Claim Missing Document
Check
Articles

Found 3 Documents
Search

RANCANG BANGUN SISTEM KEAMANAN RUANG SANDI BERBASIS PENGENALAN CITRA WAJAH DI SATKOM LANTAMAL V SURABAYA Dedi Nugraha; Lamhot Marsidi Solin; Alexander Victor Bukit; Zainal Syahlan
JOURNAL ASRO Vol 7 (2017): Jurnal Analisis Sistem & Riset Operasi
Publisher : Indonesian Naval Technology College - Sekolah Tinggi Teknologi Angkatan Laut - STTAL

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (817.892 KB)

Abstract

Informasi dan teknologi yang terus berkembang pada saat ini membuat komputertidak lagi hanya sebagai alat komputasi semata, akan tetapi telah beralih menjadi sebuahmesin yang hampir dapat menyamai kemampuan otak manusia untuk dapat mengenali wajahmanusia terutama pencarian pada database wajah yang memiliki ukuran sangat besar.Pengenalan wajah merupakan proses identifikasi manusia dengan menggunakan ciri darisuatu raut wajah manusia, salah satu teknik yang dikembangkan pada sistem pengenalanwajah adalah eigenface, yang akan memberikan suatu nilai ciri dari wajah dalam bentukeigenvector (Eigenface) terhadap gambar wajah yang akan diamati, kemudian hasil yangdiperoleh akan menentukan identitas pemilik wajah tersebut.Pengamanan pintu ruangan sandi sangat diperlukan sekali, untuk itu pada tugasakhir ini dirancang sebuah sistem pengenalan wajah yang dapat memberikan hak aksesterbatas hanya kepada orang yang memiliki tugas dan tanggung jawab terhadap ruang sandi.Sistem pengenalan wajah ini dapat mengontrol purwarupa pintu dengan komunikasiserial dari personal computer (PC) ke mikrokontroler (arduino uno) sehingga akanmenggerakkan solenoid pengunci pintu untuk membuka pintu apabila gambar wajah tersebutdapat dikenali. Adapun tingkat keberhasilan sistem pengenalan wajah ini bergantung terhadappencahayaan, posisi dan mimik wajah. Hasil uji coba sistem sistem yang dikembangkan padatugas akhir ini menunjukkan tingkat akurasi 95% dengan batasan ekspresi wajah normal,posisi kepala di depan kamera, serta pencahayaan yang wajar.Kata kunci : Eigenface, Eigenvector, Face recognition system.
SECOND NAVAL FLEET COMMAND DISINFOLAHTA INFORMATION SYSTEM NETWORK COMMUNICATION PROCEDURE FOR SUPPORTING THE NAVAL TASK Adi Widodo; Chairul Imron; Sutrisno Sutrisno; Zainal Syahlan
JOURNAL ASRO Vol 13 No 4 (2022): International Journal of ASRO
Publisher : Indonesian Naval Technology College - Sekolah Tinggi Teknologi Angkatan Laut - STTAL

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Disinfolahta’s second naval fleet command has the Main task of assisting with the field of development, data collection, and processing as well as presenting information, research, and development within the Koarmada II environment and acting as an information technology service center. Telegraphic communication radio within the Indonesian Navy is used for long-distance communication between ships, aircraft, and international shore radio. RTG Telegraphic communication radio uses international Morse signs, Q codes, and Z code procedural signs to convey information or news. The application of Radio Communication Telegraphy is very vulnerable to information theft. Important information conveyed from ship to ship, ship to aircraft, or to shore radio or vice versa can be accessed publicly. Information system security defense at Disinfolahta Koarmada II has not shown a level of efficiency and effectiveness, due to the absence of a special section in the field of information system security issues related to data transactions in communication networks. Improvement or improvement of information security is needed which plays a role in maintaining the confidentiality of information. Increasing the security and confidentiality of information is very necessary so that important information that is distributed is not known by unauthorized parties. This study plans a communication protocol scenario using the Mavlink and AX2.5 communication protocols. Each scenario will be run using a simulation to get network performance. The results of network performance measurements will be modeled using a dynamic system to get the best communication protocol as a proposal in order to improve the information security system at the Second naval fleet command. Keywords: RTG, Mavlink, AX2.5, network performance, communication protocols
DATA SECURITY RISKS ON SOCIAL MEDIA FOR THE MILITARY Leli Setyaningrum; Saravia, Luciano; Zainal Syahlan
Nusantara Hasana Journal Vol. 4 No. 11 (2025): Nusantara Hasana Journal, April 2025
Publisher : Yayasan Nusantara Hasana Berdikari

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59003/nhj.v4i11.1363

Abstract

Modern military organizations are influenced by the development of information technology that continues to innovate and the demands of speed and accuracy of data and information. The importance of data security in using social media for the military requires security methods with different specifications to protect the confidentiality of data, especially regarding military operations. The use of qualitative methods with a grounded theory approach provides an understanding of the phenomena that are occurring in the research object. The existence of social media to date, cannot be denied based on existing data, has a big influence on the environment and operations in the military, so there is a need for the development of data or social media security methods with special specifications for the military, both in the form of cryptography with the development of encryption algorithms and their descriptions, as well as innovations for special models of data and information security in the military environment.