Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 19339 dokumen yang sesuai dengan query
cover
Traister, John E.
New York: McGraw-Hill, 1981
621.402 TRA d
Buku Teks  Universitas Indonesia Library
cover
Traister, John E.
New York, N.Y. : McGraw-Hill , 1981
621.389 2 TRA d
Buku Teks  Universitas Indonesia Library
cover
Till, Robert C.
"The Second Edition of this introduction to fire protection systems is completely revised and updated to offer the student, architect or engineer the basics of fire protection devices and equipment, and how they may be applied to any given project. Fire Protection: Detection, Notification, and Suppression reveals the “nuts and bolts” of fire protection system selection, design and equipment in an applied approach.
Whether a mechanical engineer, safety engineer, architect, estimator, fire service personnel, or student studying in these areas, the authors show the pros and the cons of protection systems being proposed, and how they should be compared to one another. It also gives non-fire engineering practitioners a sense of proportion when they are put in a position to select a consultant, and to give a sense of what the consultant may be doing and how a system is being matched to the hazard. Beginning fire protection engineers could also use its language for writing a report about these systems for a client."
Switzerland: Springer Cham, 2019
e20501945
eBooks  Universitas Indonesia Library
cover
Muhammad Wafiyulloh
"Serangan jaringan semakin beragam seiring berkembangnya internet. Dalam menghadapi
serangan-serangan tersebut, diperlukan juga pengembangan sistem keamanan internet
terhadap pengguna salah satunya adalah IDS. Intrusion detection system (IDS) merupakan
sistem keamanan dalam mengawasi aktivitas jaringan yang berbahaya bagi pengguna.
Metode yang umum digunakan yaitu signature-based IDS. Signature-based IDS
menggunakan daftar serangan siber yang diketahui dalam menentukan jaringan berbahaya
atau normal. Akan tetapi, IDS hanya mengetahui serangan yang diketahui saja dan
membutuhkan input secara manual untuk mengubah daftar serangan sehingga tidak efektif
dalam mengatasi serangan yang tidak ketahui. Oleh karena itu, penelitian ini berfokus pada
pengembangan IDS dengan pendekatan machine learning menggunakan model autoencoder
untuk reduksi dimensi dan pengaruhnya terhadap model IDS. Autoencoder yang digunakan
pada penelitian ini terdapat 2 model yaitu non-symmetric deep autoencoder (NDAE) dan
modifikasi dari NDAE menggunakan metode variational autoencoder (VAE) yang disebut
sebagai V-NDAE, serta model PCA. Modifikasi NDAE bertujuan untuk mengambil
informasi penting dengan menggunakan distribusi probabilistik sehingga menjadi data yang
berkualitas untuk pelatihan model IDS. Pengujian reduksi dimensi dari model-model ini
dilakukan dengan melatih model IDS yaitu model random forest. Penelitian ini dilakukan
pada 2 dataset yang berbeda yaitu dataset CICIDS2017 dan dataset dari simulasi serangan
jaringan. Metrik yang digunakan adalah metrik accuracy, precision, recall, F-1 score, ROC
curve. Berdasarkan pengujian yang telah dilakukan terhadap dataset CICIDS2017, model
NDAE memiliki nilai rata-rata akurasi validasi sebesar 90.85% sehingga memiliki nilai yang
lebih besar daripada model V-NDAE yang memiliki nilai rata-rata akurasi validasi sebesar
87.65%. Pelatihan model NDAE menggunakan hyperparameter yang paling optimal yaitu
dengan optimizer RMSProp dan batch size sebesar 128. Pada pengujian terhadap dataset
dari simulasi serangan jaringan, model NDAE memiliki performa yang lebih baik daripada
model V-NDAE dan model PCA. Model NDAE memiliki nilai rata-rata akurasi validasi
sebesar 94.66% dan model V-NDAE memiliki nilai rata-rata akurasi validasi sebesar
66.32%. Pelatihan model NDAE menggunakan hyperparameter yang paling optimal yaitu
dengan optimizer Adam dan batch size sebesar 32.

The variety of network attacks increases as the internet evolves. In dealing with these attacks,
the development of an internet security system for users is necessary, one of which is IDS.
An intrusion detection system (IDS) is a security system designed to monitor network
activity that is dangerous for users. The commonly used method is signature-based IDS.
Signature-based IDS uses a signature database of known cyber attacks to determine whether
a network is dangerous or normal. However, this IDS only recognizes known attacks and
requires manual input to change the signature database of attacks, making it ineffective in
dealing with unknown attacks. Therefore, this research focuses on developing an IDS using
a machine learning approach, specifically using an autoencoder model for dimensionality
reduction and its impact on the IDS model. The models used in this research consists of a
non-symmetric deep autoencoder (NDAE), modification of NDAE using the variational
autoencoder (VAE) method, and PCA model. The modified NDAE can capture important
information from the latent distribution, which helps stabilize the training of the model.
Dimensionality reduction testing for both models is performed by training an IDS model,
specifically a random forest model. This research is conducted on two different datasets: the
CICIDS2017 dataset and a dataset from network attack simulations. The evaluation metrics
used are accuracy, precision, recall, F-1 score, and ROC curve. Based on the testing
performed on the CICIDS2017 dataset, the NDAE model achieves an average validation
accuracy of 90.85%, which is higher than the average validation accuracy of 87.65% for the
V-NDAE model and PCA model. The NDAE model's training is done using the most optimal
hyperparameters, specifically the RMSProp optimizer and a batch size of 128. In the testing
on the dataset from network attack simulations, the NDAE model outperforms the V-NDAE
model and PCA model. The NDAE model achieves an average validation accuracy of
94.66%, while the V-NDAE model achieves an average validation accuracy of 66.32%. The
NDAE model's training is done using the most optimal hyperparameters, specifically the
Adam optimizer and a batch size of 32.
"
Depok: Fakultas Teknik Universitas Indonesia, 2023
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Arief Rosseno
"Keselamatan manusia adalah faktor utama yang menjadi pertimbangan ketika terjadi kebakaran pada suatu bangunan, pabrik, atau di pada fasilitas umum seperti rumah sakit, pusat perbelanjaan dan lain-lain. Para penghuni bangunan tersebut harus mendapatkan informasi atau peringatan dini pada saat terjadi kebakaran. Peringatan dini atau yang secara umum dikenal dengan alarm harus dapat mendeteksi dengan baik agar penghuni yang berada di tempat kejadian memiliki waktu untuk segera melakukan evakuasi. Agar informasi kebakaran tersebut dapat diterima dengan oleh manusia, maka dirancanglah sebuah sistem alarm kebakaran terintegrasi yang dapat memberi informasi secara cepat dan tepat mengenai titik kebakaran yang terdeteksi.

Human safety is a major factor to be considered when there is a fire in a building, factory, or in the public facilities such as hospitals, shopping centers and others. The occupants of the building must obtain information or early warning in the event of fire. Early warning or that are generally known by the alarm should be able to detect the well to the inhabitants who were at the scene have the time for immediate evacuation. In order for fire information can be received by humans, then designed a fire alarm system integrated that can provide information quickly and precisely on the spot fires were detected."
Depok: Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Indonesia, 2011
S1441
UI - Skripsi Open  Universitas Indonesia Library
cover
Faizah Maryam Sidiqqah
"Skripsi ini bertujuan untuk menganalisis penerapan sistem pencegahan dan penanggulangan kebakaran di Gedung Yayasan LIA Pengadegan. Penelitian ini menggunakan desain penelitian deskriptif analitik dengan dilakukannya evaluasi sesuai dengan Permen PU No. 26/PRT/M/2008 dan Permen PU No. 20/PRT/M/2009. Hasil penelitian menunjukkan bahwa sebagian besar elemen sistem pencegahan dan penanggulangan kebakaran di Gedung Yayasan LIA Pengadegan sudah memenuhi standar. Persyaratan yang belum terpenuhi pada manajemen proteksi kebakaran adalah tata laksana operasional dan sumber daya manusia. Persyaratan pada sistem proteksi dan sarana penyelamatan kebakaran belum seluruhnya terpenuhi. Utilitas bangunan dan struktur bangunan umumnya telah terpenuhi. Kesimpulan yang diperoleh, sistem pencegahan dan penanggulangan kebakaran di Gedung Yayasan LIA Pengadegan masih perlu ditingkatkan, terutama untuk perawatan dan pemeliharaan sarana sistem proteksi kebakaran.

This study aimed to analyze the implementation of fire prevention and control systems in Yayasan LIA Pengadegan. This research used descriptive analytic design from evaluation in accordance from Permen PU No. 26/PRT/M/2008 and Permen PU No. 20/PRT/M/2009. The results showed that most of the elements of fire prevention and control systems in the Yayasan LIA Pengadegan Building already met the standards. The requirements have not been met in the management of fire protection were operational governance and human resources. Requirements on fire protection systems and fire rescue facilities have not been entirely fulfilled. Utility buildings and structures have generally met the standards. In conclusion, prevention and fire fighting system in Building Pengadegan LIA Foundation still need to be improved, especially for the care and maintenance of fire protection systems."
Depok: Universitas Indonesia, 2015
S60748
UI - Skripsi Membership  Universitas Indonesia Library
cover
MGS A. Rachman Putra
"The paper reviews the standard ot' design and installation of the Active Fire Protection
Systems for hotel buildings to minimize tire risk. When a tire occurs, active
protection system is necessary that pinpoints its location. Once detected, the first line
of defense against tire is a sprinkler system or other active tire protection systems.
Active Fire Protection Systems are detectors & alarm systems, automatic sprinkler
systems, risers, extinguishing systems, and smoke control, all of which is aimed to
solve the problem of fire damage.
ln major cities around the world especially in Jakarta, hotel buildings have been, are
and will be designed and built to provide safe and comfortable space for human life
and various activities. The fire risk is inherent in the building itself and it is of utmost
importance to eliminate or keep this risk and its consequences as small as possible.
On December 3 lst, 1986 a tire occurred in the Dupont Plaza Hotel and Casino, San
Juan, Puerto Rico, lt happened because The Hotel did not have dispensary ot`the tire
protection system in each floor. When thc iirc came and burncd, the building could
not extinguish the tire because it did not have the needed tire detector and sprinklers
in place.
From 50 questionnaires sent to various hotel buildings in Jakarta, 30 responses were
received to be viable for in dept analysis. The result of analysis shows clearly that the
active fire protection .tyvtents are positively correlated in a linear manner to three of
the key active fire protection variables. The key variables influencing building
reliability in good design and 'installation standard. The threc variables are heat
detector, portable exting-uis/ter, and rzulomatic sprinkler. This research can bc used t0
control and measure the standard design and installation of the hotel buildings."
Fakultas Teknik Universitas Indonesia, 2001
T5606
UI - Tesis Membership  Universitas Indonesia Library
cover
Adli Yunus Achmad
"[XYZ Indonesia sebagai salah satu perusahan penyedia layanan TI terdepan terus berinovasi untuk memberikan solusi dan produk terbaik bagi para pelanggannya. Dalam usaha memberikan solusi dan produk-produknya, XYZ berupaya untuk meyakinkan para calon pelanggan bahwa solusi yang ditawarkan dapat berjalan sesuai ekspektasi para pelanggan. Dalam kaitannya dengan hal ini, pelanggan umumnya membutuhkan suatu pembuktian. Oleh karena itu, XYZ Indonesia mengupayakan fasilitas Demo Center yang dimilikinya yang sebelumnya digunakan untuk kegiatan Showcase, menjadi tempat uji coba dan pembuktian konsep teknologi yang sesuai dengan solusi yang ditawarkan kepada pelanggan.
Data adalah informasi, dan informasi merupakan salah satu aset yang sangat berharga, dan merupakan kekuatan serta termasuk elemen terpenting dalam sebuah perusahaan. Dikarenakan kondisi Demo Center yang belum memadai dari segi keamanan informasi, para calon pelanggan belum teryakinkan untuk melakukan uji coba pada fasilitas ini, dikarenakan data yang digunakan pada uji coba umumnya adalah data aktual perusahaan. Hal ini berdampak pada hilangnya potensi pendapatan pihak XYZ Indonesia dari hilangnya potensi bisnis dari calon pelanggan.
Dengan demikian makan diperlukan untuk disusun suatu kebijakan keamanan informasi untuk fasilitas Demo Center yang berguna untuk dapat mengurangi risiko-risiko yang mungkin terjadi, serta meyakinkan dan memberikan rasa aman bagi para pelanggan. Dimana pada penelitian ini digunakan ISO 27001:2013 sebagai standar acuan perancangan kebijakan.;XYZ Indonesia as a leading IT solution company keep inovating to provide its customers with the best products and solutions. In its effort to provide them, XYZ strives its best effort to convince its customer that the product and solution which XYZ proposes will meet customers? expectations. In accordance with this, customers usually need some proof of concept. Therefore, XYZ Indonesia leverage its Demo Center facility which was previously only utilized for any Showcase activites, into a proof of concept situated area.
Data is considered as information, and information is considered as one of the primary assets of every enterprise. With regard to Demo Center?s current condition that doesn?t have adequate level of information security, most customers currently aren?t convinced to do the proof of concept in this facility, because most of the time, the data which will be used for the proof of concept activity are actually their company?s actual data. This situation give bad impact to XYZ?s potential Revenue due to loosing the business project.
Considering that fact, therefore it?s needed to build security policy for Demo Center facility which will reduce potential risks what would occur, and can also convince the customers to leverage the facility. In conducting this research and build the policy, ISO 27001:2013 is used as reference standard, XYZ Indonesia as a leading IT solution company keep inovating to provide its customers with the best products and solutions. In its effort to provide them, XYZ strives its best effort to convince its customer that the product and solution which XYZ proposes will meet customers’ expectations. In accordance with this, customers usually need some proof of concept. Therefore, XYZ Indonesia leverage its Demo Center facility which was previously only utilized for any Showcase activites, into a proof of concept situated area.
Data is considered as information, and information is considered as one of the primary assets of every enterprise. With regard to Demo Center’s current condition that doesn’t have adequate level of information security, most customers currently aren’t convinced to do the proof of concept in this facility, because most of the time, the data which will be used for the proof of concept activity are actually their company’s actual data. This situation give bad impact to XYZ’s potential Revenue due to loosing the business project.
Considering that fact, therefore it’s needed to build security policy for Demo Center facility which will reduce potential risks what would occur, and can also convince the customers to leverage the facility. In conducting this research and build the policy, ISO 27001:2013 is used as reference standard]"
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2014
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Anwar Wijaya
"ABSTRAK

Saat ini kasus pencurian mobil kian meningkat, sedangkan alarm mobil yang ada saat ini masih memiliki kekurangan. Di sisi lain jumlah pengguna internet dan media sosial juga kian meningkat. Oleh karena itu pada penelitian ini dirancang sistem notifikasi untuk keamanan pada mobil berbasis Raspberry Pi dan media sosial yang dapat memberikan notifikasi 3 kali berturut-turut ke pemilik mobil, yaitu notifikasi teks melalui Instapush, notifikasi foto melalui Twitter, dan notifikasi video melalui YouTube yang terintegrasi dengan Twitter. Hasil dari 20 kali uji coba menunjukan bahwa rata-rata pengiriman notifikasi teks melalui Instapush lebih cepat dan stabil pada tempat parkir ruang terbuka dengan waktu 7,2 detik sejak pintu mobil terbuka hingga tiba di smartphone pemilik mobil. Untuk pengiriman notifikasi foto melalui Twitter rata-rata lebih stabil pada tempat parkir ruang terbuka, tapi lebih cepat pada tempat parkir ruang tertutup dengan waktu 29,55 detik sejak pintu mobil terbuka. Untuk pengiriman notifikasi video melalui YouTube yang terintegrasi Twitter rata-rata lebih stabil dan cepat pada tempat parkir ruang terbuka dengan waktu 217,2 detik sejak pintu mobil terbuka. Foto dan video yang diunggah ke Twitter dan YouTube memiliki tingkat kesamaan yang berkualitas tinggi terhadap foto dan video asli hasil pemotretan dan perekaman webcam yang dipasang di dalam mobil.


ABSTRACT

Nowadays the cases of car theft are increasing, whereas the conventional alarm system has no direct notification feature. On the other side active internet users and active social media accounts continue to rise. Therefore, a notification system for car security based-Raspberry Pi and social media is designed to give 3 fold notifications. Those are text notification through Instapush, photo notification through Twitter, and video notification through Twitter-activated YouTube. Our test shows this system can run 100%. Average delivery time of text notification through Instapush is faster and more stable in the outdoor parking area. It takes only 7.2 seconds from the car door opened event until delivered at car owners smartphone. Average delivery time of photo notification through Twitter is more stable in the outdoor parking area, but is faster in the indoor parking area. It takes only 29.55 seconds after triggered. Average delivery time of video notification through Twitter-activated YouTube is faster and more stable in the outdoor parking area. It takes only 217.2 seconds after triggered. Photos and videos which are uploaded to Twitter and YouTube have a high degree of similarity with the original photos and videos that are captured and recorded by webcam mounted in a car

"
Fakultas Teknik Universitas Indonesia, 2015
S60065
UI - Skripsi Membership  Universitas Indonesia Library
cover
Jihong Yu
"This book provides a comprehensive treatment of the theoretical foundation and algorithmic tools necessary in the design of efficient tag counting and monitoring algorithms in emerging RFID systems. The book delivers an in-depth analysis on the following problems ranging from theoretical modeling and analysis, to practical algorithm design and optimization: Stability analysis of the frame slotted Aloha protocol, the de facto standard in RFID tag counting and identification; Tag population estimation in dynamic RFID systems; Missing tag event detection in the presence of unexpected tags; Missing tag event detection in multi-group multi-region RFID systems. The target readers are researchers and advanced-level engineering students interested in acquiring in-depth knowledge on the topic and on RFID systems and their applications."
Switzerland: Springer Cham, 2019
e20501283
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>