Claim Missing Document
Check
Articles

Found 2 Documents
Search

Pemantauan Kondisi Polusi Udara Secara Real Time Di Kawasan Universitas Riau Dengan Menggunakan Wireless Sensor Network Waspmote Dan Zigbee Feri Saputra; Yusnita Rahayu; Ery Safrianti
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 2, No 2 (2015): Wisuda Oktober Tahun 2015
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Air quality monitoring is very necessary to anticipate the dangerous air pollution such as forest fires pollution like PM10. Excellent air monitoring done in real time, so that the monitoring data obtained directly. In the research make aplication air monitoring real time using Microsoft Visual Basic 2010, air monitoring device with using wireless sensor network waspmote plug and sense for monitoring of PM10 and waspmote OEM for monitoring CO and O3, data communication using Zigbee. Application will process wireless sensor network waspmote data to ISPU data for reference condition the air content PM10, CO dan O3, and application will display in ISPU graphical. Design database in Microsoft Access to connect monitoring aplication so monitoring data can be stored. Air monitoring conducted in Riau University.Keywords : Wireles Sensor Network Waspmote, Zigbee, Database, Real time, Air polution
File security using Advanced Encryption Standard and Least Significant Bit Lykke, Felicia; Andreas Edvard; Feri Saputra
Journal of Geoscience, Engineering, Environment, and Technology Vol. 9 No. 1 (2024): JGEET Vol 09 No 01 : March (2024)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/jgeet.2024.9.1.19194

Abstract

Computer technology of rapid development has triggered crimes that take advantage of weaknesses in computer systems. One form of crime was the act of hackers who take data and information through computer security holes. The data was used for various things that are not appropriate. Information sent via communication media can be taken and misused by irresponsible parties. An electronic data security system has been developed. With the emergence of various data security methods such as encryption and steganography. Encryption was a way of securing data files by randomizing a document, while Steganography was securing electronic data by hiding a file within another file. Based on the feasibility test of the system with a questionnaire by 20 respondents, the result of 87%, which is categorized as "very good".