Claim Missing Document
Check
Articles

Implementasi Teknologi Virtualisasi Berbasis Kontainer untuk Perangkat Internet of Things pada Pertanian Presisi Mahendra Data; Widhi Yahya; Andika Kurniawan
CYBERNETICS Vol 3, No 01 (2019): CYBERNETICS
Publisher : Universitas Muhammadiyah Pontianak

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (292.645 KB) | DOI: 10.29406/cbn.v3i01.1448

Abstract

Pada bidang pertanian, Internet of Things (IoT) digunakan untuk mengendalikan sensor pertanian dan menghubungkannya dengan infrastruktur cloud dengan tujuan untuk menunjang pertanian presisi. Salah satu tantangan dalam penerapan IoT dalam pertanian presisi adalah keberagaman aplikasi dan protokol komunikasi di tengah keterbatasan sumber daya perangkat sensor yang digunakan. Ketergantungan library dan versi program yang saling kontradiktif mendorong diperlukannya terobosan baru dalam implementasi aplikasi sensor atau gateway pertanian presisi. Pada penelitian ini penulis mengimplementasikan virtualisasi berbasis kontainer untuk perangkat IoT pada pertanian presisi yang memudahkan pengimplementasian program pada satu perangkat tanpa mengurangi kinerja dari perangkat IoT. Program virtualisasi yang kami gunakan adalah Docker yang diimplementasikan ke dalam perangkat gateway IoT berupa Raspberry Pi. Hasil penelitian ini membuktikan bahwa penggunaan Docker, tidak menurunkan kinerja Raspberry Pi. Sehingga penggunaan Docker pada infrastruktur IoT pertanian presisi sangat mungkin untuk dilakukan karena memberikan keuntungan berupa kemudahan dalam implementasi, update, dan pengisolasian proses.
Sistem Rekomendasi Pemilihan Sekolah Menengah Atas Sederajat Kota Malang Menggunakan Metode AHP Electre dan Topsis Ibnu Aqli; Dian Eka Ratnawati; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 1 (2017): Januari 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (762.289 KB)

Abstract

Pemilihan tempat pendidikan yang bagus dan sesuai dengan kemampuan anak merupakan hal yang harus dikombinasikan untuk menunjang kemampuan perkembangan seorang anak. Apalagi pada masa pemilihan sekolah setelah lulus jenjang Sekolah Menengah Pertama (SMP) merupakan suatu keputusan yang harus dilalukan sambil mempertimbangkan masa depan. Dalam memilih sekolah lanjutan banyak hal yang biasanya dipertimbangkan, seperti Nilai Ujian Nasional (NUN) yang di dapat oleh siswa, jarak antar rumah siswa dan sekolah, fasilitas sekolah, bahkan prestasi-prestasi sekolah yang dianggap bisa menunjang kemampuan siswanya. Dari permasalahan tersebut, maka dirancang sebuah sistem untuk memberikan rekomendasi sekolah menengah atas sederajat di Kota Malang. Penelitian ini menerapkan metode Analytical Hierarchy Process (AHP) - Elimination Et Choix Tranduisant La Realité (ELECTRE) - Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). AHP melakukan perhitungan pembobotan kriteria, ELECTRE melakukan klasifikasi alternatif “favourable”, dan TOPSIS melakukan perankingan terhadap alternatif sehingga muncul rekomendasi sekolah yang sesuai dengan kriteria pengguna. Untuk pengujian, dilakukan uji akurasi pada metode TOPSIS dengan membandingkan data rekomendasi yang dikeluarkan oleh sistem dengan data yang didapat dari pakar. Pengujian akurasi pada metode TOPSIS mendapatkan nilai akurasi sebesar 82,98%.
Analisis Performa Mekanisme Error Recovery Menggunakan Automatic Repeat Request (ARQ) dan Forward Error Correction (FEC) pada Multi Receiver File Transfer Kusnul Aeni; Mahendra Data; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 9 (2017): September 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (907.394 KB)

Abstract

File transmission from one to multi receiver has higher probability in packet loss compare with one to one transmission. Error recovery mechanism is needed to overcome packet loss. Error recovery mechanism that common use is ARQ (Automatic Repeat Request) and FEC (Forward Error Correction). This research aim is to compare the error recovery performance of ARQ and FEC mechanism. Example of ARQ application based reliable multicast transfer is UFTP, and the example of FEC application mechanism based on reliable multicast transfer is UDPCast. In this research, testing process was done with text files transmission using WANem (Wide Area Network Emulator) as a network emulator. There are 5 file redundant categories (in percent) added in FEC mechanism that will affect the file transmission. In this research, there are 30 scenarios for testing based on packet loss category and file size to be sent. All file used for testing has the size in the range of 20 MB to 100 MB. The test result indicate that in a good network condition, in general the use of error recovery mechanism, ARQ has better performance than FEC mechanism. Meanwhile, in a poor condition (with 25% packet loss), the used of FEC mechanism is better choice.
Pemodelan Sistem Pemantauan Posisi Kereta Api Berbasis RFID Menggunakan Protokol Message Queue Telemetry Transport (MQTT) Anggit Surya Gumilang; Rakhmadhany Primananda; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 12 (2017): Desember 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (700.036 KB)

Abstract

Nowadays trains have become one of the most popular public transportation. The high demand of this transportation certainly will affects increasing the number of trains itself and it's routes. Therefore a system that can facilitate the monitoring of the position of the trains during a trip was required. Indeed PT. Kereta Api Indonesia (Persero) has started applying modern technology in monitoring their trains positions to improve the quality of their services. In monitoring the position of the railway circuit, a GNSS-based monitoring software named LocoTrack has been used before. However, blind spot points and positioning accuracy addressed from GNSS utilization still need to be fixed. This research will discuss about other ways to monitor the position of the trains during a trip that can improve the results of an existing LocoTrack app. This research will propose the use of radio frequency identification (RFID) technology as a marker medium of position and Message Queue Telemetry Transport (MQTT) as data communication protocol. The results showed that the use of RFID as position marker can be done and has very good accuracy. Also the use of the MQTT protocol as a data delivery medium can support lighter and faster delivery.
Implementasi Autentikasi Json Web Token (Jwt) Sebagai Mekanisme Autentikasi Protokol MQTT Pada Perangkat NodeMCU Andri Warda Pratama Putra; Adhitya Bhawiyuga; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 2 (2018): Februari 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1313.419 KB)

Abstract

IoT is a concept that aims to expand the benefits of continuously connected internet connectivity. MQTT is a protocol that used for M2M / IoT communications running over TCP / IP protocols designed as brokers based on the exchange of publish / subscribe messages for small code (eg 8-bit, 256KB ram controller), low power and bandwidth, connection and high cost, Availability of varables, negotiation of delivery guarantees (Špeh & Heđ, 2016). To perform client verification, traditional MQTT authentication uses the username and password in the authentication message. JWT is a very random string tokens for system authentication and information exchange. JWT secures information into a claim that is encoded into JSON and becomes a payload of JSON Web Signature (JWS) (Bradley, 2015). Token can be verified and trusted because it has been digitally signed can use HMAC or RSA. The contents of the signature on JWT is a combination of header and payload content, if there is a change in the header / payload then the signature will become invalid. NodeMCU is used as a publisher because the power consumption required by NodeMCU is less when compared to other sensor nodes such as Raspberry Pi. In this research, the implementation of JWT on MQTT using NodeMCU as publisher. In this research, there are three core test such as testing of username and password validation, expiration token test, and testing of token generate time. The result of this research is JWT that was implemented to validate username and password submitted by the publisher, JWT is able to authenticate the expired tokens, and the time required by the server to generate tokens is varied influenced by the response server to the publisher request vary.
Perbandingan Performa Reverse Proxy Caching Nginx dan Varnish Pada Web Server Apache Muhammad Luthfi; Mahendra Data; Widhi Yahya
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 4 (2018): April 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (673.511 KB)

Abstract

Web servers are now an essential part of both developing and newly started companies. Apache is the web application server with the most revenue in the world. Apache, however, has some drawbacks, one of which is that Apache is become slower when serving many requests continuously. One way to improve the performance of Apache web servers is by reverse proxy cahing. Of the many reverese proxy caching, Nginx and Varnish have the highest reputation. To find out the resource management and quality of service revese proxy caching Nginx and Varnish on the Apache web server will be tested by sending a number of requests to the web server. As a result, both servers with reverse proxy caching can outperform the Apache web server without reverse proxy caching on CPU usage and latency in the first 3 tests, whereas on Apache server load testing without reverse proxy caching it provides smaller latecy than Apache servers without revese Proxy cacahing. The comparison between Varnish reverse proxy caching and Nginx paired on the Apache web server, giving the Apache server results with reverse proxy caching Varnish performs better than the Apache server with Nginx reverse proxy caching.
Perancangan Aplikasi Pemantauan Pendaki Gunung Menggunakan Wireless Network Dengan Protokol MQTT Feriz Pradibya Uditama; Rakhmadhany Primananda; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 5 (2018): Mei 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (764.467 KB)

Abstract

The increasing cases of missing mountain climbers each year has become a major topic in this case. The last case that can be taken by the author as a reference is the missing climber in Mount Semeru which until now has not been found. From BASARNAS in search of missing mountain climbers so far still uses several methods of searching using drones equipped with thermographic cameras to measure body temperature, using sniffer dogs and the last one is manual with human help. In this study the author tries to find new solutions to help BASARNAS team in searching for the missing climber. The solution offered is the implementation of the publish-subscribe method of mountaineering monitoring system. Mountain area known as area with no reach of internet hence by method of publish-subscribe can facilitate officer to do monitoring of existence of climber. This method allows for data transmission that is by using the help of architectural nodes are interconnected and can be contacted by mobile node belongs to the climbers themselves by utilizing his smartphone. By using this method then the officer will easily find the missing climber's search point. Officers will be able to know the whereabouts of the last climber before being declared lost through the last location information provided by the missing climber. Officers can also request information from other climbers about the missing climber in realtime. Data delivery using the publish-subscribe method will smoothly reach the destination thanks to architectural nodes acting as intermediaries. So far the tests conducted in this study get results in accordance with the purpose of using the method.
Pengembangan Sistem Visualisasi Access Log untuk Mengetahui Informasi Aktivitas Pengunjung pada Sebuah Website Rani Andriani; Eko Sakti Pramukantoro; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 6 (2018): Juni 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1363.508 KB)

Abstract

Access log record all requests that processed by the web server. Access log is a file that contains an important line about website visitors. However, access log data is still in the form of raw data so it is difficult to read and analyzed to get activity information of website visitors on a website. In this research, the solution offered is to make a web-based application that can be used as a tool for knowing visitors' activity information on a website using access log data from an apache server. The data of access log will be parsed and the result data of the parsed access log will be saved into the MySQL database. Then this data is filtered by using a specific query in MySQL for later visualized by the application to the form of graphics or tables for further analysis. Based on the results of this study, Access Log Visualizer has been able to parse access logs by using regex and retrieve the access log data from the database by using MySQL query and display the visualization of the data access log, so that this system can process access log data for knowing activity information of website visitors on a website.
Otomatisasi Publikasi Resource File Sharing Menggunakan UPnP Based System Anggi Atmajaya Siagian; Eko Sakti Pramukantoro; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 4 (2018): April 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (868.402 KB)

Abstract

Many technology offer to do the transfer data process. But those technology have its weakneses. UPnP is one of file sharing technology who able to cover the other weakneses. With using ssdp and soap protocol, UPnP able to zero configuration, multicast and can be used with various platform. Research using implementative method to able find out how UPnP can do the transfer data process and its performance in a network. The author do experiment to program model dan modify it so the program accordingly as desired. Program model successfully created and devided into server program and client program. From the program model UPnP able to do data transfer process with help from http protocol. For UPnP performance, with 500Mb data transfer speed can reach 15.69Mbps and with 1Gb data transfer speed can reach 4.65Mbps and from testing, server can accommodate 3 clients.
Analisis Konsumsi Daya dan Performa Pengunggahan dan Pengunduhan Data Pada Jaringan Ad-Hoc dan Jaringan Infrastructure Pada Raspberry Pi Dhani Wahyu Wijaya; Rakhmadhany Primananda; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 7 (2018): Juli 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (644.773 KB)

Abstract

Nowdays, there are a lot of research about IoT that connects multiple devices to communicate with other devices using wireless network and several sensors. The sensor depends on the source of the electrical power, it is a battery or power bank which has limited power capacity. The limitation of electric power capacity cause some problems, for the sensor Raspberry Pi which is expected to be able to survive as long as possible. Thus, it is studied to upload and download the data by Ad-Hoc network and Infrastructure in one room and some rooms to figure out network performance and power consumption. A tool to measure the voltage and current used is the USB Doctor Weight and the protocol that is used is SCP. In testing of uploading and downloading 32 MB, 64 MB and 128 MB data in one room resulted in better performance and more efficient power consumption in network infrastructure. While on uploading and downloading data in some rooms with data 32 MB and 64 MB remain more efficient on Infrastructure network but on 128 MB data have decreased performance. The results of the 128 MB data upload test with Ad-Hoc network require power 0,06548 Wh and the download require power 0,04802 Wh. Then on a 128 MB data upload with Infrastructure network require power 0,09294 Wh and the download require power 0,07745 Wh. The power consumption difference with 128 MB data on upload is 0,0275 Wh and download 0,02943125 Wh by using Ad-Hoc network. So it can be concluded that in the study upload and download data of 32 MB, 64 MB, in one room and in some rooms more power efficient through the network Infrastucture. While on the upload and download 128 MB data in some rooms more power efficient through the Ad-Hoc network, because the Infrastructure network decreased performance.