Claim Missing Document
Check
Articles

Prediksi konsumsi beras menggunakan metode regresi linear pada sistem kotak beras cerdas Mulia Hanif; Maman Abdurohman; Aji Gautama Putrada
Jurnal Teknologi dan Sistem Komputer Volume 8, Issue 4, Year 2020 (October 2020)
Publisher : Department of Computer Engineering, Engineering Faculty, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jtsiskom.2020.13353

Abstract

Currently, the smart rice box has applied the Internet of Things (IoT) but without prediction of rice runs out which shows the amount of rice consumption. This study applies linear regression to predict the rice runs out in an IoT-based smart rice box and analyzes its performance. The prediction used the dataset obtained by measuring a smart rice box equipped with a load cell weight sensor and Hx711 module. The weight sensor accuracy was an RMSE of between 56 and 170 grams. The linear regression method applied to the smart rice box to predict rice running out has an MSE value of 0.2588 with a prediction window of 43 days. An R-squared value of less than one is obtained with a predictive threshold of 24 days.
Peningkatan quality of experience pada permainan online multiplayer berbasis Arduino dengan menggunakan MQTT server Gabe Dimas Wicaksana; Maman Abdurohman; Aji Gautama Putrada
Jurnal Teknologi dan Sistem Komputer Volume 8, Issue 1, Year 2020 (January 2020)
Publisher : Department of Computer Engineering, Engineering Faculty, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (17.219 KB) | DOI: 10.14710/jtsiskom.8.1.2020.36-43

Abstract

Online multiplayer games require internet networks to play with opposing players more exciting because multiple players can fight each other. The game experiences lag, which is expressed as the quality of experience (QoE), is one of the most common problems for online multiplayer games, causing the games less exciting to play. This study examined the implementation of Message Queue Telemetry Transport (MQTT) as a communication protocol in multiplayer online games using Arduino and compared its performance against HTTP. QoE used data collected using the mean opinion score (MOS) method. The MQTT resulted in an average QoE score of 3.9 (Pingpong) and 4 (TicTacToe) MOS units, while on HTTP 3.8 (PingPong and TicTacToe). The use of the MQTT communication protocol can improve the QoE of multiplayer online game players compared to HTTP.
Studi Perbandingan Performa Algoritma Penjadwalan untuk Real Time Data Twitter pada Hadoop Sidik Prabowo; Maman Abdurohman
Komputika : Jurnal Sistem Komputer Vol 9 No 1 (2020): Komputika: Jurnal Sistem Komputer
Publisher : Computer Engineering Departement, Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (354.164 KB) | DOI: 10.34010/komputika.v9i1.2848

Abstract

Hadoop is an open source and java based software framework. Hadoop consists of two main components, namely MapReduce and Hadoop Distributed File System (HDFS). MapReduce consists of Map and Reduce which are used for data processing, while HDFS is a places or directory where data can be stored. In carrying out a job that is not uncommonly diverse in its execution characteristics, a proper job scheduler is needed. There are many job schedulers that can be selected to matching job characteristics. Fair Scheduler uses a scheduler where the principle is to ensures that jobs will get the same resources as other jobs, with the aim of improving performance in terms of Average Completion Time. Hadoop Fair Sojourn Protocol Scheduler is a scheduling algorithm in Hadoop that can do scheduling based on the size of jobs provided. This study aims to compare the performance of the two schedulers for Twitter data characteristics. The test results show the Hadoop Fair Sojourn Protocol Scheduler has a better performance than the Fair Scheduler both from handling average completion time of 9.31% and job throughput of 23.46%. Then the Fair Scheduler excels in the task fail rate parameter of 23.98%.
A Survey on Phishing Website Detection Using Hadoop Muhammad Rayhan Natadimadja; Maman Abdurohman; Hilal Hudan Nuha
Jurnal Informatika Universitas Pamulang Vol 5, No 3 (2020): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32493/informatika.v5i3.6672

Abstract

Phishing is an activity carried out by phishers with the aim of stealing personal data of internet users such as user IDs, password, and banking account, that data will be used for their personal interests. Average internet user will be easily trapped by phishers due to the similarity of the websites they visit to the original websites. Because there are several attributes that must be considered, most of internet user finds it difficult to distinguish between an authentic website or not. There are many ways to detecting a phishing website, but the existing phishing website detection system is too time-consuming and very dependent on the database it has. In this research, the focus of Hadoop MapReduce is to quickly retrieve some of the attributes of a phishing website that has an important role in identifying a phishing website, and then informing to users whether the website is a phishing website or not.
Improving Reliability of Wireless Sensor Network (WSN) Using Network Coding Multipath Routing Maman Abdurohman
ComTech: Computer, Mathematics and Engineering Applications Vol. 8 No. 3 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i3.3876

Abstract

This research proposed new method to improve performance of WSN. It used network coding on transmission scheme. The researcher had modified the existing network coding multipath routing for a novel node selection to own residual power node in network coding routing mechanism and to improve reliability of a WSN. This routing mechanism was placed in router for routing purpose. Then, Software network simulation method was done by using OMNET++ platform and MiXiM Framework library. The result shows that proposed method to select nodes and execute network coding succeeds on improving performance of WSN like the reliability compared to the previous method.
Improving Distributed Denial of Service (DDOS) Detection using Entropy Method in Software Defined Network (SDN) Maman Abdurohman; Dani Prasetiawan; Fazmah Arif Yulianto
ComTech: Computer, Mathematics and Engineering Applications Vol. 8 No. 4 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i4.3902

Abstract

This research proposed a new method to enhance Distributed Denial of Service (DDoS) detection attack on Software Defined Network (SDN) environment. This research utilized the OpenFlow controller of SDN for DDoS attack detection using modified method and regarding entropy value. The new method would check whether the traffic was a normal traffic or DDoS attack by measuring the randomness of the packets. This method consisted of two steps, detecting attack and checking the entropy. The result shows that the new method can reduce false positive when there is a temporary and sudden increase in normal traffic. The new method succeeds in not detecting this as a DDoS attack. Compared to previous methods, this proposed method can enhance DDoS attack detection on SDN environment.
PENERAPAN TEKNOLOGI LOCATION AWARENESS SYSTEM UNTUK PENINGKATAN PEREKONOMIAN PENGUSAHA MIKRO-KECIL-MENENGAH (UMKM) DI PANGANDARAN Maman Abdurohman; Novian Anggis Suwastika; Erwid M Jadid; Sidik Prabowo
Charity : Jurnal Pengabdian Masyarakat Vol 2 No 1 (2019): Charity - Jurnal Pengabdian Masyarakat
Publisher : PPM Universitas Telkom

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/charity.v2i1.2064

Abstract

Pangandaran merupakan daerah pariwisata yang dikunjungi ratusan ribuan pengunjung setiap tahunnya. Tingginya jumlah pengunjung ke daerah pariwisita Pangandaran memicu munculnya banyak pengusaha kecil dan menengah di daerah tersebut. Pengusaha di bidang penginapan murah, souvenir, makanan, dan jasa guide wisata adalah beberapa contoh bidang usaha kecil dan menengah yang tumbuh subur. Meningkatnya jumlah usaha di masing-masing bidang meningkatkan kompetisi dan berpengaruh terhadap cara dan pendekatan marketing untuk mendapatkan pelanggan. Kebutuhan wisatawan adalah informasi yang akurat dan tepat mengenai produk atau jasa layanan yang ditawarkan. Marketing berbasis teknologi informasi terutama teknologi yang memanfaatkan internet merupakan salah satu cara yang paling efektif dan efisien yang digunakan untuk melakukan marketing. Salah satu contoh teknologi informasi berbasis internet adalah media social yang berbasis aplikasi geotagging memudahkan pengguna untuk membaca review serta penunjuk lokasi dengan tepat.Teknologi location awereness systema dalah teknologi berbasis internet yang dapat digunakan pengguna untuk mendapatkan informasi yang tepat dan akurat berbasis pada lokasi – lokasi yang diinginkan oleh pengguna. Bagi pengusaha teknologi ini dapat dimanfaatkan untuk melakukan marketing atau promosi kepada calon pembeli / pengguna jasa. Teknologi location awereness system yang dibangun berbasis website yang dapat diakses dengan berbagai perangkat, baik perangkat desktop maupun mobile (smartphone yang banyak dimiliki oleh wisatawan).
Manufacturing a Plotter Printer with Computer Numerical Control Based Pen Ink Using CoreXY Mechanisms Veshea Falerie Goszal; Hilal Hudan Nuha; Maman Abdurohman
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 5, No 2 (2021): April 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v5i2.2783

Abstract

In the process of printing images, a high-quality plotter printer is required to obtain better printed images. This causes the costs incurred to purchase a plotter printer become even higher along with the quality of the printout. In addition, the use of original plotter printer ink is significantly more expensive than that of the non-original ink. Therefore, this paper proposes a pen based computer plotter printer design using the CoreXY framework. This framework is based on a 2D in-axis motion control technique using a single continuous belt for both axes. To evaluate the performance of the proposed design, the level precision for vector and raster modes are measured using the Mean Absolute Percentage (MAPE). Based on the results of precision measurements, it was found that the printer prototype designed to produce high-precision images with affordable pen ink costs and can process digital instructions from a computer using Computer Numerical Control (CNC).
PENINGKATAN PERFORMANSI PROSESOR DLX DENGAN METODE PIPELINE Maman Abdurohman
TEKTRIKA Vol 8 No 2 (2003)
Publisher : Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/tektrika.v8i2.230

Abstract

Prosesor DLX adalah sebuah prosesor berbasis RISC (Reduced Instruction Set Computer) yang dirancang sebagai prosesor tujuan umum (general purpose processor). Prosesor ini mempunyai arsitektur load-store dengan panjang semua instruksinya 32 bit. Setiap instruksi dieksekusi dalam beberapa siklus waktu (cycletime). Secara umum time cycle yang digunakan sebanyak lima tahap yang terdiri dari tahap-tahap : Instruction Fetch (IF), Instruction Decode (ID), Execute (EX), Memory Access (MEM), dan Write Back (WB). Kelima tahap ini dikerjakan secara berurutan [2]. Sebagai prosesor multicycle, DLX mempunyai peluang untuk meningkatkan kinerjanya yang diukur dengan kecepatan proses yang dinyatkan sebagai waktu CPU (CPU time). Peningkatan kinerja prosesor DLX dapat diterapkan dengan menggunakan teknik pipeline. Pada jurnal ini telah dianalisis peningkatan performansi prosesor DLX dengan menggunakan teknik pipeline. Uji coba dilakukan terhadap beberapa program aplikasi yang dieksekusi dengan menggunakan teknik pipeline dan tanpa menggunakan teknik pipeline. Secara umum terjadi peningkatan kecepatan pada setiap kumpulan instruksi yang dianalisis. Proses pengujian dilakukan dengan menggunakan simulator windlx yang merupakan simulator prosesor DLX.Kata kunci : Prosesor DLX, RISC, general purpose processor, CPU, Pipeline, windlx
KINERJA ALGORITMA BRANCH PREDICTION DALAM MENGATASI CONTROL HAZARD PADA PIPELINE PROSESOR DLX Maman Abdurohman
TEKTRIKA Vol 9 No 1 (2004)
Publisher : Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/tektrika.v9i1.237

Abstract

Penerapan teknik pipeline pada prosesor DLX dapat meningkatkan kinerja/kecepatan prosesor tersebut. Pada implementasinya, teknik pipeline tidak dapat diterapkan secara penuh karena timbulnya hambatan yang disebut dengan risiko pipeline (pipeline hazards) yang terdiri dari: data hazard, structural hazarddan control hazard. Dengan terjadinya hazard, maka kinerja yang dicapai oleh pipeline sulit untuk mencapai kondisi ideal, karena prosesor harus melakukan pipeline stall, yaitu satu atau beberapa tahap pipeline harus dihentikan. Kendala yang terdapat pada risiko kendali (control hazard) adalah kesulitan untuk menentukan kontrol berikutnya pada saat terjadi pencabangan. Hal ini berkenaan dengan pengubahan nilai PC untuk menunjukkan instruksi berikutnya yang akan dieksekusi. Dengan adanya control hazard, maka ada satu tahap atau lebih yang dihentikan. Untuk mengatasi masalah ini, salah satu algoritma yang sering digunakan adalah algoritma untuk memprediksi terjadinya pencabangan yang disebut dengan branch prediction algorithm (algoritma prediksi pencabangan). Algoritma ini merupakan salah satu usaha untuk memprediksi terjadinya pencabangan pada instruksi pencabangan. Tulisan ini merupakan analisis yang mengevaluasi penerapan branch prediction algorithm untuk mengatasi control hazard yang terjadi pada pipeline prosesor dlx. Pengujian dilakukan pada beberapa aplikasi dengan mengujinya pada dlxsim. Hasil pengujian menunjukan bahwa algoritma ini cukup efektif untuk mengatasi control hazard akibat instruksi pencabangan pada beberapa aplikasi.