Pub Date : 2022-08-01DOI: 10.20895/infotel.v14i3.777
Dewi Agustini Santoso, Gutama Indra Gandha
Carbon monoxide is a type of pollutant that is harmful to human health and the environment. On the other hand, carbon monoxide also has benefits for industrial matter. Since the benefits and disadvantages of carbon monoxide, the measurement of carbon monoxide concentration is required. The measurement of carbon monoxide level is not easy moreover with low-cost sensors. The usage of 4 sensors namely TGS2611, TGS2612, TGS2610 and TGS2602 has been used along with feature extractor. The polynomial classifier is required to interpret the feature vector into the amount of substance concentration. The common classifier methods suffer fatal limitations. The polynomial classifiers method offers lower complexity in solution and lower computational effort. Since the involvement of a huge number of data points in the modelling process leads to high degree in the polynomial model. The occurrence of Runge's phenomenon is highly possible in this condition. This phenomenon affects the accuracy level of the generated model. The degree reduction algorithm is required to prevent the occurrence of Runge’s phenomenon. The combination of MAF (Mean Average Filter) and derivative approach as degree reductor algorithm has succeeded in reducing the polynomial model degree. The greater the number degree in the model means the greater the computational load. The model degree reductor algorithm has been succeeded to reduce computational load by 96.6%.
一氧化碳是一种对人类健康和环境有害的污染物。另一方面,一氧化碳对工业物质也有好处。由于一氧化碳的优点和缺点,需要测量一氧化碳浓度。一氧化碳水平的测量并不容易,而且使用低成本的传感器。与特征提取器一起使用了4个传感器,即TGS2611、TGS2612、TGS2610和TGS2602。多项式分类器需要将特征向量解释为物质浓度的量。常见的分类器方法受到致命的限制。多项式分类器方法提供了较低的求解复杂度和较低的计算工作量。由于在建模过程中涉及大量的数据点,导致多项式模型的阶数很高。在这种情况下,龙格现象的发生是极有可能的。这种现象会影响生成的模型的精度水平。为了防止Runge现象的发生,需要采用降阶算法。将MAF(Mean Average Filter)和导数方法相结合作为降阶算法,成功地降低了多项式模型的阶数。模型中的次数越多,意味着计算负载就越大。模型度约简算法已成功地将计算量减少了96.6%。
{"title":"The reduction of polynomial degrees using moving average filter and derivative approach to decrease the computational load in polynomial classifiers","authors":"Dewi Agustini Santoso, Gutama Indra Gandha","doi":"10.20895/infotel.v14i3.777","DOIUrl":"https://doi.org/10.20895/infotel.v14i3.777","url":null,"abstract":"Carbon monoxide is a type of pollutant that is harmful to human health and the environment. On the other hand, carbon monoxide also has benefits for industrial matter. Since the benefits and disadvantages of carbon monoxide, the measurement of carbon monoxide concentration is required. The measurement of carbon monoxide level is not easy moreover with low-cost sensors. The usage of 4 sensors namely TGS2611, TGS2612, TGS2610 and TGS2602 has been used along with feature extractor. The polynomial classifier is required to interpret the feature vector into the amount of substance concentration. The common classifier methods suffer fatal limitations. The polynomial classifiers method offers lower complexity in solution and lower computational effort. Since the involvement of a huge number of data points in the modelling process leads to high degree in the polynomial model. The occurrence of Runge's phenomenon is highly possible in this condition. This phenomenon affects the accuracy level of the generated model. The degree reduction algorithm is required to prevent the occurrence of Runge’s phenomenon. The combination of MAF (Mean Average Filter) and derivative approach as degree reductor algorithm has succeeded in reducing the polynomial model degree. The greater the number degree in the model means the greater the computational load. The model degree reductor algorithm has been succeeded to reduce computational load by 96.6%.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48971135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stemming is the process of separating the root word from an affixed word in a sentence by separating the base word and affixes which can consist of prefixes (prefixes), insertions (infixes), and suffixes (suffixes). Between one language and another, there are differences in the algorithm, especially the stemming process, in morphology. The time complexity of the Rejang algorithm is determined based on the affix group. To find out the time complexity of the stemming algorithm in the Rejang language using the method of making a digital word dictionary of the Rejang language, studying and analyzing the morphology of the Rejang language, making the Rejang language stemming algorithm based on the results of the Rejang language morphology analysis, analyzing the algorithm's performance and calculating the time complexity of the stemming results. The result of this research is to produce an efficient and effective Rejang Language stemming algorithm, where efficiency is indicated by the algorithm's time complexity of O(log n), and the effectiveness is shown from the results of accuracy of 99% against the test of 9000 affixed words. This accuracy value indicates that the over stemming and under stemming processes are 1%. Test results on 15 text documents with an average stemming failure rate of 1%.
{"title":"Time complexity in rejang language stemming","authors":"SastyaHendri Wibowo, Rozali Toyib, Muntahanah Muntahanah, Yulia Darnita","doi":"10.20895/infotel.v14i3.764","DOIUrl":"https://doi.org/10.20895/infotel.v14i3.764","url":null,"abstract":"Stemming is the process of separating the root word from an affixed word in a sentence by separating the base word and affixes which can consist of prefixes (prefixes), insertions (infixes), and suffixes (suffixes). Between one language and another, there are differences in the algorithm, especially the stemming process, in morphology. The time complexity of the Rejang algorithm is determined based on the affix group. To find out the time complexity of the stemming algorithm in the Rejang language using the method of making a digital word dictionary of the Rejang language, studying and analyzing the morphology of the Rejang language, making the Rejang language stemming algorithm based on the results of the Rejang language morphology analysis, analyzing the algorithm's performance and calculating the time complexity of the stemming results. The result of this research is to produce an efficient and effective Rejang Language stemming algorithm, where efficiency is indicated by the algorithm's time complexity of O(log n), and the effectiveness is shown from the results of accuracy of 99% against the test of 9000 affixed words. This accuracy value indicates that the over stemming and under stemming processes are 1%. Test results on 15 text documents with an average stemming failure rate of 1%.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46282485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.20895/infotel.v14i3.751
Intan Nur Farida, Umi Mahdiyah, Akbar Fastio Hari Setiawan
Evaluation of student learning in Islamic boarding schools is still limited to the results of exams conducted in writing which can lead to the determination of student achievement using simple criteria, resulting in less than optimal results. In addition, the importance of selecting criteria to suit the learning characteristics of the Islamic boarding school students. The purpose of this study is to assist the process of evaluating student learning based on the value of the criteria, sub-criteria, and priorities. The method used is Rank Order Centroid in assigning weight values to the criteria applied to the Simple Multi-Attribute Rating Technique Exploiting Ranks (SMARTER) and Multi-Objective Optimization By Ratio Analysis (MOORA) methods. This study produces the same alternative value in the first rank. To calculate the accuracy is done by using sensitivity analysis according to the results of preference values in each method. Based on the sensitivity analysis shows that in the first sensitivity calculation the lowest value is obtained. The sensitivity value of the SMARTER method on the first sensitivity is 0.0714. While the first sensitivity value of the MOORA method is 0.0076. So the best method is owned by the MOORA method because it has the lowest sensitivity value.
{"title":"Sensitivity analysis of the SMARTER and MOORA methods in decision making of achieving students","authors":"Intan Nur Farida, Umi Mahdiyah, Akbar Fastio Hari Setiawan","doi":"10.20895/infotel.v14i3.751","DOIUrl":"https://doi.org/10.20895/infotel.v14i3.751","url":null,"abstract":"Evaluation of student learning in Islamic boarding schools is still limited to the results of exams conducted in writing which can lead to the determination of student achievement using simple criteria, resulting in less than optimal results. In addition, the importance of selecting criteria to suit the learning characteristics of the Islamic boarding school students. The purpose of this study is to assist the process of evaluating student learning based on the value of the criteria, sub-criteria, and priorities. The method used is Rank Order Centroid in assigning weight values to the criteria applied to the Simple Multi-Attribute Rating Technique Exploiting Ranks (SMARTER) and Multi-Objective Optimization By Ratio Analysis (MOORA) methods. This study produces the same alternative value in the first rank. To calculate the accuracy is done by using sensitivity analysis according to the results of preference values in each method. Based on the sensitivity analysis shows that in the first sensitivity calculation the lowest value is obtained. The sensitivity value of the SMARTER method on the first sensitivity is 0.0714. While the first sensitivity value of the MOORA method is 0.0076. So the best method is owned by the MOORA method because it has the lowest sensitivity value.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42220820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.20895/infotel.v14i3.796
M. Harahap, Sai Kumarani Anjelli, Widy Anggun M. Sinaga, Ryan Alward, Junio Fegri Wira Manawan, A. M. Husein
The image of chronic wounds on human skin tissue has the similar look in shape, color and size to each other even though they are caused by different diseases. Diabetic ulcer is a condition where peripheral arterial blood vessels are disrupted due to hyperglycemia in people with diabetes mellitus. This research was aimed to analyze the accuracy of the Convolutional Neural Network algorithm in classifying diabetic ulcer disease with a transfer learning approach based on the appearance of the image of the wound on the sole in people with diabetes mellitus. By applying the transfer learning approach, the results showed that the Resnet152V2 model achieved the best accuracy value of 0.993 (99%), precision of 1.00, recall of 0.986, F1-Score of 0.993 and Support of 72. Therefore, the ResNet152V2 model was highly considered for classifying diabetic ulcer in patients with diabetes melitus.
{"title":"Classification of diabetic foot ulcer using convolutional neural network (CNN) in diabetic patients","authors":"M. Harahap, Sai Kumarani Anjelli, Widy Anggun M. Sinaga, Ryan Alward, Junio Fegri Wira Manawan, A. M. Husein","doi":"10.20895/infotel.v14i3.796","DOIUrl":"https://doi.org/10.20895/infotel.v14i3.796","url":null,"abstract":"The image of chronic wounds on human skin tissue has the similar look in shape, color and size to each other even though they are caused by different diseases. Diabetic ulcer is a condition where peripheral arterial blood vessels are disrupted due to hyperglycemia in people with diabetes mellitus. This research was aimed to analyze the accuracy of the Convolutional Neural Network algorithm in classifying diabetic ulcer disease with a transfer learning approach based on the appearance of the image of the wound on the sole in people with diabetes mellitus. By applying the transfer learning approach, the results showed that the Resnet152V2 model achieved the best accuracy value of 0.993 (99%), precision of 1.00, recall of 0.986, F1-Score of 0.993 and Support of 72. Therefore, the ResNet152V2 model was highly considered for classifying diabetic ulcer in patients with diabetes melitus.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41355304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.20895/infotel.v14i3.791
Sandhy Fernandez, Muhammad Imanullah, M. Y. Fathoni, Pahrizal Pahrizal
Information and communication technology services at the University of Muhammadiyah Bengkulu are IT services that support IT needs in all sectors. Of all the IT services that have been implemented at this institution, there is one very crucial service, namely the internet connection service, where this internet connection service is needed by all existing information technology access. In managing this internet connection, a standardized feasibility calculation has not been carried out which results in it not being in accordance with the institutional business needs. Information technology governance is a process that is able to manage investment decisions related to Information Technology within the company in order to achieve the company's current and future needs. To achieve standardized governance, this research uses the COBIT 2019 framework which is the latest version of the development results from COBIT 5. The purpose of this study is to identify the extent to which the value of existing processes for internet connection services is currently and the value of the process achievement that refers to the standard. COBIT 2019 by calculating the maturity level value which represents the level of performance on internet connection services. From the results of the 2019 COBIT Design, LTIK Muhammadiyah Bengkulu University, it is known that those who score above 80 or must reach Capability Level 4 are APO13, BAI10, DSS02, DSS03 and DSS04, for a value of 100 there is APO12.
{"title":"Utilization of the COBIT 2019 framework to identify the level of governance in internet services","authors":"Sandhy Fernandez, Muhammad Imanullah, M. Y. Fathoni, Pahrizal Pahrizal","doi":"10.20895/infotel.v14i3.791","DOIUrl":"https://doi.org/10.20895/infotel.v14i3.791","url":null,"abstract":"Information and communication technology services at the University of Muhammadiyah Bengkulu are IT services that support IT needs in all sectors. Of all the IT services that have been implemented at this institution, there is one very crucial service, namely the internet connection service, where this internet connection service is needed by all existing information technology access. In managing this internet connection, a standardized feasibility calculation has not been carried out which results in it not being in accordance with the institutional business needs. Information technology governance is a process that is able to manage investment decisions related to Information Technology within the company in order to achieve the company's current and future needs. To achieve standardized governance, this research uses the COBIT 2019 framework which is the latest version of the development results from COBIT 5. The purpose of this study is to identify the extent to which the value of existing processes for internet connection services is currently and the value of the process achievement that refers to the standard. COBIT 2019 by calculating the maturity level value which represents the level of performance on internet connection services. From the results of the 2019 COBIT Design, LTIK Muhammadiyah Bengkulu University, it is known that those who score above 80 or must reach Capability Level 4 are APO13, BAI10, DSS02, DSS03 and DSS04, for a value of 100 there is APO12.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44229222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.20895/infotel.v14i3.758
Fauza Khair, D. Zulherman, Rifani Auliana
Free Space Optic (FSO) is the solution for telecommunications technology that offers high data rates, wide bandwidth, and low power consumption. However, to maximize the performance of the FSO system, the modulation used should be considered in environmental conditions. This study aims to compare the performance of the FSO communication link based on digital modulation variations used in various weather conditions, including sunny, rainy, and foggy weather. This study uses two attenuation models, namely the Kim and Kruse models, with variations in transmission distance from 500 meters to 10 kilometers. Modulation variations used include QPSK, 8-PSK, 16-PSK, and 16-QAM at 10 Gbps bitrate. The simulation is accomplished using OptiSystem 17.0 software. The study results show that sunny weather (very clear) has the best visibility compared to rain and fog conditions with an attenuation value of 0.46 dB/km on the Kim and Kruse models. QPSK modulation has the best performance with a BER value of less than 1x10-12 up to a transmission distance of 8 km in sunny weather, 3 km in rainy weather (medium rain), and 800 m in foggy (moderate fog) weather. The 8-PSK modulation has a BER value of less than 1x10-12 with a range of 2000 m in sunny weather and 1500 m in rainy weather but does not meet the standards in foggy weather conditions. 16-PSK and 16-QAM modulation have above baseline BER values during rainy and foggy conditions, but 16-QAM modulation still has a BER value of less than 1x10-3 during foggy conditions at a distance of 500 m.
{"title":"Software-based simulation to analyze the variation of digital modulation and atmospheric condition on the free space optic (FSO) link performance","authors":"Fauza Khair, D. Zulherman, Rifani Auliana","doi":"10.20895/infotel.v14i3.758","DOIUrl":"https://doi.org/10.20895/infotel.v14i3.758","url":null,"abstract":"Free Space Optic (FSO) is the solution for telecommunications technology that offers high data rates, wide bandwidth, and low power consumption. However, to maximize the performance of the FSO system, the modulation used should be considered in environmental conditions. This study aims to compare the performance of the FSO communication link based on digital modulation variations used in various weather conditions, including sunny, rainy, and foggy weather. This study uses two attenuation models, namely the Kim and Kruse models, with variations in transmission distance from 500 meters to 10 kilometers. Modulation variations used include QPSK, 8-PSK, 16-PSK, and 16-QAM at 10 Gbps bitrate. The simulation is accomplished using OptiSystem 17.0 software. The study results show that sunny weather (very clear) has the best visibility compared to rain and fog conditions with an attenuation value of 0.46 dB/km on the Kim and Kruse models. QPSK modulation has the best performance with a BER value of less than 1x10-12 up to a transmission distance of 8 km in sunny weather, 3 km in rainy weather (medium rain), and 800 m in foggy (moderate fog) weather. The 8-PSK modulation has a BER value of less than 1x10-12 with a range of 2000 m in sunny weather and 1500 m in rainy weather but does not meet the standards in foggy weather conditions. 16-PSK and 16-QAM modulation have above baseline BER values during rainy and foggy conditions, but 16-QAM modulation still has a BER value of less than 1x10-3 during foggy conditions at a distance of 500 m.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48224867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.20895/infotel.v14i3.759
V. Prabowo, Linda Meylani, Ersa Rahma Aqila Majid, A. A. Muayyadi
Fast growing number of cellular telecommunication technology resulting on the increasing number of the user equipment. This condition increased the eNodeB load. To overcome this problem, the device-to-device (D2D) underlaying communication is introduced. In underlaying scheme, the D2D user equipment (DUE) will do the communication process using the same radio resources with the conventional cellular user equipment (CUE). To avoid a severe interference between these two types of user in the system, a good resource allocation is needed. In this work, a power control scheme using particle swarm optimization (PSO) is proposed, to manage the transmit power on each user on the system. The power control scheme take place after the greedy scheduling algorithm, after all user is given a resource block (RB) to do the communication process. The power transmit for each user is managed to reach a better system capacity, and to reduce the power consumed in one communication process. From the simulation, the PSO power control can improve the sumrate and spectral efficiency up to 12.97% and 3.38% respectively. The PSO power control also can reduce the power consumed by the system up to 8.84%. The fairness happens among the CUEs also can be maintained, despite of the decreasing fairness among DUEs.
{"title":"Power control scheme using particle swarm optimization method in resource allocation process on D2D underlaying communication","authors":"V. Prabowo, Linda Meylani, Ersa Rahma Aqila Majid, A. A. Muayyadi","doi":"10.20895/infotel.v14i3.759","DOIUrl":"https://doi.org/10.20895/infotel.v14i3.759","url":null,"abstract":"Fast growing number of cellular telecommunication technology resulting on the increasing number of the user equipment. This condition increased the eNodeB load. To overcome this problem, the device-to-device (D2D) underlaying communication is introduced. In underlaying scheme, the D2D user equipment (DUE) will do the communication process using the same radio resources with the conventional cellular user equipment (CUE). To avoid a severe interference between these two types of user in the system, a good resource allocation is needed. In this work, a power control scheme using particle swarm optimization (PSO) is proposed, to manage the transmit power on each user on the system. The power control scheme take place after the greedy scheduling algorithm, after all user is given a resource block (RB) to do the communication process. The power transmit for each user is managed to reach a better system capacity, and to reduce the power consumed in one communication process. From the simulation, the PSO power control can improve the sumrate and spectral efficiency up to 12.97% and 3.38% respectively. The PSO power control also can reduce the power consumed by the system up to 8.84%. The fairness happens among the CUEs also can be maintained, despite of the decreasing fairness among DUEs.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43724946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.20895/infotel.v14i3.717
Tati Ernawati, Febi Febiansyah
The resources of information technology and the availability of services on non-cloud network systems are limited. This constitutes problems for companies, especially in the efficient management of information technology. The high investment in infrastructure procurement is an obstacle in building centralized systems, including the adoption of cloud computing through Infrastructure as a Service (IaaS), as an elective solution. This research aims to analyze the performance of cloud servers on IaaS services using the parameters of cloud service availability, resource utilization, and throughput transfer which were implemented in companies engaged in the toll road concession sector. Furthermore, the results are expected to be a reference in supporting company decisions/policies related to cloud system adoption. The methodology involved the Network Development Life Cycle (NDLC), a system constituted by 6 (six) stages of management, namely user, proxy server, database, web service, monitoring service, and Remote Desktop Protocol (RDP). The results of cloud service availability indicate that the cloud system provides service availability (system interface, broad network access, and resource pooling). Furthermore, cloud systems have a significant performance on resource utilization (CPU) and throughput transfer parameters, while non-cloud systems only excel in response time and resource utilization (Memory) parameters. The overall result analysis based on this research scenario showed that the cloud system provides services according to user needs and has a better speed in data transmission, but has shortcomings in response time.
{"title":"Peer to peer (P2P) and cloud computing on infrastructure as a service (IaaS) performance analysis","authors":"Tati Ernawati, Febi Febiansyah","doi":"10.20895/infotel.v14i3.717","DOIUrl":"https://doi.org/10.20895/infotel.v14i3.717","url":null,"abstract":"The resources of information technology and the availability of services on non-cloud network systems are limited. This constitutes problems for companies, especially in the efficient management of information technology. The high investment in infrastructure procurement is an obstacle in building centralized systems, including the adoption of cloud computing through Infrastructure as a Service (IaaS), as an elective solution. This research aims to analyze the performance of cloud servers on IaaS services using the parameters of cloud service availability, resource utilization, and throughput transfer which were implemented in companies engaged in the toll road concession sector. Furthermore, the results are expected to be a reference in supporting company decisions/policies related to cloud system adoption. The methodology involved the Network Development Life Cycle (NDLC), a system constituted by 6 (six) stages of management, namely user, proxy server, database, web service, monitoring service, and Remote Desktop Protocol (RDP). The results of cloud service availability indicate that the cloud system provides service availability (system interface, broad network access, and resource pooling). Furthermore, cloud systems have a significant performance on resource utilization (CPU) and throughput transfer parameters, while non-cloud systems only excel in response time and resource utilization (Memory) parameters. The overall result analysis based on this research scenario showed that the cloud system provides services according to user needs and has a better speed in data transmission, but has shortcomings in response time.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48452897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.20895/infotel.v14i3.793
Kelvin Leonardi Kohsasih, Muhammad Dipo Agung Rizky, Rika Rosnelly, Willy Wira Widjaja
Deep learning techniques have been widely used in everything from analyzing medical information to tools for making medical diagnoses. One of the most feared diseases in modern medicine is a brain tumor. MRI is a radiological method that can be used to identify brain tumors. However, manual segmentation and analysis of MRI images is time-consuming and can only be performed by a professional neuroradiologist. Therefore automatic recognition is required. This study propose a deep learning method based on a hybrid multi-layer perceptron model with Inception-v3 to predict brain tumors using MRI images. The research was conducted by building the Inception-v3 and multilayer perceptron model, and comparing it with the proposed model. The results showed that the hybrid multilayer perceptron model with inception-v3 achieved accuracy, recall, precision, and fi-score of 92%. While the inception-v3 and multilayer perceptron models only obtained 66% and 56% accuracy, respectively. This research shows that the proposed model successfully predicts brain tumors and improves performance
{"title":"A deep learning model to detect the brain tumor based on magnetic resonance images","authors":"Kelvin Leonardi Kohsasih, Muhammad Dipo Agung Rizky, Rika Rosnelly, Willy Wira Widjaja","doi":"10.20895/infotel.v14i3.793","DOIUrl":"https://doi.org/10.20895/infotel.v14i3.793","url":null,"abstract":"Deep learning techniques have been widely used in everything from analyzing medical information to tools for making medical diagnoses. One of the most feared diseases in modern medicine is a brain tumor. MRI is a radiological method that can be used to identify brain tumors. However, manual segmentation and analysis of MRI images is time-consuming and can only be performed by a professional neuroradiologist. Therefore automatic recognition is required. This study propose a deep learning method based on a hybrid multi-layer perceptron model with Inception-v3 to predict brain tumors using MRI images. The research was conducted by building the Inception-v3 and multilayer perceptron model, and comparing it with the proposed model. The results showed that the hybrid multilayer perceptron model with inception-v3 achieved accuracy, recall, precision, and fi-score of 92%. While the inception-v3 and multilayer perceptron models only obtained 66% and 56% accuracy, respectively. This research shows that the proposed model successfully predicts brain tumors and improves performance","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44674260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-31DOI: 10.20895/infotel.v14i2.754
A. Eska
The communication network for cellular network keep development. This research analyzed about cellular network was used drone network. The mobile drone used frequency at 10 GHz for communication. The mobile drone moved around buildings. Buildings were used high variation. Base Station placed around building. This research was using macro diversity Base Station, variation building, variation modulation, and variation height of drone trajectory. Macro diversity mechanism used for that two Base Station. Selection Combining (SC) method was used for that macro diversity mechanism. The modulation communication based from Adaptive Modulation and Coding (AMC). Adaptive Modulation and Coding (AMC) was used Modulation and coding scheme (MCS). Modulation was used QPSK, 16 QAM, and 64 QAM. As the result described signal to noise ratio (SNR) at every node communication, probability MCS, and percentage coverage of drone trajectory. MCS probability for 64 QAM become increased with selection combining method. The percentages coverage of drone trajectory was obtained 77.2% of the first BS, 66.8% of the second BS, and 87.2% with SC method.
{"title":"Receiver diversity with selection combining for drone communication around buildings at frequency 10 GHz","authors":"A. Eska","doi":"10.20895/infotel.v14i2.754","DOIUrl":"https://doi.org/10.20895/infotel.v14i2.754","url":null,"abstract":"The communication network for cellular network keep development. This research analyzed about cellular network was used drone network. The mobile drone used frequency at 10 GHz for communication. The mobile drone moved around buildings. Buildings were used high variation. Base Station placed around building. This research was using macro diversity Base Station, variation building, variation modulation, and variation height of drone trajectory. Macro diversity mechanism used for that two Base Station. Selection Combining (SC) method was used for that macro diversity mechanism. The modulation communication based from Adaptive Modulation and Coding (AMC). Adaptive Modulation and Coding (AMC) was used Modulation and coding scheme (MCS). Modulation was used QPSK, 16 QAM, and 64 QAM. As the result described signal to noise ratio (SNR) at every node communication, probability MCS, and percentage coverage of drone trajectory. MCS probability for 64 QAM become increased with selection combining method. The percentages coverage of drone trajectory was obtained 77.2% of the first BS, 66.8% of the second BS, and 87.2% with SC method.","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48706673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}