Claim Missing Document
Check
Articles

Penentuan Keabsahan Dokumen KHS Dengan Menggunakan QR Code dan Digital Signature di Politeknik Negeri Manado Lordan Kimbal, Heaven; Sudarsono, Amang; Winarmo, Idris
The Indonesian Journal of Computer Science Vol. 13 No. 1 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i1.3603

Abstract

The change in the KHS process from manual to computerized has positive impacts such as integration with the judicial system, ease of inputting and printing data, and in recapitulating data. However, there are risks in this concept, namely loss and damage to data which can cause doubts about the validity of KHS data. Departing from this problem, an idea emerged to create a system that can prove the validity of KHS printed documents by applying QR Code technology and Digital Signature. With Digital Signature, information about the contents of KHS when it is first printed is encrypted first so that it cannot be changed by unauthorized parties, then the encryption results will be stored on the QR Code. So that the determination of document validity is done by comparing the contents of the current document with the contents of the document in the QR Code, if the information from both is the same then the printed document is declared an original document and vice versa. The verification process will use hash logic which is one of the functions of providing verification and authentication because it produces a unique value for each input. This result is expected to help Politeknik Negeri Manado to check the validity of KHS printed by students.
Sistem Sirkulasi Air Kolam Otomatis Berdasarkan Nilai pH Ramadhani, Afifah Dwi; Sudarsono, Amang; Pratiarso, Aries; Yuliana, Mike; Ningsih, Norma; Hadi, Mochammad Zen Samsono; Kristalina, Prima; Satiti, Rini; Astawa, I Gede Puja; Siswanto, Anang
PUBLIKASI PENGABDIAN KEPADA MASYARAKAT Vol 4 No 1 (2024)
Publisher : Fakultas Ekonomi dan Bisnis Universitas Multi Data Palembang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/padimas.v4i1.6714

Abstract

Banyak petani dari berbagai lapisan masyarakat, baik itu dari kalangan menengah atas maupun kalangan bawah yang memiliki lahan terbatas, beralih ke praktik pertanian modern seperti aquaponik. Pendekatan ini tidak hanya efisien dalam penggunaan ruang dan waktu, tetapi juga mampu menghasilkan panen yang optimal melalui perawatan yang cermat. Dengan memonitoring pH air menjadi langkah penting dalam menilai kualitas air yang dapat memberikan informasi mengenai kondisi baik atau buruknya. Air yang memiliki kualitas buruk dapat menimbulkan dampak negatif terhadap kesehatan ikan, seperti munculnya berbagai penyakit. Perubahan pH air juga dapat mengakibatkan perubahan aroma, rasa, dan warna air. Oleh karena itu, penelitian ini bertujuan untuk merancang dan menerapkan suatu sistem yang berfungsi untuk memantau tingkat keasaman (pH) dalam air, dengan memanfaatkan kemajuan teknologi saat ini. Pengukuran pH air dapat dilakukan secara manual menggunakan pH meter pada mikrokontroler. Oleh karena itu, dikembangkan sistem pemantauan untuk mempermudah pengendalian pH air, sehingga proses pembenihan ikan dapat ditingkatkan dan disederhanakan. Pada pengujian sensor pH, ketika terdeteksi nilai pH di luar kisaran netral misalnya 7,71 maka sistem sirkulasi air akan aktif untuk mengoreksi pH kolam agar mencapai kondisi netral. Hal ini bermanfaat untuk menjaga kualitas air kolam.
Implementation of Web-Based File Sharing Security System Yuliana, Mike; Hidayah, Nuril; Sudarsono, Amang
MOTIVECTION : Journal of Mechanical, Electrical and Industrial Engineering Vol 6 No 1 (2024): Motivection : Journal of Mechanical, Electrical and Industrial Engineering
Publisher : Indonesian Mechanical Electrical and Industrial Research Society (IMEIRS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46574/motivection.v6i1.314

Abstract

File-sharing activities become a bridge for communication in the form of data between one party and another party. File sharing allows users to share data with other users, by uploading data to the server computer and other users can download data from the server computer. A document security system is indispensable to keep document data safe until its destination. File Web Sharing will transmit data with cryptographic methodologies. The algorithm used is Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Blowfish. This study aims to compare the performance of AES, DES, and Blowfish algorithms when implemented to secure file sharing. Performance research results show that the DES algorithm is on average 8.35% faster than AES and the Blowfish algorithm is 7.11% faster than AES. Memory usage capacity testing shows that the AES algorithm requires 4.82% greater memory capacity than Blowfish, and the DES requires 2.41% greater memory capacity than the Blowfish algorithm. Kegiatan file sharing menjadi jembatan komunikasi data antara satu pihak dengan pihak lainnya. File sharing memberikan pengguna kemampuan untuk berbagi data dengan pengguna lain, dengan cara mengunggah data ke komputer server dan pengguna lain dapat mengunduh data dari komputer server. Sistem keamanan terhadap dokumen sangat diperlukan untuk menjaga data dokumen tetap aman sampai tujuannya. Web File Sharing akan mengirimkan data dengan metodologi kriptografi. Algoritma yang digunakan adalah Advanced Encryption Standard (AES), Data Encryption Standard (DES), dan Blowfish. Penelitian ini bertujuan untuk membandingkan kinerja algoritma AES, DES dan Blowfish saat diimplementasikan untuk mengamankan file sharing. Hasil pengujian kinerja menunjukkan bahwa algoritma DES rata-rata 8,35% lebih cepat dibandingkan AES sedangkan Blowfish 7,11% lebih cepat dibandingkan AES. Berdasarkan pengujian kapasitas penggunaan memori terlihat bahwa AES membutuhkan kapasitas memori 4,82% lebih besar dibandingkan Blowfish dan DES membutuhkan kapasitas memori 2,41% lebih besar dari Blowfish.
Mobile Platform Biometric Cloud Authentication Ximenes, Agostinho Marques; Sukaridhoto, Sritrusta; Sudarsono, Amang; Basri, Hasan
INTEK: Jurnal Penelitian Vol 6 No 2 (2019): October 2019
Publisher : Politeknik Negeri Ujung Pandang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (488.38 KB) | DOI: 10.31963/intek.v6i2.1525

Abstract

Berdasarkan data Pusat Statistik Indonesia, tingkat kemiskinan pada bulan September 2018 adalah 25,95 juta, berdasrkan data tingkat kemiskinan masyarakat  tersebut  pemeritnah menyalurkan dana bantuan mengatasi tingkat kemiskinan masyarakat melalui Bank. Namun, Bank tidak dapat mengalokasikan dana karena biaya untuk membangun infrastruktur mahal, seperti membuat ATM.Berbagai kendala tersebut, Bank perlu menemukan solusi baru agar dapat mengalokasikan dana kepada masyrakat dengan biaya yang murah, Mobile Platform Biometric Cloud Authentication adalah salah satu solusi. Dalam penelitian ini, eksperimen yang dilakukan melakukan autentikasi dengan QR Code Scan dan face recognize (data face dienkripsi dan didekripsi dengan kritografi algoritma AES 256 bit). Konsentrasi penelitian ini terletak pada  eksperimen terhadap komunikasi keamanan data transaksi payment  merchant onlie degan QR Code scan dan Face recognize yang berbasis mobile android dan serta spesfikasi android versi 23. Hasil pengujian pada aplikasi Mobile ini menunjukkan bahwa QR Code scan dan face recognize dapat diimplementasikan pada transaksi payment merchant online dengan akurasi 95% dan membutuhkan 53, 21 detik per transaksi.
Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management Jauhar, Ismed; Sudarsono, Amang; Yuliana, Mike
EMITTER International Journal of Engineering Technology Vol 1 No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8771.4 KB) | DOI: 10.24003/emitter.v1i1.1

Abstract

Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication .Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone
Performance Analysis of an OFDM PHY Scheme with Zero Forcing Equalizer Using Software Defined Radio Platform and USRP Zainudin, Ahmad; Sudarsono, Amang; Astawa, I Gede Puja
EMITTER International Journal of Engineering Technology Vol 2 No 1 (2014)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v2i1.15

Abstract

We present an implementation of Zero Forcing (ZF) equalizer in OFDM scheme using Software Defined Radio platform whereas NI USRP-2920 as the Radio Frequency (RF) front-end. ZF equalizer is employed to achieve reliable system at the receiver. Center frequency used for data transmission is 915 MHz. The reliability transmission and the performance of ZF equalizer are measured in term of different symbol mapping (i.e., M-PSK and M-QAM). The IQ rate determines the bandwidth available, whereas good performance is achieved with IQ rate less than 1 MHz.ZF equalizer achieves good performance when using BPSK, QPSK and 16-QAM modulation techniques. By applying ZF equalizer, bit error on BPSK and QPSK modulations can be reduced from 29,16% and 39,06% into 0%. This advantage of ZF equalizer also is able to press the bit error on 16- QAM and 64-QAM modulations into 3,125% and 8,85%, respectively.Keywords: OFDM,SDR, USRP,Zero Forcing Equalizer
Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning Tiyas, Indah Yulia Prafitaning; Barakbah, Ali Ridho; Harsono, Tri; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 2 No 1 (2014)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (10388.993 KB) | DOI: 10.24003/emitter.v2i1.16

Abstract

Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system. We need a reliable network security system that is resistant to a variety of attacks against the system. Therefore, Intrusion Detection System (IDS) required to overcome the problems of intrusions. Many researches have been done on intrusion detection using classification methods. Classification methodshave high precision, but it takes efforts to determine an appropriate classification model to the classification problem. In this paper, we propose a new reinforced approach to detect intrusion with On-line Clustering using Reinforcement Learning. Reinforcement Learning is a new paradigm in machine learning which involves interaction with the environment.It works with reward and punishment mechanism to achieve solution. We apply the Reinforcement Learning to the intrusion detection problem with considering competitive learning using Pursuit Reinforcement Competitive Learning (PRCL). Based on the experimental result, PRCL can detect intrusions in real time with high accuracy (99.816% for DoS, 95.015% for Probe, 94.731% for R2L and 99.373% for U2R) and high speed (44 ms).The proposed approach can help network administrators to detect intrusion, so the computer network security systembecome reliable.Keywords: Intrusion Detection System, On-Line Clustering, Reinforcement Learning, Unsupervised Learning.
Indonesian Automatic Speech Recognition For Command Speech Controller Multimedia Player Wardhany, Vivien Arief; Sukaridhoto, Sritrusta; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 2 No 2 (2014)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v2i2.25

Abstract

The purpose of multimedia devices development is controlling through voice. Nowdays voice that can be recognized only in English. To overcome the issue, then recognition using Indonesian language model and accousticc model and dictionary. Automatic Speech Recognizier is build using engine CMU Sphinx with modified english language to Indonesian Language database and XBMC used as the multimedia player. The experiment is using 10 volunteers testing items based on 7 commands. The volunteers is classifiedd by the genders, 5 Male & 5 female. 10 samples is taken in each command, continue with each volunteer perform 10 testing command. Each volunteer also have to try all 7 command that already provided. Based on percentage clarification table, the word “Kanan” had the most recognize with percentage 83% while “pilih” is the lowest one. The word which had the most wrong clarification is “kembali” with percentagee 67%, while the word “kanan” is the lowest one. From the result of Recognition Rate by male there are several command such as “Kembali”, “Utama”, “Atas “ and “Bawah” has the low Recognition Rate. Especially for “kembali” cannot be recognized as the command in the female voices but in male voice that command has 4% of RR this is because the command doesn’t have similar word in english near to “kembali” so the system unrecognize the command. Also for the command “Pilih” using the female voice has 80% of RR but for the male voice has only 4% of RR. This problem is mostly because of the different voice characteristic between adult male and female which male has lower voice frequencies (from 85 to 180 Hz) than woman (165 to 255 Hz).The result of the experiment showed that each man had different number of recognition rate caused by the difference tone, pronunciation, and speed of speech. For further work needs to be done in order to improving the accouracy of the Indonesian Automatic Speech Recognition system.Keywords: Automatic Speech Recognizer, Indonesian Acoustic Model, CMU Sphinx, indonesian Language Model, Recognition Rate, XBMC.
Traffic Analysis of Quality of Service (QoS) for Video Conferencing between Main Campus and Sub Campus in Laboratory Scale Sudarsono, Amang; Siswanto, Anang; Iswanto, Heru; Setiawan, Qoirul
EMITTER International Journal of Engineering Technology Vol 3 No 2 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (6439.001 KB) | DOI: 10.24003/emitter.v3i2.41

Abstract

Recently, in the distance learning system, video conferencing becomes one of expected course material delivery systems for creating a virtual class such that lecturer and student which are separated at long distance can engage a learning activity as well as face to face learning system. For this reason, the service availability and quality should be able to guaranteed and fulfilled. In this research, we analyze QoS of video conferencing between main campus and sub campus as the implementation of distance learning system in laboratory scale. Our experimental results show that the channel capacity or bandwidth of WAN connection between main campus and sub campus at 128 kbps is able to generate the throughput of video transmission and reception at 281 kbps and 24 kbps, respectively. Meanwhile, throughput of audio transmission and reception is 64 kbps and 26 kbps with the number of total packet loss for video and audio transmission is 84.3% and 29.2%, respectively. In this setting, the total jitter for video and audio transmission is 125 ms and 21 ms, respectively. In this case, there is no packet loss for traffic transmitting and receiving with jitter is not more than 5 ms. We also implemented QoS using Trust CoS model dan Trust DSCP for improving the quality of service in term of jitter up to 12.3% and 22.41%, respectively.Keywords: quality of service, throughput, delay, jitter, packet loss, Trust CoS, Trust DSCP
An Implementation of Error Minimization Data Transmission in OFDM using Modified Convolutional Code Briantoro, Hendy; Astawa, I Gede Puja; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 3 No 2 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.575 KB) | DOI: 10.24003/emitter.v3i2.44

Abstract

This paper presents about error minimization in OFDM system. In conventional system, usually using channel coding such as BCH Code or Convolutional Code. But, performance BCH Code or Convolutional Code is not good in implementation of OFDM System. Error bits of OFDM system without channel coding is 5.77%. Then, we used convolutional code with code rate 1/2, it can reduce error bitsonly up to 3.85%. So, we proposed OFDM system with Modified Convolutional Code. In this implementation, we used Software Define Radio (SDR), namely Universal Software Radio Peripheral (USRP) NI 2920 as the transmitter and receiver. The result of OFDM system using Modified Convolutional Code with code rate is able recover all character received so can decrease until 0% error bit. Increasing performance of Modified Convolutional Code is about 1 dB in BER of 10-4 from BCH Code and Convolutional Code. So, performance of Modified Convolutional better than BCH Code or Convolutional Code.Keywords: OFDM, BCH Code, Convolutional Code, Modified Convolutional Code, SDR, USRP
Co-Authors Abd. Rasyid Syamsuri Adam Surya Putra Adam Surya Putra Afifah Dwi Ramadhani agostinho marques ximenes Ahmad Zainudin Ali Ridho Barakbah Anang Budikarso Anang Budikarso, Anang Anang Siswanto Anang Siswanto, Anang Anindya Dwi Putri Islamidina Ari Wijayanti Ari Wijayanti Aries Pratiarso Aries Pratiarso Aries Pratiarso, Aries Astin, Novita Astin, Novita Bambang Sumantri Bayu Dwiyan Satria Bih Hwang Lee Bima Sena Bayu Dewantara Dadet Pramadihanto Darmawan, Zakha Maisat Eka Darmawan, Zakha Maisat Eka Dewi, Florista Dewi, Inka Trisna Dewi, Ni Made Lintang Asvini Dian Neipa Purnamasari Donny Farhan Eko Prayitno Farel Juliansyah Farhan, Donny Febby Ronaldo Fitri, Novi Aryani Florista Dewi Gulo, Melki Mario Gunawan, M. Wisnu Hadi, Mochammad Zen Samsono Haniah Mahmudah Hari Wahyuningrat S. Hary Oktavianto Haryadi Amran Hasan Basri Hasan Basri Hendy Briantoro Heru Iswanto, Heru Hidayah, Nuril Hudhajanto, Rizky Pratama Hudhajanto, Rizky Pratama I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Aswara Ida Anisah Idris Winarno Indah Yulia Prafitaning Tiyas, Indah Yulia Prafitaning Ismed Jauhar, Ismed Juliansyah, Farel Kevin Prima Pambudi, Kevin Prima Lordan Kimbal, Heaven Louis Nashih Uluwan Arif M Udin Harun Al Rasyid, M Udin Harun M. Cahyo Kriswantoro Mahardhika, Yesta Medya Mahmudah, Haniah Mala Nurilmala Mike Yuliana Mochammad Zen Samsono Hadi Mohamad Ridwan Muhammad Taufiq Sumadi Nanang Syahroni Ni Made Lintang Asvini Dewi Nihayatus Sa'adah Ningsih, Norma Nisa, Choirun Choirun Nisa Nur Nur Adi Siswandari Nurul Fahmi Nurul Fahmi Priambodo, Naufal Ammar Prima Kristalina Putra, Adam Surya Qoirul Setiawan, Qoirul R Rizki Rachmadi Rafina Destiarti Ainul Rahardita Widyatra Ramadhani, Afifah Dwi Reni Soelistijorini Renovita Edelani Rini Satiti Rokhmat Albasyih Sa'adah, Nihayatus Samsul Huda Samsul Huda Santoso, Tribudi Saputro, Anton Cahyo Satiti, Rini Sa’adah, Nihayatus Soelistijorini, Reni Sritrusta Sukaridhoto Subhan, Muh Syahroni, Nanang Taufiqurrahman, Muh. Alfan Taufiqurrahman, Muh. Alfan Titon Dutono Tri Budi Santoso Tri Budi Santoso Tri Harsono TRI SUSANTI Tri Susanti Tribudi Santoso Vivien Arief Wardhany Wahjoe Tjatur Sesulihatien Wahyuningrat S., Hari Winarmo, Idris Ximenes, Agostinho Marques Yoedy Moegiharto, Yoedy Yoga Yuniadi Yudha, R. Gaguk Pratama Yudha, R. Gaguk Pratama Yuliana, Mike