Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 63

Full-Text Articles in Engineering

The Decompositioning Of Volatile-Matter Of Tanjung Enim Coal By Using Thermogravimetry Analyzer (Tga), Nukman Nukman Nov 2008

The Decompositioning Of Volatile-Matter Of Tanjung Enim Coal By Using Thermogravimetry Analyzer (Tga), Nukman Nukman

Makara Journal of Technology

The Decompositioning of Volatile-Matter of Tanjung Enim Coal by using Thermogravimetry Analyzer (TGA). Coal is a nature material which a kind of energy source. The decompotition of coal could analyze by heat treated using thermogravimetry analyzer. The decomposition of the volatile matter for three kinds of Tanjung Enim coal could be known. The value of activation energy that be found diference, then for Semi Anthracite, Bitumonius and Sub Bituminous Coal, the initial temperatures are 60.8 oC, 70.7 oC, 97.8oC, and the last temperatures are 893.8 oC, 832 oC, 584.6oC.


Hydrogen Absorption In Weldments Of Overlaid Claded Pressure Vessel, Ronnie Higuchi Rusli Nov 2008

Hydrogen Absorption In Weldments Of Overlaid Claded Pressure Vessel, Ronnie Higuchi Rusli

Makara Journal of Technology

Cracks was found in type 347 stainless steel internal attachment welds of a reactor for a high temperature, and high pressure hydrogen service. One of the possible causes of cracking is low cycle fatigue cracking induced by repetition of thermal stress to embrittled weld metal. Type 347 weld metal loses its ductility by presence of sigma phase and hydrogen.


Isolation Of Methyl Laurate From Coconut Oil As Raw Material For Fatty Alcohol Sulfate, Rita Arbianti, Tania Surya Utami, Astri Nugroho Nov 2008

Isolation Of Methyl Laurate From Coconut Oil As Raw Material For Fatty Alcohol Sulfate, Rita Arbianti, Tania Surya Utami, Astri Nugroho

Makara Journal of Technology

Isolation of Methyl Laurate from Coconut Oil as Raw Material for Fatty Alcohol Sulfate. Methyl laurate is a raw or base material for many industries, including surfactant industries. In this research, coconut oil (VCO) is transesterified with methanol to produce methyl ester, using NaOH as the catalyst. Methyl laurate is then separated by method based on the difference in melting point. This research focuses at determining the effects of some variables in transesterification on the concentration of produced methyl laurate. The variables are temperature (40 oC, 50 oC, 60 oC, 80 oC), time of transesterification reaction (0,5 hour, 1 hour, …


Phase Unwrapping Insar Image Using Local Energy Minimization Approach, Kusworo Adi, Tati L.R. Mengko, Andriyan B. Suksmono, Hendra Gunawan Nov 2008

Phase Unwrapping Insar Image Using Local Energy Minimization Approach, Kusworo Adi, Tati L.R. Mengko, Andriyan B. Suksmono, Hendra Gunawan

Makara Journal of Technology

Phase Unwrapping InSAR Image Using Local Energy Minimization Approach. Reconstruction process of phase data from its cover is called Phase Unwrapping (PU). Ideally, without any noise phrase, singularity, and aliasing problems, the phase information can be unwrapped easily. However, in fact, the phase data actually always get noise disturbance and discontinuity. The PU process becomes more complicated and needs a better PU algorithm to address the problems properly. In this research, the local PU algorithm is developed using minimization of close related firstorder pixels energy approach. In this method, the energy difference between four close related pixels is counted, followed …


Two Element Microstrip Antenna Array With Defected Ground Structure, Fitri Yuli Zulkifli, Eko Tjipto Rahardjo, Muhamad Asvial, Djoko Hartanto Nov 2008

Two Element Microstrip Antenna Array With Defected Ground Structure, Fitri Yuli Zulkifli, Eko Tjipto Rahardjo, Muhamad Asvial, Djoko Hartanto

Makara Journal of Technology

Two Element Microstrip Antenna Array with Defected Ground Structure. This paper presents a two element microstrip antenna array using trapezium shape defected ground structure (DGS). The DGS is inserted in the ground plane between two elements of antenna array. Insertion of the DGS is intended to suppress the mutual coupling effect produced by antenna array. Simulation and measurement results were taken and compared between antenna array with and without DGS. Measurement results show that the antenna with DGS compared to antenna without DGS can suppress mutual coupling effect to 7.9 dB, improve the return loss to 33.29% from -30.188 dB …


Neutron Irradiation On Ss316 Material For Radioactive Endovascular Stent Production, Rohadi Awaludin, Abidin Abidin, Sriyono Sriyono Nov 2008

Neutron Irradiation On Ss316 Material For Radioactive Endovascular Stent Production, Rohadi Awaludin, Abidin Abidin, Sriyono Sriyono

Makara Journal of Technology

Neutron Irradiation on SS316 Material for Radioactive Endovascular Stent Production. It was reported that restenosis could be prevented by radioactive endovascular stent. SS316 material of endovascular stent has been irradiated at pneumatic rabbit system of G.A. Siwabessy reactor for 5 minutes for producing radioactive stent by neutron activation. After 10 days of decay, the irradiated SS316 was measured by gamma spectrometer. The radioisotopes of 51Cr, 59Fe and 60Co were detected in the irradiated SS316 with radioactivity of 5990, 107 and 109 Bq/mg respectively. The Calculation results showed that radioisotopes of 51Cr, 59Fe and 55Fe were produced by neutron activation. The …


Physical Characteristics And Utilization Oft The Karst Beaches In Kabupaten Gunungkidul, Astrid Damayanti, Ranum Ayuningtyas Nov 2008

Physical Characteristics And Utilization Oft The Karst Beaches In Kabupaten Gunungkidul, Astrid Damayanti, Ranum Ayuningtyas

Makara Journal of Technology

Physical Characteristics and Utilization oft the Karst Beaches in Kabupaten Gunungkidul. Karsts beaches at Gunungkidul Regency (Baron, Kukup, Sepanjang, Drini, Krakal, Ngandong, and Sundak), located in south of Daerah Istimewa Yogyakarta Province, have economic potential. Even they have similarity in geological condition (genesis and morphological processes), but they have different physical characteristics. Based on result of observation environment on morphological conditions and spatial analysis method, we found the proper utilization of the beaches.


Spectral Response Surfaces And The Ringing Response Of Offshore Structures, I Ketut Suastika Nov 2008

Spectral Response Surfaces And The Ringing Response Of Offshore Structures, I Ketut Suastika

Makara Journal of Technology

A method, called spectral response surface method, is proposed for the study of the ringing phenomenon of offshore structures. Newman’s results for diffraction force on a column were reformulated in terms of the frequency components of the ocean surface and their Hilbert transforms. Using a first-order reliability method together with a dynamic model for the structural response, it is straightforward to calculate the ocean surface history most likely to generate an extreme ringing response and the ringing response history.


The Role Of 1 And 9 Wt.% Zn In Precipitation Hardening Of Aa319 Aluminium, Bondan Tiara Sofyan, Sari Susanti, Ridwan R. Yusfranto Apr 2008

The Role Of 1 And 9 Wt.% Zn In Precipitation Hardening Of Aa319 Aluminium, Bondan Tiara Sofyan, Sari Susanti, Ridwan R. Yusfranto

Makara Journal of Technology

The Role of 1 and 9 wt.% Zn in Precipitation Hardening of AA319 Aluminium. Aluminium alloys are widely used for automotive application due to its low density and high corrosion resistance. For economic reason, casting of automotive products always uses aluminium scrap as charging materials that may result in fluctuation of content of alloying element, such as Zn. This research studies the role of Zn in precipitation hardening of AA319 aluminium alloys. Hardness and tensile testing were conducted to study the mechanical properties of the alloys, while ageing response was followed by hardness measurements. Evolution of microstructures was observed by …


Ad Hoc On-Demand Distance Vector (Aodv) Routing Protocol Performance Evaluation On Hybrid Ad Hoc Network: Comparison Of Result Of Ns-2 Simulation And Implementation On Testbed Using Pda, Riri Fitri Sari, Abdusy Syarif, Bagio Budiardjo Apr 2008

Ad Hoc On-Demand Distance Vector (Aodv) Routing Protocol Performance Evaluation On Hybrid Ad Hoc Network: Comparison Of Result Of Ns-2 Simulation And Implementation On Testbed Using Pda, Riri Fitri Sari, Abdusy Syarif, Bagio Budiardjo

Makara Journal of Technology

Ad Hoc on-Demand Distance Vector (AODV) Routing Protocol Performance Evaluation on Hybrid Ad Hoc Network: Comparison of Result of Ns-2 Simulation and Implementation on Testbed using PDA. In Mobile Ad hoc NETwork (MANET), node supplemented with wireless equipment has the capacity to manage and organise autonomously, without the presence of network infrastructures. Hybrid ad hoc network, enable several nodes to move freely (mobile) to create instant communication. Independent from infrastructure. They could access the Local Area Network (LAN) or the Internet. Functionalities of ad hoc network very much dependent on the routing protocol that determines the routing around node. Ad …


The Development Of Inverter Fuzzy Logic Control For Induction Motor Control By Vector Control Method In Electric Vehicle, Era Purwanto, Mohammad Ashary, Subagio Subagio, Mauridhi Heri Purnomo Apr 2008

The Development Of Inverter Fuzzy Logic Control For Induction Motor Control By Vector Control Method In Electric Vehicle, Era Purwanto, Mohammad Ashary, Subagio Subagio, Mauridhi Heri Purnomo

Makara Journal of Technology

The development of Inverter Fuzzy Logic Control for Induction Motor Control by Vector Control Method in Electric Vehicle. In response to concerns about energy cost, energy dependence, and environmental damage, a rekindling of interest in electric vehicles (EV’s) has been obvious. Thus, the development of power electronics technology for EV’s will take an accelerated pace to fulfill the market needs, regarding with the problem in this paper is presented development of fuzzy logic inverter in induction motor control for electric vehicle propulsion. The Fuzzy logic inverter is developed in this system to directed toward developing an improved propulsion system for …


Internet Congestion Control System, Pranoto Hidaya Rusmin, Carmadi Machbub, Agung Harsoyo, Hendrawan Hendrawan Apr 2008

Internet Congestion Control System, Pranoto Hidaya Rusmin, Carmadi Machbub, Agung Harsoyo, Hendrawan Hendrawan

Makara Journal of Technology

Internet Congestion Control System. Internet congestion occurs when resource demands exceeds the network capacity. But, it is not the only reason. Congestion can happen on some users because some others user has higher sending rate. Then some users with lower sending rate will experience congestion. This partial congestion is caused by inexactly feedback. At this moment congestion are solved by the involvement of two controlling mechanisms. These mechanisms are flow/congestion control in the TCP source and Active Queue Management (AQM) in the router. AQM will provide feedback to the source a kind of indication for the occurrence of the congestion …


Biomass Production Chlorella Vulgaris Buitenzorg Using Series Of Bubble Column Photo Bioreactor With A Periodic Illumination, Anondho Wijanarko, Dianursanti Dianursanti, Muryanto Muryanto, Josia Simanjuntak, Praswasti Pembangun Dyah Kencana Wulan, Heri Hermansyah, Misri Gozan, Roekmijati Widaningroem Soemantojo Apr 2008

Biomass Production Chlorella Vulgaris Buitenzorg Using Series Of Bubble Column Photo Bioreactor With A Periodic Illumination, Anondho Wijanarko, Dianursanti Dianursanti, Muryanto Muryanto, Josia Simanjuntak, Praswasti Pembangun Dyah Kencana Wulan, Heri Hermansyah, Misri Gozan, Roekmijati Widaningroem Soemantojo

Makara Journal of Technology

Chlorella vulgaris Buitenzorg cultivation using three bubble column photo bioreactors arranged in series with a volume of 200 mL for 130 hours shows an increase of biomass production of Chlorella vulgaris Buitenzorg up to 1.20 times and a decrease of the ability of CO2 fixation compared to single reactor at a periodic sun illumination cycle. The operation conditions on cultivation are as following: T, 29.0oC; P,1 atm.; UG, 2.40 m/h; CO2, 10%; Benneck medium; and illumination source by Phillip Halogen Lamp 20W /12V/ 50Hz. Other research parameters such as microbial carbon dioxide transferred rate (qco2), CO2 transferred rate (CTR), energy …


A Study Of Co2 Absorption Using Jet Bubble Column, Setiadi Setiadi, Nita Tania Hadiyani, Hantizen Hantizen, Dijan Supramono Apr 2008

A Study Of Co2 Absorption Using Jet Bubble Column, Setiadi Setiadi, Nita Tania Hadiyani, Hantizen Hantizen, Dijan Supramono

Makara Journal of Technology

A Study of CO2 Absorption Using Jet Bubble Column. The phenomenon of plunging jet gas-liquid contact occurs quite often in nature, it's momentum carries small air bubbles with it into the reactor medium. The momentum of the liquid stream can be sufficient to carry small bubbles completely to the bottom of the vessel. A stream of liquid falling toward a level surface of that liquid will pull the surrounding air along with it. It will indent the surface of the liquid to form a trumpet-like shape. If the velocity of the stream is high enough, air bubbles will be pulled …


Substrates Preparation From Woody Tropical Waste Biomass For Biohydrogen Production, Dwi Susilaningsih, Theresia Umi Harwati, Khairul Anam, Yopi Yopi Apr 2008

Substrates Preparation From Woody Tropical Waste Biomass For Biohydrogen Production, Dwi Susilaningsih, Theresia Umi Harwati, Khairul Anam, Yopi Yopi

Makara Journal of Technology

Substrates Preparation from Woody Tropical Waste Biomass for Biohydrogen Production. Addressing to the global warming problem, energy crisis and pollution, hydrogen production by micro-organisms using biotechnological approach should be considered, since it fulfils the recent society requirement to safely produce, renewable and environmental friendly energy. Hydrogen is one of the most promising green energy sources, because it is easily converted to electricity and cleanly combustible. There are three types of micro-organisms for hydrogen production, the first is cyanobacteria through the photosynthesis process, the second is anaerobic bacteria, which use organic substances as electron donor and energy and convert them to …


The Effect Of Ozone And Zeolite Concentration To The Performance Of The Treatment Of Wastewater Containing Heavy Metal Using Flotation Process, Eva Fathul Karamah, Setijo Bismo, Hotdi M. Simbolon Apr 2008

The Effect Of Ozone And Zeolite Concentration To The Performance Of The Treatment Of Wastewater Containing Heavy Metal Using Flotation Process, Eva Fathul Karamah, Setijo Bismo, Hotdi M. Simbolon

Makara Journal of Technology

The Effect of Ozone and Zeolite Concentration to the Performance of the Treatment of Wastewater Containing Heavy Metal Using Flotation Process. Industrial wastewater which contains heavy metal cannot be disposed to the environment directly, due to its toxicity. In this research, separation of metal from wastewater was conducted by sorptive flotation method, using Lampung natural zeolite as bonding agent. The most common diffuser used in the flotation process is air or oxygen. In this research, ozone is used as diffuser because it is a stronger oxidant and more dissolvable in water than oxygen. Besides, ozone is a coagulant aid and …


Building Fire Safety Audit At Faculty X, University Of Indonesia, Year 2006, Fatma Lestari, Rm. Yodan Amaral Panindrus Apr 2008

Building Fire Safety Audit At Faculty X, University Of Indonesia, Year 2006, Fatma Lestari, Rm. Yodan Amaral Panindrus

Makara Journal of Technology

Building Fire Safety Audit at Faculty X, University of Indonesia, Year 2006. Fire may cause loss of life, material and valuable assets. The objective of this study is to conduct audit for fire safety and emergency response in the building at Faculty X, University of Indonesia, Depok. The audit results on the building fire safety facilities including emergency response and preparedness are then compared to the Building Code Australia (BCA) and Indonesian regulation on the building fire safety (Kep.MenPU.No 10 and 11/KPTS/2000). The building selected are Building A, B, C, D, F and G. Building classification for A, B, D, …


The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland Jan 2008

The 2007 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland

Journal of Digital Forensics, Security and Law

All organisations, whether in the public or private sector, increasingly use computers and other devices that contain computer hard disks for the storage and processing of information relating to their business, their employees or their customers. Individual home users also increasingly use computers and other devices containing computer hard disks for the storage and processing of information relating to their private, personal affairs. It continues to be clear that the majority of organisations and individual home users still remain ignorant or misinformed of the volume and type of information that is stored on the hard disks that these devices contain …


Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler Jan 2008

Book Review: Challenges To Digital Forensic Evidence, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This issue presents the fifth Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn S. Dardick (gdardick@dardick.net).


Book Review: The Dotcrime Manifesto: How To Stop Internet Crime, Gary C. Kessler Jan 2008

Book Review: The Dotcrime Manifesto: How To Stop Internet Crime, Gary C. Kessler

Journal of Digital Forensics, Security and Law

No abstract provided.


Online Tuning Of Set-Point Regulator With A Blending Mechanism Using Pi Controller, Engi̇n Yeşi̇l, Müjde Güzelkaya, İbrahi̇m Eksi̇n, Ö. Aydin Teki̇n Jan 2008

Online Tuning Of Set-Point Regulator With A Blending Mechanism Using Pi Controller, Engi̇n Yeşi̇l, Müjde Güzelkaya, İbrahi̇m Eksi̇n, Ö. Aydin Teki̇n

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, a new control structure that exploits the advantages of one degree of freedom (1-DOF) and two degree of freedom (2-DOF) control structures with an online tuned set-point regulator with blending mechanism (SPR-BM) is proposed. In this structure, the filtered output of the reference and the pure reference signals are blended so that the overall performance of the system is ameliorated with respect to load disturbance rejection and set-point following. Internal Model Control (IMC) based PI controller is used as the primary controller and the blending dynamics are determined with the aim of producing a system output that …


A New Approach Using Temporal Radial Basis Function In Chronological Series, Mustapha Guezouri Jan 2008

A New Approach Using Temporal Radial Basis Function In Chronological Series, Mustapha Guezouri

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper, we present an extended form of Radial Basis Function network called Temporal-RBF (T-RBF) network. This extended network can be used in decision rules and classification in Spatio-Temporal domain applications, like speech recognition, economic fluctuations, seismic measurements and robotics applications. We found that such a network complies with relative ease to constraints such as capacity of universal approximation, sensibility of node, local generalisation in receptive field, etc. For an optimal solution based on a probabilistic approach with a minimum of complexity, we propose two TRBF models (1 and 2). Application to the problem of Mackey-Glass time series has …


A Summary Of Recent Developments On Metamaterial-Based And Metamaterial-Inspired Efficient Electrically Small Antennas, Aycan Erentok, Richard W. Ziolkowski Jan 2008

A Summary Of Recent Developments On Metamaterial-Based And Metamaterial-Inspired Efficient Electrically Small Antennas, Aycan Erentok, Richard W. Ziolkowski

Turkish Journal of Electrical Engineering and Computer Sciences

This paper summarizes our recent research efforts to realize efficient electrically small antenna (EESA) systems based on ideal analytical and numerical metamaterial-based antenna systems, and physically realized metamaterial-inspired antenna designs. Our theoretical and numerical studies of the radiation and resonance behaviors of the proposed metamaterial-based EESA systems, as well as our efforts to conceptualize structures which might be used to build them, have led to the discovery of several realizable metamaterial-inspired EESA systems. The measurement results confirm the numerical performance predictions.


The Design And Testing Of Hand Held Devices To Assist Persons With Disabilities To Navigate Bus Services, Daniel Fitch Jan 2008

The Design And Testing Of Hand Held Devices To Assist Persons With Disabilities To Navigate Bus Services, Daniel Fitch

Undergraduate Review

Many transit systems around the U.S. are using global positioning systems to track their buses. Some of these systems provide bus locations in real-time on web maps. With internet integration becoming common in portable electronics, this research project analyzed the opportunity to utilize mass market devices to assist the general public and persons with disabilities to access and navigate fixed route bus services. This study has taken advantage of the state of the art automatic vehicle location systems aboard the Cape Cod Regional Transit Authority and MetroWest (Boston) Regional Transit Authority bus services, Microsoft Virtual Earth mapping services and Microsoft …


Recent Advances In Perfectly Matched Layers In Finite Element Applications, Özlem Özgün, Mustafa Kuzuoğlu Jan 2008

Recent Advances In Perfectly Matched Layers In Finite Element Applications, Özlem Özgün, Mustafa Kuzuoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

We present a comparative evaluation of two novel and practical perfectly matched layer (PML) implementations to the problem of mesh truncation in the finite element method (FEM): locally-conformal PML, and multi-center PML techniques. The most distinguished feature of these methods is the simplicity and flexibility to design conformal PMLs over challenging geometries, especially those with curvature discontinuities, in a straightforward way without using artificial absorbers. These methods are based on specially- and locally-defined complex coordinate transformations inside the PML region. They can easily be implemented in a conventional FEM by just replacing the nodal coordinates inside the PML region by …


Who Is Reading The Data On Your Old Computer?, Vivienne Mee Jan 2008

Who Is Reading The Data On Your Old Computer?, Vivienne Mee

Journal of Digital Forensics, Security and Law

Researchers at Rits Information Security performed a study in how the Irish population disposes of their old computers. How would you dispose of your old computer, or how would the company you work for dispose of their old computers?

The majority of Irish homeowners, would bring their old computers to local civic amenity centres, give it away to a relative or sell it on to another party.

Some organisations would give their old equipment to a staff member, as a gift gesture, others may simply discard in the local civic amenity site.

What is wrong with the methods currently being …


Developing A Process Model For The Forensic Extraction Of Information From Desktop Search, Timothy Pavlic, Jill Slay, Benjamin Turnbull Jan 2008

Developing A Process Model For The Forensic Extraction Of Information From Desktop Search, Timothy Pavlic, Jill Slay, Benjamin Turnbull

Journal of Digital Forensics, Security and Law

Desktop search applications can contain cached copies of files that were deleted from the file system. Forensic investigators see this as a potential source of evidence, as documents deleted by suspects may still exist in the cache. Whilst there have been attempts at recovering data collected by desktop search applications, there is no methodology governing the process, nor discussion on the most appropriate means to do so. This article seeks to address this issue by developing a process model that can be applied when developing an information extraction application for desktop search applications, discussing preferred methods and the limitations of …


Table Of Contents Jan 2008

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Trends In Virtualized User Environments, Diane Barrett Jan 2008

Trends In Virtualized User Environments, Diane Barrett

Journal of Digital Forensics, Security and Law

Virtualized environments can make forensics investigation more difficult. Technological advances in virtualization tools essentially make removable media a PC that can be carried around in a pocket or around a neck. Running operating systems and applications this way leaves very little trace on the host system. This paper will explore all the newest methods for virtualized environments and the implications they have on the world of forensics. It will begin by describing and differentiating between software and hardware virtualization. It will then move on to explain the various methods used for server and desktop virtualization. Next, it will explain how …


Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt Jan 2008

Steganography: Forensic, Security, And Legal Issues, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt

Journal of Digital Forensics, Security and Law

Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit. This article provides a brief history of steganography, discusses the current status in the computer age, and relates this to forensic, security, and legal issues. The paper concludes with recommendations for digital forensics investigators, IT staff, individual users, and other stakeholders.