Claim Missing Document
Check
Articles

Found 33 Documents
Search

A review of Image Processing Technique for Monitoring The Growth and Health of Cows Zurnawita Zurnawita; Cipto Prabowo; Rahmadi Kurnia; Ikhwana Elfitri
JITCE (Journal of Information Technology and Computer Engineering) Vol 7 No 01 (2023): Journal of Information Technology and Computer Engineering
Publisher : Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jitce.7.01.8-18.2023

Abstract

In general, monitoring of animal growth and health is done directly by farmers (invasive measurement methods) which can cause cows to be injured or experience stress. To avoid this, several studies have been conducted on non-invasive methods using image processing technology. In this study, we systematically reviewed several works of literature to identify and synthesize published articles on image processing technology and image processing applications related to weight estimation and individual cattle identification. Analysis of image processing technologies used for weight estimation and individual cattle identification is the main objective of this article. Articles were searched through several databases and studies that met the inclusion criteria were analyzed and used in the review. The studies were divided into three main themes: image processing technologies, applications using image processing, and image processing research on cattle growth and health. It can be concluded that deep learning approaches are increasingly being studied, tested and considered as a viable and promising approach to monitor cattle weight and health in several aspects
Ultra Wideband (UWB) Multiple Input and Multiple Output (MIMO) Antenna Design : A Review Firdaus Firdaus; Rahmadi Kurnia; Ikhwana Elfitri
Andalas Journal of Electrical and Electronic Engineering Technology Vol. 3 No. 1 (2023): May 2023
Publisher : Electrical Engineering Dept, Engineering Faculty, Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/ajeeet.v3i1.33

Abstract

Since the Federal Communication Commission (FCC) issued a license for the 3.1 – 10.6 GHz frequency spectrum for unlicensed radio applications, many papers have been published regarding ultrawideband (UWB) antenna design. The issue of UWB antenna design is determining how to create an antenna with a wide bandwidth, capable of rejecting communication systems that coexist with UWB bands, and capable of designing UWB antennas for multiple input multiple output (MIMO) communication system applications. This study examines the design of UWB antennas with monopole and slot types based on evaluations published over the last two decades. The discussion began with UWB and MIMO systems and then moved on to the configuration of monopole and slot UWB antennas. UWB antenna layout with notched bands and the several types of notched bands available. Finally, two port and quad-port MIMO antenna configuration is examined. To further understand UWB antenna design, numerous UWB antenna configurations are simulated. The outcomes of this review can be utilized as preliminary reading material for researchers looking into UWB antennas.
Perancangan dan Analisis Jaringan FTTB Berbasis Teknologi GPON Pada Bangunan Hotel Yoppi Lisyadi Oktavianus; Ikhwana Elfitri; Onno Widodo Purbo
Jurnal Inovtek Polbeng Seri Informatika Vol 8, No 1 (2023)
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/isi.v8i1.3213

Abstract

This paper presents the design and implementation of a Fiber To The Building (FTTB) network infrastructure based on Gigabit Passive Optical Network (GPON) technology in a hotel cluster building located in West Sumatra, Indonesia. GPON technology was selected for its cost-effectiveness and efficiency in the distribution area, particularly when the terminal bandwidth is set at ≤500 Mbps. The waterfall method was utilized in the network's design. The results were tested and analyzed across three Open System Interconnection (OSI) layers: the physical layer, represented by the link power budget; the datalink layer, represented by the Traffic Container (T-CONT); and the network layer, represented by the QoS network performance. The link power budget showed a minimum received power of -16.41 dBm on the downlink and -18.95 dBm on the uplink, with a power margin value above zero. T-CONT has been implemented with the fixed bandwidth value set to provide a bandwidth guarantee meeting the minimum requirement of 1.1 Mbps. The network performance of the FTTB GPON demonstrated excellent performance, as per Internet Protocol Harmonization Over Network (TIPHON) standards, recording a latency of 1.18 ms, jitter of 0.18 ms, and zero packet loss
FAKTOR KETIDAKPATUHAN ODHA MENGKONSUMSI ANTIRETROVIRAL THERAPY DI SUMATERA BARAT Adriani Mahdarlis; Ikhwana Elfitri; Afriwardi Yusri; Arina widya; Evi Hasnita
Jurnal Endurance Vol. 8 No. 3 (2023): Jurnal Endurance : Kajian Ilmiah Problema Kesehatan
Publisher : LLDIKTI Wilayah X

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22216/jen.v8i3.2507

Abstract

Pada tahun 2021, tingkat ketidakpatuhan pasien HIV/AIDS terhadap pengobatan antiretroviral di Sumatera Barat Indonesia, termasuk tinggi yaitu lebih kurang 30%, nilai normalya adalah dibawah 20%. Kurangnya kepatuhan dapat berdampak buruk pada produktivitas dan morbiditas dan kematian pasien HIV/AIDS. Penelitian bertujuan untuk mengidentifikasi faktor-faktor yang berkontribusi terhadap ketidakpatuhan ODHA dalam pengobatan antiretroviral. Penelitian ini dilakukan di RSUD Dr. M. Djamil Padang, penelitian cross-sectional ini menggunakan analisis regresi multivariat dan melibatkan 128 pasien berusia ≥ 17 tahun, dengan kondisi hemodinamik stabil, responden berasal dari berbagai wilayah di Sumatera Barat. Penelitian ini dilakukan pada tanggal 10 Februari hingga 15 April 2022. Ditemukan lima faktor utama penyebab ketidakpatuhan meminum obat antiretroviral antara lain: lupa (p-value 0,000), bosan (p-value 0,001), sibuk (p-value 0,000), pengaruh adanya COVID-19 (nilai p 0,000), Ada atau tidaknya bantuan LSM (p-value 0,048) . Nilai prediksi (ß) untuk “Lupa” adalah 8,360, yang berarti risiko ketidakpatuhan pasien 8,36 kali lebih tinggi. Dampak kumulatifnya cukup besar yaitu sebesar 42,2%, yang menunjukkan pengaruh keseluruhan yang relatif kuat. Disimpulkan bahwa; lupa, bosan, sibuk, kondisi COVID-19 masih terasa mempengaruhi, sementara bantuan LSM sebagai faktor paling mendukung kepatuhan. Disarankan dukungan petugas dan peran keluarga juga dapat dimaksimalkan dalam membantu pasien patuh dalam pengobatan, sehingga tercapai tujuan yaitu mencegah kematian, sekaligus mendukung program dunia tentang HIV/AIDS.
Ultra Wideband (UWB) Multiple Input and Multiple Output (MIMO) Antenna Design : A Review Firdaus Firdaus; Rahmadi Kurnia; Ikhwana Elfitri
Andalas Journal of Electrical and Electronic Engineering Technology Vol. 3 No. 1 (2023): May 2023
Publisher : Electrical Engineering Dept, Engineering Faculty, Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/ajeeet.v3i1.33

Abstract

Since the Federal Communication Commission (FCC) issued a license for the 3.1 – 10.6 GHz frequency spectrum for unlicensed radio applications, many papers have been published regarding ultrawideband (UWB) antenna design. The issue of UWB antenna design is determining how to create an antenna with a wide bandwidth, capable of rejecting communication systems that coexist with UWB bands, and capable of designing UWB antennas for multiple input multiple output (MIMO) communication system applications. This study examines the design of UWB antennas with monopole and slot types based on evaluations published over the last two decades. The discussion began with UWB and MIMO systems and then moved on to the configuration of monopole and slot UWB antennas. UWB antenna layout with notched bands and the several types of notched bands available. Finally, two port and quad-port MIMO antenna configuration is examined. To further understand UWB antenna design, numerous UWB antenna configurations are simulated. The outcomes of this review can be utilized as preliminary reading material for researchers looking into UWB antennas.
Perancangan dan Analisis Jaringan FTTB Berbasis Teknologi GPON Pada Bangunan Hotel Oktavianus, Yoppi Lisyadi; Elfitri, Ikhwana; Purbo, Onno Widodo
Jurnal Inovtek Polbeng Seri Informatika Vol 8, No 1 (2023)
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/isi.v8i1.3213

Abstract

This paper presents the design and implementation of a Fiber To The Building (FTTB) network infrastructure based on Gigabit Passive Optical Network (GPON) technology in a hotel cluster building located in West Sumatra, Indonesia. GPON technology was selected for its cost-effectiveness and efficiency in the distribution area, particularly when the terminal bandwidth is set at ≤500 Mbps. The waterfall method was utilized in the network's design. The results were tested and analyzed across three Open System Interconnection (OSI) layers: the physical layer, represented by the link power budget; the datalink layer, represented by the Traffic Container (T-CONT); and the network layer, represented by the QoS network performance. The link power budget showed a minimum received power of -16.41 dBm on the downlink and -18.95 dBm on the uplink, with a power margin value above zero. T-CONT has been implemented with the fixed bandwidth value set to provide a bandwidth guarantee meeting the minimum requirement of 1.1 Mbps. The network performance of the FTTB GPON demonstrated excellent performance, as per Internet Protocol Harmonization Over Network (TIPHON) standards, recording a latency of 1.18 ms, jitter of 0.18 ms, and zero packet loss
Perbandingan Metoda Klasifikasi K-Nearest Neighbor dan Support Vector Machine pada Pengenalan Benda Terhalang berbasis Kode Rantai KURNIA, RAHMADI; ASMITA, MELIA; IHSAN, ROZAKY; ELFITRI, IKHWANA; HADI, DANANG KUMARA
ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika Vol 12, No 3: Published July 2024
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/elkomika.v12i3.823

Abstract

ABSTRAKBenda yang terhalang oleh benda lain memiliki bentuk yang tidak sempurna karena sebagian sisinya tidak terlihat. Untuk mengatasi permasalahan tersebut, digunakan metoda yang dapat mengenali bentuk pada benda pada sisi yang masih nampak. Penelitian ini membandingkan metoda klasifikasi K-Nearest Neighbor (KNN) dan Support Vector Machine (SVM) berbasis kode rantai untuk mendeteksi bentuk benda terhalang. Terdapat 15 sampel untuk lima bentuk bangun datar pada 2 jenis citra benda. Hasil untuk dua jenis citra, metoda KNN memiliki rata-rata ketepatan sebesar 89,6% sedangkan metoda SVM sebesar 88.4%. Waktu komputasi citra animasi menggunakan metoda SVM lebih cepat 0,044 detik dari pada metoda KNN dan lebih cepat 0,034 detik untuk citra riil. Rata-rata memori yang digunakan dengan metoda SVM pada citra animasi lebih sedikit 0,32 Mb dari pada metoda K-NN Pada citra riil rata-rata memori yang digunakan dengan metoda SVM lebih sedikit 0,44 Mb dari metoda K-NN.Kata kunci: transformasi Hough, kode rantai, bentuk benda, KNN, SVM ABSTRACTObject that are blocked by other objects have an imperfect shape because some of their side are not visible. To overcome this problem, we propose a comparison the K Nearest Neighbor classification (K-NN) and the Support Vector Machine (SVM) method based on chain code algorithm. We used 15 samples for each shape of the object for two kind of images. The result of KNN method classification has an average accuracy of 89,6%. The SVM method has an average accuracy of 88.4%. The average computing time for the SVM method is 0,044 seconds faster than KNN method for drawing image and 0,0034 seconds faster for real images, The average memory for drawing image using the SVM method is 0,32Mb less than K-NN. In the real images the average memory used with the SVM method is 0,44 Mb less than the K-NN.Keywords: hough transform, chain code, shape object, KNN, SVM
Compact Dual Port UWB MIMO Antenna with WLAN Band Rejection Firdaus, Firdaus; Ikhsan, Intan Aprillia; Kurnia, Rahmadi; Elfitri, Ikhwana
Jurnal Elektronika dan Telekomunikasi Vol 24, No 2 (2024)
Publisher : National Research and Innovation Agency

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55981/jet.635

Abstract

This research presents the design of a compact dual-port UWB MIMO antenna. The primary challenge in designing UWB MIMO antennas lies in achieving a low-frequency band of 3.1 GHz while maintaining a small size. By modifying the patch shape to a tapered configuration and incorporating an inset feed and a slit for WLAN notch band, a rectangular monopole patch antenna successfully overcomes these limitations. The MIMO configuration of this antenna achieves a wide UWB bandwidth of 3.1-12 GHz with a compact dimension of 20×28.5×1.6 mm. The antenna exhibits excellent characteristics, including low mutual coupling (-15 dB), maximum gain of 3 dBi, low ECC (<0.01), high diversity gain (<9.95), low TARC (< -20 dB), and nearly omnidirectional radiation pattern. These results demonstrate the suitability of the proposed antenna design for UWB applications.
A review of Image Processing Technique for Monitoring The Growth and Health of Cows Zurnawita, Zurnawita; Prabowo, Cipto; Kurnia, Rahmadi; Elfitri, Ikhwana
JITCE (Journal of Information Technology and Computer Engineering) Vol. 7 No. 01 (2023)
Publisher : Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jitce.7.01.8-18.2023

Abstract

In general, monitoring of animal growth and health is done directly by farmers (invasive measurement methods) which can cause cows to be injured or experience stress. To avoid this, several studies have been conducted on non-invasive methods using image processing technology. In this study, we systematically reviewed several works of literature to identify and synthesize published articles on image processing technology and image processing applications related to weight estimation and individual cattle identification. Analysis of image processing technologies used for weight estimation and individual cattle identification is the main objective of this article. Articles were searched through several databases and studies that met the inclusion criteria were analyzed and used in the review. The studies were divided into three main themes: image processing technologies, applications using image processing, and image processing research on cattle growth and health. It can be concluded that deep learning approaches are increasingly being studied, tested and considered as a viable and promising approach to monitor cattle weight and health in several aspects
Optimization of Intrusion Detection System with Machine Learning for Detecting Distributed Attacks on Server Yuliswar, Teddy; Elfitri, Ikhwana; W purbo, Onno
INOVTEK Polbeng - Seri Informatika Vol. 10 No. 1 (2025): March
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/vem9da98

Abstract

This study develops an intrusion detection system optimized with machine learning techniques for efficient and effective detection of Distributed Denial-of-Service (DDoS) attacks. Using the Decision Tree algorithm, the system is designed to maximise accuracy in the identification and classification of DDoS attacks. The CIC-DDoS2019 dataset, which consists of various comprehensive simulated attack scenarios, is used as the basis for training and validation, providing the model with robust capabilities in recognizing DDoS attacks with high accuracy. This IDS successfully achieved a 100% detection rate, which is a significant result in the network security environment. The system is integrated into the existing network infrastructure, monitoring data flows in real-time and performing predictive analysis to detect early indications of attacks. Each attack detection immediately triggers a notification sent via a Telegram bot, ensuring that the security team can react quickly to isolate and address the attack. These notifications include details such as the source, type of attack, detection time, and involved protocol information, enabling more informed and strategic response actions. The use of Telegram bots for real-time communication not only enhances the speed of response to threats but also supports system scalability by facilitating adjustments and integration across various operational scenarios. The system's quick detection and response is a big step forward for machine learning-based intrusion detection systems (IDS). It provides opportunities for further research and practical applications that can adapt to various digital security scenarios.