Claim Missing Document
Check
Articles

Found 29 Documents
Search

Sistem Sirkulasi Air Kolam Otomatis Berdasarkan Nilai pH Ramadhani, Afifah Dwi; Sudarsono, Amang; Pratiarso, Aries; Yuliana, Mike; Ningsih, Norma; Hadi, Mochammad Zen Samsono; Kristalina, Prima; Satiti, Rini; Astawa, I Gede Puja; Siswanto, Anang
PUBLIKASI PENGABDIAN KEPADA MASYARAKAT Vol 4 No 1 (2024)
Publisher : Fakultas Ekonomi dan Bisnis Universitas Multi Data Palembang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/padimas.v4i1.6714

Abstract

Banyak petani dari berbagai lapisan masyarakat, baik itu dari kalangan menengah atas maupun kalangan bawah yang memiliki lahan terbatas, beralih ke praktik pertanian modern seperti aquaponik. Pendekatan ini tidak hanya efisien dalam penggunaan ruang dan waktu, tetapi juga mampu menghasilkan panen yang optimal melalui perawatan yang cermat. Dengan memonitoring pH air menjadi langkah penting dalam menilai kualitas air yang dapat memberikan informasi mengenai kondisi baik atau buruknya. Air yang memiliki kualitas buruk dapat menimbulkan dampak negatif terhadap kesehatan ikan, seperti munculnya berbagai penyakit. Perubahan pH air juga dapat mengakibatkan perubahan aroma, rasa, dan warna air. Oleh karena itu, penelitian ini bertujuan untuk merancang dan menerapkan suatu sistem yang berfungsi untuk memantau tingkat keasaman (pH) dalam air, dengan memanfaatkan kemajuan teknologi saat ini. Pengukuran pH air dapat dilakukan secara manual menggunakan pH meter pada mikrokontroler. Oleh karena itu, dikembangkan sistem pemantauan untuk mempermudah pengendalian pH air, sehingga proses pembenihan ikan dapat ditingkatkan dan disederhanakan. Pada pengujian sensor pH, ketika terdeteksi nilai pH di luar kisaran netral misalnya 7,71 maka sistem sirkulasi air akan aktif untuk mengoreksi pH kolam agar mencapai kondisi netral. Hal ini bermanfaat untuk menjaga kualitas air kolam.
Implementation of Web-Based File Sharing Security System Yuliana, Mike; Hidayah, Nuril; Sudarsono, Amang
MOTIVECTION : Journal of Mechanical, Electrical and Industrial Engineering Vol 6 No 1 (2024): Motivection : Journal of Mechanical, Electrical and Industrial Engineering
Publisher : Indonesian Mechanical Electrical and Industrial Research Society (IMEIRS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46574/motivection.v6i1.314

Abstract

File-sharing activities become a bridge for communication in the form of data between one party and another party. File sharing allows users to share data with other users, by uploading data to the server computer and other users can download data from the server computer. A document security system is indispensable to keep document data safe until its destination. File Web Sharing will transmit data with cryptographic methodologies. The algorithm used is Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Blowfish. This study aims to compare the performance of AES, DES, and Blowfish algorithms when implemented to secure file sharing. Performance research results show that the DES algorithm is on average 8.35% faster than AES and the Blowfish algorithm is 7.11% faster than AES. Memory usage capacity testing shows that the AES algorithm requires 4.82% greater memory capacity than Blowfish, and the DES requires 2.41% greater memory capacity than the Blowfish algorithm. Kegiatan file sharing menjadi jembatan komunikasi data antara satu pihak dengan pihak lainnya. File sharing memberikan pengguna kemampuan untuk berbagi data dengan pengguna lain, dengan cara mengunggah data ke komputer server dan pengguna lain dapat mengunduh data dari komputer server. Sistem keamanan terhadap dokumen sangat diperlukan untuk menjaga data dokumen tetap aman sampai tujuannya. Web File Sharing akan mengirimkan data dengan metodologi kriptografi. Algoritma yang digunakan adalah Advanced Encryption Standard (AES), Data Encryption Standard (DES), dan Blowfish. Penelitian ini bertujuan untuk membandingkan kinerja algoritma AES, DES dan Blowfish saat diimplementasikan untuk mengamankan file sharing. Hasil pengujian kinerja menunjukkan bahwa algoritma DES rata-rata 8,35% lebih cepat dibandingkan AES sedangkan Blowfish 7,11% lebih cepat dibandingkan AES. Berdasarkan pengujian kapasitas penggunaan memori terlihat bahwa AES membutuhkan kapasitas memori 4,82% lebih besar dibandingkan Blowfish dan DES membutuhkan kapasitas memori 2,41% lebih besar dari Blowfish.
Inrush Current Based on Fast Fourier Transform Zamzami, Mochamad Ilham; Prasetyono, Eka; Anggriawan, Dimas Okky; Yuliana, Mike
INTEK: Jurnal Penelitian Vol 8 No 2 (2021): October 2021
Publisher : Politeknik Negeri Ujung Pandang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31963/intek.v8i2.2940

Abstract

Advances in technology have caused the use of electricity to increase rapidly. With advances in technology, this is followed by the use of increasingly efficient electrical components or equipment. This more efficient electrical equipment causes the impedance of the component to be smaller, causing a surge in current when it is turned on. This current surge, if not followed by appropriate safety precautions, will be damage other components. Each load has different waveform characteristics and current transient peaks. For this reason, it is necessary to analyze the transient condition of a load to overcome this. This paper will explain the characteristics of the inrush current of the load due to ignition. There are three loads used in this study, namely resistive, capacitive and inductive loads. Then the use of this load is simulated by giving different ignition angle values, namely 0, 60, and 90 degrees. The analysis used is the Fast Fourier Transform (FFT) method which is a derivative of the Discrete Fourier Transform. The inrush current spectrum in this simulation is simulated using Simulink MATLAB with switching system modeling using TRIAC. This inrush current simulation data collection uses a sampling frequency of 100 Khz and will be analyzed in the first of 5 cycles. For each load in this paper, the harmonic values for each ignition angle will be presented. The simulation results show that the inrush current is caused by the ignition angle value used and because of components that can deviate energy such as inductors and capacitors as well as components which at the time of starting have a low impedance value such as incandescent lamps. The simulation also shows that the use of switching components for setting the ignition angle causes an increase in the value of Total Harmonic Distortion (THD) but the peak current in the first cycle when the ignition angle is set decreases.
Deep Metric Learning with Augmented Latent Fusion and Response-Based Knowledge Distillation on Edge Device for Paddy Pests and Disease Identification Darmawan, Hendri; Yuliana, Mike; Hadi, Mochammad Zen Samsono; Sangaiah, Arun Kumar
JOIV : International Journal on Informatics Visualization Vol 8, No 3-2 (2024): IT for Global Goals: Building a Sustainable Tomorrow
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3-2.3104

Abstract

The health of paddy fields significantly impacts rice yields and the economic stability of farmers. Limited number of experts available to watch these issues poses a challenge. Consequently, a reliable diagnostic system is necessary to find pests and diseases in rice crops. In this study, we propose deep metric learning with augmented latent fusion (FADMAKA) combined with a response-based knowledge distillation (KD) approach. The student model, which processes single RGB input images, is trained using soft latent labels derived from four augmented input from the teacher model. Our method delivers a high validation accuracy of 0.973, keeps an accuracy of 0.782 on the unseen data, and with rapid inference time of 38.911 milliseconds. This approach’s accuracy outperforms SoftMax deep learning classification with fine-tuning, which only has a maximum accuracy of 0.739 on the unseen data with computation time of 36.224 ms, and the DML with augmented latent fusion with k-NN classifier on the same base model, which achieves an accuracy of 0.78 with computation time of 124.977 ms. Our proposed model has 0.12 giga floating point operations per second (GFLOPs) that is suitable for edge devices with low computational resources. Following the modeling phase, we deployed the highest-accuracy student model to a Raspberry Pi 4B device equipped with a camera. This system can provide biological agent-based recommendations for identified pest and disease threats in rice fields. Our approach not only improved accuracy but also proved efficiency, enabling farmers to identify pests and disease without relying on internet connectivity. 
Rancang Bangun 3 Phase Energy Meter Untuk Analisis Kualitas Daya Di Industri Wahyudi, Sri; Prasetyono, Eka; Anggriawan, Dimas Okky; Yuliana, Mike; Budikarso, Anang
JURNAL INTEGRASI Vol. 15 No. 1 (2023): Jurnal Integrasi - April 2023
Publisher : Pusat Penelitian dan Pengabdian Masyarakat Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/ji.v15i1.3244

Abstract

The quality of electric power is one of the most important things in the industrial world, with good power quality, industrial efficiency will also increase which will result in savings in production costs. Energy consumption must also be monitored in such a way for the purposes of analyzing electrical energy efficiency. Therefore, the author designed a tool called a 3 phase energy meter that can monitor energy consumption and power quality for industry with a 3 phase electrical system. The 3 phase energy meter is equipped with an IoT system so that the observation of the measurement results of every electrical machine system in the industry can be done at one point without having to go to the location. The hope is that with the 3 phase energy meter, it can improve production efficiency through power quality analysis.
Aplikasi Terapi Digital Anak Penyandang Autism di Komunitas Forkesi Chapter Surabaya Mahmudah, Hani'ah; Pratiarso, Aries; Saleh, Akuwan; Yuliana, Mike; Kristalina, Prima; Samsono Hadi, Moch. Zen; Dutono, Titon; Anisah, Ida; Sa’adah, Nihayatus
BUDIMAS : JURNAL PENGABDIAN MASYARAKAT Vol. 4 No. 2 (2022): BUDIMAS : VOL. 04 NO. 02, 2022
Publisher : LPPM ITB AAS Indonesia Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Many parents in the Surabaya Chapter Forkesi Community (Indonesian Special Children's Parents Communication Forum) do not understand how to care for and teach children with autism, despite the fact that 50 percent of the members of this community are parents of children with autism. This service aims to assist parents in dealing with their autistic children on a daily basis. Furthermore, to address the issue of disadvantaged children with autism who are unable to participate in therapy or seek treatment from psychologists on a regular basis due to the high expense of doing so. The development of an augmented reality-based android mobile application using the marker method will include learning materials for build a match and WH questions, as well as games to help deepen learning, and will be used in conjunction with the ABA method and DTT technique. In May-July 2021, this service activity was carried out in the Surabaya Chapter Forkesi community. Data collecting, interactions with community members, and direct implementation were the strategies used in this service. According to the findings of the Usability Testing, which received a score of 54.6, parents of children with autism agree on the use of digital therapy via Android mobile app.
Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management Jauhar, Ismed; Sudarsono, Amang; Yuliana, Mike
EMITTER International Journal of Engineering Technology Vol 1 No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8771.4 KB) | DOI: 10.24003/emitter.v1i1.1

Abstract

Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication .Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone
Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery Firdaus, Afany Zeinata; Yuliana, Mike; Samsono Hadi, Mochamman Zen
EMITTER International Journal of Engineering Technology Vol 1 No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (7105.913 KB) | DOI: 10.24003/emitter.v1i1.6

Abstract

In today's era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding) the secret message is shorter than the average computation time making phase (extracting) the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB .Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.
Higher Rate Secret Key Formation (HRKF) based on Physical Layer for Securing Vehicle-to-Vehicle Communication Dewi, Inka Trisna; Sudarsono, Amang; Kristalina, Prima; Yuliana, Mike
EMITTER International Journal of Engineering Technology Vol 8 No 1 (2020)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v8i1.493

Abstract

One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic scheme that requires the distribution of shared secret keys. To reduce attacks on key distribution, physical layer-based key formation schemes that utilize the characteristics of wireless channels have been implemented. However, existing schemes still produce a low bit formation rate (BFR) even though they can reach a low bit error rate (BER). Note that V2V communication requires a scheme with high BFR in order to fulfill its main goal of improving road safety. In this research, we propose a higher rate secret key formation (HRKF) scheme using received signal strength (RSS) as a source of random information. The focus of this research is to produce keys with high BFR without compromising BER. To reduce bit mismatch, we propose a polynomial regression method that can increase channel reciprocity. We also propose a fixed threshold quantization (FTQ) method to maintain the number of bits so that the BFR increases. The test results show that the HRKF scheme can increase BFR from 40% up to 100% compared to existing research schemes. To ensure the key cannot be guessed by the attacker, the HRKF scheme succeeds in producing a key that meets the randomness of the NIST test.