowing the field conditions... more
--- Human eyes can recognize an object just by looking at the environment; this capability is very useful for designing the reference of a humanoid robot with the ability for adapting to its environment. By knowing the field conditions that exist in such environments, the robot can understand the obstacles or anything that can be passed. To do that, robot's vision needs to has the knowledge to understand an obstacle that exists around it. Because of these problems, this paper shows a method for reducing the error rate of vacant space in the data depth by combining a stereo camera and structure sensor. Merging the stereo camera and structure sensor can extract depth information becomes dense. The proposed method has been successfully running the whole algorithm that already built and has a density of depth with an average error rate of vacant space is 18.10{\%}.
Coral monitoring has become major focus to prevent coral bleaching so that various methods have been developed by researchers to analyze coral reefs' health. This paper proposed a low-cost coral monitoring system based for shallow water... more
Coral monitoring has become major focus to prevent coral bleaching so that various methods have been developed by researchers to analyze coral reefs' health. This paper proposed a low-cost coral monitoring system based for shallow water based on IoUT architecture. The proposed system consists of buoy as base component, controller unit based on Single Board Computer equipped with 5V power source, underwater camera and communication unit to send data into cloud server. This system is able to extend WiFi signal from underwater camera by using coaxial cable and transmit image into cloud server. From experiment, we measured that reliability delay using coaxial cable to capture and save image is 5,6 seconds. Results on cloud server experiment indicate distributed server's performance is 186,6 seconds comparing to 53,6 seconds on single server. Moreover, we also have developed bleaching classification resulting 84,3{\%} correct results and an online representation model of retrieved coral images.
Monitoring water conditions in real-time is a critical mission to preserve the water ecosystem in maritime and archipelagic countries, such as Indonesia that is relying on the wealth of water resources. To integrate the water monitoring... more
Monitoring water conditions in real-time is a critical mission to preserve the water ecosystem in maritime and archipelagic countries, such as Indonesia that is relying on the wealth of water resources. To integrate the water monitoring system into the big data technology for real-time analysis, we have engaged in the ongoing project named smart environment monitoring and analytic in real-time system (SEMAR), which provides the IoT-big data platform for water monitoring. However, SEMAR does not have an analytical system yet. This paper proposes the analytical system for water quality classification using Pollution Index method, which is an extension of SEMAR. Besides, the communication protocol is updated from REST to MQTT. Furthermore, the real-time user interface is implemented for visualisation. The evaluations confirmed that the data analytic function adopting the linear SVM and decision tree algorithms achieves more than 90{\%} for the estimation accuracy with 0.019075 for the MSE.
A wireless sensor network (WSN) works continuously to gather information from sensors that generate large volumes of data to be handled and processed by applications. Current efforts in sensor networks focus more on networking and... more
A wireless sensor network (WSN) works continuously to gather information from sensors that generate large volumes of data to be handled and processed by applications. Current efforts in sensor networks focus more on networking and development services for a variety of applications and less on processing and integrating data from heterogeneous sensors. There is an increased need for information to become shareable across different sensors, database platforms, and applications that are not easily implemented in traditional database systems. To solve the issue of these large amounts of data from different servers and database platforms (including sensor data), a semantic sensor web service platform is needed to enable a machine to extract meaningful information from the sensor's raw data. This additionally helps to minimize and simplify data processing and to deduce new information from existing data. This paper implements a semantic web data platform (SWDP) to manage the distribution of data sensors based on the semantic database system. SWDP uses sensors for temperature, humidity, carbon monoxide, carbon dioxide, luminosity, and noise. The system uses the Sesame semantic web database for data processing and a WSN to distribute, minimize, and simplify information processing. The sensor nodes are distributed in different places to collect sensor data. The SWDP generates context information in the form of a resource description framework. The experiment results demonstrate that the SWDP is more efficient than the traditional database system in terms of memory usage and processing time.
Teknologi Voice Over Internet Protocol (VoIP) merupakan suatu terobosan dalam komunikasi data. Namun demikian faktor keamanan data pada VoIP masih rentan terhadap kemungkinan penyalahgunaan (abuse), hacking, data-sniffing dan berbagai... more
Teknologi Voice Over Internet Protocol (VoIP) merupakan suatu terobosan dalam komunikasi data. Namun demikian faktor keamanan data pada VoIP masih rentan terhadap kemungkinan penyalahgunaan (abuse), hacking, data-sniffing dan berbagai macam ancaman lainnya. Pada paper ini telah dicapai suatu system yang dapat digunakan untuk mengamankan komunikasi V oIP . Dengan menggunakan teknologi Virtual Private Networking (VPN) dapat digunakan untuk mengamankan jalur yang digunakan, serta metode kriptografi pada aplikasi VoIP dapat mengacak suara yang akan dikirimkan sehingga tidak dapat disadap. Dengan eksperimen yang telah dilakukan, penggunaan sistem VPN dan kriptografi pada VoIP terdapat korelasi terhadap bandwidth dan intelligibility suara.
Currently, several streaming servers are available to provide a variety of multimedia applications such as VoD (Video-on-Demand), IP-phone, and IP-TV. As a result, the provision of multiple streaming servers on a single machine using the... more
Currently, several streaming servers are available to provide a variety of multimedia applications such as VoD (Video-on-Demand), IP-phone, and IP-TV. As a result, the provision of multiple streaming servers on a single machine using the virtualization technology has become important in order to save the operational/management costs while enhancing the performance and the reliability of the system. In this paper, we show the performance evaluation of two representative open source softwares for the virtualization technology, Xen and OpenVZ, in various configurations of applications on three open source streaming servers, Red5, Darwin, and VLC. Our experimental results indicate that OpenVZ provides the better performance for streaming applications with Darwin and VLC whereas Red5 can run only on Xen.
Perkembangan teknologi dan Internet saat ini, memungkinkan banyak orang untuk menikmati berbagai materi dan informasi dengan bebas dan cuma-cuma. Namun, ada beberapa materi yang seharusnya tidak dikonsumsi oleh semua kalangan dan bahkan... more
Perkembangan teknologi dan Internet saat ini, memungkinkan banyak orang untuk menikmati berbagai materi dan informasi dengan bebas dan cuma-cuma. Namun, ada beberapa materi yang seharusnya tidak dikonsumsi oleh semua kalangan dan bahkan tidak cocok dengan budaya kita seperti pornografi. Pada paper ini kami menjelaskan bagaimana membangun sistem yang dapat mengidentifikasi serta memilah apakah sebuah gambar tergolong porno atau tidak. Penyeleksian yang didasarkan pada warna kulit (skin detection) telah terbukti dan merupakan suatu syarat utama dalam melakukan penyeleksian suatu gambar dengan objek manusia. Untuk memilah bagian-bagian tertentu yang kita inginkan dari sebuah gambar digunakan teknik deteksi obyek (Object Detection). Dalam sistem ini kita menggabungkan skin detection dan object detection serta proses terakhir adalah melakukan klasifikasi untuk memutuskan apakah gambar tersebut tergolong pornografi atau tidak. Dalam penelitian ini telah berhasil di implementasi sebuah aplikasi pendeteksi gambar porno kedalam program web browser. Sehingga dengan aplikasi ini diharapkan mampu membantu menghadapi tantangan yang serius dalam melindungi konten Internet.
As an inexpensive and scalable access network to the Internet, we have studied the architecture, pro- tocols, and design optimizations of Wireless Internet access Mesh Network (WIMNET). WIMNET is composed of multiple access points (APs)... more
As an inexpensive and scalable access network to the Internet, we have studied the architecture, pro- tocols, and design optimizations of Wireless Internet access Mesh Network (WIMNET). WIMNET is composed of multiple access points (APs) connected through wireless links. Previously, we have proposed the CSMA-based Fixed Backoff-time Switching (CSMA-FBS) method for WIMNET to improve the performance by giving necessary link activation chances for multi-hop communications. In this study, we implement the CSMA-FBS method on the QualNet simulator for evaluations in more realistic network environments. The simulation results in three network topologies confirm the effectiveness of our proposal.
As a flexible and cost effective solution for a scalable Internet-access network, we have studied the Wireless Internet-access Mesh NETwork (WIMNET) that is composed of multiple access points (APs). WIMNET utilizes multi-hop... more
As a flexible and cost effective solution for a scalable Internet-access network, we have studied the Wireless Internet-access Mesh NETwork (WIMNET) that is composed of multiple access points (APs). WIMNET utilizes multi-hop communications between APs to provide access to the Internet through a gateway (GW) from associated hosts, which becomes increasingly vulnerable to problems of the available bandwidth degradation and the network latency. As a result, real-time applications such as Voice-over-IP (VoIP) and video conferences are hard in WIMNET. In this paper, we propose a traffic control method with consumed bandwidth estimation to afford real-time applications in WIMNET. After the consumed bandwidth by the requesting applications is estimated, the least priority application is repeatedly dropped at GW using the leaky bucket traffic shaping, until it does not exceed the available bandwidth in WIMNET. The effectiveness of our proposal is verified through simulations using the QualNet simulator. {\textcopyright} 2011 IEEE.
As a flexible and cost-efficient scalable Internet ac- cess network, we have studied architectures, proto- cols, and design optimizations of the Wireless Internet- access Mesh NETwork (WIMNET). WIMNET is com- posed of wireless connected... more
As a flexible and cost-efficient scalable Internet ac- cess network, we have studied architectures, proto- cols, and design optimizations of the Wireless Internet- access Mesh NETwork (WIMNET). WIMNET is com- posed of wireless connected access points. Previously, we proposed the Fixed Backoff-time Switching (FBS) method for the CSMA/CA protocol to improve the real- time traffic performance in WIMNET by giving the necessary activation chances to each link, and verified the effectiveness using the QualNet simulator. In this paper, we present an idea of the FBS method imple- mentation at Linux kernel after quickly reviewing it.
As a flexible and cost-efficient scalable Internet access network, we have studied architectures, protocols, and de- sign optimizations of the Wireless Internet-access Mesh NETwork (WIMNET). WIMNET is composed of wirelessly connected... more
As a flexible and cost-efficient scalable Internet access network, we have studied architectures, protocols, and de- sign optimizations of the Wireless Internet-access Mesh NETwork (WIMNET). WIMNET is composed of wirelessly connected access points (APs), where any host can basically access to the Internet through multihop communications between APs. In WIMNET, undesirable situations can often happen such that some links dominate the bandwidth while others become insuffi- cient due to the limited shared bandwidth. To improve the performance by avoiding them, controls of activation chances for wireless links depending on their traffics are effective. Thus, previously, we have proposed the Fixed Backoff-time Switching (FBS) method for the CSMA/CA protocol, and verified the effectiveness using the QualNet simulator. In this paper, we present an implementation design of the FBS method in Linux kernel to show its practicality and investigate the performance in a real network. Our design consists of implementations or modifications of the five programs: Kernel configuration, Debugfs, Minstrel, iw, and FBSdaemon.
Embedded parallel computing become popular, and the future of innovation in the semiconductor industry will be in ubiquitous computing. Many researchers built embedded cluster system with limited number of devices, but we utilize the... more
Embedded parallel computing become popular, and the future of innovation in the semiconductor industry will be in ubiquitous computing. Many researchers built embedded cluster system with limited number of devices, but we utilize the device from embedded classroom to build more number of parallel computing unit. In this paper we built low power cluster consisting 32 ARM boards with low-cost customized power supply for high performance computing class for education purpose, tested with several benchmarks on embedded cluster system and analyse the raw performance.
As a flexible and cost-efficient scalable Internet ac- cess network, we have studied architectures, proto- cols, and design optimizations of the Wireless Internet- access Mesh NETwork (WIMNET) that is composed of wirelessly connected... more
As a flexible and cost-efficient scalable Internet ac- cess network, we have studied architectures, proto- cols, and design optimizations of the Wireless Internet- access Mesh NETwork (WIMNET) that is composed of wirelessly connected access points (APs). Previously, we proposed the Fixed Backoff-time Switching (FBS) method in the CSMA/CA protocol for the AP in WIM- NET to improve the real-time traffic performance by giving the necessary activation chance to each link, and presented its Linux implementation. In this paper, we present a design for the OpenFlow implementation of the FBS method based on a previous work by Dely et al.
As a flexible and cost-efficient scalable Internet access network, we have studied architectures, protocols, and design optimizations of the Wireless Internet-access Mesh NET- work (WIMNET). WIMNET is composed of wirelessly connected... more
As a flexible and cost-efficient scalable Internet access network, we have studied architectures, protocols, and design optimizations of the Wireless Internet-access Mesh NET- work (WIMNET). WIMNET is composed of wirelessly connected access points (APs), where any host can basically access to the Internet through multihop communications between APs with IEEE 802.11 standard. In WIMNET, undesirable situations can often happen such that some links dominate the bandwidth while others become insufficient due to the limited shared bandwidth. However, the contention resolution mechanism using a random backoff-time in the CSMA/CA protocol of 802.11 standards is not sufficient for handling real-time traffic in multihop wireless communications. Previously, we have proposed the concept of the CSMA-based Fixed Backoff time Switching (CSMA-FBS) method for WIMNET to improve the performance by giving necessary link activation chances for multi-hop communications. We implemented our proposal on the QualNet simulator, and verify its effectiveness through simulations. In this paper, we present an implementation of the FBS method in Linux kernel to show its practicality and investigate the performance in a real network. Our design consists of implementations or modifications of the five programs: Kernel configuration, Debugfs, Minstrel, iw, and FBSdaemon.
\textcopyright} 2015 IEEE.Multithreading implementation through real time operating system was held in several years to optimize resource management in embedded system. Several side effects, such as large binary size and memory usage were... more
\textcopyright} 2015 IEEE.Multithreading implementation through real time operating system was held in several years to optimize resource management in embedded system. Several side effects, such as large binary size and memory usage were appeared while implementing multithreading mechanism and its supporting mechanism. We developed FLoW to reduce those side effects while performing multithread in embedded system. FLoW implemented event based microkernel to minimize the environment and simplified the services. Static array implementation with reduced priority number was chosen rather than dynamic allocated to reduce platform memory usage in maintained scheduling performance in FLoW. The results show average performance of native multithreading supported by microkernel relative to existing real time operating system with lower side effects.
\textcopyright} 2015 IEEE. Humanoid robot has become popular research platforms in robotics and artificial intelligence. Humanoid robot can perform complex motions, including the balancing, walking, and kicking skills required in the... more
\textcopyright} 2015 IEEE. Humanoid robot has become popular research platforms in robotics and artificial intelligence. Humanoid robot can perform complex motions, including the balancing, walking, and kicking skills required in the RoboCup robot soccer competition. The humanoid robot from the Electronic Engineering Polytechnic Institute of Surabaya (EEPIS) research center named FLoW. This paper discusses about the FLoW head mechanism. Flow head mechanism is split into three parts there are eye mechanism, head mechanism and neck mechanism. The forward kinematic from FLoW head mechanism is obtained to generate workspace of motion. The FloW head workspace of motion is compared to human workspace of motion. From the experiment the motion of FLoW head already approached human easy head motion.
In Indonesia, river water plays important roles in human life; for example, for transportation and economic activities of the inhabitants. However, industrial, agricultural and domestic water is discarded into rivers directly in many... more
In Indonesia, river water plays important roles in human life; for example, for transportation and economic activities of the inhabitants. However, industrial, agricultural and domestic water is discarded into rivers directly in many developing countries, since drainage systems have not been completely constructed. Water quality monitoring using radio-controlled submarine provide an opportunity to develop baseline monitoring system for river water ecosystem health indicator. We propose a design modification of radio-controlled submarine for river water quality monitoring. Our design consists of modification for navigation system by added external motor, IMU and GPS; modification of processing and control system by added micro controllers and mini pc, and modification of water sensors system.
\textcopyright} 2015 IEEE. The development of technology for supporting learning system at this time takes place very rapidly. Human Computer Interaction provides users that allows to control presentations in a natural way by their body... more
\textcopyright} 2015 IEEE. The development of technology for supporting learning system at this time takes place very rapidly. Human Computer Interaction provides users that allows to control presentations in a natural way by their body gestures and voice commands. The authors propose a simple system that can be use to control presentation by using hand gestures and also by using Indonesian speech recognition. Our proposed system consist of gesture recognition with Kinect 3D skeletal data, and utilize Google Speech API to recognize Indonesian language as voice command. In this system we built applications to perform hand gestures and speech recognitions and utilize libraries to perform mouse and keyboard actions in presentation application. From the experiments, hand gestures application can process in realtime with the accuracy more than 90{\%}, and for Indonesian language speech recognition gave accuracy almost 99{\%} with average speed of recognition around 1 second.
The development of robotics have a great potential to be integrated with educational system. Robotics become more common in elementary and high school students. However, the absence of a module which integrates hardware and software makes... more
The development of robotics have a great potential to be integrated with educational system. Robotics become more common in elementary and high school students. However, the absence of a module which integrates hardware and software makes harder for them to learn robotic. To help students learning robotics by using an easy to build robot with a dedicated interactive Graphical User Interface (GUI) to program it, we propose a module that integrates the simplicity of modular robot with feasible and appealing mobile visual IDE programming apps. A modular robot which allows student to build the robot without have to build it from the scratch, and Mobile visual IDE is an Android based apps which allow user to program robot in GUI with a drag and drop icons followed by property editor. The icons represent robot commands such as moving and interacting with objects. This module also support advanced robotics features such as line follower, wall follower and free movement. The evaluation results demonstrate the visual appearance, ease of operation, the level of enjoyment, and benefit considered quite good by the respondents.
The Internet of Things Technology (IoT) is developing so rapidly. One of IoT implementation is an Internet of Underwater Things (IoUT) which is used for underwater monitoring. This paper discuss an integrated smart environment system... more
The Internet of Things Technology (IoT) is developing so rapidly. One of IoT implementation is an Internet of Underwater Things (IoUT) which is used for underwater monitoring. This paper discuss an integrated smart environment system framework based on IoUT and big data that consist of open platform that processes data from Remotely Operated Vehicle (ROV) and portable sensor with water parameters sensors such an input device to collect and save the data of oxidation-reduction potential, pH, electrical conductivity, total dissolve solid, salinity, dissolved oxygen, and temperature in monitored rivers temporary. Coral Reef Monitoring used for preventing coral bleaching by using underwater camera to take some pictures that will be sent to data center and then analyze it, Wireless Mess Network Access Point used as the way ROVs `talking' to each other while doing a monitoring process in a wide river. Then all of the collected data from ROVs and portable sensor will be saved and analyzed to the data center platform based on Hadoop Multi-Node Cluster. The data will be visualized as a chart or a table and can be accessed world-wide We found that, the processing of the data used in the open platform to be relatively straightforward using a combination of SQL. However, the use of HDFS (Hadoop Distributed File System) as data center and more versatile frameworks such as Mapreduce, Hive, Spark, Redis and more flexible set component of features that particularly facilitate working with larger volumes and more heterogeneous data sources.
Memory management evaluation test is one of the ways to understand the characteristic and performance of dynamic memory allocation algorithm. DMA is one of the RTOS parts that provide storage management when the applications are running.... more
Memory management evaluation test is one of the ways to understand the characteristic and performance of dynamic memory allocation algorithm. DMA is one of the RTOS parts that provide storage management when the applications are running. Nowadays there is a lot of memory management algorithm, and each algorithm has its own characteristics like the deterministic or nondeterministic algorithm. We develop a testing framework using Markov chain in order to test the allocation algorithm performance to fit the allocation behavior in RTOS. The framework generates various type of scenario test which can determine deterministic and nondeterministic of the algorithm based on the performance result. The result shows the impact of allocation size and allocation variation affect the allocation performance respond that generated by this framework.
A node in wireless sensor networks has limited battery capacity. In this case, energy efficiency is crucial to prolong the sensor devices lifetime. In this paper, we propose a simple and energy efficient image compression (SEIC), based on... more
A node in wireless sensor networks has limited battery capacity. In this case, energy efficiency is crucial to prolong the sensor devices lifetime. In this paper, we propose a simple and energy efficient image compression (SEIC), based on Discrete Cosine Transform (DCT) transform, in addition to our previous proposed method based on Discrete Wavelet Transform (SEIC-DWT). SEIC (DCT or DWT) consists of transform coding and low-weight code. Transform coding is used to reduce the data size and low-weight code is used to reduce the number of pulse transmission in pulse-based modulation. We investigates the system performance in terms of visual quality, energy efficiency and robustness against transmission error. Moreover, we compare our method with well-known image compression standard, such as PNG, JPEG and JPEG 2000. The results show that our proposed method outperform them in most-metrics. For example, SEIC-DCT outperform JPEG in all metrics.
Learning about sensor technology and actuator early is important as a step towards knowing and introducing of advanced technologies based on Internet of Things (IoT). The difficulties are how to learn sensor technology and move the... more
Learning about sensor technology and actuator early is important as a step towards knowing and introducing of advanced technologies based on Internet of Things (IoT). The difficulties are how to learn sensor technology and move the actuator with accessing General Purpose Input Output (GPIO) of Raspberry Pi 3 Platforms using programming language syntax which often confusing and difficult to understand. To help people learning IoT by using Raspberry Pi 3 with an interesting Android apps, we believe that this learning module can integrate about the ease and attractiveness of IoT System Editor based on Android apps. This research create a mobile programming apps based on Android which people can build IoT project easily with GUI without program and middleware based on Raspberry Pi to connect between apps and hardware with especially task to manage data communication, data flow, and device driver. Hopefully new developer can develop the IoT application easily by using Android mobile visual programming that combined with Raspberry Pi 3 platform.
A map of a location made of a human mindset is made briefly by recording a situation already seen in memory. Human behavior is easy to do without a lot of thinking. The process is observed more deeply that when the human mind does not do... more
A map of a location made of a human mindset is made briefly by recording a situation already seen in memory. Human behavior is easy to do without a lot of thinking. The process is observed more deeply that when the human mind does not do the behavior in turn like looking at the whole room then just remember, but humans can see at once remember simultaneously. Bringing human behavior into a computer system is done by mimicking how humans look. Looking at using two cameras in combination with the sensor structure. To process the device requires a large computing. Be a challenge for Portable CPU that have lower capabilities than high end CPU. For that humanoid robot can perform tasks simultaneously and can accelerate, especially in image processing using portable CPU required a method that makes the processing into realtime. Achieving realtime with data from previous researcher can not be done with sequential algorithms when the complexity is high. After analyzing the problem was built parallel camera mapping process using multithread algorithm. This paper aims to accelerate the basic process of making the map so as to achieve realtime. This research aims to change the previous process that runs sequentially into a parallel system using multithread algorithm. The results of each process are compared between parallel systems with multithread algorithm and do not use parallel systems. There is a change in speed between the two processes. Further research is concerned with improving the mapping environment results when visualized.
\textcopyright} 2016 IEEE. Human can recognize an object just by looking at the environment, this capability is very useful for designing the reference of humanoid robot with the ability of adapting it on its environment. By knowing the... more
\textcopyright} 2016 IEEE. Human can recognize an object just by looking at the environment, this capability is very useful for designing the reference of humanoid robot with the ability of adapting it on its environment. By knowing the field conditions that exist in such environments, robot can understand the obstacles or anything that can be passed. To do that, robot vision needs to have a knowledge to understanding an obstacles that exist around it. We investigate possible improvements that can be achieved in depth estimation by merging coded apertures and stereo cameras. The demonstrated results of this analysis are encouraging in the sense that coded apertures can provide valuable complementary information to stereo vision based depth estimation in some cases. We show that with this system, it is possible to extract depth information robustly, by utilizing the inherent relation between the disparity and defocus cues, even for scene regions which are problematic for stereo matching.
Digital signature is a term that use a key pair of user for sign and verify a document. People can create their digital signature using biometric technology. Biometric technology is a concept that allows people to doing an digitally... more
Digital signature is a term that use a key pair of user for sign and verify a document. People can create their digital signature using biometric technology. Biometric technology is a concept that allows people to doing an digitally authentication using their bodies, for example by using their fingerprint. Now, fingerprint biometric technology system was available in some smartphone product, so that allows user to unlocking their smartphone only by scanning their fingerprint into smartphone's fingerprint sensor. The combination of that's all technology (digital signature, biometric fingerprint, smartphone with fingerprint sensor) can arise an innovation to make a system that can create a digital signature only using fingerprint on smartphone. This system applied to a method of signing document digitally. When user sending a document to other, user who send the document have to put their fingerprint into smartphone fingerprint sensor and the the document will be encrypted. Then, user who receive the encrypted message will decrypt the message using public key of user who as a sender. In this case, fingerprint is a medium to call the value of user private key from the database. Key pair algorithm for this system is using RSA algorithm.
Sports activities are getting more and more attention from both government and society. In the athletics sport, in addition to agility and good ability, an athlete must have a strong mentality. Mental of the athlete is very critical on... more
Sports activities are getting more and more attention from both government and society. In the athletics sport, in addition to agility and good ability, an athlete must have a strong mentality. Mental of the athlete is very critical on its performance. Most successful athletes achieve their peak achievement of 60{\%} to 90{\%} influenced by mental factors and the ability of athletes to master their psychological state, One of the elements of psychology that greatly affect is the concentration. Not a few athletes who have low concentration power, so it takes practice to improve the power of concentration. Therefore, the research is useful to help runners or athletes in training the power of concentration by utilizing virtual reality technology. We develop a training system for athletes by utilizing Virtual Reality (VR) that calculates head movement as concentration measurement. This system consists of VR hardware and VR environment. We have result from an experiment that said we could measure the concentration of an athlete by measuring how much the attention of an athlete is distracted. Therefore we develop a system that can simulate that. Virtual reality technology is chosen because it can deliver an immersive experience. By simulating the environment of the field during a sprinting game, it is expected that the runners will get used to the atmosphere and can concentrate on giving their best performance.

And 5 more

This paper presents a compact cluster computer with embedded CPUs, called" UCC (Ubiquitous Computing Cluster)", in order to provide a cost-effective prototyping environment for design and test of ubiquitous computing... more
This paper presents a compact cluster computer with embedded CPUs, called" UCC (Ubiquitous Computing Cluster)", in order to provide a cost-effective prototyping environment for design and test of ubiquitous computing applications. We achieve ...