Articles
Prototype Smart Life Jacket Berbasis Teknologi Long Range Wireless Data Telemetry
Ikram Anas;
Muh. Yusuf Mappeasse;
Muliadi;
Satria Gunawan Zain;
Jumadi M Parenreng
Information Technology Education Journal Volume 2, Issue 1, Januari 2023
Publisher : Jurusan Teknik Informatika dan Komputer
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1051.992 KB)
|
DOI: 10.59562/intec.v2i1.265
Penelitian ini bertujuan untuk membuat sebuah prototype pelampung cerdas serta mengetahui hasil dari pengujiannya. Jenis penelitian yang digunakan dalam penelitian ini adalah Research dan Development (R&D) yaitu sebuah proses atau langkah-langkah untuk mengembangkan suatu produk baru atau menyempurnakan produk yang telah ada. Menggunakan prosedur pengembangan PPE (Pre Production, Production dan Post Production). Penelitian ini dilakukan untuk membuat protype pelampung yang dapat mengirimkan koordinat sekaligus untuk mengetahui hasil pengujian functionality pada prototype serta untuk mengetahi jarak jangkau pada prototype, akurasi gps serta penggunaan daya yang dibutuhkan. Hasil dari penelitian ini adalah didapatkan sebuah solusi untuk melakukan evakuasi korban kecelakaan laut. Produk yang dihasilkan adalah sebuah pelampung dengan perangkat yang dapat dideteksi titik koordinatnya apabila pelampung dikenakan oleh korban. Titik koordinat didapatkan dari GPS yang terpasang pada pelampung dan dikirim menggunakan modul LoRa. Titik koordinat pelampung dapat terdeteksi dari jarak rata-rata 1,05 kilometer dengan toleransi akurasi GPS sebesar 5,33 meter.
MEMBANGUN JIWA KEWIRAUSAHAAN DAN KEMANDIRIAN PEMUDA MELALUI KERAJINAN LIMBAH BAN BEKAS DAN WORKSHOP KONTENT DIGITAL
Parenreng, Jumadi Mabe;
Agung, Muhammad;
Kaswar, Andi Baso
Reswara: Jurnal Pengabdian Kepada Masyarakat Vol 2, No 1 (2021)
Publisher : Universitas Dharmawangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.46576/rjpkm.v2i1.908
Kawasan Antang dan sekitarnya berlokasi di wilayah pinggiran kota Makassar dan cukup terkenal karena merupakan Tempat Pemrosesan Akhir (TPA Antang) se-kota Makassar. Terdapat beberapa kategori sampah di TPA ini yaitu : sampah basah, sampah kering, sampah yang bisa didaur ulang, yang tidak bisa didaur ulang. Secara garis besar ada dua permasalahan yang bisa diselesaikan dengan implementasi PKM ini, yakni masalah sampah dan pengangguran. Keterbatasan pengetahuan penduduk sekitar mengakibatkan sampah yang sebenarnya masih dapat diolah ini terbuang begitu saja. Disisi lain pengangguran pada usia produktif merupakan permasalahan yang sampai saat ini masih menjadi persoalan hidup yang belum dapat diatasi sepenuhnya oleh pemerintah pusat maupun pemerintah di kota Makassar khususnya di daerah TPA Antang. Jumlah penduduk usia kerja terus bertambah sedangkan lapangan kerja belum cukup tersedia bagi para pencari kerja. Terlebih tidak adanya skill dan kompetensi yang dimiliki semakin mempersulit mereka untuk mendapatkan pekerjaan. Oleh karena itu, kami mengusulkan program pelatihan kemandirian pemuda antang Makassar untuk mengatasi permasalahan di atas. Program ini muncul dari ide untuk memberikan keterampilan kepada pemuda Antang dengan memanfaatkan salah satu jenis limbah yakni ban sepeda motor bekas dan ban mobil bekas untuk diolah menjadi produk layak pakai untuk mainan dan hiasan rumah dan pekarangan. Selain berbentuk mainan, olahan ban bekas bisa juga berupa aksesoris berupa pot bunga bermotif dan lain-lain. Kegiatan pelatihan kemandirian terbagi menjadi tiga tahapan, yakni tahap persipan, tahap pelatihan mengolah ban bekas dan tahap pelatihan promosi dan pemasaran hasil olahan melalui media digital. Pihak RT setempat sangat berterima kasih dengan pelaksanaan kegiatan ini karena akan membangun kepercayaan diri pemuda sekitar lokasi TPA Antang dan membangkitkan jiwa entrepreneurship yang mandiri, kreatif, inovatif dan berdaya saing. Selain itu, menumbuhkan minat kreativitas lainnya untuk memanfaatkan jenis sampah lain yang memungkinkan untuk didaur ulang
The Implementation of Wireshark and IPtables Firewall Collaboration to Improve Traffic Security on Network Systems
Wahid, Abdul;
Firdaus, Muhammad Eka;
Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 1 No. 4 (2021): Volume 1 Issue 4, 2021 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1129.116 KB)
|
DOI: 10.31763/iota.v1i4.509
Along with the development of the internet era which is very fast today, the network security system becomes a very urgent matter and needs attention. The number of criminal activities and cyber attacks that attack servers through the network makes a server administrator need to make extra efforts in maintaining and monitoring data traffic that enters or leaves the server system. One of the efforts often made by server admins is to monitor server activity and then immediately secure the server from attacks that they identify from the monitoring results. data packets. Here an algorithm is built where the output of the Wireshark application is an analysis result that will distinguish the presence of a malicious accessing IP and then notify the server admin to set the firewall and block the IP that is considered dangerous, or analyze the port that is temporarily under attack and then notify the admin to close the port. . From the results of this algorithm research by simulating attacks using Synflood Attack on the server, it can be seen that the level of effectiveness of the algorithm in dealing with attacks can make RAM and CPU lighter so that it does not burden the hardware when compared to without using the algorithm and also makes system network traffic more efficient.
Secure Wireless Sensor Network using Cryptography for Smart Farming Systems
Wahid, Abdul;
Juliady, Ilham;
Zain, Satria Gunawan;
Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 2 No. 4 (2022): Vol. 2 No. 4 (2022): Volume 2 Issue 4, 2022 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1555.547 KB)
|
DOI: 10.31763/iota.v2i4.554
Internet of Things (IoT) technology has become part of human life. Agriculture in many parts is one of IoT implementation segment including the Cultivation of mold oysters. Internet of Things (IoT) is applied to collect data from combined sensors in the Wireless Sensor Network (WSN) will make it easy for farmers to monitor and control garden they remotely. Regardless of the application system control distance far based WSN that will make it easy for a farmer, the system has gap security, and one of them that is hacking and tapping of communication data The IoT . is really dangerous on effort if condition room mold oyster the known by someone hacker who can just is rival effort. It is a needed something method for secure communication when the data transfer process is over-guaranteed. The method used is application Base64 -based data encryption/decryption on WSN node devices and controlling and monitoring mobile devices. Based on results trials carried out after the implementation of Secure WSN with scenario tapping using the Wireshark tool show no data can be read. Analysis results show that this model could be applied as Secure WSN for Smart Farming System.
Development of a Parking System Using the High Sensitive R503 Fingerprint Sensor for Sequential Search Algorithm Based Customer Detection
Suhartono, Suhartono;
Parenreng, Jumadi M;
Syafriandi K, Fahri;
Zain, Satria Gunawan;
Suhardi, Iwan
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 2 (2023): Volume 3 Issue 2, 2023 [May]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31763/iota.v3i2.586
Today's technological developments are very sophisticated. It can be seen with various innovations in this era, from simple innovations to innovations that are trending in the world. Parking is a condition where the driver places his vehicle in a parking lot. The parking system using the Radio Frequency Identification (RFID) system has become a technology applied to parking systems, by facilitating and providing security to customers when parking, even though they have used an RFID card, the drawbacks of the system are that anyone who has an RFID card can issue the owner's vehicle another by using the same RFID card. The solution to the lack of an RFID-based parking system is by using the High Sensitive R503 Fingerprint Sensor which will make security much better than using an RFID card, by applying the Sequential Search Algorithm to detect customers in fingerprint registration applications and using the Fingerprint R503 sensor with data verification speed. average 0.78 Second to open the parking portal.
Integrated Smart Rescue Box Design With Information Systems as a Solution to Indonesian Disaster Emergency Response
Supriadi, Dewi Sri Mulyana;
Jaya, Hendra;
Djawat, Yasser Abd;
Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 1 (2023): Vol. 3 No.1 (2023): Volume 3 Issue 1, 2023 [February]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31763/iota.v3i1.600
This study uses the design method with a prototype research model. This is motivated by the fact that Indonesia is prone to natural disasters, so preparing for an effective and efficient disaster emergency response process is necessary. The resulting innovation is an intelligent rescue box prototype product integrated with an information system as a disaster emergency response solution, especially in meeting the basic emergency needs of post-disaster refugees. The effect will consist of two, and the first is the Smart rescue box (SRB), which provides the emergency needs of evacuees in one package to meet the electricity needs of refugees. There is a solar tracker system with real-time clock (RTC) data that is set as if it can follow the direction of the sun's movement for maximum absorption of sunlight. The second product is the SRB information system which is a disaster information system consisting of several useful features and a disaster education menu that can provide insights regarding disasters and disaster information that can be accessed easily. The measurement and observation test results show that the product has worked as expected, so it is feasible. The resulting product is still in the form of a prototype so that suggestions for further research can be further developed in terms of features and technology to become a complete product to facilitate the disaster emergency response process.
Security System Analysis Using the HTTP Protocol Against Packet Sniffing Attacks
Manguling, Inez sri wahyuningsi;
Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 4 (2023): Vol. 3 No. 4 (2023): Volume 3 Issue 4, 2023 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31763/iota.v3i4.612
The security level of the SIM MBKM website information system needs to be analyzed because it is accessed by many students who provide essential data. The security testing process for the SIM MBKM system uses the software Ettercap and Wireshark to test the system's security level and network data against cybercrime attacks. The results of these experiments showed the same essential data, but Wireshark displayed more personal information. The difference lies in the system architecture using different methods or stages, namely ARP Poisoning and Filtering HTTP. The third difference is the estimated time taken during the experiment. Ettercap and Wireshark applications enable eavesdropping on confidential and essential data and information. Through security testing using Ettercap and Wireshark, more critical data is displayed. solutions and preventive actions can be implemented by encrypting confidential data and improving website security using the HTTPS (Hypertext Transfer Protocol Secure) protocol.
Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN)
rosyidah, aliyyah;
Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 3 (2023): Vol. 3 No. 3 (2023): Volume 3 Issue 3, 2023 [August]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31763/iota.v3i3.613
The network security system is continuously advancing alongside technological developments. VPNs, which utilize open networks, aim to provide security by leveraging IPSec to transmit private data through L2TP tunneling strategy from the server to the branch computer/client and vice versa. Conversely, it can also lead to poor security practices. VPNs are implemented using the layer 2 IPSec tunneling protocol with two MikroTik devices. Testing is conducted to assess the security and speed of the network using the command line and MikroTik Winbox, where the server monitors packet delays to determine the improvement in network security quality. This research has identified several weaknesses in implementing this VPN protocol, namely the need for caution regarding the security of transmitted data to prevent misuse by the VPN provider
Network Security Analysis Using Switch Port Security CPT
Istiqamah, Nurfadilah;
Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 4 (2023): Vol. 3 No. 4 (2023): Volume 3 Issue 4, 2023 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31763/iota.v3i4.614
The gradual advancement of information network technology has rapidly increased due to the growing demand for efficient, stable, and fast network connectivity, as well as reliable information security. One factor that influences network quality is network security, which encompasses various techniques to enhance network security, such as building firewalls, layer seven protocols, and port security. Port security utilizes existing ports to enable secure switching access. The switch can protect the local area network (LAN). Several types of switch port security are commonly used, including default/static port security, dynamic learning port security, and sticky port security.
Smart System for Stabilizing Water Flow Output on Android-Based Taps
Parenreng, Jumadi M;
Zain, Satria Gunawan;
Yusuf, Zulfatni;
Suhardi, Iwan;
Kaswar, Andi Baso
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 4 (2023): Vol. 3 No. 4 (2023): Volume 3 Issue 4, 2023 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31763/iota.v3i4.668
This study aims to produce and find out the results of the Smart System Stabilization Water Discharge Output Test on Android-Based Faucets based on the results of water flow sensor readings whose data is used as a reference for the rotation of the Adj or Adjustable Water Pressure Reducing Regulator Valve. The tests were carried out in the form of measuring water flow without and with Adj and measuring water discharge without and with Adj. Based on the research results, the water flow without Adj is 7 L/min for tap 1.9 L/min for tap 2. The water flow with Adj for both taps is 8 L/min. The flow of water from both taps is more stable with Adj than without Adj because the flow of both taps is 8 L/min. The measurement results of the water discharge without Adj are 0.1216 L/s for tap 1 and 0.1470 L/s for tap 2; the difference in water discharge is 0.0254 L/s. Water debit with Adj 0.135 L/s tap 1 and 0.14125 L/s tap 2, the difference in water discharge is 0.00625 L/s. The water debit is more stable with Adj than without Adj because the difference in water discharge is smaller.