Claim Missing Document
Check
Articles

Found 26 Documents
Search

Implementasi Algoritma Discrete Cosine Transform Untuk Kompresi Citra Pada Marker-Based Tracking Augmented Reality Sutrisman, Iwan; Widiyasono, Nur; Sulastri, Heni
Computatio : Journal of Computer Science and Information Systems Vol. 4 No. 1 (2020): COMPUTATIO : JOURNAL OF COMPUTER SCIENCE AND INFORMATION SYSTEMS
Publisher : Faculty of Information Technology, Universitas Tarumanagara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24912/computatio.v4i1.5628

Abstract

Image compression with lossy techniques removes some information so it does not match the data received. This research was conducted to determine differences in the quality of original and compressed images, specifically on mark-based tracking. Image compression is done by implementing the Discrete Cosine Transform algorithm in the MATLAB program. DCT image compression test results can compress images up to 26% of the original size without significantly reducing image quality. The assessment results shown by the markers, in Vuforia, there was no change in star ratings, while in ARCore, there was an increase in the rating of 5-40 quality scores.DCT algorithm can be applied to image compression in marker-based tracking, especially in improving the quality of markers in ARCore.AbstrakKompresi citra dengan teknik lossy menghilangkan beberapa informasi sehingga tidak persis seperti data aslinya. Penelitian ini dilakukan untuk mengetahui perbedaan kualitas citra asli dan terkompresi, khususnya pada marked-based tracking. Kompresi citra dilakukan dengan mengimplementasikan algoritma Discrete Cosine Transform pada program MATLAB. Hasil pengujian kompresi citra menunjukkan bahwa algoritma DCT dapat memampatkan citra hingga 26% dari ukuran aslinya tanpa mengurangi kualitas gambar secara signifikan. Hasil pengujian rating marker menunjukkan, pada Vuforia, tidak terdapat perubahan star rating, sedangkan pada ARCore, terdapat peningkatan nilai rating sebesar 5-40 quality score. Algoritma DCT dapat diterapkan untuk kompresi citra pada marker-based tracking, khususnya dalam meningkatkan kualitas marker pada ARCore.
Poisson's Approach to Useful Life Analysis of Transmission Lines Sutisna, Sutisna; Priatna, Edvin; Widiyasono, Nur
Journal of Energy and Electrical Engineering Vol 7, No 1: October 2025
Publisher : Teknik Elektro Universitas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/jeee.v7i1.16840

Abstract

ABSTRACT: Reliability is defined as the probability of a device or system performing its functions adequately over a period of time under certain operating conditions. Component failure can impact the power supply to customers, and result in high costs associated with loss of power supply and or replacement of components. This article implements the Poisson model in estimating the reliability value of the electric power grid to obtain the useful life of each load bus. This useful life period as an indicator of the period of preventive maintenance. With the estimation of the reliability value using the Poisson Method is shown by obtaining maximum probability which is the best end of system performance. This method was tested on the IEEE 14 bus diagram system. As a sample of the maximum probability test results in bus_2, bus_3, and bus_5 occurred in 14th year, 9th year, and 11th year KEYWORDS:. Reliability Value, Poisson Method, Useful Life
Analisis Malware Aquvaprn.exe Untuk Investigasi Sistem Operasi Dengan Metode Memory Forensics Aditya, Hafish Naufal; Widiyasono, Nur; Rahmatulloh, Alam
Jurnal Teknik Informatika dan Sistem Informasi Vol 10 No 2 (2024): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v10i2.6562

Abstract

In today's digital age, data has become a valuable asset. Various techniques are used to steal personal data that could potentially be misused by irresponsible parties. The object used in this study is AQUVAPRN.exe, which is a type of malware known as a Remote Access Trojan (RAT). When this malware runs, the creator of the malware can access personal data from the infected operating system without the user's knowledge. AQUVAPRN.exe works in the background when an application is executed, creating several processes such as modifying the registry, creating files, reading files, and making continuous internet connections to a specific IP address without the user's knowledge. The result obtained from the AQUVAPRN.exe malware is an IP address of 109.51.76.80, with the domain located in Lisbon, Portugal, and has an MD5 hash value of 55c2c12970cda52f58bfad7b8c7d37d5. It is also known that the AQUVAPRN.exe malware uses an anti-reverse engineering technique, specifically obfuscation, which obstructs or hinders the malware from being analyzed or reverse-engineered to determine the code used to create the malware. The PID of the AQUVAPRN.EXE process is 8332 with a virtual tool (Virtual Address) of 0x8e0f57042080.
Implementation of A Motorcycle Vehicle Security System with Arduino-Based Fingerprint, Global Positioning System and Short Message Service Gateway Rizal, Randi; Sudiarjo, Aso; Widiyasono, Nur; Nusamsi, Dede Rizal; Faiz, Muhammad
IJAIT (International Journal of Applied Information Technology) Vol 08 No 02 (November 2024)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v8i2.6354

Abstract

The increase in demand for motorized vehicles, especially motorcycles, from 2016 - 2021 has recorded an increase of 5.03% per year. Along with the increasing number of people using motorbikes as their main means of transportation, there is a growth in motorcycle theft. One cause of the increase in these cases is that the motorcycle security system still relies on the lock system. So, it is necessary to improve security with unique modern keys that can only be accessed by specific people, one of which is a security system using biometric technology. This research has combined motorcycle security systems using fingerprint, GSM and GPS modules based on Arduino Uno. The results of testing the fingerprint module scanning time obtained an average scanning time of 1.04 seconds. Testing the SIM800L GSM module obtained an average processing time of receiving SMS and sending back a response to a registered number, which is 9.32 seconds and the results of testing the accuracy of data retrieval between the U-blox Neo-6m GPS module and GPS on the Oppo A3S brand smartphone, with the calculation of the average difference distance of 0.75 Meters. Motorcycle vehicle security was successfully implemented by utilizing the fingerprint module, GPS module and GSM module as an intermediary in the form of SMS between the user and the microcontroller so that it functions as layered security.
Identification of Mirai Botnet in IoT Environment through Denial-of-Service Attacks for Early Warning System Rahmatulloh, Alam; Muhammad Ramadhan, Galih; Darmawan, Irfan; Widiyasono, Nur; Pramesti, Dita
JOIV : International Journal on Informatics Visualization Vol 6, No 3 (2022)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.6.3.1262

Abstract

The development of computing technology in increasing the accessibility and agility of daily activities currently uses the Internet of Things (IoT). Over time, the increasing number of IoT device users impacts access and delivery of valuable data. This is the primary goal of cybercriminals to operate malicious software. In addition to the positive impact of using technology, it is also a negative impact that creates new problems in security attacks and cybercrimes. One of the most dangerous cyberattacks in the IoT environment is the Mirai botnet malware. The malware turns the user's device into a botnet to carry out Distributed Denial of Service (DDoS) attacks on other devices, which is undoubtedly very dangerous. Therefore, this study proposes a k-nearest neighbor algorithm to classify Mirai malware-type DDOS attacks on IoT device environments. The malware classification process was carried out using rapid miner machine learning by conducting four experiments using SYN, ACK, UDP, and UDPlain attack types. The classification results from selecting five parameters with the highest activity when the device is attacked. In order for these five parameters to be a reference in the event of a malware attack starting in the IoT environment, the results of the classification have implications for further research. In the future, it can be used as a reference in making an early warning innovative system as an early warning in the event of a Mirai botnet attack.
Analisis Cost-Performance Arsitektur Komputasi Edge, Cloud, dan Hybrid untuk Industri 4.0 Lapandu, Raihan Azhar; Widiyasono, Nur; Rahmatulloh, Alam
Prosiding SEMNAS INOTEK (Seminar Nasional Inovasi Teknologi) Vol. 9 No. 2 (2025): Prosiding Seminar Nasional Inovasi Teknologi Tahun 2025
Publisher : Universitas Nusantara PGRI Kediri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29407/5jeq4524

Abstract

 Pemilihan arsitektur komputasi Edge, Cloud, atau Hybrid menjadi tantangan krusial di Industri 4.0 karena perbedaan signifikan dalam performa dan biaya operasional. Berbeda dari studi yang hanya berfokus pada aspek teknis, penelitian ini menyajikan analisis cost-performance yang komprehensif. Menggunakan skenario simulasi predictive maintenance, trade-off antara metrik teknis (utilisasi CPU, RAM, latensi, dan penyimpanan) dievaluasi dengan estimasi biaya harian. Lebih lanjut, penelitian ini mengusulkan sebuah decision matrix sebagai alat bantu pengambilan keputusan. Hasil menunjukkan Edge unggul dalam latensi rendah (17,5 ms) dan efisiensi biaya. Cloud menawarkan skalabilitas superior dengan biaya lebih tinggi, sementara Hybrid menjadi kompromi seimbang meski memiliki overhead dan kompleksitas tertinggi. Temuan ini memberikan kontribusi aplikatif berupa panduan empiris bagi para praktisi untuk memilih arsitektur yang paling sesuai dengan prioritas operasional dan ketersediaan anggaran.