Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Jurnal Teknologi Informasi, Komputer, dan Aplikasinya (JTIKA )

Sistem Pendukung Keputusan Penerangan Ruangan Berbasis IoT Menggunakan Protokol MQTT dan Fuzzy Tsukamoto Ahmad Fauzan Hakim; Wirarama Wedhaswara; Ahmad Zafrullah Mardiansyah
JTIKA (Jurnal Teknik Informatika, Komputer dan Aplikasinya) Vol 2 No 2 (2020): September 2020
Publisher : Program Studi Teknik Informatika, Fakultas Teknik, Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jtika.v2i2.99

Abstract

Inappropriate use of a light bulb in light conditions in the room causes electricity to go to waste. To conserve electricity and keep the lights from breaking quickly, it needs to be done to measure the condition of the light around the lamp. For that it requires a decision-making system of the lighting room based on the Internet of things and using MQTT protocol and fuzzy tsukamoto logic methods. The MQTT protocol used is CloudMQTT to store data or be called a broker. CloudMQTT has 4 important instance info, that is server, user, password, and port. 4. That instance info is used to connect the application program with the broker in order for the system to subscribe and publish from broker to application. For fuzzy tsukamoto combination of rules built up from the three functions of membership, that is the intensity of light, time, and the condition of the light. A combination of rules from two variables is light intensity and time generates 20 combinations of rules. Deffuzification on fuzzy tsukamoto earned by taking a centralized average.
Implementasi Internet of Things (IoT) untuk Pengawasan dan Penyiraman Otomatis pada Budidaya Cacing Tanah dengan Protokol MQTT Jamhur Ghifari; I Gde Putu Wirarama Wedaswhara W.; Ahmad Zafrullah Mardiansyah
JTIKA (Jurnal Teknik Informatika, Komputer dan Aplikasinya) Vol 3 No 2 (2021): September 2021
Publisher : Program Studi Teknik Informatika, Fakultas Teknik, Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The earthworm (Lumrbricus rubellus) has a special value that made it the material for cosmetics and medicine, the special value of the earth worm made it a cultivable animal. With IoT that can be implemented on every field, so was made a design of tool that will help the cultivator to keep and treat the living media of the worm. Using soil moisture sensor is the best choice because the main factor of earth worm life is the soil moisture. The ideal moisture for worm to live is 15%, with 5v submarine pump is enough to keep the soil in the best condition. Blynk application is support the development of IoT cause the apps is easy to use with lots of features and with the website that use fast and less energy MQTT protocol that suitable to developing IoT with limited resource and energy.
Optimasi Port Knocking dan Honeypot Menggunakan IPTables Sebagai Keamanan Jaringan pada Server Yayank Muhammad Abdussyakur; Ahmad Zafrullah Mardiansyah; Andy Hidayat Jatmika
JTIKA (Jurnal Teknik Informatika, Komputer dan Aplikasinya) Vol 3 No 2 (2021): September 2021
Publisher : Program Studi Teknik Informatika, Fakultas Teknik, Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jtika.v3i2.144

Abstract

Network security is the most important aspect of a system in maintaining data validation and integrity, as well as ensuring the availability of services for its users. The development of network security system demands a better security, especially in servers. However, there are still weaknesses in the server that controls incoming packet which results in more vulnerable it is to be stormed by Denial of Service and Brute Force attacks on the system. This study aims to improve network security performance using the Port Knocking and Honeypot methods which will be combined with the Iptables method. From the tests carried out with the addition of the IPTables method, an increase in performance of CPU usage (38.4%) and memory (44.2%) on servers and network security were obtained compared to those that only use the Port Knocking and Honeypot methods.