Pub Date : 2022-11-01DOI: 10.20895/infotel.v14i4.808
Abdul Karim Batubara, Franindya Purwaningtyas, Raissa Amanda Putri
In conducting collaborative research involving more than one researcher, a system is needed that can improve the performance of researchers in various ways. This study captures the challenges faced by researchers in collaborative research and defines the requirements for collaborative research systems needed to address these challenges. From the analysis of the needs obtained, the researchers designed a collaboration application interface. Collaboration applications are needed to facilitate communication between researchers, search for articles, share publications, and other applications. The distribution of questionnaires and interviews were conducted to obtain the requirements needed for the development of a collaboration system. This research informs system developers to support the development of collaborative systems. In this study, the level of need for a research collaboration system in the university environment will be analyzed along with an analysis of its needs and the design of the user interface.
{"title":"User requirements and interface design for collaboration research applications using user experience design process","authors":"Abdul Karim Batubara, Franindya Purwaningtyas, Raissa Amanda Putri","doi":"10.20895/infotel.v14i4.808","DOIUrl":"https://doi.org/10.20895/infotel.v14i4.808","url":null,"abstract":"In conducting collaborative research involving more than one researcher, a system is needed that can improve the performance of researchers in various ways. This study captures the challenges faced by researchers in collaborative research and defines the requirements for collaborative research systems needed to address these challenges. From the analysis of the needs obtained, the researchers designed a collaboration application interface. Collaboration applications are needed to facilitate communication between researchers, search for articles, share publications, and other applications. The distribution of questionnaires and interviews were conducted to obtain the requirements needed for the development of a collaboration system. This research informs system developers to support the development of collaborative systems. In this study, the level of need for a research collaboration system in the university environment will be analyzed along with an analysis of its needs and the design of the user interface.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47899862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Computer networks are built to achieve the main goal of communicating with each other . During the transmission process, it is expected that information can be conveyed quickly, efficiently and safely. Network security serves to avoid damage or even data loss caused by attacker activities during the communication process. Security aspects that need to be maintained in data information are Confidentiality, Integrity and Availability. Intrusion Prevention System is a solution that can maintain network security from various attacks. The Intrusion Prevention System will act as a protector on the network by detecting and preventing suspicious traffic on nodes in a network. The Intrusion Prevention System in its implementation has several tools which are used in this study, namely Snort and IPTables. Testing is done by performing attacks on the Web Server. The attacks carried out are Port Scanning, DDoS attacks and Brute Force. The results of this study are based on the CIA Triad with the three attacks having different characteristics in terms of cause and effect. On the defense side, Port Scanning and Brute Force can be easily prevented by IPS, but in DDoS attacks there are differences in results between drop and reject rule. In a DDoS attack with an action drop rule, it can recover the web server in 160 seconds while the action reject rule can be restored at 145 seconds which normally can be recovered in a DDoS attack in 165 seconds. The IPS server can also reduce resources when there is a DDoS attack by 9.2% .
{"title":"Implementation of intrusion prevention system (IPS) to analysis triad cia on network security attacks on web server","authors":"Amilia Anggraeni, Jafaruddin Gustri Amri Ginting, Syariful Ikhwan","doi":"10.20895/infotel.v14i4.813","DOIUrl":"https://doi.org/10.20895/infotel.v14i4.813","url":null,"abstract":"Computer networks are built to achieve the main goal of communicating with each other . During the transmission process, it is expected that information can be conveyed quickly, efficiently and safely. Network security serves to avoid damage or even data loss caused by attacker activities during the communication process. Security aspects that need to be maintained in data information are Confidentiality, Integrity and Availability. Intrusion Prevention System is a solution that can maintain network security from various attacks. The Intrusion Prevention System will act as a protector on the network by detecting and preventing suspicious traffic on nodes in a network. The Intrusion Prevention System in its implementation has several tools which are used in this study, namely Snort and IPTables. Testing is done by performing attacks on the Web Server. The attacks carried out are Port Scanning, DDoS attacks and Brute Force. The results of this study are based on the CIA Triad with the three attacks having different characteristics in terms of cause and effect. On the defense side, Port Scanning and Brute Force can be easily prevented by IPS, but in DDoS attacks there are differences in results between drop and reject rule. In a DDoS attack with an action drop rule, it can recover the web server in 160 seconds while the action reject rule can be restored at 145 seconds which normally can be recovered in a DDoS attack in 165 seconds. The IPS server can also reduce resources when there is a DDoS attack by 9.2% .","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43385622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.20895/infotel.v14i4.812
Emy Setyaningsih, Satriawan Dini Hariyanto, Dewi Wahyuningtyas, Samuel Kristiana
Plastic shredding plays an essential role in the plastic waste recycling process. Plastic waste can be enumerated manually using a knife and scissors or a crushing machine. The use of a shredder machine to chop plastic waste, especially those whose primary drive is an electric motor, often experience problems. The main obstacle is the need for high power consumption (more than 1 HP) and the reliability of the drive elements against overheating. Overheating can damage the electrical circuit components that connect the power supply to electric motors, especially AC electric motors, causing a lot of loss in terms of performance and user safety. Internet of Things (IoT) technology is widely used to minimize energy resources by automating various systems. This study proposed the design of a shredder machine with a control system using IoT technology integrated with a shredder and conveyor machine designed using the Quantity Functional Diagram (QFD) method. The advantages of the shredder machine presented in this study are that it can operate at home using electric power, is more flexible, and minimizes overheating with an IoT-based overheating controller. This research succeeded in keeping the temperature of the electric motor of the shredder machine stable at a temperature of 40℃-55℃. The average delay of the IoT module to control on and off the shredder machine design system in this study is 219 ms and 200 ms, which are in the good category according to the Telecommunications and Internet Protocol Harmonization Over Network (TIPHON) standard.
{"title":"Performance improvement of the shredder machines using IoT-based overheating controller feature","authors":"Emy Setyaningsih, Satriawan Dini Hariyanto, Dewi Wahyuningtyas, Samuel Kristiana","doi":"10.20895/infotel.v14i4.812","DOIUrl":"https://doi.org/10.20895/infotel.v14i4.812","url":null,"abstract":"Plastic shredding plays an essential role in the plastic waste recycling process. Plastic waste can be enumerated manually using a knife and scissors or a crushing machine. The use of a shredder machine to chop plastic waste, especially those whose primary drive is an electric motor, often experience problems. The main obstacle is the need for high power consumption (more than 1 HP) and the reliability of the drive elements against overheating. Overheating can damage the electrical circuit components that connect the power supply to electric motors, especially AC electric motors, causing a lot of loss in terms of performance and user safety. Internet of Things (IoT) technology is widely used to minimize energy resources by automating various systems. This study proposed the design of a shredder machine with a control system using IoT technology integrated with a shredder and conveyor machine designed using the Quantity Functional Diagram (QFD) method. The advantages of the shredder machine presented in this study are that it can operate at home using electric power, is more flexible, and minimizes overheating with an IoT-based overheating controller. This research succeeded in keeping the temperature of the electric motor of the shredder machine stable at a temperature of 40℃-55℃. The average delay of the IoT module to control on and off the shredder machine design system in this study is 219 ms and 200 ms, which are in the good category according to the Telecommunications and Internet Protocol Harmonization Over Network (TIPHON) standard.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45091104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.20895/infotel.v14i4.832
Nur Ghaniaviyanto Ramadhan, Merlinda Wibowo, Nur Fatin Liyana Mohd Rosely, C. Quix
Indonesia is a country led by a president. The term of the leadership of a president will be democratically elected every five years. The current president will end his term of office in 2024. So that in that year, the people will hold a direct general election to determine the president between 2024 and 2029. Before the general election was held in Indonesia itself, it was thick related to the campaign for each presidential candidate carried out by his supporters. The campaign is carried out directly to village locations and on social media Twitter/Facebook/YouTube. His campaign writing on Twitter is exciting to analyze. Even now, many tweets related to the 2024 presidential election contain various opinions from the public. This study will examine the sentiment of someone's tweet to see the public's statement regarding the 2024 presidential election. The resulting sentiment categories are positive, negative, and neutral, and the word tweet related to the sentiment category will be visualized. The results of the sentiment category will then be classified using a tree-based method, namely a decision tree. The accuracy generated by applying the decision tree method is 99.3%. The decision tree method is also superior to the regression-based way by 2.5%.
{"title":"Opinion mining indonesian presidential election on twitter data based on decision tree method","authors":"Nur Ghaniaviyanto Ramadhan, Merlinda Wibowo, Nur Fatin Liyana Mohd Rosely, C. Quix","doi":"10.20895/infotel.v14i4.832","DOIUrl":"https://doi.org/10.20895/infotel.v14i4.832","url":null,"abstract":"Indonesia is a country led by a president. The term of the leadership of a president will be democratically elected every five years. The current president will end his term of office in 2024. So that in that year, the people will hold a direct general election to determine the president between 2024 and 2029. Before the general election was held in Indonesia itself, it was thick related to the campaign for each presidential candidate carried out by his supporters. The campaign is carried out directly to village locations and on social media Twitter/Facebook/YouTube. His campaign writing on Twitter is exciting to analyze. Even now, many tweets related to the 2024 presidential election contain various opinions from the public. This study will examine the sentiment of someone's tweet to see the public's statement regarding the 2024 presidential election. The resulting sentiment categories are positive, negative, and neutral, and the word tweet related to the sentiment category will be visualized. The results of the sentiment category will then be classified using a tree-based method, namely a decision tree. The accuracy generated by applying the decision tree method is 99.3%. The decision tree method is also superior to the regression-based way by 2.5%.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47943601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.20895/infotel.v14i4.814
Nungky Prameswari
One of the power converters that are often implemented in renewable energy applications is a DC-DC power converter. One of such converters is a step-down converter or buck converter whose output voltage is lower than its input. A novel DC-DC buck converter for low output-voltage and high output current applications is presented in this paper. When compared to the conventional buck converter, the voltage ratio of the proposed topology is higher. The output of this converter also has lower ripple. Thus, the proposed topology is appropriate for renewable applications. The operating principle and small-signal model analysis are discussed in detailed. Finally, a simulation studies is carried out by PSIM to verify performances of the offered topology
{"title":"Analysis and small-signal modeling of simplified cascade multiphase DC-DC buck converter","authors":"Nungky Prameswari","doi":"10.20895/infotel.v14i4.814","DOIUrl":"https://doi.org/10.20895/infotel.v14i4.814","url":null,"abstract":"One of the power converters that are often implemented in renewable energy applications is a DC-DC power converter. One of such converters is a step-down converter or buck converter whose output voltage is lower than its input. A novel DC-DC buck converter for low output-voltage and high output current applications is presented in this paper. When compared to the conventional buck converter, the voltage ratio of the proposed topology is higher. The output of this converter also has lower ripple. Thus, the proposed topology is appropriate for renewable applications. The operating principle and small-signal model analysis are discussed in detailed. Finally, a simulation studies is carried out by PSIM to verify performances of the offered topology","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48708821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.20895/infotel.v14i4.825
M. W. Gunawan, Naufal Ammar Priambodo, Melki Mario Gulo, A. Arifin, Yoedy Moegiharto, Hendy Briantoro
MIMO OFDM is the key technology of 4G network system. MIMO-OFDM system enhances the spectrum efficiency and increases the capacity of the system. The implementation of USRP hardware to MIMO OFDM system has been attracted some researchers to conduct the experiments. So we conduct the experiments in a MIMO OFDM system that applies the predistortion technique. In this experiment, we evaluate performances of the predistortion technique by using the artificial neural network. USRP 2920 hardware which is supported by LabVIEW and Phyton software are used in this experiment. OFDM system uses 128 subcarriers to produce an OFDM symbol, and MIMO system uses 2 antennas at transmitter and receiver side. And no obstacles between Tx and Rx, or line of sight transmission scenarios. The performances of the predistortion technique using the artificial neural network algorithm are shown in symbol constellations or Error Vector Magnitude (EVM) at the receiver. And the texts or characters are used as the input of the system. From the experiment results can be seen that the distance between Tx and Rx affects the Error Vector Magnitude (EVM) and predistortion technique produces the Error vector magnitude (EVM) improvement. More shorter the distance between Tx and Rx can decrease distortions of the received signal, At the transmitter side, the performance of predistortion technique is shown as the linearization improvement of the non-linearity power amplifier. Therefore more wider the linear region of power amplifier results the decreasing in band distortion of transmitted signal, and can be seen as the Error Vector Magnitude (EVM) improvement.
MIMO OFDM是4G网络系统的关键技术。MIMO-OFDM系统提高了频谱效率,增加了系统的容量。USRP硬件到MIMO OFDM系统的实现吸引了一些研究人员进行实验。因此,我们在应用预失真技术的MIMO OFDM系统中进行了实验。在这个实验中,我们使用人工神经网络来评估预失真技术的性能。实验采用LabVIEW支持的USRP 2920硬件和Phyton软件。OFDM系统使用128个子载波来产生OFDM符号,MIMO系统在发射机和接收机侧使用2个天线。Tx和Rx之间没有障碍,也没有视线传输场景。使用人工神经网络算法的预失真技术的性能以接收机处的符号星座或误差矢量幅度(EVM)表示。并且文本或字符被用作系统的输入。从实验结果可以看出,Tx和Rx之间的距离影响误差矢量幅度(EVM),预失真技术产生误差矢量幅度的改善。Tx和Rx之间的距离越短,可以减少接收信号的失真。在发射机侧,预失真技术的性能表现为非线性功率放大器的线性化改进。因此,功率放大器的线性区域越宽,传输信号的带内失真就越小,这可以看作是误差向量幅值(EVM)的提高。
{"title":"Evaluations of the predistortion technique by neural network algorithm in MIMO-OFDM system using USRP","authors":"M. W. Gunawan, Naufal Ammar Priambodo, Melki Mario Gulo, A. Arifin, Yoedy Moegiharto, Hendy Briantoro","doi":"10.20895/infotel.v14i4.825","DOIUrl":"https://doi.org/10.20895/infotel.v14i4.825","url":null,"abstract":"MIMO OFDM is the key technology of 4G network system. MIMO-OFDM system enhances the spectrum efficiency and increases the capacity of the system. The implementation of USRP hardware to MIMO OFDM system has been attracted some researchers to conduct the experiments. So we conduct the experiments in a MIMO OFDM system that applies the predistortion technique. In this experiment, we evaluate performances of the predistortion technique by using the artificial neural network. USRP 2920 hardware which is supported by LabVIEW and Phyton software are used in this experiment. OFDM system uses 128 subcarriers to produce an OFDM symbol, and MIMO system uses 2 antennas at transmitter and receiver side. And no obstacles between Tx and Rx, or line of sight transmission scenarios. The performances of the predistortion technique using the artificial neural network algorithm are shown in symbol constellations or Error Vector Magnitude (EVM) at the receiver. And the texts or characters are used as the input of the system. From the experiment results can be seen that the distance between Tx and Rx affects the Error Vector Magnitude (EVM) and predistortion technique produces the Error vector magnitude (EVM) improvement. More shorter the distance between Tx and Rx can decrease distortions of the received signal, At the transmitter side, the performance of predistortion technique is shown as the linearization improvement of the non-linearity power amplifier. Therefore more wider the linear region of power amplifier results the decreasing in band distortion of transmitted signal, and can be seen as the Error Vector Magnitude (EVM) improvement.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45804881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.20895/infotel.v14i4.799
B. S. Aprillia, K. O. Abdurohman
This study discusses efforts to model solar grid systems by considering economic and regulatory factors in system design. The Hybrid Optimization of Multiple Electric Renewables software is used to evaluate the economic viability of the on-grid PV technology that provides 2200VA of power in the household sector. Optimal costs are assessed from Net Present Cost (NPC) which is a cost analysis to determine investment feasibility based on interest rates and fees in the coming years and Break Even Point (BEP) which is the point where expenditure and income are balanced. The simulation results show that in the project period of 25 years the installation of on grid PV power system has an NPC that is 20% lower than the PLN network power supply with a BEP value lower than 15 years. The lowest NPC and BEP values were obtained from the installation of 7 PV panels with 300Wp capacity connected to the PLN network. This system is able to save electricity costs by IDR 23,060,260 compared to the use of 100% electricity from the State Electricity Enterprise grid. This system is worthy of being an economic tool for providing electricity services throughout the year and meeting rising energy demands in the household sector.
{"title":"Optimal planning on-grid power system for 2200VA household sector by considering economic criteria","authors":"B. S. Aprillia, K. O. Abdurohman","doi":"10.20895/infotel.v14i4.799","DOIUrl":"https://doi.org/10.20895/infotel.v14i4.799","url":null,"abstract":"This study discusses efforts to model solar grid systems by considering economic and regulatory factors in system design. The Hybrid Optimization of Multiple Electric Renewables software is used to evaluate the economic viability of the on-grid PV technology that provides 2200VA of power in the household sector. Optimal costs are assessed from Net Present Cost (NPC) which is a cost analysis to determine investment feasibility based on interest rates and fees in the coming years and Break Even Point (BEP) which is the point where expenditure and income are balanced. The simulation results show that in the project period of 25 years the installation of on grid PV power system has an NPC that is 20% lower than the PLN network power supply with a BEP value lower than 15 years. The lowest NPC and BEP values were obtained from the installation of 7 PV panels with 300Wp capacity connected to the PLN network. This system is able to save electricity costs by IDR 23,060,260 compared to the use of 100% electricity from the State Electricity Enterprise grid. This system is worthy of being an economic tool for providing electricity services throughout the year and meeting rising energy demands in the household sector.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41449663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.20895/infotel.v14i4.782
Muhammad Panji Praja, W. Pamungkas
The use of radar technology, especially for the interests of state defense and security, has become the focus of development launched by the government of Indonesia. Equipment and vehicles in the defense and security sector are the top priority to be detected using radar technology. When a radar transmitter transmits its signal towards a target, some part of the signal will bounce in all directions or scattering, including to the receiver and some will be absorbed by the radar target. The radar target is assumed to have a small size, with the aim of focusing more on the beamwidth of the radar transmitting antenna to the target. This research has a focus on measuring radar targets in the form of defense equipment in the form of tanks made in miniature which are smaller than their original forms. The selected antenna polarization uses linear polarization with vertical and horizontal types. Each polarization will be compared with the value of the radar cross section (RCS) in the combination of the same polarization and different polarization. The measurement results show that the largest RCS value is obtained at an angle of 200° by 13 with a combination of Horizontal-Horizontal polarization and the smallest RCS value is obtained at an angle of 50° by -4 with a combination of Horizontal-Vertical polarization. With the results of these measurements, it can be concluded that the measurement of RCS for defense and security equipment can be carried out by measuring the miniature of the defense and security equipment
{"title":"Linear polarization on radar cross section measurement for tank miniature","authors":"Muhammad Panji Praja, W. Pamungkas","doi":"10.20895/infotel.v14i4.782","DOIUrl":"https://doi.org/10.20895/infotel.v14i4.782","url":null,"abstract":"The use of radar technology, especially for the interests of state defense and security, has become the focus of development launched by the government of Indonesia. Equipment and vehicles in the defense and security sector are the top priority to be detected using radar technology. When a radar transmitter transmits its signal towards a target, some part of the signal will bounce in all directions or scattering, including to the receiver and some will be absorbed by the radar target. The radar target is assumed to have a small size, with the aim of focusing more on the beamwidth of the radar transmitting antenna to the target. This research has a focus on measuring radar targets in the form of defense equipment in the form of tanks made in miniature which are smaller than their original forms. The selected antenna polarization uses linear polarization with vertical and horizontal types. Each polarization will be compared with the value of the radar cross section (RCS) in the combination of the same polarization and different polarization. The measurement results show that the largest RCS value is obtained at an angle of 200° by 13 with a combination of Horizontal-Horizontal polarization and the smallest RCS value is obtained at an angle of 50° by -4 with a combination of Horizontal-Vertical polarization. With the results of these measurements, it can be concluded that the measurement of RCS for defense and security equipment can be carried out by measuring the miniature of the defense and security equipment","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47102729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-05DOI: 10.20895/infotel.v14i3.788
M. Hasibuan, RZ. Abdul Aziz
The two types of automatic learning style detection approaches are data driven (DD) and literature based (LB). Both methods of automatic learning style detection have advantages over traditional learning style detection methods because they use external data sources, such as forums, quizzes and views of teaching materials, that are more accurate than the questionnaires used in traditional styles of detection. The results of automatic detection, on the other hand, do not always reflect learning styles. This paper presents a learning style recognition method that uses data from the learner’s internal source, namely prior knowledge, to overcome these challenges. Prior knowledge is proposed because it is based on the learner’s knowledge or skills, which better reflect the learner’s characteristics, rather than on the learner’s behaviour, which tends to be dynamic. By using past knowledge, this paper presents a method for detecting automatic learning patterns. The learning style detection framework is unique in that it consists of three stages: prior knowledge question development, prior knowledge measurement and learning style detection using the Support Vector Machine (SVM), Naïve Bayes and K-Nearest Neighbour (K-NN) classification methods. The accuracy of learning style detection using prior knowledge data was higher than detection results using behavioural data or hybrid data (prior knowledge + behaviour) in this study
{"title":"Detection of learning styles with prior knowledge data using the SVM, K-NN and Naïve Bayes algorithms","authors":"M. Hasibuan, RZ. Abdul Aziz","doi":"10.20895/infotel.v14i3.788","DOIUrl":"https://doi.org/10.20895/infotel.v14i3.788","url":null,"abstract":"The two types of automatic learning style detection approaches are data driven (DD) and literature based (LB). Both methods of automatic learning style detection have advantages over traditional learning style detection methods because they use external data sources, such as forums, quizzes and views of teaching materials, that are more accurate than the questionnaires used in traditional styles of detection. The results of automatic detection, on the other hand, do not always reflect learning styles. This paper presents a learning style recognition method that uses data from the learner’s internal source, namely prior knowledge, to overcome these challenges. Prior knowledge is proposed because it is based on the learner’s knowledge or skills, which better reflect the learner’s characteristics, rather than on the learner’s behaviour, which tends to be dynamic. By using past knowledge, this paper presents a method for detecting automatic learning patterns. The learning style detection framework is unique in that it consists of three stages: prior knowledge question development, prior knowledge measurement and learning style detection using the Support Vector Machine (SVM), Naïve Bayes and K-Nearest Neighbour (K-NN) classification methods. The accuracy of learning style detection using prior knowledge data was higher than detection results using behavioural data or hybrid data (prior knowledge + behaviour) in this study","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47641155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.20895/infotel.v14i3.779
U. Ahmad, Ikbal Ramdani, Fath Muhammad Isham, Reza Septiawan, R. R. D. Setiady, A. Rusdinar, Ashri Dinimaharawati, Yusup Diva Pratama, Fauzi Sofyan, Rifdo Shah Alam
Along with the growth of Sindangsari's population, the water requirement in this village has increased. So, the drinking water company (PAMDES) in this village must be able to manage the available water to meet the necessities of public life. Now, the water company is still collecting and recording water meters manually. It is very risky to consider the water condition in the village because an officer can make a human error while recording the water meter's value. When the water meter recorder is damaged, the officer estimates the water meter's value. An application is needed to manage bills and record water meters to avoid this in previous studies using the Internet of Things (IoT) or mobile applications that must be sent online to the server in real-time. This solution is not suitable for the internet condition in Indonesia, which is not evenly distributed to remote villages. This study proposes to use a mobile application that can store data on mobile devices. When the internet connection is unavailable, it can be sent later when it is available again. In this study, data obtained that the condition of the meter recorder from 672 customers, 37 water meters recorder is damaged. In addition, water meter data is also obtained for the following month's bill and data on average water usage of 10,661m3 per month. With these data, it is found that the minimum water requirement is 10,661 m3 per month. It is hoped that the application for billing management and recording of PAMDES water meters in Sindangsari village, Cikoneng sub-district, Ciamis district can help increase PAMDES management capacity.
{"title":"Development of mobile billing application system for PAMDES water meter data logging","authors":"U. Ahmad, Ikbal Ramdani, Fath Muhammad Isham, Reza Septiawan, R. R. D. Setiady, A. Rusdinar, Ashri Dinimaharawati, Yusup Diva Pratama, Fauzi Sofyan, Rifdo Shah Alam","doi":"10.20895/infotel.v14i3.779","DOIUrl":"https://doi.org/10.20895/infotel.v14i3.779","url":null,"abstract":"Along with the growth of Sindangsari's population, the water requirement in this village has increased. So, the drinking water company (PAMDES) in this village must be able to manage the available water to meet the necessities of public life. Now, the water company is still collecting and recording water meters manually. It is very risky to consider the water condition in the village because an officer can make a human error while recording the water meter's value. When the water meter recorder is damaged, the officer estimates the water meter's value. An application is needed to manage bills and record water meters to avoid this in previous studies using the Internet of Things (IoT) or mobile applications that must be sent online to the server in real-time. This solution is not suitable for the internet condition in Indonesia, which is not evenly distributed to remote villages. This study proposes to use a mobile application that can store data on mobile devices. When the internet connection is unavailable, it can be sent later when it is available again. In this study, data obtained that the condition of the meter recorder from 672 customers, 37 water meters recorder is damaged. In addition, water meter data is also obtained for the following month's bill and data on average water usage of 10,661m3 per month. With these data, it is found that the minimum water requirement is 10,661 m3 per month. It is hoped that the application for billing management and recording of PAMDES water meters in Sindangsari village, Cikoneng sub-district, Ciamis district can help increase PAMDES management capacity.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42511976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}