Papers by Dr. Edy Winarno
In general, thesis examiners have opposing viewpoints. Despite the fact that the assessment param... more In general, thesis examiners have opposing viewpoints. Despite the fact that the assessment parameters are the same, each examiner can provide a different standard of evaluation. Group decision making can be used to solve problems in the assessment of thesis exams involving a large number of examiners. Group decision making can be used to solve problems in the assessment of thesis exams involving a large number of examiners. In the group's decision-making process, this paper provided fuzzy numbers at the arithmetic interval. Decisions that generally give a vague knowledge of decision-making information and cannot estimate their decision-making information with exact numerical values are used to determine the thesis exam. According to the case study, the fuzzy approach is used to solve the problem, and evaluation alternatives are used to determine the thesis exam. According to the results of the triangular fuzzy approach, the option to repeat the exam (A2) has the highest value and recommended to be a decision.
The fingerprint identification system is a recognition process by measuring the characteristics o... more The fingerprint identification system is a recognition process by measuring the characteristics on human fingers and then comparing them with those in the database. The purpose of this study is to create a system for fingerprints recognition using the edge detection method and Grey Level Co-occurrence Matrix (GLCM). The method used in this fingerprint recognition research is texture analysis. Preprocessing was performed with edge detection and feature extraction with GLCM method. First, the fingerprint is captured using the fingerprint scanner. Then the fingerprint image was extracted using the Grey Level Co-occurrence Matrix (GLCM) feature. The features obtained are energy, contrast, homogeneity and correlation. The final result of the fingerprint identification system is the success of displaying the image with the identity data of the fingerprint owner. Using two methods, fingerprint identification accuracy of 83% was achieved.
2021 7th International Conference on Electrical, Electronics and Information Engineering (ICEEIE), Oct 2, 2021
Oil palm disease can be identified by the appearance of yellowish spots on the leaf area. It caus... more Oil palm disease can be identified by the appearance of yellowish spots on the leaf area. It causes a decrease in the quality and quantity of palm oil. Therefore, this work has developed a method for leaf disease identification using image processing to quantify the infected area’s pixels and extract the color features. The region of interest (ROI) detection was initially performed by applying Otsu thresholding based on $\mathrm{L}^{\star}\mathrm{a}^{\star}\mathrm{b}$ color space to obtain the sub-image called ROI image. Afterward, pre-processing was performed by converting RGB to several color spaces and using contrast stretching. The features extracted the mean value intensity of each channel on five color spaces and counting the pixel number of the infected area. Those features were reduced using correlation-based feature selection (CFS) followed by k-nearest neighbors (KNN) classification. The dataset used consists of 100 leaf images (50 healthy and 50 unhealthy). The method performance achieved accuracy, precision, and recall of 99%, 98%, and 100%.
The COVID-19 virus outbreak has continued to spread since the end of 2019 worldwide. All people a... more The COVID-19 virus outbreak has continued to spread since the end of 2019 worldwide. All people also implement health protocols not to contract this disease. One of the health protocols that must be implemented is to limit interactions between humans to a length of 1–2 meters or what is usually done with social distancing. Social distance detection system to ensure that people do not violate social distancing could be a solution to this problem. Using the YOLO-v5 method, which is the latest version of the YOLO (You Only Look Once) method with a detection speed of up to 140 Frames Per Second (FPS) and 90 percent smaller than the previous version, this system detects people who violate social distancing and then gives a voice warning to keep their distance to avoid spreading the COVID-19 virus. The human detection rate in the detection system reaches 93,5%, and the accuracy for social distance detection reaches 95%. Based on the research that has been done, it can be said that this system can work well for detecting social distance, but the detection will start detecting the distance between the camera and the object exceeding 10 meters.
Bisnis jual beli melalui internet sedang mengalami pertumbuhan yang sangat pesat, termasuk untuk ... more Bisnis jual beli melalui internet sedang mengalami pertumbuhan yang sangat pesat, termasuk untuk kalangan pengguna internet di Indonesia. Jumlah toko online pun semakin meningkat dan ragam produk yang ditawarkan semakin bervariasi. Ini merupakan sebuah peluang bagi siapa saja untuk berbisnis secara online melalui media situs e-commerce. Melalui buku ini, Anda akan belajar menginstal dan menggunakan CMS Joomla dan WordPress, kemudian menginstal plugins untuk membuat toko online, dan bagaimana melakukan manajemen transaksi dengan toko online tersebut, dari mulai pembelian sampai pasca pembelian. Pembahasan selengkapnya meliputi: Mengunduh Joomla dan menyiapkan server, Manajemen awal CMS Joomla, Pengaturan opsi, konfigurasi, dan produk di JoomShopping, Manajemen transaksi, Mengunduh dan menginstal WordPress, Mengatur toko dan manajemen produk, Pemrosesan pembelia
Buku ini membahas bagaimana belajar pemrograman dengan VB.NET dari nol menggunakan Visual Studio ... more Buku ini membahas bagaimana belajar pemrograman dengan VB.NET dari nol menggunakan Visual Studio versi terakhir. Anda akan dipandu mulai dari instalasi dan pengenalan antarmuka Visual Studio, pemahaman sintaks VB.NET, dan dasar-dasar pemrogramannya, termasuk penggunaan database dalam pembuatan aplikasi dekstop
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
Speaker recognition is a field of research that continues to this day. Various methods have been ... more Speaker recognition is a field of research that continues to this day. Various methods have been developed to detect the human voice with greater precision and accuracy. Research on human speech recognition that is quite challenging is accent recognition. Detecting various types of human accents with different accents and ethnicities with high accuracy is a research that is quite difficult to do. According to the results of the research on the data preprocessing stage, feature extraction and selection of the right classification method play a very important role in determining the accuracy results. This study uses a preprocessing approach with normalizing features combined with MFCC as a method to perform feature extraction and the neural network (NN), which is a classification method that works based on the workings of the human brain. Research results obtained using the normalize feature with MFCC and neural network for multiaccent speaker recognition, the accuracy performance rea...
IEEE Access
The quality of encryption is dependent on the complexity of the confusion-diffusion pattern and t... more The quality of encryption is dependent on the complexity of the confusion-diffusion pattern and the quality of the keystream employed. To enhance complexity and randomness, this study proposes a combination of multiple interleaved patterns, including Zigzag, Hilbert, and Morton patterns to complicate the confusion-diffusion. The keystream is generated from the improved logistic map and the 6D hyperchaotic map, which complement each other due to their sensitivity to initial conditions and control parameters. This produces highly random and nonlinear keystreams, making them difficult to predict. The encryption process consists of four phases, alternating between diffusion and confusion. Furthermore, SHA-512 is used to enhance key space and sensitivity. Based on the test results, the proposed encryption technique can withstand various attacks, such as statistics, differential, brute force, and NIST randomness tests, as well as data loss and noise attacks. Most of the results are better than previous studies. INDEX TERMS 6D hyperchaotic system, image encryption, improved logistic map, multi-interleaved encryption, novel confusion-diffusion pattern.
Journal of Industrial Engineering and Management
The research was conducted by researchers at Trienggadeng State Vocational School located on Jl B... more The research was conducted by researchers at Trienggadeng State Vocational School located on Jl Banda Aceh-Medan KM 152, Kec. Trienggadeng Regency. Pidie Jaya. This research is based on the importance of the network in the ongoing teaching and learning process in the network and computer labs, the network in the lab is currently not managed properly and the distribution of bandwidth is not evenly distributed. To get a good internet connection, it is necessary to distribute bandwidth evenly, which can be done using a proxy router. One of the features for distributing bandwidth evenly in the proxy router can be applied using the simple queue and queue tree methods, knowing network quality can be done using Quality of Service (QoS) measurements. This study aims to determine the analysis of network quality using Qos on proxy routers using the simple queue and queue tree methods. The method used in this study is to use the action research method (action research), the stages of the resea...
JINAV: Journal of Information and Visualization
One of the reasons why it is vital to forecast fisher production data in coastal regions is to in... more One of the reasons why it is vital to forecast fisher production data in coastal regions is to increase fish resource management efficiency. By calculating the number of fishing boats, the amount of fish that must be caught, and the amount of raw materials required for fish processing based on the anticipated amount of fishermen's production in the following period, decision-makers can determine the amount of fish that must be caught and the amount of raw materials required for fish processing. So that the objective of the research is to forecast fishermen's production data using the Single Exponential Smoothing method, this method is effectively used to perform forecasting of time series data with short period data intervals to produce forecasts for the next period, and it can measure the rate of change of fishermen's production data each period. The results of forecasting data on fishermen's production utilizing time series data intervals from October 2022 to Janua...
Jurdimas (Jurnal Pengabdian Kepada Masyarakat) Royal
Online learning at the elementary, kindergarten and PAUD levels leaves many problems. The problem... more Online learning at the elementary, kindergarten and PAUD levels leaves many problems. The problem from the teacher's point of view is that they have to provide gadgets that can be used in operating, managing online meetings and providing internet quotas in organizing meetings and online learning. In making learning media, teachers must also provide computers that can be used in making multimedia-based learning media. The problem that is quite serious is that teachers are not yet ready to manage online classroom learning and the readiness to make learning materials using multimedia-based learning tools that can attract students' attention. Efforts that can be carried out to face the challenges of limited capacity and ability of teachers in designing and making multimedia-based learning media are increasing teacher competence through training and mentoring. To achieve this goal, it is necessary to hold training or mentoring for PAUD teachers. This training is carried out by introducing and providing tutorials on how to use Microsoft Power Point software. The result of this service is the teacher's understanding of making multimedia-based learning media that can be seen from discussions and questions and answers. In addition, the results of this service increase the ability of teachers in software application for making learning media.
PT Elex Media Komputindo, 2013
vii + 179 hl
PHP yang merupakan singkatan rekursif dari PHP Hypertext Preprocessor adalah bahasa pemrograman o... more PHP yang merupakan singkatan rekursif dari PHP Hypertext Preprocessor adalah bahasa pemrograman open source. PHP merupakan bahasa scripting server-side yang digunakan untuk mengolah data melalui CGI. Script PHP bekerja di komputer server untuk menghasilkan kode HTML yang dikirimkan ke web browser. PHP adalah bahasa pemrograman web masa kini. Ia telah digunakan di 244 juta website dan 2,1 juta web server. Singkatnya, PHP adalah bahasa pemrograman wajib bagi Anda yang ingin mengembangkan web sesuai dengan imajinasi Anda. Buku ini menjelaskan semua hal tentang pemrograman PHP dari nol. Setiap topik disertai contoh implementasi kode untuk menghasilkan program yang berbobot.
Bulletin of Electrical Engineering and Informatics, 2018
CRT was a widely used algorithm in the development of watermarking methods. The algorithm produce... more CRT was a widely used algorithm in the development of watermarking methods. The algorithm produced good image quality but it had low robustness against compression and filtering. This paper proposed a new watermarking scheme through dual band IWT to improve the robustness and preserving the image quality. The high frequency sub band was used to index the embedding location on the low frequency sub band. In robustness test, the CRT method resulted average NC value of 0.7129, 0.4846, and 0.6768 while the proposed method had higher NC value of 0.7902, 0.7473, and 0.8163 in corresponding Gaussian filter, JPEG, and JPEG2000 compression test. Meanwhile the both CRT and proposed method had similar average SSIM value of 0.9979 and 0.9960 respectively in term of image quality. The result showed that the proposed method was able to improve the robustness and maintaining the image quality.
Journal of Physics: Conference Series, 2018
Image magnification is one of the branches in digital image processing that is often required in ... more Image magnification is one of the branches in digital image processing that is often required in various applications such as in the field of medicine, multimedia, and in satellite imagery. As technology grows, more and more methods are used for image enlargement. In this study, the image enlargement process performs by using Bi-Cubic spline interpolation method, and the result of image try to compare between the original one and picture after enlargement.
Journal of Physics: Conference Series, 2018
This study examined the three most widely used Multi-Attribute Decision-Making (MADM) methods in ... more This study examined the three most widely used Multi-Attribute Decision-Making (MADM) methods in alternative decision making of Electrical Expert (EE) selection: hybrid AHP (Analytic Hierarchy Process) and TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution) method, Weight Product (WP), Simple Additive Weighting (SAW). The advantages and limitations of each parameter are identified to assist decision makers in selecting the right MADM technique. The essence of MADM is to determine the weighting value for each parameter, followed by the rank which will select the given alternatives. The difference in the ranking order of this method is due to the effects of alternative values, weighting criteria, and calculation methods. AHP is a MADM method that has consistency in giving weighting to its parameters while TOPSIS, SAW and WP methods have no consistency. The results of the decision-making process using WP and SAW methods show similar results for alternative rankings. The WP and SAW methods have the same core process of calculating the weighted average parameters. The use of the AHP-TOPSIS hybrid method in the decision-making process produces the same top ranking as any other method. The AHP-TOPSIS hybrid method has a consistency in the weighting process on its parameters.
Journal on Computing and Cultural Heritage
Several countries have traditional textiles as a piece of their cultural heritage. Indonesia has ... more Several countries have traditional textiles as a piece of their cultural heritage. Indonesia has a traditional textile called batik. Central Java is one of the regions producing batik known for its variety of distinctive themes. It has unique designs and several motifs that emphasize the beauty of historic sites. Since the diversity of central java batik motifs and the lack of knowledge from the surrounding community, only a select group of people, especially the batik craftsmen themselves, can recognize these motifs. Consequently, the method to identify the batik according to the primary ornament pattern is required. Therefore, this study proposes a computer vision-based method for classifying batik patterns. The proposed method required discriminating appropriate features to produce optimal results. The discriminating features were constructed based on color, shape, and texture. Those features were derived using the method of Color Moments, Area Based Invariant Moments, Gray Level...
Uploads
Papers by Dr. Edy Winarno
Buku Membuat Sendiri Aplikasi Android untuk Pemula ini akan mengajarkan kepada Anda cara membuat aplikasi Android untuk dijalankan pada piranti digital berbasis Android. Pembahasan meliputi pengenalan tentang perkembangan Android, persiapan hardware dan software yang diperlukan, hingga bahasan-bahasan teknis pemrogramannya.
HTML 5 adalah versi terakhir dari HTML yang membawa beberapa fitur baru untuk Web 2.0. Buku ini membahas bagaimana melakukan pemrograman dengan HTML 5 serta bagaimana memadukannya dengan PHP server side programming agar aplikasi web lebih powerful.
Anda akan belajar bagaimana menggunakan software-software pendukung untuk membuat presentasi, dari latex, flash, sampai editing gambar. Melalui buku ini, Anda akan menguasai bagaimana teknik mempercantik dan membuat presentasi lebih hidup.
Pembahasan dalam buku mencakup:
Latex Beamer
Mencari Quote dan Dictionary
Mencari Bahan dengan Slidefinder dan
PDF Finder
Mencari Sound dan Movie Clip
Google Presentation
Presentation Minimizer
Sharing Presentasi Online
Online Tool Tambahan
Screen Casting
Mudah Membuat Website dan e-Commerce dengan PHP Framework ini menjelaskan cara membuat sendiri website dan e-commerce menggunakan CodeIgniter.
Dengan berbagai latihan dan contoh-contoh yang disediakan di sini, Anda pasti bisa membuat sendiri website komunitas atau toko online dengan tampilan menarik dan fungsi yang canggih.
Buku ini membahas bagaimana membangun jaringan komputer super berbasis nirkabel (wireless) maupun kabel (wired) yang bisa dibangun dengan modal minimalis. Bahkan untuk jaringan wireless, ternyata ada teknik yang memungkinkan Anda membuat jaringan tanpa harus keluar rupiah, hanya bermodal satu laptop saja.
Pembahasan dalam buku mencakup:
Pengenalan Jaringan
Topologi Jaringan
Membuat Jaringan Wireless
Membuat Jaringan Berkabel
Sharing File dan Printer
Tool-Tool Tambahan Jaringan
Salah satu teknik untuk membantu pengusaha bisa efisien, efektif, dan cepat dalam bekerja adalah dengan menggunakan piranti komputer. Piranti komputer sendiri menyediakan software yang cakupannya sangat luas untuk keperluan bisnis.
Ada software accounting, software invoicing, stok gudang, point of sales, hingga software spreadsheet yang bisa dipakai untuk banyak keperluan. Selain itu masih ada banyak software lainnya.
Buku ini membahas software-software top untuk bisnis bagi pengusaha, utamanya bagi pengusaha kecil dan menengah
Paket suites yang terdiri dari banyak software ini bisa digunakan untuk bisnis; terutama software spreadsheet, database, manajemen projek, dan juga lainnya.
Buku ini membahas studi kasus bagaimana memanfaatkan software Microsoft Office (all version) untuk mendukung bisnis, didasarkan pada contoh studi kasus.
Anda akan mempelajari mulai dari bagaimana membuat surat bisnis dan label harga dengan Microsoft Word, membuat sistem inventory melalui Microsoft Excel, membangun Point of Sales dan Customer Relationship Management (CRM) dengan Microsoft Access, menyiapkan presentasi online dengan Microsoft PowerPoint, mengelola rekrutmen SDM dengan Microsoft InfoPath, hingga mengelola proyek dengan Microsoft Project.
Dengan mempelajari buku ini, Anda akan mampu menemukan solusi yang hemat, tepat, praktis untuk beragam kebutuhan bisnis Anda.
Pada akhirnya, bisnis Anda pun akan semakin berjalan lebih efektif dan efisien.
PHP bisa dipakai di berbagai skala pengembangan web, dari mulai blog, ecommerce, dan sebagainya.
Salah satu masalah para programmer pemula untuk mengembangkan website dengan PHP adalah kurangnya contoh bagaimana membuat berbagai jenis aplikasi web yang umum, misalnya membuat password lengkap dengan captcha, halaman admin, prinsip cart, komentar, CRUD database, dan sebagainya.
Buku ini menyediakan contoh kode PHP untuk skenario-skenario umum seperti pembuatan password bercaptcha, halaman admin, cart, paging, dan CRUD yang lazim di database.
Dengan contoh kode-kode ini, Anda bisa memperoleh solusi cepat bagaimana melakukan pemrograman PHP untuk berbagai keperluan, dari mulai website biasa, blog, shopping cart, integrasi dengan situs social media, serta apapun jenis aplikasi yang Anda perlukan.
Tentu saja dalam pengoperasiannya ada tip dan trik yang bisa digunakan untuk membuat pengoperasiannya menjadi lebih mudah, efisien dan efektif.
Buku ini membahas aneka tip dan trik Blackberry dan Android yang bisa Anda terapkan sehari-hari.
Tapi sebenarnya di internet, banyak juga tool hacking yang bisa Anda gunakan untuk melakukan hacking pada komputer Anda sendiri atau komputer orang lain. Tapi tunggu dulu, dengan menggunakan software-software ini, Anda tidak perlu khawatir bahwa hacking hanya bisa dipakai untuk kejahatan, tapi juga bisa membantu Anda untuk mengetahui cara kerja hacker, sehingga Anda bisa mengamankan komputer atau sistem Anda dari hacker.
Di buku ini akan dijelaskan tentang pengertian hacking, lalu penjelasan tentang tool hacking dan terakhir bagaimana menghindarkan diri dari hacker agar tidak bisa merusak komputer Anda.
Nah, begitu juga Android.
Kemudahan daya gunanya dan platformnya yang terbuka membuat hack di Android dapat dilakukan dengan mudah.
Di buku ini Anda akan belajar melakukan programming dan beberapa tip hack untuk Android level advanced agar Anda bisa mendayagunakan Android Anda dengan lebih perkasa.
Pembahasan dalam buku mencakup:
Pengaturan Layout User Interface
Mengatur Event dari User (Touch dan Gesture)
Menangani Multimedia - Antarmuka Hardware
Berinteraksi dengan Device via SMS dan Web Browsing
Menyimpan Data dengan Efisien Menggunakan SQlite dan Alternatifnya
Pemrograman Android Berbasis Lokasi (Info BTS, GPS, dan Google Maps)
Teknik Optimasi dan Hack Android
Buku ini menjelaskan tentang berbagai teknologi pembuatan website mobile dengan tool WYSIWYG populer, Adobe Dreamweaver.
Yang dibahas di buku ini antara lain:
- HTML 5
- CSS 3
- Cara Desain dan Konversi Website ke HTML 5
- Penggunaan Berbagai Komponen jQuery Mobile
- Praktek Membuat Website Mobile
Sehingga tiap komponen komputer bisa bekerja tidak optimal dan rusak, dari mulai kerusakan ringan hingga kerusakan berat. Tiap kerusakan tersebut perlu diagnosis dan perlakuan yang berbeda.
Buku ini menjelaskan beragam prosedur reparasi dan upgrade yang harus Anda lakukan jika mengalami kerusakan pada hal-hal tertentu. Anda akan belajar melakukannya sendiri sehingga dengan demikian, penguasaan Anda terhadap komputer akan semakin baik.
Pembahasan dalam buku mencakup:
- Konfigurasi Sistem
- Prosesor
- Memori
- Hard Drive
- Sound Card
- Video Card
- Motherboard
- Dan masih banyak lainnya
Forensik sendiri adalah kegiatan proses investigasi peranti komputer atau peranti simpannya, untuk menentukan apakah peranti ini digunakan untuk keperluan yang ilegal, tidak sah, atau tidak biasa.
Dengan menggunakan berbagai tool yang dijelaskan di buku ini, diharapkan Anda juga bisa menjadi mahir melakukan pengumpulan informasi, analisis data, dan tahapan lain dari kegiatan forensik.
Anda akan diajari agar mahir melakukan:
- Pengumpulan data volatil
- Analisis data
- Penggunaan software The Sleuth Kit (TSK)
- Penggunaan software EnCase untuk keperluan forensik
Artinya, sebenarnya hardware di komputer dijalankan di bawah spek aslinya. Ini untuk menjaga stabilitas.
Namun, Anda bisa meng-hack hardware di komputer Anda. Hacking hardware bertujuan untuk mengoptimalkan dan men-tweak hardware sehingga hardware bisa melakukan apa yang Anda inginkan dengan lebih baik lagi.
Ada banyak teknik untuk melakukan hacking hardware secara aman. Anda bisa melakukannya hanya dengan memakai software saja, tidak perlu mengubah konfigurasi fisik komputer.
Teknik ini lebih aman, karena pada umumnya konfigurasi hack Anda bisa dikembalikan karena tersimpan di sesi Windows saja. Pembahasan dalam buku mencakup:
- Software untuk Hack Processor
- Software untuk Hack Memory
- Software untuk Hack Video Card
- Software Pendukung Lainnya
Buku juga akan menjelaskan cara memanfaatkan layanan-layanan jaringan, yang bisa diterapkan untuk berbagai versi sistem operasi Windows. Pembahasan disajikan secara lengkap, dari dasar hingga advanced, disertai tip dan trik yang bermanfaat.
Buku ini menjelaskan cara penggunaan Visual Basic 6.0 untuk melakukan pemrograman. Pembahasan dimulai dari awal instalasi, pengenalan kode dan sintaks, pembuatan program sederhana, hingga pemrograman database dan pelaporannya.
Juga akan dijelaskan bagaimana cara membuat sebuah installer program yang sudah jadi sehingga mudah diinstalasikan ke komputer-komputer lain. Semua materi dibahas mulai dari nol sehingga cocok bagi pemula dan mahasiswa yang baru belajar pemrograman sekalipun.