Claim Missing Document
Check
Articles

PEMBANGKITAN FADING CURAH HUJAN DENGAN MODEL DATA BERDISTRIBUSI LOGNORMAL UNTUK PENDISAINAN KOMUNIKASI LMDS Made Sutha Yadnya; Putra Sastra
Jurnal Teknologi Elektro Vol 7 No 2 (2008): (July - December) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (248.773 KB)

Abstract

Penelitian ini dilakukan sebagai model pembangkitan kanal penggangu pada komunikasi wireless untuk LMDS  di Indonesia dengan pengambilan data curah hujan di Surabaya. Kanal yang dimodelkan adalah kanal terkena hujan pada saat komunikasi berlangsung. Model yang didapatkan adalah model kanal dipengaruhi hujan maka terjadi pelemahan (redaman) disebabkan oleh fading serta perubahan polarisasi dari penjalaran (propagasi) gelombang millimeter orde gigahertz (30 GHz). Pengambilan data menggunakan alat Parsivel dengan memanfaat software ASDO secara online. Variasi data statistik mean, varian, autokorelasi, serta autocovarian dari curah hujan model inti yang harus diolah untuk pembuatan model. Pembangkitan model dengan mengasumsikan bahwa data dari curah hujan berdistribusi lognormal agar data dari hasil pembangkitan berdistribusi normal.
Analisis Pemanfaatan Internet di Pusat Pemerintahan Kabupaten Badung I Made Rai Suarimbawa; Linawati Linawati; Nyoman Putra Sastra
Jurnal Teknologi Elektro Vol 17 No 2 (2018): (May - Agustus) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (950.423 KB) | DOI: 10.24843/MITE.2018.v17i02.P04

Abstract

Abstract— Dishubkominfo as ICT implementing agency, currently serves internet connection of all SKPD in Badung Regency Government Center with bandwidth capacity of 200 Mbps and complaints about the stability and speed of internet access is still a lot going on, both from the internal use of SKPD or external from the community. This problem needs to be addressed by analyzing the characteristics of internet utilization traffic and user behavior in each SKPD so that bandwidth management policy will be right on target. This study aims to monitor and model characters from users using NetFlow and NFDUMP. Based on the study results at Badung District Government Center, it was observed that TCP protocol has the highest level of network usage, followed by UDP protocol, and several other protocols. In terms of traffic sources, it is known that social media is the most frequently accessed site by the user. The results of this study can be used as a consideration in increasing the network bandwidth capacity and policies implemented in the Government Center of Badung Regency associated with internet access.
Sistem Pengamanan Anonym dengan Menggunakan Algoritma Kriptografi ElGamal Ni Komang Ayu Sri Anggreni; Linawati Linawati; Nyoman Putra Sastra
Jurnal Teknologi Elektro Vol 18 No 2 (2019): (Mei-Agustus) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (300.811 KB) | DOI: 10.24843/MITE.2019.v18i02.P07

Abstract

Reporting on act of domestic violence to Integrated Services Center for Woman and Children (Pusat Pelayanan Terpadu Pemberdayaan Perempuan dan Anak (P2TP2A)) Kota Denpasar city is kind of sensitive and vulnerable data to tapping. As a result, security guarantee for the reporter is needed to protect their identity. Security guarantee with anonym reporting system, which uses EIGamal cryptographic algorithm for encryption process and description process. EIGamal cryptographic algorithm is one of asymmetric cryptography which consist of 3 processes, that are process of generate key, encryption process and description process On this security system identity of the reporter will be protected through process of authentication, authorization, and encryption. In this study the researcher uses Android platform and EIGamal cryptographic algorithm for encryption and description, Firebase Auth for authentication, Firebase Rules for authorization and Avalanche Effect for knowing the quality of cryptographic algorithm. The result of the trials which used 10 different ciphet texts of avalanche effect is 58,2%. That result can be categorized as good because a good result of avalanche effect.
AKURASI PENJEJAKAN OBJEK DALAM BERAGAM RUANG WARNA Gede Sukadarmika; Dewa Made Wiharta; Nyoman Putra Sastra
Jurnal Teknologi Elektro Vol 14 No 2 (2015): (July - December) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (619.197 KB) | DOI: 10.24843/MITE.2015.v14i02p15

Abstract

The object trace has been a problem in estimating an object position when the object is moving due to the heavy influence of the uncertainty. Many researcher claim that color histogram is reliable feature to represent this object. . Different investigators use different color spaces in conducting research on tracking the object. So, there is no numerical comparison of the impact of the use of different color spaces to the successful tracking. This study compare the performance of tracking an object by using a different color space i.e.: RGB, HSV, and CIELAB. The performance is shown numerically by comparing the actual position of the object with the results of the estimation.
Evaluasi Pengembangan Disaster Recovery Center untuk Data Center Universitas Udayana Kheri Arionadi Shobirin; Nyoman Putra Sastra; Made Sudarma
Jurnal Teknologi Elektro Vol 20 No 1 (2021): (Januari - Juni ) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/MITE.2021.v20i01.P20

Abstract

Data Center has a vital and strategic role in supporting university operations. Based on Government Regulation No.17 of 2019 article 20 section 1: Every Data Center owner must have a Disaster Recovery Center. Evaluation of Disaster Recovery Center Development for Udayana University Data Center conducted by considering aspects of natural threats, human threats, environmental threats, existing Data Center specification, virtualization, and cloud technology used to maintain the availability of Data Center services for Udayana University with the most efficient development costs. Using cost comparation for DRC development and operation for 3 years, found that implementation cost of Cloud DRC 3 times higher compare to Conventional DRC. High cloud computing cost contribute 67% of Cloud DRC cost structure.
Efektivitas Pesan Teks Dengan Cipher Substitusi, Vigenere Cipher, dan Cipher Transposisi M. Azman Maricar; Nyoman Putra Sastra
Jurnal Teknologi Elektro Vol 17 No 1 (2018): (Januari - April) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (432.294 KB) | DOI: 10.24843/MITE.2018.v17i01.P08

Abstract

Penelitian ini bertujuan untuk mengetahui efektivitas suatu keamanan pesan berbasis teks dengan metode kriptografi klasik seperti Substitusi, Vigenere, dan Transposisi. Dengan penerapan metode kriptografi, diharapkan mampu untuk meminimalisasi terjadinya penyadapan terhadap pesan teks. Ketiga metode tersebut, masing-masing akan di kombinasikan dan dibandingkan efektivitasnya berdasarkan ukuran file dan waktu proses. Terdapat tujuh kombinasi dari ketiga metode tersebut. Hasil pengujian efektivitas didapatkan hasil bahwa, ukuran file terbesar adalah kombinasi Substitusi, Vigenere, dan Transposisi yaitu 11 Kb, sedangkan yang terkecil adalah Substitusi dan juga Vigenere yaitu 5 Kb. Berdasarkan waktu proses terlama adalah Substitusi, Vigenere, dan Transposisi yaitu 1.54 detik, sedangkan yang tercepat adalah Substitusi yaitu 0.37 detik. Dari seluruh kombinasi yang ada, seluruhnya berhasil untuk proses enkripsi dan dekripsi guna mengembalikan cipher text menjadi plain text yang asli.
PENGATURAN PARAMETER PENGKODEAN UNTUK RATE CONTROL PADA PENGKODEAN VIDEO H.261 IMO Widyantara; N. P. Sastra
Jurnal Teknologi Elektro Vol 6 No 2 (2007): (July - December) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (66.173 KB)

Abstract

Pada encoder video berbasis block-transform, parameter pengkodean yang dapat diatur untuk mengontrol output bit rate keluaran adalah frame rate dan step size kuantisasi (Qp). Metode kontrol frame rate adalah menentukan jumlah frame yang dikodekan per detik, merupakan satu parameter pengkodean yang dapat di modifikasi untuk menyeimbangkan kebutuhan bit rate. Metode kontrol step size kuantisasi, memodifikasi parameter Qp didasarkan pada kapasitas buffer transmisi untuk tujuan pencapaian bit rate target. Pengaturan parameter Qp dan frame rate harus mengambil jalan tengah antara output bit/frame dengan kualitas pengkodean.
Implementasi Embedded Linux pada Jaringan Sensor Nirkabel Platform Imote2 Fajar Purnama; I Made Oka Widyantara; Nyoman Putra Sastra
PROSIDING CSGTEIS 2013 CSGTEIS 2013
Publisher : PROSIDING CSGTEIS 2013

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak—Sebelumnya JSN menggunakan sistem operasi Intel Platform X, SOS, dan TinyOS. Kini Platform X dan SOS tidak dikembangkan lagi, sehingga banyak peneliti menggunakan TinyOS. Pada akhir pengguna TinyOS pada platform Imote2 menemukan banyak keterbatasan seperti penerapan pada routing yang complex. Oleh karena itu komunitas Embedded Linux pengembangkan embedded Linux untuk platform Imote2. Pada makalah ini dibahas secara rinci tahap untuk mengembed Linux pada target yaitu perangkat JSN radio sensorboard platform Imote2. Host merupakan Linux operating system. Pengembedan meliputi 3 komponen utama yaitu bootloader, Linux kernel, dan filesystem. Embed dilakukan dengan proses flashing pada JTAG interface menggunakan software OpenOCD. Setelah proses embed, konfigurasi pada target melalui koneksi serial. Konfigurasi meliputi pengaktifkan alamat IP, SSHD, dan radio secara otomatis. Terakhir dibandingkan performansi target yang menggunakan IEEE 802.11 WLAN dan IEEE 802.15.4 ZigBee sebagai media transmisi. Hasilnya penggunaan IEEE 802.11 WLAN lebih boros terhadap memory dan daya listrik.Kata Kunci—JSN, Imote2, Embedded Linux, ZigBee, WLAN, JTAG, OpenOCD.
KORELASI INDIKATOR PENILAIAN PEMERINGKATAN WEBSITE PERGURUAN TINGGI WEBOMETRICS DAN 4ICU Putu Andhika Kurniawijaya; Dewa Made Wiharta; Nyoman Putra Sastra
SINTECH (Science and Information Technology) Journal Vol. 2 No. 1 (2019): SINTECH Journal Edition April 2019
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31598/sintechjournal.v2i1.325

Abstract

Colleges in Indonesia as part of an educational institution that seeks to improve the competitiveness of globally through the utilization of ICT (information and communication technology) has been aware of the importance of the website as a key component of the assessment in an effort to align ourselves as a global standard of the College. The instruments most frequently used by universities as reference materials to evaluate performance and productivity based on his/her website is through a college assessor database world, including Webometrics and 4ICU. Correlation between linking Webometrics and 4ICU are aimed to assist colleges in analyzing the quality of traffic services in the field of scientific publications in order to be able to compete in the global sphere and certainly for the better. The methodology used by using spearman rank correlation against major # 29 University according to the webometrics ranking based on 4ICU and 29 top-rated website 4ICU. The results of the research there is a relationship or a significant correlation between the webometrics ranking indicator with indicator correlation value 4ICU ranking of 0.591 contains the category strong enough.
Pengembangan Metode Autentikasi pada Sistem Presensi Berbasis Aplikasi Mobile Komang Sri Utami; Nyoman Putra Sastra; Dewa Made Wiharta
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 5 No 4 (2021): Agustus 2021
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (608.604 KB) | DOI: 10.29207/resti.v5i4.3110

Abstract

Research has been carried out on a mobile-based presence system authentication method using MAC addresses, BSSID and IP addresses for (Wi-Fi) networks. This study aims to develop an authentication method on the attendance system that meets two authentication requirements, namely the suitability of employee identity and location suitability, so that the attendance process becomes easy, effective, fast, and can reduce fraud. The employee's identity can be obtained from the MAC address of the smartphone that has been previously registered, while the employee's location during the attendance process can be confirmed to be in the company environment by checking the BSSID data and IP of the Wi-Fi network connected to the smartphone. The data is then compared with MAC address data from all Wi-Fi networks installed in the company area. RAD is used as a development model because it is simple and fast. Overall, employee identification and site checking as authentication of the developed system went well. Other than that, every function on the system works well. Furthermore, the results of the user experience evaluation using the UEQ questionnaire received an average score above 0.8 on 6 scales. This shows that the system has attractiveness, perspicuity, efficiency, dependability, stimulation and novelty.
Co-Authors A.A Ngurah Amrita Adhitya Bayu Rachman Pratama Afrizal Awlan Suryandaru agung aditya nugraha Agus Riki Gunawan Agus Supranartha Agusthinus Sampeallo, Agusthinus Anak Agung Bagus Rama Windhu Putra Anggreni, Ni Komang Ayu Sri Ari Wijaya I Kadek Asri Prameshwari Bayu Bimantara Putra Bernandus, B. Cokorda Gde Wahyu Pramana Dewa Made Wiharta dian krisnandari Duman Care Khrisne Dwi Yoga Pratama Fajar Purnama G M Arya Sasmita Gamantyo Hendrantoro Gede Sukadarmika Gusti Ketut Bella I G. A. K. Diafari Djuni Hartawan I Gede Primanata I Gede Wira Darma I Gede Yogi Prawira Putra I Gusti Ayu Garnita Darma Putri I Gusti Ngurah Aditya Dharma I ketut Gede Darma Putra I Ketut Sukawanana Putra I Made Agung Pranata I Made Arsa Suyadnya I Made Artana I Made Oka Widyantara I Made Rai Suarimbawa I Made Sastra Dwikiarta I MADE SUDARMA I Made Sukarsa I Made Widiartha I Nyoman Putra Maharddhika I Nyoman Putu Suwindra I Putu Agus Eka Darma Udayana, I Putu Agus Eka I Putu Aldha Rasjman Sayoga I Putu Arie Pratama I Putu Gede Hendra Suputra I Putu Suryadharma I Wayan Adi Juliawan Pawana I Wayan Krisna Saputra I Wayan Manik Suhartanta Ida Bagus Adisimakrisna Peling Ida Bagus Vidananda Agastya IGN. Agung Dwi Jaya Putra K.O. Saputra Kessawa Adnyana Gede Oka Anak Agung Ketut Adi Kurniawan Kheri Arionadi Shobirin Komang Oka Saputra Komang Sri Utami Komang Tania Paramecwari Komang Yuda Krisnawan Lami, H. F. J. Lely Meilina Lie Jasa Linawati Linawati . Linawati Linawati Luh Ayu Diah Fernita Sari Luh Gede Astuti M Sudarma M. A. Suyadnya M. Azman Maricar Made Pasek Agus Ariawan Made Sri Satyawati Made Sudarma Made Sutha Yadnya Mandala, J. F. Michael Angelo Vincensio Simon Muhammad Anshari Muhammad Anshari Naufal Muhajir Abidin Negara, I Putu Bayu Negara, I Putu Bayu Ni Komang Ayu Sri Anggreni Ni Komang Utari Yulianingsih Ni Made Ary Esta Dewi Wirastuti Ni Putu Diah Arista Ningsih Nicko Satrio Pambudi Nurulita Aini Nyoman Pramaita Putra, A.A.B. Rama Windhu Putra, Rio Juniyantara Putu Andhika Kurniawijaya Putu Dhiko Pradnyana Rantelinggi, P. H. Rifky Lana Rahardian Rio Juniyantara Putra Rukmi Sari Hartati Rukmi Sari Hartati Sari, Luh Ayu Diah Fernita Sukadarmika, I Gede Widyadi Setiawan Wirawan Wirawan Yohanes Hendra Nugroho Yohanes Pracoyo Widi Prasetyo Yusuf Parri Akbar