Claim Missing Document
Check
Articles

Found 28 Documents
Search

ANALISIS DISTRIBUSI PROBABILITAS DAN KENDALI OPTIMAL PERSIMPANGAN = PROBABILITY DISTRIBUTION ANALYSIS AND OPTIMAL CONTROL INTERSECTION Harjono, Mulyadi Sinung; Aspar, Wimpie A.N; Halim, Abdul; Ramli, Kalamullah
Majalah Ilmiah Pengkajian Industri Vol 9, No 1 (2015): Majalah Ilmiah Pengkajian Industri
Publisher : BPPT

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (138.176 KB) | DOI: 10.29122/mipi.v9i1.92

Abstract

Abstract Research traffic dynamics modeling requires the enumeration of traffic flow data on many road network nodes. Information enumeration traffic flows are applied to the analysis model of the road network control or control the intersection area, either as a standalone junction (isolated) and the coordinative intersection. Classification of types and traffic conditions used for this control is determined by ITS transportation management policy or government. Estimation and prediction of traffic conditions in real terms are based on information obtained by traffic counting. Counting of traffic flows is aimed to determine the probability distribution function (pdf) traffic flow for the intersection of two segments, namely Jalan Kyai Haji Wahid Hasyim - Jalan Mohammad Husni Thamrin and Jalan Kebun Sirih - Jalan Mohammad Husni Thamrin, Jakarta, Indonesia. Signalized intersection is composed of roads with 12 lanes and 4 lanes with traffic signs and fixtures actuated traffic control system using historical data. Based on the evolution of the combined token, it was obtained fundamental equation for the evolution of the token. Based on the modeling, the needs of departure vehicle for red light violators and breakthrough yellow light, it would require further development to SimHPN. Modeling and simulation of hybrid Petri nets on this research are aimed to perform optimal control system for traffic flow, the number of vehicles at intersections, in order to obtain optimal current flow in the study area. Abstrak Penelitian pemodelan dinamika lalu-lintas memerlukan data pencacahan arus lalu-lintas (traffic counting) pada banyak simpul jaringan jalan. Informasi pencacahan arus lalu-lintas tersebut dipergunakan untuk analisa model pengendalian jaringan jalan ataupun pengendalian area persimpangan, baik sebagai persimpangan mandiri (isolated) maupun persimpangan koordinatif. Penggolongan jenis dan kondisi lalu-lintas yang dipergunakan untuk pengendalian ini ditentukan oleh kebijakan manajemen transportasi ITS ataupun pemerintah. Estimasi dan prediksi kondisi lalu-lintas secara riil diperoleh berdasarkan informasi hasil pencacahan arus lalu-lintas. Pencacahan arus lalulintas bertujuan untuk menentukan fungsi distribusi probabilitas (pdf) arus lalulintas untuk dua ruas persimpangan, yaitu Jalan Kyai Haji Wahid Hasyim - Jalan Mohammad Husni Thamrin dan Jalan Kebon Sirih - Jalan Mohammad Husni Thamrin, Jakarta Indonesia. Persimpangan bersinyal ini tersusun atas ruas jalan dengan 12 lajur dan 4 lajur dengan rambu lalu-lintas dan perlengkapan actuated traffic control system menggunakan data historical. Berdasarkan evolusi token gabungan diperoleh persamaan fundamental untuk evolusi token. Berdasarkan kebutuhan pemodelan keberangkatan kendaraan untuk pelanggar lampu merah dan penerobos lampu kuning, maka diperlukan pengembangan lebih lanjut terhadap SimHPN. Pemodelan dan simulasi dengan hybrid Petri nets pada penelitian ditujukan untuk melakukan sistem kendali optimal terhadap arus lalulintas, jumlah kendaraan di persimpangan, sehingga diperoleh aliran arus optimal pada area penelitian.
Variance Analysis of Photoplethysmography for Blood Pressure Measurement Tjahjadi, Hendrana; Ramli, Kalamullah
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1045.628 KB) | DOI: 10.11591/eecsi.v4.999

Abstract

The emergence of photoplethysmography for blood pressure estimation is offering a more convenient method. The elements of photoplethysmography waveform is crucial for blood pressure measurement. Several photoplethysmography elements are still not completely understood. The purpose of this study was to investigated corelation of photoplethysmography elements with blood pressure using statistical approach. Analysis of variance test (ANOVA) was conducted to see if there are any correlation between elements of photoplethysmography with blood pressure. This study used 10 volunteers without an ethical clearance. Photoplethysmography waveform and blood pressure measurements were taken through the patient monitor equipment DatascopeTM. As the result, value factor from the arithmetic is 35.67 and value factor from the table is 3.14. The value of F arithmetic (35.67) > F table (3.14). The correlation of diastolic time (Td) is negative with systolic arterial pressure (SAP) and the correlation of systolic amplitude (As) is positive with diastolic arterial pressure (DAP). The results showed elements of photoplethysmography can be used to estimation blood pressure. The emergence of photoplethysmography for blood pressure estimation is offering a more convenient method. The elements of photoplethysmography waveform is crucial for blood pressure measurement. Several photoplethysmography elements are still not completely understood. The purpose of this study was to investigated corelation of photoplethysmography elements with blood pressure using statistical approach. Analysis of variance test (ANOVA) was conducted to see if there are any correlation between elements of photoplethysmography with blood pressure. This study used 10 volunteers without an ethical clearance. Photoplethysmography waveform and blood pressure measurements were taken through the patient monitor equipment DatascopeTM. As the result, value factor from the arithmetic is 35.67 and value factor from the table is 3.14. The value of F arithmetic (35.67) > F table (3.14). The correlation of diastolic time (Td) is negative with systolic arterial pressure (SAP) and the correlation of systolic amplitude (As) is positive with diastolic arterial pressure (DAP). The results showed elements of photoplethysmography can be used to estimation blood pressure.
Novel Approach for Evaluating Video Transmission using Combined Scalable Video Coding over Wireless Broadband Network Kalvein Rantelobo; Kalamullah Ramli; Wirawan Wirawan
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (790.511 KB) | DOI: 10.11591/ijece.v8i5.pp3407-3416

Abstract

One of the main problems in video transmission is the bandwidth fluctuation in wireless channel. Therefore, there is an urgent need to find an efficient bandwidth utilization and method. This research utilizes the Combined Scalable Video Coding (CSVC) which comes from Joint Scalable Video Model (JSVM). In the combined scalable video coding, we implement Coarse Grain Scalability (CGS) and Medium Grain Scalability (MGS). We propose a new scheme in which it can be implemented on Network Simulator II (NS-2) over wireless broadband network. The advantages of this new scheme over the other schemes are more realistic and based on open source program. The result shows that CSVC implementation on MGS mode outperforms CGS mode.
An Algorithm for Predicting the Speed of Traffic Light Violators Iswanjono Iswanjono; Bagio Budiardjo; Kalamullah Ramli
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 9, No 1: April 2011
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v9i1.645

Abstract

The tracking of vehicles using RFID was developed consider three major problems, i.e. traffic signal timing, congestion on road and theft of vehicles. This paper describes an algorithm for predicting the speed of traffic light violators. The novel algorithm is implemented in the form of a simulation program. The traffic light system is equipped RFID reader as the main tool for identifying the vehicle’s RFID tags. In the simulation, the vehicle’s ID is generated using a random number generation. The distribution of the vehicle’s numbers is uniform and the expected number of vehicles violated the traffic light is not more than 3 % of the total number generated. The timing accuracy for speed traffic lights violator is 100 milli seconds. From the simulation conducted, the algorithm has performed as expected. It is able to predict the speed of traffic light violators ranging from 5 km/h up to 80 km/h in real-time.
On Developing of Smart Home with Pervasive Approach Kalamullah Ramli; Abdurrahman Alayderous; Muhammad Salman
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2006
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The paper describes our study and development of smart home by taken into account the concept of pervasive technology. The system integrates pervasive concept into the design of its hardware and software architecture, functionalities and system configuration. Pervasive technology is aimed at giving users access to information sources anywhere, anytime and on -demand. Pervasive access to and from the smart home can be done simultaneously via remote control, sms, web-camera and web-based Internet connection.Keywords: Smart home, Pervasive technology
Analisa Kinerja dan Implementasi Adaptivetranscoder pada Jaringan LAN (Local Area Network) Tri Daryanto; Kalamullah Ramli; Bagio Budihardjo
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2006
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Tujuan dari paper ini adalah merancang sebuah sistem adaptive transcoding yang mampu membaca kondisi bandwidth yang dilewati oleh data multimedia streaming sehingga memenuhi standar Quality of Service (QoS) untuk data multimedia streaming. Pada sistem adaptive transcoding tersebut proses transcoding yang digunakan, sesuai dengan kapasitas dari bandwidth yang dilewati oleh data multimedia streaming pada jaringan Local Area network (LAN). Transcoding sendiri adalah sebuah suatu proses untuk mengkoversi file dengan bit rate yang tinggi ke file dengan bit rate yang lebih rendah dan sebaliknya berdasarkan penurunan dari bandwidth consumer sampai dengan bandwidth efficient.Sistem adaptive transcoding dirancang dengan menggunakan algoritma prioritas yang melakukan proses pengecekan jumlah bit loss dan packet loss yang diterima oleh pengguna (client). Untuk menghitung jumlah bit loss adalah mencari nilai selisih dari bit data yang dikirim oleh server dengan bit data yang di terima oleh client. Jika didapatkan bit loss lebih besar dari 10% dari total data bit yang dikirimkan oleh server, maka.sistem adaptive transcoding akan melakukan penurunan prioritas transcoding ke level yang lebih rendah. Dimana kualitas format encoding video dan audio dari hasil transcoding lebih rendah dari prioritas sebelumnya.Kata kunci: adaptive, transcoding, QoS, Bandwidth
Model-Based Feature Selection for Developing Network Attack Detection and Alerting System Yuri Prihantono; Kalamullah Ramli
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 2 (2022): April 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (617.672 KB) | DOI: 10.29207/resti.v6i2.3989

Abstract

Intrusion Detection Systems (IDS) still have unresolved problems, namely the lack of accuracy in attack detection, resulting in false-positive problems and many false alarms. Machine learning is one way that is often utilized to overcome challenges that arise during the implementation of IDS. We present a system that uses a machine learning approach to detect network attacks and send attack alerts in this study. The CSE-CICIDS2018 Dataset and Model-Based Feature Selection technique are used to assess the performance of eight classifier algorithms in identifying network attacks to determine the best algorithm. The resulting XGBoost Model is chosen as the model that provides the highest performance results in this comparison of machine learning models, with an accuracy rate of 99 percent for two-class classification and 98.4 percent for multi-class classification.
Analyzing the Impact of Information Security Awareness Training to the Employees of Telco Company XYZ Erlangga Putro Subagyo; Kalamullah Ramli
Budapest International Research and Critics Institute-Journal (BIRCI-Journal) Vol 5, No 2 (2022): Budapest International Research and Critics Institute May
Publisher : Budapest International Research and Critics University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33258/birci.v5i2.4666

Abstract

As a company that is operating in the telecommunication sector, XYZ must ensure that they have adequate capabilities to protect their company’s and customers’ sensitive data. Although various information security systems and processes are already in place, human resources still are the weakest link in cyber security. The new normal of Working From Home makes the threat even larger. Basically, Information Security Awareness (ISA) denotes whether or not users are aware of information security objectives. Using a phishing scenario, this study examined the level of ISA of XYZ employees and how ISA training might improve their awareness level. The simulation outcomes were compared to the results before and after they received ISA training on a percentage scale. The results showed a positive increase between before and after being given training. Employees who clicked on phishing URLs before training reached 31% reduced to 12% after training. Meanwhile, employees affected by phishing decreased from 24% to 4%. The study also revealed discovered that based on the nature of the job, employees who work at directorates who work more on non-technical matters have lower awareness when compared to employees who work at directorates who work more on technical work.
A Security Framework for Secure Host-to-Host Environments Togu Sianturi; Kalamullah Ramli
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (448.08 KB) | DOI: 10.29207/resti.v6i3.4018

Abstract

Data security is an infrastructure designed to protect and secure data from unauthorized access, data manipulation, malfunction, destruction, and inappropriate data disclosure. Currently, organizations widely use data transfer to validate and verify data using different media particularly in host-to-host connections. This research focuses on data exchanged (end-to-end communication) using Multi Protocol Label Switching (MPLS), metro ethernet, and Software Defined Wide Area Network (SD-WAN) network architecture with third parties. This research aims to develop a design and analysis framework for verifying data transferred from one host to another in ABC organization by applicable security standards that are appropriate and follow its needs to help the organization. Furthermore, the analysis result is used as materials for drafting a cybersecurity framework through the three standards ISO/EIC 27001:2013, NIST SP800-161, and ITU-T X.805. The methodology used in this study is the comparative analysis of three frameworks, requirement analysis, and content analysis to develop a framework. The framework proposed of eight security dimensions, five threats, and providing mitigation is expected to enhance the security system of data exchange on host-to-host connections in ABC organization.
Implementation of CNN-MLP and CNN-LSTM for MitM Attack Detection System Hartina Hiromi Satyanegara; Kalamullah Ramli
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 3 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (488.897 KB) | DOI: 10.29207/resti.v6i3.4035

Abstract

Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack, such as website or system deface or phishing. Deep Learning could be able to predict various data well. Hence, in this study, we would like to present the approach to detect MitM attacks and process its data, by implementing hybrid deep learning methods. We used 2 (two) combinations of the Deep Learning methods, which are CNN-MLP and CNN-LSTM. We also used various Feature Scaling methods before building the model and will determine the better hybrid deep learning methods for detecting MitM attack, as well as the feature selection methods that could generate the highest accuracy. Kitsune Network Attack Dataset (ARP MitM Ettercap) is the dataset used in this study. The results prove that CNN-MLP has better results than CNN-LSTM on average, which has the accuracy rate respectively at 99.74%, 99.67%, and 99.57%, and using Standard Scaler has the highest accuracy (99.74%) among other scenarios.