Claim Missing Document
Check
Articles

Found 13 Documents
Search

Robot Inverted Pendulum Beroda Dua (IPBD) dengan Kendali Linear Quadratic Regulator (LQR) FAHMIZAL, FAHMIZAL; ARROFIQ, MUHAMMAD; ADRIAN, RONALD; MAYUB, AFRIZAL
ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika Vol 7, No 2 (2019): ELKOMIKA
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/elkomika.v7i2.224

Abstract

ABSTRAKMakalah ini memaparkan proses pemodelan robot inverted pendulum beroda dua (IPBD) menggunakan dinamika Lagrange. Setelah sistem model robot IPBD diperoleh, teknik kendali optimal dalam hal ini menggunakan linear quadratic regulator (LQR) digunakan untuk melihat step respon sistem dan tanggapan respon sistem terhadap gangguan. Sebelum kendali LQR diimplementasikan, simulasi menggunakan Simulink Matlab dilakukan untuk mendapat parameter gain K pada kendali LQR. Selanjutnya, dengan mengubah-ubah matriks pembobot Q akan diperoleh variasi gain K. Pada penelitian ini dilakukan variasi matriks pembobotan Q sebanyak lima jenis. Sedangkan matriks elemen R dituning dengan nilai satu. Dari hasil pengujian diperoleh bahwa dengan membesarkan pembobotan matriks Q, dihasilkan respon menuju keadaan steady lebih cepat dan overshoot berkurang. Parameter gain K dari hasil simulasi selanjutnya akan diimplementasikan secara embedded programming ke dalam Arduino Uno pada sistem robot IPBD.Kata kunci: Inverted pendulum beroda, Pemodelan, LQR ABSTRACTThis paper describes the process of modeling two-wheeled pendulum inverted robots (IPBD) using the Lagrange dynamics. After the IPBD robot model system was obtained, the optimal control technique in this case using a linear quadratic regulator (LQR) was used to see the system response step and the response of the system response to interference. Before the LQR control is implemented, simulation using Matlab Simulink is conducted to get the gain K parameter on the LQR control. Furthermore, by varying the weighting matrix Q, the gain variation K will be obtained. There are five types of Q weighting matrix in this research and the R element matric is tuned with a value of 1. From the test, obtained results show that by raising the weighting matrix Q is produced a faster response to the steady state and overshoot is reduced. At the final stage, the gain K parameter from the simulation results will be implemented by embedded programming into Arduino Uno on the IPBD robot system.Keywords: Wheeled inverted pendulum, Modelling, LQR
Penerapan Metode K-Means Untuk Clustering Mahasiswa Berdasarkan Nilai Akademik Dengan Weka Interface Studi Kasus Pada Jurusan Teknik Informatika UMM Magelang Asroni, Asroni; Adrian, Ronald
Semesta Teknika Vol 18, No 1 (2015): MEI 2015
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/st.v18i1.708

Abstract

The selection process among outstanding students in a department has a big problem. This process is not fair because only involve one criteria and ignore the other criteria. We need the best student to participate in a competition held by the Indonesia Security Incident Response Team on Internet Infrastructure (ID SIRTII) of the Ministry of Communication and Information. This process uses Weka software to calculate the best student. It provides the various method to explore the data. One of them is clustering method. There are many algorithms in clustering method. In this research, we will investigate widely about one of that algorithms. Its name is K-Means. This algorithm (K-Means) will give the recommendations about the best student based on the cluster. It will represent the many clusters of a student group. The best cluster can be calculated more to get the names of the best students group. They are eligible to enter the competition.  K-means involve the GPA (Grade Point Average) and related course to support the academic skill in order to get the best student. This research helps the teacher select the best student to enter the competition. Many similar cases can use this algorithm in order to get the best student.
Analyzing Image Malware with OSINTs after Steganography using Symmetric Key Algorithm Fauziyyah, Anni Karimatul; Adrian, Ronald; Alam, Sahirul
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12266

Abstract

Steganography is the practice of hiding a message or information within another file, such as an image (Singh & Singla, 2022). OSINT (Open Source Intelligence) involves using publicly available information for intelligence gathering purposes. In this research, the asymmetric key algorithm will be applied to the steganography method, using 10 images with different sizes and dimensions. Images tested for steganography are in tiff, gif, png, jpg, and bmp format. A combination of steganography and OSINT could involve analyzing and decoding images found on publicly available platforms, such as social media, to uncover hidden messages. On the other hand, steganography within OSINT can also be used to protect sensitive information from prying eyes. Overall, the combination of Symmetric Key Algorithm steganography and OSINT can be a powerful tool for both intelligence gathering and secure communication. Here in this work, malware is developed, and using that malware the victim’s machine is exploited. Later, an analysis is done via freely available OSINTs to find out which is the best OSINT that gives the best results. OSINTs have been very helpful in identifying whether the URLs and files are malicious or not. But how binding an image with the malware makes it difficult for OSINTs to identify they are malicious or not is being analyzed in this work. The analysis shows that the best OSINT is VirusTotal which has a greater number of engines that could detect the malware whereas others don’t have a variety of engines to detect the malware. Also, when it comes to malware afore binding it with an image is easier to detect whereas for an OSINT it was difficult to identify and detect the malware after binding with an image
Performance Analysis of Devops Practice Implementation Of CI/CD Using Jenkins Kusumadewi, Rismanda; Adrian, Ronald
MATICS: Jurnal Ilmu Komputer dan Teknologi Informasi (Journal of Computer Science and Information Technology) Vol 15, No 2 (2023): MATICS
Publisher : Department of Informatics Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18860/mat.v15i2.17091

Abstract

Continuous Integration and Continuous Delivery (CI/CD) are methods used in agile development to automate and speed up the process of building, testing, and validating services. To support and simplify all development and deployment processes, several methods such as containerized and CI/CD automation are needed. In this research, a DevOps Practice is carried out which includes process integration, deployment, and testing automatically using a tool called Jenkins. These tools are open source automation servers to help the Continuous Integration and Continuous Deployment process. Jenkins is equipped with various open source plugins that can be used to simplify and assist CI/CD automation and testing processes. The implementation of CI/CD in performance testing makes the testing process integrated, automated, and can be run on a regular basis. 
Analisis Perbedaan Pengaruh Penggunaan Iptables Chains dalam Mencegah Denial of Service (DoS) pada Jaringan IoT Nida, Hanifatun; Adrian, Ronald
Journal of Internet and Software Engineering Vol 4 No 1 (2023): Journal of Internet and Software Engineering
Publisher : Department of Electrical Engineering and Informatics, Vocational College, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jise.v4i1.5192

Abstract

Peningkatan penggunaan perangkat Internet of Things (IoT) rumahan dibarengi dengan berkembangnya berbagai kerentanan keamanan pada jaringan rumah. Keterbatasan sumber daya yang dimiliki perangkat IoT menjadikannya target ideal untuk diluncurkan serangan Denial of Service (DoS), termasuk SYN flood. Serangan ini cenderung menargetkan sumber daya IoT yang krusial, termasuk CPU. Apabila dilakukan secara terus menerus, serangan ini mampu menguras sumber daya IoT dan membuatnya kehilangan fungsionalitasnya. Penerapan iptables pada Raspberry Pi mampu meminimalkan dampak serangan SYN flood. Iptables memiliki berbagai chains dan tables dengan kemampuan dan fungsi yang berbeda. Penelitian ini bertujuan untuk menganalisis perbedaan pengaruh penggunaan iptables chains terhadap penggunaan CPU Raspberry Pi. Penggunaan CPU yang semakin rendah memperkecil kemungkinan terjadinya DoS. Hasil penelitian ini kemudian akan dibandingkan dengan penggunaan CPU ketika aturan iptables pada penelitian terdahulu diterapkan. Hasilnya, kedua aturan mengonsumsi CPU dalam persentase yang hampir sama.
Rancang Bangun Prototype Pengenal Sensor Semi Otomatis Pada Perangkat Internet of Things Dzulfikar; Rosyid, Nur Rohman; Adrian, Ronald
Journal of Internet and Software Engineering Vol 4 No 2 (2023): Journal of Internet and Software Engineering
Publisher : Department of Electrical Engineering and Informatics, Vocational College, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jise.v4i2.9161

Abstract

Revolusi industri 4.0 memberi dampak yang sangat besar. Revolusi industri 4.0 menggabungkan mesin atau perangkat, komputer, dan internet menjadi satu sistem yang utuh. Salah satu teknologi yang berkembang karena adanya revolusi industri yaitu Internet of Things (IoT). Saat ini, teknologi IoT sudah banyak diimplementasikan di berbagai sektor, mulai dari sektor pertambangan, supply chain management, pertanian, transportasi, dan lain sebagainya. Dimasa sekarang, penerapan IoT masih dilakukan secara manual. Penerapan ini dapat menimbulkan permasalahan seperti membutuhkan waktu lebih dan meningkatnya human error. Oleh karena itu dibutuhkan suatu sistem untuk mengatasi hal tersebut. Penelitian ini dilakukan untuk mendeteksi dan rekognisi secara otomatis jenis sensor yang dipasang atau ditambahkan. Penelitian yang dilakukan diimplementasikan dengan menggunakan framework Micropython. Pengujian yang dilakukan berfokus pada fungsionalitas sistem. Berdasarkan penelitian yang dilakukan, sistem berhasil mendeteksi dan mengenali sensor secara semi otomatis. Hasil deteksi dan konfigurasi disimpan di dalam microcontroller dalam bentuk file json dan menampilkan hasilnya melalui web app.
Robot Inverted Pendulum Beroda Dua (IPBD) dengan Kendali Linear Quadratic Regulator (LQR) FAHMIZAL, FAHMIZAL; ARROFIQ, MUHAMMAD; ADRIAN, RONALD; MAYUB, AFRIZAL
ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika Vol 7, No 2: Published May 2019
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/elkomika.v7i2.224

Abstract

ABSTRAKMakalah ini memaparkan proses pemodelan robot inverted pendulum beroda dua (IPBD) menggunakan dinamika Lagrange. Setelah sistem model robot IPBD diperoleh, teknik kendali optimal dalam hal ini menggunakan linear quadratic regulator (LQR) digunakan untuk melihat step respon sistem dan tanggapan respon sistem terhadap gangguan. Sebelum kendali LQR diimplementasikan, simulasi menggunakan Simulink Matlab dilakukan untuk mendapat parameter gain K pada kendali LQR. Selanjutnya, dengan mengubah-ubah matriks pembobot Q akan diperoleh variasi gain K. Pada penelitian ini dilakukan variasi matriks pembobotan Q sebanyak lima jenis. Sedangkan matriks elemen R dituning dengan nilai satu. Dari hasil pengujian diperoleh bahwa dengan membesarkan pembobotan matriks Q, dihasilkan respon menuju keadaan steady lebih cepat dan overshoot berkurang. Parameter gain K dari hasil simulasi selanjutnya akan diimplementasikan secara embedded programming ke dalam Arduino Uno pada sistem robot IPBD.Kata kunci: Inverted pendulum beroda, Pemodelan, LQR ABSTRACTThis paper describes the process of modeling two-wheeled pendulum inverted robots (IPBD) using the Lagrange dynamics. After the IPBD robot model system was obtained, the optimal control technique in this case using a linear quadratic regulator (LQR) was used to see the system response step and the response of the system response to interference. Before the LQR control is implemented, simulation using Matlab Simulink is conducted to get the gain K parameter on the LQR control. Furthermore, by varying the weighting matrix Q, the gain variation K will be obtained. There are five types of Q weighting matrix in this research and the R element matric is tuned with a value of 1. From the test, obtained results show that by raising the weighting matrix Q is produced a faster response to the steady state and overshoot is reduced. At the final stage, the gain K parameter from the simulation results will be implemented by embedded programming into Arduino Uno on the IPBD robot system.Keywords: Wheeled inverted pendulum, Modelling, LQR
Optimasi Klasterisasi Kubernetes untuk Peningkatan QoS pada Jaringan 5G Adrian, Ronald; Mandasari, R. Deasy
Journal of Applied Smart Electrical Network and Systems Vol 6 No 01 (2025): Vol 06, No. 01 June 2025
Publisher : Indonesian Society of Applied Science (ISAS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52158/jasens.v5i2.1129

Abstract

Resource management, scalability, and Quality of Service are key challenges in deploying 5G networks, particularly regarding latency, throughput, and packet loss. Conventional network architectures often fail to meet the demands of high-speed and low-latency communication, especially for applications such as the Internet of Things and cloud computing. This study applies a Kubernetes-based clustering method to address these challenges to optimize 5G network performance through efficient resource allocation and load balancing. Experiments were conducted in a Containerized Network Function environment through simulations, demonstrating significant performance improvements. Test results recorded a 28.69% reduction in latency, a 34.52% increase in throughput, and a 32.14% reduction in packet loss compared to a non-clustered 5G network. These improvements are supported by Kubernetes features such as auto-scaling, traffic distribution, and real-time load balancing. This approach demonstrates that Kubernetes clustering effectively enhances Quality of Service, optimizes resource allocation, and improves the overall efficiency of 5G network systems. Keywords: 5G Networks, Clustering, Kubernetes, QoS, Resource Management
Design and Implementation of a Machine Learning-Based Adaptive IDS on Raspberry Pi for Smart Home Network Security Adrian, Ronald; Mandasari, R. Deasy; Alam, Sahirul
SITEKIN: Jurnal Sains, Teknologi dan Industri Vol 22, No 2 (2025): June 2025
Publisher : Fakultas Sains dan Teknologi Universitas Islam Negeri Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24014/sitekin.v22i2.33485

Abstract

The rapid growth of the Internet of Things (IoT) has accelerated the adoption of smart home technologies, offering convenience and automation in daily life. However, this interconnected environment increases the risk of cyber threats, making information security a pressing concern. To address this, the study presents the design and implementation of an adaptive Intrusion Detection System (IDS) based on machine learning, deployed on a Raspberry Pi platform as a low-cost, flexible, and energy-efficient solution for smart home security. Unlike traditional IDS approaches that rely on static, rule-based detection, the proposed system leverages adaptive learning algorithms to identify evolving attack patterns in real time. It integrates network traffic monitoring with carefully selected sensors and detection algorithms to improve responsiveness across various threat types from application-level exploits to network infrastructure attacks. System performance was evaluated through simulated attacks, including DDoS, brute force, and malware injection scenarios. Results show that the adaptive IDS significantly improves detection accuracy to 85%, surpassing the 65% accuracy achieved by conventional methods. The response time was also reduced from 5 seconds to just 2 seconds, demonstrating the system’s suitability for real-time threat mitigation in resource-constrained environments. The Raspberry Pi acts as the IDS host and a firewall enhancement tool, supporting custom iptables rules, whitelist-based access control, and integration with the Elastic Stack for real-time logging and visualization. The system also supports continuous learning by updating its detection models based on new traffic patterns, making it scalable and resilient to future threats. This research contributes to IoT cybersecurity by demonstrating that an adaptive, machine learning-based IDS can be effectively implemented on lightweight hardware without sacrificing performance. It offers a cost-effective and scalable solution to secure smart home networks against increasingly sophisticated cyberattacks.Keywords: Firewall, IDS, IoT, Raspberry, Smart Home
Implementation of Coordinated Auto-Pairing Design in Wireless Sensor Networks Using Gateway-to-Node Handshake Method Rosyid, Nur Rohman; Adrian, Ronald; Amalyris, Waffiyah; Dzulfikar; Subardono, Alif
Emitor: Jurnal Teknik Elektro Vol 24, No 2: July 2024
Publisher : Universitas Muhammadiyah Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/emitor.v24i2.3199

Abstract

In the current and future era of automation, the widespread utilization of Wireless Sensor Network (WSN) technology becomes essential. The ease of installation, configuration, and management of WSN system devices involving sensor nodes is a crucial factor in the effective utilization of this system. The way sensor nodes connect to the gateway/controller in a large and widespread WSN system is a pivotal point. The experimentation in this research has successfully developed a coordinated auto-pairing protocol between the controller/gateway and sensor nodes using a handshake method approach. The results of the coordinated auto-pairing process between the controller and nodes indicate an average time of 435ms per node and a data transmission accuracy of 97%.