Journal La Multiapp
International Journal La Multiapp peer reviewed, open access Academic and Research Journal which publishes Original Research Articles and Review Article, editorial comments etc in all fields of Engineering, Technology, Applied Sciences including Engineering, Technology, Computer Sciences, Architect, Applied Biology, Applied Chemistry, Applied Physics, Material Engineering, Civil Engineering, Military and Defense Studies, Photography, Cryptography, Electrical Engineering, Electronics, Environment Engineering, Computer Engineering, Software Engineering, Electromechanical Engineering, Transport Engineering, Mining Engineering, Telecommunication Engineering, Aerospace Engineering, Food Science, Geography, Oil & Petroleum Engineering, Biotechnology, Agricultural Engineering, Food Engineering, Material Science, Earth Science, Geophysics, Meteorology, Geology, Health and Sports Sciences, Industrial Engineering, Information and Technology, Social Shaping of Technology, Journalism, Art Study, Artificial Intelligence, and other Applied Sciences.
Articles
15 Documents
Search results for
, issue
"Vol. 5 No. 4 (2024): Journal La Multiapp"
:
15 Documents
clear
System for Visually Disabled through Wearables Utilizing Arduino and Ultrasound
Abdulkareem, Sabah A.;
Mohammed, Hind I.;
Mahdi, Abbas Alaa
Journal La Multiapp Vol. 5 No. 4 (2024): Journal La Multiapp
Publisher : Newinera Publisher
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.37899/journallamultiapp.v5i4.1230
Blindness and other vision impairment is on the rise with more than 2.2 billion people worldwide are affected including children, elder persons, pregnant women, chronically ill and disabled persons who experience difficulties in mobility and being independent. Some of the conventional assistances like usage of white cane or a guide dog lacks the ability to cater all the needs of the blind people. The present research outlines a wearable system with Arduino and ultrasound equipment to improve the walking ability of the persons with vision impairment. From the use of the proposed system, there is the potentiality of detecting obstacles in real time and also determine the location hence minimizing the dependence on other help. The system consists of two wearable components: a glove and a belt which contain ultrasonic sensors, GPS module and GSM module and a vibration motor. The glove senses the objects that are in front of the user while the belt detects stairs or any other raised ground. The method used here was the development and calibration of these components separately then brought together to form a coherent entire system where all the component was precise and reliable. The findings show that the proposed system is successful to identify obstacles on its path before the user comes close to them and gives out alerts through sound and touch. GPS and GSM modules provide an extra layer of security to the kids by allowing a tracking of their location in real time.
Enhancing the Security of Information Systems Using Iot Technology
Gaata, Methaq Talib;
Mohialden, Yasmin Makki;
Mahmood Hussien , Nadia
Journal La Multiapp Vol. 5 No. 4 (2024): Journal La Multiapp
Publisher : Newinera Publisher
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.37899/journallamultiapp.v5i4.1308
Psychiatric patient information system that is used in most mental health clinics is very important in dealing with patient records. However, the safety of such systems is a major issue since information being processed in such systems is often sensitive. This paper offers a new way of boosting the security of the Mentcare information system via the incorporation of IoT technology. The following figure demonstrates the components of the proposed security framework of the system which uses highly secure password generation algorithms that enable the system to generate passwords of different levels of complexities depending on the user’s preference. Such improvements guarantee exclusive safeguard mechanisms against illegitimate access since IoT provides a way of passing secure passwords to the right individuals in real-time. That has resulted in the overall decreases in hacking attempts by the unauthorized access and enhanced the encryptions that meet GDPR and HIPAA standards and practices fully integrated with IoT technology. Also, general enhancements have been made on Mentcare system with regard to the ease and speed in generating password, system response time and user satisfaction. In light of these findings, this study reaffirms the need to have IoT-advanced security protocols for medical information systems especially in mental health care where patients’ information needs to be well protected. The conclusions prove that in addition to increasing security, the proposed system optimizes the process of its functioning, which confirms that it is necessary to apply it to protect the health care information.
Cloud Data Protection Based On Crypto-Steganography Approach
Abdul Wahhab Hachim, Ethar
Journal La Multiapp Vol. 5 No. 4 (2024): Journal La Multiapp
Publisher : Newinera Publisher
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.37899/journallamultiapp.v5i4.1337
The benefits are numerous for organizations and people who work and learn using or through computers, some of these are scalability, affordability and availability of cloud computing services. However, one of the biggest issues still being faced in this area is that of security, especially concerning data privacy, thus limiting the use of such technologies. This paper seeks to address these concerns by developing a new approach to increasing protection of data in the cloud through development of Crypto-Steganography. The proposed method involves a two-tiered security mechanism: first, the presented data is protected with the use of advanced TWOFISH encipherment, which makes the data completely non-interpretated in case it gets to the hands of the unauthorized users. After that the encrypted data is then steganograghically inserted into a color image through least significant bit approach, where changes of the least significant bits of the image pixels will contain the encrypted data. Such double-layered approach does not only mask the presence of such sensitive information, but also ensures that even if there is an attempted invasion, such data can hardly be retrieved without the decryption passkey. The proposed approach of Crypto-Steganography is thoroughly tested through experiments and evaluation of distortion measures such as Weighted PSNR, UIQ; and C4 similarity measure. As seen in the results, the approach preserves low distortion and the wPSNR values are within the range of 45 – 50 dB, suggesting that the quality of the images is well preserved.
Optimizing Raw Material Inventory Control with Continuous and Periodic Review
Farel, Febrian Muhammad;
Aryanny, Enny
Journal La Multiapp Vol. 5 No. 4 (2024): Journal La Multiapp
Publisher : Newinera Publisher
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.37899/journallamultiapp.v5i4.1363
PT XYZ is a plywood processing firm confronted with issues related to raw material inventory management since the demands for such materials are probabilistic in nature and the orders could not be ordered based on the needs of the company’s production line. This often leads to problems such as overstock and stockout hence increasing the overall cost of inventory. This research is going to find ways on supply management of sengon wood to be used in PT XYZ by identifying the difference between the existing inventory management technique that the company is using, the continuous review (Q) back order method and the periodic review (P) back order method to retail total inventory costs. From the findings, it is established that employing continuous review back order method (Q) bring in total stocks cost to the tune of IDR 28,829,527,844 which is cheaper than the total costs obtained under current firms method resulting to the tune of IDR 32,502,564,700 in the process giving an 11.3% cost savings. Moreover, based on the estimated demand of sengon wood from May 2024 to April 2025 as 42,109 m³, another improvement called the continuous review method helped to optimize the use of inventory. This research validates the effectiveness of such inventory tracking systems as the continuous inventory monitoring system particularly for businesses that operate in volatile markets hence the implication of great savings when compared to the conventional systems of inventory control.
Standardization of Information Security Management in the Banking Sector using the ISO 27001:2022 Framework
Ryanto, Kamil;
Tundjungsari, Vitri
Journal La Multiapp Vol. 5 No. 4 (2024): Journal La Multiapp
Publisher : Newinera Publisher
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.37899/journallamultiapp.v5i4.1399
This research discusses evaluations related to cyber security standardization in the banking sector at Bank Victoria International Tbk using qualitative methods and data collection techniques, interviews and focus group discussions. The focus of this research is evaluation related to Data Leaks, Threats of Attacks from outside, and Policies for preventing cybercrime in banking using the ISO 27001:2022 Framework. The location of this research was carried out at Bank Victoria International Tbk. The location for this research was chosen because Bank Victoria is one of the banks that is currently carrying out a preventive implementation process in preventing cybercrime by implementing ISO 27001:2022 related to Cyber Security. The problems that will be explained in this thesis research are First, how does PT. Bank Victoria is taking precautions regarding data leaks using the ISO 27001:2022 framework (1). Second, how does PT Bank Victoria carry out monitoring and monitoring related to external threats or attacks that could harm the bank using the ISO 27001:2022 framework (2). Third, how to comply with procedures, policies or regulators related to process flow and security controls for the use of information technology at PT. Bank Victoria uses the ISO 27001:2022 Framework (3). The conclusion of this research is that Bank Victoria International Tbk is still in the stage of improvement in terms of cyber security, although currently PT Bank Victoria is showing good preventive measures by forming a special organizational structure to handle legality issues and implementing cybercrime prevention applications, but this has not been stated in the Policy.
Numerical Study of Cavitation Phenomenon in a Venturi Tube
Rachman, Muhammad Nanda Fatur;
Rhakasywi, Damora;
Fahrudin, Fahrudin
Journal La Multiapp Vol. 5 No. 4 (2024): Journal La Multiapp
Publisher : Newinera Publisher
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.37899/journallamultiapp.v5i4.1432
This research aims to understand and numerically analyze the cavitation phenomenon that occurs in Venturi tubes with variations in throat length and pressure changes. This research uses Ansys Fluent 2023 R2 numerical simulation with venturi tube geometries of 25 mm, 30 mm, and 35 mm and pressures of 300,000, 600,000, and 900,000 Pa. A multiphase flow model with water liquid and water vapor is applied to predict cavitation using a mixture model. RANS steady state conditions with the k-ε turbulence model are used to solve the continuity, momentum, energy and volume fraction equations. The Schnerr-Sauer cavitation model calculates the phase transition between water-liquid and water vapor. Geometry varies by reference journal with different converging and diverging angles, outlined in tables and figures. 2D simulations are carried out using a pressure based solver with specified boundary conditions, using the Presto! for pressure solutions, and upwind and Quick schemes for discretization. The results of this research show that 1) Length throat 25 mm has the most stable distribution compared to 30 and 35 mm geometries at a pressure of 600,000 Pa. 2) The cavitation phenomenon is influenced by changes in geometry where at 35 mm geometry greater cavitation occurs in the area near the wall inlet convergent. 3) At a pressure of 900,000 Pa, the cavitation area that forms becomes larger and becomes a critical point in this journal.
Image Quality Restoration on Historical Artifacts Using Histogram Equalization and Contrast Stretching Methods
Aidilia, Yunda;
Sriani, Sriani
Journal La Multiapp Vol. 5 No. 4 (2024): Journal La Multiapp
Publisher : Newinera Publisher
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.37899/journallamultiapp.v5i4.1442
The aim of this research was to enhance the image quality of historical objects that undergo quality decline such as noise, low contrasting images, and poor sharpness. Contrast stretching and Histogram equalization are two methods of image enhancement which is used to expand and smooth out the grayscale of an image . The purpose of this study is to develop a system for enhancing the quality of images of historical heritage objects applying contrast stretching and histogram equalization techniques. Concerning the selection of the sample in this research, the data is RGB image data with a total of 10 test images in . mat file format and the process employed is in Matlab programming language The stimulation of neuron is in jpg format. The works on the contrast stretching and histogram equalization from the sample 1 to sample 10 image the results were highest on test image_citra_1 with the contrast stretching results on the base of PSNR = 32. DOS, = 61 dB and MSE = 35. 86 Db and PSNR = 19. 13 Db and MSE = 794 . 76 in histogram equalization calculations.
Real-Time Monitoring System for Peatland Fire Potential Based on Internet of Things
Nawawi, Imam Khushthon;
Al Qibtiya, Mariya;
Al Azhima, Silmi Ath Thahirah;
Arief Hakim, Nurul Fahmi
Journal La Multiapp Vol. 5 No. 4 (2024): Journal La Multiapp
Publisher : Newinera Publisher
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.37899/journallamultiapp.v5i4.1449
This research aims to develop a real-time monitoring system for peatland fire potential based on the Internet of Things (IoT) with a focus on early detection of potential peatland fires. The main problem to be solved is the lack of an effective system in the early detection of potential peatland fires, which can cause serious environmental impacts. The method used involves the use of air temperature, air humidity, soil moisture, and fire detection sensors integrated with alarm-based alerts. Data collection is done in real-time to provide a deeper understanding of peatland conditions and potential fire risks. The research results show that the developed system is capable of providing accurate and fast information related to peatland conditions, thus helping to prevent and reduce the impact of peatland fires. With this system, it is expected to increase efficiency in early fire detection and minimize the losses caused by peatland fires.
Sentiment Analysis towards Full Movie Dirty Vote 2024 in X Using Support Vector Machine Method
Azhari, Fajar;
R, Rakhmat Kurniawan
Journal La Multiapp Vol. 5 No. 4 (2024): Journal La Multiapp
Publisher : Newinera Publisher
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.37899/journallamultiapp.v5i4.1459
Intending to provide a sentiment of the general public towards the X’s “Dirty Vote 2024” movie, this study inspects 1500 tweets scraped from ‘Tweepy’ library using Support Vector Machine (SVM) method. The tweets were preprocessed by text mining process by tokenization, removal of stopwords and word weighting to categorize the tweets into positive and negative sentiments. While using the SVM model, the recognition rate was 86% which means that the model can successfully recognize sentiment patterns in the dataset. However, the model had a 14% overall misclassification rate especially when it came to assessing subtlety or ambiguity in expressions which indicate its weakness in handling complexities inherent in sentiment. Thus, the study affirms a high level of precision in SVM for sentiment analysis The study further pointed out the need to advance advanced natural language processing NLP approaches to enhance the accuracy of models particularly in different real world settings where language adaption is highly volatile. The study also has a relevance to filmmakers and marketers; given that it offered a better understanding of the public response that can help in framing future content creation and advertisement advertisements. Thus, for the increase of accuracy and simply to make the methods more resilient, the future studies should investigate the opportunities of using context-aware embeddings and a hybrid neural network model in the environment of social platforms.
Implementation of a Convolutional Neural Network Algorithm in Classifying Vegetable Freshness Based on Image
Handira, Dysa;
Hasibuan, Muhammad Siddik
Journal La Multiapp Vol. 5 No. 4 (2024): Journal La Multiapp
Publisher : Newinera Publisher
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.37899/journallamultiapp.v5i4.1461
The purpose of this work is to apply CNN algorithm to a real problem of vegetable freshness identification using image data. Quantitative approach was used for this study and the data source was obtained from Kaggle; it is referred to as Fresh and Stale Images of Fruits and Vegetables with 2,604 images, four categories in total. The CNN model architecture consisted of a basic organization of four successive convolutional layers with associated max-pooling layers that aimed at capturing hierarchical feature representations of the input images. This model was trained using the Adam’s optimizer for 20 iterations with the batch size of 32. Pre-processing of data included image augmentations such as scaling, rotation, flipping which improved the performance of the model. The assessment was done using Confusion Matrix approach and the results show that the proposed system achieved an accuracy of 95%, with a precision of 94%, recall of 93% and F1-score of 93%. From this it can be concluded that the CNN model proposed has achieved the objective of distinguishing fresh and non-fresh vegetables with enough precision to assist in the automation of quality control in agriculture. The conclusion that can be drawn from this study is that AI especially CNNs could be of big help in increasing accuracy and decreasing human factors in the large scale production of food.