Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Best : Journal of Applied Electrical, Science and Technology

Efektivitas Metode Transformasi Wavelet dan Fourier untuk Denoising Sinyal EKG Apnea Rasyida Shabihah Zukro Aini; Elsa Sari Hayunah Nurdiniyah
BEST Vol 5 No 2 (2023): BEST
Publisher : Universitas PGRI Adi Buana Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36456/best.vol5.no2.8765

Abstract

An Electrocardiogram (ECG) signal results from recording the heart's electrical activity. Currently, diseases originating from heart abnormalities still dominate the world. Therefore, doctors need to find an ECG signal that is free from noise, this cleaning process is called denoising. The denoising methods commonly used are the wavelet transform method, and the Fourier transform method. Testing was conducted on ECG signal data with abnormalities in Apnea with RR intervals filled with noise, making the QRS complex difficult to identify. As a result, the Discrete Wavelet Transform (DWT) method produces the best form of reconstruction, resembling the initial ECG signal, while the Fast Fourier transform (FFT) method produces the best signal-to-noise ratio (SNR) for the denoising process. So, we get a superior FFT method in the ECG signal denoising process.
Cybersecurity Measures For Election Information Systems : Sistem Rekapitulasi Suara Pemilu 2024 (siRekap) Dwi Hastuti; Sagita Rochman; Rasyida Shabihah Zukro Aini
BEST Vol 6 No 1 (2024): BEST
Publisher : Universitas PGRI Adi Buana Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36456/best.vol6.no1.9182

Abstract

Seluruh data pemilu di Indonesia diolah dan disimpan oleh Komisi Pemilihan Umum Republik Indonesia-KPU dengan menggunakan Sistem Informasi Rekapitulasi Pemilu (SiRekap). Sistem SiRekap mematuhi undang-undang terkait, dan semua datanya ditangani dan disimpan di pusat data Indonesia. Pemilu rentan terhadap berbagai macam ancaman teknologi, mulai dari masalah keamanan siber tradisional, seperti peretasan dan pelanggaran data, hingga bentuk manipulasi yang lebih canggih, seperti deepfake dan disinformasi yang dihasilkan oleh AI. Pelaku ancaman dapat mengeksploitasi kerentanan dalam infrastruktur pemilu, dengan menargetkan sistem pemungutan suara elektronik dan basis data pemilih. Langkah-langkah pencegahan keamanan siber sangat penting untuk melindungi pemilu dari serangan siber yang selalu berubah, seperti: tanggung jawab bersama atas keamanan siber, menggunakan keamanan siber untuk mendapatkan keunggulan, kebutuhan hukum dan peraturan akan keamanan siber, praktik terbaik untuk keamanan siber, contoh- contoh keamanan siber di dunia nyata, cita-cita pilihan bagi perusahaan dan institusi. Pemerintah mempunyai peran penting dalam menjamin keamanan siber. Peningkatan keamanan siber akan sangat bermanfaat dalam mencegah kebocoran dan peretasan. Dengan harga yang wajar, sistem pemilu itu sendiri dapat diperkuat secara signifikan dalam hal keamanan.  
Design and Build of Air Conditioners with Peltier Modules and PID Controls Mahesa Sangga Bhuwana; Rasyida Shabihah Zukro Aini
BEST Vol 6 No 2 (2024): BEST (Buana Electrical Science Technology): Journal of Applied Electrical, Scienc
Publisher : Universitas PGRI Adi Buana Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36456/best.vol6.no2.9714

Abstract

Air conditioners are among the technologies that have been increasingly common, as time has gone on, from personal comfort to room comfort. A multi-story building is one location that requires air conditioning. This is because the structure's air pressure will rise until a certain level, making the temperature too low, so air conditioning is necessary to maintain a comfortable temperature. Similarly, in tropical areas where the temperature exceeds what is reasonably comfortable. However, the current air conditioner technology has the potential to harm the environment. Since Freon, which is used in it, can pass through the ozone layer. Eventually, global warming will happen and the world will get hotter. The SHT21 sensor is the kind of sensor that will be utilized in this final project since it has strong and steady chemical resistance over time and uses the I2C interface. This type of sensor is also capable of being utilized as a calibrated ambient temperature sensor, with a digital output form already comprised. This sensor will enable us to create a PID system with feedback that monitors the temperature produced by the Peltier module along with reacting to controlled PID by delivering PWM into the driver, then subsequently transmits the signal to the Peltier module for monitoring. When the duty cycle is 100 percent or the PWM value is set to 255, the Peltier module generates a 12-volt voltage at its best. When duty cycle 0 percent or PWM value 0 is selected, the module stops functioning. It is anticipated that this system will advance toward a Freon-free air conditioning system.
Implementation of Face Detection Login System using Python Dwi Hastuti; Rasyida Shabihah Zukro Aini; Afif Nuril Musthofa
BEST Vol 6 No 2 (2024): BEST (Buana Electrical Science Technology): Journal of Applied Electrical, Scienc
Publisher : Universitas PGRI Adi Buana Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36456/best.vol6.no2.9880

Abstract

Traditional authentication methods, primarily relying on passwords, face several critical challenges. Users often choose weak passwords, reuse them across multiple platforms, or struggle to remember complex combinations, leading to potential security vulnerabilities. As cybersecurity threats continue to evolve, traditional password-based authentication mechanisms have proven increasingly vulnerable to various attacks. Face detection-based login systems have emerged as a promising alternative, offering a balance between security and user convenience. This paper provides a detailed examination of implementing face detection-based login systems, focusing on using Python programming language. The research highlights both the advantages and potential vulnerabilities of such systems while proposing mitigation strategies for enhanced security.