The room security system design uses finger print and a matrix keypad with One Time Pad (OTP) in the Dean's room, Faculty of Engineering and Computers at Universitas Harapan Medan because it still uses conventional security. With security that is not always maintained, especially outside working hours, the authors make a room security system design to open the room only with registered fingerprints and programmed active telephone numbers, so that it cannot be accessed by others. This design is made with several components, namely Arduino as a data processor for the entire work system, the fingerprint reader functions to recognize the fingerprints to be registered, to enter the OTP code using the matrix keypad, Liquid Crystal Display (LCD) to display the data provided by Arduino through the program. that has been made, the relay is used to activate the solenoid, the solenoid functions to open or lock the door, the buzzer will sound when the fingerprint and password are not read, the GSM SIM900A module functions to send an OTP code using an active cell phone number, and the MC-38 magnetic sensor to know if the door is open or still closed. From this test it can be concluded that only the fingerprints of people who have been registered and the telephone numbers that have been programmed to be able to open the door of the room. If the fingerprint pattern is not registered then an alarm will sound
- To enforce traffic regulations on the highway, police officers face obstacles in monitoring the use of seat belts on cars because cars on the highway are always on the move and almost all cars use window film to avoid the heat of the sun entering the car. Based on the above problems, the authors build a software that can monitor or detect drivers wearing seat belts or not with Microsoft Visual C # 2010. To monitor the use of seat belts, digital cameras are used to conduct image acquisition to be processed by computers. . Furthermore, the image is studied by a system using the Back Propagation Neural Network (BPNN) Artificial Neural Network method as the image of the driver using a seat belt. To make a detection, the test image is input that is the same size as the training image. The test results obtained the level of accuracy for image acquisition with a distance of 1 meter with a similarity using a seat belt with a maximum value of 9% and a degree of similarity without a seat belt of less than 4%. Keywords - Image, Neural Network, Backpropagation Algorithm
Swimming pool is one of the means of sports and play that is fun. Swimming pools must also be considered clean. In order to be replaced with new water. The goal is so that pool users are not infected with infectious diseases due to the dirty water inside the pool. The Mamdani method is the most common method when discussing fuzzy methodology. It was Ebrahim Mamdani who first proposed this method in 1975 when building a steam engine and boiler control system. Mamdani uses a collection of IF-THEN rules obtained from experienced operators / experts. Mamdani’s work is actually based on the article “The Father of Fuzzy, Lotfi A. Zadeh: fuzzy algorithms for complex systems and decision processes.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.