Claim Missing Document
Check
Articles

Found 28 Documents
Search

Pemanfaatan Teknik Voice Activity Detection Untuk Mengamati Prosentase Pendudukan Sinyal Wicara Pada Saluran Telephon Rena Widyaningtyas, ; Mike Yuliana, ; Tri Budi Santoso, ; Titon Dutono,
Teknika Vol 9, No 2 (2008)
Publisher : Teknika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dalam penelitian ini dilakukan sebuah pengamatan nilai prosentase pendudukan sinyal wicara pada saluran telephon. Kondisi voice ditandai sebagai suatu kondisi di mana terdapat sinyal wicara yang terdeteksi oleh sistem. Kondisi silent dapat diartikan sebagai sebuah kondisi di mana tidak ada sinyal wicara yang menduduki sistem. Penentuan kapan kondisi voice atau silent dapat dilakukan dengan teknik voice activity detection (VAD). Sinyal wicara yang melalui jalur telephon disampel dan disusun dalam bentuk frame. Proses penghitungan energi pada setiap frame untuk penentuan kondisi voice atau silent dengan memanfaatkan short term energy (STE) dengan level standar dari ambang pendengaran. Hasil penghitungan ini dikombinasikan dengan proses pitch detection untuk menentukan kondisi voice atau bukan (silent). Berapa besar prosentase nilai voice dari total waktu yang digunakan akan menentukan prosentase pendudukan sinyal wicara pada saluran telephon. Hasil akhir dari penelitian ini berupa prosentase kondisi voice atau bukan voice (silent). Dari hasil ini dapat diketahui karakteristik penggunaan sinyal wicara pada saluran telephon kurang lebih 35.06% untuk pembicara perempuan dan 26,6% untuk pembicara laki-laki. Dengan  demikian akan memungkinkan prosentase saluran tanpa ada sinyal wicara bisa digunakan untuk keperluan transmisi data yang lain. This paper described an observation of the percentage of speech signal occupation on the telephone line. The voice signal was signed by the condition where the speech signals detected by the system. The silent condition was defined by the condition where the speech signals did not detected by the system. The decision when the voice or silent was happened can do by using voice activity detection (VAD) technique. Speech signal through telephone line was sampled and framed. Short term energy (STE) computation based on standard energy threshold of hearing, for each frame for make a decision when the voice or silent happened. The total value of voice compare the total duration of occupation the talking time is used as the percentage of voice occupation on the telephone line.   The result of the experiment indicated that the characteristics of speech occupation in the telephone line did not more than 35.06% for female speaker and 26.60% for male speaker. Based on this real condition of the telephone line, we can see there were opportunities for other utilization, especially for data transmission.  
Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management Jauhar, Ismed; Sudarsono, Amang; Yuliana, Mike
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8771.4 KB)

Abstract

Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication .Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone
Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery Firdaus, Afany Zeinata; Yuliana, Mike; Samsono Hadi, Mochamman Zen
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (7105.913 KB)

Abstract

In todays era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding) the secret message is shorter than the average computation time making phase (extracting) the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB .Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.
Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management Jauhar, Ismed; Sudarsono, Amang; Yuliana, Mike
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8771.4 KB) | DOI: 10.24003/emitter.v1i1.1

Abstract

Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication .Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone
Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery Firdaus, Afany Zeinata; Yuliana, Mike; Samsono Hadi, Mochamman Zen
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (7105.913 KB) | DOI: 10.24003/emitter.v1i1.6

Abstract

In todays era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding) the secret message is shorter than the average computation time making phase (extracting) the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB .Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.
Implementasi Real Time Voice Scrambler pada DSK TMS320C5402 dengan Menggunakan Metode Kriptografi RC4 Mike Yuliana; Titon Dutono; Wirawan Wirawan
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2007
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Pada paper ini, metode kriptografi RC4 akan diimplementasikan pada DSK TMS320C5402 sebagaimetode yang digunakan untuk mengacak suara. Sistem tersebut bisa berhasil bila proses enkripsi/dekripsi bisareal time, dan dari hasil pengukuran terlihat bahwa sistem yang dihasilkan bisa real time karena waktu eksekusiproses enkripsi/dekripsi tiap sampel tidak melebihi 125 μ detik, dimana waktu eksekusi yang dibutuhkan untukproses enkripsi adalah 1,260 μ detik sedangkan waktu eksekusi yang dibutuhkan untuk proses dekripsi adalah1,140 μ detik.Dari hasil analisa terlihat bahwa sinyal suara hasil enkripsi berbeda dengan sinyal suara aslinya,sedangkan sinyal suara hasil dekripsi sama dengan sinyal suara aslinya dan apabila kita dengarkan ternyatasinyal suara hasil dekripsi sama dengan sinyal suara aslinya . Hal ini menunjukkan keberhasilan DSKTMS320C5402 sebagai enkriptor/dekriptor suara, karena suara hasil dekripsi bisa didengarkan seperti sinyalsuara aslinyaKata kunci: DSK TMS320C5402, Metode enkripsi/dekripsi RC4, MOS, Intelligibility suara.
Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management Ismed Jauhar; Amang Sudarsono; Mike Yuliana
EMITTER International Journal of Engineering Technology Vol 1 No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8771.4 KB) | DOI: 10.24003/emitter.v1i1.1

Abstract

Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication .Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone
Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery Afany Zeinata Firdaus; Mike Yuliana; Mochamman Zen Samsono Hadi
EMITTER International Journal of Engineering Technology Vol 1 No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (7105.913 KB) | DOI: 10.24003/emitter.v1i1.6

Abstract

In today's era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding) the secret message is shorter than the average computation time making phase (extracting) the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB .Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.
Higher Rate Secret Key Formation (HRKF) based on Physical Layer for Securing Vehicle-to-Vehicle Communication Inka Trisna Dewi; Amang Sudarsono; Prima Kristalina; Mike Yuliana
EMITTER International Journal of Engineering Technology Vol 8 No 1 (2020)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v8i1.493

Abstract

One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic scheme that requires the distribution of shared secret keys. To reduce attacks on key distribution, physical layer-based key formation schemes that utilize the characteristics of wireless channels have been implemented. However, existing schemes still produce a low bit formation rate (BFR) even though they can reach a low bit error rate (BER). Note that V2V communication requires a scheme with high BFR in order to fulfill its main goal of improving road safety. In this research, we propose a higher rate secret key formation (HRKF) scheme using received signal strength (RSS) as a source of random information. The focus of this research is to produce keys with high BFR without compromising BER. To reduce bit mismatch, we propose a polynomial regression method that can increase channel reciprocity. We also propose a fixed threshold quantization (FTQ) method to maintain the number of bits so that the BFR increases. The test results show that the HRKF scheme can increase BFR from 40% up to 100% compared to existing research schemes. To ensure the key cannot be guessed by the attacker, the HRKF scheme succeeds in producing a key that meets the randomness of the NIST test.
IMPLEMENTASI SISTEM PENCEGAH KESALAHAN PEMBERIAN OBAT HIPERTENSI SEBAGAI BAGIAN DARI LAYANAN E-HEALTH Reni Soelistijorini; Mike Yuliana; Lina Pratiwi
SENTIA 2016 Vol 8, No 1 (2016)
Publisher : SENTIA 2016

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (255.198 KB)

Abstract

Errors medicine delivery in the treatment process can be dangerous for patients who can cause adverse drug reactions. This can occur because of allergies, medicine-medicine interactions, medicine interactions with diseases and medicine incompatibility which include duration of therapy, dose, route of administration, and amount of medicine. Hence it takes knowledge and thoroughness physicians in selecting drugs for patients. In this research will be made medication error prevention systems for hypertension that is integrated with the Hospital Information System (HIS) which is a web-based electronic prescribing application by using fuzzy to provide medicine’s recommendations to physicians (e-prescribing). Experiment results for several variations of the criteria show that the amount of medicine’s recommendation by using OR operator is more than AND operator. When using AND operator, fire strenght values obtained by functions mininimum thus taking the lowest value of the selected set degrees of membership. The value of fire strenght that full fill recommendation should be more than 0 and maximum value is 1. Contrary with OR operator, the value of fire strenght obtained by max function where the degree of membership that taken is the greatest.