|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
May 2016 | Vol. 87 No.1 |
Title: |
A COMPUTATIONAL HYBRID MODEL WITH TWO LEVEL CLASSIFICATION USING SVM AND NEURAL
NETWORK FOR PREDICTING THE DIABETES DISEASE |
Author: |
NASIB SINGH GILL, POOJA MITTAL |
Abstract: |
Data Mining is a collection of number of computational approaches. These
approaches are used to develop Knowledge inference systems by identifying the
hidden and convincing patterns from the input data. The aim of this study is to
propose a computational Hybrid Prediction Model (HPM) for efficient diabetes
prediction. The Pima diabetic dataset is used as the data source, obtained from
the University of California, Irvine (UCI), the machine learning repository. At
first stage of the proposed HPM the filtration feature selection method of
MATLAB is used for selecting the most discriminatory predictors, reflecting the
possibility of diabetes occurrence. At second stage, a two-layered
classification is applied on the filtered data, by combining Support Vector
machine (SVM) and Neural Network, to enhance the overall recognition rate of the
model. The proposed hybrid model gained 96.09% of overall accuracy. The
comparative study is also conducted and it is evident that the proposed model
had obtained the significant classification accuracy. The accuracy rates
achieved by many researchers in the past, on the same data set, ranges from
59.4% to 92% of accuracy. Further, for validating and evaluating the results,
Recognition rate, Mean Absolute Error (MAE) and Receiver Operating
Characteristics (ROC) performance measures are used. This research can be
helpful to the physicians for predicting and detecting the diabetes at an early
stage, efficiently. |
Keywords: |
Support Vector Machine, Neural, Diabetic, Mean Absolute Error, Accuracy Rate |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
PRIORITIES AND GAPS OF USING COMPUTER TECHNOLOGIES IN THE EDUCATIONAL PROCESS |
Author: |
ISABEK, N.E., ZHUMAHMETOVA, Z.ZH., MUKANOV, M.F., NURLYBAYEVA, E |
Abstract: |
The article reveals the prospects for the development of new educational
strategies in modern conditions and analyzes the use of computer technologies
for creating an effective educational environment. Their implementation in the
educational process enables students to learn with interest and find necessary
sources of information, fosters independence and responsibility in obtaining new
knowledge and develops the discipline of intellectual activity. |
Keywords: |
Computer Technologies, Educational Process, Intelligent System, Networks |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
LATERAL AND YAW MOTION CONTROL OF THE VEHICLE USING FUZZY LOGIC AND PID BEING
OPTIMIZED BY FIREFLY ALGORITHM |
Author: |
FACHRUDIN HUNAINI, IMAM ROBANDI, NYOMAN SUTANTRA |
Abstract: |
The aim of this paper is to control the lateral and yaw motion of the vehicle in
order to always fix at the desired trajectory. The controller used was fuzzy
logic control (FLC) for lateral motion control and PID control is used to
control the yaw motion arranged cascade. To obtain optimal control parameters is
used Firefly Algorithm (FA) optimization method as one of the methods swarm
intelligence which is much simpler both in concept and implementation, but it is
very efficient and can outperform the other conventional algorithms. Simulation
of optimal control FLC-PID using FA applied to the vehicle model with 10 DOF
(Degree of Freedom) of vehicle dynamics. The simulation results showed that the
lateral and yaw motion can be maintained in accordance with the desired
trajectory expressed in Continues-root mean square (C-RMS) error smaller than
using the Particle Swarm Optimization (PSO). |
Keywords: |
Lateral, Yaw, Fuzzy Logic Control (FLC), PID, Firefly Algorithm (FA) |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
ON THE ECONOMY OF COMPUTER INDUSTRY |
Author: |
ISLAM A.T.F. TAJ-EDDIN |
Abstract: |
This paper try to show that Von Neumann model is a more robust, useful and
flexible tool than many have been realized. It tries to show that the tools of
Von Neumann model are useful enough to understand the present behavior of the
economy of computer industry. The paper elaborates over and explains the Von
Neumann mathematical model. It shows when and how Von Neumann stationary
equilibrium state will happen. It drew useful conclusions. It opens the door to
further investigations on the same direction. |
Keywords: |
Conventional And Computer Industry, Economics Of E-Business, Information
Technology, Von Neumann’s Model |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
HIGH LEVEL SECURITY BASED STEGANORAPHY IN IMAGE AND AUDIO FILES |
Author: |
M.SHADY AL-RAHAL, ADNAN ABI SEN, ABDULLAH AHMAD BASUHIL |
Abstract: |
As the use of the Internet for information exchange has spread widely, there is
an increase in the skills of attackers. Nowadays, it has become very important
of ensuring the protection of a transmitted information, assuring its safe
delivery to the receiver side and overcoming risks of any future attack.
Steganography is one of the most important approaches for hiding secret
information and send it safely to the intended side without drawing attention
about its existence. In this paper, we present a general model to protect
confidential information by hiding it within other innocent information (image
or audio file) that suits different types of data (text, image, or audio). Our
information hiding model is based on using the least significant bit technique,
so that an attacker will have no clue about the existence of any secret message.
In advance to hiding a secret information, this information will be passed
through encryption and randomizing stages to strengthen it against possible
attacks. The experimental results of our proposed approach showed high level of
security and transparency compared with the previous proposed approaches. |
Keywords: |
Cover_Object, Hidden_Data (Secret Message) , Stego_Key, Stego_Object, LSB,
Attacker. |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
AUDIT INFORMATION SYSTEMS CORE BANKING SYSTEM USING ITIL V.3 CASE STUDY ON BTPN
SHARIA BANK |
Author: |
MOCHAMAD WAHYUDI, ARIEF DESWANDI |
Abstract: |
This research on the application of information systems audit, namely
Corebanking System, is to measure how to handle problems that occur and how long
the problems that can be solved in accordance with the ITIL V3 framework at the
sub-domain of Service Desk, Incident Management and Problem Management included
in the domain of Service Operation. The role of Information Technology Service
Management (ITSM) in improving a company's, in this case is BanK BTPN Syaria’s,
ability to provide the best services that suit the needs of the customer
(customer satisfaction) and in line with the interests of the company is
becoming increasingly important. IT Infrastructure Library (ITIL) provides an
integrated device of best practices to serve the management of Information
Technology. ITIL is a set of concepts and techniques for managing the
infrastructure, development, and operation of information technology (IT). ITIL
V3 using IT approach "Service Life Cycle" is how to improve what they have to
ensure adjustment to the new standards that provide adjustments to the process
of upgrading hardware and software. The results of the audit assessment
(self-assessment) contained the findings for each sub domain procedures are
still not in accordance with the standards of best practice ITIL V.3. From the
sub domain of Management Service Desk, the level of Intent, Process Capability
and Customer Interface need some upgrading/improvement. In the Problem
Management sub domain, the level needs to have upgrading/improvement are the
External Integration and Customer Interface level. While the
upgrading/improvement at the Incident Management sub domain is at the level of
External Integration and Customer Interface. For the reason, the company must
fix the process steps whing are still failing, especially those oriented towards
customers. |
Keywords: |
Audit of Information Systems, IT Infrastructure Library (ITIL), Core Banking
System, Service Life Cycle |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
A NOVEL TRANSMISSION TECHNIQUE FOR INTERFERENCE MANAGEMENT AND MITIGATION IN
3GPP LTE-ADVANCED |
Author: |
VANITHA RANI RENTAPALLI, SOWJANYA B, B T P MADHAV, B MADHAVI, K V L BHAVANI |
Abstract: |
In order to achieve improved cell edge throughput in LTE-Advanced, CoMP
technology is introduced to support high data rates over wider bandwidths.
Coordination of control of data and channel interference is important to
maintain the uplink and downlink coverage to enhance channel performance. CoMP
is a new class of transmission scheme for the interference reduction and can
have significant effect in terms of improving cell edge user throughput,
coverage in the 4G mobile networks. This proposed article presents a
coordination technique among multiple cell sites of improving the cell edge user
throughput and compares different CoMP joint processing schemes. In this paper
author presents a CoMP scheme where Joint Transmission is applied in the
downlink of a LTE heterogeneous network structure for the purpose of
interference cancellation. The technical challenges for both uplink and downlink
are also addressed. Simulation results indicate that the proposed method gives
an effective control of ICI and improves cell edge user throughput. |
Keywords: |
CoMP , CS/CB, LTE-A, JT, ICI. |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
DEPLOYMENT OF FEMTOCELL AND ITS INTERFERENCE MANAGEMENT APPROACHES IN LTE
HETEROGENEOUS NETWORKS |
Author: |
MOTEA Al-OMARI, ABD RAHMAN RAMLI, A. SALI, RAJA SYAMSUL AZMIR |
Abstract: |
With a vast number of wireless devices being connected to the system, the need
for very high data rates and extremely low latency with ultra-high reliability
is becoming more and more challenging. And with such density of network nodes,
it is a huge challenge to provide wide coverage and high quality service in
indoor environments. Femtocell, a new add-on in the small cell technology, acts
as an extension to the existing outdoor macrocell with the aim of providing
quality indoor coverage. However, vast deployment of femtocell network in the
absence of proper network planning and coverage strategy makes it difficult to
maintain the desired quality of service. Additionally, the service of femtocell
in densely deployed heterogeneous network is challenged by interference,
unwanted handover and signaling overhead in the system. Given the huge potential
of the femtocell technology, extensive research has been carried out by
companies, service providers and operators to mitigate the interference and to
ensure the highest benefit of femtocell deployment. Against this backdrop, a
rigorous review has been attempted in this paper with a brief analysis on
femtocell technology and its deployment in LTE Heterogeneous Networks.
Challenges of vast femtocell deployment and different interference management
techniques have been studied with a quantitative comparison. Graphical and
tabular analysis on the interference management techniques is also presented
along with their advantages and limitations. |
Keywords: |
Femtocell, Interference Management, Hetnet, LTE, Small Cell |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
CUSTOMER LOYALTY ASSESSMENT IN MALAYSIAN ISLAMIC BANKING USING ARTIFICIAL
INTELLIGENCE |
Author: |
ZEYAD M. EM. KISHADA, NORAILIS AB. WAHAB, AOUACHE MUSTAPHA |
Abstract: |
Banks are in the process of moving into a more competitive financial atmosphere
with a wide variety of financial products and services. From the practical
perspective, the prediction of customer loyalty will provide a better
understanding of Islamic banking that relates to customer loyalty and offer a
platform that helps the bank management to improve the customer loyalty.
Therefore, the primary objective of this paper is the development of an
artificial intelligence model for customers’ loyalty assessment in Malaysian
Islamic Banking. To achieve this, first a returned of 373 from total 500 samples
was collected via self-administered questionnaires distributed by hand to
customers at various Islamic bank branches around Kuala Lumpur, Malaysia.
Second, the data analysis of the returned samples and testing with several
statistical tools and methods was examined using SPSS. The data used were
customer satisfaction, customer service quality, customer perceived value and
customer trust which are the factors affecting customer loyalty. Third,
assessment model was proposed and developed using an artificial neural network
(ANN) based on cross validation for modeling customer loyalty. The decision of
changing the ANN architecture is essentially based on prediction results to
obtain the best ANN model computation to quantify customer loyalty. A
statistical performance was conducted includes, root mean square error (RMSE)
and correlation coefficient (COE) between the measured and estimated customer
loyalty by the ANN. Experimental results obtained based cross validation with
COE (0.9867) indicates that the third ANN-model has better accurate results with
fold 4 and trainLM [4 10 1] compared to others structures. Simulations results
yielded significant results in predicting customer loyalty. In conclusion, this
research has achieved its stated goal of developing an ANN model that provide
quantitative assessment to facilitate Islamic banks managers in their effort to
develop and implement successful customer loyalty strategies. |
Keywords: |
Malaysian Islamic Banks, Customer loyalty, Cross validation model |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
DYNAMIC STOPLIST GENERATOR FROM TRADITIONAL INDONESIAN CUISINE WITH STATISTICAL
APPROACH |
Author: |
SETYAWAN WIBISONO, MARDI SISWO UTOMO |
Abstract: |
Stoplist is one part of input for information retrieval system that can affect
information retrieval quality. The existence of words that are not meaningful
can make the retrieval declining. The standart dictionary-based information
stoplist also has problem when implemented in a corpus with specific domains.
For example the word "recipe" is not a stopword but when using it in domain
cuisine, recipes will appear in almost every document. We build dynamic stoplist
using Indonesian recipes documents, this documents has non standart
dictionary-based stoplist that interesting to study. This paper use three
methods to generate stoplist. We use poisson and binomial probability
distribution approach and we also use simple frequency distribution approach for
classifying candidate stopword. For measuring the result we also employ recently
proposed RAKE algorithm. All three of these methods have the same weakness, the
stoplist can be generated appropriately if the entire population of the all
corpus vocabulary has processed, unlike the stoplist dictionary which can
already detect stopword at the stage of pre-processing. The results of the
frequency distribution is better than the other methods, but this method
requires a longer process than poisson and negative binomial method. |
Keywords: |
Keyword Extraction, Indonesian Cuisine,Auto Generated Stoplist |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
ADAPTIVE NONLINEAR CONTROL OF DOUBLY-FED INDUCTION MACHINE IN WIND POWER
GENERATION |
Author: |
MOHAMMED RACHIDI, BADR BOUOULID IDRISSI |
Abstract: |
This paper presents an adaptive nonlinear controller for Doubly-Fed Induction
Generator (DFIG) in wind power generation. The control objective is to extract
the maximum power (Maximum Power Point Tracking) and have a specified reactive
power at the generator terminal despite the variable wind speed and the unknown
mechanical parameters and mechanical torque. To achieve such a decoupled
control, the nonlinear Backstepping approach was combined with the field
orientation principle. The induction machine is controlled in a synchronously
reference frame oriented along the stator voltage vector position. The
mathematical development of the nonlinear Backstepping controller design is
examined in detail. The overall stability of the system is shown using Lyapunov
approach. Application example on stabilizing a DFIG-based Wind Energy Conversion
System (WECS) subject to large mechanical parameters uncertainties has been
given to illustrate the design method and confirm the robustness and validity of
the proposed control. |
Keywords: |
Wind Energy Conversion System, Doubly-Fed Induction Generator, Unknown
Mechanical Parameters and Torque, Adaptive Nonlinear control, Lyapunov Approach. |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
A SURVEY OF FEATURE EXTRACTION TECHNIQUES IN CONTENT-BASED ILLICIT IMAGE
DETECTION |
Author: |
S.HADI YAGHOUBYAN, MOHD AIZAINI MAAROF, ANAZIDA ZAINAL, MAHDI MAKTABDAR OGHAZ |
Abstract: |
For many of today’s youngsters and children, the Internet, mobile phones and
generally digital devices are integral part of their life and they can barely
imagine their life without a social networking systems. Despite many advantages
of the Internet, it is hard to neglect the Internet side effects in people life.
Exposure to illicit images is very common among adolescent and children, with a
variety of significant and often upsetting effects on their growth and thoughts.
Thus, detecting and filtering illicit images is a hot and fast evolving topic in
computer vision. In this research we tried to summarize the existing visual
feature extraction techniques used for illicit image detection. Feature
extraction can be separate into two sub-techniques feature detection and
description. This research presents the-state-of-the-art techniques in each
group. The evaluation measurements and metrics used in other researches are
summarized at the end of the paper. We hope that this research help the readers
to better find the proper feature extraction technique or develop a robust and
accurate visual feature extraction technique for illicit image detection and
filtering purpose. |
Keywords: |
Feature Extraction, Feature Detector, Feature Extract, Illicit Image, Internet
Filtering |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
BASED ON NEURAL NETWORK APPROACH PREDICTING MOBILE PAYMENT ADOPTION INCLINATION
DETERMINANTS IN SOUTHEST ASIA |
Author: |
YANG
XIONG, PAIROTE SATTAYATHAM |
Abstract: |
The adoption of mobile payments is crucial for the development of mobile
commerce. Based on the revised availability of technology readiness, we build
the mobile payment adoption inclination model by integrating technology
Acceptance 297samples Model. With data, neural network model is used to predict
adoption of mobile payment determinants tilt and model compared with the
multiple regression analysis. The results show that the neural network model
exceed the multiple regression model, perceived usefulness and perceived ease of
use are followed. Finally, the results of the most important indicators are
discussed mobile tilt payment adoption, discomfort, enjoyment, innovativeness
and insecurity, suggestions for the development of mobile payments are proposed. |
Keywords: |
Neural Network; Mobile Payment; Adoption Inclination; Multiple Regression;
Availability of Technology |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
ALPHA SCHEDULER APPROACH TO ENHANCE SECURITY AND HIGH PERFORMANCE IN CLUSTER
ENVIRONMENT |
Author: |
INDRAJITH.A.N, MANISHANKAR.S, MONIKA.B.R |
Abstract: |
Cluster computing finding increasing deployment in academic, research,
enterprise for efficient resource management and coupled with this there is a
increase in demand for concerns regarding the security and performance of these
clusters. Security and performance are vital aspects within the field of cluster
computing. However, security usually incurs a certain amount of performance
varies and adds usage complexity to a field of computing where performance is
pivotal and usage complexity is already high. In this paper we are presenting a
security design platform and associated with security best practices,
supplementing for high performance computing facilities. The planned work aims
to handle issues regarding high performance computing security, specifically to
mitigate the risks known within the current cluster security concerns and based
on the progress we are introducing the secure job scheduling approach called
ALPHA scheduler with some security features implemented in it . Planned research
design and best practices arrange to give the simplest exchange between security
approaches and performance. All together gives an approach of security in high
performance computing cluster. |
Keywords: |
High Performance Computing, Cluster Security, Access Control, network-level
security and protection, MPI, Security monitoring, DDOS, Service Level
Agreement. |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
WEB-BASED MONITORING SYSTEM ON THE PRODUCTION PROCESS OF YOGYAKARTA BATIK
INDUSTRY |
Author: |
INDAH SOESANTI |
Abstract: |
This paper presents a web-based monitoring system on the production process of
Yogyakarta Batik industry. The quality determining steps of batik design are
obtaining the design idea, the concrete pattern or patterns drawing on a paper,
and the transfer to a blank cloth. The results are then fed to a computer in the
forms of text and image for further inspection by the experts and the batik
products inspection. The challenging part is the design of the needed
information system which covers the software architecture, algorithm data
structures, and the representing interface. The results showed that the
web-based monitoring system design in this study has been implemented
successfully. An online access to the information systems can be useful for
accessing the status of the design division procedure. The result shows that
response of the user for the information systems are Reliability: excellent 92%,
Usability: excellent 94%, and Maintainability: excellent 91%. |
Keywords: |
Information System, Design Division, Web-Based, Yogyakarta Batik, Image. |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
NONLINEAR TRANSFORMATIONS FOR THE CONSTRUCTION OF THE PRIMITIVES OF SYMMETRIC
CRYPTORAPHY |
Author: |
MICHAEL ALEKSANDROVICH IVANOV, ALEKSANDR BORISOVICH VAVRENYUK, VIKTOR
VALENTINOVICH MAKAROV, ANDREY ANDREYEVICH SKITEV |
Abstract: |
Three new stochastic transformations are proposed in the paper. A linear
transformation on the basis of a pseudo-random number generator (PRNG),
functioning in finite fields and constructed by the Galois scheme, exceeds by
its mixing properties the known solution on the basis of PRNG, constructed by
the Fibonacci scheme. A nonlinear transformation on the basis of an RFSR (Random
Feedback Shift Register) has an efficient software implementation. In the
nonlinear multi-round 256-bit transformation, as distinct from known solutions,
the entire input block is changed during one round. The considered
transformations are directed, first of all, to the construction of
crypto-algorithms using multidimensional transformations. |
Keywords: |
Stochastic Transformation, R-Box, Pseudo-Random Number Generator, 2D
Transformation. |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
MATHEMATICAL MODEL FOR UNDERWATER COLOR CONSTANCY BASED ON POLYNOMIAL EQUATION |
Author: |
PUJIONO, EKO MULYANTO YUNIARNO, I KETUT EDDY PURNAMA, MAURIDHI HERY PURNOMO,
MOCHAMAD HARIADI |
Abstract: |
Nowadays, the underwater researches become one of the distinguish researches
since the ocean are considered as the lungs of this world. Therefore, underwater
image processing researches should be encouraged especially in the differences
of color analysis between underwater and on the air objects. The colors of
objects are changed when the objects are put underwater. This is due to
discoloration from light scattering, refractive index, the wave, the distance of
camera and environmental underwater effect. Discoloration in water is highly
dependent on the intensity level and wavelength of each color image. In this
paper propose polynomial equation approach to enhancement underwater color
constancy. Polynomial approach is conducted through two steps: first,
determining the relation between the color intensity of an image on the water
surface and the color intensity of an image in a certain depth, second,
determining the coefficient of constant function relation between the color
intensity of an image on the water surface and the color intensity of an image
in a certain depth by using least square. The result of polynomial approach is
measured by using Peak Signal to Noise Ratio, yielding an average value of 19.64
and visually the result of the image color approximates its original color. It
can be concluded that polynomial approach can determine the color constancy
level which in turns can enhance the underwater image just as its original
color. |
Keywords: |
Mathematical Model, Underwater Color Constancy, Polynomial Equation, Peak Signal
to Noise Ratio |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
Title: |
DESIGN OF AUTOMATIC ELECTRIC BATIK STOVE FOR BATIK INDUSTRY |
Author: |
RAMADONI SYAHPUTRA, INDAH SOESANTI |
Abstract: |
This paper proposes design of automatic electric batik stove in order to
increase productivity and maintain a healthy environment in batik industry.
Batik is the process of writing a picture or decoration on any media by using
wax batik as a color barrier. In the production process of batik, the batik
stove is needed. During batik used this stove is still not automated, so in this
study designed automatic electric batik stove. The automatic electric batik
stoves results of this research work automatically so as to facilitate the batik
in batik activities. This stove is a very simple tool in the form of physical or
works. This stove utilizes a temperature sensor as an input the data to manage
large or small currents so as to produce the necessary heat. This batik stove
using dimmer circuit which is used to manage large or small stream on the
heating element. The prototype of the batik electric stove uses ATMEGA8
microcontroller with AVR C programming language code. From the test results, the
automatic electric stove batik has been working in accordance with the desired
design. |
Keywords: |
Electric Stove, Batik, Automatic, Microcontroller, AVR C |
Source: |
Journal of Theoretical and Applied Information Technology
10th May 2016 -- Vol. 87. No. 1 -- 2016 |
Full
Text |
|
|
|