Claim Missing Document
Check
Articles

Found 11 Documents
Search

The Design of Capacitive Slit on Improving the Antenna Gain of Binomial Double Strip Hexacula Omnidirectional Broadband Antenna Syahrial Syahrial; Safwan Safwan; Rizal Munadi; Roslidar Roslidar
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 5: October 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i5.8669

Abstract

The capacitive slit is a method of making the impedance value to be resistive. To achieve this goal is a challenge in addition to the slit antenna and gives impact to gain as one of the important parameters in antenna design. The antenna gain in a particular direction is defined as 4π times the ratio of radiation intensity in that direction to the power received by the transmitter antenna. In this research, the proposed capacitive slit method was tested on the hexacula omnidirectional broadband antenna operating on frequency 0.85-3 GHz and gain 4.8 dBi. The testing was conducted to obtain the gain improvement of the hexacula omnidirectional broadband antenna. The placement of the capacitive slit was implemented on double strip antenna with 4 times experiments. The best experiment result was obtained when three capacitive slits were placed on different strips. The capacitive slit was designed by analyzing the average value of input impedance before calculating the dimension of the capacitive slit that applied to the antenna. The experiment result shows that the best value of antenna gain is 7.19 dBi. The gain increment is linear to the number of capacitive slits applied to the antenna.
Perancangan Augmented Reality dengan Metode Marker Card Detection dalam Pengenalan Karakter Korea Nurrisma Nurrisma; Rizal Munadi; Syahrial Syahrial; Ernita Dewi Meutia
Informatika Mulawarman : Jurnal Ilmiah Ilmu Komputer Vol 16, No 1 (2021): Informatika Mulawarman : Jurnal Ilmiah Ilmu Komputer
Publisher : Mulawarman University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30872/jim.v16i1.5152

Abstract

Augmented Reality (AR) merupakan teknologi yang menggabungkan objek nyata dan objek virtual dalam dua dimensi (2D) atau tiga dimensi (3D) secara real time. Pengembangan aplikasi AR telah banyak dilakukan pada berbagai bidang, termasuk bidang pendidikan yaitu pada pembelajaran bahasa asing. Penelitian ini bertujuan untuk membangun aplikasi pengenalan karakter huruf Korea yang berjumlah 24 huruf pada sistem operasi Android. Aplikasi ini dibangun menggunakan Unity 3D, Vuforia dengan algoritme FAST corner detection dan objek 3D yang dibuat menggunakan Blender 3D. Aplikasi ini memanfaatkan metode marker based tracking terhadap marker yang dirancang, yaitu marker card detection. Marker ini digunakan untuk menentukan titik munculnya objek 3D. Berdasarkan hasil pengujian, marker yang dirancang mampu menangkap objek 3D pada jarak 270 cm. Pengujian pengenalan karakter Korea terhadap 30 pengguna menunjukkan peningkatan sebesar 70% dalam memahami karakter Korea. Hasil pengukuran respon terhadap aplikasi dengan menggunakan skala Likert, diperoleh skor 82,6% dengan kriteria sangat baik. Penelitian ini berhasil membuktikan bahwa AR dapat digunakan sebagai media alternatif untuk pembelajaran bahasa asing, khususnya pengenalan karakter Korea.
Implementasi Metode Simple Additive Weighting Pada Penentuan Peringkat Kerentanan Website (Studi Kasus Website Universitas Negeri Aceh) Mukhroji Mukroji; Rizal Munadi; Syahrial Syahrial
Informatika Mulawarman : Jurnal Ilmiah Ilmu Komputer Vol 14, No 1 (2019): Informatika Mulawarman : Jurnal Ilmiah Ilmu Komputer
Publisher : Mulawarman University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (584.53 KB) | DOI: 10.30872/jim.v14i1.1431

Abstract

Dewasa ini, penggunaan website sebagai media informasi merupakan suatu hal lazim yang dilakukan oleh berbagai institusi atau organisasi. Informasi yang disajikan sangat bervariatif, dari hanya informasi sederhana hingga informasi yang sensitif yang memerlukan penanganan keamanan yang baik. Terjadinya tindakan penyusupan atau penyalahgunaan terhadap suatu website dapat dilakukan oleh pihak tertentu dengan berbagai motif jika tindakan pengamanan tidak diimplementasikan. Akibatnya, kerentanan website dapat mengganggu informasi yang diakses oleh masyarakat. Oleh karena itu, dalam penelitian ini kerentanan website menjadi fokus yang dikaji dan pengujian kerentanan dilakukan dengan software Open Web Application Security Project (OWASP). Kemudian, hasil dari pengujian dengan OWASP akan diimplementasikan dengan menggunakan metode Simple Additive Weighting (SAW). Penerapan metode SAW ini akan menghasilkan pengurutan nilai kerentanan dari setiap website yang diuji dan dapat menjadi gambaran kualitas keamanan website Universitas Negeri di Provinsi Aceh. Berdasarkan hasil pengujian diperoleh tingkat kerentanan tertinggi terjadi pada universitas yang tidak menggunakan CMS sebagai aplikasi pada website yang dibangun.
Evaluasi Pengaruh Parameter TIM Berdasarkan Multirate Terhadap Konsumsi Energi Jaringan IEEE 802.11ah Daifi Afrila Riefi; Teuku Yuliar Arif; Syahrial
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 4 (2021): Agustus 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (569.73 KB) | DOI: 10.29207/resti.v5i4.3224

Abstract

WLAN IEEE 802.11ah is wireless standard technology which potentially used for IoT networking to provide longer range transmission than WPAN and LPWAN. MAC layer IEEE 802.11ah introduces TIM segmentation scheme that provides effective management toward STA in large amount to make the energy consumption efficiently. STA is organized in hierarchical structure that allows TIM segmentation to reduce the length of frame beacon contains TIM. In case there’s no segmentation in a network with many STA, the TIM would be longer and requires all STA to wake-up receiving beacon TIM including STA without downlink data. This research intends to evaluate and analyze the TIM optimal parameters. Those are Page Period, Page Slice Length and Page Slice Count toward IEEE 802.11ah energy efficiency based on multirate using simulator NS-3 implemented on IEEE 802.11ah. As the result of STA experiment shows that Non-TIM is only optimal on sleep duration while TIM is optimal on energy consumption and delay packet. In the experiment of impact of STA/Slot amount based on Page Slice Length shows that sleep duration and energy consumption is optimal depends on the amount of the STA/Slot and data rate used while the optimal packet delay varies for each Page Slice Length.
RANCANG BANGUN ANTENA BROADBAND ENAM CABANG SALURAN DENGAN METODE BINOMIAL CELAH KAPASITIF TUNGGAL Safwan; Syahrial; Rizal Munadi
J-Innovation Vol. 5 No. 1 (2016): Jurnal J-Innovation
Publisher : Politeknik Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (775.029 KB) | DOI: 10.55600/jipa.v5i1.27

Abstract

In general, only one antenna is used for one application. To streamline the use of an antenna, a broadband antenna can be utilized for various applications. One broadband antenna suitable for various applications are broadband antennas six branches of the plate with a single capacitive gap binomial method. This antenna works in the frequency range 0.81 GHz - 3 GHz, which has a bandwidth of 2.19 GHz with a VSWR ≤ 1.5. This antenna has a dielectric antenna different. Dielectric antenna using materials from household waste such as plastic, paper, stereofoam, and others. It became one of the benefits is because the antenna is able to utilize waste materials for the application of technology. This antenna is relatively large dimensions so that the antenna is suitable for use in the transmission system and not be used as a suitable handset. Applications that can use this antenna including GSM 1900, Wifi 2.4 GHz, amateur radio, and more. This antenna uses a binomial method and a single capacitive gap as a method of widening the bandwidth. Binomial method is used to make the antenna impedance into tiers binomial pointless to shrink the transition effect antenna impedance of each level. slit method serves as a single capacitive impedance value improvements that will affect to the bandwidth of the antenna.
FIRST YEAR UNIVERSITY STUDENTS’ CONCEPTUAL UNDERSTANDING OF PHYSICAL AND CHEMICAL CHANGES (A Preliminary Research) Syahrial Syahrial; Sri Winarni
Chimica Didactica Acta Vol 9, No 1: June 2021
Publisher : FKIP USK

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (320.182 KB) | DOI: 10.24815/jcd.v9i1.21210

Abstract

The purpose of this study is to identify first year university students' understanding of the concepts of physical and chemical changes. This study involved 43 students from the 2019 batch of the Chemical Education Study Program (PSPK) of the Faculty of Science and Education (FKIP) of the Syiah Kuala University (USK) which was dominated by women (only 2 men). According to the objectives, the study used a survey method and used an instrument in the form of a questionnaire containing 15 statements. Participants were asked to provide responses via google form by choosing true or false for each statement item on the questionnaire. The results of the analysis show that the understanding of the majority of students is quite good for macroscopic markers or indicators and low for sub-microscopic markers or indicators. Therefore, chemistry teachers need to use molecular (sub-microscopic) images when teaching materials or topics of physical and chemical changes.
Analisis TCP Cubic dan Simulasi untuk Menentukan Parameter Congestion Window dan Throughput Optimal pada Jaringan Nirkabel Ad Hoc Ary Firnanda; Teuku Yuliar Arif; Syahrial Syahrial
Jurnal Rekayasa Elektrika Vol 13, No 2 (2017)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (677.865 KB) | DOI: 10.17529/jre.v13i2.4874

Abstract

Ad hoc wireless network performance often declines caused the onset of congestion on the process of sending data. TCP Congestion Control used to solve these problems. TCP Cubic is one variant TCP Congestion Control. This research was conducted with the test and compare between variable value b=0.2 with the value of the variable b to be used in ad hoc wireless networks. This research was conducted with the experimental method using network simulation software NS-3. The results showed that the value of variable b is the right on ad hoc wireless network with packet loss by 5% to generate optimal congestion window max is b=0.5 and the average throughput optimal is b=0.1
Kombinasi Waktu Sinkronisasi dan Nilai Salt untuk Peningkatan Keamanan pada Single Sign-On Rizal Munadi; Zuhar Musliyana; Teuku Yuliar Arif; Afdhal; Syahrial
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1026.358 KB)

Abstract

Single sign-on (SSO) is a session authentication process that allows a user to login by using user registered identity and password in order to access appropriate applications. The authentication process takes the user in to login for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session. Its implementation will provide a reduction of password burden to access many applications for every login process. Ease of access through a single account needs to be addressed carefully to ensure the authentication credentials that are not scattered and known by others. Currently, there are several open source SSO authentication methods available. However, the use of existing authentication methods is still vulnerable to attack, such as Man-In-The-Middle. In this study, SSO authentication algorithm using One-Time Password (OTP) is proposed using a combination of time synchronization and salt value. These combinations are used to verify user session while accessing any application with SSO mechanism. The results show that the proposed OTP algorithm can handle SSO authentication process in good fashion and also protect from Man-In-The-Middle Attack.
Decision tree method to classify the electroencephalography-based emotion data Teuku Muhammad Mirza Keumala; Melinda Melinda; Syahrial Syahrial
JURNAL INFOTEL Vol 14 No 1 (2022): February 2022
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v14i1.750

Abstract

Electroencephalography (EEG) data contains recordings of brain signal activity divided into several channels with different impulse responses that can be used to detect human emotions. In classifying emotions, EEG data needs to be parsed or signal processed into values ​​that can help recognize emotions. Research related to electroencephalography has been carried out previously and has experienced success using the Fuzzy C-Means, Multiple Discriminant Analysis, and Deep Neural Network methods. This study was conducted to classify human emotions from electroencephalography data on 10 participants. Each participant carried out 40 trials of testing using the Power Spectral Density (PSD) and Discrete Wavelet Transform (DWT) methods at the initial stage of classification and the Decision Tree method as the final method that can improve the accuracy of the two methods at the initial stage of classification. The results of this study were the finding of 2 participants (3 trials) who were unmatched from a total of 10 participants (400 trials), which were analyzed using the decision tree method. The decision tree method can correct this error and increase the classification result to 100%. The DWT method is used as a reference in the classification of emotions, considering that the DWT method has an output of arousal and valance values ​​. In contrast, the PSD method only has a combined output.
Analisis TCP Cubic dan Simulasi untuk Menentukan Parameter Congestion Window dan Throughput Optimal pada Jaringan Nirkabel Ad Hoc Ary Firnanda; Teuku Yuliar Arif; Syahrial Syahrial
Jurnal Rekayasa Elektrika Vol 13, No 2 (2017)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v13i2.4874

Abstract

Ad hoc wireless network performance often declines caused the onset of congestion on the process of sending data. TCP Congestion Control used to solve these problems. TCP Cubic is one variant TCP Congestion Control. This research was conducted with the test and compare between variable value b=0.2 with the value of the variable b to be used in ad hoc wireless networks. This research was conducted with the experimental method using network simulation software NS-3. The results showed that the value of variable b is the right on ad hoc wireless network with packet loss by 5% to generate optimal congestion window max is b=0.5 and the average throughput optimal is b=0.1