Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gede Indrawan is active.

Publication


Featured researches published by Gede Indrawan.


international conference on data and software engineering | 2014

On analyzing of fingerprint direct-access strategies

Gede Indrawan; Saiful Akbar; Benhard Sitohang

This paper analyzed several aspect of publicly available fingerprint direct-access strategies over three public data sets, including their advantages and drawbacks, related works, and accuracy performance comparison on the graph of error rate and penetration rate. On recent research, smaller penetration rate at certain error rate (smaller area under curve) could be obtained by certain strategy. Penetration rate equal to 5% could be produced at error rate equal to 4%, 10%, and 1% on FVC2000 DB2A, FVC2000 DB3A, and FVC2002 DB1A, respectively. Through this analysis, hopely it could be used as a foundation for better future developments over new strategies or future improvements over existing strategies in area of fingerprint identification, especially to obtain more accurate result with smaller area under curve and achieved with faster search time.


Proceedings of the International Conference on Indonesian Technical Vocational Education and Association (APTEKINDO 2018) | 2018

A Subak Analogy Model in Computer Network Subject for Vocational Student

Ketut Agustini; Gede Saindra; Nyoman Sugihartini; Gede Indrawan

In a computer network concept, there are abstract and concrete materials. The abstract concept might lead students to misconceptions. This can be avoided by the students’ prior knowledge gained from everyday activities in accordance to the culture and environment. In bridging the abstract concepts into the concrete one, a metacognitive strategy is needed to make the received information become easier to remember and understand. The strategy is done by applying a learning model called analogy. An analogy model can be used as a tool to explain the concept that must be understood by the student. In order to be effective in its implementation, the chosen analogy should already be familiar to the students. Subak is a Balinese organization of irrigation system and is one example of local wisdom known widely in the world. Subak system with its unique resources management is similar to the concept of computer network system. Thus, this study deal with it covering students’ need, their characteristic and instructional analysis. Result shows that the computer network subject can use the analogy of Subak concept. Keywords—subak, model, computer, network


Archive | 2018

Instructional Design for the Computer Network Subject: A Balinese Culture-Based Learning Using Subak

Ketut Agustini; Gede Indrawan

Indonesian culture is very diverse and many of its indigenous concepts and values can potentially be applied in modern education and daily life. Subak is a Balinese irrigation system, which is known widely in the world. The Subak system with its unique resources management is similar to the concept of a computer network system. The Subak concept can be applied to an innovative learning model to improve students’ understanding and mastery of certain concepts. This is a needs analysis study to produce an instructional design manual based on Subak concepts, for the subject of computer networking. The subjects for this study were students majoring in Informatics Engineering Education while taking a course in computer networks. The data were collected through the use of questionnaires, observation, and interviews and analyzed through a descriptive qualitative method. The instructional design manual being developed consists of 11 chapters with 23 specific instructional objectives where each chapter illustrates two important points. However, there are still three chapters having material which is still difficult to be analogically linked to Subak concepts, such as Internet Protocol, internetworking, and directory of naming. The computer network concepts are associated with the analogy of a Subak network system. The aspect that does not seem to be covered with the analogy is the commercialization of computer networks/Internet and the involvement of large corporations.


International Journal of Electrical and Computer Engineering | 2018

Smooth Support Vector Machine for Suicide-Related Behaviours Prediction

Gede Indrawan; I K. P Sudiarsa; Ketut Agustini; Sariyasa Sariyasa

Basis test paths is a method that uses a graph contains nodes as a representation of codes and the lines as a sequence of code execution steps. Determination of basis test paths can be generated using a Genetic Algorithm, but the drawback was the number of iterations affect the possibility of visibility of the appropriate basis path. When the iteration is less, there is a possibility the paths do not appear all. Conversely, if the iteration is too much, all the paths have appeared in the middle of iteration. This research aims to optimize the performance of Genetic Algorithms for the generation of Basis Test Paths by determining how many iterations level corresponding to the characteristics of the code. Code metrics Node, Edge, VG, NBD, LOC were used as features to determine the number of iterations. J48 classifier was employed as a method to predict the number of iterations. There were 17 methods have selected as a data training, and 16 methods as a data test. The system was able to predict 84.5% of 58 basis paths. Efficiency test results also show that our system was able to seek Basis Paths 35% faster than the old system.A single-fed linearly polarized 2x2 microstrip bow tie array antenna is proposed. The feed network has microstrip line and slot line where microstrip-slot branch circuit is connected in parallel. The feed network of the array is designed using both-sided MIC Technology to overcome the impedance matching problem of conventional feed networks. The 2x2 half bow tie array antenna is also truncated with spur lines for optimization of antenna performance. The array antenna unit can be realized in very simple and compact structure, as all the antenna elements and the feeding circuit is arranged on a Teflon glass fiber substrate without requiring any external network. The design frequency of the proposed antenna is 5 to 8 GHz (C-Band) and the obtained peak gain is 12.41 dBi. The resultant axial ratio indicates that linear polarization is achieved.This paper presents a novel method for QRS detection. To accomplish this task ECG signal was first filtered by using a third order Savitzky Golay filter. The filtered ECG signal was then preprocessed by a Wavelet based denoising in a real-time fashion to minimize the undefined noise level. R-peak was then detected from denoised signal after wavelet denoising. Windowing mechanism was also applied for finding any missing R-peaks. All the 48 records have been used to test the proposed method. During this testing, 99.97% sensitivity and 99.99% positive predictivity is obtained for QRS complex detection.


Indonesian Journal of Electrical Engineering and Computer Science | 2018

Latin-to-Balinese Script Transliteration Method on Mobile Application: A Comparison

Gede Indrawan; I Ketut Paramarta; Ketut Agustini; Sariyasa Sariyasa

With the rapid growth of communications via the Internet, the need for an effective firewall system which has not badly affect the overall network performances has been increased. In this paper, a Field Programmable Gate Array (FPGA) -based firewall system with high performance has been implemented using Network FPGA (NetFPGA) with Xilinx Kintex-7 XC7K325T FPGA. Based on NetFPGA reference router project, a NetFPGA-based firewall system was implemented. The hardware module performs rule matching operation using content addressable memory (CAM) for higher speed data processing. To evaluate system performance, throughput, latency, and memory utilization were measured for different cases using different tools, also the number of rules that an incoming packet is subjected to was varied to get more readings using both software and hardware features. The results showed that the designed firewall system provides better performance than traditional firewalls. System throughput was doubled times of the one with Linux-Iptables firewalls.


International Journal of Electrical and Computer Engineering | 2014

Fingerprint Direct-Access Strategy Using Local-Star-Structure-based Discriminator Features: A Comparison Study

Gede Indrawan; Saiful Akbar; Benhard Sitohang


international conference on electrical engineering and informatics | 2011

Parallel processing for Fingerprint feature extraction

Gede Indrawan; Benhard Sitohang; Saiful Akbar


Indonesian Journal of Electrical Engineering and Computer Science | 2014

A Multi-Threaded Fingerprint Direct-Access Strategy Using Local-Star-Structure-based Discriminator Features

Gede Indrawan; Benhard Sitohang; Saiful Akbar; A. S. Nugroho


Indonesian Journal of Electrical Engineering and Computer Science | 2012

Review of Sequential Access Method for Fingerprint Identification

Gede Indrawan; Benhard Sitohang; Saiful Akbar


Proceedings of KNASTIK | 2013

PENCARIAN BERBASIS KONTEN: STUDI KASUS SISTEM IDENTIFIKASI OTOMATIS SIDIK JARI

Gede Indrawan; Hery Heryanto; Benhard Sitohang

Collaboration


Dive into the Gede Indrawan's collaboration.

Top Co-Authors

Avatar

Benhard Sitohang

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Saiful Akbar

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hery Heryanto

Bandung Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge