Articles
Pendeteksian Anomali Penggunaan Internet di LAN Universitas Islam Riau Indonesia
Rosa, Sri Listia
IT JOURNAL RESEARCH AND DEVELOPMENT Vol 3 No 1 (2018)
Publisher : UIR PRESS
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.25299/itjrd.2018.vol3(1).1994
Meningkatnya lalu lintas jaringan internet di Local Area Network (LAN) akan berdampak pada kinerja akses internet. Sistem pemantauan ketidaknormalan lalu lintas internet sangat penting untuk mendeteksi penggunaan bandwidth internet secara tidak normal. Di Universitas Islam Riau (UIR) salah satu isu terkait penggunaan internet dan metode yan biasa digunakan adalah dengan memeriksa komputer melalui pemantau ke terminal utama LAN atau sumber penyedia internet. Penelitian ini menggunakan metode baru untuk sistem pemantauan yang memberikan informasi detail dengan menggunakan metode pemantauan jaringan dari berbagai perilaku dan riwayat trafik yang terhubung ke internet, sedangkan informasi detail bandwidth internet yang digunakan di pantau untuk di analisa. Lokasi penelitian dilakukan di kawasan LAN yang berada di Universitas Islam Riau, di area LAN kampus. Hasil analisa menunjukkan grafik pemantauan pada siang hari lebih besar karena kegiatan siswa hanya pada waktu itu, berbagai situs web yang di akses dan tautan lainnya oleh mahasiswa dan pegawai di lingkungan kampus dapat dideteksi termasuk durasi yang digunakan serta dengan waktu tertentu. Metode ini memberikan data yang terus menerus dan sangat akurat untuk menangkap penggunaan data yang tidak normal termasuk alamat Internet Protocol (IP) komputer atau perangkat yang terhubung ke internet. Sistem ini membantu operator untuk memberikan laporan terkait penggunaan internet dan pengguna yang terhubung serta data yang digunakan secara otomatis tanpa perlu di lakukan secara manual.
New Algorithm for Fast Processing RFID System in Container Terminal
Evizal Abdul Kadir;
Siti Mariyam Shamsuddin;
Detri Karya;
Sri Listia Rosa
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 1: February 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1186.127 KB)
|
DOI: 10.11591/ijece.v6i1.pp283-291
The growth of world economic and increasing of trading in most of countries has impact to the number of containers export and import between countries. Some of container terminal is very busy to handle high volume of container movement. Conventional operational procedures have difficulties to handle containers movement then make slow and some issues in terminal operation for container clearance. This paper discus on proposing new algorithm to the current container terminal management system used RFID technology for fast processing and clearance. Container Terminal Management System (CTMS) is a system for port management and interface to the RFID system that used to identify container e-seal, truck and driver identity. Lack of communication and interfacing protocol made slow response during request or reply of message to the gate operator. Proposed algorithm with new procedure of request to CTMS made faster response and avoid inaccuracy of detecting container e-seal. Results of implementation new algorithm have improved to the productivity and efficiency of container terminal. Testing and implementation of this proposed system conducted in a private container terminal in Malaysia.
Development of RFID EPC Gen2 Tag for Multi Access Control System
Evizal Evizal;
Tharek Abd. Rahman;
Sharul Kamal Abdul Rahim;
Sri Listia Rosa
International Journal of Electrical and Computer Engineering (IJECE) Vol 3, No 6: December 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (453.369 KB)
A Radio Frequency Identification (RFID) use radio waves to identify an object, this technology become useful for the future because of the advantages. Access system using RFID card is commonly used in a building, parking area, housing complex, etc. This paper explore and develop the use of RFID EPC Class1 Gen2 tag for multipurpose access system for identification and access control, such as personal identity identification, door access control and gate entry permit or access control. With the same tag Identity (ID) user can access many areas. RFID EPC Class1 Gen2 tag working at UHF band 902-928 MHz, this type of tag more suitable for multi access control because of scaterring technique in reading for the tag, as for gate access need longer distance read range. All users ID and information stored at the one central database, every transaction at the controlled were recorded in a control system.DOI:http://dx.doi.org/10.11591/ijece.v3i6.3855
Modelling of wireless sensor networks for detection land and forest fire hotspot
Evizal Abdul Kadir;
Hitoshi Irie;
Sri Listia Rosa;
Mahmod Othman
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i6.12971
Indonesia located in South East Asia countries with tropical region, forest fires in Indonesia is one of big issue and disaster because it happens in almost of every year, this is because of some of region consist of peat land that high risk for fire especially in dry season. Riau Province is one of region that regularly incident of forest fire with affected the length and breadth of Indonesia. Propose development of Wireless Sensor Networks (WSNs) for detection of land and forest fire hotspot in Indonesia as well as one of the main consents in this research, case location in Riau province is at one of the regions that high risk forest fire in dry season. WSNs technology used for ground sensor system to collect environmental data. Data training for fire hotspot detection is done in data center to determine and conclude of fire hotspot then potential to become big fire. The deployment of sensors located at several locations that has potential for fire incident, especially as data shown in previous case and forecast location with potential fire happen. Mathematical analysis is used in this case for modelling number of sensors required to deploy and the size of forest area. The design and development of WSNs give high impact and feasibility to overcome current issues of forest fire and fire hotspot detection in Indonesia. The development of this system used WSNs highly applicable for early warning and alert system for fire hotspot detection.
Multi-Sensor System for Land and Forest Fire Detection Application in Peatland Area
Evizal Abdul Kadir;
Sharul Kamal Abdul Rahim;
Sri Listia Rosa
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 7, No 4: December 2019
Publisher : IAES Indonesian Section
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52549/ijeei.v7i4.1604
Forest fire has a dangerous impact on environments and humans because of haze and carbon emitted from it. A common technology to detect fire hotspots is to use satellite images and then process them to determine the number of hotspots and their location. However, satellite systems cannot penetrate in bad weather or cloudy condition. This research proposes a ground sensor system, which uses several sensors related to the indicators of fire, especially fire in peatland area with unique characteristics. Common parameters of fire, such as temperature, smoke, haze, and carbon dioxide, are applied in this system. Indicators are measured using special sensors. Results of every sensor are analyzed by implementing intelligent computer programming, and an algorithm to determine fire hotspots and locations is applied. The fire hotspot location and intensity determined by integrated multiple sensors are more accurate than those determined by a single sensor. Data collected from every sensor are kept in a database, and a graph is generated for reporting and recording. In case of sensor readings with parameters, potential of fire and hotspots detected can be forwarded to the representative department for corresponding actions.
An Immune Based Patient Anomaly Detection using RFID Technology
Sri Listia Rosa;
Siti Mariyam Shamsuddin;
Evizal Evizal
Computer Engineering and Applications Journal Vol 2 No 1 (2013)
Publisher : Universitas Sriwijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1027.754 KB)
|
DOI: 10.18495/comengapp.v2i1.14
Detecting of anomalies patients data are important to gives early alert to hospital, in this paper will explore on anomalies patient data detecting and processing using artificial computer intelligent system. Artificial Immune System (AIS) is an intelligent computational technique refers to human immunology system and has been used in many areas such as computer system, pattern recognition, stock market trading, etc. In this case, real value negative selection algorithm (RNSA) of artificial immune system used for detecting anomalies patient body parameters such as temperature. Patient data from monitoring system or database classified into real valued, real negative selection algorithm results is real values deduction by RNSA distance, the algorithm used is minimum distance and the value of detector generated for the algorithm. The real valued compared with the distance of data, if the distance is less than a RNSA detector distance then data classified into abnormal. To develop real time detecting and monitoring system, Radio Frequency Identification (RFID) technology has been used in this system. Keywords: AIS, RNSA, RFID, AbnormalDOI:Â 10.18495/comengapp.21.121142
An Immune Based Patient Anomaly Detection using RFID Technology
Sri Listia Rosa;
Siti Mariyam Shamsuddin;
Evizal Evizal
Computer Engineering and Applications Journal Vol 2 No 2 (2013)
Publisher : Universitas Sriwijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (596.823 KB)
|
DOI: 10.18495/comengapp.v2i2.22
Online product reviews is considered as a major informative resource which is useful for both customers and manufacturers. The online reviews are unstructured-free-texts in natural language form. The task of manually scanning through huge volume of review is very tedious and time consuming. Therefore it is needed to automatically process the online reviews and provide the necessary information in a suitable form. In this paper, we dedicate our work to the task of classifying the reviews based on the opinion, i.e. positive or negative opinion. This paper mainly addresses using ensemble approach of Support Vector Machine (SVM) for opinion mining. Ensemble classifier was examined for feature based product review dataset for three different products. We showed that proposed ensemble of Support Vector Machine is superior to individual baseline approach for opinion mining in terms of error rate and Receiver operating characteristics Curve. Â Key words: Opinion, Classification, Machine Learning.
Switched Beam Smart Antenna for Wireless Local Area Network
Evizal .;
Sri Listia Rosa;
Eko Supriyanto;
Tharek Abd Rahman;
Sharul Kamal Abdul Rahim;
Ali Moradikordalivand
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1113.349 KB)
|
DOI: 10.11591/eecsi.v1.381
In wireless communication system, interference is one of the issue facing that can disturb in communicating between base station and mobile devices. This paper propose switched beam smart antenna system, an octagonal configuration of directional antenna is introduced and selecting beam to desire user. Each beam of antenna covered 45 degrees; by assembly of all directional antennas to create an omni-directional configuration with coverage all the beam 360 degrees. To control of the beam switching, an inexpensive microcontroller PIC 16F877 from microchip used, radio signal strength of mobile device receive as reference signal and compare to each of beam, the highest signal received is selected than microcontroller will lock to the desire beam. A few samples of received signal strength to be analysis by an algorithm to avoid multiple signals and select actual signal strength received. In this experiment 2.45 GHz ISM band used for the transmitter and receiver and testing have been conducted in outdoor environment. Results shows that switched beam smart antenna working fine base on mobile device location and able to switch the beam while mobile device is moving.
Food Traceability and Security in Supply Chain Using RFID Technology
Evizal .;
Sri Listia Rosa;
Siti Mariyam Shamsuddin;
Eko Supriyanto;
Wahyudi Sutopo
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (745.853 KB)
|
DOI: 10.11591/eecsi.v1.413
In recent year due to high demand of food product especially agricultural food then supplied from various countries or regions and lands. Some cases facing out such as on delivery, food safety and consumer care. Thus, agricultural food product safety, traceability and monitoring system is required for food product. In this paper propose a system for food traceability and security in supply chain using RFID technology, where a tag attached to every bucket or packet of food product as identification for product source, batch and expire date. Every process in supply chain of food product identified by RFID reader and scanning the tags then all scanned data send to centralized database for product information. In retail store consumer be able to check food product detail especially expire date and in case of food issues happen supplier easly identified source of product. Beside identification and product safety, delivery can be monitoring by agent as every bucket tagged by an RFID tag. By using this system benefit for the consumer, supplier and authority for identification and monitoring system.
Application of NFC Technology for Cashless Payment System in Canteen
Evizal Abdul Kadir;
Siti Mariyam Shamsuddin;
Sri Listia Rosa
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 2: EECSI 2015
Publisher : IAES Indonesia Section
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (398.991 KB)
|
DOI: 10.11591/eecsi.v2.773
In a campus community, mostly is younger people andstay in University hostel without cooking facilities then have to getfrom canteen for foods and beverages. In office hour with limitedbreak time either breakfast or lunch everyone is rushing to get foodand crowded situation are happen. One of the issues is paymentsystem use manually (cash) and queue at the cashier to pay foods,sometime need to wait a few minute until to get the turn. Cashlesspayment such as token or credit system is implementing in some ofrestaurant and food courts but does not applicable in Universitycanteen that most of customers are students with small transaction,only a few dollars and cents. Nowadays, mobile phone or smartphone is not a luxury thing and most of student carries it for phonecall, message, email, or browsing internet. Most of smart phone alsoembedded with Near Field Communication (NFC) reader inside thephone, thus by using this phone with NFC enable to do paymentsystem at the canteen. The credit is deducted from mobile phonebalance for pre-paid system or billed in monthly for postpaid andthis system have working together to the cellular phone operator.Confirmation on payment system is shows whether customerapprove payment or not then a notification is sent to user.With thissystem be able to overcome several issues such as queue at cashierfor payment and risk of student to carry cash money while buyingfoods.