Claim Missing Document
Check
Articles

Found 2 Documents
Search

Desain dan Implementasi Kendali Cerdas untuk Robot Quadpod (Berkaki Empat) – Studi Kasus Robot Pemadam Api (RPA) Muhammad Bagus Bintang Timur; Achmad Fanany Onnilita Gaffar; Agusma Wajiansyah
Jurnal Teknologi Terpadu Vol 5, No 2 (2017): JTT (Jurnal Teknologi Terpadu)
Publisher : Pusat Penelitian dan Pengabdian Kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32487/jtt.v5i2.279

Abstract

Pada robot pemadam api  tidak hanya sekedar memadamkan api melainkan mencari ruang yang terdapat api. Ketika robot mencari api yang terdapat didalam ruangan, robot melakukan proses berjalan dan berusaha mengetahui lingkungan sekitar agar dapat mengetahui posisi robot berada dan mengetahui tindakan apa yang harus diambil, pada penentuan posisi tidak hanya mengetahui dimana robot berada tapi juga mengetahui posisi arah robot. Penelitian ini bertujuan untuk membangun Kendali Cerdas berbasis Fuzzy Logic (Logika Samar) untuk menentukan posisi robot berada ketika berada didalam arena atau lingkungan sekitar. Pengujian Fuzzy Logic menggunakan Software (perangkat lunak) Mathlab. Data sensor sebagai referensi lingkungan dibangun secara Random (acak). Setelah data dibangun, data kemudian diproses menggunakan Fuzzy Logic. Hasil proses akan berupa Posisi robot. Dari posisi tersebut maka akan diketahui robot berada dimana dan keputusan apa yang harus diambil.
Comparison of Efficiency and Security of AES, Blowfish, and ChaCha20 Cryptographic Algorithms on Image and Document Files Bintang Timur, Muhammad Bagus; Royansyah, Royansyah; Kusumaningsih, Dewi
Innovation in Research of Informatics (Innovatics) Vol 7, No 2 (2025): September 2025
Publisher : Department of Informatics, Siliwangi University, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v7i2.15748

Abstract

This study presents a comparative analysis of the Advanced Encryption Standard (AES), Blowfish, and ChaCha20 cryptographic algorithms in terms of their efficiency and security when applied to image and document files. The growing need for secure data transmission and storage has highlighted the importance of selecting suitable encryption algorithms based on specific file types and operational contexts. In this research, various sample files in image (JPG, PNG) and document (PDF, DOCX) formats were encrypted using the three algorithms. Performance was measured based on encryption and decryption time, CPU and memory usage, and file size changes after encryption. Security evaluation focused on resistance to brute-force attacks, key length strength, and algorithmic robustness. The experimental results indicate that ChaCha20 demonstrated superior performance in terms of processing speed and resource efficiency, especially on low-power systems. AES, while slightly slower, offered a high level of security and is widely trusted for sensitive document encryption. Blowfish, although fast, showed limitations in handling larger files and is less favored due to its shorter block size. This study concludes that no single algorithm is universally optimal; instead, the choice should depend on the specific use case, balancing efficiency and security requirements. These findings provide useful insights for practitioners and researchers in selecting appropriate cryptographic methods for protecting digital assets.