Claim Missing Document
Check
Articles

Found 10 Documents
Search

ANALISIS PERBANDINGAN KOMPRESI DATA DENGAN TEKNIK ARITHMETIC CODING DAN RUN LENGTH ENCODING Gozali, Ferrianto; Mervyn, Mervyn
Jurnal Teknik Elektro Vol 4, No 1 (2004)
Publisher : Jurnal Teknik Elektro

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data transmission and data storage cost money. The more information being dealt with, thehigher the cost is needed. In spite of this, most digital data are not stored in the mostcompact form. Rather, they are stored in whatever way makes them easiest to use, such as:ASCII text from word processors, binary code that can be executed by a computer, etc.Typically, these easy-to-use encoding methods require larger size data files than theyactually need to represent the information. Data compression is the general term for thevarious algorithms and programs developed to address this problem. The aim of datacompression is to reduce redundancy in stored data or transmitted data, thus increasingeffective data density. A compression program is used to convert data from an easy-to-useformat to one optimized for compactness. In this paper, we examine and analyze two basicmethods in data compression called Run Length Encoding and Arithmetic coding. Aframework for evaluation and comparison of these two methods is constructed and appliedto the algorithms presented. Comparisons of both theoretical and empirical natures arebriefly reported in this paper. The compression programs for these two methods of datacompression are developed using Java programming language. The program is used tocompress number of different sizes document type files to measure the time spent for thecompression, the time to reconstruct and the size of the compressed data files to get thecompression ratio. The result indicated that arithmetic coding method has compression ratio1,14 up to 2,61 higher than run length encoding while it takes times 1,114 –1,564 and 2,85 –5,635 longer than time needed by Run Length encoding methods. We can conclude that thereare typical tradeoffs between the amount of compression, the runtime, and the quality of thereconstruction. Depending on the application, one might be more important than anotherand one would want to pick the method appropriately.Keywords: Kompresi Data, Run Length Encoding, Arithmetic Coding, Compression ratio.
Case Based Reasoning in Engineering Design Gozali, Ferrianto
Jurnal Teknik Elektro Vol 2, No 1 (2002)
Publisher : Jurnal Teknik Elektro

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Design is an activity that requires not only fundamental knowledge in the domain of theapplication and understanding of the interactions with other aspects such as ergonomic,economic, technical and social but also creativity of designers. To generate innovativesolutions, expert designers often use their experiences, the history of failed as well assuccessful designs, as a valuable information source to help them to solve a current designproblem. For beginners, such information is even more valuable. Thus, experiences earnedfrom previous design processes can be a rich source of ideas and inspiration in every stageof design. Case-based reasoning or CBR is a methodology in automated reasoning andmachine learning. In CBR, a reasoner solves a new problem by searching for the similarityof the problem to one or several previously solved problems stored as cases in the case baseand then adapting their known solutions instead of working out a solution from scratch.Designers analyse the design problem through formal methods, but creating a new designrequires previous experiences, or at least, exposure to anothers design experiences. InCase-based design, CBR supports a design process by reminding designers of previousdesign experiences that can help to solve new design problems. This paper describes apreliminary survey of CBR application in design to support the research of CBR applicationin engineering design education. A CBR basic concept will be explored first followed by ageneral step of engineering design process. It is also described issues raised by theapplication of CBR in design process, and finally we propose the possibilities of introducinga CBR method in engineering design education.Keywords: Case Based Reasoning, Engineering Design, Design Case, Case Base.
Peranan Web Spider Dalam Internet Search Engine Faezal, Mochamad Fajar; Gozali, Ferrianto
Jurnal Teknik Elektro Vol 3, No 2 (2004)
Publisher : Jurnal Teknik Elektro

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Information is one of the basic necessities for human being. The complete andtimely information is needed in almost every modern human activities. With internet as aglobal computer network, we can easily retrieve and find a comprehensive information weneed from different places and experts from all over the world. With millions of web sitesalready on the Internet and thousands more being added daily, the chances of someonefinding information they need are very easy and the capabilities of search engines to helpusers in information retrieval are very important.Internet search engine is a software that responsible for spidering and indexingthe information in the Internet and maintaining a database of those information. When akeyword is entered into a search engine, it looks for that keyword in its database anddisplays any relevant records, so it is not really search the global network Internet. Thecapability of Internet Search Engine in information retrieval not only depend on the inputkeyword provided by user but also depend on the capability of the engine to build andmaintain the database due to a dynamic changes of information in the Internet.This paper provides a brief overview about techniques used by internet searchengine especially how it spidering the webs in the internet, indexing the information found inthe web pages and building the database of the information. A model of web spider isdeveloped and tested to show how web spider actually works and to investigate therelationship between the level of spidering with the capability of the search engine. Theperformance of the web spider is tested by spidering Trisakti University Web sitewww.trisakti.ac.id using various key words and level of pages.Keywords: Internet Search Engine, web spider, web site, index, database.
Pengaruh Routing Adaptif OSPF terhadap Penggunaan Bandwidth pada Jaringan Komputer Gozali, Ferrianto; Juniman, Juniman
Jurnal Teknik Elektro Vol 3, No 1 (2003)
Publisher : Jurnal Teknik Elektro

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Routing protocol is a set of rules implemented by router in routing process to build a routingtable. The table is used as a reference to forward data packets from source to destination ininternetworks. There are three types of routing protocol: Distance vector, Link state andHybrid routing protocol. Open Shortest Path First (OSPF) is a Link state routing protocolthat implements SPF (Shortest Path First) Dijkstra algorithm to determine a shortest pathfrom source node to destination node. OSPF as a public domain routing protocol not onlyworks as an Interior Gateway Protocol (IGP) in certain Autonomous System (AS) but also asExterior Gateway Protocol (EGP) which able to control the route of data packets amongdifferent Autonomous Systems. This capability is achieved by implementing multipleinterfaces OSPF with separate topological databases with their own Links state informationin every Autonomous System. In this research, Zebra software package is used to implementOSPF routing protocol and for the purpose of analysis and measurement of the output weuse a linux web base packet-analyzer software package. The result we found indicates thatthe bigger number of router and link on the router, the bigger the bandwidth used innetworks while the bigger number of area, the smaller bandwidth used in every area.Keywords: OSPF, link state, routing protocol, autonomous system.
Virtual Server Gozali, Ferrianto; Alex, Alex
Jurnal Teknik Elektro Vol 2, No 1 (2002)
Publisher : Jurnal Teknik Elektro

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid development of Internet technology can be reflected by the increasing number ofthe Internet users, the complexity of the applications in the Internet and its related computernetwork technology. Nowadays, more and more companies are moving their businesses onthe Internet. Once the companies have decided that they want to utilize the internet tosupport their business activities, their consideration not only based on their needs when thesystem is set up but also the prediction about future condition. Any interrupt or stop ofservices on the servers means business losses, and high availability of these servers becomesincreasingly important. The load on popular Internet sites is growing rapidly, some havealready got tens of millions hits per day. More and more administrators have met theperformance bottleneck problem of their servers, and with the increasing access requests theservers will be easily overloaded for a short time. This condition sometimes exceeds theirprediction when they first set up the system. This paper presents how to create Linux virtualservers or in brief we called LVS. LVS implements parallel processing concepts in the Linuxbased computer network. LVS is a high-performance and highly available server built on acluster of real servers. By utilizing one computer as a LVS Director which is responsible todistribute user accesses, LVS will be able to schedule and distribute the load into number ofLVS real server. In the system, we utilize the method of IP-level load balancing to makeparallel services of the cluster to appear as a virtual service on a single IP address viaNetwork Address Translation. They are two scheduling algorithms used, a Round Robin andWeight Least Cost load balancing. In order to test the performance of the LVS system, anLVS Web server is developed in the Computer System Laboratory, Electrical EngineeringDepartment, Trisakti University. The response of the web server using different number ofreal servers and different load balancing algorithm, round robin and weight least cost, ismonitored.Keywords: Internet, LVS, NAT, komputer Cluster, Round Robin, Weight Least Cost.
ANALISIS UNJUK KERJA KOMPUTASI DISTRIBUTED SHARED MEMORY PADA SISTEM CLUSTER KOMPUTER PERSONAL Gozali, Ferrianto; Lagusto, Dimas
Jurnal Teknik Elektro Vol 4, No 2 (2005)
Publisher : Jurnal Teknik Elektro

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Parallel processing systems that support the shared memory abstraction are becomingwidely accepted in many areas of computing. The shared memory or single system image ofaddress space abstraction provides several advantages over the message passingabstraction. Distributed shared memory or DSM is a memory configuration system that canbe used to provide a coherent shared address space for a workstation clusters or looselycoupled systems which have no support for shared memory in hardware.The purpose of thispaper is to describe issues related to the implementation of DSM in Personal ComputerCluster system. The system is developed under Linux operating system and clustermiddleware Parallel Virtual Machine [PVM]. In this research, an object-based DistributedShared Memory (DSM) system called Adsmith is used on the top of PVM. An applicationprogram for A Traveling Salesman Problem (TSP) is tested using different scenarios to getaverage execution time and speedup of the computation. Each scenario represents a differentnumber of node cluster involved for computation. The results show that programs developedwith Adsmith can achieve better performance comparable to that developed with PVM inhigh computation environment.Keywords: Distributed Shared Memory, komputer cluster, Parallel Virtual Machine,Adsmith.
Sistem Pengalokasian Dinamik VLAN Dalam Mendukung Proses Belajar Terdistribusi Gozali, Ferrianto; Lo, Billion
Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) Vol 1, No 1 (2012)
Publisher : Jurusan Pendidikan Teknik Informatika Universitas Pendidikan Ganesha

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (416.797 KB)

Abstract

Seiring perkembangan pendidikan, penggunaan ICT sangatlah besar dalam proses perkembangan tersebut. Dengan penggunaan ICT ini, memungkinkan distance learning diimplementasi dimana proses belajar mengajar tidak harus lagi berada dikelas seperti pada pendidikan yang konvensional. Dengan adanya distance learning dapat memecahkan masalah spasial baik dari ukuran ruangan terhadap jumlah murid dan keterbatasan untuk dapat hadir kedalam ruang perkuliahan. Karena itulah, Sistem Pengalokasian Virtual Local Area Network (VLAN) secara Dinamis dibutuhkan. Sistem ini merupakan sistem yang berbasis protokol Radius yang dapat membantu untuk mengotentikasi dan memindahkan client antar sub jaringan (VLAN) didalam jaringan internal suatu perkuliahan.Perancangan sistem digunakan aplikasi berbasis open source. Pada perancangan sistem Dinamik VLAN ini, penulis menggunakan sistem otentikasi berdasarkan MAC-Address dari client yang akan dimapping kedalam VLAN yang akan dituju. MAC-Address dan VLAN yang akan dituju disimpan didalam database. Untuk skema jaringannya, server dan client akan terhubung menggunakan manageable switch.Mekanisme kerja dari sistem pengalokasian VLAN secara dinamis ini terdiri dari 3 (tiga) tahap yaitu: tahap penerimaan request dari Network Access Server (NAS), pengecekan MAC-Address terhadap VLAN yang dituju dan persetujuan otentikasi dan otorisasi. Untuk mendukung proses pembelajaran jarak jauh, digunakan Web Conference dan aplikasi seperti file sharing pada jaringan VLAN tersebut. Untuk pengujian sistem tersebut, kita menggunakan applikasi Web Conference dengan cara membandingkan performa jaringan pada saat dengan dan tanpa sistem tersebut.Dalam mengimplementasikan sistem ini, terbilang murah karena suatu perusahaan hanya membutuhkan sebuah server dengan Sistem Operasi yang gratis dan aplikasi yang gratis dan dapat diimplementasikan langsung ke dalam jaringan perusahaan tanpa perubahan topologi jaringan yang menyeluruh.Namun dalam sistem ini masih terdapat kekurangan, dimana sistem ini hanya dapat diaplikasikan dengan menggunakan Manageable Switch dan belum dapat digunakan untuk Wi-fi dan Unmanageable Switch.
Pemanfaatan Teknologi Open Source Dalam Pengembangan Proses Belajar Jarak Jauh di Perguruan Tinggi Gozali, Ferrianto; Lo, Billion
Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI Vol 1, No 1 (2012)
Publisher : Jurusan Pendidikan Teknik Informatika Universitas Pendidikan Ganesha

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (872.337 KB) | DOI: 10.23887/janapati.v1i1.9767

Abstract

Perkembangan Teknologi Informasi dan Komunikasi atau disingkat TIK yang ada saat ini ikut memberikan kontribusi dalam pengembangan bidang pendidikan khususnya di perguruan tinggi, termasuk dalam proses belajar mengajar. Proses belajar mengajar yang bersifat konvensional, dimana dosen dan mahasiswa melakukan kegiatan tatap muka di ruang kelas, sudah mulai beralih ke proses belajar jarak jauh dengan memanfaatkan TIK dalam bentuk e-learning. Dengan memanfaatkan proses e-learning ini, masalah waktu dan tempat yang biasa kita temui dapat dipecahkan, terutama pada keterbatasan ukuran kelas terhadap jumlah murid dan keterbatasan waktu untuk dapat hadir di ruang kelas. E-Learning berkembang sejalan dengan perkembangan TIK, dimana konsep E-Learning 1.0 terus mengalami perbaikan menuju ke E-Learning 2.0. Perkembangan konsep ini terutama dijumpai dalam bentuk komunikasi pada proses yang disediakan, jenis media yang digunakan dan peran dosen (Pengajar) dan mahasiswa (murid) dalam proses belajar mengajar tersebut. Deklarasi gerakan Indonesia Go Open Source atau IGOS oleh lima menteri pada tanggal 3 juni 2004 serta keharusan bagi seluruh instansi pemerintah untuk menggunakan perangkat lunak legal paling lambat Desember 2011 ikut mendorong perkembangan e-learning dengan menggunakan teknologi open source seperti Sistem Operasi Linux, Learning Management System LMS (moodle, Sakai, Dukeos), Blog (Wordpress, Joomla, Drupal), Netmeeting, Animasi dan Simulasi (Flash dan Blender). Tulisan ini akan membahas tentang pemanfaatan teknologi open source yang tersedia saat ini dalam pengembangan proses belajar jarak jauh khususnya di perguruan tinggi.
Sistem Keamanan Mobil dengan Multimedia Messages Services untuk Mencegah Terjadinya Pencurian Pramana, Daniel; Gozali, Ferrianto; Mardjoko, Pono Budi
TESLA: Jurnal Teknik Elektro Vol 18, No 2 (2016): TESLA: Jurnal Teknik Elektro
Publisher : Universitas Tarumanagara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24912/tesla.v18i2.174

Abstract

Security for car can be done in various ways, for instance the usage of steering wheel lock and car alarm. To prevent the car being stolen is better to use steering wheel lock but it is not able to protect what is inside the car, such as tape, accessories and the equipments inside the car. On the other hand car alarm has more advantages,  beside   preventing the car being   stolen also protecting the inside components. Disadvantages of the usage of car alarm is it if easily to be deceived by burglars, therefore a system which merged the technology of car alarm using sensor and microcontroller with technology of SMS and MMS that support the media sending of text and picture. The aim of the system is as if the car being stolen, the owner   of the car can get the information about the stolen by SMS and the picture of the suspect can be seen by MMS, so that it helps the authority to blow the case. From  experiment,  infrared sensor and  ultrasonic sensor can be used to detect motions in the car, the sending of  SMS and MMS worked out well based on the system.
SISTEM PENGENDALIAN PENYALURAN MINYAK TANAH SECARA OTOMATIS Gozali, Ferrianto; Subambang K., Subambang K.; Roni, Roni
TESLA Jurnal Teknik Elektro UNTAR Vol 9, No 1 (2007): Marct 2007
Publisher : Universitas Tarumanagara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (44.084 KB)

Abstract

Sampai dengan saat ini minyak tanah masih sangat banyak dimanfaatkan oleh masyarakat Indonesia. Karena hal ini, maka pada distributor minyak tanah sering terjadi antrian para pedagang eceran yang sangat panjang untuk berebutan membeli minyak tanah. Sehingga proses pembelian minyak tanah akan memakan waktu yang cukup lama. Atas dasar pemikiran diatas, maka pada dirancang suatu Sistem Pengendalian Penyaluran Minyak Tanah secara Otomatis dengan input dari kartu pelanggan yang berupa kartu magnetik. Semua bagian ini dikendalikan oleh suatu sistem perangkat lunak menggunakan Delphi 7.0 dan program assembly ASM51.