cover
Contact Name
Pauladie Susanto
Contact Email
pauladie@stikom.edu
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota surabaya,
Jawa timur
INDONESIA
Journal JCONES
Published by STMIK STIKOM Surabaya
ISSN : 23390204     EISSN : -     DOI : -
Core Subject : Education,
Journal of Control and Network Systems (JCONES) adalah jurnal elektronik yang diterbitkan dan dikelola oleh Program Studi Sistem Komputer Institut Bisnis dan Informatika Stikom Surabaya. JCONES merupakan jurnal untuk publikasi hasil penelitian para peneliti di bidang teknologi kontrol otomasi industri dan sistem komunikasi jaringan.
Arjuna Subject : -
Articles 162 Documents
APLIKASI PENGENALAN WAJAH PADA MOBILE ROBOT OMNIDIRECTIONAL MENGGUNAKAN METODE PRINCIPAL COMPONENT ANALYSIS (PCA) Pradhana, Galang Putra; Harianto, Harianto; Wibowo, Madha Christian
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Self indentification applications have been used in variety cases. Recently in indonesia it was used for e-KTP applications, by taking the characteristics of each person such as fingerprints, signature, retina, and photo of faces. But the applications database have not been optimally used, because those data was just stored offhand.One of data used in e-KTP, photo face could be used as reference in the applications of self indentification. Recognition faces can also reduce cost, as it only requires webcam. The face recognition applications can be used to finding person by combine this applications with mobile robots. The method used for face recognition are various, there are several criteria that distinguish it by way of the method of identifying face such as: geometric / template based, appearance-based, hybrid appearance based, and models based. Principal component analysis is one of method that was based on appearance criteria. PCA will extract only the important features of data to be used in recognition proses. The product of PCA is eigenface.This eigenfaces from the training process will be stored to database. Euclidean distance will be used to finding the most similar sample with the detected face to recognize it. The mobile robot could detect face and extract the eigenface, then mobile robot would matching it with the database stored in computer to recognize the face. This method could recognize all the tested face rightly in 80-1300 lux(light intensity metering). If the intensity too dark or too bright the recognition process should fail. Thus the difference of the intensity of training and recognition process couldn’t be higher than 1000 lux. Keyword: e-KTP, principal component analysis, mobile robot omnidirectional.
ANALISIS PERBANDINGAN UNJUK KERJA PROTOKOL UDP DENGAN DCCP MENGGUNAKAN TRAFIK DATA MULTIMEDIA Adinata, Feri Setiawan; Jusak, Jusak; Sukmaaji, Anjik
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid development of network technology has created a multimedia application enters the world of internet. Skype, Yahoo Messenger, Facebook and Line are some examples of applications that provides multimedia features such as free call (VoIP) and video call (video conference) in it. Most of these applications typically use UDP instead of TCP as the transport protocol. The increased of UDP traffic has threaten TCP traffic that appears issues of fairness between the two protocols.In 2006 the IETF introduced a new protocol called Datagram Congestion Control Protocol (DCCP) CCID2 and CCID3. In fact its almost 8 years was introduced to the public, such applications are not using DCCP instead of UDP. So the question of performance, fairness and the Quality of Service level arises for multimedia data services between UDP and DCCP.Based on the results of testing against the Protocol UDP and DCCP, it is found that the average bandwidth utilization between UDP and CCID2 are respectively, 62.15% and 36.54%, the packet loss 1.12% and 10.08%, both of the delay 627 ms, both of the jitter 141 ms and both of the fairness 0.923. Furthermore, the average bandwidth utilization between UDP and CCID3 reaches 63% and 29.79%, the packet loss 0.5% and 0.92%, the delay 148ms and 283ms, the jitter 46ms and 79ms and both of the fairness 0.874. In summary, it can be concluded that the DCCP CCID2 has better performance and more suitable for VoIP/Video Conferencing instead of using the DCCP CCID3.
RANCANG BANGUN ALAT PENDETEKSI GAS CO, CO2, DAN SO2 SEBAGAI INFORMASI PENCEMARAN UDARA Islam, Jilly Haikal; Harianto, Harianto; Wibowo, Madha Christian
Journal of Control and Network Systems Vol 2, No 1 (2013)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Air pollution is a condition in which the air quality to be damaged and contaminated by substances, both of which are harmless and which endanger the health of the human body. Air pollution usually occurs in big cities as well as dense regions that produce industrial gases containing substances above the acceptable limit. The gases are the main air pollutants are carbon dioxide gas (CO2), carbon monoxide (CO), and sulfur dioxide (SO2). Development of gas detection sensor technology which is currently growing at a rapid pace to provide solutions to overcome the above problems, in this study made ??a tool to detect gases CO, CO2 and SO2 as air pollution information. This tool can detect the gas content of the air per second so that the gas content of the data obtained and then sent to a computer via wireless communication using the XBee-Pro and saved for later can be processed as air pollution information.
RANCANG BANGUN APLIKASI INTRUSSION DETECTION SYSTEM DENGAN MENGGUNAKAN METODE FUZZY Nugroho, Indra Wahyu; Harianto, Harianto; Mardiana, I Dewa Gede Rai
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

As the development of networking technology, also emerging security isues such as Denial Of Service Attack (DoS). DoS is an attack used by hackers to shut down the computer system server so that the server can not provide service to the user. The first step to anticipate the variety of unwanted packets is to implement application intrussion Detection System (IDS) into a router.                 IDS application can be made by using the fuzzy method in which there are 3 stages of attack classification process that is establish  variable membership functions, establish fuzzy rules and defuzzyfication. The first stage starts from storing data length and frequency into a fuzzy database table, furthermore search for alpha value of each rule and the last stage is to find the defuzzyfication value. From this value can be used to classify attacking level such as normal, low,medium and high.                 Result from this project IDS application can identify DoS attack which use some technic such as ICMP flooding, TCP flooding, UDP flooding and normal ICMP but still can not identify and classify syn-ack attack because syn-ack length packet have small value. IDS application also can not identify HTTP packet as  a normal packet because http length packet value as same as TCP flooding length packet value. IDS log displayed as Web based so that can simplify user for analyzing attack paket.
Karakterisasi profil serangan pada jaringan dengan melakukan pemodelan terhadap lalu lintas data Andinata, Phompi; Jusak, Jusak; Kusumawati, Weny Indah
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

: Network security became one of principal subtance in the world of information technology that alway experiencing developments. The rate of internet crime or cyber crime tended to increase as offered by publicist Kominfo Gatot S Dewa Broto throughout the year of 2012 in indonesia recorded an average of 1.25 million times per day. Genearlly hackers using a bias attack pattern know as DdoS (Distributed Denial of Service). The occurence of a DdoS attack is generally be preceded by pre-attack using media traffic data network. This step is to find security gaps bu using several techniques like port scanning ACK Scan, FIN Scan, SYN Scan or Scan tool by using a Port Scanner.To understand the statistical characteristics and pattern of some ACK Scan attacks, FIN Scan, SYN Scan and Port Scanner, in this project we do analysing and modeling of multiple attack in LAN and WAN networksResult of the analysis showed that the normal data traffic and data traffic that contains ACK Scan, FIN Scan, SYN Scan and Port Scanner in two netwok model (A) and (B) is lognormal with a comparison of Mean Square Error and the smallest value test of Anderson Darling compared to Gamma distribution and Weibull distribution
RANCANG BANGUN ROBOT PEMADAM API MENGGUNAKAN PENGOLAHAN CITRA DAN FLAME SENSOR Kusuma, Robert Dwijoyo; Harianto, Harianto; Wibowo, Madha Christian
Journal of Control and Network Systems Vol 2, No 1 (2013)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Fire accident is a disaster which freekly many people. This accident often happen because environtment problems or human error. This disaster was take hundred soul or more when happen. Police Departement has a note that disaster which happen in Jakarta as Operasi Ketupat Jaya 2012 has increase 50% than Operasi Ketupat in 2011. To anticipate this disasster many people has done a reasearch for robot which can extinguish fire without human in process, so the human accident when extinguish fire can be reduced. As a solution to solve a matter above writer make a flame extinguisher robot with a differents concept. This Robot have a ability to detect fire indoor with webcam integrated in robot body. This webcam have a function to recognize fire object with image processing. This robot integrated with flame sensors for detect the temperature from the flames. Sensor will have output as a voltage when interact with flames. After that actuator as fire extinguisher will terminate that flames.
RANCANG BANGUN ABSENSI MAHASISWA MENGGUNAKAN RFID DENGAN KOMUNIKASI TERPUSAT Fatoni, Mochammad; Harianto, Harianto; Wibowo, Madha Christian
Journal of Control and Network Systems Vol 2, No 1 (2013)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Attendance is routine before doing activities such as education in scholls and universities. Time recording attendance sheet when entered to start the activity until the end of the activity. At this time attendance system which is still frequently used manually by using the hand as a tool. In this case made attendance system automatically uses RFID tags as identification cards and RFID reader as the reader of the card. The RFID reader is connected to the microcontroller so that tag can be prossed into a data serial number of students (NIM). The microcontroller used is ATMEGA 1284 P-PU because have 2 serial pieces. This system uses 2 serial contained in the RFID Stater Kit module and WIZ110SR module. Communication of RFID Stater Kit module with microcontroller using a serial after the data is forwarded to the server PC so that the serial communication trough WIZ110SR module. Data from the microcontroller then sent to the server PC to be compared with a database that has been created. This data contains the serial number of students (NIM) and information delays. After the data is compared then the data will be returned to the microcontroller is then displayed on the LCD.
Pengontrol Kualitas Air Tambak Menggunakan Metode Fuzzy Logic untuk Budidaya Udang Windu Poerwanto, Edy; Rasmana, Susijanto Tri; Wibowo, Madha Christian
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Some fish farmers have done a shrimp pond water circulation and turning water wheel, so as to keep the pond water conditions. Fish farmer’s waterwheel turned on at all times, while for the water pump turned on when they found floating shrimp. This method would impact on growth shrimp can be detrimental to the shrimp. So monitoring and controlling the conditions of pond water pond water is continuously required to maintain water quality monitoring and process control pond. This system uses sensors temperature and pH as inputs the system, whereas for the actuator system using water mill, tap lime, and water pump. By using the pH sensor and temperature monitoring and process control an advanced water quality better. Actuators waterwheel, tap lime, and water pumps can alter water quality becomes better. By using tap lime and water pump changes the normal acid pH 7.2 6.65 can be reached within 14 minutes. While the use of the water wheel can change the temperature of 39 ° C to 32 ° C in less than 16 minutes. Thus this system can facilitate farmers to anticipate significant changes in water quality, so that the fish farmers will get maximum results at harvest time.
PEMODELAN KARAKTERISITIK DENIAL OF SERVICE ATTACK MELALUI ANALISIS DATA TRAFIK Wijaya, Octavianus; Jusak, Jusak; Sukmaaji, Anjik
Journal of Control and Network Systems Vol 3, No 1 (2014)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

DoS is one example of attacks that can disrupt the infrastructure of computer networks, this type of attack has a typical pattern, where in each attack will send a number of data packets continuously to attack the target. DoS Attack consists of UDP, PING and SYN Flood Attack. This study aims to get a mean, relative frequency, parameter values, the probability distribution, plot the data and the value of MSE. Subsequently analyzed using statistical methods, and modeling to estimate the parameters in the form of a probability distribution. The probability distribution is composed of a gamma distribution, lognormal distribution and weibull distribution. By using this model, it can be shown that the DoS Attack characteristic of UDP Attack and SYN Flood Attack are much closer to the lognormal distribution than Gamma the distribution or Weibull distribution. On the other hand, the distribution of the PING flood attack resembles the gamma distribution.
PERBAIKAN KUALITAS CITRA SINAR X TULANG BELAKANG PENDERITA SKOLIOSIS DENGAN MENGGUNAKAN GAUSSIAN CROPPING Sugianto, Samuel; Rasmana, Susijanto Tri; Wibowo, Madha Christian
Journal of Control and Network Systems Vol 2, No 1 (2013)
Publisher : Journal of Control and Network Systems

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper  is to perform image enhancement to the spinal x-ray image of people with scoliosis, so that the segmentation process can be done better. Image filtered with Modified Tophat filter were cropped using a vertical windowed Gaussian function with manually initialized center of peak points trough the spinal feature, thus the pixels on the both side of the center of peak points will gradually decrease, leaving only the spinal part. By using this Gaussian cropping, the success rate in segmentation process would increase.

Page 3 of 17 | Total Record : 162