cover
Contact Name
Helmy, S.T., M.Eng
Contact Email
jaict@polines.ac.id
Phone
+62811278186
Journal Mail Official
jaict@polines.ac.id
Editorial Address
Program Studi Teknik Telekomunikasi Jurusan Teknik Elektro Politeknik Negeri Semarang Jl. Prof. H. Soedarto, S.H. Semarang
Location
Kota semarang,
Jawa tengah
INDONESIA
Journal of Applied Information, Communication and Technology (JAICT)
ISSN : 25416340     EISSN : 25416359     DOI : https://doi.org/10.32497/jaict
Core Subject : Engineering,
Focus of JAICT: Journal of Applied Information and Communication Technologies is published twice per year and is committed to publishing high-quality articles that advance the practical applications of communication and information technologies. JAICT scope covers all aspects of theory, application and design of communication and information technologies, including (but not limited): Communication and Information Theory. Mobile and Wireless Communication, Cognitive Radio Networks. Ad Hoc, Mesh, Wireless Sensor Network, Distributed System and cloud computing Computer networking and IoT Optimization Algorithms, Artificial intelligence, Machine Learning, and Adaptive System.
Articles 95 Documents
Problematic Student Identification and Visualization in The Counseling Activites Evaliata Br Sembiring
JAICT Vol 3, No 1 (2018)
Publisher : Politeknik Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (501.285 KB) | DOI: 10.32497/jaict.v3i1.1092

Abstract

The counseling activities are procedures carried out by academic advisers to identify problematic students, especially in their academic learning process. Students are categorized as problematic when they do not submit their KRS, have a lower GPA than the college standard, have not yet paid their due, or receive warning letters owing to their misconducts. The current system provides every students’ data but academic advisers still need to identify every problematic students’ data one by one. A working solution would be to present the data in a visualization, so the problematic students along with their problem category can be identified automatically. The application employs the UML approach in its planning and web-based application development tools in its implementation. Highchart is implemented in the data visualization. The resulted application boasts the student data management feature to help the problematic student identification process. This feature automatically identifies the problematic students on each term by visualizing it in a colored charts and tables.
Modulation Coding Scheme Performance Analysis (Mcs) Wireless 802.11ac Indoor At 5 Ghz Frequency In West And East Telecommunication Labs Politechnic State Of Semarang Dimas Tampan Setiadi
JAICT Vol 3, No 1 (2018)
Publisher : Politeknik Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1109.271 KB) | DOI: 10.32497/jaict.v3i1.1343

Abstract

Modulation Coding Scheme or MCS is a value that specifies the modulation, coding and number of spatial streams and produces a fixed rate data rate based on channel conditions and RSSI values received by the user. Modulation on MCS there are 5 kinds of BPSK, QPSK, 16 QAM, 64 QAM and 256 QAM. While the coding rate there are 4 kinds of ½, 2/3, ¾ and 5/6. MCS and RSSI. Changes can not be separated from wireless propagation that includes Large Scale Propagation and Small Scale Fading in particular the existence of obstacles in the form of objects and indoor or outdoor areas. Test results show that major changes to RSSI are influenced by indoor or outdoor areas. MCS changes are uncertain and not RSSI based. MCS and RSSI will change based on channel conditions.
Home Automation based on Raspberry Pi tri raharjo yudantoro
JAICT Vol 1, No 2 (2016)
Publisher : Politeknik Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (634.563 KB) | DOI: 10.32497/jaict.v1i2.1086

Abstract

Every human being wants to feel safe and comfortable when traveling or leaving home empty. in addition to feeling safe and comfortable, homeowners also want electronic equipment at home can be controlled easily to reduce the waste of electricity and can know the condition of the house remotely.therefore, a home automation system is needed which enables homeowners to travel to control the use of electronic devices at home and to know the state of the house, accessible wherever and whenever. With the existence of these problems then made the final task with the title Home Automation based Raspberry PI.the purpose of this final task is to make Home Automation system with Raspberry PI, LDR sensor, RTC and PIR sensors. This system is used to control lights and webcam automatically. The LDR sensor is used to get the light intensity to automate the lamp.rTC is used to get the current time on Raspberry Pi which then can be used to turn the lights on and off. The PIR sensor is used to read the human movement which then for the automation of the webcam in taking pictures of the state of the house. This system can also be controlled manually on a smartphone by using Telegram Bot inside Telegram app.the methodology used in designing this system is waterfall. The system is tested by creating a home model containing lights inside the house and outdoors.the results of testing with questionnaires conducted to 10 respondents obtained level of satisfaction of 79.2% which means Raspberry Pi Home-based system satisfactory.
Home Security Based On Rasberry And Android (Smart Home) Eko Riyanto
JAICT Vol 3, No 2 (2018)
Publisher : Politeknik Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (418.404 KB) | DOI: 10.32497/jaict.v3i2.1320

Abstract

Smart Home is one of the tools that is developed for ease of automation of smart home management from the start of address, security, comfort, savings, through automation with Android. In designing a micro home security system controller using raspberry pi 3 and Android smartphones that can reduce the number of criminal acts of burglary door. This tool consists of an electro magnetic door lock called a solenoid door lock.This solenoid key is placed on the door of the house for security. The design of this home door security system utilizes Raspberyy pi b + as a control device from near and far by utilizing the wifi network and sms gateway to control opening and closing the home door lock that is controlled via an android mobile. Through web bootstrap that will display the results captured by the camera to provide a home situation every time someone enters.This house door security system that has been successfully built and tested with the working principle if there is someone who forces or breaks the house door in a closed condition, the system will activate a warning or alarm by sounding the buzzer¸ because there is an LDR sensor connected to one switch connected to the solenoid key that results, if the key is opened with a security system then the LDR sensor will turn off and there will be no alarm, but if it is forced to break the LDR sensor will activate and read the movement of the door so that the reaction occurs and the buzzer alarm will sound. This security system is a solution to increase the level of home security ¸ besides this sophisticated system is very easy to use and integrated with android smartphones
Arduino-based Charity Box Safety, Tracking, and Counter System Tri Raharjo Yudantoro; Liliek Triyono; Dwi Desy Nur Hani'ah; Moudina Risma Slodia
JAICT Vol 4, No 2 (2019)
Publisher : Politeknik Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (603.381 KB) | DOI: 10.32497/jaict.v4i2.1891

Abstract

The charity box is a supporting facility that can be used by pilgrims to distribute their infaq. In this modern era, it turns out that the mosque still counts the contents of the charity box manually and uses the usual padlock key for the safety of the charity box. The purpose of this research is to build a system and tool that can simplify the performance of mosque administrators in counting money and maintaining the security of the charity box. ArduinoBased Charity Box Safety, Tracking, and Counter System is a charity box equipped with automatic counting and security features using RFID and GPS. The method used in making this system is the waterfall method. The features in this system are automatic counting and security features using RFID keys, GPS, buzzers, and infrared sensors. This system is also equipped with a notification to the mosque management regarding the amount of money in the charity box and the location of the charity box using GSM / GPRS. From the testing of the system, it was produced that the Arduino-Based Charity Box Safety, Tracing, and Counter System was able to detect banknotes and coins well. The SMS feature also works well where there will be an SMS message regarding the amount of money and location of the charity box. The safety of the charity box is enhanced by using RFID, GPS, buzzers, and infrared sensors. From the user satisfaction test results obtained by the percentage of user satisfaction by 85%, which means the Arduino-Based Charity Box Safety, Tracing, and Counter System is quite attractive to users.
An Analysis of Quality of Service (QoS) In Live Video Streaming Using Evolved HSPA Network Media Achmad Zakaria Azhar; Subuh Pramono; Eko Supriyanto
JAICT Vol 1, No 1 (2016)
Publisher : Politeknik Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (529.17 KB) | DOI: 10.32497/jaict.v1i1.423

Abstract

Evolved High Speed Packet Access (HSPA+) is a mobile telecommunication system technology and the evolution of HSPA technology. This technology has a packet data based service with downlink speeds up to 21.1 Mbps and uplink speed up to 11.5 Mbps on the bandwidth 5MHz. This technology is expected to fulfill and support the needs for information that involves all aspects of multimedia such as video and audio, especially live video streaming. By utilizing this technology it will facilitate communicating the information, for example to monitoring the situation of the house, the news coverage at some certain area, and other events in real time. This thesis aims to identify and test the Quality of Service (QoS) performance on the network that is used for live video streaming with the parameters of throughput, delay, jitter and packet loss. The software used for monitoring the data traffic of the live video streaming network is wireshark network analyzer. From the test results it is obtained that the average throughput of provider B is 5,295 Kbps bigger than the provider A, the average delay of provider B is 0.618 ms smaller than the provider A, the average jitter of provider B is 0.420 ms smaller than the provider A and the average packet loss of provider B is 0.451% smaller than the provider A.
Design And Development Of Presence System System Using Rfid Based On Raspberry Pi Eni Dwi Wardihani
JAICT Vol 2, No 1 (2017)
Publisher : Politeknik Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (623.775 KB) | DOI: 10.32497/jaict.v2i1.1296

Abstract

Presence of students of the Master of Telecommunications Engineering Study Program majoring in Electrical Engineering Semarang State Polytechnic is currently still managed and carried out manually. This does not rule out the possibility of errors in managing data attendance and cheating students in faking their presence, and also with the development of science and technology that is currently completely automated. From this background, it was made the Presence Using RFID Based Raspberry Pi System where the PBM became Admin to be able to access all the attendance data of the S2 Telecommunications Engineering students. Student attendance recording is done by PBM by opening a MySQL database that has been created and stored, then processed and adjusted to existing student data as student ID. The end result obtained is a tool and system that are integrated automatically and also precisely, so that students are required to arrive on time so that they do not get the Compensation if they have passed the deadline and PBM admin can manage the recapitulation data through the website including student data, data lecturer, course data, room data, lecture schedule, attendance activities, and print reports in PDF format. The trial was carried out in the Computer Lab of the Semarang State Polytechnic Applied Science Master. The conclusion is that this tool and system is able to educate students to come and have a scheduled presence and can also record attendance automatically.
Automatic Door Based on Radio Frequency Identification (RFID) and Password in Electrical Engineering Laboratory Syahid Syahid
JAICT Vol 4, No 1 (2019)
Publisher : Politeknik Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (694.494 KB) | DOI: 10.32497/jaict.v4i1.1433

Abstract

RFID (Radio Freq uency Identification) systems are used as personal identification cards in the room access system especially in Electrical Engineering Laboratory. This system is intended to maintain the security and privacy of the room from someone who does not have the authority to enter the room. This security system uses a two-tier security system, namely through an RFID identity card and security code. The design and implementation of this system, an electric key work system is evaluated based on the solenoid component and the password used when accessing the room. RFID tags used in this system are in the form of "Mifare RFID Card 13.56 Mhz" cards and store unique codes used as personal identification. This code is read by the RFID reader in validating its authority with Arduino Mega 2560 to regulate the system of electric locks and passwords used to open the door. From the test results, 100% RFID tags can be recognized by the RFID reader, 100% RFID tag and password reading system is successfully used to access the room.
Sensor Data Analysis On Monitoring And Control System Of Temperature And Humidity Based On Android In Soybean Seed Storage Room Using Nodemcu Sindung HW Sasono
JAICT Vol 3, No 1 (2018)
Publisher : Politeknik Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (748.326 KB) | DOI: 10.32497/jaict.v3i1.1290

Abstract

soybean seeds may be damaged during storage time. Temperature and humidity of soybean seed storage room, is one of the external factors of damage to the seed. The system consists of monitoring and control temperature and humidity in some rooms used as soybean seed storage room samples. This study discusses and perform sensor data analysis using several types of temperature and humidity sensors based on Internet of Things. Sensor nodes generate data and processed by a microcontroller NodeMCU ESP8266, and the results data is then transmitted by the Internet network using MQTT broker and stored in the database. Results data is then analyzed to monitor the condition of soybean seed storage room. SHT30 sensor has the most excellent temperature accuracy of 98, 21%. DHT22 sensor has the most excellent moisture accuracy of 95.74%. Data sending to the database has a good level of dataloss category for node 1 is 3.39%, 4.33% for node 2, and 3.22% for node 3. Air conditioner control system using Android can keep the room temperature state in the range of 18-23oC and humidity of 40-60% with an air conditioning remote control setting at 20oC on an area of 36 m2.
Handover Analysis Of Data Services In Wireless Distribution System (Wds) Using IEEE 802.11ac Standards In Telecommunication Laboratory Polines Arya Pitaka
JAICT Vol 2, No 2 (2017)
Publisher : Politeknik Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1155.04 KB) | DOI: 10.32497/jaict.v2i2.1344

Abstract

Problems with limited WLAN coverage areas often become a constraint when users access the Internet by migrating. This final project contains an analysis of the effect of handover on the quality of data service with Quality of Service (QoS) parameter that is throughput, delay, jitter and packet loss. The Wireless Local Area Network (WLAN) 802.11ac networking system in the Telecommunication Laboratory of Semarang State Polytechnic area that supports the handover feature is built with the Wireless Distribution System (WDS) technique that is configured with Service Set Identifier (SSID), the same password and channel and the placement of Access Point (AP) with overlapping coverage areas in one roaming domain. The tool used is Wireshark obtained the results of the test that is the average throughput value on the download service of 12,94 Mbps, the upload service of 11,22 Mbps and video streaming service of 3,66 Mbps. The average value of delay in the download service is 0,99 ms, the upload service is 1,19 ms and the video streaming service is 3,07 ms. The average value of jitter on the download service is 0,36 ms, on the upload service of 0,35 ms and the video streaming service is 3,66 ms. The average value of packet loss on the download service is 2,57 %, the upload service is 5,08 % and the video streaming service is 7,03%

Page 3 of 10 | Total Record : 95