Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : JTRM (Jurnal Teknologi dan Rekayasa Manufaktur)

Penentuan Lintasan Pergerakan Quadcopter Berbasis GPS (Global Positioning System) Abdur Rohman Harits Martawireja; Hadi Supriyanto
Jurnal Teknologi dan Rekayasa Manufaktur Vol 1 No 2 (2019): Vol 1 No 2 (2019): Volume: 1 | Nomor: 2 | Oktober 2019
Publisher : Pusat Pengembangan, Penelitian dan Pengabdian kepada Masyarat (P4M) Politeknik Manufaktur Bandung (Polman Bandung)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (721.812 KB) | DOI: 10.48182/jtrm.v1i2.7

Abstract

UNMANNED AERIAL VEHICLE (UAV) is an aerial vehicle without pilot that can be controlled. There are two types of UAV, fixed wing and rotary wing. Quadcopter becomes one of rotary wing type UAV that is commonly used in various needs, like exploration and imaging. In this study, Quadcopter is used as the vehicle that moves following the path produced by the GPS on followed objek (main modul). The type of the GPS installed on Quadcopter (GPS1) and main modul (GPS2) are GPS Ublox NEO. The working principle of the system is Quadcopter follows the track coordinates generated by GPS1, which GPS1 track data is sent to the Quadcopter using Bluetooth media. While the Quadcopter moves, it will continuously compare the coordinate data produced by the Quadcopter's position with the track coordinate data that had been received. Testing on the Main Module GPS Receiver (GPS1) and GPS Receiver Quadcoter (GPS2), both GPS is able to get GPS data from satellites, but data can be lost or deviated in confined spaces. Error / difference in data from GPS1 and GPS2 in Quadcopter movement testing to follow the Main Module as the destination point at latitude and longitude, respectively, are 53% and 51%.
Analisis Metode Pengenalan Wajah Two Dimensial Principal Component Analysis (2DPCA) dan Kernel Fisher Discriminant Analysis Menggunakan Klasifikasi KNN (K- Nearest Neighbor) Abdur Rohman Harits Martawireja; Hilman Mujahid Purnama; Atika Nur Rahmawati
Jurnal Teknologi dan Rekayasa Manufaktur Vol 2 No 2 (2020): Vol 2 No 2 (2020): Volume: 2 | Nomor: 2 | Oktober 2020
Publisher : Pusat Pengembangan, Penelitian dan Pengabdian kepada Masyarat (P4M) Politeknik Manufaktur Bandung (Polman Bandung)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.48182/jtrm.v2i2.30

Abstract

many applications apply it, both in the commercial and law enforcement fields. Face recognition is a system that used to identify based on the facial characteristic of a biometric-based person which has high accuracy. Face Recognition can be used in security system. Many methods are used in face recognition for security system, but in this paper will discuss only about 2 methods, there are Two Dimensial Principal Component Analysis and Kernel Fisher’s Discriminant Analysis and each methods use K-Nearest Neighbor for the class classification. For the testing system, both of them use the cross validation testing method. From the previous research, the face recognition accuracy with 5-folds cross validation of Two Dimensial Principal Component Analysis method is 88,73%, while the accuracy with 2-folds cross validation of it is 89,25%. And the average of Kernel Fisher Discriminant Analysis’ accuracy is about 83,10%.
Proteksi Keamanan Data pada Quick Response (QR) Code Abdur Rahman Harits Martawireja; Ridwan Ridwan; Angga Putra Hafidzin; Muhammad Taufik
Jurnal Teknologi dan Rekayasa Manufaktur Vol 3 No 2 (2021): Vol 3 No 2 (2021): Volume: 3 | Nomor: 2 | Oktober 2021
Publisher : Pusat Pengembangan, Penelitian dan Pengabdian kepada Masyarat (P4M) Politeknik Manufaktur Bandung (Polman Bandung)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.48182/jtrm.v3i2.58

Abstract

The implementation of Quick Response (QR) Code to share or store information increased widely. QR code can quickly provide a data or information such as contact person, plain text, URLs or other data by scan a QR code using smartphone camera. The raised of QR code implementation must to be follow by a level of data security. In this journal we will discuss a number of processes that can be used to improve data security in QR codes. In computer science there are several terms related to data protection i.e. Cryptography and Steganography. Cryptography focuses on securing information in the data exchange process. Steganography is a process of hiding information into an object that cannot be detected by anyone without a steganographic key. With these two processes i.e. cryptography and steganography or a combination of both, the data embedded in the QR code will not be easy to translate. The method that will be discussed is Speck Algorithm encryption and Advanced Encryption Standard (AES) with a combination of Steganography. Both methods succeed in converting confidential information into data that is not easily recognized. Confidential information that goes through a steganographic process becomes difficult to detect and gives the wrong message to a third party.