Articles
Design of Gas Leakage Monitoring System Based on Android Application and NodeMCU ESP8266
Nabil Fuadi;
Fauzi, Achmad;
Khair, Husnul
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.59934/jaiea.v4i1.585
Gas leakage is a serious problem that can threaten public safety and health and cause significant material losses. This research aims to design and implement a gas leak monitoring system that can be accessed remotely based on Android applications and NodeMCU ESP8266. NodeMCU ESP8266 is chosen as the main microcontroller equipped with an MQ-2 gas sensor to detect the presence of hazardous gas. This research incorporates Internet of Things (IoT) technology to allow users to remotely monitor the condition of gas leaks, thereby increasing the level of safety in the use of gas in households or small industries. The hardware design includes the use of an MQ-2 gas sensor that is sensitive to certain gas concentrations, as well as setting up an ESP8266 NodeMCU to transmit detection data to a Firebase server for later access through an Android application. The Android application was developed using Android Studio with a focus on an intuitive user interface to monitor the status of gas leaks in real-time. he research methods used include system design, hardware and software implementation, and thorough system testing by simulating gas leak scenarios to test the reliability and response of the system. The results show that the system can detect gas leaks with high accuracy. It is expected that the system developed in this research can be a practical and effective solution in reducing the risk of accidents caused by gas leaks, as well as making a positive contribution in increasing awareness of the safety of gas use in the community.
Design and Build Running Text Controls Using IoT
Aji Tyo Syahputra;
Fauzi, Achmad;
Milli Alfhi Syari
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.59934/jaiea.v4i1.625
This research designs and builds an Internet of Things (IoT)-based running text control system using the P10 display module which can be controlled through the Blynk application and displays the temperature in real-time using the DHT22 sensor. The system consists of hardware such as a microcontroller, Wi-Fi module, P10 LED display, and DHT22 sensor to measure temperature and humidity. The Blynk app is used as a user interface to control the messages displayed on the P10 module and monitor the temperature data in real-time. Software development is carried out to integrate the hardware with the Blynk application and enable efficient data transmission. The test results show that this system is able to accurately display text messages and temperature data with low latency. These systems can be applied in a variety of scenarios such as public information systems, environmental surveillance, and dynamic advertising applications.
Design and Build Automatic Fan Control Based Internet of Things
Septian, Refli;
Achmad Fauzi;
Milli Alfhi Syari
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.59934/jaiea.v4i1.634
This research aims to create and develop an automatic fan control system based on the Internet of Things (IoT) that can regulate the room temperature well. The NodeMCU ESP8266 serve as a microcontroller for this system. The DHT22 sensor detects temperature, the L298N Driver Motor controls the speed of the 12V DC fan, and the 16x2 LCD displays temperature information in realtime. When the room temperature exceeds the threshold, the fan will automatically turn on and off when the temperature returns to normal. The Blynk app also allows users to monitor and control fans through smartphones. It allows users to manually control the fan and monitor it remotely. The results of the study show that this system works well and improves user comfort by managing the room temperature. The system also offers high flexibility with IoT integration, allowing for further development for wider applications in home automation and energy management.
Improving the Quality of Digital Images on Identity Cards Using Contrast Stretching and Retinex Methods
Salsabilla, Nur;
Achmad Fauzi;
I Gusti Prahmana
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.59934/jaiea.v4i1.645
Enhancing the image quality of the Indonesian Identity Card is crucial to ensure the clarity and accuracy of information in various applications, such as identity verification, administration, and security. This study aims to improve the digital image quality of Identity Card using the Contrast Stretching and Retinex methods. Contrast Stretching is employed to enhance image contrast, while the Retinex method is used to maintain and improve the clarity of colors and image details. The implementation of these methods is carried out using Python. The test results show that these methods are effective in improving the quality of Identity Card images, making the information on the images clearer and easier to read. This research contributes to the development of more advanced image processing technology, which can be applied to various verification and administrative needs that require high reliability.
Super Encryption Feal Algorithm and Base64 Algorithm Image File Security
Br Bangun, Tiara;
Achmad Fauzi;
I Gusti Prahmana
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.59934/jaiea.v4i1.647
In the rapidly advancing digital era, image file security has become a critical issue, especially with the increasing risks of data breaches and attacks on digital files. This study aims to enhance the security of image files by implementing a combination of two cryptographic algorithms: Fast Data Encipherment Algorithm- 4 (FEAL-4) and Base64. FEAL-4 is a symmetric encryption algorithm known for its high speed and processing efficiency, while Base64 is used for encoding binary data into ASCII format to ensure safer transmission. This research develops a super encryption system that integrates these two algorithms to protect the integrity and confidentiality of image files, particularly for BMP, JPEG, and PNG formats. The implementation was carried out using the Visual Basic programming language. The results of the study show that the combination of FEAL-4 and Base64 algorithms significantly enhances the security of image files, with a high success rate in the encryption and decryption processes.
Super Encryption of Rabin Cryptosystem Algorithm and Paillier Cryptosystem Algorithm on Digital Image Security Process
Ramanda, Dika;
Achmad Fauzi;
Pakpahan, Victor Maruli
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.59934/jaiea.v4i1.659
Technological advances have given rise to the need for data protection, especially digital images, which are vulnerable to misuse. This research proposes a super encryption method that combines two cryptographic algorithms, namely Rabin Cryptosystem and Paillier Cryptosystem, to increase digital image security. Rabin's algorithm does not have homomorphism, so it is vulnerable to factorization attacks if the prime numbers used are too small. Meanwhile, the Paillier algorithm has homomorphism properties which allow arithmetic operations to be carried out directly on the ciphertext without decryption. By combining these two algorithms, this research aims to create a stronger and more efficient encryption method, and analyze its performance in terms of computational efficiency and complexity. It is hoped that the research results can improve the security and privacy of digital data, especially in the context of digital images.
Digital Image Security Analysis using Hill Cipher and AES Algorithm
Ranti, Dwi;
Achmad Fauzi;
Sitompul, Melda Pita Uli
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Vol. 4 No. 1 (2024): October 2024
Publisher : Yayasan Kita Menulis
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.59934/jaiea.v4i1.665
In today's digital era, digital image exchange has become very common in various industries, but this also increases security risks such as counterfeiting, image manipulation, and information theft. To protect the confidentiality of information in digital images, encryption is a fairly effective method. Hill Cipher, as a classic cryptographic method, offers matrix-based encryption, while Advanced Encryption Standard (AES) is known for its high level of security and efficiency. By combining Hill Cipher and AES, encryption systems can leverage the strengths of classic and modern cryptography together, providing an additional layer of protection that strengthens the security of digital data and reduces vulnerabilities that may exist in each method separately. This approach provides a more comprehensive solution for maintaining the confidentiality of digital images in the context of evolving security threats.
Diagnosa Penyakit Kanker Prostat menggunakan Metode Certainty Factor
Nezha Febriyan;
Achmad Fauzi;
Victor Maruli Pakpahan
Mars : Jurnal Teknik Mesin, Industri, Elektro Dan Ilmu Komputer Vol. 2 No. 5 (2024): Oktober : Mars : Jurnal Teknik Mesin, Industri, Elektro Dan Ilmu Komputer
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.61132/mars.v2i5.341
The rapid development of information technology affects the way people access information, including in the health sector. Prostate cancer, as one of the most significant types of cancer in men, is often detected late due to lack of information and limited costs. To overcome this problem, a system is needed that is able to diagnose prostate cancer quickly, precisely, and accurately. This study aims to develop a web-based expert system using the Certainty Factor (CF) method to diagnose prostate cancer based on the symptoms that appear. The CF method was chosen because of its ability to determine the level of confidence in the facts or rules used in the diagnosis. This study uses data on symptoms and types of prostate cancer. The results of the study can help the public in recognizing prostate cancer symptoms early, with a high level of accuracy in diagnosis. This study is expected to make it easier for patients to make an early diagnosis and accelerate the treatment of prostate cancer.
SUPER ENKRIPSI DATA TEKS : KOMBINASI ALGORITMA AFFINE CIPHER, ELGAMAL, DAN RSA UNTUK PERLINDUNGAN OPTIMAL: Teknik Super Enkripsi pada Kriptografi
Muhammad Al Kahfi;
Mita Auva;
Denny Prayuda Putra;
Chintya Dwi Putri Br. Ginting;
Achmad Fauzi
Jurnal Sistem Informasi Kaputama (JSIK) Vol. 9 No. 1 (2025): Volume 9, Nomor 1, Januari 2025
Publisher : STMIK KAPUTAMA
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.59697/jsik.v9i1.949
Keamanan data telah menjadi perhatian utama, terutama untuk mencegah akses, manipulasi, dan pencurian data teks. Penelitian ini mengusulkan sebuah teknik enkripsi baru yang mengintegrasikan algoritma Affine Cipher, ElGamal, dan RSA. Pengakuan akan kekuatan masing-masing adalah dasar dari integrasi algoritma ini. Karena Affine Cipher mudah dioperasikan dan efisien pada tahap pertama proses enkripsi, maka algoritma ini dipilih. ElGamal dipilih untuk kriptografi kunci publik, yang terkenal untuk meningkatkan keamanan; RSA dipilih karena kemampuannya untuk menyediakan manajemen kunci yang aman dan melawan serangan brute force. Tiga fase adalah bagian dari metode enkripsi yang diusulkan. Affine Cipher mengenkripsi data teks terlebih dahulu; ElGamal meningkatkan keamanan kedua; dan yang terakhir, RSA meningkatkan perlindungan kunci. Penelitian ini berfokus pada investigasi kemanjuran dan kompleksitas keamanan algoritma. Penelitian ini diproyeksikan untuk memberikan solusi keamanan data teks yang dapat diterapkan untuk pemerintah, kesehatan, dan perbankan serta sektor lainnya.
PENERAPAN KOMBINASI ALGORITMA OTP DAN RSA PADA FILE GAMBAR
Meliala, Evan Syahputra;
Fira Dwi Yanti;
Anggi Meliana Br Hutasoit;
Sri Defriani Br Sembiring;
Achmad Fauzi
Jurnal Sistem Informasi Kaputama (JSIK) Vol. 9 No. 1 (2025): Volume 9, Nomor 1, Januari 2025
Publisher : STMIK KAPUTAMA
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.59697/jsik.v9i1.955
This study discusses the application of a combination of the One-Time Pad (OTP) and Rivest-Shamir-Adleman (RSA) algorithms to enhance data security in image files. The combination of these two algorithms offers higher security, with OTP used to encrypt image data with unique random keys, and RSA employed to securely encrypt the OTP key. This method leverages the strengths of each algorithm, namely OTP's mathematical security and RSA's key distribution capability. The results of the study indicate that this combination is effective in protecting image files from cryptographic threats, although challenges remain in terms of efficiency and compatibility with certain data formats. Keywords : Cryptography, OTP Algorithm, RSA Algorithm, Image file encryption, Data security, Hybrid encryption.