Claim Missing Document
Check
Articles

Found 28 Documents
Search

IMPLEMENTASI SISTEM KEAMANAN SHARING ELECTRONIC HEALTH RECORD (EHR) BERBASIS 3DES Haryadi Amran Darwito; Mike Yuliana; Muhammad Ulul Azkiya
SENTIA 2016 Vol 8, No 2 (2016)
Publisher : SENTIA 2016

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1114.974 KB)

Abstract

Penggunaan sebuah algoritma enkripsi biasa dipakai untuk melakukan pengamanan data yang bersifat pribadi/ rahasia. Tujuan dilakukan tindakan pengamanan data ini agar tidak semua orang bisa melihat isi dari sebuah informasi tersebut yang bisa saja berupa sebuah informasi yang sangat rahasia (penting). Penggunaan algoritma DES (Data Encryption Standard) sudah biasa diterapkan dalam sebuah sistem informasi saat ini. Beberapa informasi penting yang memerlukan proses enkripsi data, diantaranya adalah mengenai rekam jejak penyakit seorang pasien di sebuah rumah sakit atau klinik. Pada penelitian ini digunakan proses enkripsi pengembangan dari DES yaitu 3DES yang mempunyai tingkat keamaan lebih tinggi yaitu dengan cara pengulangan untuk proses enkripsi sebanyak tiga kali dengan kunci yang berbeda. Algoritma ini diimplementasikan untuk mengamankan informasi rekam medis pasien pada sistem sharing data electronic health record (EHR). Algoritma ini menjadi sangat penting sekali karena informasi mengenai rekam medis pasien digunakan untuk memberikan rujukan kepada dokter dan ke rumah sakit yang berbeda melalui sistem jaringan cloud. Dari pengujian implementasi sistem EHR didapatkan hasil performa dari 3DES yang digunakan sebesar 52% yang menunjukkan bahwa algoritma ini memang mempunyai kinerja yang sangat bagus.
ANALISA PENGGUNAAN METODE FILTER BANK PADA KONVERSI SPEECH TO TEXT LAYANAN MAILBOX Reni Soelistijorini; Mike Yuliana; Rizki Nurhidayati
INOVTEK POLBENG Vol 4, No 1 (2014): INOVTEK VOL.4 NO 1 - 2014
Publisher : POLITEKNIK NEGERI BENGKALIS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (444.708 KB) | DOI: 10.35314/ip.v4i1.92

Abstract

Abstrak Layanan mailbox merupakan sebuah pesan yang direkam dalam bentuk suara yang kemudian disimpan pada mailbox penerima pesan. Pada penelitian ini, pesan  yang  ditinggalkan   akan  dikonversikan   ke  dalam  media  lain dengan memanfaatkan aplikasi IVR (Interactive Voice Response) . File- file *.wav yang dihasilkan akan diolah menjadi file text dengan menggunakan  metode Filter Bank. Data text yang   dihasilkan   akan   dikirim   menuju   Mail   Server, sehingga   dapat diakses berdasarkan  alamat Email yang dimiliki oleh user tujuan. Dari   hasil   pengujian   dengan menggunakan metode Filter Bank, pada pengujian dua dan tiga data standar wanita memiliki prosentase keberhasilan lebih tinggi yaitu sebesar 58,3 % dan 46,665%. Sedangkan untuk satu data standar prosentase keberhasilan pria lebih tinggi yaitu sebesar 55,8%. Untuk keseluruhan pengujian,  2 data standar memiliki prosentase keberhasilan tertinggi yaitu sebesar 56.41 %. Kata kunci : : mailbox, IVR, Filter Bank, data standar
Zero Knowledge Authentication Modification for Drone and Server Communication Security Choirun Nisa; Amang Sudarsono; Mike Yuliana
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol5.2021.1446.pp1019-1029

Abstract

Drones are now being used in various fields. One of the uses of drones is for delivery service. When delivering goods, the drone needs to report its condition while traveling to the server so that the server can monitor the drone and the server can give some commands to the drone. However, when the drone receives data from the server, there are many vulnerabilities it has against the attacker that can take control of the drone device. Taking control of the drone can occur if the attacker manages to send a script that can take over control of the drone. If the attacker can take control over the drone device, the attacker can steal the drone both physically or data of the drone. For this reason, in this study, we propose an authentication algorithm that can filter out who is allowed to send data to the system. The algorithm used is Zero-Knowledge Authentication. To improve the performance of the Zero-Knowledge Authentication algorithm in terms of authentication speed, we try to combine it with the secret key generated from the Secret Key Generation process. From the results of authentication testing, the effectiveness of the proposed algorithm after a Brute Force attack experiment is 100% for single attacker scenarios and for multiple attackers the effectiveness is 100% in LOS and NLOS conditions. Because drones have limited resources, the authentication time experiment is also performed and the result is that in all scenarios the time required to authenticate is in microseconds so that the proposed algorithm can be implemented on drones with limited resources.
Mekanisme Peningkatan Reciprocity Channel Probing pada LoRaWAN Menggunakan Savitzky Golay Filter Nurul Istiqomah; Mike Yuliana; Tri Budi Santoso
Jurnal Komputer Terapan Vol. 8 No. 1 (2022): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (397.249 KB) | DOI: 10.35143/jkt.v8i1.5319

Abstract

Pada komunikasi Wireless seperti LoRa perlu adanya pembangkitan kunci untuk pengamanan data. Hal ini dilakukan agar data yang dikirimkan tidak mudah di serang oleh attacker. Salah satu cara mendapatkan kunci yang tepat adalah dengan pengkondisian nilai koefisien korelasi RSSI yang tinggi. Pada penelitian ini dibuat sebuah sistem untuk meningkatkan Reciprocity Channel Probing agar didapatkan nilai koefisien korelasi yang tinggi. Sistem dirancang dengan menggunakan metode Savitzky Golay Filter. Pengujian dilakukan pada dua kondisi yaitu indoor dan outdoor, dan dengan menggunakan nilai Spreading Factor dari SF-7 sampai SF-10. Hasil koefisien korelasi pengukuran menunjukkan bahwa pada kondisi outdoor lebih baik dibandingkan kondisi indoor. Nilai koefisien korelasi pengukuran tertinggi pada kondisi indoor yaitu 0.51 saat SF-10. Sedangkan pada kondisi outdoor nilai koefisien korelasi pengukuran tertinggi yaitu 0.81 saat SF-7. Metode Savitzky Golay Filter mampu meningkatkan koefisien korelasi sampai dengan 67.52% pada pengujian indoor. Rata-rata persentase kenaikan pada kondisi indoor yaitu lebih dari 30% dan kondisi outdoor lebih dari 15%. Dari hasil tersebut dapat diketahui bahwa metode Savitzky Golay Filter cocok digunakan untuk tahap pra proses karena mampu meningkatkan nilai koefisien korelasi secara signifikan.
Smart Room Lighting System for Energy Efficiency in Indoor Environment Rafika Rizky Ramadhani; Mike Yuliana; Aries Pratiarso
International Journal of Artificial Intelligence & Robotics (IJAIR) Vol. 4 No. 2 (2022): November 2022
Publisher : Informatics Department-Universitas Dr. Soetomo

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (446.022 KB) | DOI: 10.25139/ijair.v4i2.5266

Abstract

The building sector absorbs 40% of global energy sources. Energy demand in the building sector is dominated by around 60 – 70% electricity, mainly used for air conditioning, water pumping machines, and lighting. On average, artificial lighting can consume 37% of the total electrical energy needs. Meanwhile, sunlight enters the room through the morning window from noon until the afternoon. Using unnecessary or excessive room lighting when there is a natural light source in the room consumes a relatively large total energy requirement of the building. There is a need for a smart lighting system specifically for indoors for efficient energy management and a lighting control system integrated with IoT, which utilizes the intensity of natural light in a room. In this paper, we proposed that the Smart Room Lighting System uses the fuzzy logic method based on ESP32 to control the lighting in the room to save electricity usage for a room lamp. The result of the tool's design, it can control the light starting from bright, dim, and lights go out. The results obtained by the Smart Room Lighting System can reduce power consumption by up to 93% and energy by up to 70%.
Implementasi Sistem Notifikasi untuk Pengawasan Pasien Alzheimer Berbasis Bluetooth Low Energy (BLE) Aries Pratiarso; Trisna Agung Mahendra; Mike Yuliana; Prima Kristalina; I Gede Puja Astawa; Arifin Arifin
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 7 No 4: November 2018
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1726.001 KB)

Abstract

Alzheimer's patients need attention and special treatment due to their inability to remember something. One technology that is widely used for tracking objects or people in an indoor environment is a Bluetooth Low Energy (BLE). In this paper, a surveillance notification system for Alzheimer's patients is proposed using Beacon technology to prevent the lossof patients. Improvement in accuracy of the estimated position of the patient were calculated using a Kalman filter. The reason for using this method was the difficulty of determining the location of objects due to noise and inaccuracy of measurement data.Fromthe results of the tests performed, it can be seen that the system made is able to provide notifications to nurses if the patient exceeds the specified distance with an average success of up to 90%. The use of the Kalman method is also able to increase the accuracy of the estimation of patient position with an estimated error reduction of 69.7%.
Skema Peningkatan Reciprocity Kanal dengan Menggunakan Metode Hierarchical Clustering Prima Kristalina; Florista Dewi; Mike Yuliana; Tri Budi Santoso; Amang Sudarsono; Reni Soelistijorini
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 7 No 3: Agustus 2018
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1657 KB)

Abstract

Secret key generation scheme that utilizesthe randomness of wireless channels is a very promising alternative to establish a secure communication path. Some wireless devices are used to obtain the channel parameters. But the problem that occurs is imprecise measurement results, causinga secret key difference between the two users. To overcome this problem, pre-processing method is used before the data is quantized, to increase the similarity (reciprocity) channel parameter measurement results. In this paper, the effect of the use of one pre-process method, which was hierarchical clustering, on the performance of secret key generation scheme in an indoorenvironment with two variations of scenario was investigated.The results show that the use of the pre-processingmethod can improve the similarity parameter of the channel measurement results as indicated by the increasing of correlation values up to 20%. In addition, the resulting bit mismatch also decreases with the value of key disagreement rate (KDR) maximum of 20%.
Implementasi Algoritme 3DES pada Sistem Sharing Electronic Health Record (EHR) Berbasis Cloud Haryadi Amran Darwito; Mike Yuliana; Reni Soelistijorini
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 6 No 3: Agustus 2017
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1748.777 KB)

Abstract

Electronic Health Record (EHR) or medical history has been widely adopted to enable healthcare providers such as hospitals, insurance companies, and patients, to create, organize, and access EHR information from anywhere and at any time. From a health standpoint, to improve the quality of patient care, an EHR storage center is needed to ensure the EHR's novelty at all times. This underlies the need for an efficient, safe, and inexpensive mechanism for sharing EHR among health care providers. Cloud Computing has become a promising paradigm and gains more attention from academia and industry. This paradigm shifts the location of the computer infrastructure to third parties. Cloud computing not only increases the efficiency of storage and exchange of medical data but also allows accessing medical data from anywhere and anytime. In this paper, a mechanism of cloud-based sharing system equipped with the 3DES algorithm to secure health history data and the use of the smart card as a medium for controlling patient information access is proposed. The results of the tests indicate that the built system has fulfilled the security requirements such as privacy, authentication, confidentiality and integrity.
Skema Lokalisasi Posisi Node Terdistribusi pada Lingkungan Free Space Path Loss Aries Pratiarso; Adam Surya Putra; Prima Kristalina; Amang Sudarsono; Mike Yuliana; I Gede Puja Astawa
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 6 No 3: Agustus 2017
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1206.834 KB)

Abstract

A wireless sensor network consists of interconnected nodes that exchange information and use shared resource in a wireless transmission medium. Sensor nodes are randomly deployed in observation area in static or moving term. During this situation, the position of each sensor nodes is required to be known to monitor the circumstances around the node according to the information collected by sensor. Localization is the process to determine the position of nodes. This process could be done in centralized or distributed manner. In this paper, a distributed localization mechanism is proposed, where the calculation of node position is carried out on the node itself. Trilateration method is employed to calculate the position of node based on estimated distance measured by Received Signal Strength Indicator (RSSI) technique using Zigbee module in Free-Space Path Loss (FSPL) outdoor area. The experiment result shows that, based on log-normal shadowing model, the path loss coefficient for observation area is 2.5443, whereas average estimated position error from three different measured nodes are 23.504 m, 17.369 m, and 17.95 m respectively. Each node needs 2.73 second to undertake localization process completely.
Smart Agriculture untuk Mewujudkan Ketahanan Pangan Berbasis Lora di Desa Kalipadang-Benjeng Gresik Norma Ningsih; Ida Anisah; I Gede Puja Astawa; Mochammad Zen Samsono Hadi; Prima Kristalina; Mike Yuliana; Aries Pratiarso; Haryadi Amran; Rahardita Widyatra; Amang Sudarsono; Mohamad Ridwan; Rini Satiti; Afifah Dwi Ramadhani
Jurnal Pengabdian Nasional (JPN) Indonesia Vol. 5 No. 1 (2024): Januari
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jpni.v5i1.648

Abstract

Increasing agricultural production is a top priority in agricultural development. There are many agricultural problems to be managed. One way to increase rice production is to pay attention to irrigation conditions. In addition to irrigation, rising temperatures also affect the process of flowering and grain filling. At high temperatures, grain because of rice agricultural production will calcify, resulting in a decrease in grain quantity and grain mass. Temperature spikes can also reduce the viability and size of the seeds when they reach the ripe stage. Apart from water and air, farmers also need to pay attention to soil pH and humidity. Many farmers do not yet have accurate indicators to determine soil quality, most farmers only use estimates, the application of the estimation method causes the quality of the soil in paddy fields to be infertile. To overcome this problem, a tool is made to predict the condition of agricultural land by taking data on temperature, humidity, air pressure, soil pH, soil moisture, and water flow rate. The data is then sent to a database to be displayed on a web server, so that farmers can monitor land conditions. It is expected that the parameter results obtained can be used as a preventive measure for farmers when conditions occur that can reduce rice productivity. That way, the condition of the land can be maintained so that crop failure can be minimized. This tool will be implemented in one of the rice fields of the residents of Kalipadang-Benjeng-Gresik Village. Based on data taken using an NPK sensor, wet soil has an average NPK content of 29.3 (Nitrogen); 41 (Phosphorus); 82 (Potassium). Moist soil has an NPK level of 28 (Nitrogen); 40 (Phosphorus); 82 (Potassium), and dry soil has an NPK level of 27.5 (Nitrogen); 39.7 (Phosphorus); 79.1 (Potassium). It can be said that soil moisture is directly proportional to NPK levels.