Nur Hadisukmana
President University

Published : 8 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 8 Documents
Search

University Guide using Speech Recognition and Computer Vision Anthony Kosasi; Nur Hadisukmana; Rosalina Rosalina; R.B. Wahyu; Budi Sulistyo; Yuyu Wahyu
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2017
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Education is an important factor inside mankind’s existence. However, choosing a great and promising place to learn is a very hard thing to do, especially for senior high school student who want to continue their education into the university. There are a lot of universities around us and a lot of major or concentration that we must choose before entering a university Considering this issue, Some application will be developed and the application will help people in understanding some majors those are available and help people to know about some universities in Indonesia whether about vision, mission, curriculum, etc. This application will not be a boring information application that provides information in text and let user read it. This is rather an attractive application that will tell some information about each major in speech and also give information about each university when user scan the university logo with computer vision. Not only that, after user scans the university logo, video profile of the university will be played and then user can pause, stops or plays the video also by using speech. Some additional feature like migration into major field and website link will also be provided.
Paper Money Recognizer Using Feature Descriptor Nur Hadisukmana; Adri Yudianto
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i1.pp117-126

Abstract

People are still using paper money for daily transaction; this, however, will expose some difficulty for visually impaired people. Though they can still read the nominal value of the paper money by the other people or feel the tactile feature, they cannot depend upon others all the time and the tactile feature does not work well if the paper money is worn out. Some alternatives have been proposed and conducted. One of them is using money value recognition application. The application will recognize nominal value of paper money comparing the image of the paper with database. This process is using a feature extraction algorithm called ORB feature descriptor. It has been used for six (6) different types of currencies that are 5 most traded currencies and Indonesia currency and also for different types of nominals (bills).
An Algorithm to construct nondominated k-coteries Rikip Ginanjar; Nur Hadisukmana
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 2: May 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v18.i2.pp953-960

Abstract

One of the solution in solving k mutual exclusion problem is the concept of k-coterie. A k-coterie under a set S is a set of subsets of S or quorums such that any k + 1 quorums, there are at least two quorums intersect each other. The k mutual exclusion problern is the problem of managing processes in such a way that at most k processes can enter their critical sections simultaneously. Nondominated k-coteries are more resilient to network and site failures than doninated k-coteries; that is the availability and reliability of a distributed system is better if nondominated k-coteries are used. Algorithms to construct k-coteries have been proposed, unfortunately they have some restrictions, especially in constructing nondominated k-coteries. The restrictions are due to the combination of N, the number of nodes in a distributed system, and k, the number of processes allowed to enter their critical sections simultaneously. To solve this problem, this paper proposes an algorithm to construct nondominated k-coteries for all combination of N and k.
Electronic Dance Music Launchpad Composer Android Application Nur Hadisukmana; Ida Made Santika Kusuma Yogi
IT for Society Vol 3, No 02 (2018)
Publisher : President University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (619.969 KB) | DOI: 10.33021/itfs.v3i02.584

Abstract

Music is the art of combining vocal or instrumental sounds or tones in varying melody, harmony, rhythm, and timbre. Music can come from any instruments, even there are many musician use household furniture to create a music. Nowadays, the development of music industry is much influenced by technology. One new genre music that emerge because of technology development is EDM. EDM is stand for Electronic Dance Music. EDM is a broad range of percussive electronic music genres produced largely for nightclubs, raves and festival. A lot of software, applications and tools were created to compose the sound to create EDM. Although these software are easy to install but most of these software are difficult to use and take time to learn it. What people need in this era are simplicity, portability, user friendly and easy to use.
Simple AR Basketball For Android Devices Nur Hadisukmana; Dias Teddo Wicaksono
IT for Society Vol 3, No 01 (2018)
Publisher : President University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (378.45 KB) | DOI: 10.33021/itfs.v3i01.580

Abstract

These days many people doing a lot of activities. Entertainment is one solution to reduce stress from those activities. Game is one of entertainment type, most of people playing games every day. People in these days using their smartphone to do a lot of things, smartphone becomes most important thing for people handles their life, people bring it every day and everywhere. Now, many game developer develop game on smartphone, most of them develop the 2D game or 3D game. This research will develop an casual game application on android device, combine 3D environment and Augmented Reality (AR) environment.
APPLICATION FOR SEARCHING HANGOUT PLACES BASED ON MIDDLE POINT OF PARTICIPANT’S LOCATION (MEEDLE) Aprillia Kusumawardhani Pannita; Nur Hadisukmana
IT for Society Vol 5, No 1 (2020)
Publisher : President University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (627.669 KB) | DOI: 10.33021/itfs.v5i1.1221

Abstract

The lifestyle of the current year’s people is very different with the lifestyle of the people eight years ago. Start from the booming of Facebook as social media. It changes the ways of communicating. Those can be said that is the turning point of the digital era, from then the people are educated to share everything online and from those sharing it creates the opportunity to gather information that also affecting the change of conventional business process. Just one simple application can change the lifestyle of million people. From then, many other mobile application has help the simple task in our life.This work that developed an application named, Application for Searching Hangout Places Based on Middle Point of Participant’s Location ( MEEDLE ), will discuss the development of solving the simple problem of searching and deciding hangout place based on the data that internet shared. This application will give the user ease and effectiveness while using.
Data Sharing Application with SMS Notification Bernardus Satrio Palapessy, 2Nur Hadisuk Satrio Palapessy; Nur Hadisukmana
IT for Society Vol 1, No 2 (2016)
Publisher : President University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (518.604 KB) | DOI: 10.33021/itfs.v1i2.305

Abstract

The result of the research is the application that allow user to retrieve information through News and Event Agenda Feature. This application also allows the member to keep in touch with their stuff with SMS notification. The application is easy to control by an administrator through a message system and capabilities of administrator of any file, also by a user hierarchy system.
Implementation of Securing Data in the Cloud using Combined Cryptography and Steganography Rosalina Rosalina; Nur Hadisukmana
Jurnal Teknik Informatika dan Sistem Informasi Vol 5 No 3 (2019): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v5i3.1922

Abstract

The recent advance in information technology field forcing us to ensure the privacy of the digital data. It is very important to develop the method that may satisfy the needs. Many methods/techniques applied to reach that goal. One of efficient way to reach that secrecy can be achieved with implementing steganography. TheStego application is using Steganography to work in the digital domain and hides the data information within speech signal. To increase the security, TheStego combines steganography techniques with MD5 encryption techniques. Steganography techniques that applied in TheStego application is using LSB (Least Significant Byte) method. This application have three main features: hide text in an audio carrier, hide image within the audio and an audio inside a wave signal of an audio carrier. TheStego also required the user to enter password before the processing of data hiding begin. The password will act as decryption password. Such approach is implemented to increase the security of this application. So, only the one who knows the password that can extract and decrypt the data inside of the application.