cover
Contact Name
Risanuri Hidayat
Contact Email
risanuri@ugm.ac.id
Phone
+62274-552305
Journal Mail Official
jnteti@ugm.ac.id
Editorial Address
Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada Jl. Grafika No 2. Kampus UGM Yogyakarta 55281
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
Jurnal Nasional Teknik Elektro dan Teknologi Informasi
ISSN : 23014156     EISSN : 24605719     DOI : 10.22146/jnteti
Topics cover the fields of (but not limited to): 1. Information Technology: Software Engineering, Knowledge and Data Mining, Multimedia Technologies, Mobile Computing, Parallel/Distributed Computing, Artificial Intelligence, Computer Graphics, Virtual Reality 2. Power Systems: Power Generation, Power Distribution, Power Conversion, Protection Systems, Electrical Material 3. Signals, Systems, and Electronics: Digital Signal Processing Algorithm, Robotic Systems and Image Processing, Biomedical Instrumentation, Microelectronics, Instrumentation and Control 4. Communication Systems: Management and Protocol Network, Telecommunication Systems, Wireless Communications, Optoelectronics, Fuzzy Sensor and Network
Articles 644 Documents
Tanda tangan Digital Menggunakan Algoritme Keccak dan RSA Rezania Agramanisti Azdy
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1498.935 KB)

Abstract

Just like conventional signatures, digital signatures can be used to prove the authenticity of a document in digital form. In addition, digital signatures can also be used to prove the validity of the author of the document, so that the author of the document can not deny that he had made the document. Digital signature is done by applying two cryptographic algorithms sequentially. The first algorithm is to impose hash function on a real document to produce message digest, and the second one is to impose a public key algorithm to the digest form. Keccak hash function is an algorithm that has been set as SHA-3 in a competition held by NIST and can be used to determine if a document has been modified or not. RSA is a public key algorithm which ensures the safety in the form of authentication and non-repudiation, so it is suitable with the actual purpose of digital signature. This paper implements the Keccak and RSA algorithm on digital signature as well as comparing it with the use of MD5. The test results of the implementation of both algorithms show that the establishment of digital signature on a whole process requires a relatively short time, and it is able to achieve the goals of digital signatures to guarantee the security in the aspects of integrity, authentication and non-repudiation.
Pencarian Aturan Asosiasi Semantic Web Untuk Obat Tradisional Indonesia Ridowati Gunawan; Khabib Mustofa
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1201.113 KB)

Abstract

Indonesia has more than 2000 types of plants that can be used for medicine. Indonesian traditional medicine called jamu utilizes various of medicinal plants. Since each medicinal plant has different efficacy, jamu also has different efficacy. Jamu can be used to cure certain type of diseases. Jamu that has same efficacy can be produced by many different companies and has different composition. In order to bring benefit for the consumer, knowledge about efficacy of medicinal plants, efficacy of jamu, and composition of jamu is needed. One way to gain knowledge about jamu, along with the entire composition, is to utilize association rule mining technique. If in general the technique only utilizes a single database, in this paper the data source is obtained from semantic web. The data in semantic web is stored in the form of RDF or OWL according to ontology jamu. Data in the form of RDF/OWL is converted into transaction data using library rrdf of R, and its results will be processed using Apriori, which is one of the algorithms in association rule. Results of Apriori algorithm produce association rules on the composition of the jamu along with the value of the support, confidence, and lift ratio. These results indicate the value of lift ratio > 1 which means medicinal plants depend on each other.
Kombinasi Waktu Sinkronisasi dan Nilai Salt untuk Peningkatan Keamanan pada Single Sign-On Rizal Munadi; Zuhar Musliyana; Teuku Yuliar Arif; Afdhal; Syahrial
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1026.358 KB)

Abstract

Single sign-on (SSO) is a session authentication process that allows a user to login by using user registered identity and password in order to access appropriate applications. The authentication process takes the user in to login for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session. Its implementation will provide a reduction of password burden to access many applications for every login process. Ease of access through a single account needs to be addressed carefully to ensure the authentication credentials that are not scattered and known by others. Currently, there are several open source SSO authentication methods available. However, the use of existing authentication methods is still vulnerable to attack, such as Man-In-The-Middle. In this study, SSO authentication algorithm using One-Time Password (OTP) is proposed using a combination of time synchronization and salt value. These combinations are used to verify user session while accessing any application with SSO mechanism. The results show that the proposed OTP algorithm can handle SSO authentication process in good fashion and also protect from Man-In-The-Middle Attack.
Aplikasi Augmented Reality pada Sistem Informasi Smart Building Zahir Zainuddin; Intan Sari Areni; Raden Wirawan
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1207.25 KB)

Abstract

The aim of this research in this paper is to develop smart building information application using augmented reality in android mobile gadget. A case study is implemented in STMIK Handayani Makassar. The system is able to show the room condition, temperature, and humidity with marker based tracking. Performance evaluation is done with marker testing, with distance, angle, and blocked marker surface area as parameters. The result shows that the best distance between the gadget and marker is 10 cm - 50 cm with mobile angle 00 – 300 and coveraged surface area 10% - 70%. Specifications of the device are 1 GB RAM, 5 MP Camera, Android 4.4 OS, and Quad core 1 GHz Processor.
Penyandi Persepsi Isyarat Audio Berdasar pada Model Modulasi Frekuensi (FM) Bondhan Winduratna
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2098.122 KB)

Abstract

Data compression or source coding has been playing an important role in many areas in daily life. There are several audio encoders available with various methods. Each audio encoder works at a certain range bitrate depending on the signal model used and the method implemented. Based on literature reviews it is to know that there are only a view of audio encoder working at bit rate below 16 kbit/s, especially for music signals.The togetherness in having harmonically components between the audio signals and frequency modulated signals is the basic idea of proposing the perceptual encoder based on FM signal model. In estimating and extracting FM parameters, the psychoacoustic model is used to exploit the perceptual nature of humans ears. The errors of FM modeling is distributed below the masking curve of psychoacoustic model. The developed encoder allows sending music signals on the GSM channel.The developed encoder has four cascaded main processes, namely sinusoid components extraction, harmonic components separation, FM parameters estimation, and FM parameter encoding. The simulation results show the proposed method is successful to encode some audio signal types.
Optimasi Gerakan Heliks untuk Meningkatkan Performa Algoritme Alga pada Desain Pressure Vessel Hari Santoso; Muhammad Aziz Muslim; Agus Naba
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (888.819 KB)

Abstract

Artificial Algae Algorithm (AAA) is an optimization algorithm that takes advantage of the swarm and evolutionary models. AAA consists of three phases, which are helical movement, reproduction, and adaptation. Helical movement is a three-dimensional motion which is highly influential in the convergence rate and diversity of solutions. Optimization of helical movement aims to increase the rate of convergence by moving the algae to the best colony in the population. Best colony in population is the closest to the best light source (the target solution), so that the movement is called Best Light Movement (BLM). AAA with movement toward the best light source (AAA-BLM) is tested and implemented in the case of pressure vessel design optimization. The test results indicate that the execution time of AAA-BLM increases 1,103 times faster than AAA. The increase in speed is caused by the tournament selection of AAA which is performed before the helical movement, while the AAA-BLM is conducted if a solution after the movement is not better than previous one. In the best condition, AAA-BLM finds a solution 4,5921 times faster than AAA. In the worst condition, AAA-BLM get stuck in local optima due to helical movement is too focused on the global best which may not be the global optima.
Sistem Penghindar Tabrakan Frontal Berbasis Logika Fuzzy Noor Cholis Basjaruddin; Kuspriyanto; Didin Saefudin; Ganda Putra
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1153.069 KB)

Abstract

About 10% of collisions resulting in death is due to frontal collision. Head-on Collision Avoidance System (HCAS) is a device that can prevent a frontal collision by means of braking or evasive. Two ultrasonic sensors are used to monitor the vehicles in front and to the right. Two distances are observed by sensors, then become input for decision making system based on fuzzy logic. This decision-making system output is the vehicle forward, stop, or evasive movement. Simulation result using a remote control car proves that the decision making system designed with fuzzy logic can work with a success rate of over 90%.
Pengenalan Karakter Tulisan Tangan Jawi Menggunakan Metode New Relative Context dan SVM Rizal Fikri; Fitri Arnia; Rusdha Muharar
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1237.171 KB)

Abstract

Dot is an important attribute in character recognition. Similarly in Jawi characters, a dot becomes a special characteristic that distinguish different characters with the same basic shape. Most of feature extraction methods only recognize the characters based on their basic shape and ignore the dots, such as Relative Context (RC). RC classifies characters with the same basic shape into a group. Therefore, the result recognition of RC is not individual characters, but the name of group character. To identify individual character, a new method for RC enhancement is introduced. The method is called New Relative Context (NRC). NRC works by separating characters into some areas. The wider area is defined as the basic shape, while other areas are defined as dot attribute. In this paper Support Vector Machine (SVM) is used to classify eleven sets of isolated Jawi characters. Eight sets of character images are used in the training phase, while in the testing phase three sets of images are used. The recognition rate of this method achieves 80%.
Pembangkitan Decoupled Residual untuk Isolasi Kesalahan Aktuator Pesawat Terbang Bergerak Lateral Samiadji Herdjunanto
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 3: Agustus 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (817.02 KB)

Abstract

Implementation of time scheduled maintenance is not suitable if it is applied for systems with many varieties of heavy workload and harsh environment, since on that condition components degrade earlier than those under normal condition. Therefore, it has been shifted to condition-based maintenance (CBM). One important aspect, among others, toward successfull implementation of CBM method is fault isolation. The problem to be investigated is related to generate decoupled residual for actuator fault isolation of an aircraft on lateral movement. The proposed solution for that problem is to implement combination of transformation matrix and special filter. Transformation matrix is used to convert feature locations of actuator faults to signature vectors. Moreover, the signature vectors will be processed further by the special filter to generate decoupled residuals. It is assumed that the actuator is the only fault when the aircraft is on lateral movement. The results show that special filter and transformation matrix can be designed so that the residual of aileron actuator fault is decoupled from the residual of rudder actuator fault.
Kehandalan Software Berdasarkan Data Sekunder Menggunakan Distribusi Poisson dan Kualifikasi Cronbach’s Alpha Bambang Pudjoatmodjo; Mokhamad Hendayun
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 5 No 2: Mei 2016
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (738.933 KB)

Abstract

In the last 17 years, the usage of computer software, such as operating system software and application software, (after the appearance of Windows 95) have increased rapidly. This is shown by the increasing number of choices for user to use the software to facilitate their work, such as word processing software, digital image processing, and financial application. A software must have a good reliability. It means the software can work according to the needs of the user. In addition, the software can perform fast recovery when subjected to disruption caused by mistakes made by users of the application. Therefore, we need a method for determining the software reliability. The assessment is based on the observation of failures occur in a certain interval range. Based on the observation we will determine the specific characteristics of data that will be used to select the probability distribution to determine the value of reliability. The type of data is secondary data (discrete). This aims to conduct a preliminary assessment before they are applied in real cases. The determination of reliability is used to draw conclusions on observations. Cronbach's Alpha scale is used to see how well the conclusions are drawn.