cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika (JITEKI)
ISSN : 23383070     EISSN : 23383062     DOI : -
JITEKI (Jurnal Ilmiah Teknik Elektro Komputer dan Informatika) is a peer-reviewed, scientific journal published by Universitas Ahmad Dahlan (UAD) in collaboration with Institute of Advanced Engineering and Science (IAES). The aim of this journal scope is 1) Control and Automation, 2) Electrical (power), 3) Signal Processing, 4) Computing and Informatics, generally or on specific issues, etc.
Arjuna Subject : -
Articles 16 Documents
Search results for , issue "Vol 8, No 2 (2022): June" : 16 Documents clear
Valuation of 5G mmWave Fixed Wireless Access in Residence Area: Analysis of Real Option for Wireless Broadband Service in Kota Wisata Cibubur Using Decision Tree and Black Scholes Model May Hendra Panjaitan; Catur Apriono
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 8, No 2 (2022): June
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v8i2.23626

Abstract

Fixed Wireless Access (FWA) is one of the popular use cases in 5G, expected to replace conventional internet service. However, investing in a telecommunications project requires massive capital, so careful planning is usually required. In general, investments are valued by the standard Net Present Value (NPV) method. When the NPV is positive, the project is profitable. However, the NPV possibly will not be as expected due to uncertainty in the future. One of these is the number of subscribers. This research proposes using Real Option (RO) to analyze the FWA project with an uncertainty of the number of subscribers and compare it to the standard NPV method. From the result of the research, the standard NPV method produces a positive Expected NPV of $153,176. However, there is a 33% possibility that the NPV will be -$406,246. By using the decision tree in RO to evaluate the project, the managers have an option to delay the project from one to three years and eliminate negative NPV resulting in the Expected NPV of $250,038, $216,842, and $188,371. Using Black Scholes Model to delay the project from one to three years also results in a higher Expected NPV of $220,668, $209,593, and $219,428.
Application-based Simulation on the Digital Trunking Radio Communication System to Predict the Area Coverage Arief Goeritno; Nesia Andriana; Indriya Indriya; Ika Setyawibawa; Dwi Suhartono
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 8, No 2 (2022): June
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v8i2.23635

Abstract

A radio communication system (RCS) based on digital trunking of the digital mobile radio (DMR) type of Tier-III with any of the brands is installed, consisting of mobile radio devices, portable radio devices, repeater devices, devices antenna, and power supply device. The technical specifications for these types of equipment have been approved by institution-owned. This paper describes a radio communication system infrastructure based on a digital trunking RCS for predicting the area coverage for independent or private use. The research contributions of this study include (a) predicting the signal of area coverage of the repeater and radio devices and (b) observing results of communication performance on the DMR Tier-III Trunking radio communication system. Research methods for achieving research objectives, including five main parameters are required connectivity, the DMR application for predicting radio signal area coverage of the repeater system, and observation of the communication performance. Tuning on the repeater system include five conditions, while on radio equipment includes four conditions. Prediction and observation of the coverage area based on seven parameters as input. The simulation results are in the form of a screenshot with an area coverage of 140.938 kilometers. The observation of communication performance through dummy loads in the form of providing types of artificial condition calls. In general, after the research objectives are obtained, it is expected that the system is well connected.
Analysis of Combination Algorithms for Denoising and Contrast Enhancement Images Irpan Adiputra Pardosi; Hernawati Gohzali
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 8, No 2 (2022): June
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v8i2.22216

Abstract

Reducing noise and increasing image contrast is part of the purpose of enhancing image quality; instead, it will impact change the diversity of information in the image based on the Shannon entropy value. Decrease quality caused by noise salt and pepper in this research or abnormal contrast in the image causes objects in the image to become unclear. Low contrast has a major impact on image quality, including noise reduction processes affecting image information so that the quality of the reduced image becomes something to consider for large noise. Iterative Denoising and Backward Projections with CNN (IDBP-CNN) and Different Applied Median Filter (DAMF) is a good solution for denoising a large percentage of noise with good quality results image. In other research for contrast enhancement, Triangular Fuzzy Membership-Contrast Limited Adaptive Histogram Equalization (TFM-CLAHE) and Adaptive Fuzzy Contrast Enhancement Algorithm with Details Preserving (AFCEDP) is claimed to a good solution to solve low contrast of the image. Therefore, this study is to find the best combination of denoising and contrast enhancement to get good image results with step denoising followed by contrast enhancement. Based on the experimental testing is got the best combination is the DAMF + AFCEDP algorithm with an average of PSNR 35dB and an average difference Shannon entropy of 0.0130.
Production Stock Monitoring System at PT Yamaha Indonesia Using the Scrum Method Rizkina Maulida Safira; Chanifah Indah Ratnasari
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 8, No 2 (2022): June
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v8i2.23638

Abstract

Digital transformation brings changes to the industrial sector to become Industry 4.0. PT Yamaha Indonesia is a piano-manufacturing company that also uses technology to help monitor the production of piano parts. Production stock monitoring is carried out in order to meet the company's production targets. As a result, the company's stock can meet customer demand, keeping inventory costs to a minimum. Furthermore, it has the potential to optimize operational production time. Previously, the production monitoring procedure was done manually. Recordings are made every few hours or so to keep track of the data. Due to the manual recording of each step of the piano's part-making process, productivity and the ability to perform other tasks are slowed down. To address these issues, PT Yamaha Indonesia, through this research, developed a production stock monitoring system. This system was built using the Scrum method and implements data visualization using chart.js to facilitate monitoring. The research contribution is analyzing user needs until the production stock monitoring system is built so that monitoring the manufacturing process can be simplified and more efficient, and it can be done in real-time.
Comparison of IDW and Kriging Interpolation Methods Using Geoelectric Data to Determine the Depth of the Aquifer in Semarang, Indonesia Brilliananta Radix Dewana; Sri Yulianto Joko Prasetyo; Kristoko Dwi Hartomo
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 8, No 2 (2022): June
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v8i2.23260

Abstract

Several areas in Semarang City have been unable to get a clean water supply through the Local Water Company (PDAM) channel. One of the solutions that can be done to overcome this problem is by utilizing groundwater, which can be obtained by building a deep well made to obtain rock layers that can accommodate and drain groundwater (aquifer layer). To find out the approximate depth of the aquifer layer, it is necessary to conduct a preliminary investigation before drilling. There are so many methods that can be done, and one of them is by using the geoelectric method. After using the geoelectric method, we can determine the distribution of the depth of the aquifer in Semarang City by using interpolation analysis. In this study, the IDW and Kriging interpolation methods were used. The two methods were then compared to show the difference in the distribution of aquifer depths in areas that lack clean water using the two interpolation methods above. Besides that, we are using RMSE and MAPE analysis to find the error rate of the two methods. The results obtained were the RMSE of the IDW and Kriging methods amounting to 5,829 and 5,433, and the MAPE results were 10.90% and 10.34%. Based on this, the Kriging method tends to have better results when interpolating using geoelectric data. With this research, it is hoped to provide knowledge to determine the most suitable interpolation method used in determining the depth of the aquifer and also can be used as an illustration of the depth of the aquifer in the area that lacked clean water in Semarang City, so that it can be used as a reference in estimating the design of deep good development more accurately.
K-Means Segmentation Based-on Lab Color Space for Embryo Detection in Incubated Egg Shoffan Saifullah; Rafal Drezewski; Alin Khaliduzzaman; Lean Karlo Tolentino; Rabbimov Ilyos
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 8, No 2 (2022): June
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v8i2.23724

Abstract

The quality of the hatching process influences the success of the hatch rate besides the inherent egg factors. Eliminating infertile or dead eggs and monitoring embryonic growth are very important factors in efficient hatchery practices. This process aims to sort eggs that only have embryos to remain in the incubator until the end of the hatching process. This process aims to sort eggs with embryos to remain hatched until the end. Maximum checking is done the first week in the hatching period. This study aims to detect the presence of embryos in eggs. Detection of the existence of embryos is processed using segmentation. Egg images are segmented using the K-means algorithm based on Lab color images. The results of the image acquisition are converted into Lab color space images. The results of Lab color space images are processed using K-means for each color. The K-means process uses cluster k=3, where this cluster divides the image into three parts: background, eggs, and yolk. Egg yolks are part of eggs that have embryonic characteristics. This study applies the concept of color in the initial segmentation and grayscale in the final stages. The initial phase results show that the image segmentation results using k-means clustering based on Lab color space provide a grouping of three parts. At the grayscale image processing stage, the results of color image segmentation are processed with grayscaling, image enhancement, and morphology. Thus, it seems clear that the yolk segmented shows the presence of egg embryos. Based on this process and results, the initial stages of the embryo detection process used K-means segmentation based on Lab color space. The evaluation uses MSE and MSSIM, with values of 0.0486 and 0.9979; this can be used as a reference that the results obtained can detect embryos in egg yolk. This protocol could be used in a non-destructive quantitative study on embryos and their morphology in a precision poultry production system in the future.
Modeling and Analysis of Percentage Depth Dose (PDD) and Dose Profile of X-Ray Beam Produced by Linac Device with Voltage Variation Bilalodin Bilalodin; Farzand Abdullatif
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 8, No 2 (2022): June
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v8i2.23622

Abstract

The Percentage Depth Dose (PDD) and dose profile of X-Ray output from a LINAC therapy device have been modeled and analyzed. The research was conducted by simulation method through the use of Particle and Heavy Ion Transport code System (PHITS) program. The LINAC therapy device modeled in this work refers to the Siemens Primus LINAC therapy device, which is operated at 6 MV, 10 MV and 18 MV voltages. Determination of PDD was carried at a depth of 0-30 cm and dose profile at a depth of 0-20 cm in a water phantom, placed at 100 cm from the source, which is exposed to a radiation field area of 10×10 cm2. Results from the modeling of the LINAC therapy device agrees with the actual X-ray apparatus and has produced Bremsstrahlung X-ray. It was found from the analysis of the PDD curve that the maximum doses are at the depth of 1.5 cm, 2.5 cm and 3.4 cm. The value of build up factor for each LINAC voltage agrees with the reference. Additionally,  the results of the analysis of the doses profile suggest that the X-ray output has good degree of uniformity. The flatness of dose profile occurs at the depth of 20 cm with percentage value of flatness at 1.6 %, 1.9 % and 1.2 %. The flatness values are all less than 2%. The flatness values shows ≤ 2 % deviation from reference value, which is below the tolerance range required in a measurement.
Tuberculosis Detection in X-Ray Image Using Deep Learning Approach with VGG-16 Architecture Suci Aulia; Sugondo Hadiyoso
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 8, No 2 (2022): June
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v8i2.23994

Abstract

Tuberculosis (TB) is a chronic disease still the main problem in Indonesia. However, this disease can be cured with drugs at a particular time after the patient is detected as having TB. TB diagnosis or screening can be made through x-ray imaging of the chest cavity by a radiology specialist. The Mantoux test can then be used to confirm the diagnosis.  X-ray images often have varying contrasts that lead to true negatives or false negatives. Whereas generally, a chest x-ray is the initial examination of TB. Error detection will have a fatal impact on treatment therapy. Therefore, this study proposed a system for TB detection based on x-ray images using deep learning. The system developed uses a Convolutional Neural Network (CNN) with the VGG-16 architecture. In the performance test stage, 700 normal and 140 TB chest x-ray images were used. The simulation results show that the proposed system can classify normal and TB lungs with an accuracy of 99.76%. The highest accuracy is achieved using batch size=50. This system is expected to assist radiology in detecting tuberculosis on X-Ray images of the lungs. The contribution of this study is to build a machine learning model for TB detection and optimization of model parameters to get the best accuracy.
UDP Pervasive Protocol Design and Implementation on Multi Devices using MyRIO Mochammad Hannats Hanafi Ichsan; Rizal Maulana; Octavian Metta Wisnu Wardhana
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 8, No 2 (2022): June
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v8i2.23835

Abstract

Pervasive Computing is one of the practical computing applications to facilitate computer operations by minimizing human interaction with computers. Pervasive Computing has been developed using UDP protocol to recognize the other devices without manual configuration. NI MyRIO device is one of the most reliable devices for the prototyping process. However, there are still not many implementations of data transmission using specific protocols. And the direction of use for smart homes or smart environments is still not widely done. This research contribution implemented Pervasive UDP protocols on PC devices and two NI MyRIO using LabVIEW programming language. UDP protocols are used because they do not require a handshake to recognize another device to reduce delays and have smaller data sizes due to the absence of recognition fields and sequence fields. Each device uses a dual-state machine system design that has a function to detect other devices automatically and act as an application to use the address of another device. PC represents the host, and MyRIO represents the client. Using the same state machine to detect all devices can recognize more than one device on the same network. The obtained test results show that all functional testing scenarios succeeded 100%. The discovery time is averaged at 0.202754 seconds for First MyRIO as First Client and 0.303201 seconds for Second MyRIO as Second Client. The delay in sending data from the host to the client is no more than 2 seconds. Based on this research, MyRIO has the ability to pervasive Computing with other devices. And can be used for prototyping models with good capabilities.
Anti-Forensics with Steganographic File Embedding in Digital Image Using Genetic Algorithm Amadeus Pondera Purnacandra; Subektiningsih Subektiningsih
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 8, No 2 (2022): June
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v8i2.24208

Abstract

In this study, a steganography method on digital images as anti-forensics by utilizing genetic algorithms was proposed. Genetic Algorithms are artificial intelligence whose functions are optimization and search. The purpose of this research is to optimize steganography as anti-forensic by applying a Genetic Algorithm and combined with the Hilbert curve, lempel Ziv Markov chain, and least significant bit. The result provides a new steganography method by combining various existing methods. The proposed method will be tested for image quality using PSNR, SSIM, Chi-Squared steganalysis and RS-Analysis, and extraction test. The novelty obtained from the developed method is that the steganography method is as optimal as anti-forensic in keeping confidential data, has a large embedding capacity, and is able to be undetected using forensic methods. The results can maintain data confidentiality, have a large embedding capacity, and are able to be undetected using forensic methods. The proposed method got better performance rather than the previous method because PSNR and SSIM values are high, secret data can be received back as long as the pixel value doesn't change, and the size of the embedding capacity. The proposed method has more ability to embed various types of payload/ secret data because of the way it works, which splits byte files into binary. The proposed method also has the ability not to be detected when forensic image testing is carried out.

Page 1 of 2 | Total Record : 16