Rinaldi Munir
Program Studi Teknik Informatika Sekolah Teknik Elektro dan Informatika Institut Teknologi Bandung Jalan Ganesha 10 Bandung 40132

Published : 8 Documents
Articles

Found 8 Documents
Search

POWERPLAN : THE ALTERNATIVE SOFTWARE FOR PRESENTATIONS AT LOCAL AREA NETWORK USING VIRTUALTREEVIEW AND OMNITHREAD Bataona, Daniel Silli; Munir, Rinaldi; Juhana, Tutun; Christiana Manulangga, Gloria; Sine, Jemsrado
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 1: February 2020 (PART II)
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (9.29 KB) | DOI: 10.11591/ijece.v10i1.pp947-961

Abstract

The need for LCD projectors is very urgent, so even though they often experience shortcomings, it is impossible to continue to make purchases when needed to repair LCD projectors that require high costs such as buying a new device. Software development from the results of this study is not only beneficial for educational institutions but also for personal or specific institutions and institutions who want to conduct seminars, presentations, or other activities that involve many audiences. The advantage is that the audience will not experience problems such as when using an LCD projector, such as limited visibility, location or space, and the viewpoint of the audience on the Projector LCD / Screen. Another contribution that can be given from this research is a model of the teaching and learning process in real-time without using an LCD and only using a PC/ Laptop connected to the same LAN. It is a development of research that supports the concept of green computing because it also reduces the use of equipment LCD projector, but the usage function remains the same even more effective and interactive even without the device. Presentation model like this is the development of new models in the learning process using LAN networks but without using the internet connection and is the cross-platform model. This research can be the answer to the need for using LCD projectors that often occur in the process of education, meetings, or seminars that continue to increase every time. Also, the lack of LCD compared to the number of teaching needs in each class and the unstable electricity conditions and the low electricity ratio in East Nusa Tenggara, have resulted in frequent blackouts suddenly, so that makes the device LCD vulnerable to damage. The test results showed an increase in RTT along with the increasing number of servers conducting presentation activities. Testing on LAN networks with the same number of clients on each test shows that there was an increase of 18% and 75% in each addition to the number of servers. The best performance of Powerplan is still shown when the number of servers that present several five, with the response time of each client connected under two seconds.
PEMBANGKIT TEKA-TEKI SILANG DENGAN ALGORITMA BACKTRACKING SERTA APLIKASI PERMAINANNYA YANG BERBASIS WEB Sulun, Hafni Syaeful; Munir, Rinaldi
Jurnal Informatika Vol 4, No 2: July 2010
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.425 KB)

Abstract

Teka-teki silang (TTS) merupakan salah satu permainan klasik yang masih populer hingga saat ini dan banyak ditemukan di surat kabar dan buku kumpulan TTS. Walaupun bentuk TTS dari masing-masing penerbit berbeda, ada satu persamaan, yakni bentuk papannya yang memiliki simetri, baik lipat maupun putar, sehingga terlihat menarik dan rapi. Untuk membuatnya secara manual tentu membutuhkan kecermatan karena untuk menentukan satu kata sebagai jawaban harus memperhatikan kata-kata yang terhubung dengannya. Di dalam makalah ini dipaparkan aplikasi pembangkit TTS dan sebuah aplikasi permainan TTS berbasis web yang diberi nama Kata Bersilang. Dengan Kata Bersilang, pembuat TTS (designer) hanya perlu merancang papan TTS, sedangkan jawaban dan pertanyaannya akan dibangkitkan secara otomatis oleh Kata Bersilang dengan algoritma backtracking. Permainan TTS pada Kata Bersilang dibuat mirip dengan permainan TTS yang diterbitkan surat kabar di Indonesia. Penjawab TTS (solver) dapat mengisi TTS yang telah dibuat designer selama masih dalam masa pengisian. Setelah masa tersebut berakhir, akan diumumkan pemenangnya.
ANALISIS KEAMANAN ALGORITMA ENKRIPSI CITRA DIGITAL MENGGUNAKAN KOMBINASI DUA CHAOS MAP DAN PENERAPAN TEKNIK SELEKTIF Munir, Rinaldi
JUTI: Jurnal Ilmiah Teknologi Informasi Vol 10, No 2, Juli 2012
Publisher : Teknik Informatika, ITS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24068535.v10i2.a310

Abstract

Di dalam makalah ini dipresentasikan analisis keamanan dari sebuah usulan algoritma enkripsi citra yang berbasis chaos dan penggunaan teknik enkripsi selektif untuk mengurangi volume komputasi. Algoritma enkripsi menggunakan Arnold Cat Map untuk mengacak citra, selanjutnya teknik enkripsi selektif diterapkan dengan memilih hanya empat bit MSB dari setiap pixel untuk di-XOR-kan dengan keystream yang dibangkitkan dari Logistic Map. Analisis keamanan meliputi analisis ruang kunci, analisis histogram, analisis korelasi, analisis entropi, dan analisis sensitivitas. Secara keseluruhan dapat dinyatakan bahwa analisis keamanan terhadap algoritma enkripsi citra yang ditinjau menunjukkan bahwa algoritma tersebut aman dari berbagai serangan yang bertujuan untuk menemukan kunci atau pixel-pixel di dalam plain-image..
PENGEMBANGAN HEURISTIK DIFERENSIAL TERKOMPRESI UNTUK ALGORITMA BLOCK A* Wicaksono, Teguh Budi; Munir, Rinaldi
JUTI: Jurnal Ilmiah Teknologi Informasi Vol 10, No 2, Juli 2012
Publisher : Teknik Informatika, ITS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24068535.v10i2.a311

Abstract

Kami menawarkan sebuah optimasi dari fungsi heuristik diferensial terkompresi untuk algoritma Block A*. Optimasi yang ditawarkan berupa optimasi dari segi memori dan performa pencarian yang diukur berdasarkan jumlah simpul yang dikembangkan. Hasil dari optimasi ini menunjukkan bahwa optimasi yang kami tawarkan dapat mengurangi jumlah penggunaan memori walau dengan sedikit penurunan performa pencarian.
ORBITAL TRAJECTORY SIMULATION ON TWIN STARS SYSTEM IN IFS FRACTAL MODEL BASED ON HYBRID ANIMATION METHOD Darmanto, Tedjo; Suwardi, Iping Supriana; Munir, Rinaldi
Jurnal Ilmu Komputer dan Informasi Vol 8, No 2 (2015): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (415.197 KB) | DOI: 10.21609/jiki.v8i2.304

Abstract

IFS (Iterated Function Systems) is a method to model fractal object based on affine transformation functions. The star-like object rotation effect in the IFS fractal model could be exhibited by using metamorphical method, as a replacement to the affine rotation method on a non metamorphic animation. The advantage of a metamorphic animation method over the metamorphic animation method is that the object's relative position to the fixed point as an absolute centroid is absolute. Therefore, the rotational effect can be exhibited at any positions. In addition, it can also be combined with rotational effect of the local centroid itself around the absolute centroid as a fixed point by the primitive rotational operation to form an interesting behavior of orbital trajectory Based on the hybrid of both animation methods, the animation simulation could be done on orbital trajectory on a twin stars rotating to each other as a system. Both objects are rotated in the same angular direction, but started in the opposite position around two closely different fixed points. So, the orbital trajectory yielded forms an elliptical path. The two similar objects can be created efficiently by cloning-scaling technique. In general, the animation method can be modeled as an animation framework.
THE BALINESE UNICODE TEXT PROCESSING Habibi, Imam; Munir, Rinaldi
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 1, No 1 (2006): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (529.018 KB) | DOI: 10.22146/ijccs.19

Abstract

In principal, the computer only recognizes numbers as the representation of a character. Therefore, there are many encoding systems to allocate these numbers although not all characters are covered. In Europe, every single language even needs more than one encoding system. Hence, a new encoding system known as Unicode has been established to overcome this problem. Unicode provides unique id for each different characters which does not depend on platform, program, and language. Unicode standard has been applied in a number of industries, such as Apple, HP, IBM, JustSystem, Microsoft, Oracle, SAP, Sun, Sybase, and Unisys. In addition, language standards and modern information exchanges such as XML, Java, ECMA Script (JavaScript), LDAP, CORBA 3.0, and WML make use of Unicode as an official tool for implementing ISO/IEC 10646. There are four things to do according to Balinese script: the algorithm of transliteration, searching, sorting, and word boundary analysis (spell checking). To verify the truth of algorithm, some applications are made. These applications can run on Linux/Windows OS platform using J2SDK 1.5 and J2ME WTK2 library. The input and output of the algorithm/application are character sequence that is obtained from keyboard punch and external file. This research produces a module or a library which is able to process the Balinese text based on Unicode standard. The output of this research is the ability, skill, and mastering of 1. Unicode standard (21-bit) as a substitution to ASCII (7-bit) and ISO8859-1 (8-bit) as the former default character set in many applications. 2. The Balinese Unicode text processing algorithm. 3. An experience of working with and learning from an international team that consists of the foremost experts in the area: Michael Everson (Ireland), Peter Constable (Microsoft US), I Made Suatjana, and Ida Bagus Adi Sudewa.
ASYMMETRIC WATERMARKING SCHEME BASED ON CORRELATION TESTING Munir, Rinaldi; Riyanto, Bambang; Sutikno, Sarwono; P. Agung, Wiseto
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 1, No 2 (2007): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2965.581 KB) | DOI: 10.22146/ijccs.2281

Abstract

AbstractAsymmetric watermarking is the second generation of watermarking scheme which uses different keys for embedding and detecting watermark. Key for embedding is private or secret, but key for detecting can be available publicly and everyone who has the key can detect watermark Watermark detection does not need to be original multimedia data. Detection of watermark is realized using correlation test between public key and multimedia data received. In most of schemes, private key is the watermark itself; public key is public watermark which correlates to the private watermark This paper presents concept of asymmetric watermarking scheme that based on correlation test and reviews some schemes of asymmetric watermarking that have been proposed by researchers.Keywords: asymmetric watermarking, private key, public key, watermark., multimeelia,:correlation.
Algoritma Enkripsi Citra Digital Berbasis Chaos dengan Penggabungan Teknik Permutasi dan Teknik Substitusi Menggunakan Arnold Cat Map dan Logistic Map Munir, Rinaldi
Jurnal Nasional Pendidikan Teknik Informatika : JANAPATI Vol 1, No 3 (2012)
Publisher : Jurusan Pendidikan Teknik Informatika Universitas Pendidikan Ganesha

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2670.103 KB) | DOI: 10.23887/janapati.v1i3.9814

Abstract

Di dalam makalah ini dipresentasikan sebuah usulan algoritma enkripsi citra digital yang menggabungkan teknik permutasi dan substitusi. Dua buah chaotic map digunakan untuk masingmasing teknik yaitu Arnold Cat Map dan Logistic Map. Sebelum dienkripsi, pixel-pixel di dalam citra diacak dengan Arnold Cat Map. Selanjutnya, pixel-pixel tersebut diubah nilainya melalui operasi XOR dengan keystream yang dibangkitkan dari Logistic Map. Pixel-pixel dioperasikan seperti mode cipher block chaining. Hasil eksperimen pada citra grayscale dan citra berwarna menunjukkan cipher-image memiliki pixel-pixel yang terdistribusi uniform sehingga menyulitkan serangan dengan analisis statistik. Selain itu pixel-pixel yang berteatngga di dalam cipher-image memiliki koefisien korelasi yang rendah, yang mengindikasikan bahwa pixel-pixel tersebut sudah tidak memiliki hubungan linier (korelasi). Sifat sensitivitas pada chaos telah diperlihatkan yang mengindikasikan algoritma ini aman dari exhaustive-key search attack