Claim Missing Document
Check
Articles

Found 7 Documents
Search
Journal : ComEngApp : Computer Engineering and Applications Journal

Lightweight Solar Vehicle Impact Analysis Using ABAQUS/EXPLICIT Rossi Passarella; Zahari Taha
Computer Engineering and Applications Journal Vol 1 No 2 (2012)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (474.665 KB) | DOI: 10.18495/comengapp.v1i2.10

Abstract

This paper described the Abaqus/Explicit 6.7 simulation work performed to study the frontal crash impact condition for an in-house designed and produced lightweight solar vehicle main structural body. The structural body was fabricated from aluminum hollow pipes welded together. The analysis is needed to safeguard the safety of the vehicle driver. The dynamic response of the vehicle structure when subjected to frontal impact condition was simulated, according to NASA best practice for crash test methodology. The simulated speed used was based on the NHTSA standard. Comparison of the analysis with the standard Head Injury Criteria (HIC) and Chest Injury Criteria (CIC) revealed that the driver of the designed vehicle would not be risk because the acceleration resultant was found to be lower than 20 G.  The analysis also proved that structural component was able to protect the driver during any frontal collision incident. However, to ensure the safety of the driver, safety precautions such as the use of seatbelt and helmet as well as driving below the speed limit are recommended.DOI: 10.18495/comengapp.12.085096
Design Concept of Convexity Defect Method on Hand Gestures as Password Door Lock Rossi Passarella; Muhammad Fadli; Sutarno Sutarno
Computer Engineering and Applications Journal Vol 2 No 3 (2013)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1183.912 KB) | DOI: 10.18495/comengapp.v2i3.32

Abstract

In this paper we purpose a several steps to implement security for locking door by using hand gestures as password. The methods considered as preprocessing image, skin detection and Convexity Defection. The main components of the system are Camera, Personal Computer (PC), Microcontroller and Motor (Lock). Bluetooth communication are applied to communicate between PC and microcontroller to open and lock door used commands character such as “O” and “C”. The results of this system show that the hand gestures can be measured, identified and quantified consistently.
Object Reconstruction from 2D Drawing sketch to 3D Object Rossi Passarella; Osvari Arsalan
Computer Engineering and Applications Journal Vol 5 No 3 (2016)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (547.997 KB) | DOI: 10.18495/comengapp.v5i3.183

Abstract

Design engineer in the early phase of building up another product is  typically using a freehand sketching to communicate or illustrate the idea in the form of orthographic projection. This orthographic projection is based on viewpoint. A translation from 2D drawing  view point to 3D models is needed to help engineer to imagine the product preview in 3D. This procedure includes a tedious, so that automation is needed. The way to deal with this reproduction issue begin straightforwardly from 2D freehand portraying, by using the camera, the 2D drawing is captured and then transferred to a Personal Computer. Inside the computer, the image is processed with  filtering to find the view point zones. The view point zone than separate to 3 zones, each zone consists of the pixel coordinate. This coordinates are used to generated and processing of 3D voxel Image according to the form of geometries. A case study is presented in order to emphasize and discuss the proposed method
Cloud-based ECG Interpretation of Atrial Fibrillation Condition with Deep Learning Technique Bambang Tutuko; Rossi Passarella; Firdaus Firdaus; Muhammad Naufal Rachmatullah; Annisa Darmawahyuni; Ade Iriani Sapitri; Siti Nurmaini
Computer Engineering and Applications Journal Vol 10 No 1 (2021)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (320.888 KB) | DOI: 10.18495/comengapp.v10i1.356

Abstract

The prevalent type of arrhythmia associated with an increased risk of stroke and mortality is atrial fibrillation (AF). It is a known priority to identify AF before the first complication occurs. No previous studies have explored the feasibility of conducting AF screening using a deep learning (DL) algorithm (integrated cloud-computing) telehealth surveillance system. Hence, we address this problem. The goal of this research was to determine the feasibility of AF screening using an embedded cloud-computing algorithm in nonmetropolitan areas using a telehealth surveillance system. By using a single-lead electrocardiogram (ECG) recorder, we performed a prospective AF screening study. Both ECG measurements were evaluated and interpreted by the cloud-computing algorithm and a cardiologist on the telehealth monitoring system. The proposed cloud-computing based on Convolutional Neural Network (CNN) algorithm for AF detection had an accuracy of 99% sensitivity of 98%, and specificity of 99%. The overall satisfaction performance for the process of AF screening, and it is feasible to conduct AF screening by using a telehealth monitoring system containing an embedded cloud-computing algorithm.
Lightweight Solar Vehicle Impact Analysis Using ABAQUS/EXPLICIT Passarella, Rossi; Taha, Zahari
Computer Engineering and Applications Journal (ComEngApp) Vol. 1 No. 2 (2012)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper described the Abaqus/Explicit 6.7 simulation work performed to study the frontal crash impact condition for an in-house designed and produced lightweight solar vehicle main structural body. The structural body was fabricated from aluminum hollow pipes welded together. The analysis is needed to safeguard the safety of the vehicle driver. The dynamic response of the vehicle structure when subjected to frontal impact condition was simulated, according to NASA best practice for crash test methodology. The simulated speed used was based on the NHTSA standard. Comparison of the analysis with the standard Head Injury Criteria (HIC) and Chest Injury Criteria (CIC) revealed that the driver of the designed vehicle would not be risk because the acceleration resultant was found to be lower than 20 G.  The analysis also proved that structural component was able to protect the driver during any frontal collision incident. However, to ensure the safety of the driver, safety precautions such as the use of seatbelt and helmet as well as driving below the speed limit are recommended.DOI: 10.18495/comengapp.12.085096
Littering Activities Monitoring using Image Processing Husni, Nyayu Latifah; Handayani, Ade Silvia; Passarella, Rossi; Abdurrahman; Rahman, A.; Felia, Okta
Computer Engineering and Applications Journal (ComEngApp) Vol. 12 No. 3 (2023)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Littering is a human behavior that become a habit since childhood. Even though there are rules that prohibit this behavior, the community still continues to do so. In order to limit this bad behavior, a device that can monitor and provide notifications is needed. In this research, proposed device can identify human activities by utilizing webcam-based image processing. It is processed by machine learning using the Recurrent Neural Network (RNN). The monitoring device produced in this research works by comparing the captured image data with dataset. The captured image data are extracted into figures and form several coordinate points on the human body. Then, the system classifies the human activities into two categories, i.e., normal or littering. This device will provide an output in the form of a ewarning every time the activity of littering is detected.
Design Concept of Convexity Defect Method on Hand Gestures as Password Door Lock Passarella, Rossi; Fadli, Muhammad; Sutarno
Computer Engineering and Applications Journal (ComEngApp) Vol. 2 No. 3 (2013)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this paper we purpose a several steps to implement security for locking door by using hand gestures as password. The methods considered as preprocessing image, skin detection and Convexity Defection. The main components of the system are Camera, Personal Computer (PC), Microcontroller and Motor (Lock). Bluetooth communication are applied to communicate between PC and microcontroller to open and lock door used commands character such as “O” and “C”. The results of this system show that the hand gestures can be measured, identified and quantified consistently.
Co-Authors ., Sutarno A. Rahman Abdul Wahid Sempurna Abdurahman Abdurahman Abdurahman Abdurrahman Ade Iriani Sapitri Ade Murdiansyah Ade Silvia Handayani Adiansyah Adiansyah Aditya Putra Perdana Prasetyo Ahmad Fadhil Ahmad Fali Oklilas Ahmad Fali Oklilas Ahmad Heryanto Ahmad Rezqy FF Ahmad Rifai Ahmad Rifai Ahmad Zarkasi Ambarwati, Ayu Anggraini, Febrina Hedy Annisa Darmawahyuni Archibald Hutahaean, Jerrel Adriel Arif Tumpal Leonardo Sianturi Atika Mailasari Ayu Ambarwati Bambang Tutuko Bangun Sudrajat Barzan Trio Putra Chandra Irsan Danny Matthew Saputra Darmawahyuni, Annisa Dedy Kurniawan Deris Stiawan Des Alwine Zayantii Eka Fasilah Emaria Melati Erwin, Erwin Fardinelly, Syahria Fatimah, Sayyidatina Felia, Okta Firdaus Firdaus Fri Murdiya, Fri Hendra Setiawan Holyness Nurdin Singadimedja Huda Ubaya Huda Ubaya Husnawati Husnawati Husnawati Husnawati Husnawati Husnawati Husnawati Iman Saladin B. Azhar Irsyadi Yani Izzati Millah Hanifah Kemahyanto Exaudi MARIA BINTANG Mattjik, Hani Alifia Muflika Amini Muhammad Ali Buchari Muhammad Fachrurrozi Muhammad Fadli Muhammad Fadli Muhammad Fadli Muhammad Naufal Rachmatullah Nabillah Selva Setiawan Nadya Lucyana Neni Frimayanti Nyayu Latifah Husni, Nyayu Latifah Osvari Arsalan Purwita Sari Purwita Sari Rahmad Fadli Isnanto Rahmat Fadli Isnanto Rahmayuni, Septa Ranti Eftika Rendyansyah Reza Firsandaya Malik Rezqy FF, Ahmad Rian Rahmanda Putra Rido Zulfahmi Rifkie Primartha Roswitha Yemima Tiur Mediswati Rouzan Fiqri Abdullah Samsuryadi - Samsuryadi Samsuryadi Sarmayanta Sembiring Sayyidatina Fatimah Sinaga, Aurell Octaviona Siti Nurmaini Sri Desy Siswanti Sri Desy Siswanti Sri Wahyuni Sukemi Sutarno Sutarno Sutarno - Sutarno . Sutarno Sutarno Sutarno Sutarno Sutarno Sutarno Sutarno, Sutarno Tarida Mathilda Tharisa Antya Perdani Titin Wahdania Tunnisa Wahyu Gunawan Winda Kurnia Yandi Prasetia Yandi Prasetia Yulia Resti Yusak Maryunianta Zahari Taha Zahari Taha