Claim Missing Document
Check
Articles

Found 16 Documents
Search
Journal : Internet of Things and Artificial Intelligence Journal

Performance Evaluation Of Hybrid System Monitoring Solar Panels Based On WSN Case In Smart Regional Drinking Water Company (PDAM) Parenreng, Jumadi Mabe; Zain, Satria Gunawan; Muhammad Fajri, syamsir
Internet of Things and Artificial Intelligence Journal Vol. 4 No. 3 (2024): Volume 4 Issue 3, 2024 [August]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v4i3.747

Abstract

This research is to design and build a wireless sensor network system to monitor the performance of the Regional Drinking Water Company (PDAM) smart solar module on the network server using the DS18B20 temperature sensor and the INA219 sensor. Of course, the use of solar panels also greatly reduces costs for consumers, so the design of this tool is a combination of switching methods between solar panels, batteries, and the State Electricity Company (PLN). There are still many obstacles to using solar panels such as: how effectively they absorb solar energy, and this can contribute to or reduce damage to digital meters not working. The working principle of this tool uses the Wireless Sensor Network (WSN) method so that the designed tool is placed on several solar panel modules on the Smart PDAM so that the sensor sends data to the network and technicians can control it in real-time. Data collection techniques use observation techniques and documentation to obtain test data. This research uses quantitative descriptive analysis techniques that are inductive, objective, and scientific, with data obtained in the form of numbers or statements that are evaluated and analyzed. The results of this study with the PDAM PCB board testing scenario with an average of 320.2 measurements with a multimeter showed an average result of 322.8 with a relative error of 2.6%. The test results with Smart PDAM components showed an average power consumption of 1789.2 mW. The observations of the two panels gave an average result of 887.1 on panel 1 and an average result of 908.7 on panel 2. The results of the DS18B20 temperature sensor comparison test showed an average error of 0.5%. The result of a switching scenario with 20 experiments, resulted in 9 switching operations to the battery and 11 switching operations to the solar panel. Monitoring the solar module with the INA219 sensor, 277 voltage, current, and power data were determined with an average of 17.1 V, 513.9 mA, and 481.5 mW. The calculation results use the exponential moving average formula to predict the 278th data with an exponential moving average of 20 based on sensor data showing a value of 294.7 mA while using a simple moving average is 590.1 mA.
Monitoring leakage in water pipe installation using a water flow sensor Prima, Delta Ardy; Atthariq, Atthariq; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 4 No. 4 (2024): Volume 4 Issue 4, 2024 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v4i4.861

Abstract

The need for water for humans is the main thing and cannot be replaced with anything else. Water will always be needed every time for consumption and daily activities. Therefore, the need for water is always considered in the distribution process so that every community can meet its water needs. Especially residential areas where water needs are important. However, there are obstacles to pipe leaks that cause this water distribution to be hampered. The development of the Internet of Things is the main solution in terms of monitoring water flow and water pressure in pipes. This makes it easier for pipe repair parties to increase the effectiveness of their supervision of the condition of their housing pipes. Based on the results of trials and evaluations that have been carried out, it gives the conclusion that the existence of this system can help pipe repair parties in knowing the state of water flow in pipe installations in their residential areas. This system is also supported by using the calculation of physical formulas such as the Bernoulli equation and the principle of continuity where the formula P = 1/2ρV² has been used in the calculation of calibration on the water flow sensor and to test the validation of the results issued by the water flow sensor, the Absolute Relative Error calculation is also used where the formula used is Absolute Relative Error = | (estimated - actual) / actual | * 100. Through the calculation processes carried out, it can increase the chances of reading data that is more accurate than usual and the results will be maximized in detecting any anomalies that occur during monitoring. Therefore, the opportunity to implement a residential pipe monitoring system is a convincing thing to do in improving services that are more responsive to residents in the housing complex.
Implementation of the Convolutional Neural Network Method in Highway Traffic Monitoring Systems Atthariq, Atthariq; Azhar, Azhar; Hendarawaty, Hendarawaty; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 5 No. 1 (2025): Volume 5 Issue 1, 2025 [February]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v5i1.862

Abstract

Traffic Flow Calculation is one of the first steps in urban planning and road infrastructure management, for monitoring traffic flow on a road is very important. To do traffic planning, the Department of Transportation must count every passing vehicle where later the data will be used as material for analysis. Currently, the Department of Transportation calculates vehicles that pass on a road by calculating it with manual tools, so it requires large operational costs and takes a long time. Based on the problems faced, the researcher offers a solution for an intelligent traffic flow monitoring system that can count the number of vehicles that pass by using a closed circuit television camera (CCTV) installed at every city traffic light. Here we propose a high-performance algorithm model You Only Look Once (YOLO), which is based on the TensorFlow framework, to improve real-time vehicle monitoring. From the results of testing the system was built using the Python programming language using the YOLOv4 method, the Tensorflow library, and the PyQT5 library. The accuracy of reading the number of passing vehicles is 97%.
The Implementation of Wireshark and IPtables Firewall Collaboration to Improve Traffic Security on Network Systems Wahid, Abdul; Firdaus, Muhammad Eka; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 1 No. 4 (2021): Volume 1 Issue 4, 2021 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1129.116 KB) | DOI: 10.31763/iota.v1i4.509

Abstract

Along with the development of the internet era which is very fast today, the network security system becomes a very urgent matter and needs attention. The number of criminal activities and cyber attacks that attack servers through the network makes a server administrator need to make extra efforts in maintaining and monitoring data traffic that enters or leaves the server system. One of the efforts often made by server admins is to monitor server activity and then immediately secure the server from attacks that they identify from the monitoring results. data packets. Here an algorithm is built where the output of the Wireshark application is an analysis result that will distinguish the presence of a malicious accessing IP and then notify the server admin to set the firewall and block the IP that is considered dangerous, or analyze the port that is temporarily under attack and then notify the admin to close the port. . From the results of this algorithm research by simulating attacks using Synflood Attack on the server, it can be seen that the level of effectiveness of the algorithm in dealing with attacks can make RAM and CPU lighter so that it does not burden the hardware when compared to without using the algorithm and also makes system network traffic more efficient.
Secure Wireless Sensor Network using Cryptography for Smart Farming Systems Wahid, Abdul; Juliady, Ilham; Zain, Satria Gunawan; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 2 No. 4 (2022): Vol. 2 No. 4 (2022): Volume 2 Issue 4, 2022 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1555.547 KB) | DOI: 10.31763/iota.v2i4.554

Abstract

Internet of Things (IoT) technology has become part of human life. Agriculture in many parts is one of IoT implementation segment including the Cultivation of mold oysters. Internet of Things (IoT) is applied to collect data from combined sensors in the Wireless Sensor Network (WSN) will make it easy for farmers to monitor and control garden they remotely. Regardless of the application system control distance far based WSN that will make it easy for a farmer, the system has gap security, and one of them that is hacking and tapping of communication data The IoT . is really dangerous on effort if condition room mold oyster the known by someone hacker who can just is rival effort. It is a needed something method for secure communication when the data transfer process is over-guaranteed. The method used is application Base64 -based data encryption/decryption on WSN node devices and controlling and monitoring mobile devices. Based on results trials carried out after the implementation of Secure WSN with scenario tapping using the Wireshark tool show no data can be read. Analysis results show that this model could be applied as Secure WSN for Smart Farming System.
Development of a Parking System Using the High Sensitive R503 Fingerprint Sensor for Sequential Search Algorithm Based Customer Detection Suhartono, Suhartono; Parenreng, Jumadi M; Syafriandi K, Fahri; Zain, Satria Gunawan; Suhardi, Iwan
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 2 (2023): Volume 3 Issue 2, 2023 [May]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i2.586

Abstract

Today's technological developments are very sophisticated. It can be seen with various innovations in this era, from simple innovations to innovations that are trending in the world. Parking is a condition where the driver places his vehicle in a parking lot. The parking system using the Radio Frequency Identification (RFID) system has become a technology applied to parking systems, by facilitating and providing security to customers when parking, even though they have used an RFID card, the drawbacks of the system are that anyone who has an RFID card can issue the owner's vehicle another by using the same RFID card. The solution to the lack of an RFID-based parking system is by using the High Sensitive R503 Fingerprint Sensor which will make security much better than using an RFID card, by applying the Sequential Search Algorithm to detect customers in fingerprint registration applications and using the Fingerprint R503 sensor with data verification speed. average 0.78 Second to open the parking portal.
Integrated Smart Rescue Box Design With Information Systems as a Solution to Indonesian Disaster Emergency Response Supriadi, Dewi Sri Mulyana; Jaya, Hendra; Djawat, Yasser Abd; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 1 (2023): Vol. 3 No.1 (2023): Volume 3 Issue 1, 2023 [February]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i1.600

Abstract

This study uses the design method with a prototype research model. This is motivated by the fact that Indonesia is prone to natural disasters, so preparing for an effective and efficient disaster emergency response process is necessary. The resulting innovation is an intelligent rescue box prototype product integrated with an information system as a disaster emergency response solution, especially in meeting the basic emergency needs of post-disaster refugees. The effect will consist of two, and the first is the Smart rescue box (SRB), which provides the emergency needs of evacuees in one package to meet the electricity needs of refugees. There is a solar tracker system with real-time clock (RTC) data that is set as if it can follow the direction of the sun's movement for maximum absorption of sunlight. The second product is the SRB information system which is a disaster information system consisting of several useful features and a disaster education menu that can provide insights regarding disasters and disaster information that can be accessed easily. The measurement and observation test results show that the product has worked as expected, so it is feasible. The resulting product is still in the form of a prototype so that suggestions for further research can be further developed in terms of features and technology to become a complete product to facilitate the disaster emergency response process.
Security System Analysis Using the HTTP Protocol Against Packet Sniffing Attacks Manguling, Inez sri wahyuningsi; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 4 (2023): Vol. 3 No. 4 (2023): Volume 3 Issue 4, 2023 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i4.612

Abstract

The security level of the SIM MBKM website information system needs to be analyzed because it is accessed by many students who provide essential data. The security testing process for the SIM MBKM system uses the software Ettercap and Wireshark to test the system's security level and network data against cybercrime attacks. The results of these experiments showed the same essential data, but Wireshark displayed more personal information. The difference lies in the system architecture using different methods or stages, namely ARP Poisoning and Filtering HTTP. The third difference is the estimated time taken during the experiment. Ettercap and Wireshark applications enable eavesdropping on confidential and essential data and information. Through security testing using Ettercap and Wireshark, more critical data is displayed. solutions and preventive actions can be implemented by encrypting confidential data and improving website security using the HTTPS (Hypertext Transfer Protocol Secure) protocol.
Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN) rosyidah, aliyyah; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 3 (2023): Vol. 3 No. 3 (2023): Volume 3 Issue 3, 2023 [August]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i3.613

Abstract

The network security system is continuously advancing alongside technological developments. VPNs, which utilize open networks, aim to provide security by leveraging IPSec to transmit private data through L2TP tunneling strategy from the server to the branch computer/client and vice versa. Conversely, it can also lead to poor security practices. VPNs are implemented using the layer 2 IPSec tunneling protocol with two MikroTik devices. Testing is conducted to assess the security and speed of the network using the command line and MikroTik Winbox, where the server monitors packet delays to determine the improvement in network security quality. This research has identified several weaknesses in implementing this VPN protocol, namely the need for caution regarding the security of transmitted data to prevent misuse by the VPN provider
Network Security Analysis Using Switch Port Security CPT Istiqamah, Nurfadilah; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 4 (2023): Vol. 3 No. 4 (2023): Volume 3 Issue 4, 2023 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i4.614

Abstract

The gradual advancement of information network technology has rapidly increased due to the growing demand for efficient, stable, and fast network connectivity, as well as reliable information security. One factor that influences network quality is network security, which encompasses various techniques to enhance network security, such as building firewalls, layer seven protocols, and port security. Port security utilizes existing ports to enable secure switching access. The switch can protect the local area network (LAN). Several types of switch port security are commonly used, including default/static port security, dynamic learning port security, and sticky port security.
Co-Authors Abd. Fattah Abd. Fattah Abd. Rahman Patta Abd. Rasyid Syamsuri Abdul Hafizh Abdul Hafizh Abdul Muis Mappalotteng Abdul Wahid Abdul Wahid Abdul Wahid Ade Mulawarman Adi, Puput Dani Prasetyo Adiba, Fhatiah Ahmad Ridwan Ahmad Wahyudi Ahmad Wahyudi Akbar, Trisakti Al Imran Al Imran Alimuddin Sa’ban Miru Alimuddin Sa’ban Miru Aminuddin Bakry Anak Agung Istri Sri Wiadnyani Andani, Andi Ferry Adlian Tri Andi Baso Kaswar Andi Baso Kaswar Andi Farmadi Andi Wawan Indrawan Andi, Asirah Anggit Priadmojo Ary Masharuddin Shiddiqi Asham Bin Jamaluddin Aswa, M. Andika Atthariq, Atthariq Ayu Lestari Ayu Lestari Azhar Azhar Baso, Fadhlirrahman Budi, Tri Setyo Cyahrani Wulan Purnama Cyahrani Wulan Purnama Rasyid Dewi Fatmarani Surianto Djawat, Yasser Abd Djuanda, Djuanda Dodon Turianto Nugrahadi Dyah Vitaloka Edi Suhardi Rahman Fachrul, Achmad FADIAH, NUR Fahmi, Moghfina Moghfina Fajar B, Muhammad Farid Wajidi Fathahillah Fathahillah Fatimah Hidayahni Amin Febry Maryani Yatu Febry Maryani Yatu Fhatiah Adiba Firdaus Firdaus, Muhammad Eka Ganefri . Haq, Andi Muh. Sahirul Harifuddin Haripuddin Hartono Hartono Hasrul Bakri Hendarawaty, Hendarawaty Hendra Jaya Hentje Ponto I Nyoman Sila Ibnu Fikrie Syahputra Iin Mahgafhira Ikram Anas Ikram Anas Ilham Juliady Irmawati Irmawati Irmawati Irmawati Irmawati Irvanshah Irvanshah Irwan Budiman Istiqamah, Nurfadilah Iwan Suhardi Jariah, Rezki Nurul Jufri, Muhammad Fadhil Juliady, Ilham Jusniar . Kasim, Muh. Alwi Rizkyansyah Kurnia Prima Putra Kusnandar, Welly Chandra Kusumah Lia, Resky Amalia M. Fajar B M. Ruhan Bachry M. Syahid Nur Wahid M. Syahid Nur Wahid Mahabror, Dendy Manguling, Inez Sri Wahyuningsi Massikki, Massikki Moghina Fahmi Muh Mujahidin Muh. Irfan Nur Muh. Yusuf Mappeasse Muh. Yusuf Mappeasse Muhammad Agung Muhammad Agung Muhammad Agung Muhammad Agung Muhammad agung Muhammad Alkaff Muhammad Fajar B Muhammad Fajri, syamsir Muhammad Ilyas Syarif Muhammad Mahdinul Bahar Muhammad Mahdinul Bahar Muhammad Reza Faisal, Muhammad Reza Muhammad Yahya Muharram Muharram Muhira Muhira Muliadi Muliadi Muliadi Mustari Mustari Mustari S. Lamada Nununk Febryanti Nur, Muh Irfan Nurdin Nurdin Nurftriani Maskur Nurul Istiqamah Qalbi Nurul Izzah Dwi Nurul Izzah Dwi Nurdinah Parenreng, Syarif Mabe Prima, Delta Ardy Putra, Muh. Fardika Irwan Pratama Rais, Muh Rasyid, A. Ramli Rasyid, M. Udin Harun Al Riana T.Mangesa Ridwan Daud Mahande Rizal, Fahru rosyidah, aliyyah Sanatang Saragih, Triando Hamonangan Sariningrum, Ros Satria Gunawan Zain Seny Luhriyani Sunusi Shiraj, Muhammad Reza Sofyan, Muh Azikin Sugeng A. Karim Sugeng A. Karim Suhartono Suhartono Suhartono Suhartono, Suhartono Suhendar Aji Putra Suhendhar Aji Putra Supeno Djanali Supriadi, Dewi Sri Mulyana Suyanta Suyanta Syafriandi K, Fahri Syahrul Syahrul Syahrul Syahrul Syamsinar Syarifuddin Kasim Syarifuddin Kasim Tenri Nadya Wenny Titin Jumriah Tri Setyo Budi Tri Setyo Budi Usman Mulbar Wahda Arfiana AR Wahid, M. Syahid Nur Wahyu Hidayat M Wahyu Hidayat M Wahyuni , Maya Sari Wahyuni, Maya Sari Widyanti Utami A. Winda Agustina Yasdin, Yasdin Yunus Tjandi Yunus Tjandi Yusuf, Zulfatni Zulhajji, Zulhajji Zulkiplih Zulkiplih Zulkiplih Zulkiplih Zulkiplih