Claim Missing Document
Check
Articles

Found 29 Documents
Search

A Literature Review for Understanding the Development of Smart Parking Systems Cahyadi, Nanang; Dorand, Pietra; Rozi, Nurwan Reza Fachrur; Haq, Laksamana Aidzul; Maulana, Refsi Indra
Journal of Informatics and Communication Technology (JICT) Vol. 5 No. 1
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52661/j_ict.v5i1.196

Abstract

Smart parking systems that use AI, data analytics, and IoT are a result of urbanization and rising automobile utilization. These systems are designed to enhance user experience, shorten search times, and make the most of available space. AI analyzes real-time data, proposes open places, and projects demand in the future. Infrastructure costs, stakeholder cooperation, and system compatibility continue to be issues, nevertheless. To maintain user confidence, privacy, and ethical usage in the study of smart parking systems, in-depth literature reviews are essential. The systematic literature review (SLR) method was used to examine AI-based smart parking solutions, such as wireless sensor networks, ultrasonic sensor nodes, reservation-based systems, intelligent parking guidance, IoT-based on-street infraction monitoring, central parking management systems, and energy-efficient automated solutions. Budgetary restrictions, stakeholder participation, interoperability concerns, data privacy, security, and moral ambiguities are all problems. To test scenarios, understand rules, processes, and algorithms in limited contexts, researchers need to develop reliable outdoor sensor and data technologies for outside application.
Perencanaan Instalasi Motor Listrik Hidran di Gedung Telkom University Jakarta berbasis (PLC) Royhan, Muhamad Muhamad; Fachrur Rozi, Nurwan Reza
Journal of Informatics and Communication Technology (JICT) Vol. 5 No. 2 (2023)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52661/j_ict.v5i2.228

Abstract

Hidran dilengkapi selang elastis untuk menyembrotkan air ke titik kebakaran. Pemadam kebakaran. Supaya air sampai ke titik kebakaran perlu ada tekanan mekanis. Alat tekanan mekanis adalah motor. Motor digunakan untuk mendorong air dari tampungan. Motor listrik tarik gunakan untuk menghisap dari sumur, sedangankan motor listrik dorong untuk mendorong air suapaya sampai ke titik api. Supaya motor listrik bekerja dengan cepat dipasang saklar emergensi (SE) dan programmable logic controller (PLC). Rangkaian PLC ke motor listrik induksi perlu dipasang magnetik contactor breaker (MCB). Untuk pengaturan air ke titik kebakaran menggunakan kran. Perencanaan mengacu SNI 03-1735-2000. Pemasangan instalasi hidran sesuai dengan SNI 03-1745-1989 mengatur system pencegahan kebakaran di bangunan baik rumah dam gedung, serta panduan pemasangan instalasi pemadam kebakaran.
Analisis Network Incident Packet Capture (PCAP) Menggunakan Wireshark Nurwan Reza Fachrur Rozi, Nurwan Reza Fachrur Rozi
Journal of Informatics and Communication Technology (JICT) Vol. 5 No. 2 (2023)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52661/j_ict.v5i2.239

Abstract

Pada artikel ini, penulis mengembangkan kerangka analisis kausal peristiwa kritis dalam penelitian studi kasus. Peristiwa penting didefinisikan sebagai peristiwa kontinjensi yang mempunyai dampak sebab akibat terhadap hasil suatu kasus tertentu. Penulisan ini menggunakan analisis teori himpunan untuk memberikan definisi dan alat pengukuran untuk menguji kontingensi dan signifikansi kausal dalam penelitian studi kasus. Seperangkat alat tersebut terdiri dari pedoman untuk menyimpulkan tingkat kontinjensi kejadian dengan menggunakan ekspektasi teoretis. Perangkat lainnya adalah pedoman untuk menggunakan kasus-kasus kontrafaktual guna menentukan sejauh mana peristiwa-peristiwa tertentu diperlukan dan cukup untuk menghasilkan hasil tertentu dalam kasus-kasus tertentu. Menyadari bahwa situasi akses jaringan menjadi sangat lambat. Praduga ada aktivitas yang tidak biasa terjadi di jaringan, dan aktivitas serangan mungkin telah terjadi. Untuk mengetahui penyebabnya, menganalisis hasil sniffing trafik menggunakan Wireshark. Dua kali penggalian data dilakukan pada waktu dan kesempatan yang berbeda. Menyelidiki kejadian tersebut dengan melakukan analisis pada data PCAP pada File Attack a.pcap atau Attack a.pcap. Hasil analisa dibahas dengan mengamati trafik yang dihasilkan pada jaringan dengan menangkap file PCAP.
Chance Evaluation and Improvement of Get to Control Data Security Administration Based On ISO/IEC 27001 at Telkom University Jakarta Campus Fachrur Rozi, Nurwan Reza; Agustav Wirabudi, Andri; Arandiant Rozano, Seandy
International Journal of Science Education and Cultural Studies Vol. 3 No. 2 (2024): ijsecs
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/ijsecs.v3i2.246

Abstract

The digital-based smart campus system, consisting of components such as the campus application, digital presence with QR code, and campus development dashboard, is one of the services offered by Telkom University Jakarta Campus. In addition, it utilizes artificial intelligence (AI) technology, especially image recognition, to support the Green Campus concept and increase environmental protection efforts, demonstrating the university's dedication to utilizing innovative technologies for a sustainable future. Therefore, the security of information assets is very important. Issues of confidentiality, integrity, and availability can arise if the information security system is not properly managed. This research aims to improve the security information system by conducting a risk assessment using the OCTAVE method. This risk assessment aims to identify the most significant impacts when risks occur and prioritize the most important risks. According to ISO/IEC 27001:2013, safety controls and targets are established. The results of this research are purpose and security management documents, risk management documents, and operational standards of procedures (SOPs). Risk management documents related to information security include risk assessment, risk identification, risk analysis, and evaluation at the campus. Standard Operational Procedures (SOP) documentation includes policy documents, work instructions, and work records that are consistent with the selection of objective controls and security controls for risk management.
Enhancement of images compression using channel attention and post-filtering based on deep autoencoder Wirabudi, Andri Agustav; Fachrurrozi, Nurwan Reza; Dorand, Pietra; Royhan, Muhamad
International Journal of Advances in Intelligent Informatics Vol 10, No 3 (2024): August 2024
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/ijain.v10i3.1499

Abstract

Image compression is a crucial research topic in today's information age, especially to meet the demand for balanced data compression efficiency with the quality of the resulting image reconstruction. Common methods used for image compression nowadays are based on autoencoders with deep learning foundations. However, these methods have limitations as they only consider residual values in processed images to achieve existing compression efficiency with less satisfying reconstruction results. To address this issue, we introduce the Attention Block mechanism to improve coding efficiency even further. Additionally, we introduce post-filtering methods to enhance the final reconstruction results of images. Experimental results using two datasets, CLIC for training and KODAK for testing, demonstrate that this method outperforms several previous research methods. With an efficiency coding improvement of -28.16%, an average PSNR improvement of 34%, and an MS-SSIM improvement of 8%, the model in this study significantly enhances the rate-distortion (RD) performance compared to previous approaches.
Komunikasi Cahaya Tampak untuk Model Sistem Pintu Otomatis Berbasis Internet of Things NATALI, YUS; R. F, NURWAN; NURHAYATI, ADE; RIZKY, M.; A, M. NABIL; M, MOSES; ROIHAN, M.; S, ALVA NURVINA; DORAND, PIETRA; SUYATNO, SUYATNO
ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika Vol 12, No 4: Published October 2024
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/elkomika.v12i4.938

Abstract

ABSTRAKKomunikasi cahaya tampak (Visible Light Communication) merupakan solusi untuk komunikasi berkecepatan tinggi pada sistem berbasis Internet of Things. Model pintu otomatis berbasis IoT menggunakan komunikasi cahaya tampak berhasil dibuat untuk keamanan rumah. Komunikasi tersebut dengan panjang gelombang 650 nm berwarna merah diujicobakan untuk jarak 20 cm. Penerima fotodioda mengaktifkan motor servo untuk membuka pintu dengan maksimal sudut rotasi 120 derajat. Ada enam macam kondisi pintu terbuka yang ditampilkan di LCD dan dikirimkan melalui internet ke website. Secara keseluruhan sistem berjalan dengan baik. Komunikasi cahaya tampak juga diujicobakan sebagai sinyal pembawa dengan mendeteksi tegangan yang dikirimkan oleh laser di fotodioda. Berdasarkan ujicoba didapatkan data yang dikirimkan dapat diterima dengan baik, walaupun perubahan tegangan turun sampai dengan 1.5% di fotodioda.Kata kunci: komunikasi cahaya tampak (Visible Light Communication), Internet of Things, pintu otomatis, keamanan, sinyal pembawa ABSTRACTVisible Light Communication (VLC) is a solution for high-speed communication that can be utilized for Internet of Things (IoT) systems. An automatic door model based on IoT using VLC has been successfully assembled for user security at home. This communication, with a wavelength of 650 nm in red light, was tested for 20 cm. The photodiode receiver activates the servo motor to open the door with a maximum rotation angle of 120 degrees. The open door process consists of 6 different conditions displayed on the LCD and transmitted via the internet to the website. In a comprehensive evaluation, the system operates optimally. In addition, VLC was also tested as a carrier signal to examine the voltage sent by the laser. Based on the experiment, the data sent can still be received well, even though there is a voltage change up to 1.5% at the photodiode receiver.Keywords: Visible Light Communications (VLC), Internet of Things, automatic door, security, carrier signal
IMPLEMENTASI VLAN ROUTER ON A STICK MENGGUNAKAN GNS3 V2.2.23 UNTUK MENINGKATKAN PERFORMANSI JARINGAN KOMPUTER: (Studi Kasus di Institut Teknologi Telkom Jakarta) Purnama Alkhoir; Ade Nurhayati; Nurwan Reza Fachrurrozi
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Untuk mebuat jaringan yang handal, dikembangkan lah berbagai teknik khusus, seperti teknik subnetting dan penggunaan hardware yang lebih baik (antara lain switch dan router) maka muncullah konsep VLAN (Virtual Local Area Network). Agar antar VLAN dapat berkomunikasi dibutuhkan suatu jembatan yang berada pada lapisan OSI layer 3 yaitu router. Dengan menggunakan konfigurasi router “Router on a stick”, yang mana sebuah interface physical me-routing traffic antara beberapa VLAN pada satu network. Router interface dikonfigurasikan untuk beroperasi sebagai link trunk dan terhubung dengan sebuah port switch dalam mode trunk. Router menunjukkan inter-VLAN routing dengan menerima traffic VLAN yang telah di tag pada interface trunk dari switch dan secara internal merutekan antar VLAN menggunakan sub-interface.. Implementasi VLAN Router on a Stick dapat meningkatkan performansi jaringan computer dalam perkembangan jaringan computer kedepannya.
IMPLEMENTASI VLAN ROUTER ON A STICK MENGGUNAKAN GNS3 V2.2.23 UNTUK MENINGKATKAN PERFORMANSI JARINGAN KOMPUTER: (Studi Kasus di Institut Teknologi Telkom Jakarta) Purnama Alkhoir; Ade Nurhayati; Nurwan Reza Fachrurrozi
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Untuk mebuat jaringan yang handal, dikembangkan lah berbagai teknik khusus, seperti teknik subnetting dan penggunaan hardware yang lebih baik (antara lain switch dan router) maka muncullah konsep VLAN (Virtual Local Area Network). Agar antar VLAN dapat berkomunikasi dibutuhkan suatu jembatan yang berada pada lapisan OSI layer 3 yaitu router. Dengan menggunakan konfigurasi router “Router on a stick”, yang mana sebuah interface physical me-routing traffic antara beberapa VLAN pada satu network. Router interface dikonfigurasikan untuk beroperasi sebagai link trunk dan terhubung dengan sebuah port switch dalam mode trunk. Router menunjukkan inter-VLAN routing dengan menerima traffic VLAN yang telah di tag pada interface trunk dari switch dan secara internal merutekan antar VLAN menggunakan sub-interface.. Implementasi VLAN Router on a Stick dapat meningkatkan performansi jaringan computer dalam perkembangan jaringan computer kedepannya.
Smart Home Security System Using Object Recognition with the EfficientDet Algorithm: A Real-Time Approach Suyatno, Suyatno; Natali, Yus; Reza Fachrurrozi, Nurwan; Roihan, Muhamad; Dorand, Pietra; Ghani, Naufal
International Journal of Engineering Continuity Vol. 4 No. 1 (2025): ijec
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/ijec.v4i1.400

Abstract

The EfficientDet method, which is implemented on the Raspberry Pi for real-time detection in resource-constrained contexts, is the basis for the smart home security system presented in this study.  The system integrates CCTV cameras, motion sensors, and detectors to identify and classify objects, sending notifications via WhatsApp via the Twilio API.  The EfficientDet-D0 model achieves an accuracy of 94.8%, an average processing time of 45 ms, and a memory usage of about 850 MB.  When compared to moving individuals or non-human things, testing shows that stationary human items have a higher detection accuracy.  Notifications are transmitted roughly every three seconds, with an average latency of 1.4 to 1.8 seconds.  The suggested method provides object recognition, real-time monitoring, and configuration flexibility in contrast to traditional IoT-based systems.  These results highlight the potential of EfficientDet as a reliable and adaptable solution for home security.  Future improvements include improving accuracy in a variety of environmental conditions and implementing adaptive learning.