6 research outputs found
WATERMARKING METHOD OF REMOTE SENSING DATA USING STEGANOGRAPHY TECHNIQUE BASED ON LEAST SIGNIFICANT BIT HIDING
Remote sensing satellite imagery is currently needed to support the needs of information in various fields. Distribution of remote sensing data to users is done through electronic media. Therefore, it is necessary to make security and identity on remote sensing satellite images so that its function is not misused. This paper describes a method of adding confidential information to medium resolution remote sensing satellite images to identify the image using steganography technique. Steganography with the Least Significant Bit (LSB) method is chosen because the insertion of confidential information on the image is performed on the rightmost bits in each byte of data, where the rightmost bit has the smallest value. The experiment was performed on three Landsat 8 images with different area on each composite band 4,3,2 (true color) and 6,5,3 (false color). Visually the data that has been inserted information does not change with the original data. Visually, the image that has been inserted with confidential information (or stego image) is the same as the original image. Both images cannot be distinguished on histogram analysis. The Mean Squared Error value of stego images of all three data less than 0.053 compared with the original image. This means that information security with steganographic techniques using the ideal LSB method is used on remote sensing satellite imagery
PENINGKATAN KAPASITAS SISWA DAN ORANGTUA DI RW.22 PERUMMETLAND CILEUNGSI SEKTOR VII: MATEMATIKA DAN PELATIHAN GOOGLE MEET
Pengabdian masyarakat dilakukan di RW 22 Perum Metland Cileungsi Sektor VII untuk meningkatkan pemahaman matematika siswa dan kemampuan penggunaan Google Meet pada ibu-ibu. Kegiatan ini diilustrasikan oleh rendahnya pemahaman konsep matematika dan kurangnya penguasaan teknologi oleh ibu-ibu. Dalam empat bulan, kegiatan melibatkan30 siswa dan 20 ibu-ibu, menggunakan metode pengajaran matematika kontekstual dan media visual, serta pelatihan penggunaan Google Meet dengan pendekatan hands-on. Evaluasi melibatkan kuesioner, wawancara, dan tes hasil belajar. Hasil menunjukkan peningkatan pemahaman matematika, kecakapan penggunaan Google Meet, serta penerapan teknologi dalam pembelajaran matematika. Pelatihan dan modul pembelajaran matematika telah berhasilmeningkatkan daya saing siswa dan ibu-ibu. Pengabdian ini membuktikan pentingnya penerapan iptek dalam pendidikan dan memberikan rekomendasi kebijakan untuk pengembangan sumber belajar masyarakat. Dengan ini, kemampuan masyarakat dalam menghadapi era digital dapat ditingkatkan
Perancangan Jaringan Fiber To The Home Berbasis Gigabit Passive Optical Network Di Citra Garden Puri Cluste Denza
This research aims to design a GPON-based Fiber to The Home (FTTH) line in the Citra Garden Puri cluster Denza . The method used is to carry out field observations, by conducting surveys to determine the need for equipment that will be used in designing the route. After the survey is conducted, this project requires Google Earth Pro software to do the mapping of the spot that is used for the ODP and to create passages for the fiber. To make sure that all planning already meets the requirement, there are several calculationdone in this research such as; link loss budget, power link budget, power margin and risetime budget. The distance that were used in the calculation are calculated from the STO Cengkareng until the ONT on each customer. Based on the calculation, the result of the biggest loss for link loss budget are obtained from the upstream, in the amount of 22,0456 dB and the loss from downstream are equals to 21,5721 dB. The result that obtained for the upstream loss of power link budget are equals to -17,0456 dBm and -16,5172 dBm for downstream. The next calculation is power margin, from this project we obtained the lowest power margin for the upstream 6,9544 dB and 7,4288 dB for downstream. The last calculation obtained for this project is rise time budget, from the calculation the shortest data for the rise time budget upstream is 0,1001 ns and for the downstream is 0,1019 ns. Based on all the calculation, this project can be concluded as a success because all the calculation are between the boundary that is tolerated by PT Telkom.Penelitian ini bertujuan merancangan jalur Fiber to The Home ( FTTH) berbasis GPON di Citra Garden Puri cluster Denza. Metode yang digunakan adalah melakukan observasi lapangan, dengan cara melakukan survey guna mengetahui kebutuhan peralatan yang akan digunakan dalam perancangan jalur. Setelah melakukan survey lapangan, peneliti menggunakan aplikasi Google Earth Pro untuk merancang peletakan ODP dan merancang jalur FTTH. Perhitungan analisa perancangan dilakukan mulai dari jarak STO Cengkareng. Hasil perhitungan link loss budget terbesar yang diperoleh peneliti adalah 22,0456 dB untuk upstream dan 21,5712 dB untuk downstream. Selain itu hasil perhitungan loss power link budget terbesar adalah -17,0456 dBm untuk upstream, sedangkan -16,5712 dBm untuk downstream. Daya terkecil dari perhitungan power margin sebesar 6,9544 dB untuk upstream dan 7,4288 dB untuk downstream. Perhitungan rise time budget terkecil adalah sebesar 0,1001 ns untuk upstream, sedangkan untuk downstream sebesar 0,1019 ns. Bedasarkan perhitungan yang telah dilakukan, dapat dinyatakan bahwa perancangan layak untuk diterapkan karena semua hasil perhitungan telah memenuhi standarisasi PT. Telkom
Watermarking Method of Remote Sensing Data Using Steganography Technique Based on Least Significant Bit Hiding
Remote sensing satellite imagery is currently needed to support the needs of information in various fields. Distribution of remote sensing data to users is done through electronic media. Therefore, it is necessary to make security and identity on remote sensing satellite images so that its function is not misused. This paper describes a method of adding confidential information to medium resolution remote sensing satellite images to identify the image using steganography technique. Steganography with the Least Significant Bit (LSB) method is chosen because the insertion of confidential information on the image is performed on the rightmost bits in each byte of data, where the rightmost bit has the smallest value. The experiment was performed on three Landsat 8 images with different area on each composite band 4,3,2 (true color) and 6,5,3 (false color). Visually the data that has been inserted information does not change with the original data. Visually, the image that has been inserted with confidential information (or stego image) is the same as the original image. Both images cannot be distinguished on histogram analysis. The Mean Squared Error value of stego images of all three data less than 0.053 compared with the original image. This means that information security with steganographic techniques using the ideal LSB method is used on remote sensing satellite imagery.Hlm. 63-7
Implementasi metode k-medoids untuk masalah intrusion detection system menggunakan bahasa pemrograman matlab
Based on data from the National Cyber And Crypto Agency (BSSN) of the Republic of Indonesia from 2018 to 2021, the threat of cyber attacks continues to experience a significant increase. In 2021, a significant change that is likely to be faced is with the emergence of new smart devices, which are more than just end-users and remotely connected networked devices. Surely, gives it the attention of all parties. There are many types of cyberattacks including Malware, Phishing, Ransomeware, etc. IDS (Intrusion Detection System) is a method that can detect suspicious activity in a system or network. Implementation of the Fuzzy K-Medoids method by using the Matlab programming language that retrieves data from KDDCUP?99 which has been normalized. The data used are normal data and anomaly attack data which are categorized as DoS, Probe, R2L, and U2R. From the research conducted the accuracy percentage is around 60-89% with three types of data preprocessin
Implementasi Metode K-Medoids Untuk Masalah Intrusion Detection System Menggunakan Bahasa Pemrograman Matlab
Based on data from the National Cyber And Crypto Agency (BSSN) of the Republic of Indonesia from 2018 to 2021, the threat of cyber attacks continues to experience a significant increase. In 2021, a significant change that is likely to be faced is with the emergence of new smart devices, which are more than just end-users and remotely connected networked devices. Surely, gives it the attention of all parties. There are many types of cyberattacks including Malware, Phishing, Ransomeware, etc. IDS (Intrusion Detection System) is a method that can detect suspicious activity in a system or network. Implementation of the Fuzzy K-Medoids method by using the Matlab programming language that retrieves data from KDDCUP’99 which has been normalized. The data used are normal data and anomaly attack data which are categorized as DoS, Probe, R2L, and U2R. From the research conducted the accuracy percentage is around 60-89% with three types of data preprocessin