cover
Contact Name
Risanuri Hidayat
Contact Email
risanuri@ugm.ac.id
Phone
+62274-552305
Journal Mail Official
jnteti@ugm.ac.id
Editorial Address
Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada Jl. Grafika No 2. Kampus UGM Yogyakarta 55281
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
Jurnal Nasional Teknik Elektro dan Teknologi Informasi
ISSN : 23014156     EISSN : 24605719     DOI : 10.22146/jnteti
Topics cover the fields of (but not limited to): 1. Information Technology: Software Engineering, Knowledge and Data Mining, Multimedia Technologies, Mobile Computing, Parallel/Distributed Computing, Artificial Intelligence, Computer Graphics, Virtual Reality 2. Power Systems: Power Generation, Power Distribution, Power Conversion, Protection Systems, Electrical Material 3. Signals, Systems, and Electronics: Digital Signal Processing Algorithm, Robotic Systems and Image Processing, Biomedical Instrumentation, Microelectronics, Instrumentation and Control 4. Communication Systems: Management and Protocol Network, Telecommunication Systems, Wireless Communications, Optoelectronics, Fuzzy Sensor and Network
Articles 10 Documents
Search results for , issue "Vol 13 No 1: Februari 2024" : 10 Documents clear
Implementasi Sistem Keamanan Presensi Berbasis Kode QR Menggunakan Algoritma RSA dan Hash Arif Indra Irawan; Iman Hedi Santoso; Istikmal; Maya Rahayu
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 13 No 1: Februari 2024
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jnteti.v13i1.4395

Abstract

The quick response (QR) code-based attendance application contributes to reducing paper usage and attendance input errors. However, in its implementation process, the QR-code-based attendance at a Bandung school demonstrates weaknesses. Absent students can fake their attendance for themselves or friends. This type of attack is known as fake QR code generation. This research proposes a security authentication system using the Rivest–Shamir–Adleman (RSA) encryption algorithm and the secure hash algorithm 1 (SHA-1) to secure QR code-based attendance applications from fake QR code generation attacks. The RSA algorithm encrypts QR code data to maintain privacy, while the SHA-1 algorithm ensures data integrity. Based on this method, the mutual authentication process between the QR code data generated by the student and the attendance reading application by the teacher can be established. The results obtained from a series of tests showed that the security system in the student attendance recording application that had been implemented at Madrasah Aliyah (MA) Al-Mukhlishin could detect and prevent fake QR code generation attacks. The test was conducted by changing the impact of the key length on RSA-1024 bits and RSA-2048 bits. The results showed that in RSA-1024 bits, energy consumption of 0.14 J and time of 1.66 s is more efficient than that in RSA-2048 bits, with energy consumption of 0.19 J and time of 2.09 s. Interestingly, if a higher level of security is required, the key length should be increased at the expense of some energy and time efficiency.
Studi Penerapan Power Wheeling Pembangkit Fotovoltaik Dengan Metode MW-km Muhammad Bhayu Bramantyo; Sasongko Pramonohadi; Sarjiya
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 13 No 1: Februari 2024
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jnteti.v13i1.6332

Abstract

Efforts to mitigate carbon emissions within the electricity sector involve the implementation of environmentally sustainable renewable energy sources. Photovoltaic (PV) generation, functioning as a distributed generation (DG), represents a current trend in renewable energy installations. A distributed generation (DG) is situated near the load within distribution networks. When applied, a PV-DG influences the magnitude of power losses within existing electrical networks, subsequently impacting associated energy loss expenses. Additionally, adequate land availability is required for the PV-DG installation. The cooperation between PV-DG power providers and load partners is conducted remotely, resulting in distribution challenges. The construction of distribution lines by business actors to evacuate their electricity production is almost impossible. Distribution network rental emerges as an interesting solution, i.e., through a distribution network collaborative utilization scheme or power wheeling. This study seeks to examine the implementation of power wheeling of PV generation within the IEEE 33-bus distribution network system, by finding the location of the bus placement of the PV wheeling generation that results in the smallest total energy loss cost and distribution network rental cost. The MW-km method served as the basis for calculating network rental expenses. Moreover, this study incorporated the land availability associated with each bus. Findings indicate that positioning the PV wheeling generation at bus 8 yielded minimal total annual energy loss and distribution network rental costs. It indicates that the placement of a wheeling PV generation in arbitrary places does not necessarily result in the smallest total energy loss costs and distribution network rental costs.
Modulasi Single-Phase Shift Untuk Konverter DAB Pada Simulasi Typhoon HIL Yohan Fajar Sidik; F. Danang Wijaya; Roni Irnawan; Muhammad Ridwan; Kevin Gausultan; Sriyono
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 13 No 1: Februari 2024
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jnteti.v13i1.6876

Abstract

Solid-state transformer (SST) could be a solution for a future distribution system, in which many renewable energy sources (RES) are integrated. The SST consists of a single-phase dual-active bridge (DAB) converter, which is scale-down the dc voltage level. The control objective of the DAB converter used in the SST is to control its output voltage. This control strategy consists of a proportional-integral (PI) controller and a single-phase shift (SPS) modulation. Numerous literatures have mentioned about the SPS modulation for the DAB converter. However, they do not provide procedures in implementing the SPS modulation in the real controller. This paper aims to develop the SPS modulation in the real controller of the STM32F446RE microcontroller. The proposed SPS modulation is based on a master-slave timer feature, which is available in the STM32 microcontroller. The development process and testing of the complete control strategy of the DAB converter were carried out in the hardware-in-the-loop (HIL) simulation using Typhoon HIL. This scheme speeds up the development of process and reduces the costs. The experiment in the HIL environment shows that proposed control strategy of the DAB converter consisting of the PI controller and the SPS modulation is successfully implemented in the real microcontroller of the STM32F446RE. The proposed control strategy of the DAB converter is capable of bidirectional power flow, which is useful for integrating distributed generators in the load side. Moreover, this control strategy can reject the disturbance caused by loads.
Identifikasi Atlet Anggar Berdasarkan Pengukuran Antropometri Menggunakan MediaPipe Pose Bagas Alif Fimaskoro; Suci Aulia; Dery Rimasa
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 13 No 1: Februari 2024
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jnteti.v13i1.8145

Abstract

Over time, numerous developments in digital technology have benefited people, including anthropometric measurements that provide information on an athlete’s ability in sports. The use of digital technology in sports must continue, particularly in the National Sports Committee of Indonesia (Komite Olahraga Nasional Indonesia, KONI) of Bandung City. This study proposed a technique for classifying and identifying fencing athletes’ talents. This work developed a methodology for evaluating sports talent based on anthropometric measurements of athletes’ bodies using the posture detection approach. Fencing and nonfencing athletes in KONI Bandung City were categorized using this talent identification. This study used 36 datasets of body posture images from various skills of the sport. These images were in JPEG or JPG format with a resolution of 3,024 × 4,032 and were acquired using a Canon EOS 1300D camera. This study utilized four points landmarks, which are usually used as measurement components in KONI, to categorize fencing athletes. The four points are shoulder (S), elbow (E), index (I), and hip (H) landmarks. The testing was done using three different dataset settings. According to the test results of all scenarios, scenario 2 had the highest accuracy. This scenario was able to categorize fencing and nonfencing athletes with an accuracy rate of 89% and an average processing time of less than 3 s per image.
Studi dan Analisis Hyperparameter Tuning IndoBERT Dalam Pendeteksian Berita Palsu Anugerah Simanjuntak; Rosni Lumbantoruan; Kartika Sianipar; Rut Gultom; Mario Simaremare; Samuel Situmeang; Erwin Panggabean
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 13 No 1: Februari 2024
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jnteti.v13i1.8532

Abstract

The rapid advancement of communication technology has transformed how information is shared, but it has also brought concerns about the proliferation of false information. A recent report by the Ministry of Communication and Informatics in Indonesia revealed that around 800,000 websites were involved in spreading false information, underscoring the seriousness of the problem. To combat this issue, researchers have focused on developing techniques to detect and combat fake news. This research centers on using IndoBERT-base-p1 for fake news detection and aims to enhance its performance through three methods to tune the hyperparameter value of the model namely: Bayesian optimization, grid search, and random search. After comparing the outcomes of the three hyperparameter tuning methods, Bayesian Optimization emerged as the most effective approach. Achieving a precision of 88.79%, recall of 94.5%, and F1-score of 91.56% for the “fake” label, Bayesian Optimization outperformed the other hyperparameter tuning methods as well as the model using the fine-tuning hyperparameter value. These findings emphasize the importance of hyperparameter tuning in improving the accuracy of fake news detection models. Utilizing Bayesian Optimization and optimizing the specified hyperparameters, the model demonstrated superior performance in accurately identifying instances of fake news, providing a valuable tool in the ongoing battle against disinformation in the digital realm.
Pemantauan dan Pengendalian Parameter Greenhouse Berbasis IoT Dengan Protokol MQTT Eni Dwi Wardihani; Eka Ulia Sari; Helmy; Ari Sriyanto Nugroho; Yusnan Badruzzaman; Arif Nursyahid; Thomas Agung Setyawan; Media Fitri Isma Nugraha
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 13 No 1: Februari 2024
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jnteti.v13i1.8564

Abstract

Modernization in the agricultural sector is expected to have an effect on improving the quality, production quantity, and continuity of the agricultural product supply. Currently, many smart agricultures are developed in greenhouses. However, several greenhouse parameters must be considered to optimize plant growth. This study has created a monitoring and control system for several Internet of things (IoT)-based greenhouse parameters, allowing farmers to monitor and control the greenhouse anytime and anywhere. It can also improve the work efficiency of farmers in monitoring and controlling, especially if there are multiple greenhouses to be monitored or controlled. The greenhouse monitoring data may be viewed in real time and stored on servers, making it easier for farmers to evaluate greenhouses and crops. The monitored parameters were greenhouse temperature, greenhouse humidity, and light intensity in the greenhouse, while the controlled parameters were greenhouse temperature and greenhouse humidity, using exhaust fans. The process of transmitting the greenhouse parameter monitoring and controlling data was carried out using the message queue telemetry transport (MQTT) protocol. Data loss and delay testing on the system was required to determine the reliability of the tool in the process of transmitting and receiving data. The quality of service (QoS) testing results was as follows: average data loss gateway-server monitoring was 10.6%, the average gateway-server monitoring delay was 1.9 s, and the average server-gateway control delay was 7.1 s. When the greenhouse temperature parameter value is less than the specified maximum threshold, the system turns on the drum fan so that the temperature reaches the minimum value at the threshold limit.
Citra Tekstur Terbaik Untuk Gaussian Naïve Bayes Dengan Interpolasi Nearest Neighbor Irwan Budi Santoso; Shoffin Nahwa Utama; Supriyono
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 13 No 1: Februari 2024
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jnteti.v13i1.8730

Abstract

One of the factors affecting the performance of the Gaussian naïve Bayes classifier (GNBC) in texture image classification is the image size (dimensions). Image size is one of the best texture image criteria besides its pixel value. In this study, a method is proposed to obtain the size of the best texture image for GNBC by nearest neighbor (NN) interpolation optimization. The best texture image size with interpolated pixel values makes GNBC able to distinguish texture images in each class with the highest performance. The first step of the proposed method was to determine the texture image size for training through a combination of row and column sizes in the optimization process. The next important step in generating the new texture images was resizing each of the original texture images using NN interpolation. The next step was to build GNBC based on the new image from interpolation and determine the classification accuracy. The last step was to select the best texture image size based on the largest classification accuracy value as the first criterion and image size as the second criterion. The evaluation of the proposed method was carried out using texture image data from the CVonline public dataset involving several test scenarios and interpolation methods. The test result shows that in scenarios involving five classes of texture images, GNBC with NN interpolation gives the smallest classification accuracy value of 89% and the largest 100% at the best image size, 14 × 32 and 47 × 42, respectively. In scenarios involving small to large class numbers, GNBC with NN interpolation provides classification accuracy of 81.6%–95%. From these results, GNBC with NN optimization gives better results than other nonadaptive interpolation methods (bilinear, bicubic, and Lanczos) and principal component analysis (PCA).
Penerapan Computation Offloading Pada Sistem Deteksi Pelanggaran Perlintasan Sebidang Berbasis Komputasi Tepi Rian Putra Pratama; Suhono Harso Supangkat
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 13 No 1: Februari 2024
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jnteti.v13i1.8795

Abstract

Level crossings remain a problem in several cities due to high violations. Currently, surveillance at level crossings is still performed conventionally. Since problems at level crossings are increasingly complex and conventional solutions are no longer effective, an intelligent video surveillance system is necessary. Intelligent video surveillance system implementation is a complex task and requires devices with extensive computing resources. This research aims to optimize the system for processing data in real-time by conducting computation near the data source and dividing computing tasks across several edge devices. This research proposes a solution in the form of an edge computing-based intelligent video surveillance system with a computation offloading method on limited devices. This research has two development stages. The initial stage involved developing an object detection model using a dataset of level crossings in Bandung City. The second stage was developing an edge computing-based system by applying the computation offloading method on limited computing devices. The edge computing method extends cloud computing to the network’s edge, enabling calculations near the data source. Conversely, the computation offloading method improves edge computing performance by dividing computing tasks. Results showed an increase in computing speed of around 1.5 times faster, with a violation detection accuracy rate reaching 89.4%. Additionally, GPU temperature decreased by 5.50 °C, GPU usage decreased by 44.05%, memory usage decreased by 301 Mb, and power consumption decreased by 2.28 W. The system developed is effective and efficient in optimizing the performance of the violation detection system in level crossings on limited computing devices.
Implementasi Deteksi Penggunaan Masker Menggunakan SVM dan Haar Cascade Pada OpenCV Hustinawaty; Muhammad Farell
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 13 No 1: Februari 2024
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jnteti.v13i1.9292

Abstract

Despite a decline in global COVID-19 cases, the persisting threat of SARS-CoV-2 coupled with waning public awareness of the virus threat has raised concerns. A notable number of individuals disregard mask usage or do so incorrectly. It is particularly concerning given that COVID-19 has high transmissibility, especially in crowded areas like shopping centers. Enforcement officers often face challenges in identifying those wearing masks improperly. Herein lies the significance of automated mask detection to aid enforcement officers in containing the spread of the virus. Hence, this paper aims to highlight the importance of automated mask detection in combatting COVID-19 transmission. Previous mask detection algorithms were intricate because they relied heavily on resource-intensive machine learning algorithms and libraries. These algorithms, however, failed to address the problem of incorrect mask usage adequately. Therefore, despite the apparent usage of masks, the virus managed to find transmission pathways. In contrast, this research focuses on creating algorithms that pinpoint improper mask usage and optimize resource utilization without compromising detection quality. The Haar cascade algorithm was utilized to detect faces and the support vector machine (SVM) was used to train the dataset. The model attained an average accuracy of 95.8%, precision of 99.7%, recall of 92.3%, and F1-score of 93.7%. The metrics aligned with prior studies, affirming their reliability. Nevertheless, limitations exist as the model faces challenges in detecting obscured facial features, requiring further research to enhance its detection capabilities. This research contributes to ongoing efforts to improve mask detection technology for more effective virus containment.
Sistem Berbasis Komputasi Kabut Untuk Sistem Parkir Pintar Terdesentralisasi Menggunakan Firebase Haposan Yoga Pradika Napitupulu; I Gde Dharma Nugraha
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 13 No 1: Februari 2024
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jnteti.v13i1.10095

Abstract

The growth of vehicle number is unavoidable whilst the availability of parking is not directly proportional with this condition. Nowadays, many shopping centers do not have sufficient parking spot, causing customers to have difficulty in finding available parking spots. Research has been conducted to tackle the issue of finding available parking spots. Much of this research proposed the narrowband-Internet of things (NB-IoT) as a fog node. For communication purposes, this NB-IoT-based fog node has some shortcomings, such as security and privacy, lower data rate, higher cost in development, dependency with wireless system, and only covers one area. In this research, the fog computing was proposed to decentralize smart parking system by using Firebase to cover several areas or malls in one system and interface. Instead of using NB-IoT, this research employed decentralized local server as a fog node to deliver a fast data exchange. Firestore database (Firebase) was also used to secure, manage, and analyze the data in the cloud. Conjunctively, the Android application was created as a user interface to book and find the availability of parking spots. The Android application was built using Android Studio and implemented authentication to keep the data access secure and private. The testing scenario was done following the design unified modeling language (UML). The research results confirmed that the fog computing system successfully supported the decentralized smart parking system and was able to be implemented for covering several areas or malls in one system.

Page 1 of 1 | Total Record : 10