Claim Missing Document
Check
Articles

Pemilihan Aturan Fuzzy Inference System Mamdani Menggunakan Algoritme Particle Swarm Optimization Dalam Sistem Penyiraman Otomatis Pada Tanaman Tomat Indah Larasati; Budi Darma Setiawan; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 11 (2018): November 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1225.657 KB)

Abstract

Laboratorium Tanah Benih Balai Pengkajian Teknologi Pertanian (BPTP) East Java is one of the institutes to do some research on plant nursery. One of soil testings which have been done in Laboratorium Tanah BPTP East Java is the parameter testing soil humadity. The research laboratory, right now, is developing an automatic watering based on soil humadity sensory to predict the amount of water needed to keep the humadity of the growing seed media. This research will figure out how much water plant volume with two input variables which are the initial humadity and flushing duration using Fuzzy Inference System Mamdani method. The two variables can cause often repeated rule based fuzzy or the same rule used more than once. Thus, to prevent these things to be happened, it needs fuzzy rule base fuzzy choice by using Particle Swarm Optimization algorithm. The testing was done in ten times trials by applying the amount of particles which is 250, value of inertia quality (w), which is 0,7, combination value of C1 and C2, which are 1,4 and 1,3, and the maximum iteration, which is 2500, and then it obtained the highest fitness value is on the seventh trial, which is 0,39949 with Root Mean Square Error (RMSE) value, which is 1,50319. The result from the highest fitness value is able to change the system from 27 arrangements to eight arrangements.
Perancangan Klaster Sistem Penguji Kode Program Menggunakan Docker Ferdi Cezano Santosa; Mahendra Data; Heru Nurwarsito
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 11 (2018): November 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (593.89 KB)

Abstract

Automated source code evaluation system is a system used to examine a program, in fact its research has been around since 1965. As technology grows, more and more people use Docker to create this system. By using Docker, system will be isolated so it can make computer safe. That's why the automated evaluation system in this study uses Docker to make sure the computer is safe. Even though the system can run safely, there are still some problems occurred on the automated system. The problem is how to make the evaluation process efficient and less burdening the computer and how to speed up the evaluation process if there is a program that takes a long time to be evaluated. Therefore, this research will make a cluster of automated source code evaluation system. In this cluster, there will be two instances, a master that divides the task and slaves that run the evaluation. Master and slaves will be connected with RPC because master will only call a function on the slave. The division of tasks will use round-robin algorithm, where slaves will be selected interchangeably. The test results show that this cluster capable of evaluating programs and able to evaluate up to 104 programs at once. In addition, this cluster can also divide the task efficiently so it can reduce the burdens on the computer and speed up the evaluation if the program takes a long time to be evaluated.
Implementasi Algoritme Speck untuk Enkripsi dan Dekripsi pada QR Code Yuniar Siska Fatmala; Ari Kusyanti; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (984.066 KB)

Abstract

Along with the development of technology, emerging new technologies are predicted to replace the function of the barcode. The technology is QR code technology. Quick Response Codes or QR codes are two-dimensional barcodes developed by Denso Wave Corporation in 1994. The QR Code is capable of storing information that is large enough therefore the QR Code needs to be secured because currently there is a lot of piracy of a code, which will harm someone or a related agency. There are several efforts to maintain data confidentiality so that it is not misused, one of which is by implementing the SPECK algorithm. SPECK is a family of lightweight blockcipers published by the U.S. National Security Agency. in 2013. From the results of the SPECK algorithm implementation can be concluded that this application can encrypt all types of characters in the form of strings, letters, numbers or symbols that need to be secured, and when decrypting the QR Code the application will activate the camera function and scan the QR Code that will become plainntext again. This is evidenced in security testing which proves that the results of ciphertext are very different from plaintext. The execution time of encryption and decryption can be proven by testing the performance of encryption time with the total performance required time is 0.061614036560059 seconds and in testing the performance of the decryption time total performance of the time taken is 0.0039241313934326 seconds.
Implementasi Algoritme SPECK Pada Proses Pengiriman File Multimedia Melalui Jaringan Internet David Christanto; Ari Kusyanti; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1153.087 KB)

Abstract

Audio recording is one of the multimedia files that are often encountered today. One example is the sound recording that can be used as evidence in the trial of the law. The proof of sound recording is supported by UU No 11 Tahun 2008 Pasal 5 ayat 1 regarding information and electronic transactions that stated : "Electronic information and / or electronic documents and / or prints are legal evidence". Therefore, sound recording is very important to be kept secret from an unauthorized party. This study focuses on the aspect of confidentiality. This research implements SPECK algorithm to encrypt audio recordings. DHKE is also implemented as a public key exchange algorithm. Execution time encryption and decryption is performed by using various files extension and the duration of different audio recordings. The time of encryption and decryption of each file extension is slightly different. The execution time difference of encryption and decryption is less than 23 seconds. The results show that the file extension does not affect the execution time. The execution time is affected by the size of the file, whichs mean the bigger the size of the file, the longer the execution time.
Implementasi Algoritme Lizard untuk Pengamanan Protokol MQTT pada Perangkat NodeMCU Rizal Dismantoro; Ari Kusyanti; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1369.598 KB)

Abstract

The Message Queuing Telemetry Protocol (MQTT) protocol is one of the IoT protocol which has a mechanism based on topic-based publish-subscribed systems that have properties that are suitable to be implemented on devices that have limited resources. This is due to it has light-weight properties. MQTT is one of the protocols that is often used on IoT, but there are several weaknesses in the security issues. To ensure the data security an algorithm is needed to encrypt data. One of security algorithm for encrypting data is the Lightweight Stream Cipher for Power-constrained Devices (Lizard) algorithm. In the publisher section before the message is sent it will be encrypted (ciphertext). In broker the ciphertext will forward to the subscriber. In the subscriber, the message will be decrypted. Based on the test results, the Lizard algorithm implemented in the MQTT protocol successfully secure a system on NodeMCU device that take 1014419 microsecond.
Implementasi Algoritme Advance Encryption Standard (AES) pada Enkripsi dan Dekripsi QR-Code Dwi Qunita Putri Ambeq Paramarta; Ari Kusyanti; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (449.48 KB)

Abstract

Data security are very important in today's technological development. Therefore, it is necessary to find a way to protect the confidentiality and the security from unauthorized accesses. One of the mechanism to increase data security is to use cryptography. There are many form of cryptography, one of them is Advance Encryption Standard Algorithm. This thesis uses AES Algorithm with the size of 128 bit expansion key. That will operate in a 4x4 array. In the state encryption process will go through several stages of Addroaundkey, Subbyte, Shiftrows, and Mixcolumns 10 times round. But in the last round Mixcolumns no longer process directly into the Addraoundkey process, and for the decryption process is a reverse process of the encryption process that InvAddrows, InvShiftrows, InvSubbyte, and InvMixcolumns use the same round key with the encryption process. AES is implemented in PHP programming language and applied to QR-Code because it is a labeling technology that can store data in the form of patterns that can be filled with information. From the results of the implementation of AES Algorithm can be concluded that this application can encrypt all types of characters in the form of strings, alphabet, numbers, and symbols. When decrypting QR-Code the application will activate the camera function and perform QR-Code scanning that will be plaintext again. The execution time of AES encryption and decryption is 0.0034 seconds for the encryption process and for the decryption process takes 0.0029 seconds.
Penerapan Komunikasi Berbasis 6LoWPAN(802.15.4) Antara Node Sensor dengan IoT Middleware Binariyanto Aji; Eko Sakti Pramukantoro; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (483.351 KB)

Abstract

IoT middleware is one of the solutions of IOT Interoperability. The development of IoT middleware still needs to be developed and expanded. 6LoWPAN is an IPv6-based technology that has many advantages, beside superior on coverage, security, and scalability, 6LoWPAN is also designed for low-power devices. The purpose of this research is to realize IoT Middleware that is able to support network layer Interoperability, we want to add 6LoWPAN implementation on IoT middleware device which previously only have WLAN device. The middleware and sensor nodes will be tested for their ability to use 6LoWPAN technology, to ensure that previously running service on IoT middleware can run on 6LoWPAN technology. The results obtained are, IoT middleware can communicate with 6LoWPAN technology. Node middleware and sensor nodes can use the CoAP and MQTT protocols that stand on 6LoWPAN technology. It should be noted that CoAP and MQTT can work on the 6LoWPAN technology to ensure that the middleware node provides TCP6 and UDP6 where both protocols make CoAP and MQTT communicate based on Ipv6.
Implementasi Failover Dan Autoscaling Kontainer Web Server Nginx Pada Docker Menggunakan Kubernetes Yosua Tito Sumbogo; Mahendra Data; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (959.373 KB)

Abstract

Web server is an important part used to provide website services. Web server is used to serve website requests for 24 hours 7 days if the web server is dead then the website service will not be used. The condition of web server that can not work or failure can be caused by some things like hardware malfunction, crash on web server, power outage, and network failure. NGINX is one of the web server software provider. NGINX is able to install on virtual server computers using container methods. this facilitates the deployment process because the containers are lightweight and portable. In order for the web server to serve requests it requires failover mechanism and autoscaling. Kubernetes is a software that has a Docker-based failover and autoscaling container mechanism. In this research the amount of hardware used is 3 servers that make up a cluster using Kubernetes, where 1 server will become master and 2 server as minion. From the research obtained the average time required for failover is 264.74s for node failure, and 3s for service failure. the average autoscaling time of the system requires 45s for scale up and 108s for scale down. Autoscaling Kubernetes is able to reduce CPU usage by 0.4%. The built system is capable of running web server with clustering method.
Implementasi Algoritme SPECK dan SHA-3 Pada Database Rekam Medik Hilman Adi Kartika; Ari Kusyanti; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1366.567 KB)

Abstract

Medical record data has to be protected because the data contains personal data about medical history owned by patients and doctors. However in recent years, many cases of attacks or hacking are found. This study aims to secure data records on the database. To secure the data by applying the SPECK algorithm is implemented to ensure data confidentiality and SHA-3 algorithm to ensure the integrity of the data. SPECK algorithm is applied to the name, address, description, and symptom fields of the patient table, while the SHA-3 algorithm is applied to the user table's password field. Tests conducted in this study are, validation test vector, encryption and decryption validation, performance time of encryption and decryption, system functionality, and non-functionality system. The results of the test shows that test vector, encryption and decryption test are valid. The execute time of encryption and decryption on average is 11,2 milisecond for encryption and 11,295 milisecond for decryption. Functionality of the system runs according to function, and non-functional systems can run well on various web-browsers such as Microsoft Edge, Mozilla Firefox, Google Chrome, and Opera.
Implementasi Algoritme Grain V1 Untuk Enkripsi Gambar Pada Aplikasi Berbasis Web Andhika Brahmana Putra; Ari Kusyanti; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1273.549 KB)

Abstract

The challenge of dealing with illegal copying and distribution of multimedia documents is an important problem to be solved. Different techniques have been introduced such as encryption and digital watermarking to protect the data from unauthorized parties. In this study, data encryption is carried out in image format through web-based applications by using the Grain algorithm. Grain algorithm has an advantage of that it reduces the value of complexity and increases the speed of computing. Tests carried out are test vector validation testing, encryption and decryption validation testing, encrytime performance testing and security testing. The result of test vector, encryption and decryption validation test are valid. For encryption and decryption execution time of each image file extension resulted the longest execution time is on JPG extension files while the shortest execution time is on BMP.While for security testing obtained sniffing results using Wireshark which shows that the encrypted data is unknown to an authorized party. The conclusion of the above test is that the Grain algorithm can be performed by applying an image encryption mechanism that can protect data confidentiality.