Claim Missing Document
Check
Articles

Found 23 Documents
Search

DESIGNING AND BUILDING AUTOMATIC DOOR CONTROLLING WITH IDENTIFYING FACE CHARACTERISTICS USING EUCLIDEAN RANGE METHOD AND FUZZY C-MEAN Musa, Purnawarman; Yuliani, Nur; Lamsani, Missa
Jurnal Ilmiah Informatika Komputer Vol 13, No 1 (2008)
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Research in image processing growth very fast so that it can be applied in many areas such as security, health, entertainment, military, science and technology, industry, robotics, and agriculture. An example of application of information technology in security, which related to identification and verification, employs biometrics, such as DNA, fingerprint, face, palm, and signature. The use of biometrics is believed to be more secure than traditional system, such as password and ID card for authentication purposes. The objective of this research is to design automatic control system by way of identification of face characteristics using Euclidean Distance and Fuzzy C-Means. The face acquisition process utilizes object capturing sensor prior to computer processing. The results demonstrate that the system recognized face characteristics from 5 peoples in the database. The recognition rate of this system out of 10 faces is 35%.Keyword(s): Image processing, Euclidean distance, Fuzzy C-Means.Subject Description : I.5. Pattern Recognition | I.5.5. Implementation | Special architecture
ANALYSIS OF GOVERNANCE SECURITY MANAGEMENT INFORMATION SYSTEM USING INDEX KAMI IN CENTRAL GOVERNMENT INSTITUTION Hambali, Hambali; Musa, Purnawarman
Angkasa: Jurnal Ilmiah Bidang Teknologi Vol 12, No 1 (2020): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (206.848 KB) | DOI: 10.28989/angkasa.v12i1.563

Abstract

Information security is very vulnerable to institutions if there is interference from other parties outside the organization or institution as a supply chain of services that can pose an information security risk. Based on the Regulation of the Minister of Communication and Information Technology number 4 of 2016, the Electronic System organizers that operate Low Electronic Systems must apply the Information Security Index guidelines. Index KAMI are a tool in analyzing and evaluating the level of information security based on the criteria in organizations or in government institutions. The research objective is to measure the level of information security readiness that meets the requirements of the ISO/IEC27001: 2013 standard at the Central Government Institution Unit  X. The results of the assessment with the index KAMI obtained an electronic system category score of 30, for the assessment of governance the score is 84, the risk management score is 35, the framework information security work value is 61, asset management 128, and the application of security and information technology has a value of 100, the level of information security maturity is level II+ with a value of 408, the results obtained up to the Compliance of the Basic Framework.
IMPLEMENTATION OF NETWORK AUTOMATION USING ANSIBLE TO CONFIGURE ROUTING PROTOCOL IN CISCO AND MIKROTIK ROUTER WITH RASPBERRY PI Muhammad Fauzi Islami; Purnawarman Musa; Missa Lamsani
Jurnal Ilmiah KOMPUTASI Vol 19, No 2 (2020): Juni
Publisher : STMIK JAKARTA STI&K

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Network Engineering is never separated with configuration which is themain task must be commited in the purpose to put it into function. As we know,to configure some devices either server, switch, or router have some methods if weobserve by how we communicate to the system themselves. We can use the conso-le port to communicate with, using telnet to communicate remotely, or even usingSSH if we want to communicate remotely and also securely with all of the infor-mation is encrypted. Generally, the conventional method such as the methods hasjust explained before is always be used. The promblem has not come yet since thereare just 1 until 5 devices, but how about 100 devices ? We have to log in to the ne-twork devices one by one. It is exhausting and very inefficient in time. This paperis ilustrating a new methods in configuring network devices by using automation,reducing time for equipment configuration and easier to maintenance. It reduceshuman error in configuration syntaxes and how the way the device is configured.The innovation is going to make it happen. There are tools to do this tasks such as,ansible and terraform. In this paper, ansible is chosen because of its simplicity.
ANALYSIS OF BANKRUPTCY PREDICTIONS IN TOBACCO COMPANIES USING ALTMAN Z-SCORE METHOD BASED ON 2013-2018 FINANCIAL ANNUAL REPORTS Wicaksono, Kasman; Musa, Purnawarman; Anggraeini, Apriana
JAFFA Vol 9, No 2 (2021): Oktober
Publisher : Master of Accounting Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to analyze the financial health condition of a company using the Altman Z-Score method in predicting the potential bankruptcy of a tobacco-producing company in 2013-2018, which is listed on the Indonesia Stock Exchange. The type of data used in this study is obtained from the website www.idx.co.id for five consecutive years. The results showed that from 2013 until 2018, this tobacco-producing company was in the healthy and low-risk category. The value of the total assets variable is the key to changes in its health condition if it changes its value. The results of this study are expected that the company can continue to fulfill its obligations to investors and creditors and manage assets to increase sales in generating profits.
The Design and Performance Analysis of DTMB System Emy Haryatmi; Tubagus Maulana Kusuma; Busono Soerowirdjo; Purnawarman Musa
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 3: September 2016
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i3.3830

Abstract

Various standard in digital television broadcasting system has been developed in the world, one of which is the Digital Terrestrial Multimedia Broadcasting, or abbreviated as DTMB that currently used by China and Hong Kong. DTMB has several standard configurations and parameters. In this research, DTMB system was designed and the results was validated through simulation using computer program, named Simulink. The parameters used in this research is the FEC with code rate of 0.4, 4QAM modulation, interleaver mode 1 and using a single carrier transmission mode. Stream format used in the simulation was MPEG2-TS as the input for DTMB system. Parameters selection was based on low implementation complexity, but with good results. Two important things in DTMB system is the existence of FEC and TDS-OFDM. FEC consists of cascaded BCH as the outer encoder/decoder (codec) and LDPC as the inner codec. The reason of using TDS-OFDM because it provides better picture quality when the receiver is in motion. The test results have shown that for static video, DTMB was able to receive video with identical quality compared to the original video, when the value of SNR=11dB and SNR=12dB for dynamic video. It is shown that after going through the process from LDPC to BCH, the number of bit errors decreased while the value of SNR increased.
Designing Software Define Network Prototypes with Open vSwitch as Monitoring Traffic Police on The Raspberry Pi Aldy Mohamad; Purnawarman Musa
Aviation Electronics, Information Technology, Telecommunications, Electricals, Controls (AVITEC) Vol 2, No 2 (2020): August
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/avitec.v2i2.712

Abstract

Technology is growing from year to year even day to day, this has made the increasing need for infrastructure that supports especially in aspects of computer networks. The increasing number of traffic that is burdening the router or switch encourages the increasing number of nodes to network devices with the aim of reducing and dividing the burden on network traffic. The need for traffic management and control is very important because with the increasing number of network devices and the higher traffic, making a network administrator need more time to handle if there are problems in the network. This research is trying to implement open vSwitch technology on low-cost raspberry pi devices. And by applying the traffic shaping and traffic rate methods by utilizing the traffic control feature on Linux, and then try to divide the amount of traffic received by network devices so that the traffic load becomes controlled. The results of this study, show the results of successful implementation and traffic management work well.
REKOMENDASI KESEHATAN JANIN DENGAN PENERAPAN ALGORITMA C5.0 MENGGUNAKAN CLASSIFYING CARDIOTOCOGRAPHY DATASET Muhamad Rian Santoso; Purnawarman Musa
Jurnal Simantec Vol 9, No 2 (2021)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/simantec.v9i2.10730

Abstract

Memiliki buah hati yang sehat tidak luput dari faktor kesehatan sang ibu dan kondisi janin di dalam rahim, sehingga butuh analisa terhadap kesehatan janin pada setiap ibu hamil.  Penelitian ini mengusulkan Algoritma C5.0 memanfaatkan dataset Cardiotocography terkait kondisi janin. Dataset Cardiotocography terdiri dari 2.126 record dengan, dimana setiap record memiliki 22 kolom atribut dan terdapat 3 kelas klasifikasi, yaitu; normal, suspect, dan pathological. Dengan menghitung entropy,  information gain,  split information, dan gain ratio, serta menggunakan confusion matrix sebagai perbandingan akurasi dari data yang diteliti. Kelompok record dibagi menjadi data training dan data testing dengan variasi 60%, 70%, 80%, dan 90% untuk data training dan dengan 40%, 30%, 20%, 10% untuk data testing. Hasil dari rekomendari pada variasi pembagian 90% data training dan  10% data testing menghasilkan akurasi sebesar 93,40% dengan jumlah aturan sebanyak 257. Sedangkan variasi 80% data training dan  20% data testing menghasilkan akurasi sebesar 91,29% dengan jumlah aturan sebanyak 239. Pada variasi 70% data training dan  30% data testing menghasilkan akurasi sebesar 88,23% dengan jumlah aturan sebanyak 220. Dan variasi pembagian terkecil 60% data training dan  40% data testing menghasilkan akurasi sebesar 88,12% dengan jumlah aturan sebanyak 204. Berdasarkan variasi tersebut, maka dapat disimpulkan semakin besarnya data training akan menyebabkan akurasi menjadi semakin baik dengan jumlah aturan-aturan yang dapat berguna untuk dijadikan sebagai sistem penunjang keputusan.
PENERAPAN SISTEM PEMANTAUAN DAN PENGATURAN CERDAS UNTUK UNSUR HARA PADA SISTEM HIDROPONIK NFT Purnawarman Musa; Adinda Nurul Huda M
Jurnal Pertanian Presisi (Journal of Precision Agriculture) Vol 2, No 1 (2018): Jurnal Pertanian Presisi
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35760/jpp.2018.v2i1.2006

Abstract

Sistem pintar adalah penerapan sistem yang mencerminkan metode pemrosesan otak manusia. Sistem cerdas secara otomatis terkomputerisasi yang bertujuan membantu pekerjaan yang dirancang oleh manusia untuk pemantauan terus menerus dengan akurasi tinggi. Tujuan dari penelitian ini adalah untuk mengimplementasikan sistem pintar yang memantau nutrisi dalam sistem hidroponik. Hidroponik adalah metode penanaman tanaman dengan menggunakan air sebagai pengganti media tanah yang membutuhkan perawatan dan pemeliharaan tanaman untuk tumbuh dengan baik. Hidroponik membutuhkan sejumlah nutrisi. Masalah menjadi nutrisi, selain dikonsumsi oleh tanaman yang ditemukan dalam sistem hidroponik, karena kandungan tingkat nutrisi berkurang, nutrisi mengalami pengurangan kandungan nutrisi yang disebabkan oleh perubahan suhu dan kelembaban dalam larutan nutrisi dalam wadah penyimpanan larutan nutrisi. Penelitian ini dicoba sistem cerdas untuk memantau kadar nutrisi dalam sistem hidroponik menggunakan sensor nutrisi, suhu, dan kelembaban. Pemantauan nutrisi memerlukan metode analitik dalam mengukur tingkat nutrisi untuk menentukan daya hantar listrik (DHL) pada sistem hidroponik. Berdasarkan hasil DHL yang diperoleh, jika hasil pengukuran berada di bawah batas yang ditentukan, sistem akan meningkatkan larutan nutrisi. Sedangkan jika itu di atas batas nilai DHL, sistem akan menambah air. Penentuan batas akan memberikan efek pertumbuhan tanaman hidroponik yang baik dan stabil serta konsentrasi tingkat nutrisi dan suhu terhadap perubahan yang efektif dan efisien.
ANALYSIS OF GOVERNANCE SECURITY MANAGEMENT INFORMATION SYSTEM USING INDEX KAMI IN CENTRAL GOVERNMENT INSTITUTION Hambali Hambali; Purnawarman Musa
Angkasa: Jurnal Ilmiah Bidang Teknologi Vol 12, No 1 (2020): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (206.848 KB) | DOI: 10.28989/angkasa.v12i1.563

Abstract

Information security is very vulnerable to institutions if there is interference from other parties outside the organization or institution as a supply chain of services that can pose an information security risk. Based on the Regulation of the Minister of Communication and Information Technology number 4 of 2016, the Electronic System organizers that operate Low Electronic Systems must apply the Information Security Index guidelines. Index KAMI are a tool in analyzing and evaluating the level of information security based on the criteria in organizations or in government institutions. The research objective is to measure the level of information security readiness that meets the requirements of the ISO/IEC27001: 2013 standard at the Central Government Institution Unit  X. The results of the assessment with the index KAMI obtained an electronic system category score of 30, for the assessment of governance the score is 84, the risk management score is 35, the framework information security work value is 61, asset management 128, and the application of security and information technology has a value of 100, the level of information security maturity is level II+ with a value of 408, the results obtained up to the Compliance of the Basic Framework.
Pelican Crossing System for Control a Green Man Light with Predicted Age Purnawarman Musa; Eri Prasetyo Wibowo; Saiful Bahri Musa; Iqbal Baihaqi
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 21 No 2 (2022)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1278.846 KB) | DOI: 10.30812/matrik.v21i2.1508

Abstract

Traffic lights are generally used to regulate the control flow of traffic at an intersection from all directions, including a pelican crossing system with traffic signals for pedestrians. There are two facilities for walker crossing, namely using a pedestrian bridge and a zebra cross. In general, the traffic signals of the pelican crossing system are a fixed time, whereas other pedestrians need "green man" traffic lights with duration time arrangement. Our research proposes a prototype intelligent pelican crossing system for somebody who crosses the road at zebra crossings, but the risk of falling while crossing is not expected, especially in the elderly age group or pedestrians who are pregnant or carrying children. On the other hand, the problem is that the average step length or stride length (distance in centimeter), cadence or walking rate (in steps per minute), and the possibility of accidents are very high for pedestrians to make sure do crossing during the lights “green man”. The new idea of our research aims to set the adaptive time arrangement on the pelican crossing intelligent system of the traffic lights “green man” based on the age of the pedestrians with artificial intelligence using two combined methods of the FaceNet and AgeNet. The resulting measure can predict the age of pedestrians of the training dataset of 66.67% and testing prototype in real-time with participants on the pelican crossing system of 73% (single face) and 76% (multi faces).