Jurnal Nasional Teknik Elektro dan Teknologi Informasi
Topics cover the fields of (but not limited to): 1. Information Technology: Software Engineering, Knowledge and Data Mining, Multimedia Technologies, Mobile Computing, Parallel/Distributed Computing, Artificial Intelligence, Computer Graphics, Virtual Reality 2. Power Systems: Power Generation, Power Distribution, Power Conversion, Protection Systems, Electrical Material 3. Signals, Systems, and Electronics: Digital Signal Processing Algorithm, Robotic Systems and Image Processing, Biomedical Instrumentation, Microelectronics, Instrumentation and Control 4. Communication Systems: Management and Protocol Network, Telecommunication Systems, Wireless Communications, Optoelectronics, Fuzzy Sensor and Network
Articles
15 Documents
Search results for
, issue
"Vol 5 No 3: Agustus 2016"
:
15 Documents
clear
Sistem Presensi Dosen Menggunakan IMEI dan GPS Smartphone dengan Data Terenkripsi
Adriana Fanggidae;
Yulianto Triwahyuadi Polly
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1197.216 KB)
The improvement of education quality is determined not only by student's attendance but also lecturer's attendance in class. In this paper, control system of lecturer's attendance has been developed. This system requires two types of users, which are administrator and lecturer. The administrator is responsible for data analysis and report. The lecturer confirms his/her attendance using smartphone by utilising IMEI (International Mobile Equipment Identity) and GPS (Global Positioning System). The security of the data flow in this attendance system is built using the stream cipher algorithm with three key randomization methods: odd parity Hamming code, tent map and session keys. Research finds that this contol system of lecturer's attendance is secure because of the following reasons. First, it has been built using three-tier architecture. Second, there is a security check from software system. And lastly data flow is encrypted with low correlation between plaintext and ciphertext. Furthermore, the sytem is reliable because when internet and/or GPS is lost, data between client and server is kept and is delivered once there is internet and/or GPS connection. Report of lecturer's attendance from this system is reliable and hence it is recommended to be used for lecturers' attendance report.
Perancangan Sistem Mobile Bulletin untuk Implementasi Smart Poster NFC dengan Tokenisasi Salt
Audy;
Marcel Bonar Kristanda;
Seng Hansun
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1192.848 KB)
Bulletin board is a medium for sharing information in Multimedia Nusantara University. However, feasibility study showed that bulletin board is not effective to be used as a medium for information dissemination in UMN. Apart from the user side, the development of UMN campus building also become an obstacle in using traditional bulletin board. NFC technology is a type of short-range wireless technology, which widely been used in developed countries in everyday life. One concrete manifestation of NFC technology implementation is Smart Poster. Therefore, based on feasibility study that had been done, the design of Mobile Bulletin system for implementing Smart Poster with NFC technology and Salt Tokenization method is made. This paper has succeeded to make the design of the overall system architecture and user interaction overview. The proposed architecture design shows that this system can solve conventional bulletin board problem, both for students and administrators.
Pengelompokan Data Menggunakan Pattern Reduction Enhanced Ant Colony Optimization dan Kernel Clustering
Dwi Taufik Hidayat;
Chastine Fatichah;
R.V. Hari Ginardi
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (758.98 KB)
One method of optimization that can be used for clustering is Ant Colony Optimization (ACO). This method is good in data clustering, but has disadvantage in terms of time and quality or solution convergence. In this study, ACO-based Pattern Reduction Enhanced Ant Colony Optimization (PREACO) method with a gaussian kernel function is proposed. First, it sets up initial solution. Second, the magnitude of pheromone is calculated to find the centroid randomly. With the initialized solution, the weight of the solution is calculated and the center of cluster is revised. The solution will be evaluated through a gaussian kernel functions. Function 'pattern enhanced reduction' is useful to ensure maximum value of pheromone update. Those steps will be conducted repeatedly until the best solution is chosen. Tests are performed on multiple datasets, with three test scenarios. The first test is carried out to get the right combination of parameters. Second, the error rate measurement and similarity data using Sum of Squared Errors is done. Third, level of accuracy of the methods ACO, ACO with the kernel, PREACO, and PREACO with the kernel is compared. The test results show that the proposed method has a higher accuracy rate of 99.8% for synthetic data, 93.8% for wine data than other methods. But it has a lower accuracy by 88.7% compared to the ACO.
Enkripsi Aturan Dinamis pada Aplikasi Pembayaran Gerak
Emir Husni;
Danang Triantoro Murdiansyah
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (971.478 KB)
The trend of financial transactions using mobile phone or mobile payment is increasing. Using the mobile payment service, user can save money on the mobile phone and separate the money from prepaid bills. In order to protect the user, provider must equip the mobile payment service with transaction security, such as secure mobile payment application. This paper offers a safety feature which is used for mobile payment application based on Android operating system. A new method, Dynamic Rule Encryption (DRE), is created. In DRE, the encryption is ruled dynamically. By encrypting data with dynamic rules, DRE can protect the data. DRE also has a function as a token for authentication. DRE Token is generated using dynamic time-based rules. The time reference used in DRE is based on the order of the day in the year (day of the year). Performance measurement in this research is based on the Hamming distance. The test results show that the system performs quite good. The average distance among outputs is about 258 bits of 512 bits input. The results also show that the DRE program’s execution time is quite fast, i.e. not more than 24 ms.
Modifikasi Metode Timestamped Change Data Capture pada RDBMS (Relational Database Management System)
Hendra Suprayogi;
Harry Soekotjo Dachlan;
Muhammad Aswin
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1134.325 KB)
A normalization process must be applied in the data structure in database designing process in RDBMS, in order to eliminate data anomaly and redundancy. This procedure increases access performance as well as reduces unnecessary storage space. It transforms a single entity into multiple entities, normalization process is often so-called decomposition. A problem occurs, however, after a normalized database is being implemented. When a new data recorded there is nothing wrong with its retrieval, while the retrieval process goes into the last data updated in the case of updating activity. Moreover, when a deletion occurred, the data can never be retrieved. Timestamped CDC method offers a way of tracking data change. Basically, timestamped CDC uses historical record to include timestamp everytime change occurs. Tracking updated record is simply done by the previous research of timestamped CDC, while keeping track on deleted data is impossible since the data vanished within the deletion process. This paper modifies the timestamped CDC method so that data deletion tracking can be achieved as well as data updating. Furthermore, this research also makes several testing procedures to find out performance of the modified timestamped CDC structures.
Pengembangan Engine Integrasi Tabel HTML pada Halaman Web
Memen Akbar;
Fazat Nur Azizah;
G. A. Putri Saptawati
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (881.385 KB)
Two problems are arisen while integrating number of tables from number of web pages, i.e. structural conflict and semantic conflict. To tackle those problems, the proposed study combines some existing methods that are already proven to solve problems in integrating process. The proposed integration process of HTML table consists of 4 phases: (1) locating the table in web pages, (2) separating attributes and data values, (3) integrating the table scheme, (4) migrating the data values into integrated scheme. Table location in web page is determined using heuristic approach. This approach also can separate the attributes and the data values of the table. Semantic conflict that is apparent while integrating the table scheme is handled using domain specific ontology. The resulted data value, then, is migrated to table scheme in line with duplication data checking using vector space model. Result of the integration is presented as single HTML table. This approach is implemented as an engine that is coded using Phyton language. Result of experiment shows that the proposed approach can be used to integrate number of HTML table from number of web pages into a single integrated table.
Tanda tangan Digital Menggunakan Algoritme Keccak dan RSA
Rezania Agramanisti Azdy
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1498.935 KB)
Just like conventional signatures, digital signatures can be used to prove the authenticity of a document in digital form. In addition, digital signatures can also be used to prove the validity of the author of the document, so that the author of the document can not deny that he had made the document. Digital signature is done by applying two cryptographic algorithms sequentially. The first algorithm is to impose hash function on a real document to produce message digest, and the second one is to impose a public key algorithm to the digest form. Keccak hash function is an algorithm that has been set as SHA-3 in a competition held by NIST and can be used to determine if a document has been modified or not. RSA is a public key algorithm which ensures the safety in the form of authentication and non-repudiation, so it is suitable with the actual purpose of digital signature. This paper implements the Keccak and RSA algorithm on digital signature as well as comparing it with the use of MD5. The test results of the implementation of both algorithms show that the establishment of digital signature on a whole process requires a relatively short time, and it is able to achieve the goals of digital signatures to guarantee the security in the aspects of integrity, authentication and non-repudiation.
Pencarian Aturan Asosiasi Semantic Web Untuk Obat Tradisional Indonesia
Ridowati Gunawan;
Khabib Mustofa
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1201.113 KB)
Indonesia has more than 2000 types of plants that can be used for medicine. Indonesian traditional medicine called jamu utilizes various of medicinal plants. Since each medicinal plant has different efficacy, jamu also has different efficacy. Jamu can be used to cure certain type of diseases. Jamu that has same efficacy can be produced by many different companies and has different composition. In order to bring benefit for the consumer, knowledge about efficacy of medicinal plants, efficacy of jamu, and composition of jamu is needed. One way to gain knowledge about jamu, along with the entire composition, is to utilize association rule mining technique. If in general the technique only utilizes a single database, in this paper the data source is obtained from semantic web. The data in semantic web is stored in the form of RDF or OWL according to ontology jamu. Data in the form of RDF/OWL is converted into transaction data using library rrdf of R, and its results will be processed using Apriori, which is one of the algorithms in association rule. Results of Apriori algorithm produce association rules on the composition of the jamu along with the value of the support, confidence, and lift ratio. These results indicate the value of lift ratio > 1 which means medicinal plants depend on each other.
Kombinasi Waktu Sinkronisasi dan Nilai Salt untuk Peningkatan Keamanan pada Single Sign-On
Rizal Munadi;
Zuhar Musliyana;
Teuku Yuliar Arif;
Afdhal;
Syahrial
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1026.358 KB)
Single sign-on (SSO) is a session authentication process that allows a user to login by using user registered identity and password in order to access appropriate applications. The authentication process takes the user in to login for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session. Its implementation will provide a reduction of password burden to access many applications for every login process. Ease of access through a single account needs to be addressed carefully to ensure the authentication credentials that are not scattered and known by others. Currently, there are several open source SSO authentication methods available. However, the use of existing authentication methods is still vulnerable to attack, such as Man-In-The-Middle. In this study, SSO authentication algorithm using One-Time Password (OTP) is proposed using a combination of time synchronization and salt value. These combinations are used to verify user session while accessing any application with SSO mechanism. The results show that the proposed OTP algorithm can handle SSO authentication process in good fashion and also protect from Man-In-The-Middle Attack.
Aplikasi Augmented Reality pada Sistem Informasi Smart Building
Zahir Zainuddin;
Intan Sari Areni;
Raden Wirawan
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1207.25 KB)
The aim of this research in this paper is to develop smart building information application using augmented reality in android mobile gadget. A case study is implemented in STMIK Handayani Makassar. The system is able to show the room condition, temperature, and humidity with marker based tracking. Performance evaluation is done with marker testing, with distance, angle, and blocked marker surface area as parameters. The result shows that the best distance between the gadget and marker is 10 cm - 50 cm with mobile angle 00 – 300 and coveraged surface area 10% - 70%. Specifications of the device are 1 GB RAM, 5 MP Camera, Android 4.4 OS, and Quad core 1 GHz Processor.