Claim Missing Document
Check
Articles

Found 12 Documents
Search

Automatic Drain System in Seawater Aquarium with Fuzzy Logic Method Adin, Nur; Nuha, Hilal Hudan
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 4, No 3 (2020): Juli 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v4i3.2209

Abstract

In seawater aquariums, seawater quality plays a very important role for the survival of the biota in it. There are measurement parameters that determine the quality of the seawater fit to be inhabited by seawater ornamental fish such as clown fish. Measurement parameters are such as temperature, salinity, dissolved oxygen content (DO), pH, ammonia, nitrite, and nitrate. Current technological developments make it possible to create a system that automatically conducts seawater drainage in a seawater aquarium so that the quality of the seawater remains in accordance with its measurement parameters and is fit for habitation by seawater ornamental fish such as clown fish. In this study the measurement parameters that become the reference are the temperature, pH (acidity) values obtained from the temperature sensor and the pH sensor. For normal temperatures, if the temperature is in the range of 24°C to 28°C, while for the ideal temperature is in the range of 25-27°C. For an appropriate pH in a saltwater aquarium is 7.5-8.5 with an ideal pH of 8.2. From the results of measurements made by these sensors, the value will be processed using the fuzzy logic method, then the condition of sea water quality in the aquarium can be seen from the smartphone, and when the measurement results show an inappropriate value, the system will automatically drain the water
HUMAN ACTIVITY RECOGNITION IMPROVEMENT ON SMARTPHONE ACCELEROMETERS USING CIMA Putrada, Aji Gautama; Abdurohman, Maman; Perdana, Doan; Nuha, Hilal Hudan
TEKTRIKA Vol 8 No 2 (2023): TEKTRIKA Vol.8 No.2 2023
Publisher : Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/tektrika.v8i2.6973

Abstract

Human activity recognition (HAR) is a research field that focuses on detecting user activities and has wide applications. However, the problems that need to be solved are real-time constraints and imbalanced datasets due to different activity frequencies. Our research aims to apply classification integrated moving averages (CIMA) to HAR by evaluating its performance regarding real-time constraints and imbalanced datasets. We achieved the smartphone accelerometer dataset from Kaggle, which consists of several activities: walking, jogging, climbing, and descending stairs. We develop a general CIMA windowing algorithm with hyperparameters J and W. We benchmark CIMA with two state-of-the-art HAR methods: distributed online activity recognition system (DOLARS) and convolutional neural network (CNN). We conducted some imbalance and model size analysis. The test results show that, with J = 10 and W = 240, CIMA performs better than DOLARS and CIMA with recall, precision, and f1-score of 0.996, 0.993, and 0.994. We also prove that CIMA, assisted by quantization, has the smallest model size compared to the CNN and DOLARS model sizes. Finally, we demonstrate that CIMA performs well for imbalanced datasets, where CIMA’s recall on upstairs and downstairs activities is better than DOLARS and CNN, with values of 1.00 and 0.98, respectively. Key Words: classification integrated moving average, human activity recognition, smartphone, accelerometer, imbalanced dataset
The acceptance model for camera simulators as a learning media for Indonesian vocational student Suwastika, Novian Anggis; Masrom, Maslin; Qonita, Qori; Yasirandi, Rahmat; Nuha, Hilal Hudan
International Journal of Evaluation and Research in Education (IJERE) Vol 13, No 5: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijere.v13i5.29011

Abstract

This study investigates the acceptance of camera simulator technology as a learning media by Indonesian vocational high school (VHS) students and examines the relationships among influencing factors. It proposes an acceptance model integrating the technology acceptance model (TAM) 3 and the unified theory of acceptance and use of technology (UTAUT). Ten factors impacting technology acceptance were identified, resulting in the formulation of 15 hypotheses regarding inter-construct relationships. In this empirical study, a quantitative approach was employed, distributing questionnaires to 200 students at Public Vocational High School 10 in Bandung, specializing in broadcasting and filmmaking programs. After analyzing 145 valid responses, the study progressed in two stages: the measurement model and the structural model. The evaluation of the measurement model confirmed the validity of all indicators and constructs, ensuring compliance with the established standards. In the structural model evaluation, one construct (computer anxiety) and four inter-construct relationships were excluded. This research enhances our understanding of factors influencing camera simulator technology acceptance among VHS students in Indonesia, shedding light on the complexities of their decision-making process in adopting this educational tool.
Performance and Security Analysis of Lightweight Hash Functions in IoT Mufidah, Nada Fajri; Nuha, Hilal Hudan
Jurnal Informatika: Jurnal Pengembangan IT Vol 9, No 3 (2024)
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v9i3.7633

Abstract

The rapid proliferation of Internet of Things (IoT) devices across various sectors, including healthcare, automotive, smart homes, and agriculture, has created a need for robust security measures that do not compromise the limited resources of these devices. This study analyses the performance and security of several lightweight cryptographic hash functions, specifically SHAKE128, BLAKE2s, SHA-256, SHA3-256, SipHash and xxHash, within the context of the Internet of Things (IoT). A series of experiments conducted on the Arduino Uno platform allows for an evaluation of these functions in terms of throughput, memory usage, and avalanche effect. The findings indicate that while SHAKE128 and SHAKE256 demonstrate superior throughput, they require greater memory, particularly with larger input sizes. BLAKE2s exhibits a robust equilibrium between throughput, memory efficiency, and consistent avalanche effects, rendering it a dependable option for 256-bit outputs. Conversely, xxHash and SipHash provide high throughput and minimal memory usage, yet exhibit reduced avalanche effects. The findings of this research provide critical insights for developers and researchers on the selection of appropriate cryptographic solutions, which must be tailored to the constraints and security requirements of IoT devices.
Estimasi Utilisasi Prosesor pada Jaringan Interkoneksi Optik menggunakan Regresi Gaussian NUHA, HILAL HUDAN; WARDANA, AULIA ARIF
ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika Vol 10, No 3: Published July 2022
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/elkomika.v10i3.702

Abstract

ABSTRAKTeknologi prosesor paralel melibatkan lebih dari satu node prosesor dalam interkoneksi optik. Unjuk kerja dari desain dari jaringan optik tersebut harus diestimasi sebelum diimplementasikan. Atribut yang bisa diambil diambil dari desain tersebut yaitu nomor node dan thread, distribusi spasial dan temporal, dan rasio T/R. Kajian ini mengevaluasi teknik estimasi utilitasi prosesor menggunakan regresi Gaussian yang dibandingkan dengan Support Vector Machine untuk regresi dan regresi linear. Hasil percobaan penunjukkan bahwa regresi Gaussian menghasilkan akurasi estimasi paling tinggi dengan nilai koefisien determinasi sebesar 98.75%.Kata kunci: Utilisasi prosesor, interkoneksi optik, regresi Gaussian ABSTRACTParallel processor technology involves more than one processor node in an optical interconnection. The performance of the design of the optical network must be estimated before further deployment. The attributes that can be obtained from the design are the number of nodes and threads, the spatial and temporal distribution, and the T/R ratio. This study evaluates the processor utility estimation technique using Gaussian regression compared to the Support Vector Machine for linear regression and regression. The experimental results show that Gaussian regression produces the highest estimation accuracy with a coefficient of determination of 98.75%.Keywords: Processor Utilization, Optical Interconnection, Gaussian Regression
A Literature Survey on Plant Grafting Technology and Internet of Things Solutions Nurhalim, Rifqy; Nuha, Hilal H.
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.482

Abstract

Hundreds of works have been reported related to the agricultural technology. This paper can be regarded as an initial effort to summarize great works performed by researcher and scientists. First, we provide the works on the effect of rootstock choices. Second, the budding factor is presented by summarizing the works on the field. Finally, the success rate and feasibility of each technique is presented
A Literature Survey on Plant Grafting Technology and Internet of Things Solutions Nurhalim, Rifqy; Nuha, Hilal H.
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 2 (2022): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i2.482

Abstract

Hundreds of works have been reported related to the agricultural technology. This paper can be regarded as an initial effort to summarize great works performed by researcher and scientists. First, we provide the works on the effect of rootstock choices. Second, the budding factor is presented by summarizing the works on the field. Finally, the success rate and feasibility of each technique is presented
Implementation of Doodle Jump Game Based on Accelerometer Sensor and Kalman Filter Danuwijaya, Edghar; Putra, Yohanes Armenian; Nuha, Hilal Hudan; Oktaviani, Ikke Dian
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol. 14 No. 1 (2025): JANUARY
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v14i1.2259

Abstract

The doodle jump game is a video game with a jumping game model assisted by accelerometer sensor technology. Placing the accelerometer sensor in the doodle jump game is a very appropriate solution to determine the accuracy of the values on the sensor. The accelerometer sensor can be measured in real time, however applying a small force to the sensor can result in interference with measurement accuracy. Therefore, creating the measurement results you need using filters can help reduce noise. The method used to use this filter is the Kalman Filter algorithm. The use of the Kalman Filter method can provide a stable level of accuracy in the movements of the main characters in the game and the accelerometer sensor so that it can become a precise algorithm. Apart from that, the use of the Kalman Filter as a tool or method for measuring numbers to provide a solution to improve the design of the previous developer.
Penerapan dan Pelatihan Sistem Smart Aquaculture untuk Budidaya Ikan dalam Biofloc di SEIN Farm Kota Bandung Sukarno, Parman; Nuha, Hilal Hudan; Suwastika, Novian Anggis; Makky, Muhammad Al; Oktaria, Dita; Utomo, Rio Guntur; Yasirandi, Rahmat
Aksiologiya: Jurnal Pengabdian Kepada Masyarakat Vol 7 No 2 (2023): Mei
Publisher : Universitas Muhammadiyah Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30651/aks.v7i2.11532

Abstract

Sekemala Integrated Farm (Sein Farm) merupakan bagian dari Unit Pelaksana Teknis (UPT) Pembibitan Tanaman Pangan, Hortikultura, dan Peternakan,  Dinas Ketahanan Pangan dan Pertanian (DKPP) Kota Bandung yang memiliki fungsi sebagai laboratorium umum (masyarakat) untuk kegiatan urban farming. Salah satu kegiatan urban farming adalah budidaya ikan dalam biofloc. Sein Farm memiliki biofloc sebanyak 55 unit untuk budidaya ikan tawar. Menjaga kualitas air dalam biofloc memiliki peran yang sangat krusial dalam keberhasilan budidaya ikan. Permasalahan yang dihadapi Sein Farm dalam budidaya ikan di biofloc adalah dengan keterbasan jumlah karyawan dalam kegiatan operasional sehari-hari untuk menjaga kualitas air. Integrasi teknologi Internet of Things (IoT) dan Artificial Intelligence (AI) memberikan solusi untuk otomatisasi kegiatan akuakultur termasuk untuk menjaga kualitas air, yang juga dikenal sebagai smart aquaculture. Dalam kegiatan pengabdian kepada masyarakat tim dari Fakultas Informatika Universitas Telkom membangun, menerapkan, melakukan alih teknologi, dan mengukur penerimaan solusi berbasis smart aquaculture kepada 16 pegawai operasional di Sein Farm. Dari hasil kegiatan tersebut, tujuan dari kegiatan masyarakat berhasil capai, yaitu berhasil membangun dan menerapkan smart aquaculture di Sein Farm, melakukan pelatihan untuk pengoperasian sistem, dan melakukan survey untuk penerimaan teknologi. Hasil dari survei menunjukkan 95% menjawab “setuju” dan “sangat setuju” terhadap penerapan smart aquaculture dalam membantu kegiatan operasional untuk menjaga kualitas air dalam budidaya ikan di biofloc.
Integrating CVSS, OWASP, and APPI for a Comprehensive Risk Analysis of SQL Injection Vulnerabilities in E-Commerce Adrian, Muhammad Kholilul; Ibnugraha, Prajna Deshanta; Nuha, Hilal Hudan
Intechno Journal : Information Technology Journal Vol. 7 No. 1 (2025): July
Publisher : Universitas Amikom Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24076/intechnojournal.2025v7i1.2184

Abstract

Purpose: By integrating the technical severity evaluation provided by the Common Vulnerability Scoring System (CVSS), the business risk assessment framework of the OWASP Risk Rating Methodology, and the legal compliance standards outlined in Japan’s Act on the Protection of Personal Information (APPI), this study aims to conduct a holistic risk analysis of SQL injection vulnerabilities within e-commerce platforms. The primary objective is to offer stakeholders a robust and actionable model for enhancing the security of online shopping environments. Methods/Study design/approach: This study employed a mixed-methods experimental case study approach. A custom-built, intentionally vulnerable e-commerce web application was subjected to a simulated SQL injection attack to extract fictitious user and transaction data. The technical severity of the vulnerability was quantified using CVSS v3.1, while the OWASP Risk Rating Methodology was applied to assess the associated business risks. Additionally, the legal implications were evaluated in accordance with Japan’s Act on the Protection of Personal Information (APPI). Result/Findings: The simulation confirmed that a SQL injection attack could extract sensitive personal and transactional data. The vulnerability was rated “Critical” with a CVSS v3.1 score of 9.1, and the OWASP assessment indicated a “High” business risk due to financial impact, APPI non-compliance, and privacy violations. The leaked purchase history was classified under APPI as “Personal Information Requiring Special Attention.” Novelty/Originality/Value: This study’s main contribution is its integrated methodology that links CVSS, OWASP, and APPI frameworks to assess cyber threats. It offers a multidimensional view, showing how a technical vulnerability can lead to serious legal and business consequences under specific data protection laws.