Andi Hasad Presentasi dan Menjadi Salah Satu Narasumber di Seminar Nasional Energi dan Teknologi (SINERGI) Unisma Bekasi

Advertisements

Andi Hasad Menerima Pendanaan Penelitian Dan Pengabdian Masyarakat Di Perguruan Tinggi Tahun 2018. Kementerian Riset, Teknologi, Dan Pendidikan Tinggi Direktorat Jenderal Penguatan Riset Dan Pengembangan

Alhamdulillah, Penelitian Strategis Nasional Institusi (PSNI) tahap lanjutan / tahun ke-2, lolos pendanaan KemenRistek Dikti Direktorat Jenderal Penguatan Riset Dan Pengembangan. Semoga pelaksanaannya dimudahkan dan dilancarkan, hasilnya bermanfaat bagi peneliti/instansi, masyarakat, bangsa dan negara.

Perguruan Tinggi : Universitas Islam 45 Bekasi (Unisma Bekasi)
Skema : Penelitian Strategis Nasional Institusi (PSNI)
Nama Ketua Peneliti : Andi Hasad
Status Usulan : Lanjutan
Judul : Pengembangan Sistem Piconet Pervasive Pada Transmisi Data Rate Video Streaming Melalui Jaringan Bluetooth Sebagai Media Pembelajaran di Perguruan Tinggi

Dalam pendanaan tahun 2018, tercatat 4 dosen Peneliti (semua dari Fakultas Teknik Unisma Bekasi) yang lolos pendanaan skema Penelitian Strategis Nasional Institusi (PSNI) untuk tahap lanjutan / tahun ke-2, sedangkan dalam skema Penelitian lainnya untuk tahap baru terdiri dari 19 Peneliti untuk skema Dosen Pemula (PDP), 3 Peneliti skema Penelitian Disertasi Doktor (PDD) dan 1 Peneliti untuk skema PKPT , dari berbagai Fakultas di Universitas Islam 45 Bekasi.

Selengkapnya surat dan daftar Penerima Pendanaan Penelitian dan Pengabdian Masyarakat di Perguruan Tinggi Tahun 2018, dapat dilihat pada lampiran file berikut :

Referensi:

Simlitabmas Ristek Dikti

Andi Hasad Presentasi di Monev Eksternal Penelitian Kemenristek Dikti 2017

Presentasi Monev Eksternal Penelitian Kemenristek Dikti di depan Reviewer Dikti; Dr. Eng Sidik Marsudi, pada kamis 12 Oktober 2017 di Universitas Juanda, Ciawi, Bogor.

Andi Hasad Presentasi di Monev Internal Pelaksanaan Penelitian dan Pengabdian Pada Masyarakat 2017

Presenter di Monev Internal Pelaksanaan Penelitian dan Pengabdian Pada Masyarakat di LPPM Universitas Islam 45 (Unisma), Bekasi 31 Agustus 2017

Presentasi Seminar Usul Penelitian Produk Terapan dan Penelitian Unggulan Perguruan Tinggi Tahun 2016

Presentasi PPT 15-16082016

Seminar Usulan PPT 1

Seminar Usulan PPT 2

Ketua Peneliti dan Para Reviewer PPT 2016

Kegiatan Seminar Usulan Program Riset Terapan ( Penelitian Produk Terapan, Penelitian Unggulan Perguruan Tinggi) Tahun 2016 ini bertujuan antara lain:

  1. Mengundang para ketua peneliti (yang usulan penelitiannya lulus pada seleksi tahap pertama/Desk Evaluation) untuk mempresentasikan usul penelitiannya di hadapan para reviewer sebagai penilai.
  2. Menilai usulan penelitian ( Penelitian Produk Terapan, Penelitian Unggulan Perguruan TInggi) PTS Kelompok Binaan Tahun 2016 dari perguruan tinggi yang lulus seleksi tahap pertama.
  3. Untuk Ditetapkan sebagai calon penerima penelitian tahun 2017.
  4. Untuk memastikan tidak adanya duplikasi penelitian.

Dari Universitas Islam 45 Bekasi, ada 4 proposal yang dinyatakan lulus Desk Evaluation, dan masuk ke tahap berikutnya presentasi seminar usul penelitian, yaitu:

  1. Andi Hasad (Ketua Peneliti), Program Studi Teknik Elektronika,  Universitas Islam 45 Bekasi
  2. Sugeng (Ketua Peneliti), Program Studi Teknik Elektro, Universitas Islam 45 Bekasi
  3. Anita Setyowati Srie Gunarti (Ketua Peneliti), Program Studi Teknik Sipil,  Universitas Islam 45 Bekasi
  4. Rahmadya Trias Handayanto (Ketua Peneliti), Program Studi Teknik Komputer,  Universitas Islam 45 Bekasi

Ketua Peneliti PPT Unisma Bekasi

Salah satu reviewer Dikti pada kegiatan ini adalah Prof. Dr. Kuncoro, S.T., M.T., Guru Besar Universitas Sebelas Maret, Solo. Kegiatan ini berjalan lancar dan sukses , 15-16 Agustus 2016, berlokasi di Hotel Harris, Jl. Peta Bandung.

Hasil dari kegiatan ini merupakan pertimbangan bagi Direktorat Riset dan Pengabdian Masyarakat, Direktorat Jenderal Penguatan Riset dan Pengembangan, dalam menentukan usulan baru penelitian yang akan didanai pada tahun anggaran 2017.

Lampiran:

Undangan Peserta Seminar Usulan Penelitian Riset Terapan Tahun 2016 di Bandung

Lampiran Undangan Seminar Usul Riset Terapan

Sumber:

Panduan Kegiatan Seminar Susulan Program Riset Terapan ( Penelitian Produk Terapan, Penelitian Unggulan Perguruan Tinggi) PTS Kelompok Binaan. DRPM, Ditjen Penguatan Riset dan Pengembangan. Ristek DIKTI, 2016.

Journal

Variant Scheme of Adaptive Tracking Control for Robot Manipulators
HUANG Chunqing
Electrics, Communication and Autocontrol Technology 29 October 2011 Download

High-Order Analytic Approximation for MOSFET Surface Potential with Lateral Channel Field Effect
CHANG Sheng,HUANG Qijun,WANG Gaofeng,WANG Hao
Electrics, Communication and Autocontrol Technology 11 October 2011 Download

A handover scheme with an adaptive triggering window mechanism in LTE-advanced systems
WANG Yu
Electrics, Communication and Autocontrol Technology 08 October 2011 Download

Verification and Validation of Simulation Models
Sargent RG
Proceeding of The 1998 Winter Simulation Conference Download

Automatic Parallelization of Divide and Conquer Algorithms
(Radu Rugina and Martin Rinard)
Laboratory for Computer Science
Massachusetts Institute of Technology
Cambridge  MA ….  Download

Divide and Conquer for the Solution of Banded Linear Systems of Equations
(M. Hegland)
Australian National University
Computer Sciences Laboratory
Canberra, ACT, 0200 … Download

Dividing and Conquering Long Sentences in a Translation System
(Peter F. Brown, Stephen A. Della Pietra, Vincent J. Della Pietra, Robert L. Mercer, and Surya Mohanty)
IBM Thomas J. Watson Research Center
Yorktown Heights, NY 10598 … Download

Dynamic programming algorithms for RNA secondary structure prediction with pseudoknots
(Tatsuya Akutsu)
Human Genome Center, Institute of Medical Science, University of Tokyo, 4-6-1 Shirokanedai,
Minato-ku, Tokyo 108-8639, Japan … Download

A Dynamic Programming Approach to Sequencing Problems
(Michael Held; Richard M. Karp)
Journal of the Society for Industrial and Applied Mathematics, Vol. 10, No. 1 (Mar., 1962), 196-210 …  Download

Disk scheduling algorithms based on rotational position
(David M. Jacobson and John Wilkes)
Concurrent Systems Project, Palo Alto, CA Technical report HPL–CSP–91–7rev1, 26th February 1991, revised 1st March 1991.
(Issued electronically 10th May 1995) … Download

A Greedy Algorithm for Aligning DNA Sequences
(ZHENG ZHANG, SCOTT SCHWARTZ, LUKAS WAGNER, and WEBB MILLER) …  Download

GPSR: Greedy Perimeter Stateless Routing for Wireless Network
(Brad Karp , Harvard University / ACIRI, and H. T. Kung, Harvard University) … Download

Greedy Algorithms for Sequential Sensing Decisions
(Hannaneh Hajishirzi, Afsaneh Shirazi, Jaesik Choi, Eyal Amir)
Computer Science Department University of Illinois at Urbana-Champaign
Urbana, IL 61801, USA … Download

Handling forecasting problems using fuzzy time series
(Jeng-Reng Hwang, Shyi-Ming Chen, Chia-Hoang Lee) … Download

Private Download

1. An Architecture for Interoperability of Embedded Systems and Virtual Reality
(By Veit Köppen, Norbert Siegmund, Michael Soffner and Gunter Saake)
Institute for Business and Technical Information Systems, Department of Computer Science, University of Magdeburg, Germany …Download

2. Provably Secure Cluster-based Group Key Agreement for Ad hoc Networks

(By Fucai Zhou, Hui Li, Jian Xu, Bing Yu)
College of Information Science and Engineering, Northeastern University, 11, Lane 3, Wenhua Road, Heping Shenyang Liaoning, China 110004, Shenyang China, Software College, Northeastern University, Mailbox 349,11, Lane 3, Wenhua Road, Heping Shenyang Liaoning, China 110004, Shenyang China …Download

3. Asserting and Checking Determinism for Multithreaded Programs

(By Jacob Burnim and Koushik Sen) …Download

4. Inside risks, risks of Undisciplined Development

(By David L. Parnas) …Download

5. Performance Evaluation and Model Checking Join Forces

(By Christel Baier, Boudewijn R. Haverkort, Holger Hermanns, and Joost-Pieter Katoen) …Download

6. Ready or not, computers are coming to the people Inventing the PC

(By Paul E. Ceruzzi) …Download

7. Security Advice; Malvertisements; and CS Education in Qatar

(By Greg Linden is the founder of geeky Ventures. Jason hong is an associate professor of computer science at Carnegie mellon University. Mark Guzdial is a professor at the georgia institute of technology) …Download

8. Situated Learning and Identity Development in a Korean Older Adults’ Computer Classroom
(By Young Sek Kim and Sharan B. Merriam) …Download

9. The Ideal HPC Programming Language

(By euGene Loh) …Download

10.x86-TSO: A Rigorous and Usable Programmer’s Model for x86 Multiprocessors

(By Peter Sewell, Susmit Sarkar, Scott Owens, Francesco Zappa nardelli, and Magnus O. Myreen) …Download

11.A Matter of Computer Time

(By Donna Celano and Susan B. Neuman) …Download

12.A Neuromorphic Approach to Computer Vision

(By Thomas Serre and Tomaso Poggio) …Download

13.Computer Graphics for All

(By Takeo Igarashi) …Download

14.Difference Engine Harnessing Memory Redundancy in Virtual Machines

(By  Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat) …Download

15.Memory Models A Case for Rethinking Parallel Languages and Hardware

(By  Sarita V. Adve and Hans-J. Boehm) …Download

16.Plat-Forms Is there one best Web development technology

(By  Lutz Prechelt) …Download

17.Reasoning About the Unknown in Static Analysis
(By Isil Dillig, Thomas Dillig, and Alex Aiken) …Download

18.WNetSim : a web-based computer network simulator
(By N. Jovanovic, R. Popovic and Z. Jovanovic)
Business School of Professional Studies, Blace, Serbia
Faculty of Informatics and Management, Singidunum University,
Faculty of Electrical Engineering, University of Belgrade, Serbia …Download

19.Certified Software
(By Zhong Shao) …Download

20.Commonsense Understanding of Concurrency Computing Students and Concert Tickets
(By Gary Lewandowski, Dennis J. Bouvier, Tzu-Yi Chen, Robert Mccartney, Kate Sanders, Beth Simon, And Tammy Vandegrift) …Download

21.Efficient Image Encryption Using a Chaos-based PWL Memristor
(By Zhaohui Lin and Hongxia Wang)
School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, People’s Republic of China …Download

22.Native Client A Sandbox for Portable, Untrusted x86 Native Code
(By Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, tavis ormandy, Shiki okasaka, neha narula, and nicholas fullagar) …Download

23.Paper-based and computer-based concept mappings The effects on computer achievement, computer anxiety and computer attitude
(By Yavuz Erdogan)
Department of Computer and Instructional Technologies at Marmara University in Turkey …Download

24.QIP = PSPACE
(By Rahul Jain, Zhengfeng Ji, Sarvagya Upadhyay, and John Watrous) …Download

25.Relative Status of Journal and Conference Publications in Computer Science
(By Jill Freyne, Lorcan Coyle, Barry smyth, and Padraig Cunningham) …Download

26.SeL4 Formal Verification of an Operating-System Kernel
(By Gerwin Klein, June Andronick, Kevin Elphinstone, Gernot Heiser, David Cock, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt, Rafal Kolanski, Michael Norrish, Thomas Sewell, Harvey Tuch, and Simon Winwood) …Download

27.Seven Principles for Selecting Software Packages
(By Jan Damsgaard and Jan Karlsbjerg) …Download

28.Software Development with Code Maps
(By Robert Deline, Gina Venolia, and Kael Rowan) …Download

29.The Singularity System
(By James Larus and Galen Hunt) …Download

30.Think Big for Reuse
(By Paul D. Witman and Terry Ryan) …Download

31.Thinking Clearly About Performance, Part 2
(By Cary Millsap) …Download

32.Viewpoint Objects Never Well, Hardly Ever
(By Mordechai Ben-Ari) …Download

33.You’re Doing It Wrong
(By Poul-Henning Kamp) …Download

Facebook Andi Hasad | Photo-Photo Terkini