Claim Missing Document
Check
Articles

Found 30 Documents
Search

An Implementation of Grouping Nodes in Wireless Sensor Network Based on Distance by Using k-Means Clustering Rizqi Fauzil Azhar; Ahmad Zainudin; Prima Kristalina; Bagas Mardiasyah Prakoso; Niam Tamami
CommIT (Communication and Information Technology) Journal Vol. 12 No. 2 (2018): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v12i2.4714

Abstract

Wireless Sensor Network (WSN) is a network consisting of several sensor nodes that communicate with each other and work together to collect data from the surrounding environment. One of the WSN problems is the limited available power. Therefore, nodes on WSN need to communicate by using a cluster-based routing protocol. To solve this, the researchers propose a node grouping based on distance by using k-means clustering with a hardware implementation. Cluster formation and member node selection are performed based on the nearest device of the sensor node to the cluster head. The k-means algorithm utilizes Euclidean distance as the main grouping nodes parameter obtained from the conversion of the Received Signal Strength Indication (RSSI) into the distance estimation between nodes. RSSI as the parameter of nearest neighbor nodes uses lognormal shadowing channel modeling method that can be used to get the path loss exponent in an observation area. The estimated distance in the observation area has 27.9% error. The average time required for grouping is 58.54 s. Meanwhile, the average time used to retrieve coordinate data on each cluster to the database is 45.54 s. In the system, the most time-consuming process is the PAN ID change process with an average time of 14.20 s for each change of PAN ID. The grouping nodes in WSN using k-means clustering algorithm can improve the power efficiency by 6.5%.
Improve the Robustness of Range-Free Localization Methods on Wireless Sensor Networks using Recursive Position Estimation Algorithm Prima Kristalina; Wirawan Wirawan; Gamantyo Hendrantoro
Journal of ICT Research and Applications Vol. 5 No. 3 (2011)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.2011.5.3.4

Abstract

The position of a sensor node at wireless sensor networks determines the received data sensing accuracy. By the knowledge of sensor positioning, the location of target sensed can be estimated. Localization techniques used to find out the position of sensor node by considering the distance of this sensor from the vicinity reference nodes.  Centroid Algorithm is a robust, simple and low cost localization technique without dependence on hardware requirement. We propose Recursive Position Estimation Algorithm to obtain the more accurate node positioning on range-free localization technique. The simulation result shows that this algorithm has the ability on increasing position accuracy up to 50%.  The trade off factor shows the smaller the number of reference nodes the higher the computational time required. The new method on the availability on sensor power controlled is proposed to optimize the estimated position.
Performance Evaluation of Distribution Node in Case of LEACH Implementation on Wireless Sensor Network Bagas Mardiasyah Prakoso; Ahmad Zainudin; Prima Kristalina; Rizqi Fauzil Azhar
Jurnal Elektronika dan Telekomunikasi Vol 18, No 2 (2018)
Publisher : LIPI Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14203/jet.v18.67-74

Abstract

Wireless sensor networks consisting of sensor nodes can be used as an effective tool for collecting data in various situations. Nodes are usually placed randomly in an area to perform sensing and monitor various parameters related to environmental conditions in various locations. One of the major problems in wireless sensor networks is developing energy-efficient routing protocols that have a significant impact on the overall life of sensor networks so it is important to make energy savings in these limited energy sources to extend network life. This paper proposes a hardware design and Low-Energy Adaptive Clustering Hierarchy (LEACH) routing protocol configuration for power saving by utilizing cluster head selection mechanism. The cluster head selection process is performed periodically based on LEACH algorithm enables the node to have the best lifetime responsible for communication between the nodes and the server as well as the effort to save energy consumption of limited energy sources to extend network life. So that makes the process of sending information more effective and optimal. The system has been able to display data information along with the position of nodes in the web server with an average of 42 seconds of computing time in a rotation of the system so that it can be done 85 times in 1 hour. The system is able to provide real-time information with a throughput of more than 1.052 Kbps and packet loss of no more than 6.7%. In addition, energy savings can up to 6.5% of the existing energy in a lithium battery.
PEMBUATAN PEMBATAS PEMAKAIAN TELEPON DAN KONTROL PERALATAN ELEKTRONIK BERBASIS MIKROKONTROLER Akuwan Saleh; Prima Kristalina; Anang Budikarso
SENTIA 2015 Vol 7, No 1 (2015)
Publisher : SENTIA 2015

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (645.339 KB)

Abstract

Telepon merupakan alat komunikasi yang banyak diminati masyarakat, karena harganya yang relatif murah dan lebih  cepat  bila  dibandingkan  dengan  alat  komunikasi  lainnya.  Dalam  melakukan  pembicaraan,  biasanya pemakai  tidak  memperdulikan  waktu  dan  biaya.  Oleh  karena  itu,  agar  biaya  pemakaian  tidak  membebani pemakai maka pada perangkat telepon dibuat aplikasi untuk pembatas pemakaian dengan cara user login dan mengisi password untuk mengaktifkan counter dengan durasi tertentu dan aplikasi kontrol peralatan rumah jarak jauh  yang dilakukan  melalui telepon pengirim menggunakan  mikrokontroler  dengan memanfaatkan saluran telepon sebagai media transmisi. Pada aplikasi ini ditambahkan mikrokontroler DT-51, Phone Interface, dan LCD Graphic. Mikrokontroler berfungsi untuk mengolah data dari phone Interface yang berasal dari penekanan tombol  keypad pada  telepon  pengirim  sebagai perintah  yang  diterjemahkan  oleh  mikrokontroler  untuk mengendalikan rangkaian sakelar (relay). Pengguna dapat mengerti peralatan yang dikontrol dalam keadaan on atau off setelah perintah dilaksanakan dengan membaca sinyal balasan berupa nada beep. Berdasarkan pengujian diperoleh hasil bahwa penggunaan pembatas pemakaian, kondisi belum login, jalur telepon dalam keadaan mati dan setelah login jalur telepon siap melakukan panggilan. Saat penambahan durasi 1 sampai 9 menit, dapat dilakukan dengan baik, dengan prosentase keberhasilan mencapai 100% untuk setiap panggilan. Sedangkan pengujian dengan pengiriman melalui telepon analog dan mobile-phone diperoleh kontrol on/off peralatan listrik dengan penekanan tombol terjadi delay kurang dari 1 detik.
DESIGN OF ARTIFICIAL NEURAL NETWORK SOFTWARE FOR PREDICTING THE HEALTH GRADE IN A TELEPHONE EXCHANGE Wiratmoko Yuwono; Yodik Iwan Herlambang; Mauridhi Hery Purnomo; Prima Kristalina
SAINTEKBU Vol 1 No 1 (2008)
Publisher : KH. A. Wahab Hasbullah University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (209.235 KB) | DOI: 10.32764/saintekbu.v1i1.32

Abstract

Application of artificial neural network software ( ANN ) has been implemented forpredicting many thing and replace the conventional ways of predicting method using linearregression. Back Propagation algorithm can be used to reach the result of the program thatcan predict the telephone exchange health grade according to the data that has beenrecorded before. By predicting each parameter that has correlation to the telephoneexchange health grade, we can predict the telephone exchange health grade in the nextperiod.Kata kunci : jaringan syaraf tiruan, propagasi balik, nilai kesehatan sentral.
DESIGN AND IMPLEMENT ADAPTIVE NEURAL NETWORK SOFTWARE FOR ROUTING DATA PROCESS IN COMPUTER NETWORK Dadio Nugroho; Risa Ekowati; Prima Kristalina; Mauridhi Hery P
SAINTEKBU Vol 1 No 2 (2008)
Publisher : KH. A. Wahab Hasbullah University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (120.19 KB) | DOI: 10.32764/saintekbu.v1i2.81

Abstract

The data transmission in computer network is very important. Therefore, this issue always need a serious attention, especially in the middle and wide area networking which consist of many routers. This Adaptive Neural Network's software  for routing data in computer network (which is called JST Router later) is designed to solve a routing problem for choosing the best data routing path using Backpropagation Algorithm of Neural NetworkKeywords : routing table , routing algorithms, routing protocols , Artificial Neural Networks .
Modifikasi Identity-based Encryption pada Keamanan dan Kerahasiaan Data Rekam Medis Dian Neipa Purnamasari; Amang Sudarsono; Prima Kristalina
INOVTEK POLBENG Vol 9, No 2 (2019): INOVTEK VOL.9 NO 2 - 2019
Publisher : POLITEKNIK NEGERI BENGKALIS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (80.356 KB) | DOI: 10.35314/ip.v9i2.1005

Abstract

Keamanan pada data rekam medis menjadi hal yang penting selain mengingat pentingnya isi dari rekam medis tersebut, keamanan pada data rekam medis telah diatur oleh kemeterian di Indonesia. Perkembangan teknologi membawa pengaruh pada penyimpanan data rekam medis, salah satunya perubahan data rekam medis dari konvensional menjadi elektronik. Namun, perkembangan teknologi ini juga memiliki dampak buruk yaitu munculnya oknum-oknum yang menjalankan kegiatan ilegal untuk mendapatkan keuntungan pribadi atau kelompok. Salah satunya adalah mencuri data rekam medis untuk memeras pasien, bahkan melakukan perubahan pada data rekam medis yang berdampak fatal pada kesehatan pasien. Pada penelitian ini diusulkan metode keamanan data rekam medis menggunakan modifikasi skema Identity-based Encryption (IBE) dan algoritma AES atau dapat disebut dengan mIBE-AES. Keunikan dari metode yang diusulkan adalah nilai awal yang telah ditentukan dari tiap byte pada identitas pengguna sehingga dapat menekan waktu komputasi pada proses pembangkitan kunci. Metode yang diusulkan akan dibandingkan dengan metode keamanan yang hanya menggunakan algoritma AES. Evaluasi performa yang telah dilakukan adalah pengujian kinerja dan tingkat keamanan pada penyerangan Man in The Middle (MITM). Didapatkan hasil bahwa metode mIBE-AES lebih unggul dengan total waktu komputasi 0,799 detik serta mampu menangani penyerangan MITM dengan skenario sniffing dan chosen-plaintext.
Implementasi Sistem Notifikasi untuk Pengawasan Pasien Alzheimer Berbasis Bluetooth Low Energy (BLE) Aries Pratiarso; Trisna Agung Mahendra; Mike Yuliana; Prima Kristalina; I Gede Puja Astawa; Arifin Arifin
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 7 No 4: November 2018
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1726.001 KB)

Abstract

Alzheimer's patients need attention and special treatment due to their inability to remember something. One technology that is widely used for tracking objects or people in an indoor environment is a Bluetooth Low Energy (BLE). In this paper, a surveillance notification system for Alzheimer's patients is proposed using Beacon technology to prevent the lossof patients. Improvement in accuracy of the estimated position of the patient were calculated using a Kalman filter. The reason for using this method was the difficulty of determining the location of objects due to noise and inaccuracy of measurement data.Fromthe results of the tests performed, it can be seen that the system made is able to provide notifications to nurses if the patient exceeds the specified distance with an average success of up to 90%. The use of the Kalman method is also able to increase the accuracy of the estimation of patient position with an estimated error reduction of 69.7%.
Skema Peningkatan Reciprocity Kanal dengan Menggunakan Metode Hierarchical Clustering Prima Kristalina; Florista Dewi; Mike Yuliana; Tri Budi Santoso; Amang Sudarsono; Reni Soelistijorini
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 7 No 3: Agustus 2018
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1657 KB)

Abstract

Secret key generation scheme that utilizesthe randomness of wireless channels is a very promising alternative to establish a secure communication path. Some wireless devices are used to obtain the channel parameters. But the problem that occurs is imprecise measurement results, causinga secret key difference between the two users. To overcome this problem, pre-processing method is used before the data is quantized, to increase the similarity (reciprocity) channel parameter measurement results. In this paper, the effect of the use of one pre-process method, which was hierarchical clustering, on the performance of secret key generation scheme in an indoorenvironment with two variations of scenario was investigated.The results show that the use of the pre-processingmethod can improve the similarity parameter of the channel measurement results as indicated by the increasing of correlation values up to 20%. In addition, the resulting bit mismatch also decreases with the value of key disagreement rate (KDR) maximum of 20%.
Skema Lokalisasi Posisi Node Terdistribusi pada Lingkungan Free Space Path Loss Aries Pratiarso; Adam Surya Putra; Prima Kristalina; Amang Sudarsono; Mike Yuliana; I Gede Puja Astawa
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 6 No 3: Agustus 2017
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1206.834 KB)

Abstract

A wireless sensor network consists of interconnected nodes that exchange information and use shared resource in a wireless transmission medium. Sensor nodes are randomly deployed in observation area in static or moving term. During this situation, the position of each sensor nodes is required to be known to monitor the circumstances around the node according to the information collected by sensor. Localization is the process to determine the position of nodes. This process could be done in centralized or distributed manner. In this paper, a distributed localization mechanism is proposed, where the calculation of node position is carried out on the node itself. Trilateration method is employed to calculate the position of node based on estimated distance measured by Received Signal Strength Indicator (RSSI) technique using Zigbee module in Free-Space Path Loss (FSPL) outdoor area. The experiment result shows that, based on log-normal shadowing model, the path loss coefficient for observation area is 2.5443, whereas average estimated position error from three different measured nodes are 23.504 m, 17.369 m, and 17.95 m respectively. Each node needs 2.73 second to undertake localization process completely.