Claim Missing Document
Check
Articles

Found 28 Documents
Search

A Performance Analysis of General Packet Radio Service (GPRS) and Narrowband Internet of Things (NB-IoT) in Indonesia Bima, I Wayan Krisnhadi; Suryani, Vera; Wardana, Aulia Arif
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 5, No. 1, February 2020
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3159.384 KB) | DOI: 10.22219/kinetik.v5i1.947

Abstract

Internet of Things (IoT) refers to a concept connecting any devices onto the internet. The IoT devices cannot only use a service or server to be controlled at a distance but also to do computation. IoT has been applied in many fields, such as smart cities, industries, and logistics. The sending of IoT data can use the existing GSM networks such as GPRS. However, GPRS is not dedicated particularly to the transmission of IoT data in consideration of its weaknesses in terms of coverage and power efficiency. To increase the performance of the transmission of IoT data, Narrowband-IoT (NB-IoT), one alternative to replace GPRS, is offered for its excellence in coverage and power. This paper aims to compare the GPRS and NB-IoT technology for the transmission of IoT data, specifically in Bandung region, Indonesia. The results obtained showed that the packet loss from clients for the GPRS network was at 68%, while the one for NB-IoT was at 44%. Moreover, NB-IoT technology was found excellent in terms of battery saving compared to GPRS for the transmission of IoT data. This result showed that NB-IoT was found more suitable for transmitting the IoT data compared to GPRS.
Development of Wireless Patient’s Vital Sign Monitor Using Wireless LAN (IEEE.802.11.b/g) Protocol Achmad Rizal; Vera Suryani; Jondri Jondri; Sugondo Hadiyoso
International Journal of Electrical and Computer Engineering (IJECE) Vol 4, No 6: December 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (563.464 KB)

Abstract

Vital sign monitor is typical medical instrument for basic physiological measurement. Medical practitioner assesses a patient’s health condition by observing measurement results shown in display. In this research, we designed low cost, wireless, PC-based vital sign monitor. Signals captured in designed vital sign monitor are electrocardiogram (ECG), photoplethysmogram (PPG), and body temperature. Captured data are transmitted via wireless LAN module so that medical practitioner is able to monitor patient’s condition remotely from another room or place. The system worked well for maximum transmission distance about 45 meters for LOS condition and 20 meter for NLOS condition.DOI:http://dx.doi.org/10.11591/ijece.v4i6.6429
Trust-Based Privacy for Internet of Things Vera Suryani; Selo Sulistyo; Widyawan Widyawan
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 5: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (265.138 KB) | DOI: 10.11591/ijece.v6i5.pp2396-2402

Abstract

Internet of Things or widely known as IOT makes smart objects become active participants in the communication process between objects and their environment. IoT services that utilize Internet connection require solutions to a new problem: security and privacy. Smart objects and machine-to-machine communications in IOT now become interesting research, including that related to security. Privacy, which is a safe condition in which object is free from interference from other objects, is one of the important aspects in IOT. Privacy can be implemented using various ways for examples by applying encryption algorithms, restrictions on access to data or users, as well as implementing rules or specific policy. Trustable object selection is one technique to improve privacy. The process of selecting a trustable object can be done based on past activities or trust history of the object, also by applying a threshold value to determine whether an object is "trusted" or not. Some researchers have studied this approach. In this study, the selection processes of trustable objects are calculated using Modified Ant Colony algorithm. The simulation was performed and resulted in declining graphic trend but stabilized in certain trust value.
Semi-supervised approach for detecting distributed denial of service in SD-honeypot network environment Fauzi Dwi Setiawan Sumadi; Christian Sri Kusuma Aditya; Ahmad Akbar Maulana; Syaifuddin Syaifuddin; Vera Suryani
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 11, No 3: September 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v11.i3.pp1094-1100

Abstract

Distributed Denial of Service (DDoS) attacks is the most common type of cyber-attack. Therefore, an appropriate mechanism is needed to overcome those problems. This paper proposed an integration method between the honeypot sensor and software defined network (SDN) (SD-honeypot network). In terms of the attack detection process, the honeypot server utilized the Semi-supervised learning method in the attack classification process by combining the Pseudo-labelling model (support vector machine (SVM) algorithm) and the subsequent classification with the Adaptive Boosting method. The dataset used in this paper is monitoring data taken by the Suricata sensor. The research experiment was conducted by examining several variables, namely the accuracy, precision, and recall pointed at 99%, 66%, and 66%, respectively. The central processing unit (CPU) usage during classification was relatively small, which was around 14%. The average time of flow rule mitigation installation was 40s. In addition, the packet/prediction loss occurred during the attack, which caused several packets in the attack not to be classified was pointed at 43%.
Pengenalan Signal Ekg Menggunakan Dekomposisi Paket Wavelet Dan K Means-Clustering Achmad Rizal; Vera Suryani
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2008
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

EKG (elektrokardiogram) merupakan salah satu sinyal tubuh yang digunakan untuk mendeteksi kondisikesehatan jantung seseorang. EKG adalah suatu rekaman aktivitas kelistrikan jantung. Apabila terdapatgangguan pada pola-pola listrik yang normal maka dapat didiagnosis berbagai kelainan jantung. Padapenelitian ini dilakukan pengenalan kelainan/penyakit jantung berdasarkan sinyal EKG menggunakandekomposisi paket wavelet. Sinyal EKG didekomposisi sampai level 5 menggunakan wavelet Daubechies 2,kemudian energi dari tiap subband di hitung periodogramnya. Sebagai classifier digunakan K-Means clustering,dimana digunakan metode cityblock sebagai penghitung jarak antar data. Dari 3 kelas data yang diujicobakan(Normal Sinus Rhythm (NSR), Congestive Heart Failure (CHF), dan Atrial Fibrilation (AF)) didapat akurasisistem sebesar 94.4%. Hal ini menunjukkan bahwa metode yang dikembangkan cukup baik untuk mengenalisinyal EKG yang diujikan.Kata kunci: Elektrokardiogram, dekomposisi paket wavelet, k-means clustering
ANALISIS PROSES CLUSTER FORMATION PADA CLUSTER BASED SIMPLE HIGHWAY MOBILITY MODEL (CBSHWM) DI JARINGAN 802.11P (STUDI KASUS: JARINGAN YANG MENGGUNAKAN ROUTING PROTOCOL AODV DAN CBLR) Kunta Wicaksana; Vera Suryani; Endro Ariyanto
Seminar Nasional Informatika (SEMNASIF) Vol 1, No 1 (2014): Business Intelligence
Publisher : Jurusan Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Vehicular Ad Hoc Network (VANET) adalah jaringan yang terdiri dari sekumpulan wireless mobile node yang saling berkomunikasi tanpa infrastruktur yang tetap. Pada VANET dikembangkan suatu teknologi wireless untuk sistem komunikasi Vehicle to Vehicle (V2V) dan Vehicle to Road Side Unit (V2R). Komunikasi V2V dapat menggunakan konsep cluster yang disebut CBSHWM. Pada VANET kepadatan vehicle dan kecepatan gerak dari vehicle dapat mempengaruhi performansi dari jaringan. Jika terjadi kepadatan vehicle akan menimbulkan delay pada saat pengiriman paket ke vehicle tujuan. Selain itu, jika vehicle melaju dengan kecepatan tinggi maka akan menyebabkan perpindahan vehicle yang dapat menyebabkan kendala pertukaran paket data di jaringan. Penelitian ini bertujuan menganalisis performansi dua buah cluster formation yaitu cluster formation weight-based dan cluster formation CBLR pada jaringan VANET. Pemodelan jalan tol digunakan untuk menguji skenario kepadatan node dan kecepatan node. Evaluasi kinerja cluster formation weight-based dan CBLR ditinjau dari parameter cluster overhead, normalized cluster load, packet delivery ratio, packet loss rate dan cluster convergence time. Setelah dilakukan analisis dapat diketahui bahwa cluster formation CBLR lebih baik untuk kondisi jaringan berkecepatan tinggi dan kepadatan nodenya tinggi. Pada skenario perubahan kepadatan node untuk jumlah node 40 didapatkan bahwa nilai packet delivery ratio cluster formation CBLR 99,86 %, sedangkan packet delivery ratio cluster formation weight-based 83,12 %. Skenario pengaruh perubahan kecepatan node pada kecepatan 100 km/jam didapatkan bahwa nilai packet delivery ratio cluster formation CBLR 75,06 %, sedangkan packet delivery ratio CWeight sebesar 57,96 %.
Analisis Performansi Routing Hybrid Wireless Mesh Protocol (HWMP) pada Wireless Mesh Network (WMN) Berdasarkan Standar IEEE 802.11S Fenmelin Muhardafen Manullang; Niken Dwi Wahyu Cahyani; Vera Suryani
Jurnal SIFO Mikroskil Vol 13, No 1 (2012): Volume 13 Nomor 1 Tahun 2012
Publisher : Fakultas Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (686.486 KB) | DOI: 10.55601/jsm.v13i1.45

Abstract

Wireless Mesh Network (WMN) merupakan jaringan komunikasi wireless yang terbentuk dari node radio dimana minimal terdapat dua atau lebih jalur komunikasi data pada setiap node. Di dalam WMN terdapat beberapa node client yang dapat begerak dengan kecepatan lambat (seperti kecepatan pejalan kaki) yang memungkinkan jaringan ini menjadi dinamis. Apalagi karena WMN merupakan jaringan yang wireless berarti akan memungkinkan ada user dalam jaringan yang terkadang bertambah ataupun berkurang. Dengan adanya perubahan kecepatan dan jumlah user, WMN membutuhkan suatu protokol routing yang handal untuk mencari jalur yang terbaik. Protokol routing yang digunakan adalah HWMP (hybrid) yang merupakan default protokol routing dalam WMN, sementara AODV (reaktif), dan???  DSDV (proaktif) dijadikan sebagai pembanding protokol routing dari HWMP. Dengan protokol routing ini akan diamati perubahan yang terjadi berdasarkan parameter uji seperti Routing Overhead (RO) dan Normalized Routing Load (NRL) yang akan disimulasikan pada network simulator 2 (NS-2). Hasil nilai simulasi sudah diperoleh dengan menyimpulkan bahwa protokol routing DSDV merupakan protokol routing yang paling efisien dalam pengujian ini.
Pembelajaran interaktif melalui game edukatif selama masa pandemi di TK AL Ghifari Bandung Vera Suryani; Bayu Erfianto; Andrian Rakhmatsyah; Fazmah Arif Yulianto
KACANEGARA Jurnal Pengabdian pada Masyarakat Vol 5, No 1 (2022): Januari
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/kacanegara.v5i1.979

Abstract

Kurikulum sekolah TK meliputi aspek motorik,maupun kognitif bagi anak usia pra-sekolah. Pembelajaran daring selama pandemi membuat anak cepat bosan, karena masa konsentrasi mereka belum bisa lama seperti halnya orang dewasa. Dibutuhkan perangkat bantu agar penyampaian materi lebih menarik dan tidak membosankan. Permainan merupakan salah satu cara penyampaian materi agar anak TK dapat belajar secara menyenangkan. Game edukatif merupakan perangkat bantu yang bersifat menarik bagi anak TK, dan melalui game ini materi pembelajaran dapat disampaikan secara menarik. Tujuan kegiatan pengabdian masyarakat ini ialah melakukan penyuluhan kepada guru PAUD TK Al-Ghifari Sukabirus mengenai cara penyampaian materi pembelajaran melalui game edukatif, serta pelatihan kepada anak TK mengenai cara penggunaan game edukatif tersebut. Game edukatif bertujuan untuk meningkatkan motivasi belajar melalui story telling, peningkatan konsentrasi, serta aspek computational thinking untuk usia pra-sekolah. Dari hasil pelaksanaan kegiatan pengabdian masyarakat di TK Al Ghifari Bandung di dapatkan bahwa perangkat dan modul pembelajaran yang diberikan sangat membantu proses belajar mengajar di TK Al Ghifari. Poin utama yang disasar adalah aspek motivasi dan konsentrasi anak usia TK.
Pemberdayaan guru paud RA Al-Ghifari Sukabirus Dayeuhkolot dalam penyusunan bahan ajar berbasis online Vera Suryani; Bayu Erfianto; Andrian Rakhmatsyah
KACANEGARA Jurnal Pengabdian pada Masyarakat Vol 4, No 2 (2021): Juli
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/kacanegara.v4i2.868

Abstract

Kasus Corona Virus Disease 2019 (Covid-19) yang semakin meningkat mengharuskan proses kegiatan belajar mengajar bagi peserta didik untuk sementara waktu dilakukan di rumah. PAUD dan TK Al-Ghifari Sukabirus merupakan salah satu sekolah yang terkena dampaknya. Saat ini, proses kegiatan belajar mengajar masih menggunakan metode konvensional, yaitu hanya pemberian tugas offline kerumah siswa. Pembelajaran tidak efektif untuk siswa dikarenakan tidak ada kegiatan mengajar secara tatap muka oleh guru kepada siswanya. Beberapa guru juga belum terlalu familiar dengan penggunaan media pembelajaran daring, seperti Google Meet maupun Google Classroom . Dengan demikian diperlukan suatu cara transfer knowledge penggunaan media daring yang dapat mendukung proses belajar mengajar di PAUD dan TK Al Ghifari. Tujuan kegiatan pengabdian masyarakat ini ialah mendukung pembelajaran jarak jauh dengan media daring (dalam jaringan) dengan melakukan penyuluhan kepada guru PAUD dan TK Al-Ghifari Sukabirus mengenai cara pembelajaran online menggunakan aplikasi Google Meet, Google Classroom, dan penyusunan bahan ajar berbasis online.
ROBOT PENDETEKSI GAS BERACUN DENGAN MENGGUNAKAN METODE MULTI LAYER PERCEPTRON Gun Gun Maulana; Aris Budiyarto; Vera Suryani
Ensiklopedia of Journal Vol 2, No 2 (2020): Vol 2 No 2 Edisi 2 Januari 2020
Publisher : Lembaga Penelitian dan Penerbitan Hasil Penelitian Ensiklopedia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (224.717 KB) | DOI: 10.33559/eoj.v2i2.411

Abstract

At present, there are a lot of harmful gases in the environment around us, especially in the industrial environment, such as radiological materials and toxic gases that can pollute the environment. Generally, gases can spread due to leakage. The gas leak was caused by several factors, such as mining accidents, war, and manufacturing accidents. Gas leakage incidents can cause huge losses to society and industry, both injury and financial problems. To reduce this risk we try to propose a toxic gas detection system with two modules used in running this system: (1) navigation module and (2) gas detection module. The navigation module is designed with a program to explore a room with a certain pattern. For movement and data collection will be carried out by the Microsoft Visual Studio interface software. The detection module is designed with Multi Layer Perceptron (MLP) artificial intelligence using the Back Propagation method which is directly applied to the robot, so that the robot is able to accurately and quickly identify gas obtained from the TGS sensor output. The sensors used are TGS 2602 for ammonia (NH3), TGS 2600 for carbon monoxide (CO), TGS 2610 for butane (C4H10), and TGS 2612 for methane (CH4). For this reason, this research is expected to implement electronic nose on mobile robots using the Multi Layer Perceptron method to effectively detect, identify, and confirm that dangerous gas sources have been found without direct human interaction