The Government of the Republic of Indonesia is currently focusing on building logistics
infrastructure to facilitate the distribution of logistics to all regions in Indonesia. The Distribution of logistics
to each area requires an electronically connected warehouse so that information about goods in the
warehouse can be monitored continuously. There are some problems with one of the logistics companies
because the existing warehouse management technology is not sufficient enough, so the complex
warehouse functions do not become dynamic. One of the solutions to solve the problem need to use RFID
technology, conveyor belt, and robotic arm by using an Arduino microcontroller. This research uses Design
Science Research Methodology which focuses on developing and improving the model performance of a
system and using the prototyping model for system development. The test results state that the built
system works well because it could lift, identify and sort goods by type. So, this research could answer the
problem that happened at the warehouse.
Technology helps in allieviating the concerns of a distribution manager. One of the key concerns of the distribution manager includes the fate of a consignment after it has left the base. Some of the prominent technologies that can be used in logistics include Global Positioning System (GPS), Swipe Cards, Bar Codes, Radio Frequency Identification. Of these technologies RFID holds a great potential in transforming logistics management for Indian corporate.
RFID Assisted Supply Chain Management SystemSumeet Main
RFID Assisted Supply Chain Management System
The document discusses how Airbus implemented RFID technology across its global supply chain operations to improve visibility and tracking of parts and components. It implemented RFID in three phases, first tagging reusable shipping containers, then extending tracking of parts across manufacturing sites, and finally supporting in-service operations. Airbus benefited from reduced container usage, improved inventory management and tool tracking, and greater supply chain visibility. Challenges included high costs but RFID provided value by automating processes and enhancing supply chain efficiency for Airbus.
The document discusses how information and communication technologies (ICT) have impacted logistics and supply chains. It provides examples of common ICT tools like WMS, TMS, EDI, barcode scanning, GPS, and RFID and how they help with inventory management, transportation optimization, electronic data interchange, and real-time tracking of goods. The document also examines trends in e-commerce and the evolution of supply chain management approaches and players.
Secured e-payment system based on automated authentication data and iterated ...TELKOMNIKA JOURNAL
Electronic payment has been considered as one of the most significant and convenient applications of modern electronic services e-University compared to traditional methods that impose time-consuming, human resources, and inefficiency. Different automatic identification technologies have been widely used, such as radio frequency identification (RFID). Extensive research and several applications are focusing on taking the maximum advantage of RFID technology. Data and information security had considered a crucial role when information concerning e-commerce, e-banking, or e-payments, especially due to it required real data to establish accessed illegally. Hence, data originality and security fall a very significant and critical issue in data communication services in recent years. Applications such as e-banking or e-commerce regularly contain sensitive and personal information that should be managed and controlled by authorized persons. Thus, keeping a secure password is important to prevent unauthorized users from illegal access. The password hashing is one of the safety methods and means of preventing attacks. In this article, focuses on proposing an RFID based electronic payment and also provide multi-level security privileges for an academic domain by using RFID technology besides the programmable logic circuit as well the system used C# language in visual studio environment also desktop and web-based application for system working purposes. The proposed system aims to manage student payments in a secure manner and provides the capabilities of getting a bus ticket, copying books, buying food, paying registration fees, and other services. The results have shown the system is secured by using the confirmation code in addition to password encryption.
DESIGN AND IMPLEMENTATION OF A LIGHT FIDELITY BASED AUTOMATED SMART TROLLEY F...IRJET Journal
The document describes a proposed design and implementation of a light fidelity (Li-Fi) based automated smart trolley for shopping using radio frequency identification (RFID) technology. The smart trolley would detect products placed in it using RFID tags and readers, measure and display item information like price and weight on a LCD screen, and compute the total cost. It would transmit item details to a cashier's computer within 6 meters using Li-Fi to enable payment and checkout. The goal is to streamline the shopping experience by reducing queues and time spent at checkout.
Supply Chain Management using Internet of ThingsIRJET Journal
This document discusses using the Internet of Things (IoT) for supply chain management. It proposes a system with three modules: a supplier, container, and distributor. The supplier provides products to customers using the container and distributor. IoT is used to synchronize the supplier and distributor. The container carries products and tracks their location using GPS. When it reaches the distributor, a password is used to access the products. RFID tags identify each product. The goals are to satisfy customers, increase sales, provide better service, and enhance visibility of product delivery across the supply chain.
Applying internet of things on the maritime sectorsally sanhory
The document discusses applying Internet of Things (IOT) technologies in the maritime sector. It outlines several IOT technologies that could be used in ports, including sensors, RFID, machine-to-machine communication, and vehicle terminals. The document also discusses benefits of IOT for maritime operations like improved efficiency, sustainability, and customer service. Challenges to IOT adoption like costs, data privacy, and lack of expertise
Technology helps in allieviating the concerns of a distribution manager. One of the key concerns of the distribution manager includes the fate of a consignment after it has left the base. Some of the prominent technologies that can be used in logistics include Global Positioning System (GPS), Swipe Cards, Bar Codes, Radio Frequency Identification. Of these technologies RFID holds a great potential in transforming logistics management for Indian corporate.
RFID Assisted Supply Chain Management SystemSumeet Main
RFID Assisted Supply Chain Management System
The document discusses how Airbus implemented RFID technology across its global supply chain operations to improve visibility and tracking of parts and components. It implemented RFID in three phases, first tagging reusable shipping containers, then extending tracking of parts across manufacturing sites, and finally supporting in-service operations. Airbus benefited from reduced container usage, improved inventory management and tool tracking, and greater supply chain visibility. Challenges included high costs but RFID provided value by automating processes and enhancing supply chain efficiency for Airbus.
The document discusses how information and communication technologies (ICT) have impacted logistics and supply chains. It provides examples of common ICT tools like WMS, TMS, EDI, barcode scanning, GPS, and RFID and how they help with inventory management, transportation optimization, electronic data interchange, and real-time tracking of goods. The document also examines trends in e-commerce and the evolution of supply chain management approaches and players.
Secured e-payment system based on automated authentication data and iterated ...TELKOMNIKA JOURNAL
Electronic payment has been considered as one of the most significant and convenient applications of modern electronic services e-University compared to traditional methods that impose time-consuming, human resources, and inefficiency. Different automatic identification technologies have been widely used, such as radio frequency identification (RFID). Extensive research and several applications are focusing on taking the maximum advantage of RFID technology. Data and information security had considered a crucial role when information concerning e-commerce, e-banking, or e-payments, especially due to it required real data to establish accessed illegally. Hence, data originality and security fall a very significant and critical issue in data communication services in recent years. Applications such as e-banking or e-commerce regularly contain sensitive and personal information that should be managed and controlled by authorized persons. Thus, keeping a secure password is important to prevent unauthorized users from illegal access. The password hashing is one of the safety methods and means of preventing attacks. In this article, focuses on proposing an RFID based electronic payment and also provide multi-level security privileges for an academic domain by using RFID technology besides the programmable logic circuit as well the system used C# language in visual studio environment also desktop and web-based application for system working purposes. The proposed system aims to manage student payments in a secure manner and provides the capabilities of getting a bus ticket, copying books, buying food, paying registration fees, and other services. The results have shown the system is secured by using the confirmation code in addition to password encryption.
DESIGN AND IMPLEMENTATION OF A LIGHT FIDELITY BASED AUTOMATED SMART TROLLEY F...IRJET Journal
The document describes a proposed design and implementation of a light fidelity (Li-Fi) based automated smart trolley for shopping using radio frequency identification (RFID) technology. The smart trolley would detect products placed in it using RFID tags and readers, measure and display item information like price and weight on a LCD screen, and compute the total cost. It would transmit item details to a cashier's computer within 6 meters using Li-Fi to enable payment and checkout. The goal is to streamline the shopping experience by reducing queues and time spent at checkout.
Supply Chain Management using Internet of ThingsIRJET Journal
This document discusses using the Internet of Things (IoT) for supply chain management. It proposes a system with three modules: a supplier, container, and distributor. The supplier provides products to customers using the container and distributor. IoT is used to synchronize the supplier and distributor. The container carries products and tracks their location using GPS. When it reaches the distributor, a password is used to access the products. RFID tags identify each product. The goals are to satisfy customers, increase sales, provide better service, and enhance visibility of product delivery across the supply chain.
Applying internet of things on the maritime sectorsally sanhory
The document discusses applying Internet of Things (IOT) technologies in the maritime sector. It outlines several IOT technologies that could be used in ports, including sensors, RFID, machine-to-machine communication, and vehicle terminals. The document also discusses benefits of IOT for maritime operations like improved efficiency, sustainability, and customer service. Challenges to IOT adoption like costs, data privacy, and lack of expertise
This document describes a proposed smart shopping cart system that uses RFID technology. The system aims to streamline the shopping and checkout process. RFID tags would be attached to all products in the store. As shoppers add items to their cart, an RFID reader in the cart would automatically detect and record the products. When the cart reaches the checkout area, the items and their details would be transmitted to the cash register via LIFI and the bill would be automatically generated for the customer. The document discusses the system components, including the microcontroller, RFID reader, LCD display, LIFI transmitter and receiver, and power supply. It also provides background on RFID technology and reviews several other existing smart shopping and RFID applications
Shopping and automatic billing using rfid technologyIAEME Publication
Nowadays, large grocery stores are used by millions of people for the acquisition of products.
Barcode scanners are a time consuming process engaging the customers to stick to the billing section
for a long time. Hence there is a need for an innovative product with the societal acceptance that aids
the convenience, comfort and efficiency in everyday life.
In this paper, an architecture is presented which blends Radio frequency identification
(RFID) and wireless technology to provide ‘on spot’ billing in super markets. It uses the RFID based
system application in the shopping trolley and the RFID card which is used as a security access for
the product. The Liquid crystal display (LCD) that is fixed to the trolley displays the product name,
cost and the total cost of all purchased products. The bill is transmitted to the server end through the
zigbee technology. The software simulation is done using Proteus software and hardware is
implemented using 18F46K22 microcontroller. This promotes quick shopping and immediate pay
without any queuing process. It reduces labour efforts and increases efficiency by minimizing errors
Shopping and automatic billing using rfid technologyIAEME Publication
This document summarizes a research paper on an automatic shopping and billing system using RFID technology. The system uses RFID tags on products and RFID readers in a shopping cart to automatically identify items placed in the cart. It displays the item names, prices and total on an LCD screen on the cart. When shopping is complete, the total bill information is transmitted wirelessly to a server using Zigbee technology. This allows for quick and easy shopping without queues for billing. The system aims to improve shopping efficiency and reduce errors by automating the billing process using RFID and wireless technologies.
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...AnthonyOtuonye
The document discusses developing an electronic bank deposit and withdrawal system using Quick Response (QR) code technology. It aims to reduce transaction times at bank tellers by having customers generate a QR code on their mobile device containing their account information. The teller can then quickly scan this code to validate the customer within seconds. This system is intended to reduce withdrawal/deposit transactions from 5-10 minutes currently to under 3 minutes. It will also allow customers to conduct multiple transactions with a single QR code, further speeding up the process. The system was developed using a prototyping methodology involving user surveys to gather requirements and ensure the system meets customer expectations for efficient banking services. Results showed the new QR code system provides improved operational efficiency and more
A combined fuzzy AHP with fuzzy TOPSIS to locate industrial supporting bonded...TELKOMNIKA JOURNAL
This document proposes using a combined fuzzy analytic hierarchy process (FAHP) and fuzzy technique for ordering preferences by similarity to ideal solution (FTOPSIS) to locate an industrial supporting bonded logistics center. It establishes criteria and sub-criteria for site selection through literature review and expert discussion. Fuzzy AHP is used to obtain weighted values of the criteria and sub-criteria. Fuzzy TOPSIS then assesses alternative sites based on the weights to determine the preferred option closest to the positive ideal. The method allows for imprecise inputs from experts and ranks four potential sites - MM2100, Jababeka, Greenland International Industrial Center, and Marunda Center - to identify the optimal location.
RFID Technology Adoption Rate in Warehousing A Study of Manufacturing Compani...ijtsrd
This document discusses a study on the adoption rate of RFID (radio frequency identification) technology in warehouses of manufacturing companies in Johor, Malaysia. The study aimed to identify criteria for deciding to adopt RFID, perceived benefits of adoption, and perceived barriers to adoption. Survey results showed that top criteria for adoption included company size, technical knowledge, investment costs and top management support. Key perceived benefits were improved inventory management and reduced warehouse operation costs. Major perceived barriers included high implementation costs, lack of awareness, and uncertainty about return on investment. The document provides background on RFID technology and its potential applications and benefits in supply chain management and warehousing operations.
RFID Technology Adoption Rate in Warehousing A Study of Manufacturing Compani...ijtsrd
This document discusses a study on the adoption rate of RFID (radio frequency identification) technology in warehouses of manufacturing companies in Johor, Malaysia. The study aimed to identify criteria for deciding to adopt RFID, perceived benefits of adoption, and perceived barriers to adoption. Survey data was collected from manufacturing companies and analyzed using descriptive statistics and correlation tests. The analysis found high acceptance of factors like company size, technical knowledge, investment costs and top management support as decision criteria. Key perceived benefits were improved inventory management and reduced warehouse operation costs. Major perceived barriers included high implementation costs and lack of awareness of RFID technology.
IRJET-Major Challenges in Adoption of RFID for Indian SME’sIRJET Journal
The document discusses major challenges in adopting radio frequency identification (RFID) technology for small and medium enterprises (SMEs) in India. It analyzes the current state of RFID usage through a survey and literature review. Using analytical hierarchy process, the study evaluates the key challenges that hinder RFID implementation in Indian industries. Standardization issues, security and privacy concerns, high costs, management commitment, technology support and selection of hardware and software are identified as major barriers. The document aims to identify research gaps in addressing challenges faced by developing countries like India in adopting this promising but still emerging technology.
The construction industry is an industry that is always surrounded by
uncertainties and risks. The industry is always associated with a threatindustry which has a complex, tedious layout and techniques characterized by
unpredictable circumstances. It comprises a variety of human talents and the
coordination of different areas and activities associated with it. In this
competitive era of the construction industry, delays and cost overruns of the
project are often common in every project and the causes of that are also
common. One of the problems which we are trying to cater to is the improper
handling of materials at the construction site. In this paper, we propose
developing a system that is capable of tracking construction material on site
that would benefit the contractor and client for better control over inventory
on-site and to minimize loss of material that occurs due to theft and misplacing
of materials.
IRJET- High Responsive Smart Parking System using IoTIRJET Journal
This document presents a proposed smart parking system using IoT. The system uses RFID sensors and a PIC microcontroller to detect vehicle occupancy of parking spaces in real-time. This information is sent to a cloud database. A mobile app allows drivers to check parking availability and book spaces. The system aims to address issues like inefficient parking, traffic congestion, and reduced fuel consumption by helping drivers find vacant spaces quickly. It provides real-time parking information and allows contactless payment of fees.
Advancements in Supply Chain Management Using IoTIRJET Journal
This document discusses how the Internet of Things (IoT) can enhance supply chain management. It first provides background on supply chain management and its challenges, including lack of visibility and unpredictability. It then describes how various IoT technologies like RFID, sensors, and cameras can increase supply chain visibility and monitoring of inventory. Finally, it outlines several specific applications of IoT in supply chain management, such as predictive maintenance, proactive replenishment, and authentication of goods locations. Overall, the document argues that IoT technologies can improve supply chain efficiency, responsiveness, and robustness by providing more real-time data visibility across the end-to-end supply chain process.
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...IRJET Journal
This document describes a proposed RFID-based student attendance system. The system uses RFID tags and readers to automatically track when students enter and exit classrooms. When a student's RFID tag is scanned at the door, the reader verifies their identity against a database and unlocks the door if valid. An IR sensor inside confirms entry or exit. This automated process aims to improve on manual attendance methods by eliminating errors and wasted time, while also providing administrators with real-time attendance data for grading and analysis. The proposed system architecture involves RFID tags, readers, a database, and IR sensors connected to a microcontroller. Several existing RFID attendance systems and their drawbacks are also reviewed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document is a project report on fundamentals of shipping information technology submitted to Tolani Institute of Management Studies. It discusses several topics including Ice Gate, Electronic Data Interchange, INTTRA, BOLERO, INMARSAT, and specialized export software systems. The report provides overviews of these different technologies and systems used in shipping and transportation to improve efficiency and information sharing.
The document is a project report on the fundamentals of shipping information technology. It discusses several topics:
- Ice Gate, an e-commerce portal for customs clearance filings and tracking shipments.
- Electronic Data Interchange (EDI), which allows automated data exchange between organizations to streamline operations.
- INTTRA, the world's largest multi-carrier shipping network that provides booking, management and analytics capabilities.
- BOLERO, an organization that provides a digital bill of lading and aims to digitize all shipping documents.
- INMARSAT, which provides mobile satellite communications for ships, and has developed computer solutions for vessels.
- Specialized export software
Overview of Supply Chain and Logistics Technology & Parcel SystemKunj Joshi 🎤
The document discusses the parcel industry and benefits of supply chain software for courier companies. It describes how parcel perfect software works to efficiently manage courier businesses through features like GPS tracking, automated invoicing, and end-to-end parcel tracking. The software provides tangible benefits like reduced costs and improved productivity as well as intangible benefits like increased visibility and profit analysis. Key documents discussed include waybills, manifestos, and proofs of delivery that are important for tracking shipments and processing payments.
This document provides an overview of information technology frameworks and communication systems used in supply chain management. It discusses four levels of supply chain information system functionality including transaction systems, management control, decision analysis, and strategic planning. It also describes various integrated modules like enterprise resource planning systems, communication applications, and planning and execution systems. Finally, it outlines several communication technologies used in logistics like bar coding, electronic data interchange, radio frequency identification, satellite systems, and image processing.
This document discusses materials tracking practices in construction projects and identifies problems with current manual practices. It also explores potential solutions using information and communication technologies (ICT) like radio frequency identification (RFID). Case studies of construction projects in Malaysia found that materials tracking is currently done manually, which is time-consuming, lacks up-to-date information, and is prone to errors. While basic ICT tools are used, emerging technologies like RFID have not been implemented for automatic materials tracking. The document concludes that construction projects should transition from manual to automated materials tracking using ICT to improve efficiency and information availability.
Software engineering based fault tolerance model for information system in pl...IJECEIAES
The rapid development of mobile phone technologies in recent years promoted them for being used in various areas of life, such as commercial, health, transportation and tourism and other uses. In this paper, a software engineering based fault tolerance model is proposed to manage the expected faults in the adopted servers. The underlying QR based information system in plants shopping center employs different local serves allocated at local shops that are connected to the main server. In a fault case detection at any local server, the main server can cover the management of the system until the maintenance is completed. This is performed in efficient way as the main server keeps a copy of the information for all local branches. It is important to note that the self-checking process is adopted for fault detection. After completing the maintenance, a copy of the updated information is sent back to the investigated local server including all sales, etc. Moreover, the main and local servers contain information about all offer’s plants in different languages and in text and image form, customer's information and admin's information. The proposed system is tested in several cases to prove the efficiency and effectivity in retrieving and managing information and data as well as the fault tolerance administration.
This document provides an introduction to logistics and discusses modern trends in the logistics industry. It defines logistics and explains that logistics is important for ensuring products reach customers in the right quantity, quality, and price. The key elements of logistics systems are described as transportation, warehousing, inventory, packaging, and information processing. Modern trends discussed include the use of RFID technology, supply chain analytics, and cloud computing. Logistics is identified as important for companies to excel in today's competitive market by efficiently delivering products to customers.
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
More Related Content
Similar to RFID-based conveyor belt for improve warehouse operations
This document describes a proposed smart shopping cart system that uses RFID technology. The system aims to streamline the shopping and checkout process. RFID tags would be attached to all products in the store. As shoppers add items to their cart, an RFID reader in the cart would automatically detect and record the products. When the cart reaches the checkout area, the items and their details would be transmitted to the cash register via LIFI and the bill would be automatically generated for the customer. The document discusses the system components, including the microcontroller, RFID reader, LCD display, LIFI transmitter and receiver, and power supply. It also provides background on RFID technology and reviews several other existing smart shopping and RFID applications
Shopping and automatic billing using rfid technologyIAEME Publication
Nowadays, large grocery stores are used by millions of people for the acquisition of products.
Barcode scanners are a time consuming process engaging the customers to stick to the billing section
for a long time. Hence there is a need for an innovative product with the societal acceptance that aids
the convenience, comfort and efficiency in everyday life.
In this paper, an architecture is presented which blends Radio frequency identification
(RFID) and wireless technology to provide ‘on spot’ billing in super markets. It uses the RFID based
system application in the shopping trolley and the RFID card which is used as a security access for
the product. The Liquid crystal display (LCD) that is fixed to the trolley displays the product name,
cost and the total cost of all purchased products. The bill is transmitted to the server end through the
zigbee technology. The software simulation is done using Proteus software and hardware is
implemented using 18F46K22 microcontroller. This promotes quick shopping and immediate pay
without any queuing process. It reduces labour efforts and increases efficiency by minimizing errors
Shopping and automatic billing using rfid technologyIAEME Publication
This document summarizes a research paper on an automatic shopping and billing system using RFID technology. The system uses RFID tags on products and RFID readers in a shopping cart to automatically identify items placed in the cart. It displays the item names, prices and total on an LCD screen on the cart. When shopping is complete, the total bill information is transmitted wirelessly to a server using Zigbee technology. This allows for quick and easy shopping without queues for billing. The system aims to improve shopping efficiency and reduce errors by automating the billing process using RFID and wireless technologies.
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...AnthonyOtuonye
The document discusses developing an electronic bank deposit and withdrawal system using Quick Response (QR) code technology. It aims to reduce transaction times at bank tellers by having customers generate a QR code on their mobile device containing their account information. The teller can then quickly scan this code to validate the customer within seconds. This system is intended to reduce withdrawal/deposit transactions from 5-10 minutes currently to under 3 minutes. It will also allow customers to conduct multiple transactions with a single QR code, further speeding up the process. The system was developed using a prototyping methodology involving user surveys to gather requirements and ensure the system meets customer expectations for efficient banking services. Results showed the new QR code system provides improved operational efficiency and more
A combined fuzzy AHP with fuzzy TOPSIS to locate industrial supporting bonded...TELKOMNIKA JOURNAL
This document proposes using a combined fuzzy analytic hierarchy process (FAHP) and fuzzy technique for ordering preferences by similarity to ideal solution (FTOPSIS) to locate an industrial supporting bonded logistics center. It establishes criteria and sub-criteria for site selection through literature review and expert discussion. Fuzzy AHP is used to obtain weighted values of the criteria and sub-criteria. Fuzzy TOPSIS then assesses alternative sites based on the weights to determine the preferred option closest to the positive ideal. The method allows for imprecise inputs from experts and ranks four potential sites - MM2100, Jababeka, Greenland International Industrial Center, and Marunda Center - to identify the optimal location.
RFID Technology Adoption Rate in Warehousing A Study of Manufacturing Compani...ijtsrd
This document discusses a study on the adoption rate of RFID (radio frequency identification) technology in warehouses of manufacturing companies in Johor, Malaysia. The study aimed to identify criteria for deciding to adopt RFID, perceived benefits of adoption, and perceived barriers to adoption. Survey results showed that top criteria for adoption included company size, technical knowledge, investment costs and top management support. Key perceived benefits were improved inventory management and reduced warehouse operation costs. Major perceived barriers included high implementation costs, lack of awareness, and uncertainty about return on investment. The document provides background on RFID technology and its potential applications and benefits in supply chain management and warehousing operations.
RFID Technology Adoption Rate in Warehousing A Study of Manufacturing Compani...ijtsrd
This document discusses a study on the adoption rate of RFID (radio frequency identification) technology in warehouses of manufacturing companies in Johor, Malaysia. The study aimed to identify criteria for deciding to adopt RFID, perceived benefits of adoption, and perceived barriers to adoption. Survey data was collected from manufacturing companies and analyzed using descriptive statistics and correlation tests. The analysis found high acceptance of factors like company size, technical knowledge, investment costs and top management support as decision criteria. Key perceived benefits were improved inventory management and reduced warehouse operation costs. Major perceived barriers included high implementation costs and lack of awareness of RFID technology.
IRJET-Major Challenges in Adoption of RFID for Indian SME’sIRJET Journal
The document discusses major challenges in adopting radio frequency identification (RFID) technology for small and medium enterprises (SMEs) in India. It analyzes the current state of RFID usage through a survey and literature review. Using analytical hierarchy process, the study evaluates the key challenges that hinder RFID implementation in Indian industries. Standardization issues, security and privacy concerns, high costs, management commitment, technology support and selection of hardware and software are identified as major barriers. The document aims to identify research gaps in addressing challenges faced by developing countries like India in adopting this promising but still emerging technology.
The construction industry is an industry that is always surrounded by
uncertainties and risks. The industry is always associated with a threatindustry which has a complex, tedious layout and techniques characterized by
unpredictable circumstances. It comprises a variety of human talents and the
coordination of different areas and activities associated with it. In this
competitive era of the construction industry, delays and cost overruns of the
project are often common in every project and the causes of that are also
common. One of the problems which we are trying to cater to is the improper
handling of materials at the construction site. In this paper, we propose
developing a system that is capable of tracking construction material on site
that would benefit the contractor and client for better control over inventory
on-site and to minimize loss of material that occurs due to theft and misplacing
of materials.
IRJET- High Responsive Smart Parking System using IoTIRJET Journal
This document presents a proposed smart parking system using IoT. The system uses RFID sensors and a PIC microcontroller to detect vehicle occupancy of parking spaces in real-time. This information is sent to a cloud database. A mobile app allows drivers to check parking availability and book spaces. The system aims to address issues like inefficient parking, traffic congestion, and reduced fuel consumption by helping drivers find vacant spaces quickly. It provides real-time parking information and allows contactless payment of fees.
Advancements in Supply Chain Management Using IoTIRJET Journal
This document discusses how the Internet of Things (IoT) can enhance supply chain management. It first provides background on supply chain management and its challenges, including lack of visibility and unpredictability. It then describes how various IoT technologies like RFID, sensors, and cameras can increase supply chain visibility and monitoring of inventory. Finally, it outlines several specific applications of IoT in supply chain management, such as predictive maintenance, proactive replenishment, and authentication of goods locations. Overall, the document argues that IoT technologies can improve supply chain efficiency, responsiveness, and robustness by providing more real-time data visibility across the end-to-end supply chain process.
IRJET- Improvisation in the Attendance Supervision Method through RFID ba...IRJET Journal
This document describes a proposed RFID-based student attendance system. The system uses RFID tags and readers to automatically track when students enter and exit classrooms. When a student's RFID tag is scanned at the door, the reader verifies their identity against a database and unlocks the door if valid. An IR sensor inside confirms entry or exit. This automated process aims to improve on manual attendance methods by eliminating errors and wasted time, while also providing administrators with real-time attendance data for grading and analysis. The proposed system architecture involves RFID tags, readers, a database, and IR sensors connected to a microcontroller. Several existing RFID attendance systems and their drawbacks are also reviewed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document is a project report on fundamentals of shipping information technology submitted to Tolani Institute of Management Studies. It discusses several topics including Ice Gate, Electronic Data Interchange, INTTRA, BOLERO, INMARSAT, and specialized export software systems. The report provides overviews of these different technologies and systems used in shipping and transportation to improve efficiency and information sharing.
The document is a project report on the fundamentals of shipping information technology. It discusses several topics:
- Ice Gate, an e-commerce portal for customs clearance filings and tracking shipments.
- Electronic Data Interchange (EDI), which allows automated data exchange between organizations to streamline operations.
- INTTRA, the world's largest multi-carrier shipping network that provides booking, management and analytics capabilities.
- BOLERO, an organization that provides a digital bill of lading and aims to digitize all shipping documents.
- INMARSAT, which provides mobile satellite communications for ships, and has developed computer solutions for vessels.
- Specialized export software
Overview of Supply Chain and Logistics Technology & Parcel SystemKunj Joshi 🎤
The document discusses the parcel industry and benefits of supply chain software for courier companies. It describes how parcel perfect software works to efficiently manage courier businesses through features like GPS tracking, automated invoicing, and end-to-end parcel tracking. The software provides tangible benefits like reduced costs and improved productivity as well as intangible benefits like increased visibility and profit analysis. Key documents discussed include waybills, manifestos, and proofs of delivery that are important for tracking shipments and processing payments.
This document provides an overview of information technology frameworks and communication systems used in supply chain management. It discusses four levels of supply chain information system functionality including transaction systems, management control, decision analysis, and strategic planning. It also describes various integrated modules like enterprise resource planning systems, communication applications, and planning and execution systems. Finally, it outlines several communication technologies used in logistics like bar coding, electronic data interchange, radio frequency identification, satellite systems, and image processing.
This document discusses materials tracking practices in construction projects and identifies problems with current manual practices. It also explores potential solutions using information and communication technologies (ICT) like radio frequency identification (RFID). Case studies of construction projects in Malaysia found that materials tracking is currently done manually, which is time-consuming, lacks up-to-date information, and is prone to errors. While basic ICT tools are used, emerging technologies like RFID have not been implemented for automatic materials tracking. The document concludes that construction projects should transition from manual to automated materials tracking using ICT to improve efficiency and information availability.
Software engineering based fault tolerance model for information system in pl...IJECEIAES
The rapid development of mobile phone technologies in recent years promoted them for being used in various areas of life, such as commercial, health, transportation and tourism and other uses. In this paper, a software engineering based fault tolerance model is proposed to manage the expected faults in the adopted servers. The underlying QR based information system in plants shopping center employs different local serves allocated at local shops that are connected to the main server. In a fault case detection at any local server, the main server can cover the management of the system until the maintenance is completed. This is performed in efficient way as the main server keeps a copy of the information for all local branches. It is important to note that the self-checking process is adopted for fault detection. After completing the maintenance, a copy of the updated information is sent back to the investigated local server including all sales, etc. Moreover, the main and local servers contain information about all offer’s plants in different languages and in text and image form, customer's information and admin's information. The proposed system is tested in several cases to prove the efficiency and effectivity in retrieving and managing information and data as well as the fault tolerance administration.
This document provides an introduction to logistics and discusses modern trends in the logistics industry. It defines logistics and explains that logistics is important for ensuring products reach customers in the right quantity, quality, and price. The key elements of logistics systems are described as transportation, warehousing, inventory, packaging, and information processing. Modern trends discussed include the use of RFID technology, supply chain analytics, and cloud computing. Logistics is identified as important for companies to excel in today's competitive market by efficiently delivering products to customers.
Similar to RFID-based conveyor belt for improve warehouse operations (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
2. TELKOMNIKA ISSN: 1693-6930
RFID-based conveyor belt for improve… (Syafrial Fachri Pane)
795
effect on the company if they do not have it, the production of any goods will be difficult to
control. There are some problems with one of the logistics companies because the existing
warehouse management technology is not sufficient enough, so the complex warehouse
functions do not become dynamic. The warehouse management process is difficult to lift,
identify and sort goods by type so that the goods can stored in the wrong place.
One of the solutions to solve the problem need to use Radio Frequency Identification
(RFID) technology, conveyor belt, and robotic arm by using an Arduino microcontroller. RFID is
a technology with objectives to unique identification of objects, enable the non-contact and
automatic using radio waves [14]. The function of a conveyor belt is to carry goods from one
point to the end point with regularly and to sort goods by type using servo motors and at the
final process the goods lifted using the robotic arm. Arduino is a user-friendly open-source
platform based on a simple microcontroller board [15]. So, the design and implementation of
RFID-based conveyor belt on WMS using Arduino microcontroller can provide benefits and
convenience for logistics companies.
2. Related Work
A warehouse is a highly dynamic environment with different numbers of goods going in
and out every day [16]. The primary purpose of WMS is to control all processes in the supply
chain [17]. Information distortion on the supply chain is one of the significant problems in
creating supply chain inefficiencies [18]. Data warehouse (DW) define as a subject-oriented,
stable, integrated and variation data which sets along with time to support companies [19] and
to run an entire business in a company requires resources that focus on information technology
investment planning [20]. Automated warehouse refers to a dozen or even dozens of shelves
used to carry on goods storage, with the corresponding material handling equipment for cargo
inbound and outbound warehouse operations [21], and several kinds of sensors are necessary
to collect much different information around the warehouse [22]. Comprehensive
automatization based on warehouse management can decrease the leaks in the control of
entering the warehouse, out of the warehouse, and inventory [23]. The cost saving by
implementing RFID in a warehouse depends [24]. RFID is a simple, highly secured,
cost-effective, used widely [25], as communication between a reader and a tag, and replacing
barcode technology [26]. RFID reader is the circuit which generates a 125KHZ magnetic
signal [27]. RFID technology recently maturated and improved by computational RFID tags with
sensors and had some of the critical aspects [28]. The filter is implemented on all data to
produce one feature on each data by calculating the standard mean of each signal [29]. The
Arduino Uno is a microcontroller board grounded on the ATmega328 (datasheet) [30], open
source, user-friendly platform for hardware and software prototyping [31].
Qualitative research often concerned with the development of a profound
understanding rather than a broad understanding [32]. It also will design a study, collect data,
analyze data and interpret data same as a quantitative researcher does [33]. However,
qualitative research demands that researchers follow specific procedures and document the
research process in detail [34]. The design of Information systems (IS) that apply contemporary
methodologies can provide new knowledge that could enhance the design of particular IS
artifact [35]. Design Science Research (DSR) in relation to other IS research paradigms with a
long history [36]. In DSR, an error is a finding that a new artifact works when in fact the artifact
does not work [37]. DSR methodology includes six stages is identify a problem & motivate,
define objectives of research, design and development of solutions, building
simulation/demonstration, testing, and conclusion [8]. A DSR process results in several
artifacts, which are methods, constructs, models, or instantiations [38]. The SDLC is a
framework that the software development group follows in every software organization [39]. It
consists of several steps that are planning, analysis, design, implementation, testing, and
maintenance [40]. The Waterfall, rapid prototyping, incremental, spiral, rapid application
development (RAD), rational unified process (RUP) and agile software development are few to
mention as successful SDLC models [41]. A prototype model is a system development which
does not require freezing the requirements [42]. The advantages of the prototyping model are
users actively involved in the development, missing functionalities identified early, and errors
are detected much earlier [43]. Block diagrams represent components of the transfer function of
control subsystems [44].
3. ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 2, April 2019: 794-800
796
The impact of RFID technology, conveyor belt, and a robotic arm will have a significant
effect on the warehouse. Moreover, it will modernize the current working process and increase
productivity in the warehouse. The purpose of this research is to design and implementation of
RFID-based conveyor belt on WMS, to speed up the process in the warehouse. The scope of
this research is the design of a series of systems using Arduino Uno microcontroller and
designed for a box-shaped object with a maximum size of length=6 cm, width=5 cm, Height=4
cm with a maximum weight of 100 grams. The data is stored in MySQL database management
system and integrated with API in Web Service [45]. This research uses Design Science
Research Methodology (DSRM) and using the prototyping model for system development.
3. Research Method
Figure 1 follows the six stages of classical DSRM that focuses on problem-solving and
system development [46]. As can be seen from the picture, the first stage identifies the
problems that occurred in the warehouse and we found the problem in one of the warehouses
that are in the current process is still difficult to distinguish the type of goods. The purpose and
benefits of this research are to simplify the process of selecting goods with the design and
implementation of RFID-based conveyor belt on WMS, so the complex warehouse functions
become dynamic. The design of solution is made to facilitate us to make an overview of the
design and implementation of RFID-based conveyor belt on WMS. Based on the design, the
demonstration was built with the aim of testing the developed system to see the suitability of the
model with expectations to be achieved. After the demonstration is completed, the test results
state that the built system works well because it could lift, identify and sort goods by type.
Finally, the author will provide suggestions that can be considered by the logistics company,
such as if the design and implementation of this system will be developed in the future.
Figure 2 illustrates the circuit design of RFID-based conveyor belt controlled by Arduino
Uno R3 microcontroller. The connected components are RFID reader, buzzer, RGB LED, I2C
module, LCD, and servo motors. There are additional components such as the Ethernet Shield
used to connect Arduino with the database server. The RFID used in this system is RFID
RC522 which designed with relatively low cost and an antenna works in the small frequency
band, so RFID tag can only be read with positioned in parallel with RFID reader with a range
about 5 cm. There are supporting components in the design of the RFID-based conveyor belt
circuit. But this component is not connected directly with Arduino microcontroller; it is DC motor.
The DC motor with a speed of 100 rpm is supplied with an external power supply used to rotate
the conveyor belt so that it can turn at a constant speed. There is also a robotic arm that is
driven by four servo motors; another Arduino microcontroller controls this component. In the
robot arm is applied ultrasonic sensors to measure the distance of goods. So, the goods lifted
when the range is close to the robotic arm.
Figure 1. Flowchart of research methodology
4. TELKOMNIKA ISSN: 1693-6930
RFID-based conveyor belt for improve… (Syafrial Fachri Pane)
797
Figure 2. The circuit design of RFID-based conveyor belt
4. Results and Analysis
The functionality test has been performed to verify that the system functions are
running as expected. Several experiments have completed, and the results of the tests
observed and analyzed by the authors.
4.1. Tests
Figure 3 shows the prototype RFID-based conveyor belt to performed tests, and an
Arduino Uno R3 microcontroller controls it. In the first process, the goods placed on the
conveyor belt, and it carried over the RFID reader. Then the RFID reader identified the type of
goods based on the information of the RFID tag by adjusting the data on the database. After
identification is completed, the buzzer emitted a sound, while RGB LED and LCD will inform the
result of the identification type of goods. If it is unidentified, the RGB LED will be red, whereas if
it is identified the RGB LED will be blue and the LCD will display output the type of goods. After
that, the servo motor serves as a selector to direct the goods to storage. At the final process
when the goods arrive at the storage, the goods lifted using the robotic arm.
Figure 3. Prototype RFID-based conveyor belt
4.2. Results
Table 1 shows the results of identification of the type of goods displayed by the LCD.
The system test was conducted for five experiments, and the types of goods were categorized
into three types: type A, type B and unidentified. The results of all system tests with various
types of goods are declared successful, and each test is carried out in about 20 seconds.
5. ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 2, April 2019: 794-800
798
Table 2 shows the cost of the components used in the design of this system is
expressed in Indonesian currency (IDR). The prices shown are the average prices obtained
from different local suppliers and online stores. Explanations of other components are pipes,
aluminum, bolts, nuts, bearings, pulleys, small wooden stick, gears and small analog electronic
elements such as a breadboard, resistors, and jumpers.
Table 1. System Test Results
Type of
goods
Process time
(seconds)
Result
Type A 18.05 Success
Type B 23.84 Success
Type A 18.68 Success
Type B 23.89 Success
Unidentified 21.87 Success
Table 2. Component Costs
Component # Units Cost (IDR)
Arduino Uno R3 2 250,000.00
Ethernet Shield 1 115,000.00
RFID RC522 1 30,000.00
Piezo Buzzer 5V 1 10,000.00
RGB LED 1 15,000.00
Servo Motor MG996R 2 100,000.00
I2C Module 1 20,000.00
LCD 16x2 1 30,000.00
DC Motor 30V 100 RPM 3 255,000.00
Power Supply 24 V 2 A Switching 1 100,000.00
Power Supply 5 V 3 A Switching 1 40,000.00
MeArm V0.4 + Micro Servo SG90 2 500,000.00
Ultrasonic Sensor HC-SR04 2 40,000.00
Other Components 1 350,000.00
Total - 1,855,000.00
4.3. Discussions
The RFID-based conveyor belt on WMS will make the warehouse become dynamic and
information about the goods can be monitored continuously. Moreover, it will modernize the
current working process and increase productivity in the warehouse. RFID technology is the
answer to various weaknesses that are owned by barcode technology, because it can only be
identified by bringing the barcode closer to the reader, and also because the barcode has very
limited data storage capacity and cannot be reprogrammed. However, the RFID frequency can
be interrupted by the frequency of other equipment, so the chip will respond to that frequency.
RFID readers are also difficult to identify RFID tags if the LAN network is not connected.
Alternatives are needed to improve system performance in the process of selecting goods.
4.4. Recommendations
There are several recommendations to be proposed for the development of design in
this research. Based on the test results required the development of a prototype conveyor belt
to meet the standards to be a tool that is ready for use. It takes some other components so that
the conveyor belt performance can be better in the future and it is necessary to measure the
performance of the conveyor belt, RFID, and other components.
5. Conclusion
After the development of RFID-based conveyor belt on WMS, it can conclude that the
analysis has been able to answer the purpose of this research. This system can make the
warehouse become dynamic and connected electronically, so the information in the warehouse
can be monitored continuously. The system could sort goods running on the conveyor belt
according to the information on the RFID tag and use the servo motor as a selector to direct the
goods to their storage. This system is one of the solutions to modernize the current working
process and increases warehouse productivity with good integration.
References
[1] Christopher M. Logistics & Supply Chain Management. New Jersey: FT Press. 2016.
[2] Mahendrawathi E, Wasusri T, Astuti HM, Herdiyanti A. The Service Quality of Indonesia’s Logistics
Service Provider in Preparation for ASEAN Economic Community. Industrial Engineering,
Management Science and Applications. Tokyo. 2015.
6. TELKOMNIKA ISSN: 1693-6930
RFID-based conveyor belt for improve… (Syafrial Fachri Pane)
799
[3] World Bank. Indonesia's logistics performance index: the driver behind a reform agenda(in Indonesia
Indeks kinerja logistik Indonesia: pemicu di balik agenda reformasi. Private sector development
technical note). Washington DC: World Bank. 2011.
[4] Arvis J-F, Saslavsky D, Ojala L, Shepherd B, Busch C, Raj A, Naula T. Connecting to Compete 2016:
Trade Logistics in the Global Economy. Washington DC: World Bank, 2016.
[5] Asosiasi Logistik Indonesia. Rating LPI Down Still Classic (in Indonesia Peringkat LPI Turun Masih
Soal Klasik). Supply Chain & Logistics. 2016; VIII: 17-19.
[6] Setijadi. Indonesia's LPI 2016 Drops to Ranking 63 (in Indonesia LPI 2016 Indonesia Turun ke
Peringkat 63). Supply Chain Indonesia. 2016.
[7] Richards G. Warehouse Management: A Complete Guide to Improving Efficiency and Minimizing
Costs in the Modern Warehouse. London: Kogan Page. 2017.
[8] Pane SF, Awangga RM, Azhari BR. Qualitative Evaluation of RFID Implementation on Warehouse
Management System. TELKOMNIKA Telecommunication Computing Electronics and Control. 2016;
16(3): 1303-1308.
[9] Murphy Jr. PR, Knemeyer AM. Contemporary Logistics. 12th Edition. London: Pearson. 2017.
[10] Gooran A, Rafiei H, Rabani M. Modeling risk and uncertainty in designing reverse logistics problem.
Decision Science Letters. 2018; 7(1): 13-24.
[11] Daryanto A, Sahara. Logistics Systems in the Supply Chain of Agricultural Products in Indonesia.
Agriculture and Development Notes. 2017; 8(1): 1-2.
[12] Lazuardi SD, Riessen BV, Achmadi T, Hadi I, Mustakim A. Analyzing the National Logistics System
through Integrated and Efficient Logistics Networks: A Case Study of Container Shipping Connectivity
in Indonesia. Applied Mechanics and Materials. 2017: 283-243.
[13] Prambudia Y, Nur AA. The Effect of Considering Environmental Aspect to Distribution Planning: A
Case in Logistics SME. IOP Conference Series: Materials Science and Engineering. 2016.
[14] Srivastava K, Awasthi AK, Kaul SD, Mittal RC. A Hash Based Mutual RFID Tag Authentication
Protocol in Telecare Medicine Information System. Journal of medical systems. 2015; 39(1): 153.
[15] Cennamo N, Massarotti D, Monica AD, Bussolo AD, Fiorillo A, Zeni L. A simple Arduino-based
configuration for SPR sensors in Plastic Optical Fibers. Fotonica AEIT Italian Conference on
Photonics Technologies. Turin. 2015.
[16] Wei D, Hung W, Wu K-L. A Real Time RFID Locationing System Using Phased Array Antennas for
Warehouse Management. IEEE International Symposium on Antennas and Propagation. Fajardo.
2016: 1153-1154.
[17] Pulungan R, Nugroho SP, Maidah NE, AtmojoTB, Hardo PD, Pawenang P. Design of an Intelligent
Warehouse Management System. Information Systems International Conference. Bali. 2013.
[18] Mulyati E, Fauzan MN, Hamidin D. Implementation of Supply Chain Simulation Model. Information
Systems International Conference. Surabaya. 2015.
[19] Sun Q, Xu Q. Research on Collaborative Mechanism of Data Warehouse in Sharing Platform.
Indonesian Journal of Electrical Engineering and Computer Science. 2014; 12(2): 1100-1108.
[20] Pane SF, Awangga RM, Fathonah NS. Analysis of Investment IT Planning on Logistic Company Using
COBIT 5. Journal of Physics: Conference Series. 2018; 1007(1): 012051.
[21] Luo X, Tu J, Huang L. Optimization of Express Delivery Routing Problem. TELKOMNIKA
Telecommunication Computing Electronics and Control. 2016; 14(3A): 380-388.
[22] Lee Y, Kim J, Lee H, Moon K. IoT-based Data Transmitting System using a UWB and RFID System in
Smart Warehouse. Ninth International Conference on Ubiquitous and Future Networks. Milan. 2017:
545-547.
[23] Yang Z, Wang J, Su Q, Zhong B. The Design of Web-based Warehouse Management System.
Proceeding of the 11th World Congress on Intelligent Control and Automation. Shenyang. 2014:
5077-5081.
[24] Biswal AK, Jenamani M, Kumar SK. Warehouse efficiency improvement using RFID in a humanitarian
supply chain: Implications for Indian food security system. Transportation Research Part E: Logistics
and Transportation Review. 2018; 109: 205-224.
[25] PunithaDevi C, Selvanayagi T, Sylvia DJ. A survey on unique identity tag using RFID technology.
Innovations in Power and Advanced Computing Technologies (i-PACT). 2017: 1-7.
[26] Ahson SA, Ilyas M. RFID Handbook: Applications, Technology, Security, and Privacy. Boca Raton:
CRC Press. 2017.
[27] Hanwate A, Thakare P. Smart trolley using RFID. International Journal of Research In Science and
Engineering e-ISSN. 2015: 2394-2399.
[28] De Donno D, Catarinucci L, Tarricone L. A Battery-Assisted Sensor-Enhanced RFID Tag Enabling
Heterogeneous Wireless Sensor Networks. IEEE Sensors Journal. 2014; 14(4): 1048-1055.
[29] Yulita IN, Purwani S, Rosadi R, Awangga RM. A Quantization of Deep Belief Networks for Long
Short-Term Memory in Sleep Stage Detection. International Conference on Advanced Informatics,
Concepts, Theory, and Applications (ICAICTA). Denpasar. 2017.
[30] Kumar NS, Vijayalakshmi B, Prarthana RJ, Shankar A. IOT based smart garbage alert system using
Arduino UNO. IEEE Region 10 Conference. Singapore. 2016: 1028-1034.
7. ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 2, April 2019: 794-800
800
[31] Jidin AZ, Yusof NM, Sutikno T. Arduino Based Paperless Queue Management System. TELKOMNIKA
Telecommunication Computing Electronics and Control. 2016; 14(3): 839-845.
[32] Boddy CR. Sample size for qualitative research. Qualitative Market Research: An International
Journal. 2016; 19(4): 426-432.
[33] Choy LT. The Strengths and Weaknesses of Research Methodology: Comparison and Complimentary
between Qualitative and Quantitative Approaches. IOSR Journal of Humanities and Social Science.
2014; 19(4): 99-104.
[34] Brocke JV, Fettke P, Gau M, Houy C, Maedche A, Morana S, Seidel S. Tool-Support for Design
Science Research: Design Principles and Instantiation. SSRN Electronic Journal. 2017.
[35] Miah SJ, Genemo H. A Design Science Research Methodology for Expert Systems Development.
Australasian Journal of Information Systems. 2016; 20: 1-29.
[36] Vaishnavi VK, Kuechler W. Design Science Research Methods and Patterns: Innovating Information
and Communication Technology. 2nd Edition. Boca Raton: CRC Press. 2017.
[37] Venable J, Pries-Heje J, Baskerville R. FEDS: a Framework for Evaluation in Design Science
Research. European Journal of Information Systems. 2016; 25(1): 77-89.
[38] Prat N, Comyn-Wattiau I, Akoka J. Artifact evaluation in information systems design-science research-
a holistic view. The Pacific Asia Conference on Information Systems. 2014: 23.
[39] Khatri SK, Garg A. Evolving a risk-free, requirement centric and goal oriented software development
life cycle model. 4
th
International Conference on Reliability, Infocom Technologies and Optimization
(ICRITO) (Trends and Future Directions). Noida. 2015: 1-6.
[40] Hidayat A, Utomo VG. Open Source Based M-Learning Application for Supporting Distance Learning.
TELKOMNIKA Telecommunication Computing Electronics and Control. 2014; 12(3): 657-664.
[41] Alshamrani A, Bahattab A. A Comparison between Three SDLC Models Waterfall Model, Spiral Model, and
Incremental/Iterative Model. International Journal of Computer Science Issues (IJCSI). 2015; 12(1): 106.
[42] Saxena A, Upadhyay P. Waterfall vs. Prototype: Comparative Study of SDLC. Imperial Journal of
Interdisciplinary Research. 2016; 2(6): 1012-1015.
[43] Arora R, Arora N. Analysis of SDLC Models. International Journal of Current Engineering and
Technology. 2016; 6(1): 268-272.
[44] Odetola T, Ayodele O, Onigbinde C, Kehinde LO. Development of a competitive and collaborative
platform for block diagram and resistive circuit reduction in a basic electrical engineering course. IEEE
Global Engineering Education Conference (EDUCON). Abu Dhabi. 2016: 20-24.
[45] Awangga RM, Hasanudin TI, Fathonah NS. Colenak: GPS Tracking Model For Post-Stroke Rehabilitation
Program Using AES-CBC URL Encryption and QR-Code. 2
nd
International conferences on Information
Technology, Information Systems and Electrical Engineering (ICITISEE). Yogyakarta. 2017: 255-260.
[46] Peffers K, Tuunanen T, Rothenberger MA, Chatterjee S. A Design Science Research Methodology for
Information Systems Research. Journal of Management Information Systems. 2007; 24(3): 45-78.