Claim Missing Document
Check
Articles

Found 8 Documents
Search

Performance Evaluation of Beacon-Enabled Mode for IEEE 802.15.4 Wireless Sensor Network Al Rasyid, M. Udin Harun; Saputra, Ferry Astika; Fahmi, Alfian
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (9039.049 KB)

Abstract

IEEE 802.15.5 standard support structure of star and peer-to-peer network formation. Strating from these, the cluster tree network can be built as a special case of peer-to-peer network to increse coverage area. In this paper, we provide an performance evaluation of beacon- enabled mode for IEEE 802.15.4 wireless sensor network on star and cluster topology in order to get the maximum result to apply the appropriate topology model as needed. We conduct analysis on each topology model by using the numbers of nodes from 10 nodes to 100 nodes to analyze throughput, delay, energy consumption, and probability success packet by using NS2 simulator. The simulation results show that the throughput and the probability of success packet of cluster topology are higher than that of star topology, and the energy consumption of cluster topology is lesser than that of star topology. However, cluster topology increases the delay more than star topology.Keywords: IEEE 802.15.4, wireless sensor network, beacon-enabled mode, topology, csma/ca
Performance Evaluation of Beacon-Enabled Mode for IEEE 802.15.4 Wireless Sensor Network Al Rasyid, M. Udin Harun; Saputra, Ferry Astika; Fahmi, Alfian
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (9039.049 KB) | DOI: 10.24003/emitter.v1i1.8

Abstract

IEEE 802.15.5 standard support structure of star and peer-to-peer network formation. Strating from these, the cluster tree network can be built as a special case of peer-to-peer network to increse coverage area. In this paper, we provide an performance evaluation of beacon- enabled mode for IEEE 802.15.4 wireless sensor network on star and cluster topology in order to get the maximum result to apply the appropriate topology model as needed. We conduct analysis on each topology model by using the numbers of nodes from 10 nodes to 100 nodes to analyze throughput, delay, energy consumption, and probability success packet by using NS2 simulator. The simulation results show that the throughput and the probability of success packet of cluster topology are higher than that of star topology, and the energy consumption of cluster topology is lesser than that of star topology. However, cluster topology increases the delay more than star topology.Keywords: IEEE 802.15.4, wireless sensor network, beacon-enabled mode, topology, csma/ca
IMPLEMENTASI MODEL DYNAMIC PRICING KHUSUS PRODUK AGRO PERISHABLE DENGAN MEMPERTIMBANGKAN PENURUNAN KUALITAS, TINGKAT PERMINTAAN SERTA PREFERENSI PEMBELI Fachrian, Zuhad Achmad; Asmara, Rengga; Basofi, Arif; Saputra, Ferry Astika
Jurnal Sistem Informasi, Teknologi Informatika dan Komputer Volume 13 No 1 Tahun 2022
Publisher : Universitas Muhammadiyah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24853/justit.13.1.%p

Abstract

A pricing strategy is adjusting the price of a product based on the quality of the product. Based on this, the pricing strategy used for one product may not be compatible with other products. This pricing strategy then manifests itself in the pricing policy of the company. In this study, the determination of pricing policy implies an examination of the problems with perishable products. This perishable pricing method has to deal with several unique characteristic effects based on perishables. In addition to the price factor,  demand is also determined by the quality of the product being sold. The challenge for retailers is to choose the right price that is comparable to leveraging product-based quality, triggering consumer desire to buy and unleashing demand, ultimately leading to a surge. business profits. In this study, examples of forwarding pricing are developed and then applied to regular, high-low, daily, private, and hybrid pricing policies. Performance based on each of these guidelines is evaluated under the price-conscious consumer category and the quality-conscious consumer category. Mathematical calculations are performed to determine the policy that will provide the most benefit to the price-conscious consumer category and the policy that will provide the most benefit to the quality-conscious consumer category. Price sensitivity and consumer sensitivity tests are performed to determine policy performance and the reality that arises from policy implementation.   Keywords: dynamic pricing, agro, perishables, dynamic, pricing.
Perancangan Aplikasi Satu Data untuk Perhitungan Indikator Kinerja Umum Pemerintah Provinsi Jawa Timur Wibowo, Prasetyo; Saputra, Ferry Astika; Taufiqurrahman, Irfan
Smart Comp :Jurnalnya Orang Pintar Komputer Vol 13, No 3 (2024): Smart Comp: Jurnalnya Orang Pintar Komputer
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/smartcomp.v13i3.6566

Abstract

Pada era modern saat ini, seluruh kehidupan manusia tidak lepas dari penggunaan Teknologi Informasi, terutama pada bidang pemerintahan yang mana menerapkan Sistem Pemerintahan Berbasis Elektronik. Pemerintah Provinsi Jawa Timur merespon perkembangan teknologi dengan mengimplementasikan Sistem Pemerintahan Berbasis Elektronik guna meningkatkan efisiensi kinerja. Namun, penerapan Sistem Pemerintahan Berbasis Elektronik masih memiliki kekurangan, terutama terkait keredundanan data antar instansi pemerintahan. Hal ini menyebabkan ketidakvalidan data dan kemungkinan hasil yang berbeda saat diolah. Dengan bentuk arsitektur Sistem Pemerintahan Berbasis Elektronik yang bersifat taksonomi serta berbentuk terstruktur multi-level yang mengakibatkan tingginya kompleksifitas untuk melakukan diseminasi data khususnya ketika melakukan perhitungan Indikator Kinerja Utama. Melalui permasalahan yang dijelaskan maka peneliti mengembangkan sistem perancangan aplikasi satu data untuk perhitungan Indikator Kinerja Utama pemerintah provinsi Jawa Timur. Sistem yang dikembangkan digunakan untuk memudahkan pengguna dalam mengelola data berdasarkan kategori atau taksonomi. Dengan data yang diinputkan maka stakeholder dapat menentukan sebuah kebijakan berdasarkan data yang tersedia pada aplikasi tersebut secara real time dan diperbarui secara berkala.
Implementation of Cyber Threat Intelligence on Intrusion Detection System using STIX Framework Mahardhika, Yesta Medya; Saputra, Ferry Astika; Syarif, Iwan; Wibowo, Prasetyo; Ardhani, Misbahul
Journal of Artificial Intelligence and Software Engineering Vol 5, No 1 (2025): March
Publisher : Politeknik Negeri Lhokseumawe

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30811/jaise.v5i1.6518

Abstract

Cyber threats are complex and diverse issues. Various types of threats emerge daily on the internet. In this research, we proposed a new Cyber Threat Intelligence platform to deal with the challenges above, using Snort as a tool for detecting anonymous network traffic and STIX as a serialization format and standardization of Cyber Threat Intelligence data. As a result, a Cyber Threat Intelligence based on Snort contains Apache Spark as the processing engine, MongoDB as the database, and STIX as the serialization format and data standardization. We test our platform by using two data sources, the CIC-IDS2017 dataset, and the real traffic. We successfully converted the snort alerts to STIX format and visualized them into graph. The graph shows indication of network traffic suspicious, the country of attacker come from, attribute information and attack pattern. The experiment shows that converting Snort data to STIX requires considerable time if the amount of data processed is getting bigger, Real Traffic needs 16 seconds of data preprocessing and 3 minutes of conversion time, while PCAP needs 35 seconds of preprocessing time and 13 minutes of conversion time.
Penerapan Aplikasi Klasifikasi Hukum Tajwid Menggunakan Image Processing Kindarya, Fabyan; Kusumaningtyas, Entin Martiana; Barakbah, Aliridho; Permatasari, Desy Intan; Al Rasyid, M. Udin Harun; Ramadijanti, Nana; Fariza, Arna; Syarif, Iwan; Sa'adah, Umi; Saputra, Ferry Astika; Ahsan, Ahmad Syauqi; Sumarsono, Irwan; Yunanto, Andhik Ampuh; Edelani, Renovita; Primajaya, Grezio Arifiyan; Kusuma, Selvia Ferdiana
El-Mujtama: Jurnal Pengabdian Masyarakat  Vol. 4 No. 2 (2024): El-Mujtama: Jurnal Pengabdian Masyarakat
Publisher : Intitut Agama Islam Nasional Laa Roiba Bogor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47467/elmujtama.v4i2.1930

Abstract

Tajwid is an important science that regulates the way of reading the verses of the Al-Qur’an properly. Learning Tajwid means knowing the meaning that corresponds to the correct recitation. Learning to read the Al-Qur’an tends to be done traditionally in a place of learning or by calling a teacher to the house. Learning in this way has some drawbacks, such as the limited availability of trained and competent teachers because not all areas have sufficient access to these teachers. Dependence on schedules and locations can be a constraint for students with limited mobility or busy schedules. The role of the teacher is still important in learning tajwid, especially in providing effective explanations, guidance, and feedback. However, to overcome these shortcomings, integration with independent and technology-based learning methods can help improve the accessibility, flexibility, and quality of tajwid learning. The classification of tajwid laws using image processing allows users to see the results of inputting images of verses of the Al-Qur’an into the type of detected nun sukun tajwid and how to recite it. The initial stage of this system in detecting tajwid laws from uploaded images is the input of images by users, which can be done in two ways, namely by directly taking pictures using a smartphone camera or uploading images from the gallery. This is followed by the OCR process to detect the Arabic text contained in the image and provide diacritics for that Arabic text. Finally, letter classification is carried out after nun sukun and classification of tajwid laws contained in accordance with the detected letters after nun sukun. This system has an accuracy rate of 92.18% from the classification results that have been carried out.
Implementasi Sistem Antrian Online dan On-site di Kelurahan Gebang Putih Surabaya untuk Meningkatkan Efisiensi Layanan Publik Aziz, Adam Shidqul; Mubtadai, Nur Rosyid; Permatasari, Desy Intan; Saputra, Ferry Astika; Syarif, Iwan; Fariza, Arna; Al Rasyid, M. Udin Harun; Kusuma, Selvia Ferdiana; Sumarsono, Irwan; Ahsan, Ahmad Syauqi; Sa'adah, Umi; Yunanto, Andhik Ampuh; Primajaya, Grezio Arifiyan; Edelani, Renovita; Ramadijanti, Nana; Khoirunnisa, Asy Syaffa; Alfaqih, Wildan Maulana Akbar; Al Falah, Adam Ghazy
El-Mujtama: Jurnal Pengabdian Masyarakat  Vol. 5 No. 2 (2025): El-Mujtama: Jurnal Pengabdian Masyarakat
Publisher : Intitut Agama Islam Nasional Laa Roiba Bogor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47467/elmujtama.v5i2.6239

Abstract

Digitalization is an important step in improving the efficiency of public services, particularly in managing queues in government institutions such as sub-district offices. Kelurahan Gebang Putih Surabaya faces significant challenges in managing its manual queue system, which often results in discomfort for the public due to long waiting times, exceeding 5 minutes. This reduces public satisfaction and causes inefficiencies in the queue process. To address this issue, this study aims to develop and implement a digital queue system that can be accessed both online and on-site, using the User-Centered Design (UCD) approach. This approach ensures that every aspect of the system's design and development focuses on user needs through an iterative process, where the design is adjusted based on direct feedback from users. The proposed solution in this study includes the creation of a mobile and website-based queue system, allowing the public to easily take a queue number online and also enabling quick on-site queueing with a wait time of less than 10 seconds. Another advantage of this system is its automated reporting feature, which facilitates documentation and queue reports, thereby accelerating administration and monitoring to the city government. The results show that the implementation of this system significantly reduces the queue-taking time from over 5 minutes to less than 10 seconds, successfully transforming the manual system into a more efficient digital system, and streamlining the reporting process to the government, which in turn improves the quality and satisfaction of public services.
Analisis Kinerja Algoritma Machine Learning Untuk Klasifikasi Potensi FRAUD Klaim Layanan Kesehatan Rumah Sakit Ubed, Imanullah Ali; Syarif, Iwan; Saputra, Ferry Astika
Building of Informatics, Technology and Science (BITS) Vol 7 No 1 (2025): June (2025)
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v7i1.7349

Abstract

Fraud in healthcare claims represents a critical challenge that undermines the efficiency and sustainability of Indonesia's National Health Insurance (JKN) system. This study contributes a large-scale comparative evaluation of five machine learning algorithms for classifying potential fraud in BPJS Kesehatan claims, namely Artificial Neural Network (ANN), Support Vector Machine (SVM), Random Forest (RF), XGBoost + SMOTE, and Logistic Regression (LR). A novelty of this study lies in applying the SMOTE technique in conjunction with XGBoost to address class imbalance in fraud datasets. The dataset consists of over 200,000 claim entries, which have undergone data cleaning, normalization, and feature selection. Performance was assessed using precision, recall on fraud class (positive), f1-score, accuracy, and confusion matrix visualizations to capture classification error distribution. Results demonstrate that ANN and XGBoost + SMOTE are superior in detecting fraudulent claims with high recall, while SVM achieves the most balanced performance in terms of precision and sensitivity. Random Forest and Logistic Regression serve as moderate baselines but are less effective in identifying complex fraud patterns. This study contributes to the development of a more adaptive and efficient fraud detection system based on machine learning, with practical implications for strengthening the automatic verification system used by BPJS Kesehatan.