Papers by Dany Eka Saputra
2022 International Conference on ICT for Smart Society (ICISS)
JOIV : International Journal on Informatics Visualization
Drones or quadcopters have been widely used in various fields based on deep learning, especially ... more Drones or quadcopters have been widely used in various fields based on deep learning, especially object detection. However, drone vision characteristics such as occlusion and small objects are still being explored for performance in terms of accuracy and speed detection. The YOLO architecture is very commonly used for cases requiring high-speed detection. To overcome the limitations of drone vision, in this paper, we explore the size of the YOLOv5s backbone kernel in the shallowest convolutional layer to achieve better performance. The kernel is a filter that has a main role in the feature map, and it defines the size of the convolution matrix, and the resulting features in the shallowest convolutional layer are more representative of the case of object detection and recognition. The techniques can be divided into three major categories: (1) data preprocessing, which involves augmentation and normalization of the data, (2) kernel size exploration in the shallowest convolutional laye...
2019 International Conference on ICT for Smart Society (ICISS)
The size, especially the growth rate, of blockchain has been a major problem since its introducti... more The size, especially the growth rate, of blockchain has been a major problem since its introduction in 2008. A common blockchain scheme will have exponential growth rate that affect the scalability of blockchain. To overcome this problem, complementary block is proposed. The blockchain is split into multiple chain where each block in a chain is a complementary of a block in another chain. The result shows that complementary block have smaller growth rate compared to original blockchain scheme. Despite its small data duplication, the complementary block still retains the same integrity level as the original blockchain.
2020 International Conference on Information Technology Systems and Innovation (ICITSI), 2020
The concept of trust has become a prevalent concept in modern IT. Due to the rising of cloud comp... more The concept of trust has become a prevalent concept in modern IT. Due to the rising of cloud computing, IoT, and social network, computer interaction has become more common. However, trust is still defined differently across those domains. It has various definition and computation method that can make understanding concept of trust difficult. This paper provides a formal description of trust that can be used to describe trust in more unified way. The formalization is constructed by using systematic literature review. Trust is defined as a Trustor’s level of confidence in regard to the ability of a Trustee to provide expected result in an interaction between Trustor and Trustee. This definition provides a base to a more detailed formal description about trust form and computation. The formal definition is shown to be able to explain implementation of two trust model in cloud computing and social network.
2021 Sixth International Conference on Informatics and Computing (ICIC), 2021
The most basic capability of an autonomous drone is its positioning capability. There is various ... more The most basic capability of an autonomous drone is its positioning capability. There is various method available to calculate a drone position. To help any new researcher on autonomous drone to choose their option on drone positioning system, a proper categorization is needed. This work provides a taxonomy of drone positioning system. The taxonomy categorizes drone positioning system into two major methods: vision-based and non-vision-based. The taxonomy further divides each method into several sub-method based on the equipment and calculation method. The taxonomy also provides the advantage and disadvantage of each method.
2021 International Conference on Data Science and Its Applications (ICoDSA), 2021
Object recognition has an important role in automation technology. There have been many research ... more Object recognition has an important role in automation technology. There have been many research and proposed methods to perform object recognition optimally. In object recognition, KNN classifier is one of the popular classification techniques used in object recognition systems. Many kinds of research done to compare the performance of KNN classifier with other classifiers in object recognition systems. However, no works are found reviewing the optimal implementation of the KNN classification method to achieve the best performance in object recognition systems. This paper reviews some research done on KNN based classification for object recognition systems and classify the research based on the type of image dataset used and the image visual features extracted used in the research. A total of 25 papers is classified into 2 main categories: image dataset of objects with cluttered background and image dataset of objects with a discarded background. The research is further classified into several different subcategories: color features, shape features, texture features, edge features, corner features, and interest points. A systematic literature review is done to find the optimal implementation of the KNN classification method in object recognition systems. The result of this paper shows the suitable type of image dataset of objects and the feature extraction technique used in KNN based object recognition, and the performance of KNN classifier in object recognition systems.
Abstrak – Pada pelajaran SMA terdapat materi berupa bentuk-bentuk molekul, namun dalam kegiatan b... more Abstrak – Pada pelajaran SMA terdapat materi berupa bentuk-bentuk molekul, namun dalam kegiatan belajar mengajar bentuk-bentuk molekul tersebut hanya dijelaskan melalui teks dan gambar dari buku. Dalam beberapa kasus siswa kesulitan dalam memahami materi karena gaya belajar yang kurang efektif sehingga dibuat pengembangan AR sebagai media pembelajaran anak SMA dalam mengenal bentukbentuk molekul yang biasanya hanya berupa teks dari buku menjadi pemodelan 3 dimensi. Aplikasi yang dibangun berupa sebuah aplikasi berbasis Android. Dalam aplikasi tersebut akan terdapat halaman kamera, pengguna nantinya dapat memindai gambar pola melalui kamera dengan mengarahkan kamera pada gambar pola, kemudian aplikasi akan menampilkan bentuk 3 dimensi dari bentuk-bentuk molekul yang berputar sehingga dapat dilihat secara detail. Aplikasi tersebut dibangun menggunakan Blender, Vuforia, serta Unity. Aplikasi yang dibangun dapat mengenali gambar pola dengan pemindaian dari berbagai arah kamera dengan ke...
Int. J. Netw. Secur., 2019
The vast variation of electronic cash scheme make it difficult to compare a scheme with another. ... more The vast variation of electronic cash scheme make it difficult to compare a scheme with another. We propose a general model of electronic cash. The development of the model uses logical modeling based on Inenaga et al. model of money system. The model consists of three submodel: the model of system, the model of process, and the model of property. The model of system describe the basic model of electronic cash data, entity, and form. The model of process enlist the common process found in electronic cash scheme. The model of property describes the common property in electronic cash scheme, including security property. We find that our model can be used as a base of security evaluation and covers wider variation of electronic cash scheme than the model in Inenaga et al.
Social Economics and Ecology International Journal (SEEIJ), 2020
Drone has been used for various commercial activity due to its flexibility and cost efficiency. H... more Drone has been used for various commercial activity due to its flexibility and cost efficiency. However, to ensure that each drone operation still obey safety regulation, each drone activity must be monitored and heavily regulated. The administrative process to fly a drone was cost and time consuming. All process must be conducted manually in Jakarta. This activity was conducted as part of consultancy for Directorate of Flight Navigation, Ministry of Transportation. The aim of this activity was to digitize the administrative process of drone operation. The result was a digitalization plan, which consist softwares needed for each administrative process, and implementation plan, which recommend the time and order of implementation.
2021 4th International Conference on Information and Communications Technology (ICOIACT), 2021
One of the methods to achieve context-aware appliance in smart energy concept is to use computer ... more One of the methods to achieve context-aware appliance in smart energy concept is to use computer vision. To develop a low-cost context-aware streetlight system, it is imperative to develop a computer vision system that can calculate the distance of a human using a single camera. This paper presents the result of experiment on distance calculation using a single camera. The experiment uses pinhole camera model and triangle similarity concept to measure human distance from a camera. The result of this experiment shows that for shorter distance, less than 200 cm, the calculation accuracy is quite good with less than 10% error from the actual distance. However, for longer distance the calculation error rose to 20%. This error is due to the difference between the reference height and the actual height of human target used in the experiment.
International Journal on Electrical Engineering and Informatics, 2018
Indonesia e-cash system faced with some challenges. Lack of proper network infrastructure impedes... more Indonesia e-cash system faced with some challenges. Lack of proper network infrastructure impedes the distribution of e-cash throughout the country. Most existing e-cash scheme designed for usage with proper network infrastructure, mainly for validating the transaction. Existing peer-to-peer e-cash scheme also require proper network infrastructure, either for public key request or deposit the received e-cash. This paper proposed a novel ecash scheme by building its e-cash data as chain of transaction (block chain) using identitybased signcryption as its security mechanism. The combination of block chain and identitybased signcryption make the e-cash peer-to-peer, transferable, and able to operate on ad hoc network. The Markov chain evaluation show that the proposed scheme can achieve security against forgery and double spending.
TELKOMNIKA (Telecommunication Computing Electronics and Control), 2018
Security evaluations of electronic cash (e-cash) schemes usually produce an abstract result in th... more Security evaluations of electronic cash (e-cash) schemes usually produce an abstract result in the form of a logical proof. This paper proposes a new method of security evaluation that produces a quantitative result. The evaluation is done by analyzing the protocol in the scheme using the Markov chain technique. This method calculates the probability of an attack that could be executed perfectly in the scheme's protocol. As proof of the effectiveness of our evaluation method, we evaluated the security of Chaum's untraceable electronic cash scheme. The result of our evaluation was compared to the evaluation result from the pi-calculus method. Both methods produced comparable results; and thus, both could be used as alternative methods for evaluating e-cash security.
TELKA - Telekomunikasi, Elektronika, Komputasi dan Kontrol, 2017
Pengujian peladen (server) yang sudah memasuki masa operasional menimbulkan beberapa masalah. Pel... more Pengujian peladen (server) yang sudah memasuki masa operasional menimbulkan beberapa masalah. Peladen yang berada diluar kuasa pihak penguji serta gangguan dari faktor eksternal dapat mempengaruhi hasil pengujian dan memberikan kesimpulan yang salah. Untuk itu, penelitian mengembangkan metode pengujian yang dapat mengatasi permasalahan tersebut. Metode dikembangkan untuk menguji penggunaan peladen VoIP melayani panggilan dari dan ke jaringan lokal yang berbeda. Pengujian dilakukan dengan memantau paket data yang dikirimkan selama percakapan menggunakan VoIP di perangkat percakapan. Hasil dari implementasi metode menunjukkan bahwa metode pengujian dapat memberikan kesimpulan mengenai peladen VoIP yang diuji.
2014 International Conference on Information Technology Systems and Innovation (ICITSI), 2014
The usage of electronic payment has been a daily occurrence to today society. Electronic cash (e-... more The usage of electronic payment has been a daily occurrence to today society. Electronic cash (e-cash) is a new kind of electronic payment. Therefore, the definition and scheme of e-cash is still not definite. However, the usage of e-cash is already increasing in rapid rate. For example, Suica Card in Japan and London's Oyster card. This paper review researches on e-cash from blind signature scheme to the famous BitCoin. From the review, we conclude that there are two kind of paradigm of e-cash, Centralized Paradigm and Decentralized Paradigm. The major difference between the two paradigms is their architecture of entity relationship. Centralized Paradigm has a single entity that oversees the system. Decentralized Paradigm is managed by community of users. We will show the properties of each paradigm and opportunity to improve each paradigm.
2015 International Conference on Information Technology Systems and Innovation (ICITSI), 2015
Electronic cash research has been done for at least 3 decades. On that period, there have been ma... more Electronic cash research has been done for at least 3 decades. On that period, there have been many researches resulting in various schemes and forms of electronic cash. This paper is reviewing some researches on that period and classify the research based on the basic science used in the research. A number of 43 papers is classified into 4 categories: protocol engineering, information security, cryptography, and system engineering. The result of this paper is information in research opportunity in electronic cash research.
International Conference on ICT for Smart Society, 2013
ABSTRACT
2014 International Conference on ICT For Smart Society (ICISS), 2014
Smart city is a new concept for developing and managing a modern city. It involve the usage of te... more Smart city is a new concept for developing and managing a modern city. It involve the usage of technology, especially information and communication technology, to monitor and understand the condition of a city then to act accordingly. Researches about the architecture of smart city, although the subject is relatively new, has taken the interest of many researcher and big technology company. However, every research mainly focus on the architecture and flow of information in a smart city. The researches left a hole in how the citizen interact and prove their identity in a smart city. This paper over a solution for citizen's identity authentication. The usage of single access key in form of physicalmetrics is proposed. The solution enables a citizen to access multiple services within smart city with a single device or identity.
MIND Journal, 2019
Saat ini pengunjung perpustakaan STMIK “AMIKBANDUNG” mengisi bukutamu dengan cara mengetik data d... more Saat ini pengunjung perpustakaan STMIK “AMIKBANDUNG” mengisi bukutamu dengan cara mengetik data diri secara lengkap baik sebagai member maupun non member. Dan cara tersebut sangat rentan terhadap manipulasi data, sedangkan validasi pengunjung perpustakaan sangat diperlukan untuk rekapituasi laporan pengunjung secara berkala dan pada saat dilakukan akreditasi perpustakaan. Sistem pencatatan pengunjung perpustakaan yang saat ini ada di perpustakaan STMIK “AMIKBANDUNG” memerlukan permbaharuan. Karena dampak dari pembaharuan yang dilakukan sangat baik bagi perpustakaan kampus. Maka dari itu, Penulis melakukan penambahan fitur pada aplikasi open source SLiMS. Desain bukutamu yang nantinya akan dibagi menjadi dua tipe yaitu member dan non member. Mahasiswa yang masuk kedalam kategori member hanya memasukan ID member kedalam form pencatatan buku tamu. Dan untuk non member, tetap mengisi data diri nya secara lengkap. Sehingga memudahkan juga petugas perpustakaan untuk melakukan rekapitulasi...
Uploads
Papers by Dany Eka Saputra