Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Proceeding of the Electrical Engineering Computer Science and Informatics

Simulation of Mobile LoRa Gateway for Smart Electricity Meter Sugianto Sugianto; Azwar Al Anhar; Ruki Harwahyu; Riri Fitri Sari
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (680.261 KB) | DOI: 10.11591/eecsi.v5.1649

Abstract

LoRa is a viable connectivity technology for smart electricity meter. In addition to measuring electricity usage, a smart electricity meter enables many features for smart grid, safety, etc. LoRa is advertised to be capable in very long range transmission and low power consumption. However, LoRa uses sub 1 GHz unlicensed spectrum. In the era of connected smart things, this spectrum is very crowded and will be even more crowded. In this paper we propose the use of mobile LoRa gateway for smart electricity meter. With mobile LoRa gateway, the transmission range can be decreased. Thus, LoRa end devices can save more power and nearby systems can reuse the same band with less interference. We study the performance via simulation using modified LoRaSim. The result shows that the performance of LoRa mobile gateway can be achieved.
Implementation of Secure Work From Home System Based on Blockchain using NS3 Simulation Mega Apriani; Diwandaru Rousstia; Fajar Rifai; Ruki Harwahyu; Riri Fitri Sari
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 7, No 1: EECSI 2020
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v7.2087

Abstract

Work from Home (WFH) is an activity carrying out official duties, completing outputs, coordination, meetings, and other tasks from the residence of employees. Implement WFH many users use the zoom application has vulnerabilities. The network architecture used refers to the simple experiment network. In Secure WFH there are 3 offices connected through a router. Each client in each office is connected to the router via a Virtual Private Network (VPN) on a peer-to-peer (P2P). That architecture has 18 nodes that will be simulated. Secure WFH simulation with blockchain combines secure WFH with a bitcoin code simulator from Arthur Gervais's. Implementation of blockchain on secure WFH can increase security but the resulting speed decreases. The decrease in speed when implementing secure WFH is due to the generate block process and the verification process.