Claim Missing Document
Check
Articles

Found 34 Documents
Search

Distributed localization using normalized quad lateration in LoRa networks: application for tourist position estimation Musayyanah Musayyanah; Prima Kristalina; Yosefine Triwidyastuti; Pauladie Susanto; Mochammad Zen Samsono Hadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 3: March 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i3.pp1446-1455

Abstract

The tourism sector has been growing rapidly along with the decline of COVID-19. This sector should pay attention to safety and security, which is by tracking the position of tourists. In this work, we propose a tourist positioning tracking system. A node containing a microcontroller with LoRa wireless communication called unknown node (UN) is assembled as a wearable device. We use the received signal strength indicator (RSSI)-based localization technique with an additional normalization method to correct the error rate in position estimation. This method estimates the distance between the anchor node (AN) and UN to approximate the actual distance value. Three-dimensional position tracking (longitude, latitude, altitude) of five UN surrounded by four AN was performed using the quadlateration method. The estimation process was carried out by the UN whereas receiving information is transmitted from the four AN. The communication between AN and UN used a scheduling algorithm on all AN. The position estimation error of the five UNs was measured using mean square error (MSE) yields 20.73 m, 50.32 m, 32.92 m, 21.40 m, and 16.89 m respectively. The accuracy of the estimated distance obtained by the proposed normalization quadlateration method is increased up to 15.22%.
Pelatihan Mikrotik Dasar Pada SMK Pawiyatan Surabaya Weny Indah Kusumawati; Musayyanah Musayyanah; Pauladie Susanto; Charisma Dimas Affandi
Literasi: Jurnal Pengabdian Masyarakat dan Inovasi Vol 3 No 1 (2023)
Publisher : Pengelola Jurnal Politeknik Negeri Ketapang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Vocation Senior Shcool students who are ready to penetrate industrial company must have hard skills. One of hard skills is being able to use the latest technology, especially network-based technology, namely Mikrotik. Mikrotik is a network devic that can perform as router or access point. With GUI-based application, learning Mikrotik was simple and easy to be applied. The purpose of this training is to equip students to be able to use Mikrotik independently on small-scale networks. This training was held four times, which was attended by 14 student participants and 2 teachers of SMK Pawiyatan Surabaya. The training was held in a computer network laboratory, which consisted of 16 computers as hosts and 16 microphones. Each participant operates Mikrotik independently, guided by the trainer. Training questionnaires were distributed to all participants as an indicator of the success this training. The questionnaire contains training materials, trainer performance, training facilities and training atmosphere. Based on the numbers that have been processed, the average questionnaire rating is 56% strongly agree, 42% agree, and 2% disagree. The assessment of these numbers shows that this PKM activity received a good response from the training participants
Intrusion Detection System Using Deep Learning for DoS Attack Detection Andre Arta Kurniawan; Jusak; Musayyanah
JEECS (Journal of Electrical Engineering and Computer Sciences) Vol. 6 No. 2 (2021): JEECS (Journal of Electrical Engineering and Computer Sciences)
Publisher : Fakultas Teknik Universitas Bhayangkara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1505.178 KB) | DOI: 10.54732/jeecs.v6i2.203

Abstract

Various attacks on a computer network or the internet have generated many incidents and cases, this makes security threats in using the internet or computer networks a major focus. Denial of Service attack or often referred to as DoS attack is one of the attack techniques that carry out flooding packets or requests to the target computer until the target computer is down. Prevention is needed in order to minimize existing attacks. IDS can be used as a detector in network traffic, but because IDS has its limitations, an IDS system is built using Deep Learning to detect DoS attacks. By using the data from the wireshark log as a dataset, it is necessary to do data normalization which will then be inputted into CNN VGG-19. The test results that have been carried out with variations in the data inputted into the CNN VGG- 19 produce an average accuracy of 99.32% with an average loss of 4.08%, and by varying the iteration of the training process the resulting accuracy is 99.17% with an average loss - an average of 4.46%. And the ROC Curve value for the True Positive Rate and the False Positive Rate is 1.
Security System Using Lora Transmission : Applications in Warehouse Charisma Dimas Affandi; Pauladie Susanto; Musayyanah; Yosefine Triwidyastuti
JEECS (Journal of Electrical Engineering and Computer Sciences) Vol. 6 No. 2 (2021): JEECS (Journal of Electrical Engineering and Computer Sciences)
Publisher : Fakultas Teknik Universitas Bhayangkara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1130.851 KB) | DOI: 10.54732/jeecs.v6i2.204

Abstract

The widespread theft of storage warehouses, especially in rural areas, rarely supported by communication technology. A system was created to improve the security of storage warehouses with LoRa transmissions capable of sending data remotely. When there is an open warehouse door, this system will send the data to the warehouse owner's house with LoRa transmission in the form of open door information to detect theft early. The LoRa transmission test results in the early morning hours resulted in a success rate of 99.61% at a distance of 1.40 Km and a success percentage of 99.06% at a distance of 2.15 Km. The entire system has been tested at a distance of 1.4 Km, and the early morning hours resulted in a percentage success of 95.15%. An error occurred due to packet loss. As evidenced by the further distance of the test, the percentage of success will be reduced. Besides that, cellular connections around the testing area also affect. Where in the afternoon, cellular network traffic is denser compared to the early morning hours. As evidenced by the results of testing in the afternoon, there was a decrease in the percentage success by 5%. Overall, the security system created and tested resulted in the conclusion that the security system in this study had shown promising results.
Delay Analysis in Zigbee Wireless Communication for Manipulated Data and Finger Clip Sensor Data Using Xbee Pro S2C Musayyanah; Pauladie Susanto; Weny Indah Kusumawati
JEECS (Journal of Electrical Engineering and Computer Sciences) Vol. 2 No. 2 (2017): JEECS (Journal of Electrical Engineering and Computer Sciences)
Publisher : Fakultas Teknik Universitas Bhayangkara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (271.955 KB) | DOI: 10.54732/jeecs.v2i2.149

Abstract

Wireless Personal Area Networks have battery powered, low data rate, and low cost, that have been researched invarious fields, like Xbee Pro S2C. It can build mesh network, consist of Coordinator, Router and End Device. Xbeecan perform point to point and multipoint communication. We evaluate delay performance and data loss for bothcommunication at indoor environment, to get Xbee’s successful transmission rate. This transmission sent themanipulated data and data from sensor finger clip by End Device Node as Tranmitter to Coordinator Node asReceiver. This data is sent with different interval time, 8ms for manipulated data and 500 ms for data finger clipsensor. Definition of Delay is the difference of difference of time between first data sent and first data received.From manipulated data measurement the delay of point to point is 1,17 seconds, whereas multipoint gets 1,332seconds. For delay data finger clip measurement of multipoint is 1,34 seconds. While data loss occur in multipointcommunication, for data finger clip measurement get the loss 53,33 % and 46,67% in random quartile of data, andfor manipulated data get 3,56 % loss.
PENINGKATAN PENGUASAAN MICROSOFT OFFICE 365 UNTUK GURU-GURU SD DHARMA KARYA SURABAYA Triwidyastuti, Yosefine; Koentjoro, Edo Yonatan; Musayyanah, Musayyanah; Maya, Indra
Jurnal Leverage, Engagement, Empowerment of Community (LeECOM) Vol. 4 No. 1 (2022): Jurnal Leverage, Engagement, Empowerment of Community (LeECOM)
Publisher : Universitas Ciputra Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37715/leecom.v4i1.2950

Abstract

SD Dharma Karya merupakan salah satu sekolah swasta dengan akreditasi tingkat C di Surabaya, sehingga sekolah ini menjadi salah satu sasaran program kampus mengajar yang dibimbing oleh salah satu dosen Universitas Dinamika. Namun karena keterbatasan waktu dan rendahnya kemampuan siswa SD Dharma Karya, kegiatan kampus mengajar lebih banyak fokus kepada peningkatan literasi dan numerasi siswa, sedangkan bantuan adaptasi teknologi untuk para guru SD Dharma Karya menjadi kurang optimal. Oleh karena itu, pemberian bantuan adaptasi teknologi dilanjutkan dalam bentuk kegiatan pengabdian yang dilakukan oleh beberapa dosen Universitas Dinamika. Kegiatan pengabdian diadakan dalam empat tahap, yaitu survei kondisi guru sekolah, pembuatan modul, kegiatan pelatihan, dan evaluasi. Berdasarkan survei awal, penguasaan teknologi yang butuh diajarkan adalah penggunaan aplikasi Microsoft Office 365 yang telah dilanggan oleh Dinas Pendidikan Kota Surabaya tetapi kurang dimanfaatkan oleh guru-guru SD Dharma Karya. Kebanyakan pelatihan yang diadakan dinas pendidikan berbentuk daring, sehingga guru-guru kurang memahami menu-menu yang ada di aplikasi. Berikutnya, kegiatan pembuatan modul untuk pelatihan difokuskan pada penjelasan fitur-fitur di Word, Excel, PowerPoint, dan Microsoft Teams yang dapat dimanfaatkan guru-guru dalam kegiatan pembelajaran maupun administrasi. Kegiatan pelatihan sebagai tahapan selanjutnya selalu dilaksanakan secara luring di SD Dharma Karya dan disertai dengan proses pendampingan sesuai dengan tingkat keahlian para guru. Berdasarkan hasil kuesioner, kegiatan pelatihan yang diberikan dapat meningkatkan pengetahuan guru mengenai Microsoft Office 365 dan meningkatkan keterampilan para guru menguasai teknologi aplikasi perkantoran, serta meningkatkan pelayanan para guru dalam proses pembelajaran dan administrasi sekolah.
Penerapan Controlling Auto Light Dimmer Menggunakan Fuzzy Logic Pada Hidroponik Indoor Putri Fatimah Zahra Al-Gadri; Weny Indah Kusumawati; - Harianto; - Musayyanah
Techno.Com Vol 22, No 2 (2023): Mei 2023
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/tc.v22i2.7799

Abstract

Negara dengan tingkat kepadatan tinggi pasti membutuhkan tempat tinggal yang banyak. Hidroponik memakai media bukan tanah adalah salah satu solusinya. Hidroponik di dalam ruangan memerlukan pengganti cahaya matahari. Oleh karena itu, penelitian ini mengembangkan sistem untuk mengontrol intensitas cahaya tanaman hidroponik dengan metode yang inovatif. Alat ini menyesuaikan kondisi cahaya di dalam ruangan dan daya keluaran yang sesuai dengan intensitas cahaya lampu hidroponik melalui proses fuzzy logic controller. Tingkat kesalahan untuk data sensor dari Bh1750 adalah sekitar 4.05%. Ketika nilai aktuator dinaikkan, perangkat dimmer juga naik secara linier. Namun, angkanya tidak stabil antara 1 sampai 10, dan lebih dari 80. Karena kenaikan yang terus-menerus tinggi dan penurunan yang terus-menerus rendah, keluaran menjadi tidak stabil selama pengujian sistem fuzzy pada set point rendah. Namun pada set point tinggi, sistem berhasil menyesuaikannya ke nilai yang benar. Rise time 0.37 detik, SettlingMin 173.3300 lux, SettlingMax 945.83 lux, Overshoot 57.8%, dan Peak 956.7 lux, semua nilai di atas ada pada set point 600. Tanaman memiliki daun yang lebih lebar dan batang yang lebih tinggi apabila diberi set point tinggi, dibandingkan apabila diberi set point rendah.
Pemantauan Posisi Multi-Node Menggunakan Aplikasi GUI pada LoRaWAN Adam Fiqih Ristanto; Pauladie Susanto; Yosefine Triwidyastuti; Musayyanah Musayyanah; Charisma Dimas Affandi; Fifin Ernawati
Jurnal Teknologi Elektro Vol 14, No 2 (2023)
Publisher : Electrical Engineering, Universitas Mercu Buana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/jte.2023.v14i2.002

Abstract

Perangkat Internet of Things (IoT) merupakan perangkat yang terkoneksi pada jaringan internet. Salah satu media transmisi yang low power berbasis IoT adalah LoRaWAN.  LoRaWAN mampu menerima data dari banyak user pada jarak jauh dan terkoneksi langsung dengan database server melalui internet.  Pada artikel ini, membahas mengenai monitoring posisi multi node pada jaringan LoRaWAN. Terdapat tiga node, direpresentasikan sebagai end node. LoRaWAN sebagai satu node server atau disebut LoRa Gateway. Pada node server terpasang aplikasi berbasis Graphic User Interface (GUI) yang dapat memantau posisi end node secara real time. Pengujian pada artikel ini, meliputi pengujian transmisi packet loss dari end node ke node server, dan pengujian aplikasi untuk memenuhi Human Computer Interaction (HCI). Hasil transmisi tiga node end ke LoRa Gateway berturut-turut adalah 6,04%, 1,13%, dan 1,9%.  Pengujian kelayakan aplikasi dari segi sudut pandang pengguna telah memenuhi standart HCI dengan nilai sangat setuju 61% dan setuju 50%.
KONTROL KIPAS ANGIN SECARA JARAK JAUH MELALUI PENGENALAN BENTUK GESTUR JARI TANGAN BERBASIS COMPUTER VISION Fredi Wakerkwa; Heri Pratikno; Weny Indah Kusumawati; Musayyanah Musayyanah
Journal of Innovation Research and Knowledge Vol. 3 No. 3: Agustus 2023
Publisher : Bajang Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53625/jirk.v3i3.6443

Abstract

Artificial Intelligence berkembang sangat pesat, visi komputer bagian dari kecerdasan buatan untuk memproses data visual. Disisi lain mikrokontroler juga berkembang dengan pesat guna memudahkan tugas manusia. Pada penelitian ini melakukan pengontrolan kipas angin secara jarak jauh melalui proses deteksi gestur jari tangan menggunakan metode Mediapipe serta modul WeMos berbasis protokol MQTT. Hasil percobaan dari penelitian ini mendapatkan akurasi deteksi gestur tangan mematikan kipas (0, tangan mengepal) pada jarak 100 cm sebesar 100% dengan 28,6 FPS, akurasi deteksi gestur jari tangan untuk menghidupkan kipas angin pada level kecepatan 1 sebesar 94% pada 29,9 FPS, sedangkan akurasi deteksi gestur 2 untuk mengontrol kecepatan putaran kipas angin pada level 2 adalah 99% pada 28,6 FPS, dan hasil deteksi gestur jari tangan untuk mengendalikan kecepatan putaran kipas angin pada level 3 mencapai 99. % akurasi pada 31,4 FPS. Pengujian pada jarak 150 cm menunjukkan akurasi 100% untuk deteksi isyarat 0, 1, 2, dan 3 pada lima orang. Pada jarak 200 cm akurasi deteksi gestur 0 dan 1 sebesar 80%, sedangkan gestur 2 dan 3 mempertahankan akurasi 100%. Di atas 200 cm, gestur 0 dan 1 mencapai akurasi 80%, gestur 2 mencapai akurasi 100%, dan gestur 3 mencapai akurasi 90%.
Pelatihan Mikrotik Dasar Pada SMK Pawiyatan Surabaya Weny Indah Kusumawati; Musayyanah Musayyanah; Pauladie Susanto; Charisma Dimas Affandi
Jurnal Pengabdian Masyarakat dan Inovasi Vol 3 No 1 (2023)
Publisher : Pengelola Jurnal Politeknik Negeri Ketapang Jl. Rangga Sentap, Dalong Sukaharja, Ketapang 78813. Telp. (0534) 3030686 Kalimantan Barat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58466/jurnalpengabdianmasyarakatdaninovasi.v3i1.1187

Abstract

Vocation Senior Shcool students who are ready to penetrate industrial company must have hard skills. One of hard skills is being able to use the latest technology, especially network-based technology, namely Mikrotik. Mikrotik is a network devic that can perform as router or access point. With GUI-based application, learning Mikrotik was simple and easy to be applied. The purpose of this training is to equip students to be able to use Mikrotik independently on small-scale networks. This training was held four times, which was attended by 14 student participants and 2 teachers of SMK Pawiyatan Surabaya. The training was held in a computer network laboratory, which consisted of 16 computers as hosts and 16 microphones. Each participant operates Mikrotik independently, guided by the trainer. Training questionnaires were distributed to all participants as an indicator of the success this training. The questionnaire contains training materials, trainer performance, training facilities and training atmosphere. Based on the numbers that have been processed, the average questionnaire rating is 56% strongly agree, 42% agree, and 2% disagree. The assessment of these numbers shows that this PKM activity received a good response from the training participants.