Feri Fahrianto
Department Of Informatics Engineering, Faculty Of Science And Technology, State Islamic University Syarif Hidayatullah Jakarta

Published : 6 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : TEKNIK INFORMATIKA

PUSH NOTIFICATION MONITORING SISTEM PINTU AIR BERBASIS ANDROID MENGGUNAKAN FIREBASE CLOUD MESSAGING Fernando, Frandia; Arini, Arini; Fahrianto, Feri
JURNAL TEKNIK INFORMATIKA Vol 13, No 1 (2020): JURNAL TEKNIK INFORMATIKA
Publisher : Prodi Teknik Informatika Universitas Islam Negeri Syarif Hidayatullah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (809.704 KB) | DOI: 10.15408/jti.v13i1.15884

Abstract

Flood disaster is very common, especially in Jakarta City. One way to control water debit is to create a dam or reservoir. In each reservoir there is a water gate which serves to dispose of unwanted water gradually or continuously according to the water volume present in the dam. The Regional Disaster Management Agency (BPBD) Jakarta City needed a system that can monitor any existing water gates of the reservoir, this is to facilitate water gate inspectors to provide information. By using firebase cloud messaging technology that will be applied in the application of push-based android water doors. The application will provide notification and water gate data in real time, making it easier for users to get data in real time. Firebase Cloud Messaging is a cross platform solution that allows you to send messages reliably at no cost. In addition, the use of API as a processing medium to pull data from the web BPBD, optimize its function to mobile android. BPBD as the agency that tackling the disaster can know the state of the environment quickly and accurately. Applications created not only made for BPBD only but the general public can also to know the condition of the water gate. In addition, there are also ways of handling floods and what to do at each level of water level.For the next, this application can add other technollgy also IoT technology.
PENERAPAN END-TO-END ENCRYPTION DENGAN METODE SUPER ENCRYPTION UNTUK KERAHASIAAN CITRA DIGITAL PADA APLIKASI INSTANT MESSAGING Feri Fahrianto; Addinul Kitanggi
JURNAL TEKNIK INFORMATIKA Vol 9, No 1 (2016): Jurnal Teknik Informatika
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (873.124 KB) | DOI: 10.15408/jti.v9i1.5651

Abstract

ABSTRAK Instant Messaging merupakan media komunikasi pengiriman pesan yang marak digunakan untuk saat ini sebagai pengganti telepon dan SMS. Salah satu fitur pada layanan instant messaging yang populer adalah fitur pengiriman citra digital. Ada potensi ancaman keamanan pada instant messaging berbentuk pencurian data citra digital yang dikirim melalui jaringan layanan instant messaging dan juga pencurian data pada database yang tersimpan pada server pihak ketiga. Solusiyang dapat dilakukan untuk hal ini adalah dengan menggunakan end-to-end encryption (Andre 2009). End-to-end encryption (E2EE) adalah suatu mekanisme komunikasi dimana orang yang bisa membaca pesannya hanyalah orang yang sedang berkomunikasi tersebut. Algoritma enkripsi yang digunakan dalam implementasi E2EE bisa bervariasi. Dalam penelitian ini algoritma enkripsi yangdigunakan adalah super encryption dengan menggabungkan playfair cipher dengan Vigenere cipher yangcukup efektif untuk digunakan pada mobile phones (Setyaningsih et al. 2012). Untuk itu, penulis merancang dan membangung aplikasi instant messaging yang dapat berjalan pada platform mobile Android yang dapat mengenkripsi dan mengirim citra digital yang berguna untuk meningkatkan keamanan pada layananinstant messaging.  Kata Kunci:instant messaging, end-to-end encryption, super encryption, multiple encryption, vigenere cipher, playfair cipher, extreme programming
Attendance Recognation by Using Smart Meter Based On IoT Study Case : FST UIN Jakarta Feri Fahrianto; Hendra Bayu Suseno; Alfatta Reza
JURNAL TEKNIK INFORMATIKA Vol 12, No 1 (2019): JURNAL TEKNIK INFORMATIKA
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (720.059 KB) | DOI: 10.15408/jti.v12i1.11043

Abstract

State Islamic University Syarif Hidayatullah Jakarta as rapidly growing university toward world-class research university placed in the edge of Jakarta has academic information centre running by Pustipanda (The Center of Information Technology and Database). The acadmic information system (AIS) has been used for recording an academic activity in university for almost a decade, this information system has a functionality for detecting the lecturer attandancity, but the attendance system needs to be input by admin. In this research, the system to detect attendancity from lecturer is build and synchronize to universisty academic information system.  Internet of Things, based on ITU-T 2015, some objects are able to transmit data among object by using Internet connection. It means by this technology the Internet used has been widely changed, from human to machine communication now also become machine-to-machine communications. By using this technology a small object or device is able to implement into electrical system to detect an activity occured in the room. Things implemented in the room are able to monitor which electronic device is active and motion of moving objects, also the position of objects. The communication connection between smart phones and acces point in the class room is also monitored in order to identify the lecturer identity.
Performance Analysis of Transfer Learning Models for Identifying AI-Generated and Real Images Arini Arini; Muhamad Azhari; Isnaieni Ijtima’ Amna Fitri; Feri Fahrianto
JURNAL TEKNIK INFORMATIKA Vol 17, No 2: JURNAL TEKNIK INFORMATIKA
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/jti.v17i2.40453

Abstract

This study aims to analyze and compare the performance of three transfer learning methods, namely InceptionV3, VGG16, and DenseNet121, in detecting AI-generated and real images. The background of this research is the unknown performance of transfer learning methods for detecting AI-generated and real images. This study introduces innovation by conducting 54 experiments involving three types of transfer learning, three dataset split ratios (60:40, 70:30, and 80:20), three optimizers (Adam, SGD, and RMSprop), two numbers of epochs (20 and 50), and the addition of dense and flatten layers during fine tuning. Performance evaluation was conducted using binary cross entropy loss and confusion matrix. This research provides significant benefits in determining the most effective transfer learning model for detecting AI-generated and real images and offers practical guidance for further development. The results show that the InceptionV3 model with the Adam optimizer, an 80:20 split ratio, and 20 epochs achieved the highest accuracy of 84.26%, with a loss of 39.54%, precision of 81.33%, recall of 82.43%, and an F1-Score of 81.88%.