cover
Contact Name
Pauladie Susanto
Contact Email
pauladie@stikom.edu
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota surabaya,
Jawa timur
INDONESIA
Journal JCONES
Published by STMIK STIKOM Surabaya
ISSN : 23390204     EISSN : -     DOI : -
Core Subject : Education,
Journal of Control and Network Systems (JCONES) adalah jurnal elektronik yang diterbitkan dan dikelola oleh Program Studi Sistem Komputer Institut Bisnis dan Informatika Stikom Surabaya. JCONES merupakan jurnal untuk publikasi hasil penelitian para peneliti di bidang teknologi kontrol otomasi industri dan sistem komunikasi jaringan.
Arjuna Subject : -
Articles 15 Documents
Search results for , issue " Vol 3, No 1 (2014)" : 15 Documents clear
APLIKASI PENGENALAN WAJAH PADA MOBILE ROBOT OMNIDIRECTIONAL MENGGUNAKAN METODE PRINCIPAL COMPONENT ANALYSIS (PCA) Pradhana, Galang Putra; Harianto, Harianto; Wibowo, Madha Christian
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Self indentification applications have been used in variety cases. Recently in indonesia it was used for e-KTP applications, by taking the characteristics of each person such as fingerprints, signature, retina, and photo of faces. But the applications database have not been optimally used, because those data was just stored offhand.One of data used in e-KTP, photo face could be used as reference in the applications of self indentification. Recognition faces can also reduce cost, as it only requires webcam. The face recognition applications can be used to finding person by combine this applications with mobile robots. The method used for face recognition are various, there are several criteria that distinguish it by way of the method of identifying face such as: geometric / template based, appearance-based, hybrid appearance based, and models based. Principal component analysis is one of method that was based on appearance criteria. PCA will extract only the important features of data to be used in recognition proses. The product of PCA is eigenface.This eigenfaces from the training process will be stored to database. Euclidean distance will be used to finding the most similar sample with the detected face to recognize it. The mobile robot could detect face and extract the eigenface, then mobile robot would matching it with the database stored in computer to recognize the face. This method could recognize all the tested face rightly in 80-1300 lux(light intensity metering). If the intensity too dark or too bright the recognition process should fail. Thus the difference of the intensity of training and recognition process couldn’t be higher than 1000 lux. Keyword: e-KTP, principal component analysis, mobile robot omnidirectional.
ANALISIS PERBANDINGAN UNJUK KERJA PROTOKOL UDP DENGAN DCCP MENGGUNAKAN TRAFIK DATA MULTIMEDIA Adinata, Feri Setiawan; Jusak, Jusak; Sukmaaji, Anjik
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid development of network technology has created a multimedia application enters the world of internet. Skype, Yahoo Messenger, Facebook and Line are some examples of applications that provides multimedia features such as free call (VoIP) and video call (video conference) in it. Most of these applications typically use UDP instead of TCP as the transport protocol. The increased of UDP traffic has threaten TCP traffic that appears issues of fairness between the two protocols.In 2006 the IETF introduced a new protocol called Datagram Congestion Control Protocol (DCCP) CCID2 and CCID3. In fact its almost 8 years was introduced to the public, such applications are not using DCCP instead of UDP. So the question of performance, fairness and the Quality of Service level arises for multimedia data services between UDP and DCCP.Based on the results of testing against the Protocol UDP and DCCP, it is found that the average bandwidth utilization between UDP and CCID2 are respectively, 62.15% and 36.54%, the packet loss 1.12% and 10.08%, both of the delay 627 ms, both of the jitter 141 ms and both of the fairness 0.923. Furthermore, the average bandwidth utilization between UDP and CCID3 reaches 63% and 29.79%, the packet loss 0.5% and 0.92%, the delay 148ms and 283ms, the jitter 46ms and 79ms and both of the fairness 0.874. In summary, it can be concluded that the DCCP CCID2 has better performance and more suitable for VoIP/Video Conferencing instead of using the DCCP CCID3.
RANCANG BANGUN APLIKASI INTRUSSION DETECTION SYSTEM DENGAN MENGGUNAKAN METODE FUZZY Nugroho, Indra Wahyu; Harianto, Harianto; Mardiana, I Dewa Gede Rai
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

As the development of networking technology, also emerging security isues such as Denial Of Service Attack (DoS). DoS is an attack used by hackers to shut down the computer system server so that the server can not provide service to the user. The first step to anticipate the variety of unwanted packets is to implement application intrussion Detection System (IDS) into a router.                 IDS application can be made by using the fuzzy method in which there are 3 stages of attack classification process that is establish  variable membership functions, establish fuzzy rules and defuzzyfication. The first stage starts from storing data length and frequency into a fuzzy database table, furthermore search for alpha value of each rule and the last stage is to find the defuzzyfication value. From this value can be used to classify attacking level such as normal, low,medium and high.                 Result from this project IDS application can identify DoS attack which use some technic such as ICMP flooding, TCP flooding, UDP flooding and normal ICMP but still can not identify and classify syn-ack attack because syn-ack length packet have small value. IDS application also can not identify HTTP packet as  a normal packet because http length packet value as same as TCP flooding length packet value. IDS log displayed as Web based so that can simplify user for analyzing attack paket.
Karakterisasi profil serangan pada jaringan dengan melakukan pemodelan terhadap lalu lintas data Andinata, Phompi; Jusak, Jusak; Kusumawati, Weny Indah
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

: Network security became one of principal subtance in the world of information technology that alway experiencing developments. The rate of internet crime or cyber crime tended to increase as offered by publicist Kominfo Gatot S Dewa Broto throughout the year of 2012 in indonesia recorded an average of 1.25 million times per day. Genearlly hackers using a bias attack pattern know as DdoS (Distributed Denial of Service). The occurence of a DdoS attack is generally be preceded by pre-attack using media traffic data network. This step is to find security gaps bu using several techniques like port scanning ACK Scan, FIN Scan, SYN Scan or Scan tool by using a Port Scanner.To understand the statistical characteristics and pattern of some ACK Scan attacks, FIN Scan, SYN Scan and Port Scanner, in this project we do analysing and modeling of multiple attack in LAN and WAN networksResult of the analysis showed that the normal data traffic and data traffic that contains ACK Scan, FIN Scan, SYN Scan and Port Scanner in two netwok model (A) and (B) is lognormal with a comparison of Mean Square Error and the smallest value test of Anderson Darling compared to Gamma distribution and Weibull distribution
Pengontrol Kualitas Air Tambak Menggunakan Metode Fuzzy Logic untuk Budidaya Udang Windu Poerwanto, Edy; Rasmana, Susijanto Tri; Wibowo, Madha Christian
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Some fish farmers have done a shrimp pond water circulation and turning water wheel, so as to keep the pond water conditions. Fish farmer’s waterwheel turned on at all times, while for the water pump turned on when they found floating shrimp. This method would impact on growth shrimp can be detrimental to the shrimp. So monitoring and controlling the conditions of pond water pond water is continuously required to maintain water quality monitoring and process control pond. This system uses sensors temperature and pH as inputs the system, whereas for the actuator system using water mill, tap lime, and water pump. By using the pH sensor and temperature monitoring and process control an advanced water quality better. Actuators waterwheel, tap lime, and water pumps can alter water quality becomes better. By using tap lime and water pump changes the normal acid pH 7.2 6.65 can be reached within 14 minutes. While the use of the water wheel can change the temperature of 39 ° C to 32 ° C in less than 16 minutes. Thus this system can facilitate farmers to anticipate significant changes in water quality, so that the fish farmers will get maximum results at harvest time.
PEMODELAN KARAKTERISITIK DENIAL OF SERVICE ATTACK MELALUI ANALISIS DATA TRAFIK Wijaya, Octavianus; Jusak, Jusak; Sukmaaji, Anjik
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

DoS is one example of attacks that can disrupt the infrastructure of computer networks, this type of attack has a typical pattern, where in each attack will send a number of data packets continuously to attack the target. DoS Attack consists of UDP, PING and SYN Flood Attack. This study aims to get a mean, relative frequency, parameter values, the probability distribution, plot the data and the value of MSE. Subsequently analyzed using statistical methods, and modeling to estimate the parameters in the form of a probability distribution. The probability distribution is composed of a gamma distribution, lognormal distribution and weibull distribution. By using this model, it can be shown that the DoS Attack characteristic of UDP Attack and SYN Flood Attack are much closer to the lognormal distribution than Gamma the distribution or Weibull distribution. On the other hand, the distribution of the PING flood attack resembles the gamma distribution.
ANALISIS KARAKTERISTIK LALU LINTAS DATA INTERNET: APLIKASI WEB VIDEO STREAMING Jusak, Jusak; Susanto, Pauladie
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Along with the development of technology, the need for information is increasing, which is not only in the form of text and picture information are needed but also involves all aspects of multimedia available, for example is video streaming technology. So analysis of QoS for data traffic on web applications video streaming like youtube is need to be done. QoS is the ability to guarantee the provision of resources (resource) and service differentiation in various types of applications which is one of the characteristics Internet data traffic. To determine the quality of web video streaming applications, QoS analysis must be done. delay, jitter, packet loss, and bandwidth utilization is the one of the parameter needed for QoS analysis. This analysis is expected to help network administrators in terms of network design for better future.
Segmentasi Citra Tulang Belakang Menggunakan Charged Particle Model Mujahidin, Alif Aziz; Rasmana, Susijanto Tri; Wibowo, Madha Christian; Wirakusuma, Sandy
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Scoliosis is a spinal abnormalities that bends to S shape or C shape. The proper treatment can make better healing of scoliosis patient. Currently, diagnosis of spinal curvature is using a manual process performed by orthopedic, thus resulting an error in the measurement. To resolve this issue, used segmentation method that using image processing technology. segmentation method is using Charged Particle Model (CPM) which able to perform segmentation properly.
ANALISIS PERANGKAT TRANSMISI UNTUK WIRELESS ENERGY TRANSFER Mahardika, Ngurah Tegar; Dinata, Yuwono Marta; Rasmana, Susijanto Tri
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Wireless technology atau teknologi nirkabel, atau lebih sering disingkat wireless adalah teknologi elektronika yang beroperasi tanpa kabel. Wireless technology telah dikenal dapat dimanfaatkan untuk komunikasi maupun pengontrolan. Saat ini, teknologi nirkabel juga dapat diterapkan pada proses perpindahan daya atau disebut juga wireless energy transfer.Wireless energy transfer memiliki beberapa macam mekanisme, salah satunya adalah inductive resonant coupling. Teknologi ini bekerja dengan menggunakan efek kopling resonansi antara dua gulungan sirkuit LC. Inductive resonant coupling mampu mentransmisikan energi melalui media magnetic field atau dalam beberapa teori lainnya dikenal dengan fluks yang dihasilkan oleh arus listrik.Inductive resonant coupling mampu menghasilkan nilai daya keluaran hingga 0.021 watt dengan jarak 3 cm dan daya input 0.440 watt. Teknologi ini mampu mencapai tingkat efisiensi sebesar 6.73% pada jarak 3 cm. Sedangkan tingkat efektivitasnya mencapai 0.07 yang berarti daya keluaran lebih kecil 14 kali dibandingkan daya input. Keyword : Wireless Energy Transfer, Inductive Resonant Coupling, Transmisi Daya Listrik.
RANCANG BANGUN MONITOR SUHU GAS METANA DAN KARBON DIOKSIDA PADA BIOGAS Pradigdya, Christian Andrean; Harianto, Harianto; Puspasari, Ira
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper obtain temperature effect on the level of methane and carbon dioxide in the biogas. For that purpose the author created a monitoring system. The monitoring system built from microcontroller as the main controller of sensors. In order to be complete the monitoring system, a logging data system must be created to provide a reliable data. To obtain temperature effect all data will be analized by certain application.

Page 1 of 2 | Total Record : 15