Claim Missing Document
Check
Articles

Found 28 Documents
Search

Pemanfaatan Teknik Voice Activity Detection Untuk Mengamati Prosentase Pendudukan Sinyal Wicara Pada Saluran Telephon Rena Widyaningtyas, ; Mike Yuliana, ; Tri Budi Santoso, ; Titon Dutono,
Teknika Vol 9, No 2 (2008)
Publisher : Teknika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dalam penelitian ini dilakukan sebuah pengamatan nilai prosentase pendudukan sinyal wicara pada saluran telephon. Kondisi voice ditandai sebagai suatu kondisi di mana terdapat sinyal wicara yang terdeteksi oleh sistem. Kondisi silent dapat diartikan sebagai sebuah kondisi di mana tidak ada sinyal wicara yang menduduki sistem. Penentuan kapan kondisi voice atau silent dapat dilakukan dengan teknik voice activity detection (VAD). Sinyal wicara yang melalui jalur telephon disampel dan disusun dalam bentuk frame. Proses penghitungan energi pada setiap frame untuk penentuan kondisi voice atau silent dengan memanfaatkan short term energy (STE) dengan level standar dari ambang pendengaran. Hasil penghitungan ini dikombinasikan dengan proses pitch detection untuk menentukan kondisi voice atau bukan (silent). Berapa besar prosentase nilai voice dari total waktu yang digunakan akan menentukan prosentase pendudukan sinyal wicara pada saluran telephon. Hasil akhir dari penelitian ini berupa prosentase kondisi voice atau bukan voice (silent). Dari hasil ini dapat diketahui karakteristik penggunaan sinyal wicara pada saluran telephon kurang lebih 35.06% untuk pembicara perempuan dan 26,6% untuk pembicara laki-laki. Dengan  demikian akan memungkinkan prosentase saluran tanpa ada sinyal wicara bisa digunakan untuk keperluan transmisi data yang lain. This paper described an observation of the percentage of speech signal occupation on the telephone line. The voice signal was signed by the condition where the speech signals detected by the system. The silent condition was defined by the condition where the speech signals did not detected by the system. The decision when the voice or silent was happened can do by using voice activity detection (VAD) technique. Speech signal through telephone line was sampled and framed. Short term energy (STE) computation based on standard energy threshold of hearing, for each frame for make a decision when the voice or silent happened. The total value of voice compare the total duration of occupation the talking time is used as the percentage of voice occupation on the telephone line.   The result of the experiment indicated that the characteristics of speech occupation in the telephone line did not more than 35.06% for female speaker and 26.60% for male speaker. Based on this real condition of the telephone line, we can see there were opportunities for other utilization, especially for data transmission.  
Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management Jauhar, Ismed; Sudarsono, Amang; Yuliana, Mike
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8771.4 KB)

Abstract

Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication .Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone
Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery Firdaus, Afany Zeinata; Yuliana, Mike; Samsono Hadi, Mochamman Zen
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (7105.913 KB)

Abstract

In todays era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding) the secret message is shorter than the average computation time making phase (extracting) the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB .Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.
Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management Jauhar, Ismed; Sudarsono, Amang; Yuliana, Mike
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8771.4 KB) | DOI: 10.24003/emitter.v1i1.1

Abstract

Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication .Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone
Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery Firdaus, Afany Zeinata; Yuliana, Mike; Samsono Hadi, Mochamman Zen
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (7105.913 KB) | DOI: 10.24003/emitter.v1i1.6

Abstract

In todays era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding) the secret message is shorter than the average computation time making phase (extracting) the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB .Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.
Implementasi Real Time Voice Scrambler pada DSK TMS320C5402 dengan Menggunakan Metode Kriptografi RC4 Mike Yuliana; Titon Dutono; Wirawan Wirawan
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2007
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Pada paper ini, metode kriptografi RC4 akan diimplementasikan pada DSK TMS320C5402 sebagaimetode yang digunakan untuk mengacak suara. Sistem tersebut bisa berhasil bila proses enkripsi/dekripsi bisareal time, dan dari hasil pengukuran terlihat bahwa sistem yang dihasilkan bisa real time karena waktu eksekusiproses enkripsi/dekripsi tiap sampel tidak melebihi 125 μ detik, dimana waktu eksekusi yang dibutuhkan untukproses enkripsi adalah 1,260 μ detik sedangkan waktu eksekusi yang dibutuhkan untuk proses dekripsi adalah1,140 μ detik.Dari hasil analisa terlihat bahwa sinyal suara hasil enkripsi berbeda dengan sinyal suara aslinya,sedangkan sinyal suara hasil dekripsi sama dengan sinyal suara aslinya dan apabila kita dengarkan ternyatasinyal suara hasil dekripsi sama dengan sinyal suara aslinya . Hal ini menunjukkan keberhasilan DSKTMS320C5402 sebagai enkriptor/dekriptor suara, karena suara hasil dekripsi bisa didengarkan seperti sinyalsuara aslinyaKata kunci: DSK TMS320C5402, Metode enkripsi/dekripsi RC4, MOS, Intelligibility suara.
IMPLEMENTASI SISTEM PENCEGAH KESALAHAN PEMBERIAN OBAT HIPERTENSI SEBAGAI BAGIAN DARI LAYANAN E-HEALTH Reni Soelistijorini; Mike Yuliana; Lina Pratiwi
SENTIA 2016 Vol 8, No 1 (2016)
Publisher : SENTIA 2016

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (255.198 KB)

Abstract

Errors medicine delivery in the treatment process can be dangerous for patients who can cause adverse drug reactions. This can occur because of allergies, medicine-medicine interactions, medicine interactions with diseases and medicine incompatibility which include duration of therapy, dose, route of administration, and amount of medicine. Hence it takes knowledge and thoroughness physicians in selecting drugs for patients. In this research will be made medication error prevention systems for hypertension that is integrated with the Hospital Information System (HIS) which is a web-based electronic prescribing application by using fuzzy to provide medicine’s recommendations to physicians (e-prescribing). Experiment results for several variations of the criteria show that the amount of medicine’s recommendation by using OR operator is more than AND operator. When using AND operator, fire strenght values obtained by functions mininimum thus taking the lowest value of the selected set degrees of membership. The value of fire strenght that full fill recommendation should be more than 0 and maximum value is 1. Contrary with OR operator, the value of fire strenght obtained by max function where the degree of membership that taken is the greatest.
IMPLEMENTASI SISTEM KEAMANAN SHARING ELECTRONIC HEALTH RECORD (EHR) BERBASIS 3DES Haryadi Amran Darwito; Mike Yuliana; Muhammad Ulul Azkiya
SENTIA 2016 Vol 8, No 2 (2016)
Publisher : SENTIA 2016

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1114.974 KB)

Abstract

Penggunaan sebuah algoritma enkripsi biasa dipakai untuk melakukan pengamanan data yang bersifat pribadi/ rahasia. Tujuan dilakukan tindakan pengamanan data ini agar tidak semua orang bisa melihat isi dari sebuah informasi tersebut yang bisa saja berupa sebuah informasi yang sangat rahasia (penting). Penggunaan algoritma DES (Data Encryption Standard) sudah biasa diterapkan dalam sebuah sistem informasi saat ini. Beberapa informasi penting yang memerlukan proses enkripsi data, diantaranya adalah mengenai rekam jejak penyakit seorang pasien di sebuah rumah sakit atau klinik. Pada penelitian ini digunakan proses enkripsi pengembangan dari DES yaitu 3DES yang mempunyai tingkat keamaan lebih tinggi yaitu dengan cara pengulangan untuk proses enkripsi sebanyak tiga kali dengan kunci yang berbeda. Algoritma ini diimplementasikan untuk mengamankan informasi rekam medis pasien pada sistem sharing data electronic health record (EHR). Algoritma ini menjadi sangat penting sekali karena informasi mengenai rekam medis pasien digunakan untuk memberikan rujukan kepada dokter dan ke rumah sakit yang berbeda melalui sistem jaringan cloud. Dari pengujian implementasi sistem EHR didapatkan hasil performa dari 3DES yang digunakan sebesar 52% yang menunjukkan bahwa algoritma ini memang mempunyai kinerja yang sangat bagus.
ANALISA PENGGUNAAN METODE FILTER BANK PADA KONVERSI SPEECH TO TEXT LAYANAN MAILBOX Reni Soelistijorini; Mike Yuliana; Rizki Nurhidayati
INOVTEK POLBENG Vol 4, No 1 (2014): INOVTEK VOL.4 NO 1 - 2014
Publisher : POLITEKNIK NEGERI BENGKALIS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (444.708 KB) | DOI: 10.35314/ip.v4i1.92

Abstract

Abstrak Layanan mailbox merupakan sebuah pesan yang direkam dalam bentuk suara yang kemudian disimpan pada mailbox penerima pesan. Pada penelitian ini, pesan  yang  ditinggalkan   akan  dikonversikan   ke  dalam  media  lain dengan memanfaatkan aplikasi IVR (Interactive Voice Response) . File- file *.wav yang dihasilkan akan diolah menjadi file text dengan menggunakan  metode Filter Bank. Data text yang   dihasilkan   akan   dikirim   menuju   Mail   Server, sehingga   dapat diakses berdasarkan  alamat Email yang dimiliki oleh user tujuan. Dari   hasil   pengujian   dengan menggunakan metode Filter Bank, pada pengujian dua dan tiga data standar wanita memiliki prosentase keberhasilan lebih tinggi yaitu sebesar 58,3 % dan 46,665%. Sedangkan untuk satu data standar prosentase keberhasilan pria lebih tinggi yaitu sebesar 55,8%. Untuk keseluruhan pengujian,  2 data standar memiliki prosentase keberhasilan tertinggi yaitu sebesar 56.41 %. Kata kunci : : mailbox, IVR, Filter Bank, data standar
Zero Knowledge Authentication Modification for Drone and Server Communication Security Choirun Nisa; Amang Sudarsono; Mike Yuliana
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol5.2021.1446.pp1019-1029

Abstract

Drones are now being used in various fields. One of the uses of drones is for delivery service. When delivering goods, the drone needs to report its condition while traveling to the server so that the server can monitor the drone and the server can give some commands to the drone. However, when the drone receives data from the server, there are many vulnerabilities it has against the attacker that can take control of the drone device. Taking control of the drone can occur if the attacker manages to send a script that can take over control of the drone. If the attacker can take control over the drone device, the attacker can steal the drone both physically or data of the drone. For this reason, in this study, we propose an authentication algorithm that can filter out who is allowed to send data to the system. The algorithm used is Zero-Knowledge Authentication. To improve the performance of the Zero-Knowledge Authentication algorithm in terms of authentication speed, we try to combine it with the secret key generated from the Secret Key Generation process. From the results of authentication testing, the effectiveness of the proposed algorithm after a Brute Force attack experiment is 100% for single attacker scenarios and for multiple attackers the effectiveness is 100% in LOS and NLOS conditions. Because drones have limited resources, the authentication time experiment is also performed and the result is that in all scenarios the time required to authenticate is in microseconds so that the proposed algorithm can be implemented on drones with limited resources.