cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
juti.if@its.ac.id
Editorial Address
Gedung Teknik Informatika Lantai 2 Ruang IF-230, Jalan Teknik Kimia, Kampus ITS Sukolilo, Surabaya, 60111
Location
Kota surabaya,
Jawa timur
INDONESIA
JUTI: Jurnal Ilmiah Teknologi Informasi
ISSN : 24068535     EISSN : 14126389     DOI : http://dx.doi.org/10.12962/j24068535
JUTI (Jurnal Ilmiah Teknologi Informasi) is a scientific journal managed by Department of Informatics, ITS.
Arjuna Subject : -
Articles 6 Documents
Search results for , issue "Vol. 19, No. 1, Januari 2021" : 6 Documents clear
EFFICIENCY OF FLOODING BY DEVELOPING RELIABLE SUBNETWORK METHODS ON FIBBING ARCHITECTURE IN THE HYBRID ENVIRONMENT SDN Dino Budi Prakoso; Royyana Muslim Ijtihadie; Tohari Ahmad
JUTI: Jurnal Ilmiah Teknologi Informasi Vol. 19, No. 1, Januari 2021
Publisher : Department of Informatics, Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24068535.v19i1.a1009

Abstract

In the technology world especially in the field of current network of Autonomous Systems connectivity (AS) is indispensable. Especially against the dynamic routing protocols that are often used compared to static routing protocols. In supporting this current network, it takes efficient and effective routing protocols capable of covering a sizable scale. Software Defined Network (SDN) is a technological innovation in the network world that has a separate Control Plane and Data Plane that makes it easy to configure on the Control Plane side. Control Plane is the focal point on a process of bottleneck in SDN architecture. Performance is a critical issue in large-scale network implementations because of the large demand load occurring in the Control Plane by generating low throughput value. This research will be conducted testing on the Hybrid network of SDN by using OSPF routing protocol, based on the Fibbing architecture implemented on the system network Hybrid SDN also able to assist in improving performance, but there are constraints when sending flooding which is used as a fake node forming. Many nodes are not skipped as distribution lines in the formation of a fake node, in which case it will certainly affect the value of throughput to be unstable and decrease. This can be overcome by using the Isolation Domain method to manage the LSA Type-5 flooding efficiency.
IMPERSONATION METHOD ON AUTHORIZATION SERVER USING CLIENT-INITIATED BACK-CHANNEL AUTHENTICATION PROTOCOL Rizky Januar Akbar; Nurul Fajrin Ariyani; Adistya Azhar; Andika Andra
JUTI: Jurnal Ilmiah Teknologi Informasi Vol. 19, No. 1, Januari 2021
Publisher : Department of Informatics, Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24068535.v19i1.a1022

Abstract

There is an impersonation (login as) feature in several applications that can be used by system administrators who have special privileges. This feature can be utilized by development and maintenance teams that have administrator rights to reproduce errors or bugs, to check specific features in applications according to the specific users’ login sessions. Beside its benefits, there is a security vulnerability that allows administrators to abuse the rights. They can access users’ private data or execute some activities inside the system without account or resource owners’ consents.This research proposes an impersonation method on authorization server using Client-Initiated Back-channel Authentication (CIBA) protocol. This method prevents impersonation without account or resource owners’ consent. The application will ask users’ authentication and permission via authentication device possessed by resource owners before the administrator performs impersonation. By utilizing authentication device, the impersonation feature should be preceded by users’ consent and there is no direct interaction needed between the administrator and resource owners to prove the users’ identities. The result shows that the implementation of CIBA protocol can be used to complement the impersonation method and can also run on the authorization server that uses OAuth 2.0 and OpenID Connect 1.0 protocols. The system testing is done by adopting FAPI CIBA conformance testing.
MODIFIED LOCAL TERNARY PATTERN WITH CONVOLUTIONAL NEURAL NETWORK FOR FACE EXPRESSION RECOGNITION Syavira Tiara Zulkarnain; Nanik Suciati
JUTI: Jurnal Ilmiah Teknologi Informasi Vol. 19, No. 1, Januari 2021
Publisher : Department of Informatics, Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24068535.v19i1.a1031

Abstract

Facial expression recognition (FER) on images with illumination variation and noises is a challenging problem in the computer vision field. We solve this using deep learning approaches that have been successfully applied in various fields, especially in uncontrolled input conditions. We apply a sequence of processes including face detection, normalization, augmentation, and texture representation, to develop FER based on Convolutional Neural Network (CNN). The combination of TanTriggs normalization technique and Adaptive Gaussian Transformation Method is used to reduce light variation. The number of images is augmented using a geometric augmentation technique to prevent overfitting due to lack of training data. We propose a representation of Modified Local Ternary Pattern (Modified LTP) texture image that is more discriminating and less sensitive to noise by combining the upper and lower parts of the original LTP using the logical AND operation followed by average calculation. The Modified LTP texture images are then used to train a CNN-based classification model. Experiments on the KDEF dataset show that the proposed approach provides a promising result with an accuracy of 81.15%.
IMPROVED DEEP LEARNING ARCHITECTURE WITH BATCH NORMALIZATION FOR EEG SIGNAL PROCESSING Adenuar Purnomo; Handayani Tjandrasa
JUTI: Jurnal Ilmiah Teknologi Informasi Vol. 19, No. 1, Januari 2021
Publisher : Department of Informatics, Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24068535.v19i1.a1023

Abstract

Deep learning is commonly used to solve problems such as biomedical problems and many other problems. The most common architecture used to solve those problems is Convolutional Neural Network (CNN) architecture. However, CNN may be prone to overfitting, and the convergence may be slow. One of the methods to overcome the overfitting is batch normalization (BN). BN is commonly used after the convolutional layer. In this study, we proposed a further usage of BN in CNN architecture. BN is not only used after the convolutional layer but also used after the fully connected layer. The proposed architecture is tested to detect types of seizures based on EEG signals. The data used are several sessions of recording signals from many patients. Each recording session produces a recorded EEG signal. EEG signal in each session is first passed through a bandpass filter. Then 26 relevant channels are taken, cut every 2 seconds to be labeled the type of epileptic seizure. The truncated signal is concatenated with the truncated signal from other sessions, divided into two datasets, a large dataset, and a small dataset. Each dataset has four types of seizures. Each dataset is equalized using the undersampling technique. Each dataset is then divided into test and train data to be tested using the proposed architecture. The results show the proposed architecture achieves 46.54% accuracy for the large dataset and 93.33% accuracy for the small dataset. In future studies, the batch normalization parameter will be further investigated to reduce overfitting.
IMPLEMENTATION OF JOHNSON'S SHORTEST PATH ALGORITHM FOR ROUTE DISCOVERY MECHANISM ON SOFTWARE DEFINED NETWORK Akbar Pandu Segara; Royyana Muslim Ijtihadie; Tohari Ahmad
JUTI: Jurnal Ilmiah Teknologi Informasi Vol. 19, No. 1, Januari 2021
Publisher : Department of Informatics, Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24068535.v19i1.a1011

Abstract

Software Defined Network is a network architecture with a new paradigm which consists of a control plane that is placed separately from the data plane. All forms of computer network behavior are controlled by the control plane. Meanwhile the data plane consisting of a router or switch becomes a device for packet forwarding. With a centralized control plane model, SDN is very vulnerable to congestion because of the one-to-many communication model. There are several mechanisms for congestion control on SDNs, one of which is modifying packets by reducing the size of packets sent. But this is considered less effective because the time required will be longer because the number of packets sent is less. This requires that network administrators must be able to configure a network with certain routing protocols and algorithms. Johnson's algorithm is used in determining the route for packet forwarding, with the nature of the all-pair shortest path that can be applied to SDN to determine through which route the packet will be forwarded by comparing all nodes that are on the network. The results of the Johnson algorithm's latency and throughput with the comparison algorithm show good results and the comparison of the Johnson algorithm's trial results is still superior. The response time results of the Johnson algorithm when first performing a route search are faster than the conventional OSPF algorithm due to the characteristics of the all pair shortest path algorithm which determines the shortest route by comparing all pairs of nodes on the network.
LITERATURE REVIEW IOT SOFTWARE ARCHITECTURE ON AGRICULTURE Junaidi Junaidi; Amirullah Andi Bramantya; Bintang Satya Pradipta
JUTI: Jurnal Ilmiah Teknologi Informasi Vol. 19, No. 1, Januari 2021
Publisher : Department of Informatics, Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24068535.v19i1.a962

Abstract

Context – Internet of Things (IoT) interrelates computing devices, machines, animals, or people and things that use the power of internet usage to utilize data to be much more usable. Food is one of the mandatory human needs to survive, and most of it is produced by agriculture. Using IoT in agriculture needs appropriate software architecture that plays a prominent role in optimizing the gain. Objective and Method – Implementing a solution in a specific field requires a particular condition that belongs to it. The objectives of this research study are to classify the state of the art IoT solution in the software architecture domain perspective. We have used the Evidence- Based Software Engineering (EBSE) and have 24 selected existing studies related to software architecture and IoT solutions to map to the software architecture needed on IoT solutions in agriculture. Result and Implications – The results of this study are the classification of various IoT software architecture solutions in agriculture. The highlighted field, especially in the areas of cloud, big data, integration, and artificial intelligence/machine learning. We mapped the agriculture taxonomy classification with IoT software architecture. For future work, we recommend enhancing the classification and mapping field to the utilization of drones in agriculture since drones can reach a vast area that is very fit for fertilizing, spraying, or even capturing crop images with live cameras to identify leaf disease.

Page 1 of 1 | Total Record : 6