p-Index From 2020 - 2025
9.046
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering IAES International Journal of Artificial Intelligence (IJ-AI) Jurnal Simetris TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics Jurnal Ilmiah KOMPUTASI Sistemasi: Jurnal Sistem Informasi JOIV : International Journal on Informatics Visualization Indonesian Journal of Artificial Intelligence and Data Mining Applied Information System and Management Jurnal Sisfokom (Sistem Informasi dan Komputer) JURNAL ILMIAH MAHASISWA AGROINFO GALUH SEIKO : Journal of Management & Business CYBERNETICS IJISTECH (International Journal Of Information System & Technology) Jurnal Sistem Cerdas JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi Journal of Information Systems and Informatics Jurnal Teknologi Dan Sistem Informasi Bisnis Jurnal Informatika dan Rekayasa Perangkat Lunak Journal of Applied Engineering and Technological Science (JAETS) Indonesian Journal of Electrical Engineering and Computer Science Jurnal Riset Sistem Informasi dan Teknologi Informasi (JURSISTEKNI) Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Jurnal Teknik Informatika (JUTIF) IJISTECH Jurnal Abdimas Kartika Wijayakusuma Nautical: Jurnal Ilmiah Multidisiplin Indonesia Jurnal Teknologi dan Manajemen Industri Terapan Edukasiana: Jurnal Inovasi Pendidikan eProceedings of Engineering Paradoks : Jurnal Ilmu Ekonomi Nuansa Informatika Informatics Management, Engineering and Information System Journal Electronic Integrated Computer Algorithm Journal Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Bridge: Jurnal Publikasi Sistem Informasi dan Telekomunikasi Jurnal Pengabdian Bakti Akademisi SITEKNIK: Sistem Informasi, Teknik dan Teknologi Terapan Advance Sustainable Science, Engineering and Technology (ASSET) AQILA : Acceleration, Quantum, Information Technology and Algorithm Journal
Claim Missing Document
Check
Articles

The effect of a SECoS in crude palm oil forecasting to improve business intelligence Al-Khowarizmi Al-Khowarizmi; Ilham Ramadhan Nasution; Muharman Lubis; Arif Ridho Lubis
Bulletin of Electrical Engineering and Informatics Vol 9, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (561.401 KB) | DOI: 10.11591/eei.v9i4.2388

Abstract

Crude palm oil is a crop that has a harvest period of ± 2 weeks and is in dire need of dissemination of information using e-commerce in order to be able to predict the price of the yield of companies or individual gardens within the next 2 weeks in order to improve studies on business intelligence. The disadvantage of not implementing e-commerce is certainly detrimental to the garden owner because they have to go through an agent so prices are set based on the agent. So with the application of e-commerce, buyers of crude palm oil can predict prices in conducting business processes to the future. So the need to forecasting the price of crude palm oil heads in order to improve the application of business intelligence using the evolution-based artificial neural network (ANN) method which in this paper is tested with SECoS get a MAPE value of 0.035% and by applying business intelligence can protect transaction costs by 33.3%.
Astrocytoma, ependymoma, and oligodendroglioma classification with deep convolutional neural network Romi Fadillah Rahmat; Mhd Faris Pratama; Sarah Purnamawati; Sharfina Faza; Arif Ridho Lubis; Al-Khowarizmi Al-Khowarizmi; Muharman Lubis
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 11, No 4: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v11.i4.pp%p

Abstract

Glioma as one of the most common types of brain tumor in the world has three different classes based on its cell types. They are astrocytoma, ependymoma, oligodendroglioma, each has different characteristics depending on the location and malignance level. Radiological examination by medical personnel is still carried out manually using magnetic resonance imaging (MRI) medical imaging. Brain structure, size, and various forms of tumors increase the level of difficulty in classifying gliomas. It is advisable to apply a method that can conduct gliomas classification through medical images. The proposed methods were proposed for this study using deep convolutional neural network (DCNN) for classification with k-means segmentation and contrast enhancement. The results show the effectiveness of the proposed methods with an accuracy of 95.5%.
Identifikasi Parameter Webometrics dengan SEO Link Building pada Situs Perguruan tinggi Vokasi Indonesia Ega Mardoyo; Susetyo Bagas Bhaskoro; Muharman Lubis
CYBERNETICS Vol 6, No 01 (2022): CYBERNETICS
Publisher : Universitas Muhammadiyah Pontianak

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29406/cbn.v6i01.4039

Abstract

Situs Pemeringkatan Webometrics merupakan salah satu yang cukup berpengaruh bagi kredibilitas suatu Perguruan Tinggi. Pemeringkatan ini menjadi sesuatu hal yang menarik untuk mengetahui bagaimana kinerja sebuah situs di setiap Perguruan Tinggi. Webometrics melakukan pemeringkatan Perguruan tinggi 2 kali dalam setahun berdasarkan indikator yang telah ditentukan. Pada September Tahun 2021, webometrics melakukan perubahan indikator penilaian menjadi 3 indikator yaitu Visibility, Transparency (or Openess) dan Excellence (or Scholar). SEO (Search Engine Optimization) Link Building sendiri merupakan suatu metode yang bertujuan untuk meningkatan posisi ranking pada Search Engine seperti Google, Bing dan Yahoo. Pada penelitian ini akan diuraikan klasifikasi metode baru Webometrics terkait pemeringkatan 5 (lima) perguruan tinggi vokasi yaitu Politeknik Elektronika Negeri Surabaya, Politeknik Negeri Ujung Pandang, Politeknik Negeri Batam, Politeknik Manufaktur Bandung dan Politeknik Negeri Bandung dengan SEO Link Building dan tindak lanjut sebagai upaya peningkatan pemeringkatan Webometrics dan juga dalam Search Engine.
Development of soil moisture measurement with wireless sensor web-based concept Julham Julham; Hikmah Adwin Adam; Arif Ridho Lubis; Muharman Lubis
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 2: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v13.i2.pp514-520

Abstract

Measurement of soil moisture commonly by applying the soil moisture sensors is to measure the condition of the ground around which is relatively not wide. Therefore if applied for the large-scale, repeated measurements are required in accordance with the determined point. As a result it takes time to get the whole results. With the existence of wireless sensor technology then this problem can be overcome. This wireless sensor system will create a network consisting of nodes and server. In this study the server part is a server computer that requires a web server application together with its script to display and store data, while the node part is the data reader system. In the data system reader module, the sensor device is required as the input that is SEN0114, the processor is a microcontroller, while the wireless uses Wi-Fi module that is ESP8266. Wi-Fi topology used later is infrastructure (using access points). In this research, it begins by testing the sensor and then testing the data validation between the node and the server. SEN0114 sensor has different value from the American Standard Method (ASM) that is 0.922%. While the data validation test of the measurement result is Wi-Fi ESP8266 module which has a maximum distance of 14 meters toward the access points.
Defense behavior of real time strategy games: comparison between HFSM and FSM Rahmat Fauzi; Mochamad Hariadi; Muharman Lubis; Supeno Mardi Susiki Nugroho
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 2: February 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v13.i2.pp634-642

Abstract

RTS Game is one of the popular genre in PC gaming, which has been played by various type of players frequently. In RTS game, NPC Defense Building (Tower) has attacking behavior to the closest enemy without considering certain enemy parameters. This causes the NPC Tower to be more predictable by the opponent and easily defeated if NPC attacked by enemies in the group. Thus, this research simulates NPC Tower using Hierarchical Finite State Machine (HFSM) method compared with Finite State Machine (FSM). In this study, NPC Tower detects enemies by seeing at four parameters namely NPC Tower Health, Enemy's Health, Enemy Type, and Tower Distance to enemies. NPC Tower will attack the most dangerous enemy according to the ‘Degree of Danger’ parameter. Then use the decision-making logic of the rule-based system. The output of NPC Tower are three type of behaviors namely Aggressive Attacking, Regular Attacking, and Attack with Special Skill. From the test results of 3 NPC Tower, Kamandaka NPC Tower with HFSM method is winning 8.92% compare to Kamandaka Tower with FSM method. For Gayatri Tower NPC obtained equal results using both HFSM and FSM. Meanwhile, Adikara NPC with HFSM method is 4.62% superior to Adikara Tower with FSM method.
Management maintenance system for remote control based on microcontroller and virtual private server Idham Kamil; Julham Julham; Muharman Lubis; Arif Ridho Lubis
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1349-1355

Abstract

Open loop shaped control system is a form of system control without any feedback from the system. One example is the on-off condition which functions to connect and disconnect electricity. The condition to be studied is a dc motor that can be set to live and die via internet server-based client service. The server in this system is a virtual private server (VPS) device that will provide a source of service to the client in the form of a collection of information on dc motor conditions. In addition, its function is also to record the working time of the dc motor. So that a schedule can be determined when the dc motor is maintained. While the client is a control unit consisting of a microcontroller device, an ethernet module enc28j60 and a dc motor. In general the working principle of the system is beginning with the user accessing the desired VPS IP address through a web browser application. From the web browser the user chooses a dc motor to be activated. But before the client has been connected to the VPS regularly (every second), the point is to always get the latest dc motor condition information. Then the microcontroller will set the dc motor in active or off condition. The research method used is research and development. The results obtained from this study are that the amount of bandwidth needed for communication between VPS and microcontrollers via the internet network, when the control unit works is 6.02 kbps, while the response time for dc motor is 3.16 seconds and the response time for dc motor 2 is 3.46 seconds.
Vulnerability and risk assessment for operating system (OS) with framework STRIDE: comparison between VulnOS and Vulnix Adityas Widjajarto; Muharman Lubis; Vreseliana Ayuningtyas
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 3: September 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i3.pp1643-1653

Abstract

The rapid development of information technology has made security become extremely. Apart from easy access, there are also threats to vulnerabilities, with the number of cyber-attacks in 2019 showed a total of 1,494,281 around the world issued by the national cyber and crypto agency (BSSN) honeynet project. Thus, vulnerability analysis should be conducted to prepare worst case scenario by anticipating with proper strategy for responding the attacks. Actually, vulnerability is a system or design weakness that is used when an intruder executes commands, accesses unauthorized data, and carries out denial of service attacks. The study was performed using the AlienVault software as the vulnerability assessment. The results were analysed by the formula of risk estimation equal to the number of vulnerability found related to the threat. Meanwhile, threat is obtained from analysis of sample walkthroughs, as a reference for frequent exploitation. The risk estimation result indicate the 73 (seventy three) for the highest score of 5 (five) type risks identified while later on, it is used for re-analyzing based on the spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of prvilege (STRIDE) framework that indicated the network function does not accommodate the existing types of risk namely spoofing.
Dealing with Voters’ Privacy Preferences and Readiness in Electronic Voting Muharman Lubis; Arif Ridho Lubis
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i3.pp994-1003

Abstract

Various countries have been encouraged to adopt electronic voting because it can reduce operational cost and time spent for tabulation process. In the current research, it has been mentioned several problem arised in term of technical aspects, voters’ trust, machine vulnerabilities and privacy right in which experts argued the election system have been compromised. In short term, the certain faction will try to exploit the system weaknesses for their own benefit, while in the long term, it can create public distrust to the government, which decrease the voters turn out, break the participation willingness and downgrade the quality of voting. Thus, the government should deal with previous issues in the election before adopting electronic approach while at the same time align with voters’ expectation to provide better election in serve citizen through comprehensive analysis. This study provide initial step to analyse the readiness of electronic voting from the social perspective in response to how Indonesia view the initiative to adopt new tech in voting system.
Optimization performance management with FCAPS and ITILv3: opportunities and obstacles Adityas Widjajarto; Muharman Lubis; M. K. Rizal Syahputra
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 1: January 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i1.pp281-290

Abstract

With the need for rapidly growing network services each year; the factors of reliability, availability and quality become extremely critical for organizations, groups, institutions and governments to have in the network services implementation. In this case, several rural governments requires the improvement of its network performance management in establishing their internal and external operation to align with the grand design by the central government in improving citizen’s satisfaction through public service. Testing was done using scenarios for output analysis and packet loss as parameters. The results of the proposed topology obtained a productivity of 541.43 Kbps and a packet loss of 0.07%. While the current topology gets a rate of 421.28 Kbps and packet loss of 0.22%. It can be concluded that the proposed topology is still better than the current topology. The optimization of performance management is based on the FCAPS method which emphasize in the performance monitoring and data analysis with the support of ITILv3 that contains documentation and policy guidance to conduct quality performance management. In addition, performance management activities will occur with processes in the design of ITIL services and existing conditions.
Decision Making in the Tea Leaves Diseases Detection Using Mamdani Fuzzy Inference Method Arif Ridho Lubis; Santi Prayudani; Muharman Lubis; Al Khowarizmi
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i3.pp1273-1281

Abstract

The tea plants (Camellia Sinensis) are small tree species that use leaves and leaf buds to produce tea harvested through a monoculture system. It is an agriculture practice to cultivate one types of crop or livestock, variety or breed on a farm annually. Moreover, the emergence of pests, pathogens and diseases cause serious damages to tea plants significantly to its productivity and quality to optimum worst. All parts of the tea plant such as leaves, stems, roots, flowers and fruits are exposed to these harm lead to loss of yield 7 until 10% per year. The intensity of these attacks vary greatly on particular climate, the degree slope and the plant material used. Therefore, this study analyzes tea leaves as a common part used in recipes to create unique taste and flavor in tea production, especially in agro-industry. The decision making method used is Fuzzy Mamdani Inference as one of model with functional hierarchy with initial input based on established criteria. Fuzzy logic will provide tolerance to the set of value, so that small changes will not result in significant category differences, only affect the membership level on the variable value. Previous method using probabilities have shown 78% tea leaves have been attacked by category C (Gray Blight) while using Mamdani indicated 86% of tea leaves have been infected. In this case, this result pointed out that Fuzzy Mamdani Inferences have more optimal result compare to the previous method.
Co-Authors Abdullah Muhammad, Hasan Achmad Rafi Addini Firdaus, Fitri Adillah, Muhammad Fauzan Nur Adinda Laras Ayu Adityas Widjajarto Agus Ambarwari Agustiana, Nathifa Ahmad Musnansyah Akbar Habib Buana Wibawa Putra Akbar Nurwahyu Arifin Putra Al Khowarizmi Ali Nurdin Ali Nurdin Alvan Kamal Amanah, Raisyah Nurul Amri Amri Amril, Salsabila Zahrani Annastasia, Syifa Asriana Asriana, Asriana Asti Amalia Nur Fajrillah Bayuwindra, Anggera Deden Witarsyah Dhiya Fathia Dika, Dafa Dinda Bayu Rama Dila, Revyolla Ananta Dinayatullah, Ledi Dini Handayani, Dini Dini Oktarina Dwi Handayani DM, Burhanis Sulthan Dwi Hary Sandy, Muhammad Dzakiyyah Al Kaazhim Edwinsyah, Muhammad Ega Mardoyo Ega Mardoyo Erlangga, Faezal Fadilah, Zikri Fakhrurroja, Hanif Farhana Zahra Farid Farid, Farid Farma, Junia Faza, Sharfina Febriyani, Widia Firdaus, Taufiq Maulana Fitrah Khairi Fitriyana Dewi Fonna, Rizki Putri Nurita Gabriel Ardi Hutagalung Galih Rashif Husaini Ghifari, Muhamad Yazid Gunawan, Dian Habibi Ramdani Safitri Hafiizh Maulana Halim, Hendra Harefa, Hafid Rahman Hermawan, Fairuz Fernanda Hikmah Adwin Adam Humairo, Annisa Idham Kamil Ikbar, Thoriq Ikhlas Fuad Zamzami Ikhsan, Alif M. Ilham Ramadhan Nasution Iqbal Santosa Irvan, Irvan Jihan Audia Mulya Julham Julham Julham Julham Kahirul Umam, Irhan Kartini, Ani Laily Indaryani Lubis, Arif Ridho Lubis, Fahdi Saidi Lukman Abdurrahman Lukmanul Hakim Lukmanul Hakim M. K. Rizal Syahputra M. Shabri Abd. Majid Matias Garcia Constantino Matias Garcia-Constantino Mhd Faris Pratama Mira Kartiwi Mochamad Hariadi Mochamad Yudha Febrianta Muhammad Dwi Hary Sandy Muhammad Haikal Fasya Muhammad Luthfi Hamzah Muhammad Mahendra Muhammad, Hasan Abdullah Muhdiantini, Cindy Mulhartono, Tomi Muttaqin, Alif Noorachmad Nabiel Muhammad Al Ghazali Naufal Wirawan, Muhammad Neca Aqila Nelsa, Putri Nguyen Kieu Trang Ni Made Purnami Noorachmad Muttaqin, Alif Nur Ichsan Utama Nurlina, Eka Nurma Sari, Nurma Nuryatno, Edi Triono Nusantara, Abdul Hakim Satria Oktariani Nurul Pratiwi Paradita, Anggraeni Xena Parameswari, Sang Dara Paramita, Paramita Possumah, Mercy Kristina Prahastiwi, Narita Ayu Prayoga, Danar Prayudani, Santi Putri Luthfiah Harmaya Qadhli Jafar Adrian R. Wahjoe Witjaksono Rafian Ramadhani Rafian Ramadhani Rahadhitya Anuraga Raharjo, Adi Rahmat Fauzi Rahmat Mulyana Rahmat, Hadian Raied Ali Alqahtani Rakan, Raihan Ramadhan, Yumna Zahran Rayhan Rafael Rafsanjani Romi Fadillah Rahmat Sadewa, Rizki Sahidan Abdulmana Sandy, Muhammad Dwi Harry Sandy, Muhammad Dwi Hary Sarah Purnamawati Satria Nusantara, Abdul Hakim See, Tan Lian Shaffiei, Zatul Alwani Shafira Fatimah Azzahra Silvia, Vivi Sinung Suakanto Siregar, Fachrul A Sonny Zulhuda Supeno Mardi Susiki Nugroho, Supeno Mardi Susetyo Bagas Bhaskoro Syah, M. Edwin Syahrizal, Teuku Muhammad Taufiq Carnegie Dawood Thoriq Ikbar Tien Fabrianti Kusumasari Umar Yunan Kurnia Septo Hediyanto Umuri, Khairil Vega Putra Pradana Vreseliana Ayuningtyas Wihayanti, Titik Wirawan, Muhammad Naufal Yani, Mega Fitri Yulio Ferdinand Yuyun Yusnida Lase Zamzami, Ikhlas Fuad Zulkifli Zulkifli