Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : International Journal of Informatics and Computation

COMPARISON OF HOP COUNT ON WIRELESS MESH NETWORK Eliza Staviana; Hizbul Wathan
International Journal of Informatics and Computation Vol 2 No 2 (2020): International Journal of Informatics and Computation
Publisher : University of Respati Yogyakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35842/ijicom.v2i2.29

Abstract

Wireless Mesh Network (MWN) is a self-configured and self-organized network that can typically be implemented on 802.11 hardware. It consists of several nodes that make up the network backbone in a multi-story and sealed room, in contrast to building a hall or a place without bulkheads. This experiment uses an odd and even number scheme with a maximum number of routers of 8 pieces. In a sealed room, the performance of the method of installation of the number of strange Hops is better than the number of even Hops, with throughput calculation of 2665.19 KB, delay 0.25 s, data lost 0.60 %, and jitter 0.01 s and the best scheme that is with the number of Hops as much as five pieces, with the calculation of the number of throughput 7001.88 KB, delay 0.51s, data lost 0.47%, and jitter 0.002 s. In the free spaces, it can produce the better performance of the even hop count calculation scheme than the odd hop count by building throughput 16709.8 KB, delay 0.2 s, data lost 0.08 %, and jitter 0.03 s. and the best scheme that is with the number of throughput 68975,2 KB, wait for 0.0148 s, data lost 0 %, and jitter 0.0014 s. WMN performance in unshared space is more maximized than the version in a sealed area, with throughput values of 11786.82 kbps, delay of 2.08 ms, and data lost by 0.08 %, and jitter 0.03 s.it can produce the better performance of the even hop count calculation scheme than the odd hop count by producing throughput 16709.8 KB, delay 0.2 s, data lost 0.08 %, and jitter 0.03 s. and the best scheme that is with the number of throughput 68975,2 KB, wait for 0.0148 s, data lost 0 %, and jitter 0.0014 s. WMN performance in unshared space is more maximized than the version in sealed space, with throughput values of 11786.82 kbps, delay of 2.08 ms, and data lost by 0.08 %, and jitter 0.03 s. and data lost by 0.08%, and jitter 0.03s.
ConFruit: Effective Fruit Classification Using CNN Algorithm Rani Laple Satria; M Hizbul Wathan
International Journal of Informatics and Computation Vol. 5 No. 1 (2023): International Journal of Informatics and Computation
Publisher : University of Respati Yogyakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35842/ijicom.v5i1.44

Abstract

Fruit is one type of food containing nutrients, vitamins, and minerals that are generally very good for daily consumption. However, various fruit choices make consumers confused about choosing and buying fruit. Many papers have proposed fruit classification to deal with this problem in recent years. Therefore, this study offers a new recommendation model using type to dissect fruit so that buyers can more easily recognize fruit. We collected the primary dataset from Cagle to 3000 fruit images. Based on experiments, our research achieved good accuracy results using the CNN algorithm to classify fruit so that consumers can distinguish between types of fruit. Experimentally demonstrated, we harvested the promised results with better accuracy and small losses than the general fruit classification study.
Establising CNN for Network Intrusion Detection: A Comparative Approach M. Hizbul Wathan; Moh. Aziz
International Journal of Informatics and Computation Vol. 6 No. 1 (2024): International Journal of Informatics and Computation
Publisher : University of Respati Yogyakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35842/ijicom.v6i1.69

Abstract

Intrusion detection plays an important role in protecting systems from various threats. However, as intrusion techniques become more sophisticated, traditional detection methods have shown limitations in identifying new attacks. This research addresses the pressing issue of improving intrusion detection by utilizing Convolutional Neural Networks (CNN) algorithms, compared to various other machine learning techniques such as Support Vector Machines (SVM), K-Nearest Neighbors (KNN), Gaussian Naive Bayes (GNB), Decision Trees, and Gradient Boosting (GBoost). The main objective is to evaluate and compare the performance of these algorithms using a comprehensive dataset sourced from Kaggle, which includes 25,192 data and 42 features. Using metrics such as accuracy, precision, recall, and F1-score, the results show a complex pattern in the strengths and weaknesses of each. Surprisingly, CNN achieved exceptional accuracy, raising questions that require further investigation. Notably, KNN stands out as the best-performing machine learning algorithm. Contextualized within existing research, this study advances the understanding of the role of machine learning in intrusion detection, providing valuable insights for practical implementation. The findings reinforce the relevance of adapting to the evolving network threat landscape while raising interesting questions for future research. In conclusion, this research provides a comparative analysis of intrusion detection techniques, offering a basis for making informed decisions to improve network security and mitigate evolving threats.
Vehicle Theft Detection Using YOLO Based on License Plates and Vehicle Ownership Bradika Almandin Wisesa; M. Hizbul Wathan; Evvin Faristasari; Sirlus Andreanto Jasman Duli; Silvia Agustin; Better Swengky
International Journal of Informatics and Computation Vol. 7 No. 1 (2025): International Journal of Informatics and Computation
Publisher : University of Respati Yogyakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35842/ijicom.v7i1.105

Abstract

Detection of vehicle theft requires innovative approaches to address an increasing number of cases in Indonesia. This study presents a YOLOv11-based system for detecting vehicle theft by combining real-time object detection with a vehicle ownership database. The proposed system identifies license plates, detects vehicle owners using facial recognition, and analyzes suspicious activity to determine theft occurrences. The proposed method can produce model effectiveness with an accuracy = 70%. Key improvements in architecture, including enhanced feature fusion and dynamic anchor assignment, contribute to the object’s detection in complex environments. This research can be a potential technique to provide efficient, scalable, and real-time security solutions in dynamic surveillance applications.