Nico Surantha
Bina Nusantara University

Published : 8 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 8 Documents
Search

Smart hydroponic based on nutrient film technique and multistep fuzzy logic Prabadinata Atmaja; Nico Surantha
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 3: June 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i3.pp3146-3157

Abstract

Automation in hydroponics is have been a great change. Research with fuzzy logic control it’s designed to add to each parameter one by one. In a way microcontroller will activate one by one relay to regulate the parameters with fuzzy logic. While parameter calibration is done, calibration is needed for the next checking if the parameter were not optimal, until its parameter optimal. Multistep fuzzy is used to counter measure the same activation of the relay. With adding real time data monitoring to the system. From test result evaluating multistep fuzzy logic method were 100% works as expected. with another testing approach for best module for sending real time data monitoring for hydroponics. From the real time data transmission method, the success of sending data is 30% from the ESP82166 and 75% of the NRF24L01 with a shortage of the NRF24L01 data loss. For the relay activation can be accommodate with dynamic programming. As for multistep fuzzy logic for hydroponic tested to reach optimal water condition for kale crops resulting in average 12.8 iterations calibration from condition where researches add water only from the start.
Sleep Apnea Identification using HRV Features of ECG Signals Billy Sulistyo; Nico Surantha; Sani M. Isa
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (548.931 KB) | DOI: 10.11591/ijece.v8i5.pp3940-3948

Abstract

Sleep apnea is a common sleep disorder that interferes with the breathing of a person. During sleep, people can stop breathing for a moment that causes the body lack of oxygen that lasts for several seconds to minutes even until the range of hours. If it happens for a long period, it can result in more serious diseases, e.g. high blood pressure, heart failure, stroke, diabetes, etc. Sleep apnea can be prevented by identifying the indication of sleep apnea itself from ECG, EEG, or other signals to perform early prevention. The purpose of this study is to build a classification model to identify sleep disorders from the Heart Rate Variability (HRV) features that can be obtained with Electrocardiogram (ECG) signals. In this study, HRV features were processed using several classification methods, i.e. ANN, KNN, N-Bayes and SVM linear Methods. The classification is performed using subject-specific scheme and subject-independent scheme. The simulation results show that the SVM method achieves higher accuracy other than three other methods in identifying sleep apnea. While, time domain features shows the most dominant performance among the HRV features.
Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual Cryptography for Security of Handwritten Images Sugianto Sugianto; Suharjito Suharjito; Nico Surantha
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.6632

Abstract

The secret sharing is a method to protect confidentiality and integrity of the secret messages by distributing the message shares into several recipients. The secret message could not be revealed unless the recipients exchange and collect shares to reconstruct the actual message. Even though the attacker obtain shares shadow during the share exchange, it would be impossible for the attacker to understand the correct share. There are few algorithms have been developed for secret sharing, e.g. secret splitting, Asmuth-Bloom secret sharing protocol, visual cryptography, etc. There is an unanswered question in this research about which method provides best level of security and efficiency in securing message. In this paper, we evaluate the performance of three methods, i.e. secret splitting, secret sharing, and recursive threshold visual cryptography for handwritten image security in terms of execution time and mean squared error (MSE) simulation. Simulation results show the secret splitting algorithm produces the shortest time of execution. On the other hand, the MSE simulation result that the three methods can reconstruct the original image very well.
Evaluation of network security based on next generation intrusion prevention system Gilang Intan Permatasari Duppa; Nico Surantha
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 1: February 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i1.9191

Abstract

Next Generation Intrusion Prevention System (NGIPS) is a system that works to monitor network traffic, to detect suspicious activity, and to conduct early prevention toward intrusion that can cause network does not run as it supposed to be, NGIPS provides vulnerability protection broader compared to the traditional IPS, especially in the application layer that has ability to detect and learn vulnerability asset and carried out layering inspection until layer 7 packet. This paper intended to analyze and evaluate the NGIPS to protect network from penetration system that utilize the weakness from firewall, that is exploitation to HTTP port. By the existence of NGIPS, it is expected can improve the network security, also network administrator could monitor and detect the threats rapidly. Research method includes scenario and topology penetration testing plan. The result of this research is the evaluation of penetration testing that utilizes HTTP port to exploit through malicious domain. The evaluation conducted to ensure the NGIPS system can secure the network environment through penetration testing. This study can be concluded that it can become reference to optimize network security with NGIPS as network security layer.
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome IoT architecture Vincent Simadiputra; Nico Surantha
Bulletin of Electrical Engineering and Informatics Vol 10, No 2: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i2.2741

Abstract

Internet-of-Things or IoT technology becomes essential in everyday lives. The risk of security and privacy towards IoT devices, especially smarthomes IoT gateway device, becoming apparent as IoT technology progressed. The need for affordable, secure smarthome gateway device or router that smarthome user prefer. The problem of low-performance smarthome gateways was running security programs on top of smarthome gateway programs. This problem motivates the researcher designing a secure and efficient smarthome gateway using Raspberry Pi hardware as an affordable smarthome gateway device and able to run both smarthome gateways and security programs. In this research, researchers implemented snort as intrusion detection system (IDS), openHab as IoT gateway applications, and well-known encryption algorithms for file encryption in Raspberry PI 3B+ model. The researcher evaluated Snort capability on network attacks and compared each of the well-known encryption algorithm efficiency. From the result, we found Rasefiberry customized snort configuration for Raspberry pi 60 percent of the simulated network attacks. Twofish encryption algorithms were found to have best encryption time, throughput, and power consumption compared to other encryption algorithms in the research. Rasefiberry architecture successfully processes both lightweight security programs and Openhab smarthome gateway programs with a lowperformance computing device such as Raspberry Pi.
Smart and real-time door lock system for an elderly user based on face recognition Rezki Saputra; Nico Surantha
Bulletin of Electrical Engineering and Informatics Vol 10, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i3.2955

Abstract

Many sophisticated smart door lock systems have been made. Still, most of them required the user to use an additional device such as a smartphone, tag, smartcard, or accessing some user interfaces, which is complicated to use for inexperienced elderly. This condition creates a gap between the elderly and technology which makes it difficult for the elderly to accept and use the technology. In this paper, we proposed a smart and real-time door lock system for an elderly user based on local binary pattern histogram as a face recognition algorithm with modular system architecture design. The novelty in our proposed system design, it does not require any additional device, it does not use any user interface, and the least user participation by automating the processes. All the user needs to do just walk toward the door and stand in front of it and the door will automatically unlock and locked back after the user enters the house and close the door. The system resulted in an accuracy of 98%, with an average processing time is 1.449 seconds for the entire process. Additional advantages, the system is designed with a modular approach that makes it flexible and scalable for further development.
Risk assessment in fleet management system using OCTAVE allegro Salman Alfarisi; Nico Surantha
Bulletin of Electrical Engineering and Informatics Vol 11, No 1: February 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i1.3241

Abstract

The purpose of this study is to use the OCTAVE allegro methodology to identify risks in fleet management system (FMS), determine prioritized risks to be mitigated, provide mitigation recommendations for these prioritized risks, and shows how effective the recommendation is. The result of this study is expected to become an input for FMS service provider of possible risks in FMS services, and risk mitigation approaches that can be used to handle those risks. This risk assessment has successfully identified 6 critical information assets, 10 risks in total, and 4 risks that need to be mitigated, followed by proposed mitigation approaches for those risks. Some of the recommendation has been applied by the company and contribute to SLA achievement of the system. The result also showed that application and simulation software provide most prominent risks in FMS service, thus securing these two will eliminate most risk in FMS service.
A case analysis for Kubernetes network security of financial service industry in Indonesia using zero trust model Nico Surantha; Felix Ivan; Ritchie Chandra
Bulletin of Electrical Engineering and Informatics Vol 12, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i5.4240

Abstract

In this study, a case analysis of Kubernetes application in an enterprise providing financial services in Indonesia is presented. It is implemented to improve their digital services-based application, developed using micro-services architecture. Kubernetes, an application container technology, has been applied in the enterprise providing financial services in Indonesia to improve their digital services-based application, developed using micro-services architecture concepts. Without incorporating any additional hardware, the new technology and services have been adopted to existing virtualized resources of the enterprise. An infrastructure design for secure Kubernetes networking was built and has been studied using the data center provided by the enterprise. This study focuses on two important aspects: network and security. As a security guideline, the network recommendations from VMware, Cisco, and Forrester’s zero trust model were employed to design the infrastructure and were evaluated. The proposed secure network infrastructure design is successfully applied in the container networks using the zero trust requirement, the enterprise’s requirements, and constraints. And we hope this study about network design security can be used and adaptable with existing network and reduce risk and disruption to the business caused by the network.