Claim Missing Document
Check
Articles

Found 34 Documents
Search

Penyusunan Notasi Musik dengan Menggunakan Onset Detection pada Sinyal Audio Anindita Suryarasmi; Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 7, No 2 (2013): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.3357

Abstract

AbstrakNotasi musik merupakan dokumentasi tertulis dari sebuah lagu. Walaupun notasi musik telah umum digunakan, namun tidak semua orang yang berkecimpung di dalam dunia musik memahami bagaimana notasi musik dituliskan. Penelitian ini menawarkan penyusunan notasi music secara otomatis dengan mengimplementasikan metode onset detection. Hal mendasar yang harus diketahui dalam pembuatan notasi musik adalah durasi serta nada yang dimainkan. Dengan menggunakan mendeteksi onset dari data audio, jarak antar pukulan dapat diketahui. Dengan demikian maka durasi permainan pun bisa dihitung. Hasil dari pencarian durasi tersebut diolah kembali untuk menciptakan objek-objek note yang disusun dalam notasi musik. Sistem menghasilkan keluaran berupa file dengan format musicXML. Dengan format ini maka hasil keluaran sistem akan bersifat dinamis dan dapat diolah kembali dengan music editor yang mendukung format file tersebut.Hasil penelitian menunjukkan akurasi yang tinggi dalam pengenalan pola permainan yang berhubungan dengan durasi setiap note hingga mencapai 99.62%.  Kata kunci— notasi musik, onset detection, musicXML  AbstractMusical notation is written documentation of a music. Even though musical notation is commonly used, not every musician knows how to write a musical notation. This work offers automatic musical notation generation from audio signal using onset detection.Duration and pitch of the notes are two basic parameters that have to be known in order to generate music notation. This work implemented onset detection method to recognize the pattern by measuring the interval between two notes. Using the interval, the duration of each notes can be calculated and used to create note objects in order to arrange a musical notation. The output of the system is a musicXML formatted file. This format allowed the output to be edited using software for music editor. The result of this work shows high accuracy up to 99.62% for detecting each notes and measuring the duration. Keywords— musical notation, onset detection, musicXML
Verifikasi Dua Varian Protokol Ad hoc On demand Distance Vector dengan UPPAAL Ika Oktavia Suzanti; Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 9, No 1 (2015): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.6636

Abstract

AbstrakMobile Ad-hoc Network (MANET) adalah sekumpulan wireless mobile yang terhubung satu sama lain tanpa infrastruktur yang tetap sehingga perubahan topologi dapat terjadi setiap saat. Protokol routing MANET memiliki dua model yaitu protokol routing reaktif yang membentuk tabel routing hanya saat dibutuhkan dan protokol routing proaktif yang melakukan pemeliharaan tabel routing secara berkala. Properti umum yang harus dipenuhi oleh protokol jaringan ad-hoc adalah route discovery, packet delivery dan loop fredom. AODV merupakan protokol reaktif MANET yang memiliki standar waktu berapa lama sebuah rute dapat digunakan (route validity), sehingga properti route discovery dan packet delivery harus dapat dipenuhi dalam waktu tersebut. Proses verifikasi protokol dilakukan dengan memodelkan spesifikasi protokol menggunakan teknik, tool, dan bahasa matematis. Pada penelitian ini bahasa pemodelan  yang digunakan adalah timed automata, yaitu bahasa pemodelan untuk memodelkan sistem yang memiliki ketergantungan terhadap waktu tertentu pada setiap prosesnya. Verifikasi protokol dilakukan secara otomatis dengan mengggunakan tool model checker UPPAAL.Protokol yang diverifikasi adalah protokol AODV Break Avoidance milik Ali Khosrozadeh dkk dan protokol AODV Reliable Delivery dari Liu-Jian dan Fang-Min. Hasil verifikasi protokol membuktikan bahwa protokol AODV Break Avoidance mampu memenuhi properti route discovery dan protokol AODV Reliable Delivery mampu memenuhi properti packet delivery dalam waktu sesuai dengan spesifikasi. Kata kunci —Verifikasi Protokol, Timed Automata,  AODV, UPPAAL Abstract MANET is a group of wireless mobile that connected one to each other without fixed infrastructure so topology could change at anytime. MANET routing protocol has two models which are reactive routing protocol that built routing table only when needed and proactive routing protocol that maintain routing table periodically. General property which had to be satisfied by ad-hoc network protocol are route discovery, packet delivery and loop freedom. AODV is a reactive protocol in MANET that has time standard to determine how long a route is valid to be used (route validity) so route discovery and packet delivery property should be satisfied in a specifically certain time. Protocol verification process done by modeling protocol specification using technique, tool and mathematic language.In this research protocol modeled using timed automata which is a modeling language that could be used to model a time dependent system in each process. Verification using timed automata can automatically done by UPPAAL tool model checker.Protocol which will be verified are AODV Break Avoidance by Ali Khosrozadeh et al. and AODV Reliable Delivery by Liu Jian and Fang-Min. Result of this protocol verification prove that AODV BA could satisfied route discovery property and AODV Reliable Delivery could satisfied packet delivery property within their specification time. Keywords—Protocol Verification, Timed Automata, AODV, UPPAAL
Analisis Kualitas VoIP pada SCTP Menggunakan ECN dan AQM La Surimi; Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 9, No 2 (2015): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.7541

Abstract

AbstrakVoIP merupakan aplikasi real time yang kualitasnya sangat tergantung pada delay dan jitter, yang mana hal ini sulit dipenuhi oleh protokol yang bersifat reliable dan memiliki congestion control seperti TCP. Di sisi lain penggunaan UDP yang tidak memiliki congestion control menyebabkan peluang terjadinya congestion pada jaringan sangat besar. Penggunaan SCTP sebagai protokol alternatif juga belum mampu mengakomodasi kekurangan TCP dan UDP. Beberapa hasil penelitian menunjukkan perlu adanya perbaikan ataupun modifikasi pada mekanisme congestion control yang dimiliki oleh SCTP. Penggunaan mekanisme ECN dan AQM  pada beberapa penelitian menunjukkan bahwa kedua mekanisme ini dapat menurunkan delay dan jitter. Penelitian ini melakukan pengujian terhadap kualitas VoIP di atas SCTP yang menggunakan ECN dan AVQ pada network simulator NS2. Hasil simulasi menunjukkan bahwa penggunaan mekanisme ECN dan AVQ pada protokol SCTP menghasilkan kualitas VoIP yang lebih baik pada kondisi jaringan yang tidak ideal (high Latency low Bandwidth dan low Latency low Bandwidth dari pada penggunaan protokol SCTP tanpa menggunakan mekanisme ECN dan AVQ. Penelitian ini juga melakukan perbandingan nilai MOS panggilan VoIP SCTP yang menggunakan ECN dan AVQ dengan nilai MOS panggilan VoIP yang menggunakan protokol TCP dan UDP. Hasilnya SCTP dengan ECN dan AVQ mengungguli TCP namun belum dapat mengungguli UDP. Kata kunci— VoIP, SCTP, ECN, AQM,AVQ. AbstractVoIP is the real time applications that are highly dependent on the quality of  delay and jitter, which it is difficult to be met by protocol that has reliable data transfer feature and  congestion control such as TCP. On the other hand the use of UDP that has no congestion control make chance of causing congestion in the network is very large. The use of SCTP as an alternative protocol was also not able to accommodate the weaknesses of TCP and UDP. Some research shows that repairs or modifications to the SCTP congestion control mechanism is needed.The Use of ECN and AQM in some studies show that these two mechanisms can reduce delay and jitter. This study tested the quality of VoIP over SCTP with ECN and AVQ, in NS2. Simulations carried out by independent replication technique, and the results showed that ECN and AVQ can increase the value of MOS VoIP calls significantly in non ideal network scenarios. This study also did comparison of SCTP MOS that uses ECN and AVQ with MOS values VoIP using TCP and UDP. The result showed that SCTP with ECN and AVQ outperform TCP but can not surpass UDP yet. Keywords— VoIP, SCTP, ECN, AQM,AVQ. 
Analisis Pengaruh Ukuran Window Pada Pengendali Kemacetan di SCTP Menggunakan Fitur Multihoming Agus Halid; Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 9, No 2 (2015): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.7542

Abstract

AbstrakStream Control Transmission Protocol (SCTP) merupakan protokol yang mirip dengan Transmission Control Protocol (TCP) dan User Datagram Protocol (UDP). SCTP merupakan protokol yang bersifat reliable dan connectionless. Protokol ini memiliki kemampuan multistreaming dan multihoming dalam melakukan transmisi data. Penelitian ini merupakan pemodelan terhadap SCTP menggunakan simulator OPNET yang dapat menjadi akselerasi bagi peneliti dalam bidang jaringan. SCTP pada simulator dibangun dengan melakukan modifikasi terhadap TCP. Pemodelan dimulai dengan membangun skenario jaringan dan menentukan bandwidth pada jalur yang akan dilewati oleh paket data.Modifikasi ukuran window dalam penelitian ini menggunakan nilai 1 MMS, 2 MMS hingga 10 MMS pada pengendali kemacetan. Tujuannya adalah untuk melihat pengaruh modifikasi ukuran window terhadap nilai packet loss, delay dan throughput. Hasil pengukuran memperlihatkan bahwa nilai throughput tertinggi terdapat pada Skenario Kedua sebagaimana diperlihatkan pada Tabel 6.4 dengan nilai throughput sebesar 433.566,0244 bit/s. Penggunaan ukuran window dalam pengendali kemacetan dimaksudkan untuk menghindari banjir data pada sisi endpoint yang dapat menyebabkan packet loss. Kata kunci—Pengendali kemacetan, throughput, delay, packet loss, ukuran window, multihoming, SCTP  Abstract Stream Control Transmission Protocol (SCTP) is a protocol that is similar to the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). SCTP is a protocol that is both reliable and connectionless. This protocol has the ability multistreaming and multihoming in the transmit data.This research is the modeling of the SCTP using OPNET simulator that can be accelerated for researchers in the field of networking. SCTP on the simulator was built to perform modifications to TCP. Modeling starts with building a network scenarios and determine the bandwidth on the path that will be passed by data packets.Modification of window size in this research using 1 MMS, 2 MMS up to 10 MMS on congestion control. The aim is to disclose the effect of modification of the window size to the value packet loss, delay and throughput. The measurement results show that the throughput rate is highest in the Second Scenario as shown in Table 6.4 with throughput value of 433.566,0244 bits/s. Using window size in congestion control is intended to prevent a flood of data on the endpoint that can lead to packet loss. Keywords—Congestion control, throughput, delay, packet loss, window size, multihoming, SCTP 
Covert Channel Pada Aliran Data Websocket untuk Komunikasi Messaging XMPP Yoga Dwitya Pramudita; Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 9, No 2 (2015): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.7546

Abstract

AbstrakLayanan komunikasi Instant Messaging menyediakan berbagai fitur komunikasi yang bisa digunakan oleh pengguna, diantaranya adalah text messaging (pesan teks) baik online maupun offline. Salah satu standar protokol yang mendukung layanan ini adalah XMPP (Extensible Messaging and Presence Protocol). Aliran komunikasi XMPP menggunakan potongan dokumen XML, sehingga rentan terhadap serangan pasif monitoring konten paket komunikasi. Untuk mengatasi kelemahan ini solusinya adalah menggunakan komunikasi yang terenkripsi. Selain itu ada solusi lain yang coba ditawarkan dalam penelitian ini, yaitu penggunaan covert channel untuk mengirim pesan secara tersembunyi. Dalam penelitian ini akan dibuat sebuah aplikasi klien XMPP berbasis web browser yang mampu melakukan komunikasi XMPP dan juga menyediakan komunikasi covert channel. Komunikasi XMPP agarbisa berjalan diatas aplikasi berbasis web browser maka digunakanlah protokol WebSocket. Protokol inilah yang nantinya akan dieksploitasi pada sisi header, khususnya pada field masking-key untuk memuat pesan covert channel yang dikirimkan pada saat sesi komunikasi XMPP berlangsung. Dari hasil ujicoba, aplikasi klien covert channel mampu menghasilkan komunikasi dengan lebar data 3 byte perpaket. Aplikasi Klien juga mampu melakukan komunikasi covert channel pada kondisi link komunikasi dengan tingkat probabilitas packet loss dibawah 10%. Kata kunci— WebSocket, XMPP, masking-key, Covert Channel, aplikasi klien berbasis browser. AbstractInstant Messaging communication services provide a variety of communication features that can be used by the user, such as text messaging (text messages) both online and offline. One of the standard protocol that supports this service is XMPP (Extensible Messaging and Presence Protocol). XMPP communication using XML documents, making it vulnerable to passive attacks monitoring content of  communications. To overcome this drawback the solution is encrypted communications. The other solutions that try to offer in this research is the use of a covert channel to send hidden messages. In this research will create a browser based XMPP client application that is capable to deliver XMPP communication and also provide covert channel communication. XMPP communication can be built on a web-based application using WebSocket protocol. This protocol will exploit field masking-key to load the covert channel messages that is sent during the session XMPP communication takes place. From the test results, the client application is able to produce a covert channel communication with a data width of 3 bytes in each packet. The client application is also able to perform covert communication channel in a communication link with the condition of the probability of packet loss rate below 10%. Keywords— WebSocket, XMPP, masking-key, Covert Channel, browser based application. 
Pemodelan dan Verifikasi Formal Pengaruh Mobility pattern Terhadap Handoff Latency pada Jaringan WiMAX I Nym Saputra Wahyu Wijaya; Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.11191

Abstract

           In order to decrease handoff latency and increase the successful of HHO conventional scheme, a development of handover scheme is done in standard protocol WiMAX IEEE 802.16e by adding mobility pattern. The superiority of handover scheme with mobility pattern can reduce handoff latency up to 50%, mean while the weakness of this scheme is a wrong act in determining target base station are often happen. Simulation can not showing the cause of that error. So, we do formal verification in to hard handover model with mobility pattern.            In this research, behaviour system is modeled with continuous-time Markov chain (CTMC). The model is foccused to aproximating the influence of mobility pattern in to handoff latency from WiMAX hard handover mechanism. In order to set up a series markov chain models handover system can follow steps, such as: represents the state space, give a number in all transitions, generate the rate transition matrix (infinitesimal generator).            Probabilistic model checking in the research are using quantitative properties and qualitative properties. Formal verification concerning properties has relation with handover in WiMAX network showing that 70% from mobile station which doing scanning with mobility pattern are success doing handover. 24% of them doing scanning conventional as a result of wrongness in act determining target base station, so handoff latency which is pictured will bigger than a system that is only use conventional scanning method.
Pemodelan dan Verifikasi Formal Protokol EE-OLSR dengan UPPAAL CORA Rachmat Wahid Saleh Insani; Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.11192

Abstract

Information and Communication Technology systems is a most important part of society.  These systems are becoming more and more complex and are massively encroaching on daily life via the Internet and all kinds of embedded systems. Communication protocols are one of the ICT systems used by Internet users. OLSR protocol is a wireless network communication protocol with proactive, and based on link-state algorithm. EE-OLSR protocol is a variant of OLSR that is able to prolong the network lifetime without losses of performance.Protocol verification process generally be done by simulation and testing. However, these processes unable to verify there are no subtle error or design flaw in protocol. Model Checking is an algorithmic method runs in fully automatic to verify a system. UPPAAL is a model checker tool to model, verify, and simulate a system in Timed Automata.UPPAAL CORA is model checker tool to verify EE-OLSR protocol modelled in Linearly Priced Timed Automata, if the protocol satisfy the energy efficient property formulated by formal specification language in Weighted Computation Tree Logic syntax. Model Checking Technique to verify the protocols results in the protocol is satisfy the energy efficient property only when the packet transmission traffic happens.
Evaluating Library Services Quality Using GDSS-AHP, LibQual and IPA Muhammad Ihsan; Reza Pulungan; A Afiahayati
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 12, No 1 (2018): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.32142

Abstract

Library services quality is one of the most vital parts in library management. Evaluation of the library services based on the perspective of users is important. In this paper, we propose a collaboration of GDSS-AHP (Group Decision Support System-Analytical Hierarchy Process), LibQual, and IPA (Importance-Performance Analysis) methods to evaluate library services quality. The collaboration of GDSS-AHP and LibQual is used to calculate the weight of each evaluation statement and the level of library services quality based on users’ perception and expectation. IPA is then used to determine the position of the value of each evaluation statement in IPA’s four quadrants to obtain the recommended level for the library services improvement. This study is conducted at the Library of the Ministry of Trade of Indonesia, involving four decision makers: a head librarian, a library academic expert, and two library practitioners. Fifty library visitors become respondents to assess the quality services questionnaires. Based on their responses, we obtain that users’ satisfaction level is at least satisfied by 76.49 %. Meanwhile, usability testing is also conducted on the developed system by using three observation elements: effectiveness, efficiency and satisfaction. The usability testing is performed on five respondents, one admin, and two decision makers, and results in an average usability level of 90.03%.
Data Integrity and Security using Keccak and Digital Signature Algorithm (DSA) Muhammad Asghar Nazal; Reza Pulungan; Mardhani Riasetiawan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 13, No 3 (2019): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.47267

Abstract

Data security is a very important compilation using cloud computing; one of the research that is running and using cloud technology as a means of storage is G-Connect. One of the developments made by the G-Connect project is about data security; most of the problems verification of the data sent. In previous studies, Keccak and RSA algorithms have implemented for data verification needs. But after a literature study of other algorithms that can make digital signatures, we found what is meant by an algorithm that is better than RSA in rectangular speeds, namely Digital Signature Algorithm (DSA).DSA is one of the key algorithms used for digital signatures, but because DSA still uses Secure Hash Algorithm (SHA-1) as an algorithm for hashes, DSA rarely used for data security purposes, so Keccak is used instead of the hash algorithm on DSA. Now, Keccak become the standard for the new SHA-3 hash function algorithm. Because of the above problems, the focus of this research is about data verification using Keccak and DSA. The results of the research are proven that Keccak can run on DSA work system, obtained a comparison of execution time process between DSA and RSA where both use Keccak.
A Fuzzy Control System for Temperature and Humidity Warehouse Control Nova El Maidah; Agfianto Eko Putra; Reza Pulungan
INFORMAL: Informatics Journal Vol 1 No 2 (2016): INFORMAL : Informatics Journal
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A control system is designed to control certain parameters in the system. The desired state maintained is called a steady state. Control actions however may perform something that makes the system experiences a state of overshoot before reaching the steady state. A fuzzy control system can be used to control the system to reach the steady state without overshoot. In this paper, a model of Mamdani's fuzzy inference process is proposed as the basis for this control. MIN operator is used for inference process if there is only one active rule, while MAX operator is used for composition of inferences if there are more than one active rule. A prototype of the fuzzy controller for temperature and humidity achieves an accuracy of 83.33% for temperature controller and an accuracy of 63.33% for humidity controller.