Claim Missing Document
Check
Articles

Found 6 Documents
Search

IMPLEMENTASI ALGORITMA RIVEST CODE 6 (RC6) DAN STEGANOGRAFI LEAST SIGNIFICANT BIT (LSB) UNTUK KEAMANAN DATA CITRA DIGITAL Silvester Tena; Brian J. Mooy; Stephanie I. Pella
Jurnal Media Elektro Vol 8 No 2 (2019): Oktober 2019
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (406.275 KB) | DOI: 10.35508/jme.v0i0.1837

Abstract

Penelitian ini menggabungkan algoritma Rivest Code 6 (RC6) dan metode Least Significant Bit (LSB). RC6 merupakan algoritma kriptografi asimetris dimana kunci pada sisi pengirim maupun penerima sama. LSB merupakan metode yang menyisipkan setiap bit informasi ke dalam 1 byte gambar. Hasil pengujian menunjukkan bahwa sistem berjalan baik dengan menghasilkan waktu komputasi yang dipengaruhi oleh ukuran citra. Semakin besar ukuran citra maka semakin lama waktu komputasinya. Citra asli dan citra keluaran yang didapatkan sama (MSE=0). Citra wadah sebelum dan sesudah penyisipan mendapat MSE terbesar 0.0488 dan PSNR terkecil 141.021 dB. Kombinasi algoritma RC6 dan metode LSB dapat bertahan terhadap noise salt and pepper pada rentang density 0.01-0.1 dengan MSE 7.904,28-24.614,1 dan PSNR 9,89dB- 21,50dB. Persentase keberhasilan proses ekstraksi dan dekripsi berada pada rentang 24%-96%. Perbedaan nilai MSE, PSNR dan persentase keberhasilan proses ekstraksi ditentukan oleh karakteristik citra data. Kerapatan piksel berbanding lurus dengan tingkat ketahanannya terhadap noise.
IMPLEMENTATION OF VISUAL CRYPTOGRAPHY TECHNIQUE ON SQUARE BW SECRET IMAGES Stephanie I. Pella; M. J. Pella
Jurnal Media Elektro Vol 1 No (2012): April 2012
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jme.v1i1.6251

Abstract

The advance of computer security technology has led to the invention of many cryptography algorithms. Visual Cryptography is a cryptography technique that needs no cryptographic computation in decoding. To encode a secret image, the image is encrypted to several transparent shares. In order to retrieve the secret image shares are stacked on top of each other. This paper describes a technical implementation of this algorithm on a square black and white image for VC2,2 Scheme and VC3,3 Scheme. The result shows that the model works well with an image that contains text.
DESAIN DAN IMPLEMENTASI REAL-TIME MULTIPOINT VIDEO TRANSMISSION BERBASIS WEB Hendro F. J. Lami; Stephanie I. Pella
Jurnal Media Elektro Vol 1 No (2012): April 2012
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jme.v1i1.6252

Abstract

Education world of Indonesia experiences development along with integration between conventional study and e-learning bases method on web. Some universities in Indonesia offers service e-learning to base on web with a few content interaktif which can be exploited for expansion of quality of education. Content e-learning for example upload/download matter bases on document, chatting, live video streaming, and video conference. University of Nusa Cendana (Undana) also does system development of study of e-learning bases on web. Now content which on the market still limited to upload and download document. Video service conference have been implementation, but communications only support communications point-to-point and has not integrated with website elearning. Based on the limitation hence writer wish to develop the system becomes communications multipoint to base on web and can be integrated with website e-learning undana.
PERBANDINGAN UNJUK KERJA COAP DAN HTTP PADA TRANSAKSI DATA PERANGKAT IOT Hendro FJ Lami; Stephanie I. Pella
Jurnal Media Elektro Vol 11 No 2 (2022): Oktober 2022
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jme.v0i0.8216

Abstract

Internet of Things (IoT) is the interconnection of several devices that have specific tasks such as sensing and control. The services in the system can be in the form of one device - one service, many devices - one service, one device -many services, and many devices - many services. A communication protocol is agreed upon by the devices in the IoT system to ensure the success of data transactions. These protocols include MQTT, HTTP, AMQP, XMPP, Web Shocket, and COAP. This study compares the performance of the COAP and HTTP protocols in consideration of the number of transactions and energy consumption. The scenario used is to send RSSI data and battery level. The scenarios also use two modes of transmission power:14dBm and 20dBm. The results show that the COAP protocol is 25 times more efficient than the HTTP protocol for a 20dBm transmit power scenario, while for a transmit power of 14dBm COAP is 61 times
STUDI TEKNO EKONOMI PERENCANAAN PEMBANGKIT LISTRIK MIKRO HIDRO (PLTMH) DI KECAMATAN KARERA KABUPATEN SUMBA TIMUR Frans Likadja; Molina Olivia Odja; Stephanie I. Pella; Wenefrida T. Ina
Jurnal Media Elektro Vol 11 No 2 (2022): Oktober 2022
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jme.v0i0.8234

Abstract

This study aims to measure the water potential of the Pahambur Wai River, in Nggongi Village, Karera District, East Sumba Regency to be used as a driving source for Micro Hydro Power Plants.This study aims to measure the water potential of the Pahambur Wai River, in Nggongi Village, Karera District, East Sumba Regency to be used as a driving source for Micro Hydro Power Plants. The research methods used are observation, area mapping, measurement of water flow and elevation, calculation of potential for electric power generated, Detail Engineering Design, cost calculation and economic feasibility.From the analysis and calculation, the maximum water flow of the Pahambur Wai River is 1,687 m3/s, minimum water flow is 0.054 m3/s. Probability availability is 70%, or 0.240 m3/s, with an effective elevation of 15 meters. The actual electric power generated is 20.44 kW. Type of turbine of MHPP is the Crossflow T14, D300 turbine, and coupled using a V belt, to a 3 phase synchronous generator, with a capacity of 25 kW.The plan for the construction and operation of the MHPP is economically feasible, as can be seen from the indicators of investment feasibility NPV, IRR, and Profitability Index.
INTEGRATING IEEE 802.11 AND LORAWAN FOR WIRELESS SENSOR NETWORK DATA TRANSACTION IN NON-INFRASTRUCTURE AREA Stephanie I. Pella; Hendro FJ Lami
Jurnal Media Elektro Vol 12 No 1 (2023): April 2023
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jme.v0i0.10105

Abstract

This research aims to develop a system that integrates the IEEE 802.11 network and LoRa WAN in developing a wireless sensor network (WSN) in an area without public communication infrastructure. The sensor nodes were developed using ESP 8266 Node MCU with embedded IEEE 802.11 module and the sink was developed using Raspberry Pi minicomputer with LoRa module. The frames sent by sensor nodes were classified into regular data and critical data. The sensing data is forwarded by the sink to the nearest location with internet access using LoRaWAN according to their priority. Each node sent its regular frames with an interarrival time that varies from 30 seconds to 3 minutes and critical frames with an interarrival time of 1 to 5 seconds. The result shows that the delay of the network sending solely regular frames varies from 16.4 s to 602 and the delay of the network sending solely critical frames varies from 0.32 t0 1 s. When some nodes in the network send the regular frames and the other nodes send the critical frames, the delay of the regular frames drops to 1.25-1.75 s. The packet delivery rate of the system is 100%.