Claim Missing Document
Check
Articles

Found 6 Documents
Search

KUNCI TEKNOLOGI 5G Ulil Surtia Zulpratita
Jurnal Ilmiah Teknologi Infomasi Terapan Vol. 4 No. 2 (2018)
Publisher : Universitas Widyatama

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (965.352 KB) | DOI: 10.33197/jitter.vol4.iss2.2018.163

Abstract

[Id] Proses kelengkapan standarisasi teknologi 5G diharapkan akan selesai sebelum Oktober 2020. Resminya standarisasi ini akan menjadi hal penting untuk komersialisasi jaringan 5G. Teknologi 5G diprediksi akan membutuhkan transformasi akan kebutuhan frekuensi carrier yang sangat tinggi dengan bandwidth yang sangat lebar, densitas ekstrim untuk berbagai divais dan base station, serta sejumlah besar antena. 5G tidak akan menjadi antarmuka udara tunggal sebagaimana pada model generasi sebelumnya. 5G diprediksi akan sangat integratif: jalinan koneksi antarmuka udara dan spektrum 5G bersama-sama dengan teknologi nirkabel yang sudah ada (misalnya: LTE dan WiFi) akan memberikan layanan dengan pesat data tinggi dan cakupan luas, serta menjamin terwujudnya pengalaman pengguna tanpa hambatan. Untuk mendukung hal tersebut, di bagian core network harus berevolusi untuk mencapai tingkat belum pernah terjadi sebelumnya dalam hal fleksibilitas dan kecerdasan, regulasi spektrum perlu dikaji kembali dan direvisi, masalah energi dan efisiensi biaya juga akan menjadi pertimbangan yang penting. Berdasarkan studi literatur yang telah dilakukan, artikel ini akan mengidentifikasi dan merumuskan empat kunci penting implementasi teknologi 5G. Kata kunci : implementasi 5G, massive MIMO, jaringan hybrid, mmWave, unified air interface [En] 5G standardization process is expected to be finished before October 2020. This standardization is essential for making 5G network commercial deployment. The 5G technology is forecasted to demand a transformation in the need for very high carrier frequencies with very extensive bandwidth, extreme density for devices and base stations, as well as large numbers of antennas. 5G will not be a distinct air interface based on Radio Access Technology as in former generation models. 5G is predicted to be immensely collaborative: the linkage of air interface and 5G spectrum together with existing wireless technologies (for example: LTE and WiFi) will provide services with universal high-rates coverage and ensure seamless user experience. To support this, the core network must also evolve to achieve an extraordinary level of adjustability and intelligence, spectral standardization needs to be reviewed and revised, energy issues and cost efficiency will also be an important attention. Based on studies that had been done, this article will discuss and identify the four significant keys to the implementation of 5G technology.
Pemanfaatan Sarana dan Prasarana Media e-Learning atau Virtual Laboratory dalam Pembelajaran Jarak Jauh di Era Pandemi Covid-19 Sukenda Sukenda; Ari Purno Wahyu; Benny Yustim; Helmy Faisal Mutaqien; Ulil Surtia Zulpratita
Jurnal Pengabdian kepada Masyarakat Nusantara Vol. 3 No. 2.1 Desember (2022): SPECIAL ISSUE
Publisher : Cv. Utility Project Solution

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Training activities, one of the community service activities, vocational high school teacher training activities. The purpose of the training is to provide an overview of learning subjects using e-learning or virtual laboratories. It is hoped that the training will take the form of learning and the learning process will be carried out with online learning during the covid-19 pandemic. The training discussed about e-learning or virtual laboratory learning to Vocational High School teachers. This model has the aim that competence in the field of learning and practice is carried out well. Learning development using online media, virtual laboratory is a practical learning media that is carried out online. E-learning, learning subjects using information technology media. The ability to manage and use e-learning and virtual laboratories is required in distance learning (PJJ). The development of distance learning or online is the right step in using e-learning or virtual laboratories in the covid-19 pandemic era.
HiVAD : A Voice Activity Detection Application Based on Deep Learning FARIDH, MUHAMMAD HILMI; ZULPRATITA, ULIL SURTIA
ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika Vol 9, No 4: Published October 2021
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/elkomika.v9i4.856

Abstract

ABSTRAKDalam tulisan ini, deteksi aktivitas suara disajikan pada smartphone secara realtime dengan jaringan saraf konvolusional. Pengurangan waktu komputasi adalah masalah dari studi sebelumnya. Meskipun telah menggunakan pendekatan machine learning, masih banyak kekurangan dari penelitian sebelumnya. Citra sinyal suara dihasikan oleh spektrogram energi log-mel, kemudian citra sinyal suara diinputkan ke dalam deep learning CNN untuk mengklasifikasi suara manusia dan derau. HiVAD mengungguli persentase metode VAD lainnya yaitu G729B, Sohn, dan RF dari hasil tes yang ditunjukkan dengan akurasi rata-rata SHR sebesar 15,89%, 28,98%, 42,13% pada tingkat 0dB, 8,67%, 16,29%, 17,63% pada tingkat 5 dB, dan 1,35%, 7,72%, 5,14% pada tingkat 10 dB. Selain itu, mekanisme Multi-threading memungkinkan komputasi yang efisien untuk waktu secara realtime. Penelitian ini menunjukkan bahwa arsitektur CNN pada HiVAD secara signifikan meningkatkan akurasi deteksi aktivitas suara.Kata kunci: aplikasi VAD, voice detection, deep learning, CNN ABSTRACTIn this paper, the detection of sound activity is presented on smartphones in realtime with convolutional neural networks. Reduced computing time is a problem from previous studies. Despite the use of machine learning approaches, there are still many shortcomings from previous research. A log-mel energy spectrogram narrates the sound signal image. Then the sound signal image is inputted into CNN's deep learning to classify the human voice and noise. HiVAD outperformed the percentage of other VAD methods, namely G729B, Sohn, and RF from the test results shown with an average SHR accuracy of 15.89%, 28.98%, 42.13% at 0dB, 8.67%, 16.29% ,17.63% at 5 dB, and 1.35%, 7.72%, 5.14% at 10 dB. In addition, the Multi-threading mechanism enables efficient computing for real-time. This study shows that CNN's architecture on HiVAD significantly improves the accuracy of sound activity detection.Keywords: VAD App, voice detection, deep learning, CNN
Cyber Pandemic – The New Cybersecurity Risks Sukenda, Sukenda; Zulpratita, Ulil Surtia; Muttaqin, Helmy Faisal; Wahyu, Ari Purno; Yustim, Benny
Brilliance: Research of Artificial Intelligence Vol. 4 No. 2 (2024): Brilliance: Research of Artificial Intelligence, Article Research November 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i2.4759

Abstract

We are amidst a digital pandemic. In 2020, COVID-19 sped up a change towards remote working and the product being utilized for these assaults has become more straightforward to execute, ransom ware assaults have risen quickly and keep on speeding up in 2021. The COVID-19 pandemic has changed both the actual world and the computerized space, where organizations and associations are being gone up against with overwhelming online protection challenges for which not many were prepared or prepared to confront. Attributable to the extreme change in working conditions, cyber attacks and information extortion presently rank third among the best worries of business pioneers, as detailed in the World Economic Forum's COVID-19 Risks Outlook. The likelihood of malignant digital movement is considerably more upsetting thinking about that 53% of organizations have never pressure tried their systems. The key focus point from these and a large group of other alarming probabilities is that readiness for any kind of digital emergency whatsoever levels of an association is critical. Top administration, network protection trained professionals and each representative should know how to treat an emergency hit. Cyber security centers around securing information, yet it is presently not adequate; organizations need cyber resilience.
Prediksi Keindahan Wajah dengan Menggunakan Attribute Aware Convolutional Neural Network (AACNN) Surtia Zulpratita, Ulil
Ranah Research : Journal of Multidisciplinary Research and Development Vol. 6 No. 5 (2024): Ranah Research : Journal Of Multidisciplinary Research and Development (Juli 20
Publisher : Dinasti Research

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.38035/rrj.v6i5.998

Abstract

The perception of beauty whether applied to a face or any similar subject, differs among people, with assorted values doled out to magnificence levels or positions. Facial beauty assessment has gained significant interest in various domains, including cosmetics, image processing, and artificial intelligence. This review digs into facial beauty prediction utilizing the Attribute Aware Convolutional Neural Network (AACNN) according to the SCUT-FBP5500 benchmark dataset. The study in this paper closes by accentuating the requirement for more comprehensive and adjusted datasets and proposes future exploration bearings to improve model decency and address moral ramifications.
Cyber Pandemic – The New Cybersecurity Risks Sukenda, Sukenda; Zulpratita, Ulil Surtia; Muttaqin, Helmy Faisal; Wahyu, Ari Purno; Yustim, Benny
Brilliance: Research of Artificial Intelligence Vol. 4 No. 2 (2024): Brilliance: Research of Artificial Intelligence, Article Research November 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i2.4759

Abstract

We are amidst a digital pandemic. In 2020, COVID-19 sped up a change towards remote working and the product being utilized for these assaults has become more straightforward to execute, ransom ware assaults have risen quickly and keep on speeding up in 2021. The COVID-19 pandemic has changed both the actual world and the computerized space, where organizations and associations are being gone up against with overwhelming online protection challenges for which not many were prepared or prepared to confront. Attributable to the extreme change in working conditions, cyber attacks and information extortion presently rank third among the best worries of business pioneers, as detailed in the World Economic Forum's COVID-19 Risks Outlook. The likelihood of malignant digital movement is considerably more upsetting thinking about that 53% of organizations have never pressure tried their systems. The key focus point from these and a large group of other alarming probabilities is that readiness for any kind of digital emergency whatsoever levels of an association is critical. Top administration, network protection trained professionals and each representative should know how to treat an emergency hit. Cyber security centers around securing information, yet it is presently not adequate; organizations need cyber resilience.