Claim Missing Document
Check
Articles

Found 20 Documents
Search

Agricultural path detection systems using Canny-edge detection and Hough transform Sasmita, Windi Antania; Mubarok, Husni; Widiyasono, Nur
IAES International Journal of Robotics and Automation (IJRA) Vol 13, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijra.v13i3.pp247-254

Abstract

Navigation is one of the crucial aspects of automation technology within the field of agriculture, such as robotics systems or autonomous agricultural vehicles. Despite many navigation systems having been developed for agricultural land, due to their high development and component costs, these systems are difficult to access for farmers or organizations with limited capital. In this study, the Canny-edge detection and Hough transform methods are implemented in a path detection system on agricultural land to find an alternative, cost-effective navigation system for autonomous farming robots or vehicles. The system is tested on ground-level view images, which are captured from a low perspective and under three different lighting conditions. The testing and experimentation process involves adjusting the parameters of the Canny-edge detection and Hough transform methods for different lighting conditions. Subsequently, an evaluation is conducted using Intersection over Union to obtain the best accuracy results, followed by fine-tuning of the canny-edge detection and Hough transform method parameters. The identified parameters, specifically a 15×15 Gaussian kernel, low threshold of 50, high threshold of 150, Hough threshold, minimum line length of 150, and maximum line gap, have been discerned as optimal for the canny-edge and Hough transform algorithms under medium lighting conditions (G=1.0). The observed efficacy of these parameter configurations suggests the method’s viability for implementation in path detection systems for agricultural vehicles or robots. This underscores its potential to deliver reliable performance and navigate seamlessly across diverse lighting scenarios within the agricultural context.
PENINGKATAN TATAKELOLA BUDIDAYA IKAN DENGAN PENERAPAN SISTEM SMART FISHERY Rianto, Rianto; Aradea, Aradea; Mubarok, Husni; Widiyasono, Nur
Jurnal Pengabdian Siliwangi Vol 10, No 1 (2024)
Publisher : LPPM Univeristas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/jsppm.v10i1.9027

Abstract

Maju mundurnya suatu perusahaan atau organisasi salah satunya sangat bergantung kepada manajemen dari perusahaan atau organisasi itu sendiri. Manajemen atau pengelolaan dapat dimaknai sebagai pengelolaan sumber daya yang dimiliki yang digunakan sepenuhnya secara efektif untuk kemajuan perusahaan atau organisasi. Manajemen atau pengelolaan ini memiliki lima (5) unsur penting, yaitu 1) man, 2) money, 3) material, 4) machine, 5) method, dan 6) market. Pentingnya pengelolaan yang baik ini, bukan hanya untuk perusahaan atau organisasi yang besar, melainkan juga penting untuk skala usaha mikro, kecil dan menengah (UMKM), termasuk didalamnya UMKM yang bergerak dalam bidang perikanan seperti Karang Taruna Ikhlas Bakti Desa Mangunreja. Salah satu permasalahan yang dihadapi oleh Karang Taruna Ikhlas Bakti Desa Mangunreja adalah unsur machine dalam arti belum memanfaatkan secara maksimal teknologi pendukung untuk kegiatan operasional, khususnya penggunaan piranti lunak atau software pendukung pengelolaan usaha. Oleh karena itu, fokus utama pada pengabdian ini adalah untuk menerapkan alat dan piranti lunak Smart Fishery untuk mendukung kegiatan operasional di Karang Taruna Ikhlas Bakti Desa Mangunreja. Luaran yang menjadi target capaian program ini yaitu dimuat dalam Jurnal Nasional ber-ISSN, dimuat pada artikel media cetak/elektronik dan adanya video dokumentasi kegiatan yang dimuat pada media online dengan indikator capaian berupa pemahaman manajemen usaha dengan memaksimalkan penerapan IT berupa piranti lunak Smart Fishery.
OPTIMASI DETEKSI MALWARE PADA SIEM WAZUH MELALUI INTEGRASI CYBER THREAT INTELLIGENCE DENGAN MISP DAN DFIR-IRIS Hidayat, Muhamad Ropi Taofiq; Widiyasono, Nur; Gunawan, Rohmat
Jurnal Informatika dan Teknik Elektro Terapan Vol 13, No 1 (2025)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v13i1.5686

Abstract

Ancaman siber terus meningkat seiring kemajuan teknologi informasi, dengan malware sebagai salah satu bentuk ancaman utama yang mengeksploitasi celah keamanan. Security Information and Event Management (SIEM) seperti WAZUH menjadi solusi efektif untuk mendeteksi dan merespons ancaman siber. Namun, performa deteksi malware oleh WAZUH standalone masih terbatas, dengan akurasi rendah (19,70%) dan recall rendah (16,26%). Penelitian ini bertujuan mengoptimalkan deteksi malware melalui integrasi WAZUH dengan Cyber Threat Intelligence (CTI) menggunakan Malware Information Sharing Platform (MISP) dan DFIR-IRIS. Hasil penelitian menunjukkan bahwa integrasi MISP meningkatkan presisi deteksi ancaman (96,3%), meskipun recall (62,9%) dan akurasi (63,1%) masih menunjukkan adanya ancaman yang terlewat. Penambahan DFIR-IRIS memungkinkan respons insiden secara real-time, meningkatkan efisiensi mitigasi. Kombinasi MISP dan DFIR-IRIS memperkuat kemampuan deteksi dan respons SIEM secara signifikan, memberikan solusi yang lebih efektif dan menyeluruh dalam menghadapi ancaman siber.
Artificial Intelligence (AI) for Classification of Cyber Attacks on Internet of Things (IoT) Network Traffic Rizal, Randi; Widiyasono, Nur; Yuliyanti, Siti
JUMANJI (Jurnal Masyarakat Informatika Unjani) Vol 7 No 2 (2023): Jurnal Masyarakat Informatika Unjani
Publisher : Jurusan Informatika Universitas Jenderal Achmad Yani

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26874/jumanji.v7i2.325

Abstract

Internet of Things (IoT) is an architecture that connects large numbers of smart devices in today's modern global network system. Distributed denial of services (DDoS) attacks are one of the most common types of cyber attacks, targeting servers or networks with the aim of disrupting their normal activities. Although real-time detection and mitigation of DDoS attacks is difficult to achieve, the solution would be invaluable as attacks can cause significant damage. This research utilizes artificial intelligence (AI) to classify attacks on Internet of Things (IoT) network traffic. The resulting classification of DDOS attacks from all types of attacks, namely SYN, ACK, UDP, and UDPplain. The application of a deep learning model with the Convolutional Neural Network (CNN) algorithm is used to classify normal traffic from DDoS cyber attacks. The CNN algorithm performs very well in the classification process with an accuracy of 99%. Next, we plan to build a new model to block or mitigate DDoS attacks based on the output of the CNN classification algorithm used in this research.
Implementation of Image Enhancement Algorithm for Image Forensics using Mathlab Suteja, Fauzan Novaldi; Hidayat, Eka Wahyu; Widiyasono, Nur
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i2.314

Abstract

The purpose of this journal is to explain the implementation of the image enhancement algorithm for image forensics. Image Forensic deals with the types of digital evidence in the form of digital image files. One of the most commonly used digital devices in providing digital evidence for forensic analysis is CCTV (Closed-Circuit Television). CCTV images have a low quality such as noise, blur, lack of light intensity, etc., so that the image must be enhanced so that forensic analysis can be done. To enhance image quality, an application is needed by applying the image enhancement algorithm. The algorithm applied to the application is a Low Pass Filter to increase low pixel intensity, High Pass Filter to increase high pixel intensity, Median Filter to replaces the original pixel value with the pixel center value of the image, Mean Filter to replaces the original pixel value with a value the average pixel of the image, the Gaussian Filter for reducing noise in the image, the Wiener Filter to reduce blur in the image, the Histogram Equalization spreads the image histogram value, Contrast Stretching to stretch the contrast intensity in the image and Bicubic Interpolation to increase the image size and resize the image. In this study, the application was built using MATLAB and the testing process for each algorithm was based on Timing-Run, MSE and PSNR parameters. From the test, the average MSE value is 1058.512083 and the PSNR value is 541.61875 dB, which means that the resulting image has a fairly high level of similarity and the average time needed to process the algorithm for the image is 0.114627915 seconds.
PEMANFAATAN FOTO UDARA DALAM MELAKUKAN PEMETAAN WILAYAH UNTUK MENDUKUNG PERENCANAAN PENGEMBANGAN POTENSI DESA GUNUNGSARI KECAMATAN CIKATOMAS Anshary, Muhammad Adi Khairul; Widiyasono, Nur
Jurnal Pengabdian Siliwangi Vol 6, No 1 (2020)
Publisher : LPPM Univeristas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/jsppm.v6i1.1249

Abstract

Undang-undang Nomor 6 Tahun 2014 tentang Desa, mengamanatkan bagi setiap desa untuk membuat Peta batas wilayah Desa. Selain berfungsi sebagai alat penunjuk batas-batas wilayah desa, peta desa ini juga harus dapat menampilkan data dan informasi yang ada di Desa tersebut. Peta desa harus dapat menyajikan potensi sumber daya alam dan sumber daya manusia yang dimiliki oleh desa. Dengan dimilikinya pemetaan desa yang lengkap, tidak hanya berisikan batas-batas wilayah saja, maka desa dapat menyelenggarakan pemerintahan yang efektif, meningkatkan kesejahteraan masyarakat desa dan peningkatan kualitas pelayanan publik. Namun masih banyak desa yang belum memiliki peta desa yang berisikan data lengkap. Desa Gunungsari terletak di Kecamatan Cikatomas Kabupaten Tasikmalaya, merupakan salah satu desa yang belum memiliki pemetaan desa yang berisikan data lengkap. Pemetaan ini sangat diperlukan oleh desa untuk dapat meningkatkan pelayanan dan kemajuan. Kegiatan pengabdian masyarakat ini akan membantu melakukan pemetaan desa dengan memanfaatkan foto udara untuk mendapatkan data dan informasi lebih lengkap. Selain itu, foto udara memberikan sudut pandang berbeda terhadap topografi desa karena dilihat dari atas. Diharapkan dengan pelaksanaan kegiatan pengabdian kepada masyarakat ini, Desa Gunungsari akan memiliki sebuah Pemetaan Desa yang berisikan informasi tentang potensi desa dilihat dari pengambilan foto udara.
OPTIMASI DETEKSI MALWARE PADA SIEM WAZUH MELALUI INTEGRASI CYBER THREAT INTELLIGENCE DENGAN MISP DAN DFIR-IRIS Hidayat, Muhamad Ropi Taofiq; Widiyasono, Nur; Gunawan, Rohmat
Jurnal Informatika dan Teknik Elektro Terapan Vol. 13 No. 1 (2025)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v13i1.5686

Abstract

Ancaman siber terus meningkat seiring kemajuan teknologi informasi, dengan malware sebagai salah satu bentuk ancaman utama yang mengeksploitasi celah keamanan. Security Information and Event Management (SIEM) seperti WAZUH menjadi solusi efektif untuk mendeteksi dan merespons ancaman siber. Namun, performa deteksi malware oleh WAZUH standalone masih terbatas, dengan akurasi rendah (19,70%) dan recall rendah (16,26%). Penelitian ini bertujuan mengoptimalkan deteksi malware melalui integrasi WAZUH dengan Cyber Threat Intelligence (CTI) menggunakan Malware Information Sharing Platform (MISP) dan DFIR-IRIS. Hasil penelitian menunjukkan bahwa integrasi MISP meningkatkan presisi deteksi ancaman (96,3%), meskipun recall (62,9%) dan akurasi (63,1%) masih menunjukkan adanya ancaman yang terlewat. Penambahan DFIR-IRIS memungkinkan respons insiden secara real-time, meningkatkan efisiensi mitigasi. Kombinasi MISP dan DFIR-IRIS memperkuat kemampuan deteksi dan respons SIEM secara signifikan, memberikan solusi yang lebih efektif dan menyeluruh dalam menghadapi ancaman siber.
Implementasi Algoritma Discrete Cosine Transform Untuk Kompresi Citra Pada Marker-Based Tracking Augmented Reality Sutrisman, Iwan; Widiyasono, Nur; Sulastri, Heni
Computatio : Journal of Computer Science and Information Systems Vol. 4 No. 1 (2020): COMPUTATIO : JOURNAL OF COMPUTER SCIENCE AND INFORMATION SYSTEMS
Publisher : Faculty of Information Technology, Universitas Tarumanagara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24912/computatio.v4i1.5628

Abstract

Image compression with lossy techniques removes some information so it does not match the data received. This research was conducted to determine differences in the quality of original and compressed images, specifically on mark-based tracking. Image compression is done by implementing the Discrete Cosine Transform algorithm in the MATLAB program. DCT image compression test results can compress images up to 26% of the original size without significantly reducing image quality. The assessment results shown by the markers, in Vuforia, there was no change in star ratings, while in ARCore, there was an increase in the rating of 5-40 quality scores.DCT algorithm can be applied to image compression in marker-based tracking, especially in improving the quality of markers in ARCore.AbstrakKompresi citra dengan teknik lossy menghilangkan beberapa informasi sehingga tidak persis seperti data aslinya. Penelitian ini dilakukan untuk mengetahui perbedaan kualitas citra asli dan terkompresi, khususnya pada marked-based tracking. Kompresi citra dilakukan dengan mengimplementasikan algoritma Discrete Cosine Transform pada program MATLAB. Hasil pengujian kompresi citra menunjukkan bahwa algoritma DCT dapat memampatkan citra hingga 26% dari ukuran aslinya tanpa mengurangi kualitas gambar secara signifikan. Hasil pengujian rating marker menunjukkan, pada Vuforia, tidak terdapat perubahan star rating, sedangkan pada ARCore, terdapat peningkatan nilai rating sebesar 5-40 quality score. Algoritma DCT dapat diterapkan untuk kompresi citra pada marker-based tracking, khususnya dalam meningkatkan kualitas marker pada ARCore.
Poisson's Approach to Useful Life Analysis of Transmission Lines Sutisna, Sutisna; Priatna, Edvin; Widiyasono, Nur
Journal of Energy and Electrical Engineering Vol 7, No 1: October 2025
Publisher : Teknik Elektro Universitas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/jeee.v7i1.16840

Abstract

ABSTRACT: Reliability is defined as the probability of a device or system performing its functions adequately over a period of time under certain operating conditions. Component failure can impact the power supply to customers, and result in high costs associated with loss of power supply and or replacement of components. This article implements the Poisson model in estimating the reliability value of the electric power grid to obtain the useful life of each load bus. This useful life period as an indicator of the period of preventive maintenance. With the estimation of the reliability value using the Poisson Method is shown by obtaining maximum probability which is the best end of system performance. This method was tested on the IEEE 14 bus diagram system. As a sample of the maximum probability test results in bus_2, bus_3, and bus_5 occurred in 14th year, 9th year, and 11th year KEYWORDS:. Reliability Value, Poisson Method, Useful Life
Analisis Malware Aquvaprn.exe Untuk Investigasi Sistem Operasi Dengan Metode Memory Forensics Aditya, Hafish Naufal; Widiyasono, Nur; Rahmatulloh, Alam
Jurnal Teknik Informatika dan Sistem Informasi Vol 10 No 2 (2024): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v10i2.6562

Abstract

In today's digital age, data has become a valuable asset. Various techniques are used to steal personal data that could potentially be misused by irresponsible parties. The object used in this study is AQUVAPRN.exe, which is a type of malware known as a Remote Access Trojan (RAT). When this malware runs, the creator of the malware can access personal data from the infected operating system without the user's knowledge. AQUVAPRN.exe works in the background when an application is executed, creating several processes such as modifying the registry, creating files, reading files, and making continuous internet connections to a specific IP address without the user's knowledge. The result obtained from the AQUVAPRN.exe malware is an IP address of 109.51.76.80, with the domain located in Lisbon, Portugal, and has an MD5 hash value of 55c2c12970cda52f58bfad7b8c7d37d5. It is also known that the AQUVAPRN.exe malware uses an anti-reverse engineering technique, specifically obfuscation, which obstructs or hinders the malware from being analyzed or reverse-engineered to determine the code used to create the malware. The PID of the AQUVAPRN.EXE process is 8332 with a virtual tool (Virtual Address) of 0x8e0f57042080.