Claim Missing Document
Check
Articles

ANALISIS KUALITAS PERBAIKAN CITRA MENGGUNAKAN METODE MEDIAN FILTER DENGAN PENYELEKSIAN NILAI PIXEL Haruno Sajati
Angkasa: Jurnal Ilmiah Bidang Teknologi Vol 10, No 1 (2018): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2.945 KB) | DOI: 10.28989/angkasa.v10i1.223

Abstract

Metode Median Filter adalah salah satu metode perbaikan kualitas citra pada domain spatial. Domain spatial memiliki kelebihan pada hasil perbaikan karena perbaikan citra dilakukan per-pixel. Karena perbaikan citra dilakukan terhadap pixel, metode Median Filter memiliki komputasi yang tinggi dan waktu eksekusi yang lama.Dengan melakukan penyeleksian terhadap pixel yang perlu diperbaiki dapat mengurangi waktu proses perbaikan dan meningkatkan kualitas citra karena pixel yang sudah benar, tidak perlu diperbaiki. Pengukuran kualitas citra dilakukan menggunakan Peak Signal to Noise Ratio (PSNR) dengan membandingkan nilai citra asli dengan citra hasil perbaikan. Nilai PSNR ideal untuk disebut sebagai citra yang baik adalah 30dB.Kualitas Citra metode Median Filter dengan penyeleksian memiliki kenaikan nilai PSNR sebesar 5.6% dan memiliki kenaikan kecepatan waktu proses perbaikan kualitas citra sebesar 8.3% dibanding merubah semua nilai pixel citra
MEMBANGUNKOMUNIKASI AVITALK BERBASIS ANDROID DENGAN MEMANFAATKAN FREKUENSI 2.4 Ghz PADA JARINGAN LOCAL AREA NETWORK (LAN) Galih Andita Sukma; Haruno Sajati; Hero Wintolo
Compiler Vol 5, No 2 (2016): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (420.779 KB) | DOI: 10.28989/compiler.v5i2.163

Abstract

The importance of communication increases development of information and communication technology in world so rapidly, especially in telecommunications equipment. Mobile phone or smartphone is one type of communication tools that provide communication services to a wide range of features offered but the services offered are not free. AviTalk is applications and services to communicate for free with the use of smartphones based on Android and has a wifi enable this feature. This communication utilizing wifi network at a frequency of 2.4 GHz as to communication network. Test the application is done by trying on some of the features on a smartphone application with different specifications. From the test produced a smartphone that can run the application properly in some smartphones with Android operating system version 4.2 and above, and the smartphone is connected to a wifi network.
PENCOCOKAN GAMBAR SIDIK JARI DENGAN KAMERA HANDPHONE MENGGUNAKAN METODE RANSAC DAN TRANSFORMASI AFFINE BERBASIS ANDROID Haruno Sajati; Dwi Nughraheny; Nova Adi Suwarso
Compiler Vol 6, No 1 (2017): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (784.267 KB) | DOI: 10.28989/compiler.v6i1.202

Abstract

Fingerprints occur due to stroke differences. These stroke differences have occurred at a time when humans are still fetal form. A normal fingerprint pattern is formed of lines and spaces. These lines are called ridges whereas the spaces between these lines are called valleys. To make an introduction to the fingerprint image requires a variety of support tools. Starting from a fingerprint machine, a smartphone that has a fingerprint sensor and much more. In this research, the acquisition of image is done by grayscaling, histogram equalization, gabor filter, binary, thinning, 8 neighbors, matching.The result of making android application with the method that has been described to show unfavorable results seen from the calculation of the accuracy of 63%. Based on testing the specs android OS devices, this application can run on android with OS 4.4.2 specification kitkat.Fingerprints occur due to stroke differences. These stroke differences have occurred at a time when humans are still fetal form. A normal fingerprint pattern is formed of lines and spaces. These lines are called ridges whereas the spaces between these lines are called valleys. To make an introduction to the fingerprint image requires a variety of support tools. Starting from a fingerprint machine, a smartphone that has a fingerprint sensor and much more. In this research, the acquisition of image is done by grayscaling, histogram equalization, gabor filter, binary, thinning, 8 neighbors, matching.The result of making android application with the method that has been described to show unfavorable results seen from the calculation of the accuracy of 63%. Based on testing the specs android OS devices, this application can run on android with OS 4.4.2 specification kitkat. Keywords : OCR Fingerprint, Fingerprint recognition, Minutiae based matching, Fingerprint image processing.
DETEKSI KEDIPAN MATA PADA VIDEO MENGGUNAKAN OPEN CV Haruno Sajati; Anggraini Kusumaningrum; Bagus Budi Utomo
Compiler Vol 6, No 1 (2017): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (311.759 KB) | DOI: 10.28989/compiler.v6i1.197

Abstract

In the development of technology in the current era is one of the most rapid progress, it is marked by almost all managers of data and information has been done with the computer because of the increasingly diverse information issues handled, Detection of objects is one of the most important early stages before Done object recognition process. Eye blink detection can be used to open a new file or an application. In this research use case detection eye blinking on video using OpenCV to open notepad application. The blink detection uses the haar cascade classifier method for realtime detection and the  OpenCV Library. The first step determines the pattern 1111100000. Next enter the video sample avi format to match with a predetermined pattern. In this program the system managed to detect the eye according to the pattern by circling the eye area when the eyes are open or literate and when the eyes closed or brake there is no circle in the eye area for the correct video sample.
PENERAPAN EIGENFACE UNTUK COMPUTER BASED TEST (CBT) PENERIMAAN MAHASISWA BARU SEKOLAH TINGGI TEKNOLOGI ADISUTJIPTO Haruno Sajati; Astika Ayuningtyas; Dwi Kholistyanto
Compiler Vol 6, No 2 (2017): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (447.556 KB) | DOI: 10.28989/compiler.v6i2.228

Abstract

One of the development of computer technology is the availability of systems or applications that help human work everyday so that can be resolved quickly and correctly. The system, one of which is Computer Based Test (CBT). CBT is an application used for tests conducted using computers that are in the application there are some features of CBT security when working on the problem. CBT can use a stand-alone computer, a computer connected to a network or a computer connected to the internet. Facial recognition is a type of biometric application that can identify specific individuals in a digital image by analyzing and developing face patterns. In its implementation, CBT has a weakness in the security system that becomes the gap of CBT users to commit fraud, therefore required a good security system with the creation of CBT applications that use eigenface algorithm. It is necessary to have a security system that overcomes the problem that is required identification of face recognition of participants during the test so that cheating can be reduced. The results of the test using eigenface algorithm accuracy rate reached 82%, some things that affect the level of accuracy is, the intensity of light, facial position and the use of accessories on the face.
PERANCANGAN ALGORITMA ANGGI (AA) DENGAN MEMANFAATKAN DIFFIE-HELLMAN DAN RONALD RIVEST (RC4) UNTUK MEMBANGUN SISTEM KEAMANAN BERBASIS PORT KNOCKING Anggi Sri Septiani Suhendar; Haruno Sajati; Yenni Astuti
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (154.818 KB) | DOI: 10.28989/compiler.v2i2.47

Abstract

In managing a server, an administrator takes a variety of ways for ensuring the safety and cosiness of the system. One type of threat that attack on the server is done on a port that is in an open state, thus making people who do not have access rights to perform port scanning to infiltrate into the server. One solution to cope with the attack on the port can be done by using port knocking. Port knocking is a method that can be applied to the server with the workings of such a code to unlock the safe. Port knocking is done by inserting a predetermined port sequenced to open a specific port. At the port sequenced delivery process takes an additional authentication likes keyport. Anggi algorithm (AA) is an algorithm that is built by combination o f Diffie-Hellman and RC4. The algorithm is used for encryption and descriptions a keyport from client side to the server side. In the process of sending a keyport to be modified by using the arithmetic calculation. Process of encryption and description keyport is done to prevent some attacks on the server by hackers with extracting such information after successfully breaking into a port. The results o f implementation AA algorithm on the process of port knocking can secure the delivery process o f keyport and improve the security o f server.
Analysis of Combination Knowledge Acquisition of Haar Training for Object Detection on the Viola Jones Method Haruno Sajati; Anggraini Kusumaningrum; Nur Hanifah
Compiler Vol 8, No 2 (2019): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (834.874 KB) | DOI: 10.28989/compiler.v8i2.538

Abstract

Viola Jones method uses the file classifier to object detection. The training process to create object classifier file requires very high computer resources and time which is directly proportional to the amount of training data. The amount of training data determines the accuracy of object detection. The long training process is caused because the computer has low specifications and the distribution of Haartraining files will speed up the process of vector file formation, minimize errors when cutting Haar features on positive objects and also minimize errors that occur during the training process. The problems that arise next are how to overcome this so that a better knowledge is obtained. This study provides analysis results of the process of merging knowledge acquisition and its effect on the accuracy of object detection using the Viola-Jones method with the final result undetected object decrease 52.62% and object detected increase 23.78%
Notification Using Telegram to Identify and Determine the Needs of Handling Packaging Dangerous Goods Wildansyah Reza Fahlevi; Indro Lukito; Haruno Sajati
Compiler Vol 8, No 1 (2019): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (412.729 KB) | DOI: 10.28989/compiler.v8i1.318

Abstract

Aviation requires a very high level of security and safety, so that there is no problem that can harm various parties, one of the things that must be considered is about the transportation and handling of Dangerous Goods material. Existing handling system on the flight of dangerous goods systems where outside there is still a lot of risk of handling errors until there is data inaccuracy that can harm various parties, because almost all handling done manually. In addition, the plane does not want to delay and does not want to insert dangerous goods into the plane, so to anticipate the problem conditions, built a system that performs faster, easier and accurate handling, where the system uses PHP programmer language and utilize Telegram API as media Client Server. The built tool explains how to identify packaging, calculations and documents, this tool has reliability with the ability to calculate and identify faster than the manual way with average calculations whose value is significantly different. The values obtained by manually counting which is about 175 Minutes 8 Second or equivalent to 2 Hours 55 Minutes 8 Second and counting with the system  about 94 Minutes 44 Seconds or equivalent to 1 Hour 34 Minutes 44 Seconds, then more than 46% the results are different.
Water Resources Mapping for Firefighters in Kotamadya Yogyakarta Based on Android Yuliani Indrianingsih; Haruno Sajati; Bayu Sugara
Compiler Vol 8, No 2 (2019): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (403.393 KB) | DOI: 10.28989/compiler.v8i2.519

Abstract

Fire extinguishing system in placing reservoirs there are still many officers who do not know the location so that they can implement computerized technology so that firefighters can work to maximize the information technology made by the author well. Mobile-based reservoir mapping system application developed using Geofence method. The main purpose for this application that officers can easily find the location of the reservoir closest to the location of the fire and where officers can also find out the location of the reservoir distance from the fire. The accuracy of testing results with Google maps where the accuracy is very precise to the location of the water source or reservoir. Testing using a smartphone comparison from Android 4.1 Jelly Bean version to Android 7.0 Nougat can run with distance results in the application using google maps, get the same results and where there is a test version of Android V4.4 Kitkat that did not work because RAM does not support this application. Testing in the form of a black box method where this method tests every function contained and the test is functioning and running as smoothly as possible where the system is functioning properly with success rate 100%.
PENCARIAN INFORMASI DATA PESAWAT MENGGUNAKAN NOMOR REGISTRASI PESAWAT DENGAN MEMANFAATKAN DATABASE DAN JSON Yulis Robert Latumaone; Haruno Sajati; Nurcahyani Dewi Retnowati
Compiler Vol 5, No 2 (2016): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (338.648 KB) | DOI: 10.28989/compiler.v5i2.172

Abstract

Currently, not much o f public didn’t know about the information of data aircraft, the manufacture and type is sample. The aircraft also has registration number which not same between one aircraft with another aircraft. Information retrival of data aircraft can used registrationnumber with developed in an applicationwith take advantage of database and JSON (JavaScript Object Notation). JSON is a data exchange system that ’s easily translated in to the language o f computer or human. Data exchange these give mean make the distribution application base o f webservices. Web services is a system that provide service the another system to share resource. Procces o f made an application with base of web services must suitable with SOA (Service Oriented Architecture), where SOA is a model representation to up model shape which hasdistribution. For Implementation SOA, it can use the language of programming PHP (Hypertext Preprocessor). Tested on six aircraft, indicated o f airport and airline data can to point out that use of database and JSON can be run well. Decided o f internet network is an obtacle to present data.
Co-Authors . Sudaryanto Afrizal Triantoro Agustian, Harliyus Aldri Frinaldi Alfian Firdaus Anarianto, Donny Andaruwati, Ragil Andaruwati, Ragil Anggi Sri Septiani Suhendar Anggraini Kusumaningrum Anggraini Kusumaningrum Anggraini Kusumaningrum Anggraini Kusumaningrum, Anggraini Antok Hermawan Anton Honggowibowo Anton Setiawan Honggowibowo Arwin Datumaya Wahyudi Sumari Astika Ayuningtyas Astika Ayuningtyas Astika AyuningTyas, Astika Awangga, Demmy Nanda Bagus Budi Utomo Bambang Sudibya Bambang Sudibya, Bambang Bayu Sugara Brama Ady Sulistiyo Cakra Aminuddin Hamka Candra Wulan, Puspa Ira Dewi Demmy Nanda Awangga Dewi Retnowati, Nurcahyani Dwi Kholistyanto Dwi Nughraheny Dwi Nugrahenny Dwi Nugrahenny, Dwi Dwi Nugraheny Dwi Nugraheny Dwi Nugraheny, Dwi Eko Cahyo Nugroho, Eko Cahyo Eko Murdiansyah Eko Poerwanto Elizabeth Nurmiyati Tamatjita Evi Wahyuningsih Fahlevi, Wildansyah Reza Fakhri Yahya, Muhammad Firdaus, Alfian Freddy Kurniawan Freddy Kurniawan Galih Andita Sukma Galih Dwi Wicaksono Hamka, Cakra Aminuddin HARLIYUS AGUSTIAN Hermawan, Antok Ida Ayu Putu Sri Widnyani Indro Lukito Irawaty, Mardiana Kholistyanto, Dwi Kristopedus Zonggonau Lasmadi, Lasmadi Latumaone, Yulis Robert Leonardo Tampubolon Lukito Edi Nugroho Lukito, Indro Maria Asumpta Deny Kusumaningrum, Maria Asumpta Deny Masih Musliatun Murdiansyah, Eko Musliatun, Masih Muttaqin Muttaqin Nova Adi Suwarso Nughraheny, Dwi Nur Hanifah Nur Hanifah Nurcahyani Dewi Retnowati Nurcahyani Dewi Retnowati Nurdin, Riani Nuryatno, Edi Triono Okto Dinaryanto Pamungkas, Dedi Bintang Pujiastuti, Asih Puspa Ira Dewi Candra Wulan Ramdan, Ramdan Ridi Ferdiana Rizki Tanjung Salam Aryanto Setiawan, Yoris Sri Mulyani Sudaryanto Sudaryanto SUDARYANTO SUDARYANTO Sugara, Bayu Suhendar, Anggi Sri Septiani Sukma, Galih Andita Sulistiyo, Brama Ady Suwarso, Nova Adi Tanjung, Rizki Triantoro, Afrizal Utomo, Bagus Budi Wicaksono, Galih Dwi Wildansyah Reza Fahlevi Wintolo, Hero Wiyasa, Ega Ari Yenni Astuti Yenni Astuti, Yenni Yoris Setiawan Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yulis Robert Latumaone Zonggonau, Kristopedus Zulham Zulham