Determination of the nearest distance is often a problem to get to somewhere. This
happens when Muslims want to find masjid when they want to worship. As the time of worship is
nearing its end, they are very confused to find the nearest masjid from their location. In manual
calculations, this is very difficult to do where several masjids become an option. The Haversine method
is an excellent method for finding the nearest place based on the coordinates of the earth. This method
will calculate the distance with the Euclidean distance algorithm based on the latitude and longitude
of the earth. These values are obtained by using Google Maps. On Google Maps, certain points have
specific longitude and latitude. It is very helpful in determining the points of the masjid's location. This
study performs these calculations to get the closest distance from the search. It is done based on a
straight line between the user's position and the target. The weakness of this algorithm, it can not know
the obstacles that exist into the nearest masjid. This algorithm only calculates the distance based on a
straight line. However, it is helpful for people to find the nearest masjid from their position.
This document discusses using the Dijkstra algorithm and Haversine formula to detect the shortest path between two points in a city using landmarks. It begins by providing background on increasing urbanization. It then describes using Dijkstra's algorithm and the Haversine formula to calculate the shortest distance between points given their latitude and longitude. The paper outlines the process, including representing distances on a spherical earth with the Haversine formula and using Dijkstra's algorithm to iteratively find the shortest path. It proposes providing navigation directions between points in a city using junctions and landmarks.
This document discusses using the Dijkstra algorithm and Haversine formula to detect the shortest path between two points in a city while incorporating landmarks. It begins by providing background on increasing urbanization. The authors then describe using Dijkstra's algorithm and the Haversine formula to calculate the shortest distance between points given their latitude and longitude. The system design involves a client-server architecture where the client sends a request with start and end points, the server uses its processing application and database to calculate the route, and sends the response back to the client. The route is provided both textually with directions and visually on a Google map.
This document describes a study that uses GIS network analysis to determine the optimal paths from the Sam Higginbottom Institute of Agriculture, Technology and Sciences (SHIATS) to 10 hospitals in Allahabad, India. ArcGIS Network Analyst, which is based on Dijkstra's algorithm, was used to calculate the shortest travel times and distances from SHIATS to each hospital. The results were presented in a table and figures showing the shortest path from SHIATS to each hospital. The study found that travel times ranged from 4 to 17 minutes and distances ranged from 2.4 to 10.8 km. It was concluded that determining optimal paths using GIS network analysis can help improve hospital transportation and routing in the city.
An innovative idea to discover the trend on multi dimensional spatio-temporal...eSAT Journals
Abstract Spatio-temporal data is any information regarding space and time. It is frequently updated data with 1TB/hr, are greatly challenging our ability to digest the data. Thereupon, it is unable to gain exact information from that data. So this research offers an innovative idea to discover the trend on multi-dimensional spatio-temporal datasets. Here it briefly describes the scope and relevancy of spatio-temporal data. From that, gain the depth knowledge of spatio-temporal recent research process to discover the trend. Keywords: Spatio-temporal Data, Applications of Spatio-temporal data, Problem Definition, Contributions
An innovative idea to discover the trend on multi dimensional spatio-temporal...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Classification of aurangabad city using high resolution remote sensing dataeSAT Journals
Abstract
The current study highlights the advantages of remote sensing and Geographic Information System (GIS) in the field urban planning and management. IRS-P6 Resourcesat-1 LISS-IV high spatial resolution (5.8m) data with three spectral bands were used for urban classification. The study area Aurangabad is the capital metro city of Maharashtra State, India. ENVI 4.4 image processing tool was used for classification of satellite data on the basis of supervised approach. Two statistical algorithms were used for urban classification such as Minimum distance and Mahalanobis distance classifier. Lastly the accuracy of the classification was performed through ground truth. The result indicates that the Minimum distance classifier gives the better results than Mahalanobis classifier which are 80.2817% and 70.4225% respectively. Hence it is identified minimum distance is best for urban classification.
Keywords: Supervised classification, Multispectral, Confusion matrix, Producer’s accuracy, Users accuracy.
High speed multiplier using vedic mathematicseSAT Journals
Abstract
The digital signal processing in today’s time need high speed computation. The basic building block of signal processing in
Communication, Biomedical signal processing, and Image processing remains Fast Fourier Transform (FFT). FFT computation
involves multiplications and additions. Speed of the DSP processor mainly depends on the speed of the multiplier. Time delay, power
dissipation and the silicon chip area. These are the most important parameters for the fast growing technology. The conventional
multiplication method requires more time and area and hence more power dissipation. In this paper an ancient Vedic multiplication
method called “Urdhva Triyakbhyam” is implemented. It is a method based on 16 sutras of Vedic mathematics. Vedic Mathematics
reduces the number of operations to be carried out compared to the conventional method. The code description is simulated and
synthesized using FPGA device Spartan XC3S400-PQ208.
Keywords— Vedic Multiplication, Urdhva Tiryakbhayam , FFT
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses using the Dijkstra algorithm and Haversine formula to detect the shortest path between two points in a city using landmarks. It begins by providing background on increasing urbanization. It then describes using Dijkstra's algorithm and the Haversine formula to calculate the shortest distance between points given their latitude and longitude. The paper outlines the process, including representing distances on a spherical earth with the Haversine formula and using Dijkstra's algorithm to iteratively find the shortest path. It proposes providing navigation directions between points in a city using junctions and landmarks.
This document discusses using the Dijkstra algorithm and Haversine formula to detect the shortest path between two points in a city while incorporating landmarks. It begins by providing background on increasing urbanization. The authors then describe using Dijkstra's algorithm and the Haversine formula to calculate the shortest distance between points given their latitude and longitude. The system design involves a client-server architecture where the client sends a request with start and end points, the server uses its processing application and database to calculate the route, and sends the response back to the client. The route is provided both textually with directions and visually on a Google map.
This document describes a study that uses GIS network analysis to determine the optimal paths from the Sam Higginbottom Institute of Agriculture, Technology and Sciences (SHIATS) to 10 hospitals in Allahabad, India. ArcGIS Network Analyst, which is based on Dijkstra's algorithm, was used to calculate the shortest travel times and distances from SHIATS to each hospital. The results were presented in a table and figures showing the shortest path from SHIATS to each hospital. The study found that travel times ranged from 4 to 17 minutes and distances ranged from 2.4 to 10.8 km. It was concluded that determining optimal paths using GIS network analysis can help improve hospital transportation and routing in the city.
An innovative idea to discover the trend on multi dimensional spatio-temporal...eSAT Journals
Abstract Spatio-temporal data is any information regarding space and time. It is frequently updated data with 1TB/hr, are greatly challenging our ability to digest the data. Thereupon, it is unable to gain exact information from that data. So this research offers an innovative idea to discover the trend on multi-dimensional spatio-temporal datasets. Here it briefly describes the scope and relevancy of spatio-temporal data. From that, gain the depth knowledge of spatio-temporal recent research process to discover the trend. Keywords: Spatio-temporal Data, Applications of Spatio-temporal data, Problem Definition, Contributions
An innovative idea to discover the trend on multi dimensional spatio-temporal...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Classification of aurangabad city using high resolution remote sensing dataeSAT Journals
Abstract
The current study highlights the advantages of remote sensing and Geographic Information System (GIS) in the field urban planning and management. IRS-P6 Resourcesat-1 LISS-IV high spatial resolution (5.8m) data with three spectral bands were used for urban classification. The study area Aurangabad is the capital metro city of Maharashtra State, India. ENVI 4.4 image processing tool was used for classification of satellite data on the basis of supervised approach. Two statistical algorithms were used for urban classification such as Minimum distance and Mahalanobis distance classifier. Lastly the accuracy of the classification was performed through ground truth. The result indicates that the Minimum distance classifier gives the better results than Mahalanobis classifier which are 80.2817% and 70.4225% respectively. Hence it is identified minimum distance is best for urban classification.
Keywords: Supervised classification, Multispectral, Confusion matrix, Producer’s accuracy, Users accuracy.
High speed multiplier using vedic mathematicseSAT Journals
Abstract
The digital signal processing in today’s time need high speed computation. The basic building block of signal processing in
Communication, Biomedical signal processing, and Image processing remains Fast Fourier Transform (FFT). FFT computation
involves multiplications and additions. Speed of the DSP processor mainly depends on the speed of the multiplier. Time delay, power
dissipation and the silicon chip area. These are the most important parameters for the fast growing technology. The conventional
multiplication method requires more time and area and hence more power dissipation. In this paper an ancient Vedic multiplication
method called “Urdhva Triyakbhyam” is implemented. It is a method based on 16 sutras of Vedic mathematics. Vedic Mathematics
reduces the number of operations to be carried out compared to the conventional method. The code description is simulated and
synthesized using FPGA device Spartan XC3S400-PQ208.
Keywords— Vedic Multiplication, Urdhva Tiryakbhayam , FFT
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.
The problem of electric power quality is a matter of changing the form of voltage, current or frequency that can cause failure of equipment, either utility equipment or consumer property. Components of household equipment there are many nonlinear loads, one of which Mixer. Even a load nonlinear current waveform and voltage is not sinusoidal. Due to the use of household appliances such as mixers, it will cause harmonics problems that can damage the electrical system equipment. This study analyzes the percentage value of harmonics in Mixer and reduces harmonics according to standard. Measurements made before the use of LC passive filter yield total current harmonic distortion value (THDi) is 61.48%, while after passive filter use LC the THDi percentage becomes 23.75%. The order of harmonic current in the 3rd order mixer (IHDi) is 0.4185 A not according to standard, after the use of LC passive filter to 0.088 A and it is in accordance with the desired standard, and with the use of passive filter LC, the power factor value becomes better than 0.75 to 0.98.
This paper examines the long-term simultaneous response between dividend policy and corporate value. The main problem studied is that the dividend policy is responded very slowly to the final goal of corporate value. Analysis of Data was using Vector Autoregression (VAR). The result of the discussion concludes the effect of different simultaneous response every period between dividend policy with corporate value, short-term, medium-term, and long-term. The strongest response to dividend changes comes from free cash flow whereas the highest response to corporate value comes from market book value.
Whatsapp is a social media application that is currently widely used from various circles due to ease of use and security is good enough, the security at the time of communicating at this time is very important as well with Whatsapp. Whatsapp from the network is very secure but on the local storage that contains the message was not safe enough because the message on local storage is not secured properly using a special algorithm even using the software Whatsapp Database Viewer whatsapp message can be known, to improve the security of messages on local storage whatsapp submitted security enhancements using the Modular Multiplication Block Cipher algorithm so that the message on whatsapp would be better in terms of security and not easy to read by unauthorized ones.
Consumers are increasingly easy to access to information resources. Consumers quickly interact with whatever they will spend. Ease of use of technology an impact on consumer an attitude are increasingly intelligent and has encouraged the rise of digital transactions. Technology makes it easy for them to transact on an e-commerce shopping channel. Future e-commerce trends will lead to User Generated Content related to user behavior in Indonesia that tends to compare between shopping channels. The purpose of this study was to examine the direct and indirect effects of Perceived Ease of Use on Behavioral Intention to transact in which Perceived Usefulness is used as an intervening variable. The present study used the descriptive exploratory method with causal-predictive analysis. Determination method of research sample used purposive sampling. The enumerator team assists in the distribution of questionnaires. The results of the study found that the direct effect of perceived ease of use on behavioral intention to transact is smaller than that indirectly mediated by perceived usefulness variables.
Performance is a process of assessment of the algorithm. Speed and security is the performance to be achieved in determining which algorithm is better to use. In determining the optimum route, there are two algorithms that can be used for comparison. The Genetic and Primary algorithms are two very popular algorithms for determining the optimum route on the graph. Prim can minimize circuit to avoid connected loop. Prim will determine the best route based on active vertex. This algorithm is especially useful when applied in a minimum spanning tree case. Genetics works with probability properties. Genetics cannot determine which route has the maximum value. However, genetics can determine the overall optimum route based on appropriate parameters. Each algorithm can be used for the case of the shortest path, minimum spanning tree or traveling salesman problem. The Prim algorithm is superior to the speed of Genetics. The strength of the Genetic algorithm lies in the number of generations and population generated as well as the selection, crossover and mutation processes as the resultant support. The disadvantage of the Genetic algorithm is spending to much time to get the desired result. Overall, the Prim algorithm has better performance than Genetic especially for a large number of vertices.
Implementation of Decision Support System for various purposes now can facilitate policy makers to get the best alternative from a variety of predefined criteria, one of the methods used in the implementation of Decision Support System is VIKOR (Vise Kriterijumska Optimizacija I Kompromisno Resenje), VIKOR method in this research got the best results with an efficient and easily understood process computationally, it is expected that the results of this study facilitate various parties to develop a model any solutions.
Edge detection is one of the most frequent processes in digital image processing for various purposes, one of which is detecting road damage based on crack paths that can be checked using a Canny algorithm. This paper proposed a mobile application to detect cracks in the road and with customized threshold function in the requests to produce useful and accurate edge detection. The experimental results show that the use of threshold function in a canny algorithm can detect better damage in the road
The security and confidentiality of information becomes an important factor in communication, the use of cryptography can be a powerful way of securing the information, IDEA (International Data Encryption Algorithm) and WAKE (Word Auto Key Encryption) are some modern symmetric cryptography algorithms with encryption and decryption function are much faster than the asymmetric cryptographic algorithm, with the combination experiment IDEA and WAKE it probable to produce highly secret ciphertext and it hopes to take a very long time for cryptanalyst to decrypt the information without knowing the key of the encryption process.
Employees are the backbone of corporate activities and the giving of bonuses, job titles and allowances to employees to motivate the work of employees is very necessary, salesman on the company very much and to find the best salesman cannot be done manually and for that required the implementation of a system in this decision support system by applying the TOPSIS method, it is expected with the implementation of TOPSIS method the expected results of top management can be fulfilled.
English is a language that must be known all-digital era at this time where almost all information is in English, ranging from kindergarten to college learn English. elementary school is now also there are learning and to help introduce English is prototype application recogni-tion of common words in English and can be updated dynamically so that updates occur information to new words and sentences in Eng-lish to be introduced to students.
The selection of the best employees is one of the process of evaluating how well the performance of the employees is adjusted to the standards set by the company and usually done by top management such as General Manager or Director. In general, the selection of the best employees is still perform manually with many criteria and alternatives, and this usually make it difficult top managerial making decisions as well as the selection of the best employees periodically into a long and complicated process. Therefore, it is necessary to build a decision support system that can help facilitate the decision maker in determining the best choice based on standard criteria, faster, and more objective. In this research, the computational method of decision-making system used is Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). The criteria used in the selection of the best employees are: job responsibilities, work discipline, work quality, and behaviour. The final result of the global priority value of the best employee candidates is used as the best employee selection decision making tool by top management.
Rabin Karp algorithm is a search algorithm that searches for a substring pattern in a text using hashing. It is beneficial for matching words with many patterns. One of the practical applications of Rabin Karp's algorithm is in the detection of plagiarism. Michael O. Rabin and Richard M. Karp invented the algorithm. This algorithm performs string search by using a hash function. A hash function is the values that are compared between two documents to determine the level of similarity of the document. Rabin-Karp algorithm is not very good for single pattern text search. This algorithm is perfect for multiple pattern search. The Levenshtein algorithm can be used to replace the hash calculation on the Rabin-Karp algorithm. The hash calculation on Rabin-Karp only counts the number of hashes that have the same value in both documents. Using the Levenshtein algorithm, the calculation of the hash distance in both documents will result in better accuracy.
This document summarizes a research paper about violations of cybercrime and jurisdiction in Indonesia. It discusses how technological advances have enabled new forms of digital crime. It describes several types of cybercrimes such as unauthorized access, spreading viruses, hacking, and cyberterrorism. It also discusses Indonesia's laws regarding electronic information and cybercrime. The document analyzes some challenges around jurisdiction for cybercrimes that cross borders. It examines how Indonesia applies legal jurisdiction and sanctions to cybercrime perpetrators based on the location of the crime and perpetrator. It aims to explain how Indonesia's legal system will handle cybercrime cases and reduce such violations.
Competitive market competition so the company must be smart in managing finance. In promoting the selling point, marketing is the most important step to be considered. Promotional routine activity is one of the marketing techniques to increase consumer appeal to marketed products. One of the important agendas of promotion is the selection of the most appropriate promotional media. The problem that often occurs in the process of selecting a promotional media is the subjectivity of decision making. Marketing activities have a taxation fund that must be issued. Limited funds are one of the constraints of improving market strategy. So far, the selection of promotional media is performed by the company manually using standardized determination that already applies. It has many shortcomings, among others, regarding effectiveness and efficiency of time and limited funds. Markov Chain is very helpful to the company in analyzing the development of the company over a period. This method can predict the market share in the future so that company can optimize promotion cost at the certain time. Implementation of this algorithm produces a percentage of market share so that businesses can determine and choose which way is more appropriate to improve the company's market strategy. Assessment is done by looking at consumer criteria of a particular product. These criteria can determine consumer interest in a product so that it can be analyzed consumer behavior.
The transition of copper cable technology to fiber optic is very triggering the development of technology where data can be transmitted quickly and accurately. This cable change can be seen everywhere. This cable is an expensive cable. If it is not installed optimally, it will cost enormously. This excess cost can be used to other things to support performance rather than for excess cable that should be minimized. Determining how much cable use at the time of installation is difficult if done manually. Prim's algorithm can optimize by calculating the minimum spanning tree on branches used for fiber optic cable installation. This algorithm can be used to shorten the time to a destination by making all the points interconnected according to the points listed. Use of this method helps save the cost of fiber optic construction.
An image is a medium for conveying information. The information contained therein may be a particular event, experience or moment. Not infrequently many images that have similarities. However, this level of similarity is not easily detected by the human eye. Eigenface is one technique to calculate the resemblance of an object. This technique calculates based on the intensity of the colors that exist in the two images compared. The stages used are normalization, eigenface, training, and testing. Eigenface is used to calculate pixel proximity between images. This calculation yields the feature value used for comparison. The smallest value of the feature value is an image very close to the original image. Application of this method is very helpful for analysts to predict the likeness of digital images. Also, it can be used in the field of steganography, digital forensic, face recognition and so forth.
The document discusses data compression using Elias Delta coding. It begins by introducing compression and its purpose of reducing file sizes. It then explains Elias Delta coding which is a lossless compression technique that encodes characters based on their frequency. The more common characters have fewer bits assigned while less common characters have more bits. It provides an example of how Elias Delta coding works by assigning bit sequences to numbers. The document then applies Elias Delta coding to compress a sample text, showing the original string, character set formation, bit lengths, and compressed output which achieved a smaller size than the original text.
Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
Catfish is one type of freshwater fish. This fish has a good taste. In the cultivation of these fish, many obstacles need to be faced. Because living in dirty water, this type of fish is susceptible to disease. Many symptoms arise during the fish cultivation process; From skin disease to physical. Catfish farmers do not know how to diagnose diseases that exist in their livestock. This diagnosis serves to separate places between good and sick catfish. The goal is that the sale value of the fish is high. Catfish that have diseases will be sold cheaper to be used as other animal feed while healthy fish will be sold to the market or exported to other countries. Diagnosis can be done by expert system method. The algorithm of certainty factor is one of the good algorithms to determine the percentage of possible fish disease. This algorithm is very helpful for farmers to improve catfish farming.
The security and speed of data transmission is very important in data communications, the steps that can be done is to use the appropriate cryptographic and compression algorithms in this case is the Data Encryption Standard and Lempel-Ziv-Welch algorithms combined to get the data safe and also the results good compression so that the transmission process can run properly, safely and quickly.
The problem of electric power quality is a matter of changing the form of voltage, current or frequency that can cause failure of equipment, either utility equipment or consumer property. Components of household equipment there are many nonlinear loads, one of which Mixer. Even a load nonlinear current waveform and voltage is not sinusoidal. Due to the use of household appliances such as mixers, it will cause harmonics problems that can damage the electrical system equipment. This study analyzes the percentage value of harmonics in Mixer and reduces harmonics according to standard. Measurements made before the use of LC passive filter yield total current harmonic distortion value (THDi) is 61.48%, while after passive filter use LC the THDi percentage becomes 23.75%. The order of harmonic current in the 3rd order mixer (IHDi) is 0.4185 A not according to standard, after the use of LC passive filter to 0.088 A and it is in accordance with the desired standard, and with the use of passive filter LC, the power factor value becomes better than 0.75 to 0.98.
This paper examines the long-term simultaneous response between dividend policy and corporate value. The main problem studied is that the dividend policy is responded very slowly to the final goal of corporate value. Analysis of Data was using Vector Autoregression (VAR). The result of the discussion concludes the effect of different simultaneous response every period between dividend policy with corporate value, short-term, medium-term, and long-term. The strongest response to dividend changes comes from free cash flow whereas the highest response to corporate value comes from market book value.
Whatsapp is a social media application that is currently widely used from various circles due to ease of use and security is good enough, the security at the time of communicating at this time is very important as well with Whatsapp. Whatsapp from the network is very secure but on the local storage that contains the message was not safe enough because the message on local storage is not secured properly using a special algorithm even using the software Whatsapp Database Viewer whatsapp message can be known, to improve the security of messages on local storage whatsapp submitted security enhancements using the Modular Multiplication Block Cipher algorithm so that the message on whatsapp would be better in terms of security and not easy to read by unauthorized ones.
Consumers are increasingly easy to access to information resources. Consumers quickly interact with whatever they will spend. Ease of use of technology an impact on consumer an attitude are increasingly intelligent and has encouraged the rise of digital transactions. Technology makes it easy for them to transact on an e-commerce shopping channel. Future e-commerce trends will lead to User Generated Content related to user behavior in Indonesia that tends to compare between shopping channels. The purpose of this study was to examine the direct and indirect effects of Perceived Ease of Use on Behavioral Intention to transact in which Perceived Usefulness is used as an intervening variable. The present study used the descriptive exploratory method with causal-predictive analysis. Determination method of research sample used purposive sampling. The enumerator team assists in the distribution of questionnaires. The results of the study found that the direct effect of perceived ease of use on behavioral intention to transact is smaller than that indirectly mediated by perceived usefulness variables.
Performance is a process of assessment of the algorithm. Speed and security is the performance to be achieved in determining which algorithm is better to use. In determining the optimum route, there are two algorithms that can be used for comparison. The Genetic and Primary algorithms are two very popular algorithms for determining the optimum route on the graph. Prim can minimize circuit to avoid connected loop. Prim will determine the best route based on active vertex. This algorithm is especially useful when applied in a minimum spanning tree case. Genetics works with probability properties. Genetics cannot determine which route has the maximum value. However, genetics can determine the overall optimum route based on appropriate parameters. Each algorithm can be used for the case of the shortest path, minimum spanning tree or traveling salesman problem. The Prim algorithm is superior to the speed of Genetics. The strength of the Genetic algorithm lies in the number of generations and population generated as well as the selection, crossover and mutation processes as the resultant support. The disadvantage of the Genetic algorithm is spending to much time to get the desired result. Overall, the Prim algorithm has better performance than Genetic especially for a large number of vertices.
Implementation of Decision Support System for various purposes now can facilitate policy makers to get the best alternative from a variety of predefined criteria, one of the methods used in the implementation of Decision Support System is VIKOR (Vise Kriterijumska Optimizacija I Kompromisno Resenje), VIKOR method in this research got the best results with an efficient and easily understood process computationally, it is expected that the results of this study facilitate various parties to develop a model any solutions.
Edge detection is one of the most frequent processes in digital image processing for various purposes, one of which is detecting road damage based on crack paths that can be checked using a Canny algorithm. This paper proposed a mobile application to detect cracks in the road and with customized threshold function in the requests to produce useful and accurate edge detection. The experimental results show that the use of threshold function in a canny algorithm can detect better damage in the road
The security and confidentiality of information becomes an important factor in communication, the use of cryptography can be a powerful way of securing the information, IDEA (International Data Encryption Algorithm) and WAKE (Word Auto Key Encryption) are some modern symmetric cryptography algorithms with encryption and decryption function are much faster than the asymmetric cryptographic algorithm, with the combination experiment IDEA and WAKE it probable to produce highly secret ciphertext and it hopes to take a very long time for cryptanalyst to decrypt the information without knowing the key of the encryption process.
Employees are the backbone of corporate activities and the giving of bonuses, job titles and allowances to employees to motivate the work of employees is very necessary, salesman on the company very much and to find the best salesman cannot be done manually and for that required the implementation of a system in this decision support system by applying the TOPSIS method, it is expected with the implementation of TOPSIS method the expected results of top management can be fulfilled.
English is a language that must be known all-digital era at this time where almost all information is in English, ranging from kindergarten to college learn English. elementary school is now also there are learning and to help introduce English is prototype application recogni-tion of common words in English and can be updated dynamically so that updates occur information to new words and sentences in Eng-lish to be introduced to students.
The selection of the best employees is one of the process of evaluating how well the performance of the employees is adjusted to the standards set by the company and usually done by top management such as General Manager or Director. In general, the selection of the best employees is still perform manually with many criteria and alternatives, and this usually make it difficult top managerial making decisions as well as the selection of the best employees periodically into a long and complicated process. Therefore, it is necessary to build a decision support system that can help facilitate the decision maker in determining the best choice based on standard criteria, faster, and more objective. In this research, the computational method of decision-making system used is Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS). The criteria used in the selection of the best employees are: job responsibilities, work discipline, work quality, and behaviour. The final result of the global priority value of the best employee candidates is used as the best employee selection decision making tool by top management.
Rabin Karp algorithm is a search algorithm that searches for a substring pattern in a text using hashing. It is beneficial for matching words with many patterns. One of the practical applications of Rabin Karp's algorithm is in the detection of plagiarism. Michael O. Rabin and Richard M. Karp invented the algorithm. This algorithm performs string search by using a hash function. A hash function is the values that are compared between two documents to determine the level of similarity of the document. Rabin-Karp algorithm is not very good for single pattern text search. This algorithm is perfect for multiple pattern search. The Levenshtein algorithm can be used to replace the hash calculation on the Rabin-Karp algorithm. The hash calculation on Rabin-Karp only counts the number of hashes that have the same value in both documents. Using the Levenshtein algorithm, the calculation of the hash distance in both documents will result in better accuracy.
This document summarizes a research paper about violations of cybercrime and jurisdiction in Indonesia. It discusses how technological advances have enabled new forms of digital crime. It describes several types of cybercrimes such as unauthorized access, spreading viruses, hacking, and cyberterrorism. It also discusses Indonesia's laws regarding electronic information and cybercrime. The document analyzes some challenges around jurisdiction for cybercrimes that cross borders. It examines how Indonesia applies legal jurisdiction and sanctions to cybercrime perpetrators based on the location of the crime and perpetrator. It aims to explain how Indonesia's legal system will handle cybercrime cases and reduce such violations.
Competitive market competition so the company must be smart in managing finance. In promoting the selling point, marketing is the most important step to be considered. Promotional routine activity is one of the marketing techniques to increase consumer appeal to marketed products. One of the important agendas of promotion is the selection of the most appropriate promotional media. The problem that often occurs in the process of selecting a promotional media is the subjectivity of decision making. Marketing activities have a taxation fund that must be issued. Limited funds are one of the constraints of improving market strategy. So far, the selection of promotional media is performed by the company manually using standardized determination that already applies. It has many shortcomings, among others, regarding effectiveness and efficiency of time and limited funds. Markov Chain is very helpful to the company in analyzing the development of the company over a period. This method can predict the market share in the future so that company can optimize promotion cost at the certain time. Implementation of this algorithm produces a percentage of market share so that businesses can determine and choose which way is more appropriate to improve the company's market strategy. Assessment is done by looking at consumer criteria of a particular product. These criteria can determine consumer interest in a product so that it can be analyzed consumer behavior.
The transition of copper cable technology to fiber optic is very triggering the development of technology where data can be transmitted quickly and accurately. This cable change can be seen everywhere. This cable is an expensive cable. If it is not installed optimally, it will cost enormously. This excess cost can be used to other things to support performance rather than for excess cable that should be minimized. Determining how much cable use at the time of installation is difficult if done manually. Prim's algorithm can optimize by calculating the minimum spanning tree on branches used for fiber optic cable installation. This algorithm can be used to shorten the time to a destination by making all the points interconnected according to the points listed. Use of this method helps save the cost of fiber optic construction.
An image is a medium for conveying information. The information contained therein may be a particular event, experience or moment. Not infrequently many images that have similarities. However, this level of similarity is not easily detected by the human eye. Eigenface is one technique to calculate the resemblance of an object. This technique calculates based on the intensity of the colors that exist in the two images compared. The stages used are normalization, eigenface, training, and testing. Eigenface is used to calculate pixel proximity between images. This calculation yields the feature value used for comparison. The smallest value of the feature value is an image very close to the original image. Application of this method is very helpful for analysts to predict the likeness of digital images. Also, it can be used in the field of steganography, digital forensic, face recognition and so forth.
The document discusses data compression using Elias Delta coding. It begins by introducing compression and its purpose of reducing file sizes. It then explains Elias Delta coding which is a lossless compression technique that encodes characters based on their frequency. The more common characters have fewer bits assigned while less common characters have more bits. It provides an example of how Elias Delta coding works by assigning bit sequences to numbers. The document then applies Elias Delta coding to compress a sample text, showing the original string, character set formation, bit lengths, and compressed output which achieved a smaller size than the original text.
Technological developments in computer networks increasingly demand security on systems built. Security also requires flexibility, efficiency, and effectiveness. The exchange of information through the internet connection is a common thing to do now. However, this way can be able to trigger data theft or cyber crime which resulted in losses for both parties. Data theft rate is getting higher by using a wireless network. The wireless system does not have any signal restrictions that can be intercepted Filtering is used to restrict incoming access through the internet. It aims to avoid intruders or people who want to steal data. This is fatal if not anticipated. IP and MAC filtering is a way to protect wireless networks from being used and misused by just anyone. This technique is very useful for securing data on the computer if it joins the public network. By registering IP and MAC on a router, this will keep the information unused and stolen. This system is only a few computers that can be connected to a wireless hotspot by IP and MAC Address listed.
Catfish is one type of freshwater fish. This fish has a good taste. In the cultivation of these fish, many obstacles need to be faced. Because living in dirty water, this type of fish is susceptible to disease. Many symptoms arise during the fish cultivation process; From skin disease to physical. Catfish farmers do not know how to diagnose diseases that exist in their livestock. This diagnosis serves to separate places between good and sick catfish. The goal is that the sale value of the fish is high. Catfish that have diseases will be sold cheaper to be used as other animal feed while healthy fish will be sold to the market or exported to other countries. Diagnosis can be done by expert system method. The algorithm of certainty factor is one of the good algorithms to determine the percentage of possible fish disease. This algorithm is very helpful for farmers to improve catfish farming.
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
Haversine Method in Looking for the Nearest Masjid
1. DOI: 10.23883/IJRTER.2017.3402.PD61H 187
Haversine Method in Looking for the Nearest Masjid
Subhan Hartanto1
, Mhd. Furqan2
, Andysah Putera Utama Siahaan3
, Wirda Fitriani4
1,3,4
Faculty of Computer Science, Universitas Pembangunan Panca Budi, Medan, Indonesia
2
Department of Computer Science, UIN Sumatera Utara, Medan, Indonesia
3
Ph.D. Student of School of Computer and Communication Engineering,
Universiti Malaysia Perlis, Kangar, Malaysia
Abstract — Determination of the nearest distance is often a problem to get to somewhere. This
happens when Muslims want to find masjid when they want to worship. As the time of worship is
nearing its end, they are very confused to find the nearest masjid from their location. In manual
calculations, this is very difficult to do where several masjids become an option. The Haversine method
is an excellent method for finding the nearest place based on the coordinates of the earth. This method
will calculate the distance with the Euclidean distance algorithm based on the latitude and longitude
of the earth. These values are obtained by using Google Maps. On Google Maps, certain points have
specific longitude and latitude. It is very helpful in determining the points of the masjid's location. This
study performs these calculations to get the closest distance from the search. It is done based on a
straight line between the user's position and the target. The weakness of this algorithm, it can not know
the obstacles that exist into the nearest masjid. This algorithm only calculates the distance based on a
straight line. However, it is helpful for people to find the nearest masjid from their position.
Keywords — Shortest Path, Haversine, Masjid
I. INTRODUCTION
One of the requirements for Muslims in each region including the village is the masjid as a place of
worship [4]. Each city has some masjids in different locations. The number of adherents of Islam will
increase along with the coming of converts from various directions. The various locations and positions
of the masjid cause the confused people to have to choose in the masjid where he will perform the
worship, even more, the people do not know exactly the location of the masjid is located. It confuses
Muslims, especially the immigrants when looking for masjid to worship by the closest location where
the community is located. Each masjid will have a specific location and information, especially in
information at the time of Ramadhan and Syawal. The information held by each masjid will always be
different. From these differences, the density of activity and the lack of information about the masjid
became a factor for the election of Muslims, especially Muslim immigrants to worship. The rapidly
developing technology should be able to assist Muslims in solving the problem. The closest route is
always used regarding time optimization [1][2][7]. Location Based Service is a Google Maps service
to provide information based on where the user is located and the route where the desired location,
while the Haversine Formula to calculate the distance and find the closest distance between the user
application and the intended masjid. Expected after getting information and location, the number of
Muslims who come to the masjid will always increase day by day.
II. THEORIES
2.1 Masjid
Masjid ()مسجد is a place used for prostration. Then the meaning extends into a special building that is
used as a place for gathering people to pray in congregation. Az-Zarkasyi said, "When prostration is
the noblest deed in prayer, because of the proximity of God's servants to Him in prostration, the place
2. International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 08; August - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 188
of prayer is taken from the word prostration (masjad = place of prostration). They do not call it مركع
or anything else. Then the sound of "masjad" changed into a masjid, which in term means a special
building provided for the five-time prayers. In contrast to places used for 'Id prayers or the like (i.e.
Istisqa') called ''المصلى (musholla = Islamic Prayer Room). The laws for the masjid can not be applied
to the musholla [4].
2.2 Google Maps
Google Maps is a free map provided by Google companies that can be accessed through the site
http://maps.google.com. Geographic information and city planning can be viewed in detail when the
map opens. This service has an interactive interface. Map position can be shifted and enlarged as
desired. Moreover now Google Maps already has Street View. It is a virtual reality for the streets of
this earth. Also, Google Maps also offers maps that are twisted around the world, and offer travel
routes.
Figure 1. Google Maps
In Figure 1, this is an example snippet of Google Maps. Google Maps at this time already has location
sharing feature. It aims to see the locations of friends who have been registered. By enabling location
sharing, one can monitor other user activity for 24 hours. Another function of this facility is to provide
an interconnected family. It is to prevent things that are not desirable.
2.3 Haversine
The Haversine theorem is used to calculate the lengths of two points on the surface of the earth based
on latitude and longitude. Four variables must be prepared to calculate the two distances. The
Haversine formula is an important equation of navigation, providing a large circular spacing between
two points on the surface of the sphere based on longitude and latitude [5][6]. It is a method of knowing
the distance between two points by taking into account that the earth is not a plane but is a plane of a
degree of curvature and has a radius of 6,367.45 km.
3. International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 08; August - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 189
Figure 2. Spherical triangle solved by the law of haversines
Figure 2 describes how the Haversine method works. The working of this algorithm is to establish a
direct distance between points that can be stretched in a triangular form where a, b, and c are the
distances to be calculated. The following formulas are the way to perform Haversine algorithm:
Where:
hav : haversine function:
d : distance between the two points (along a great circle of the sphere; see spherical
distance),
r : radius of the sphere,
φ1, φ2 : latitude of point 1 and latitude of point 2, in radians
λ1, λ2 : longitude of point 1 and longitude of point 2, in radians
On the left side of the equals sign d/r is the central angle, assuming angles are measured in radians
(note that φ and λ; can be converted from radians to degrees by multiplying by 180/π as usual) [3].
Solve for d by applying the inverse haversine (if available) or by using the arcsine (inverse sine)
function:
Below is a Delphi program to find the value of Haversine:
program Haversine;
uses Math;
function HaversineDist(th1, ph1, th2, ph2:double):double;
const diameter = 2 * 6372.8;
var dx, dy, dz:double;
begin
ph1 := degtorad(ph1 - ph2);
th1 := degtorad(th1);
th2 := degtorad(th2);
4. International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 08; August - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 190
dz := sin(th1) - sin(th2);
dx := cos(ph1) * cos(th1) - cos(th2);
dy := sin(ph1) * cos(th1);
Result := arcsin(sqrt(sqr(dx) + sqr(dy) + sqr(dz)) / 2) * diameter;
end;
begin
Writeln('Haversine distance: ', HaversineDist(36.12, -86.67, 33.94, -118.4):7:2, ' km.');
end.
III. METHODOLOGY
3.1 Masjid Location
In this study, the city of Medan is taken as a test of the existence of the masjid. The author provides
five addresses of masjids that have different locations. The following table is the longitude and latitude
data of the masjids.
Table 1. Masjid location
No. Name Lattitude Longitude
1 Masjid Agung 3,581252 98,671986
2 Masjid Raya 3,575129 98,687373
3 Masjid Al-Jihad 3,577360 98,658837
4
Masjid Aceh
Sepakat
3,585226 98,662039
5 Masjid Al-Ikhlas 3,595719 98,680790
IV. EVALUATION
In this test, the author puts the position of someone who is in Lattitude = 3.5814159 and Longitude =
98.6602269. The calculations below will show which of the five masjids is the highest priority.
Masjid Agung
SLa = 3.5814159
SLo = 98.6602269
TLa = 3.581252
TLo = 98.671986
Sin SLa = Sin 3.5814159
= 0.062466803
Sin TLa = Sin 3.581252
= 0.062463948
SS = Sin SLa * Sin TLa
= 0.062466803 * 0.062463948
= 0.003901923
Cos SLa = Cos 3.5814159
= 0.998047042
5. International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 08; August - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 191
Cos TLa = Cos 3.581252
= 0.998047221
CC = Cos SLa * Cos TLa
= 0.998047042 * 0.998047221
= 0.996098077
CC2 = Cos (TLo - SLo)
= Cos (98.671986 - 98.6602269)
= 0.999999979
ACos = ACOS (SS + (CC * CC2))
= 0.000204854
D = Acos * R
= 0.000204854 * 6,367.45
= 1.304398806 Km
Masjid Raya
SLa = 3.5814159
SLo = 98.6602269
TLa = 3.575129
TLo = 98.687373
Sin SLa = Sin 3.5814159
= 0.062466803
Sin TLa = Sin 3.575129
= 0.062357289
SS = Sin SLa * Sin TLa
= 0.062466803 * 0.062357289
= 0.00389526
Cos SLa = Cos 3.5814159
= 0.998047042
Cos TLa = Cos 3.575129
= 0,998053891
CC = Cos SLa * Cos TLa
= 0.998047042 * 0,998053891
= 0.996104733
CC2 = Cos (TLo - SLo)
= Cos (98.6602269 - 98.687373)
= 0.999999888
ACos = ACOS (SS + (CC * CC2))
6. International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 08; August - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 192
= 0.000485429
D = Acos * R
= 0.000485429 * 6,367.45
= 3.09094607 Km
Masjid Al-Jihad
SLa = 3.5814159
SLo = 98.6602269
TLa = 3.577360
TLo = 98.658837
Sin SLa = Sin 3.5814159
= 0.062466803
Sin TLa = Sin 3.577360
= 0.062396152
SS = Sin SLa * Sin TLa
= 0.062466803 * 0.062396152
= 0.003897688
Cos SLa = Cos 3.5814159
= 0.998047042
Cos TLa = Cos 3.577360
= 0.998051462
CC = Cos SLa * Cos TLa
= 0.998047042 * 0.998051462
= 0.996102309
CC2 = Cos (TLo - SLo)
= Cos (98,658837 - 98.6602269)
= 1
ACos = ACOS (SS + (CC * CC2))
= 0.0000748146
D = Acos * R
= 0.0000748146 * 6,367.45
= 0,476378389 Km
Masjid Aceh Sepakat
SLa = 3.5814159
SLo = 98.6602269
TLa = 3.585226
TLo = 98.662039
7. International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 08; August - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 193
Sin SLa = Sin 3.5814159
= 0.062466803
Sin TLa = Sin 3.585226
= 0.062533171
SS = Sin SLa * Sin TLa
= 0.062466803 * 0.062533171
= 0.003906247
Cos SLa = Cos 3.5814159
= 0.998047042
Cos TLa = Cos 3.585226
= 0.998042886
CC = Cos SLa * Cos TLa
= 0.998047042 * 0.998042886
= 0.996093751
CC2 = Cos (TLo - SLo)
= Cos (98.662039 - 98.6602269)
= 1
ACos = ACOS (SS + (CC * CC2))
= 0.0000736102
D = Acos * R
= 0.0000736102 * 6,367.45
= 0,468709024 Km
Masjid Al-Ikhlas
SLa = 3.5814159
SLo = 98.6602269
TLa = 3.595719
TLo = 98.680790
Sin SLa = Sin 3.5814159
= 0.062466803
Sin TLa = Sin 3.595719
= 0.062715949
SS = Sin SLa * Sin TLa
= 0.062466803 * 0.062715949
= 0.003917665
8. International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 08; August - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 194
Cos SLa = Cos 3.5814159
= 0.998047042
Cos TLa = Cos 3.595719
= 0.998031417
CC = Cos SLa * Cos TLa
= 0.998047042 * 0.998031417
= 0.996082304
CC2 = Cos (TLo - SLo)
= Cos (98.680790 - 98.6602269)
= 1
ACos = ACOS (SS + (CC * CC2))
= 0.000436599
D = Acos * R
= 0.000436599 * 6,367.45
= 2.780019987 Km
Table 2. Haversine result
No. Name Distance (km)
1 Masjid Agung 1,304398806
2 Masjid Raya 3,09094607
3 Masjid Al-Jihad 0,476378389
4
Masjid Aceh
Sepakat 0,468709024
5 Masjid Al-Ikhlas 2,780019987
Table 2 is the Haversine calculation result. It explains that the Masjid of Aceh Sepakat is the closest to
the user's position. So the first goal of the congregation can be directed to the masjid.
V. CONCLUSION
The application of the Haversine method is very well applied to gadgets since the Google Maps service,
especially on smartphones. Once this app is on their gadget, a Haversine search is useful for locating
nearby masjids, especially when Muslims are almost out of prayer time. The congregation can decide
which masjid they will go to. This method will determine which masjid is closest to them. However,
the weakness of this system, Haversine's method never knows the obstacles in pursuing the goal. It is
best if the method is combined with a database that records the location state of a place so that the
search will be optimal.
REFERENCES
[1] H. J. Cho and C. L. Lan, "Hybrid Shortest Path Algorithm For Vehicle Navigation," Journals Springer Science, vol.
10, no. 49, pp. 234-247, 2008.
[2] F. Lam and A. Newman, "Travelling Salesman Path Problems," Journal Math Program, vol. 10, no. 113, pp. 39-59,
2005.
[3] Wikipedia, "Haversine Formula," Wikipedia, [Online]. Available: https://en.wikipedia.org/wiki/Haversine_formula.
[Accessed 20 August 2017].
9. International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 08; August - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 195
[4] S. S. b. A. b. W. al-Qahthani, "Pengertian Masjid," Media Islam Salafiyyah, Ahlussunnah wal Jama'ah, 18 September
2009. [Online]. Available: https://almanhaj.or.id/2524-pengertian-masjid.html. [Accessed 20 August 2017].
[5] N. R.Chopde and M. K. Nichat, "Landmark Based Shortest Path Detection by Using A* and Haversine Formula,"
International Journal of Innovative Research in Computer and Communication Engineering, vol. 1, no. 2, pp. 298-
302, 2013.
[6] G. L. and V. K. B. P., "Indoor Wireless Localization using Haversine Formula," International Advanced Research
Journal in Science, Engineering and Technology, vol. 2, no. 7, pp. 59-63, 2015.
[7] A. P. U. Siahaan, "Adjustable Knapsack in Travelling Salesman Problem Using Genetic Process," International
Journal Of Science & Technoledge, vol. 4, no. 9, pp. 46-55, 2016.