Claim Missing Document
Check
Articles

Found 31 Documents
Search

Collaboration FMADM And K-Means Clustering To Determine The Activity Proposal In Operational Management Activity Awangga, Rolly Maulana; Pane, Syafrial Fachri; Tunnisa, Khaera
EMITTER International Journal of Engineering Technology Vol 7, No 1 (2019)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (209.522 KB) | DOI: 10.24003/emitter.v7i1.317

Abstract

Indonesian government agencies under the Ministry of Energy and Mineral Resources still use manual methods in determining and selecting proposals for operational activities to be carried out. This study uses the Decision Support System (DSS) method, namely Fuzzy Multiple Attribute Decision Decision (Fmadm) and K-Means Clustering method in managing Operational Plan activities. Fmadm to select the best alternative from a number of alternatives, alternatives from this study proposed activity proposals, then ranking to determine the optimal alternative. The K-Means Clustering Method to obtain cluster values for alternatives on the criteria for activity dates, types of activities, and activity ceilings. The last iteration of the Euclidian distance calculation data on k-means shows that alternatives that have the smallest centroid value are important proposal criteria and the largest centroid value is an insignificant proposal criteria. The results of the collaboration of the Fmadm and K-Means Clustering methods show the optimal ranking of activities (proposal activities) and the centroid value of each alternative.
Implementasi Face Recognition Untuk Mengakses Ruangan Suryansah, Alwan -; Habibi, Roni -; Awangga, Rolly Maulana; Fatonah, Rd. Nuraini Siti
Jurnal MediaTIK Vol 3, No 3 (2020): Jurnal MediaTIK
Publisher : Universitas Negeri Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26858/jmtik.v3i3.15176

Abstract

Teknologi biometrik yang berkembang saat ini seperti pengenalan sidik jari, pengenalan retina mata dan sebagainnya mengharuskan seseorang memposisikan tubuh pada posisi yang sesuai dengan posisi kamera yang membuat teknologi ini terkesan kaku, untuk itu sebuah sistem identifikasi lebih fleksibel dan bersifat otomatis dapat mencegah pencurian. Pada penelitian ini dirancang sebuah sistem keamanan yang dapat mengakses pintu masuk menggunakan face recognition berbasis Arduino Uno. Salah satu solusi keamanan dalam melakukan ototentikasi adalah menggunakan bagian tubuh manusia yaitu wajah. Sistem dapat mendeteksi objek wajah sebagai citra dari kamera. Setelah objek terdeteksi, sistem akan melakukan pencocokan wajah dengan citra wajah yang terdapat pada database sistem. Citra akan diproses dengan menggunakan metode LBPH. Sistem ini merupakan penerapan Smart Gate dalam sistem keamanan dengan tujuan dapat mengamankan ruangan yang bersifat pribadi/ private dengan menggunakan biometric fece recognition, penggunaan komponen-komponen elektronik dapat digunakan sebagai alat yang dapat mengenal karakter wajah agar dapat mengakses ruangan, dan dapat mengimplementasikan algoritma LBPH dalam pengenalan karakter wajah pada sistem yang akan di bangun. Hasil dari penelitian ini adalah kendali privilege pada Smart Gate menggunakan Arduino Uno dan biometric face recognition dapat meningkatkan keamanan pada ruangan, dapat memaksimalkan penggunaan komponen-komponen elektronik dan dapat mengimplementasikan algoritma LBPH
Prediksi Jumlah Penjualan Rumah di Bojongsoang ditengah Pandemi Covid-19 dengan Metode ARIMA Kurniawan, Alit Fajar; Pane, Syafrial Fachri; Awangga, Rolly Maulana
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 5, No 4 (2021): Oktober 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v5i4.3121

Abstract

This study aims to determine the accuracy of the ARIMA method with the Carmer matrix in forecasting or predicting the number of house sales in the Bojongsoang area which is still experiencing a period of crisis. The data used in this study is secondary data in the form of time series data on the number of house sales. In the ARIMA method, we perform stationary data, then look for autoregressive (AR), moving average (MA), and ARMA (Autoregressive and Moving Average) values. From the available data, the number of house sales has decreased, therefore forecasting is carried out using the ARIMA (1,1,1) model for future home sales to assist property developers in estimating future development projects. the results of the forecasting carried out using the ARIMA (1,1,1) method, which shows that the prediction of the number of house sales in the Bojongsoang area in the June - December period experienced a stable number of house sales
Ontology design based on data family planning field officer using OWL and RDF Rolly Maulana Awangga; Setiawan Assegaff; Syafrial Fachri Pane; Muhammad Firman Kahfi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 1: February 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i1.9237

Abstract

Population density in Indonesia is ranked fourth in the world. The impact of a large population will affect the level of welfare of the community to decrease, and the number of unemployment is increasing so that the state makes Family Planning Program (PLKB) to control the rate of population growth. Problems in the PLKB program are on knowledge management and mapping from data contraception, counseling and planning so that this research using Ontology method will aim to do mapping with knowledge management and Ontology design shows represented data to relate and describes the resources contained in family planning data. This research approach the representation of ontology that is validated through model transformation from family planning data to ontology design using OWL and RDF which are useful for data processing and representing data to be utilized by field officers in educating the public and eradicating negative issues about family planning programs
K Means Clustering and Meanshift Analysis for Grouping the Data of Coal Term in Puslitbang tekMIRA Rolly Maulana Awangga; Syafrial Fachri Pane; Khaera Tunnisa; Iping Supriana Suwardi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 3: June 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i3.8910

Abstract

Indonesian government agencies under the Ministry of Energy and Mineral Resources have problems in classifying data dictionary of coal. This research conduct grouping coal dictionary using K-Means and MeanShift algorithm. K-means algorithm is used to get cluster value on character and word criteria. The last iteration of Euclidian distance calculation data on k-means combine with Meanshift algorithm. The meanshift calculates centroid by selecting different bandwidths. The result of grouping using k-means and meanshift algorithm shows different centroid to find optimum bandwidth value. The data dictionary of this research has sorted in alphabetically.
Qualitative Evaluation of RFID Implementation on Warehouse Management System Syafrial Fachri Pane; Rolly Maulana Awangga; Bayu Rahmad Azhari
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 3: June 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i3.8400

Abstract

Logistic sector actors need innovation to improve competitiveness in providing their best services to consumers, one of them on Warehouse Management System (WMS) because the system is used to control the movement of the supply chain. There is a problem in one of Indonesia logistics companies on the process of selecting goods, so the warehouseman still difficulties in this process. Thus, RFID implementation on WMS becomes one of the solutions to handle the goods selection process. This research uses Design Science Research Methodology (DSRM) which focuses on developing and improving the model performance of a system and using waterfall model for system development. Then the authors will analyze the test results with the validity test and reliability test of the questionnaire, and the results of the data analysis will determine the feasibility of this research to be applied.
KANSA: high interoperability e-KTP decentralised database network using distributed hash table Rolly Maulana Awangga; Nisa Hanum Harani; Muhammad Yusril Helmi Setyawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.11758

Abstract

e-KTP is an Indonesian Identity Card based on Near Field Communicator technology. This technology was embedded in every e-KTP card for every Indonesian citizen. Until this research, e-KTP technology never to be utilized by any stack-holder neither government agencies nor nongovernment organization or company. e-KTP Technology inside the card never been used and go with conventional with manual copy it with photocopy machine or take a photograph with it. This research was proposing an open standard to utilized e-KTP Technology. The open standard will bring e-KTP technology used as is and used broadly in many government agencies or much commercial company. This research was proposing decentralized network model especially for storing e-KTP data without breaking privacy law. Besides providing high specs of the server, a decentralized model can reduce the cost of server infrastructure. The model was proposing using Distributed Hast Table which was used for peer-to-peer networks. The decentralized model promised high availability and the more secure way to save and access the data. The result of this model can be implemented in many network topology or infrastructure also applicable to implement on Small Medium Enterprise Company.
K-Nearest neighbor algorithm on implicit feedback to determine SOP Muhammad Yusril Helmi Setyawan; Rolly Maulana Awangga; Nadia Ayu Lestari
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.12436

Abstract

The availability of a lot of existing Standard Operating Procedures (SOP) document information, users often need time to find SOPs that fit their preference. Therefore, this requires a recommendation system based on user content consumption by personalized usage logs to support the establishment of SOP documents managed according to user preferences. The k-nearest neighbor (KNN) algorithm is used to identify the most relevant SOP document for the user by utilizing implicit feedback based on extraction data by monitoring the document search behavior. From the research results obtained 5 classifications as parameters, with a final value of 3:2 ratio that shows the best distance value with the majority of labels according to the concept of calculation KNN algorithm that sees from the nearest neighbor in the dataset. This shows the precision of applying the KNN algorithm in determining SOP documents according to user preferences based on implicit feedback resulting in 80% presentation for SOPs corresponding to profiles and 20% for SOPs that do not fit the user profile. To establish SOP documents to show more accurate results, it should be used in a broad SOP management system and utilize implicit feedback with parameters not only in search logs and more on performance evaluation evaluations.
KAFA: A novel interoperability open framework to utilize Indonesian electronic identity card Rolly Maulana Awangga; Nisa Hanum Harani; Muhammad Yusril Helmi Setyawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.11755

Abstract

Indonesian people have electronic citizen card called e-KTP. e-KTP is NFC based technology embedded inside Indonesian citizenship identity card. e-KTP technology has never been used until now since it was launch officially by the government. This research proposes an independent framework for bridging the gap between Indonesia regulation for e-KTP and commercial use in the many commercial or organization sector. The Framework proposes interoperability framework using novel combination component, there are e-KTP reader, Middleware and Web Service. KAFA (e-KTP Middleware and Framework) implementing Internet of Things (IoT) concept to make it as open standard and independent. The framework use federation mode or decentralized data for interoperability, to make sure not breaking the law of privacy. Extended development of AES-CBC cipher algorithm was used to encrypt the data on the transport between middleware and web service.
Feature Extraction Analysis for Hidden Markov Models in Sundanese Speech Recognition Intan Nurma Yulita; Akik Hidayat; Atje Setiawan Abdullah; Rolly Maulana Awangga
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 5: October 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i5.7927

Abstract

Sundanese language is one of the popular languages in Indonesia. Thus, research in Sundanese language becomes essential to be made. It is the reason this study was being made. The vital parts to get the high accuracy of recognition are feature extraction and classifier. The important goal of this study was to analyze the first one. Three types of feature extraction tested were Linear Predictive Coding (LPC), Mel Frequency Cepstral Coefficients (MFCC), and Human Factor Cepstral Coefficients (HFCC). The results of the three feature extraction became the input of the classifier. The study applied Hidden Markov Models as its classifier. However, before the classification was done, we need to do the quantization. In this study, it was based on clustering. Each result was compared against the number of clusters and hidden states used. The dataset came from four people who spoke digits from zero to nine as much as 60 times to do this experiments. Finally, it showed that all feature extraction produced the same performance for the corpus used.