Claim Missing Document
Check
Articles

Found 16 Documents
Search

ANALISIS KINERJA ISCSI TARGET PADA WIRELESS LAN MEMAKAI STANDAR LIO Rizal Bahaweres; Tjetjep Rony Budiman; Andi Adriansyah
SINERGI Vol 19, No 1 (2015)
Publisher : Universitas Mercu Buana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (782.815 KB) | DOI: 10.22441/sinergi.2015.1.005

Abstract

Semakin banyaknya kebutuhan data center maupun laboratorium komputer di Indonesia dipengaruhi oleh semakin banyaknya pengguna yang memanfaatkan komputer baik untuk bisnis maupun pendidikan. Salah satu kebutuhan utama yang tidak bisa dilepaskan dari pemakaian komputer adalah tempat penyimpanan baik berupa USB Flash Disk, HD Eksternal, HD Internal sampai HD untuk kebutuhan skala besar untuk komputer server yang berada di data center, laboratorium atau jaringan komputer. Ruang penyimpanan data atau data storage semakin berkembang dengan munculnya teknologi komputer jaringan yang memunculkan alternatif data storage berupa DAS, NAS, FC, FcoE dan iSCSI. iSCSI menggunakan standard TCP/IP protocol over Ethernet untuk menyediakan penyimpanan berbasis block. Saat ini ada 2 jenis multiprotocol SCSI Target utama di industri yaitu LIO dan COMSTAR yang menggantikan teknologi sebelumnya yaitu iET, SCST dan STGT. LIO (linux-iscsi.org) merupakan standard open source iSCSI Target untuk berbagi ruang penyimpanan di Linux. LIO mendukung storage fabrics, yaitu Fibre Channel (QLogic), FCoE, iEEE 1394, iSCSI, iSER (Mellanox InfiniBand), SRP (Mellanox InfiniBand), USB, vHost, dan lain-lain.
THE ACA-BASED PID CONTROLLER FOR ENHANCING A WHEELED-MOBILE ROBOT Heru Suwoyo; Zhou Thong; Yingzhong Tian; Andi Adriansyah; Muhammad Hafizd Ibnu Hajar
TEKNOKOM Vol. 5 No. 1 (2022): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (734.663 KB) | DOI: 10.31943/teknokom.v5i1.74

Abstract

Wall-following control of mobile robot is an important topic in the mobile robot researches. The wall-following control problem is characterized by moving the robot along the wall in a desired direction while maintaining a constants distance to the wall. The existing control algorithms become complicated in implementation and not efficient enough. Ant colony algorithm (ACA), in terms of optimizing parameters, has a faster convergence speed and features that are easy to integrate with other methods. This paper adopts ant colony algorithm to optimize PID controller, and then selects ideal control parameters. The simulation results based on MATLAB show that the control system optimized by ant colony algorithm has higher efficiency than the traditional control systems in term of RMSE.
Integrated Speed and Driver Fatigue Detected with Method Image Processing Hadi Pranoto; Andi Adriansyah; Abdi Wahab; Dafit Feriyanto
International Journal of Advanced Technology Vol 1, No 1 (2020)
Publisher : Institute for Research on Innovation and Industrial System (IRIS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (482.405 KB) | DOI: 10.37869/ijatec.v1i1.7

Abstract

Integrated Speed and fatigue drivers detected with the image processing method are devices that can give a warning of fatigue when the driver operates a truck or bus, so that potential accidents can be minimized caused by driver fatigue. This device uses the image processing method by image processing with camera right on the driver's face to determine facial changes that include formulated driver yawning intervals in the form of Mount Aspect Ratio (MAR), Eye Aspect Ratio (ER), Eye State (ES), Mouth State (MS), and the Slifa Sleepiness Scale (SSS) is a scale used to describe the driver's sleep level. The results of this research are a device that can detect driver fatigue levels by connecting to speed limiting devices, from the data obtained when range float EAR value less than 0.2 eye close and then value 0.2-0.3 eye condition half open and then greater than 0.3 eye condition open, range float MAR value less than 0.5 mouth close condition, 0,5-0,8 mouth half open and greater than 0.8 mouth open condition, SSS value scale 1-9, if driver condition scale 1-5 fatigue not detected, if the driver scale 6-9 driver fatigue detected.
A queue theory in the cross-polarization of antenna in satellite communication Rio Mubarak; Setiyo Budiyanto; Putri Wulandari; Fajar Rahayu; Andi Adriansyah; Mudrik Alaydrus
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 2: May 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i2.pp884-892

Abstract

Satellite communication is a telecommunications technique that uses satellites as a connecting component, for example VSAT. In antenna installation, there is an important process which is called the cross-polarization. Cross-polarization is one process that cannot be released inside installation of VSAT antennas for satellite communication. Sometimes, in this process, a user queue will occur. Queuing theory explain the process is done and also calculate the other factors that are in the process. By knowing queuing theory to the cross-polarization, it will be easy to know the efficiency of queuing theory in the cross-polarization. Based on the characteristics of the cross-polarization, user can be known the queuing model that used and performance of the queuing system. The queuing model for the cross-polarization, using Kendall notation, M/M/1. Based on the analysis that has been done; by using 1 server the value of service level (ρ) is 0.67, using 2 servers = 0.33 and 3 servers = 0.22. The waiting time in the queue is longer if using 1 server which is 0.67 hours or 40 minutes. If a satellite operator uses 2 servers, waiting time in the queue is 25 minutes and 3 servers is 2.8 minutes which means that there is almost no waiting time in the queue.
Bandpass filter based on complementary split ring resonators at X-band Furqan Furqan; Said Attamimi; Andi Adriansyah; Mudrik Alaydrus
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 1: January 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v13.i1.pp243-248

Abstract

Complementary Split Ring Resonators were used integrated in a substrate integrated waveguide to generate passband charateristics in X-Band. Based on a parameter study with an electromagnetic commercial software, the characteristics of double and quadruple CSRRs according the reflection and transmission factor were observed. The computer simulation showed, the bandpass filter worked in the frequency range 8.12-8.63 GHz and 8.11-8.63 GHz for double and quadruple CSRR, respectively. The insertion loss was 0.12 dB and 0.015 dB. The measurement mit a vector network analyzer verified the simulation results. The frequeny range measured was 8.12-8.67 GHz and 8.12-8.61 GHz for double and quadruple CSRRs, respectively. The measured insertion loss was 0.25 dB and 0.2 dB.
Response time optimization for vulnerability management system by combining the benchmarking and scenario planning models Arif Basuki; Andi Adriansyah
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 1: February 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i1.pp561-570

Abstract

The growth of information and communication technology has made the internet network have many users. On the other side, this increases cybercrime and its risks. One of the main attack targets is network weakness. Therefore, cyber security is required, which first does a network scan to stop the attack. Points of vulnerability on the network can be discovered using scanning techniques. Furthermore, mitigation or recovery measures can be implemented. However, it needs a short response time and high accuracy while scanning to reduce the level of damage caused by cyber-attacks. In this paper, the proposed method improves the performance of a vulnerability management system based on network and port scanning by combining the benchmarking and scenario planning models. On a network scanning to discover open ports on a subnet, Masscan can achieve response times of less than 2 seconds, and on scenario planning for detection on a single host by Nmap can reach less than 4 seconds. It was combining both models obtained an adequate optimization response time. The total response time is less than 6 seconds.