12 research outputs found

    Real-time Surveillance System Menggunakan Pencocokan Pola Metode Jaccard

    Full text link
      There are a lot of kinds of crime from low to high level as long as there is a chance. The police department in every country has tried to decrease crime's number, but in fact, the crime's number always grows every year. Instead of catching the criminal, we can minimize the crime by lowering the opportunity of criminal's action. For example, we can add a security device to protect our assets. We proposed the system to detect if there is someone entering the room by comparing pattern every couple of time. There are many pattern matching techniques, but the simple one is by counting its distance using Jaccard Method. If there is a different pattern from previous pattern that caught by a webcam, the system will create an alarm (sound and symbols). For these purpose, we use a capture application whose ability to capture an image periodically and the system that compare every image from previous capture. Testing result has shown that our proposed system could detect every people that come to the area of our webcam.   Keywords: Surveillance, Pattern Matching, Jaccar

    Service Availability dan Performa Sumber Daya Prosessor pada Infrastruktur Server Virtual

    Full text link
      Server that have high processor capacity and virtualization technology capabilities are generally not fully utilized optimally as they are only used to provide one application service. Virtualization is a technology that has the ability to empower the physical resources of a server to be built into multiple server machines virtually. In addition, the provision of the server is still using a single server, so that when a service failure caused by damage to its hardware or software components, the service availability to users will be disrupted. In this research will be developed the ability of server-based virtual server service and application of server failover as a technique in providing service availability. The method used in this research is through experimental approach and simulation is done by generating a number of request rate to the server. The process of testing and retrieving data is done by using several applications such as httperf generator, sysstat, and free. The result of this research is the percentage of processor utilization on native server, using average resource equal to 67.99%, while processor utilization on virtual server with 2 VM is about 43.73% average, so the processor level on the virtual server is lower than native server.   Keyword: failback, failover, native server, service availability, virtual server   &nbsp

    Real-time Surveillance System Menggunakan Pencocokan Pola Metode Jaccard

    Full text link
    Ada banyak jenis kejahatan dari rendah ke tingkat tinggi asalkan ada kesempatan. Departemen kepolisian di setiap negara telah mencoba untuk mengurangi jumlah kejahatan ini, namun pada Kenyataannya, jumlah kejahatan selalu tumbuh setiap tahun. Alih-alih menangkap kriminal, kita bisa meminimalkan kejahatan dengan menurunkan peluang tindakan pidana. Sebagai contoh, kita dapat menambahkan perangkat keamanan untuk melindungi aset kita. Kami mengusulkan sistem untuk mendeteksi jika ada seseorang memasuki ruangan dengan membandingkan pola setiap beberapa waktu. Ada banyak teknik pola yang cocok, tapi yang sederhana adalah dengan menghitung jarak dengan menggunakan Euclidean normal. Jika ada pola yang berbeda dari pola sebelumnya yang tertangkap oleh webcam, sistem akan membuat alarm (suara dan simbol). Untuk tujuan ini, kita menggunakan aplikasi capture yang memiliki kemampuan untuk menangkap gambar secara berkala dan sistem yang membandingkan setiap gambar dari penangkapan sebelumnya. Hasil pengujian menunjukkan bahwa sistem yang diusulkan kita bisa mendeteksi setiap orang yang datang ke daerah kami webcam. Kata Kunci: Surveillance, Pencocokan Pola, Jaccard There are a lot of kinds of crime from low to high level as long as there is a chance. The police department in every country has tried to decrease crime's number, but in fact, the crime's number always grows every year. Instead of catching the criminal, we can minimize the crime by lowering the opportunity of criminal's action. For example, we can add a security device to protect our assets. We proposed the system to detect if there is someone entering the room by comparing pattern every couple of time. There are many pattern matching techniques, but the simple one is by counting its distance using Normal Euclidean. If there is a different pattern from previous pattern that caught by a webcam, the system will create an alarm (sound and symbols). For these purpose, we use a capture application whose ability to capture an image periodically and the system that compare every image from previous capture. Testing result has shown that our proposed system could detect every people that come to the area of our webcam

    Perancangan dan Implementasi Proxy Server sebagai Solusi Optimalisasi Penggunaan Bandwith pada Jaringan Internet

    Full text link
      The development of the Internet very rapidly when compared with other sectors, even in Indonesia itself, according to the Association of Indonesian Internet Service Provider (APJII) in 2014 predicted Internet users will amount to approximately 107 million people. The technology that supports the Internet both in terms of software or hardware is becoming more sophisticated and varied, making it easier for users to access various kinds of information in cyberspace. Bandwidth management is very important in determining the speed of data transfer in the Internet network. Proxy server functions can accelerate the process of Internet access, monitoring users and restrict users to visit the address Internet servers. In this research, the proxy server will be installed as the new ADSL modem then connected to a switch device and can be accessed by users on each network. With the help of SARG application, administratoristrators can also monitor the working of the client proxy server via a web browser. The result, after installing a proxy server, then the speed of Internet access and bandwidth USAge on the network can be optimized.   Keywords : Bandwith, user, proxy server, ubuntu server, SARG   &nbsp

    Perancangan dan Implementasi Virtualisasi Server Menggunakan Proxmox Ve 3.4

    Full text link
      Server is a media that has an important role to provide internet access services for its users. In order for the network can be utilized optimally then the required server. This study aims to design server virtualization software collaboration faculty unisma techniques bekasi with the aim of building efficient server infrastructure, flexible and optimize the use of resources, so it can be adjusted with the workload for hardware resources to be optimal. This research is done by using virtualization concept that is using proxmox to design virtual server which can minimize cost and maintenance in hardware procurement. The use of hardware resources provided by the server machine has not been used optimally, so efficient steps are needed to resolve this issue. The results obtained from the design of the system in the form of server virtualization using proxmox, as well as optimizing the use of resources and manage the server efficiently in terms of time and cost.   Keyword : Server, Optimization, Virtualization, Proxmox, Design & Implementation. &nbsp

    Performa Kinerja Web Server Berbasis Ubuntu Linux dan Turnkey Linux

    Full text link
      One of the most frequently used server service functions is to provide a website access service, called a web server. In this study, we use two servers with Ubuntu operating system and Turnkey Linux with its objective to compare web performance to get parameters of response time value and throughput value. The test is carried out with a request rate of 10 to 100 with 1000 and 2000 connections. Based on the results obtained, Web server which uses Ubuntu Linux is better than Turnkey Linux, it is indicated by the value of small response time which means fast response and large throughput value, and this means good. A Web server that has 1000 connections generates a response time and a good throughput value, while the 2000 number of connections generates a response time value and a reduced throughput value, it is because for more than 1000 connections can affect the speed of the system.   Keywords : performance, web server, response time, thoughput   &nbsp

    Penerapan Teknik Load Balancing pada Web Server Lokal dengan Metode Nth Menggunakan Mikrotik

    Full text link
      The development of web technologies lead to servers that provide network-based services on the local as well as the public should be able to cope with the demand and greater workloads than ever. To be able to meet the demands of the development of the web technology required load balancing technology. Load balancing role in dividing the burden on services either on a set of servers or network devices. In this research is implemented using the method of load balancing technology Nth on the router mikrotik by dividing two line interfaces. The test results indicate the existence of a balance of access at the time of the file from the web server on each client with the bandwidth that has been adapted by tital download speed on a client of 68 Kbps in accordance with predeterminded bandwidth that is 512 kbps.   Keyword : Bandwidth, Load balancing, Mikrotik, Nth, Web Server. &nbsp

    Aplikasi Manajemen Bandwidth pada Usb Tethering Android Menggunakan Mikrotik

    Full text link
      The rise of smartphone technology develops, the number of requests made easy internet access. One of the burgeoning smartphone is Android smartphone. Android has given the ease of access to the internet with their facilities, one of which is USB Tethering.USB tethering is a feature that has been provided by the Android smartphone is still little use. The purpose of this study is to optimize the existing USB tethering on a smartphone using Hierarchical Tocken Bucket with simple techniques queue into a modem capable of transmitting data packets to multiple client and apply bandwidth management to every client. The results of this study are in the form of restrictions on each client with customized bandwidth from the provider that has been determined. The test results of the speed test can be seen that the results are in accordance with the allocation for each individual client so that there is inequality between the client.   Keyword : Hierarchical Tocken  Bucket, Manajemen Bandwidth, Mikrotik, Simple Queue.   &nbsp
    corecore