Claim Missing Document
Check
Articles

Found 8 Documents
Search

Design and Analysis of Hybrid Vessel Monitoring System based on DTN and Internet Collaboration Basuki, Akbari Indra; Wuryandari, Aciek Ida
INKOM Journal Vol 9, No 2 (2015)
Publisher : Pusat Penelitian Informatika - LIPI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (882.245 KB) | DOI: 10.14203/j.inkom.426

Abstract

In this paper, we propose hybrid Vessel Monitoring System (VMS) design as alternative for current VMS scheme by collaborating internet connection and Disruption-Tolerant-Networks (DTN). The hybrid solution combines offline VMS that use radio networks and online VMS that utilizing satellite-based internet. Hybrid VMS aims to provide a more flexible VMS design and able to speed up delivery process of offline vessel’s data. The concept is both type of vessels must install a standard radio networks for data forwarding. The proposed method to speed up data delivery is by forwarding VMS data from one vessel to another using DTN forwarding scheme. Data can be forwarded to another offline vessel that will return to harbor earlier or to online vessels which have internet connection. Performance measurement is done through simulation analysis using ONE simulator. It aims to measure the speed up data delivery using hybrid VMS implementation compare to a pure offline VMS implementation. Simulation result show that hybrid VMS able to speed up data delivery for offline vessel data in 1.5 up to 2 times faster compare to a pure offline VMS implementation. Hybrid VMS also has advantages in flexible implementation by easily switching between online and offline VMS scheme, according to fisherman financial situation. Spray-and-Wait routing is the most suitable routing algorithm for hybrid VMS according to the efficiency ratio.
Metode Pemantau Posisi dan Arah Gerak Helikopter Tanpa Awak dengan Google Maps API Basuki, Akbari Indra; Mahendra, Oka
INKOM Journal Vol 5, No 2 (2011)
Publisher : Pusat Penelitian Informatika - LIPI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (524.932 KB) | DOI: 10.14203/j.inkom.111

Abstract

Makalah ini membahas metode pemantau posisi dan arah gerak helikopter tanpa awak dengan bantuan layanan Google Maps API dan sensor GPS. Sinyal yang dihasilkan oleh GPS berupa data posisi dalam koordinat lintang dan bujur. Arah gerak helikopter diperoleh dari modul GPS dengan mengkalkulasi data riwayat posisi. Sinyal dari GPS selanjutnya dipancarkan oleh modem radio di helikopter dan diterima oleh modem radio di komputer. Data kemudian diolah oleh program aplikasi yang dibuat dengan Visual Basic 6. Data hasil olahan digunakan oleh program javascript untuk menampilkan posisi dan arah gerak helikopter ke dalam peta yang diperoleh dari layanan Google Maps API. Sebagai hasil akhir, pengguna dapat melihat posisi dan arah gerak helikopter pada browser seperti Mozilla Firefox, Google Chrome maupun browser lain yang mendukung HTML5. Kecepatan pembaharuan data posisi pada jaringan lokal dapat mencapai duapuluh data perdetik atau 20 Hz. Kemampuan ini sangat lebih dari cukup mengingat kemampuan akusisi sensor GPS komersial yang paling mutakhir hanya  berkisar  antara 5-10 Hz. Dengan menggunakan metode ini data GPS dapat diproses tanpa ada data yang terlewat.
Purwarupa Modem Audio Berbasis Mikrokontroler dengan Teknik Direct Digital Synthesizer dan Zero Crossing Detector Basuki, Akbari Indra; Mahendra, Oka
INKOM Journal Vol 7, No 2 (2013)
Publisher : Pusat Penelitian Informatika - LIPI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (891.42 KB) | DOI: 10.14203/j.inkom.252

Abstract

A microcontroller based audio modem system by means of Digital Direct Synthesizer (DDS) and Zero Crossing Detector (ZCD) technique is proposed in this paper. The modem operates in audible frequency range. The function of this modem is to transmit digital data through analog audio channel. In the modulator, DDS is used to generate sinusoidal audio signal. The modulation technique is 16-tones M-Ary Frequency Shift Keying (M-FSK) or MFSK16. In the demodulator, ZCD technique is used to measure the  sinusoidal signal periods. The experiments were done in the physical layer, to analyze the optimal channel bandwidth, transfer rate, and Bit Error Rate (BER). It was found that the optimal channel bandwidth for each tone is proportional to the frequency, due to fixed error DDS calculation. The performances of the modem are capable to modulatedata in transfer rate 200 bps and BER 2x10−3 without channel coding improvement.keywords: Audio modem, DDS, M-FSK, Zero Crossing Detector, GSMSistem modem audio berbasis mikrokontroler dengan teknik Direct Digital Synthesizer (DDS) dan Zero Crossing Detector (ZCD) diusulkan pada tulisan ini. Modem ini beroperasi pada frekuensi suara audible. Modem ini berfungsi untuk melewatkan data digital melalui kanal audio analog. Pada sisi modulator, digunakan teknik DDS untuk menghasilkan gelombang sinus audio. Teknik modulasi yang digunakan adalah 16 tone M-Ary Frequency Shift Keying (M-FSK) atau MFSK16. Pada sisi demodulator, teknik ZCD digunakan untuk mengukur perioda gelombang sinus. Pengujian dilakukan pada layer fisik modem dengan mencari lebar kanal yang optimal untuk masing-masing tone, nilai transfer rate, dan nilai Bit Error Rate (BER). Hasil pengujian menunjukkan lebar kanal optimal untuk masing-masing tone berbanding lurus dengan besar frekuensi, karena errorperhitungan frekuensi oleh DDS bersifat tetap. Performansi modem mencapai nilai transfer rate 200 bps dengan BER 2x10−3, tanpa penambahan pengkodean kanal.kata kunci: Modem audio, DDS, M-FSK, Zero Crossing Detector, GSM
Performing image confusion and diffusion using two dimensional triangle functional chaotic maps Prasetyo, Heri; Rosiyadi, Didi; Horng, Shi Jinn; Setiawan, Iwan; Basuki, Akbari Indra
International Journal of Advances in Intelligent Informatics Vol 7, No 2 (2021): July 2021 (Issue in Progess)
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Currently, with a malicious attacker against the authorization of an image it is necessary to have a method to secure the content of the image. Therefore this paper presents a new technique for performing image confusion and diffusion using Two Dimensional Triangle Fractional Combination Discrete Chaotic Map (2D-TFCDM). The image confusion requires a set of 2D-TFCDM chaotic random numbers to relocate the pixel locations of plain or secret images. At the same time, image diffusion utilizes the chaotic numbers to modify the pixel values of confused image. The proposed method performs well in terms of visual investigation and objective quality assessment on the confused and diffused images. In addition, it offers a promising result for the grayscale and color image with simple computation, which the experiment results demonstrate that the proposed method outperforms other existing methods under several types of visual observation, correlation coefficients, entropy, UACI, NPCR.
Optimized Hybrid DCT-SVD Computation over Extremely Large Images Setiawan, Iwan; Basuki, Akbari Indra; Rosiyadi, Didi
Jurnal Teknik Elektro Vol 13, No 2 (2021): Jurnal Teknik Elektro
Publisher : Jurusan Teknik Elektro, Fakultas Teknik, Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/jte.v13i2.31879

Abstract

High performance computing (HPC) is required for image processing especially for picture element (pixel) with huge size. To avoid dependence to HPC equipment which is very expensive to be provided, the soft approach has been performed in this work. Actually, both hard and soft methods offer similar goal which are to reach time computation as short as possible. The discrete cosine transformation (DCT) and singular values decomposition (SVD) are conventionally performed to original image by consider it as a single matrix. This will result in computational burden for images with huge pixel. To overcome this problem, the second order matrix has been performed as block matrix to be applied on the original image which delivers the DCT-SVD hybrid formula. Hybrid here means the only required parameter shown in formula is intensity of the original pixel as the DCT and SVD formula has been merged in derivation. Result shows that when using Lena as original image, time computation of the singular values using the hybrid formula is almost two seconds faster than the conventional. Instead of pushing hard to provide the equipment, it is possible to overcome computational problem due to the size simply by using the proposed formula.
Privacy-preserving reservation model for public facilities based on public Blockchain Basuki, Akbari Indra; Rosiyadi, Didi; Susanto, Hadi; Setiawan, Iwan; Salim, Taufik Ibnu
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 4: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i4.pp4418-4429

Abstract

Ensuring fairness in the utilization of government-funded public facilities, such as co-working spaces, sports fields, and meeting rooms, is imperative to accommodate all citizens. However, meeting these requirements poses a significant challenge due to the high costs associated with maintaining digital infrastructure, employee wages, and cybersecurity expenses. Fortunately, Blockchain smart contracts present an economical and secure solution for managing digital infrastructure. They offer a pay-per-transaction schema, immutable transaction records, and role-based data updates. Despite these advantages, public blockchains raise concerns about data privacy since records are publicly readable. To address this issue, this study proposes a privacy-preserving mechanism for public facilities' reservation systems. The approach involves encrypting the reservation table with fully-homomorphic encryption (FHE). By employing FHE with binary masking and polynomial evaluation, the reservation table can be updated without decrypting the data. Consequently, citizens can discreetly book facilities without revealing their identities and eliminating the risk of overlapping schedules. The proposed system allows anyone to verify reservations without disclosing requested data and table contents. Moreover, the system operates autonomously without the need for human administration, ensuring enhanced user privacy.
Sentralisasi Pengawasan Informasi Jaringan Menggunakan Blockchain Ethereum Sidiq, Muhammad Fajar; Basuki, Akbari Indra; Firdaus, Halim; Baihaqi, Muhammad Aldi
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 7 No 6: Desember 2020
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.2020722662

Abstract

Pengawasan jaringan pada beberapa kantor yang berlokasi berjauhan sangat sulit dilakukan kerana keterbatasan tenaga ahli, biaya, dan teknologi pendukung. Penelitian yang sudah ada tidak dapat menyediakan sistem pengawasan jaringan yang mampu menjamin tiga aspek keamanan sekaligus, yaitu: availability, integrity, dan confidentiality. Teknologi blockchain mampu menyediakan sistem pengawasan jaringan secara terpusat dan aman dengan menjamin keamanan sistem komunikasi pelaporan dan sistem basis data pelaporan. Penelitian ini bertujuan untuk menyajikan purwarupa sistem pengawasan konfigurasi dan statistik jaringan menggunakan jejaring blockchain Ethereum. Metode pengawasan mengharuskan program controller pada setiap jaringan kantor untuk secara berkala menarik informasi flow-rules dari setiap perangkat jaringan dan melaporkan data tersebut dalam sebuah transaksi ke jejaring blockchain. Pada penelitian ini dianalisa dua jenis skema pengiriman transaksi: transaksi berbasis smart contract dan transaksi berbasis zero-payment. Berdasarkan hasil pengujian, transaksi berbasis zero-payment secara rerata hanya membutuhkan sekitar 6 % dari biaya transaksi smart contract. Perkiraan biaya bulanan untuk pensamplingan informasi setiap 10 menit adalah sekitar 1,19 ether per-perangkat jaringan. Meskipun demikian, metode pada penelitian ini lebih sesuai untuk diterapkan pada jejaring Ethereum jenis Proof-of-Authority (PoA) dibandingkan jenis Proof-of-Work (PoW) karena harga Ether yang mahal. AbstractCentralized monitoring of remote networks is hard to implement due to the high cost, lack of experts, and the missing key technologies. The existing researches are unable to provide a secure, centralized monitoring system that satisfies three security aspects, namely: availability, integrity, and confidentiality. Blockchain technology meets those three requirements by providing a reliable reporting and immutable database system. In this paper, we proposed a prototype of a centralized monitoring system that records network statistics and configurations into the blockchain ledger. The method requires the network controller to periodically fetch network information from every network device and submit it as a single blockchain transaction. We compare two kinds of transaction schema, smart-contract based and zero-payment based reporting schemes. The evaluations show that zero-payment transactions only cost 6 % of the smart-contract transactions. The estimation of the monthly cost is 1.19 ether per-device for 10-minutes data sampling. Nevertheless, the proposed method is applicable only for the Proof-of-Authority (PoA) Ethereum networks. It is not feasible for the Ethereum main network that uses Proof-of-Work (PoW) due to the high cost of Ether.  
DDoS Protection System for SDN Network Based on Multi Controller and Load Balancer Ulfa, Husnul; Basuki, Akbari Indra; Suranegara, Galura Muhammad; Fauzi, Ahmad
Sistemasi: Jurnal Sistem Informasi Vol 13, No 2 (2024): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v13i2.3802

Abstract

DDoS attacks on SDN networks can create a single point of failure that has the potential to disrupt the overall network performance. In a single controller scheme, there is a potential risk of experiencing buffer overload, leading to traffic congestion as switches must wait for responses from the controller before forwarding network packets. To address this challenge, this research implements security measures using a multi-controller and load balancer approach, aiming to enhance SDN network resilience against DDoS attacks. The system operates by distributing the workload from the main controller to a backup controller through a load balancer when indications of a DDoS attack are detected. These attack indications are determined based on the miss rate value of unique forwarding requests exceeding a specific threshold. The results of this approach have proven effective in improving the reliability, responsiveness, and quality of SDN network traffic during DDoS attacks. The testing parameters involved in this research include controller response time and network traffic quality, comprising latency, bandwidth, throughput, and jitter. Based on the test results, the multi-controller and load balancer-based approach successfully enhanced network quality and controller responsiveness by 66.51% compared to the longer single controller scenario, specifically 202.49% during DDoS attacks. In terms of controller responsiveness, there is a very slight increase of around 0.01% in latency between the two. While Multi Controller demonstrated a remarkable 43.21% increase in throughput compared to Single Controller, this improvement in throughput is accompanied by a significant 204% increase in jitter.