Articles
APLIKASI WATEMARKING UNTUK PERLINDUNGAN HAKI PADA CITRA DIGITAL DALAM DOMAIN FREKUENSI MENGGUNAKAN FAST FOURIER TRANSFORM (FFT)
Kartika Firdausy;
Anton Yudhana;
Eka Rahmat B
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 4, No 2: August 2006
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v4i2.1255
Watermarking adalah suatu metode untuk menyebunyikan data pada data digital tanpa diketahui oleh indera penglihatan atau pendengaran. Dalam paper ini watermarking di aplikasikan untuk perlindungan HaKI pada citra digital khususnya citra diam (gambar). Metode watermarking yang digunakan dengan memanfaatkan transformasi matematis Fast Fourier Transform (FFT) yang berfungsi untuk mentransformasikan dari domain spasial ke domain frekuensi, karena citra label yang tertanam di dalam citra host lebih kuat terhadap serangan setelah melaluai transformasi terlebih dahulu. Ada dua program utama dari aplikasi watermarking yaitu program proses inserting (penyisipan) yang berfungsi untuk menyisipkan citra label atau label kepemilikan kedalam citra yang dilindungi dan program proses extracting (pendeteksian) sebagai pendeteksi label yang tertanam di dalam citra tersebut. Hasil watermarking yang dicapai dalam paper ini adalah informasi atau label yang tertanam dalam citra digital, invisible (tidak nampak oleh kasat mata) dan robust (tahan) terhadap penghapusan secara langsung atau dari beberapa proses pengolahan citra digital.
PENGENDALIAN ALAT-ALAT LISTRIK DENGAN SINYAL AUDIO MEMANFAATKAN JALA-JALA LISTRIK
Balza Achmad;
Anton Yudhana;
Belly Apriansyah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 4, No 1: April 2006
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v4i1.1246
Pada penelitian ini dirancang alat pengendalian jarak jauh memanfaatkan jala-jala listrik PLN. Dengan memanfaatkan jala-jala PLN, pengendalian alat-alat rumah tangga diharapkan dapat dilakukan dari tempat yang berbeda. Alat pengendalian terdiri dari, rangkaian pemancar dan penerima. Rangkaian pemancar menggunakan dua buah IC, yaitu IC 4011 sebagai osilator pembangkit frekuensi dan IC 4049 berfungsi untuk menguatkan tegangan yang dihasilkan dari osilator. Rangkaian penerima menggunakan IC NE567 yang berfungsi mendeteksi frekuensi yang dikirim dari pemancar sedangkan IC 4027 berfungsi sebagai saklar toggle dan IC 4011 berfungsi untuk menghilangkan noise. Metode perancangannya adalah membangkitkan sinyal frekuensi sebesar 227 Hz yang dihasilkan dari rangkaian pemancar. Selanjutnya frekuensi akan dikirim melalui jala-jala listrik dan diterima oleh rangkaian penerima. Pengambilan data dilakukan dengan cara mengukur jarak pemancar dan penerima. Hal ini dilakukan untuk mengetahui karakteristik pengendalian dari alat-alat listrik. Hasil penelitian menunjukkan telah dapat dirancang sistem alat pengendalian alat-alat listrik memanfaatkan jala-jala listrik dengan sinyal audio.
Design of Handphone Wireless Charger System Using Omnidirectional Antenna
Anton Yudhana;
Fahrizal Djohar
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v15i4.5819
Using cable as power transmission medium cause problem in flexibility and aesthetics. Wireless power transmission for charging handphone releasednowadays still using antenna with radiation pattern focus in one direction, that is just toward the top, and if the antenna was shifted then power transmitted will be lose. The purpose of this research is to produce wireless power charger system used for charging handphone power using resonator based on omnidirectional antenna and test the performance. The device in this research was designed in two main part, that is transmitter and receiver. In transmission section, there is power supply used for supplying power to oscillator to generate oscillating signal in the form of electrical power to be transmitted to receiver via antenna in the form magnetic field. In receiver section, receiver antenna received the power transmitted that is still in the reach of magnetic field generated by transmitter. The power that is still in the form of oscillating signal, then stabilized for the purpose of handphone power using rectifier and voltage regulator. Design has been made successfully to the form of handphone battery power wireless chargerusing omdirectional antenna which consist of two main part, that is transmitter and receiver. The transmitted power is 3.058 watt with frequency 714 KHz, and receiver received the power and then stabilized the signal to produce output power 58.706 miliwatt. This device can transmit power in all directions horizontally (angle 360°). This device also tested with some kind of obstacle, with the result almost all obstacle still could transmit the power except metal.
Segmentation Comparing Eggs Watermarking Image and Original Image
Anton Yudhana;
Sunardi Sunardi;
Shoffan Saifullah
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (436.281 KB)
|
DOI: 10.11591/eei.v6i1.595
The research used watermarking techniques to obtain the image originality. The aims of the research were to identify small area in eggs properly and compared preprocessing, the methods, and the results of image processing. The study has been improved from the previous papers by combined all methods and analysis was obtained.This study was conducted by using centroid and the bounding box for determining the object and the small area of chicken eggs. The segmentation method was used to compare the original image and the watermarked image. Image processing using image data that are subject watermark to maintain the authenticity of the images used in the study will the impact in delivering the desired results. In the identification of chicken eggs using watermark image using several methods are expected to provide results as desired. Segmentation also deployed to process the Image and counted the objects. The results showed that the process of segmentation and objects counting determined that the original image and watermarked image had the same value and recognized eggs. Identification had determined percentage of 100% for all the samples.
Ekstraksi Ciri Metode Gray Level Co-Occurrence Matrix Untuk Identifikasi Sel Darah Putih
Anwar Siswanto;
Abdul Fadlil;
Anton Yudhana
JOINTECS (Journal of Information Technology and Computer Science) Vol 5, No 2 (2020)
Publisher : Universitas Widyagama Malang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31328/jointecs.v5i2.1334
Dalam tubuh manusia terkandung darah, terdiri dari komponen selular dan non selular, salah satu komponen selular adalah sel darah putih. Darah didistribusikan melalui pembuluh darah dari jantung ke seluruh tubuh. Sistem ini berfungsi untuk memenuhi kebutuhan sel atau jaringan akan nutrien dan oksigen serta mentranspor sisa metabolisme sel atau jaringan keluar dari tubuh. Sel darah putih merupakan salah satu indikator penegakan diagnosa. Identifikasi secara manual membutuhkan waktu yang lama dan cenderung subjektif tergantung dari pengalaman petugas. Penelitian ini bertujuan untuk membantu identifikasi sel darah putih secara otomatis sehingga didapatkan hasil yang cepat dan akurat. Eosinofil, Basofil, Neutrofil, Limfosit dan Monosit adalah sel darah yang diteliti. Penelitian ini menggunakan citra apus darah tepidengan pengecatan menggunakan My Grundwald dan mikroskop kamera okuler digital. Segmentasi citra berdasarkan ruang warna Hue Saturation dan Value (HSV) dan ekstraksi ciri sel darah putih menggunakan metodeGray Level Co-occurrence Matrix (GLCM) yaitu fiturAnguler Second Moment (ASM), Contrast, Inverse Different Moment (IDM), Entropy, Correlation. Pada proses pengujian di hasilkan nilai ekstraksi ciri GLCM dengan pola yang mirip. Dapat digunakan untuk indentifikasi sel darah putih.
Distributed Denial of Service (DDoS) Analysis on Virtual Network and Real Network Traffic
Anton Yudhana;
Imam Riadi;
Sri Suharti
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 5, No 1 (2021): EDISI JULY 2021
Publisher : Universitas Medan Area
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31289/jite.v5i1.5344
Data communication, computers and computer networks increase the needs and facilitation offered by a variety of server services that are owned by individuals and companies. Servers are the core of continuous communication on the internet and the main factor in the life, development and death of individual businesses or companies that rely on the internet. The other side is also developing rapidly targeting server attacks from starting to weaken performance to crippled, the most popular in the hacker world, namely attacks by bombarding servers with many requests from one computer or more, with one machine to thousands of machines. This study implements several DDoS attack techniques targeted at virtual servers and real servers to determine the type of protocol used and its accuracy and reliability. The research method uses the concept of Robert Maribe Branch (2009) or ADDIE which consists of Analysis, Design, Development, Implementation and Evaluation with the results of successful attacks on the HTTP header on the virtual network and on the real network 85.68%, while the TCP has an accuracy value. 87.75% and the real network produces 90.02%. In addition, the attack using the ping of death on the virtual server was successfully carried out and the real server had an accuracy value of 41.45% so that the attack on the TCP protocol was declared very effective in crippling the target PC or server.
Segmentation Comparing Eggs Watermarking Image and Original Image
Anton Yudhana;
Sunardi Sunardi;
Shoffan Saifullah
Bulletin of Electrical Engineering and Informatics Vol 6, No 1: March 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (436.281 KB)
|
DOI: 10.11591/eei.v6i1.595
The research used watermarking techniques to obtain the image originality. The aims of the research were to identify small area in eggs properly and compared preprocessing, the methods, and the results of image processing. The study has been improved from the previous papers by combined all methods and analysis was obtained.This study was conducted by using centroid and the bounding box for determining the object and the small area of chicken eggs. The segmentation method was used to compare the original image and the watermarked image. Image processing using image data that are subject watermark to maintain the authenticity of the images used in the study will the impact in delivering the desired results. In the identification of chicken eggs using watermark image using several methods are expected to provide results as desired. Segmentation also deployed to process the Image and counted the objects. The results showed that the process of segmentation and objects counting determined that the original image and watermarked image had the same value and recognized eggs. Identification had determined percentage of 100% for all the samples.
Webcam Untuk Sistem Pemantauan Menggunakan Metode Deteksi Gerakan
Kartika Firdausy;
Daryono Daryono;
Anton Yudhana
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2008
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Recently, numerous daily activities force people to leave their home more often. This situation oftentriggers crimes. Slow handling and lack of anticipation cause the number of crimes increases. Therefore, amonitoring mechanism is needed to improve the security and as an anticipation to unexpected offenses. Thispaper discusses the design of movement detecting system using webcam to monitor the presence of movingobjects with size of human bodyWebcam Logitech QuickCamTM IM is used to capture the object movement at 30 fps. The actual image iscompared to the previous image. The comparison is done for every 5 frames. The software is written in Pascallanguage. A buzzer type alarm is also included in the system. If the camera captures an image of an object withsize greater than or equal to a threshold value, the alarm will be activated and the system records the objectimages. The system is capable in detecting the movement of objects at effective range of 3.5 m.Key words: movement detection, webcam, monitoring
Rancang Bangun Modulator Digital BPSK Berbasis CPLD MAX7000S
Anton Yudhana;
Tole Sutikno;
Muhammad Aris Fajar Ilmawan
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2007
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Permasalahan dalam merancang hardware modulator digital BPSK sangat rumit ketika dihadapkan padadata input yang mempunyai banyak bit, sehingga perlu dikembangkan modulator digital menggunakan metodelain. Modulator Digital BPSK Berbasis CPLD MAX7000S menjadi salah satu pilihan karena CPLD memuatribuan gerbang logika yang dapat diprogram untuk membentuk suatu logika. Tujuan dari penelitian ini adalahmerancang dan membuat modulator digital BPSK berbasis CPLD.Metode penelitian dilakukan dengan suatu perancangan software dan hardware modulator BPSK. Tahapperancangan rangkaian logika dengan perangkat lunak MAX+Plus II Baseline meliputi: perancanganrangkaian untuk menghasilkan frekuensi pembawa 20 KHz dan frekuensi informasi 5 KHz, perancanganrangkaian memori sinusoida, perancangan multiplexer 8 ke 1 untuk data input, dan perancangan multiplexer 2ke 1 untuk memilih memori sinusoida. Perancangan hardware meliputi: perancangan saklar input, perancanganDAC, dan perancangan BPF. Proses berikutnya menguji setiap bagian dengan mengkompilasi danmensimulasikan rangkaian logika yang digambar pada perangkat lunak. Hasil simulasi output modulator digitalBPSK ditampilkan dengan Microsoft Office Excel.Hasil penelitian menunjukkan bahwa rangkaian modulator digital BPSK yang dirancang telah dapat dicompiledan secara simulasi dengan perangkat lunak MAX+Plus II Baseline telah menunjukkan hasil sesuaiyang diharapkan. Fase output dari modulator digital BPSK berubah jika data yang dikirimkan berbeda logika.Hal ini menunjukkan bahwa hasil perancangan sesuai dengan teori modulasi BPSK.Kata kunci: Modulator digital, BPSK, CPLD.
Sistem Informasi Kereta Api Berbasis SMS
Kartika Firdausy;
Anton Yudhana;
Lutfatul Kholifah
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2007
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Jumlah penumpang yang memakai transpotasi kereta api dari tahun ke tahun mengalami peningkatanyang cukup besar terutama menjelang dan setelah lebaran. Bertitik tolak dari hal tersebut, peningkatan mutupelayanan dan mutu stasiun perlu ditingkatkan, dan salah satunya adalah dengan melakukan sistem informasijadwal kedatangan/jadwal keberangkatan serta pemesanan tiket kereta api menggunakan komputerisasi. Tujuanpenelitian ini adalah merancang suatu sistem informasi kereta api dan melakukan uji coba terhadap sisteminformasi kereta api tersebut.Permasalahan dalam penelitian ini adalah bagaimana membuat suatu sistem informasi kereta apiberbasis SMS dan bagaimana melakukan uji coba terhadap sistem informasi kereta api tersebut.Subjek penelitian ini adalah sistem informasi kereta api berbasis SMS yang di rancang sebagai suatumedia penyedia informasi yang diwujudkan dalam bentuk SMS.Penelitian ini menghasilkan suatu program sistem informasi kereta api berbasis SMS yang telah di ujicoba dengan dengan baik. Dari hasil uji coba program tersebut dapat dioperasikan dengan baik.Kata kunci: Sistem informasi kereta api, SMS, dan MobileFBUS.