Claim Missing Document
Check
Articles

Soil Monitoring System Using LoRa-Based ANN Method For Rice Plant Growth Rokhmat Albasyih; Amang Sudarsono; Norma Ningsih
Enrichment: Journal of Multidisciplinary Research and Development Vol. 1 No. 4 (2023): Enrichment: Journal of Multidisciplinary Research and Development
Publisher : International Journal Labs

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55324/enrichment.v1i4.26

Abstract

Farmers only use approximation, the application of this approximation can cause the quality of the soil in rice fields to be infertile. In this research, an agricultural land monitoring system was created using an agricultural land monitoring tool to make it easier for farmers to monitor the land to get good crop yields. The test results obtained are data collected on the land according to the parameters needed from rice plants. The research design was made in the form of a monitoring tool which will later display on the website to make it easier for farmers to check the land to be planted with rice remotely. This system also uses the Artificial Neural Network method which functions to predict soil conditions. The result of this system is to make it easier for farmers to get agricultural land that meets the criteria for quality rice plant
Skema Peningkatan Reciprocity Kanal dengan Menggunakan Metode Hierarchical Clustering Prima Kristalina; Florista Dewi; Mike Yuliana; Tri Budi Santoso; Amang Sudarsono; Reni Soelistijorini
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 7 No 3: Agustus 2018
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1657 KB)

Abstract

Secret key generation scheme that utilizesthe randomness of wireless channels is a very promising alternative to establish a secure communication path. Some wireless devices are used to obtain the channel parameters. But the problem that occurs is imprecise measurement results, causinga secret key difference between the two users. To overcome this problem, pre-processing method is used before the data is quantized, to increase the similarity (reciprocity) channel parameter measurement results. In this paper, the effect of the use of one pre-process method, which was hierarchical clustering, on the performance of secret key generation scheme in an indoorenvironment with two variations of scenario was investigated.The results show that the use of the pre-processingmethod can improve the similarity parameter of the channel measurement results as indicated by the increasing of correlation values up to 20%. In addition, the resulting bit mismatch also decreases with the value of key disagreement rate (KDR) maximum of 20%.
Skema Lokalisasi Posisi Node Terdistribusi pada Lingkungan Free Space Path Loss Aries Pratiarso; Adam Surya Putra; Prima Kristalina; Amang Sudarsono; Mike Yuliana; I Gede Puja Astawa
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 6 No 3: Agustus 2017
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1206.834 KB)

Abstract

A wireless sensor network consists of interconnected nodes that exchange information and use shared resource in a wireless transmission medium. Sensor nodes are randomly deployed in observation area in static or moving term. During this situation, the position of each sensor nodes is required to be known to monitor the circumstances around the node according to the information collected by sensor. Localization is the process to determine the position of nodes. This process could be done in centralized or distributed manner. In this paper, a distributed localization mechanism is proposed, where the calculation of node position is carried out on the node itself. Trilateration method is employed to calculate the position of node based on estimated distance measured by Received Signal Strength Indicator (RSSI) technique using Zigbee module in Free-Space Path Loss (FSPL) outdoor area. The experiment result shows that, based on log-normal shadowing model, the path loss coefficient for observation area is 2.5443, whereas average estimated position error from three different measured nodes are 23.504 m, 17.369 m, and 17.95 m respectively. Each node needs 2.73 second to undertake localization process completely.
Smart Agriculture untuk Mewujudkan Ketahanan Pangan Berbasis Lora di Desa Kalipadang-Benjeng Gresik Norma Ningsih; Ida Anisah; I Gede Puja Astawa; Mochammad Zen Samsono Hadi; Prima Kristalina; Mike Yuliana; Aries Pratiarso; Haryadi Amran; Rahardita Widyatra; Amang Sudarsono; Mohamad Ridwan; Rini Satiti; Afifah Dwi Ramadhani
Jurnal Pengabdian Nasional (JPN) Indonesia Vol. 5 No. 1 (2024): Januari
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jpni.v5i1.648

Abstract

Increasing agricultural production is a top priority in agricultural development. There are many agricultural problems to be managed. One way to increase rice production is to pay attention to irrigation conditions. In addition to irrigation, rising temperatures also affect the process of flowering and grain filling. At high temperatures, grain because of rice agricultural production will calcify, resulting in a decrease in grain quantity and grain mass. Temperature spikes can also reduce the viability and size of the seeds when they reach the ripe stage. Apart from water and air, farmers also need to pay attention to soil pH and humidity. Many farmers do not yet have accurate indicators to determine soil quality, most farmers only use estimates, the application of the estimation method causes the quality of the soil in paddy fields to be infertile. To overcome this problem, a tool is made to predict the condition of agricultural land by taking data on temperature, humidity, air pressure, soil pH, soil moisture, and water flow rate. The data is then sent to a database to be displayed on a web server, so that farmers can monitor land conditions. It is expected that the parameter results obtained can be used as a preventive measure for farmers when conditions occur that can reduce rice productivity. That way, the condition of the land can be maintained so that crop failure can be minimized. This tool will be implemented in one of the rice fields of the residents of Kalipadang-Benjeng-Gresik Village. Based on data taken using an NPK sensor, wet soil has an average NPK content of 29.3 (Nitrogen); 41 (Phosphorus); 82 (Potassium). Moist soil has an NPK level of 28 (Nitrogen); 40 (Phosphorus); 82 (Potassium), and dry soil has an NPK level of 27.5 (Nitrogen); 39.7 (Phosphorus); 79.1 (Potassium). It can be said that soil moisture is directly proportional to NPK levels.
Performance Analysis of MIMO-OFDM System Using Predistortion Neural Network with Convolutional Coding Addition to Reduce SDR-Based HPA Nonlinearity Gulo, Melki Mario; Astawa, I Gede Puja; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 11 No 1 (2023)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v11i1.791

Abstract

In recent years, the development of communication technology has advanced at an accelerated rate. Communication technologies such as 4G, 5G, Wi-Fi 5 (802.11ac), and Wi-Fi 6 (802.11ax) are extensively used today due to their excellent system quality and extremely high data transfer rates. Some of these technologies incorporate MIMO-OFDM into their protocol. MIMO-OFDM is widely used in modern communication systems due to its benefits, which include high data rates, spectral efficiency, and fading resistance. Despite these benefits, MIMO-OFDM has disadvantages, with the use of a nonlinear HPA being one of them. Nonlinear HPA causes in-band and out-of-band distortions in MIMO-OFDM signals. Utilizing predistortion (PD) is one way of solving this issue. PD is a technique that uses the inverse distortion of the HPA to compensate for the nonlinear characteristics of the HPA. To enhance the quality of MIMO-OFDM systems that the use of HPA has degraded, the convolutional coding (CC) method can be combined with the help of PD. Convolutional coding is a type of channel coding that can be used for error detection and correction. This study will evaluate a combined technique of PD neural networks (PDNN) and CC on the MIMO-OFDM system using Software Defined Radio (SDR) devices. The evaluation of this system led to the use of a technique that combines PDNN and CC to improve SNR and minimise BER on MIMO-OFDM systems that HPA on SDR devices has degraded. In addition, at code rates 1/2, 2/3, and 3/4, using PDNN reduces the SNR value required to achieve BER equal to 0 by 12.037%, 37.8%, and 4.10% when compared to Digital Predistortion (DPD).
An Implementation of Artificial Neural Network based on IMU sensor for Train Detection Saputro, Anton Cahyo; Sudarsono, Amang; Yuliana, Mike
International Conference on Sciences Development and Technology The 2nd ICoSDTech 2022
Publisher : International Conference on Sciences Development and Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The purpose of train detection systems is to check the clearness-relation in track section of vehicles before a train passes through a route. A train detection system has an important role in ensuring the safety of train traffic. There are mainly 2 commercially used train detection systems. They consist of an axle counter and a track circuit. The problem with both systems is the high-cost installations and related equipment management. Several solutions have already been presented either on previous research with various methods, such as using Infrared and computer vision/image processing. Most of them want to make the system more effective and less cost maintenance than commercial use. To solve the issues, we propose a new method for train detection based on the usage of an Inertia Measurement Unit (IMU) with embedded artificial neural network module mounted on the sleeper's train in the following section. We utilize the method of train detection by involving an appropriate data acquisition method and a convolution operator as a time series processing algorithm. This idea equips the system to recognize the difference between train and gangway at the speed of 30 km/h. Several experiments conducted on actual rails demonstrate the method's dependability, suggesting its adoption in an automatic track warning system. So, in this proposed train detection system, we propose the train detection system using IMU with Artificial Neural Network Algorithm.
Evaluation of Joint Technique Iterative Clipping Filtering (ICF) and Neural Network Predistortion on SDR-based MIMO-OFDM System Gulo, Melki Mario; Astawa, I Gede Puja; Sudarsono, Amang; Moegiharto, Yoedy; Priambodo, Naufal Ammar; Gunawan, M. Wisnu
JOIV : International Journal on Informatics Visualization Vol 8, No 2 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.2.1981

Abstract

Multiple-input, multiple-output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) is a communications technology that powers numerous modern communication systems, including 5G and WiFi-6. This technology is utilized in current communication systems due to its high performance and extensive channel capacity. MIMO-OFDM does have disadvantages, such as large Peak-to-Average Power Ratio (PAPR) values. If the signal is processed by a nonlinear Power Amplifier (PA) device, a high PAPR value signal can result in both in-band and out-of-band signal distortion. To combat high PAPR values, PAPR reduction strategies such as Iterative Clipping Filtering (ICF) are utilized. From this study, using ICF with iteration 2 and Clipping Ratios (CR) 3 and 4 can improve the system's minimum Bit Error Rate (BER) by about 22.8% and 91.1%, respectively. Choosing the correct CR will improve the system, but using the lower CR will make it worse than a system without ICF. This occurs in systems using ICF with iterations two and CR 2 and at the same SNR conditions as systems without ICF; using ICF with iterations two and CR 2 results in higher BER values. The use of Predistortion Neural Network (PDNN) can overcome this problem. By using PDNN, there is an improvement in the system where the minimum BER value can reach 0.1 × 10-5. The percentage decrease in BER from using PDNN for ICF with iterations two and CR 2, 3, and 4 is 99.88%, 99.86%, and 98.807%, respectively. Thus, the joint techniques of ICF and PDNN can significantly enhance the performance of MIMO-OFDM systems with nonlinear PA. Importantly, the experiment was conducted on an SDR device, ensuring the real-world applicability of the results.
Implementasi skema pengacakan subcarrier OFDM dengan algoritma RSA pada NI-USRP Sa’adah, Nihayatus; Astawa, I Gede Puja; Sudarsono, Amang
JURNAL ELTEK Vol. 20 No. 2 (2022): Oktober 2022
Publisher : Politeknik Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/eltek.v20i2.354

Abstract

Keamanan jaringan nirkabel merupakan salah satu hal terpenting dalam sistem komunikasi. Karena sinyal dikirim dari pengirim melalui saluran nirkabel, tidak hanya penerima yang sah, tetapi juga penyadap dapat menangkap dan menyimpan sinyal informasi dengan mudah. Penelitian ini mengeksplorasi skema keamanan komunikasi nirkabel dimana skema yang digunakan adalah pengacakan subcarrier. Pemancar dan penerima harus disinkronkan untuk mengembalikan subcarrier ke posisi semula. Sistem ini menggunakan algoritma RSA sebagai sinkronisasi. Teknologi keamanan pengacakan subcarrier diimplementasikan pada sistem OFDM. Sistem OFDM diimplementasikan menggunakan perangkat USRP. Hasil yang diperoleh dari penelitian ini membuktikan bahwa teknik keamanan yang digunakan tidak menurunkan kinerja sistem, bahkan dapat mengurangi jumlah kesalahan bit akibat teknik sinkronisasi. Dengan teknik sinkronisasi algoritma RSA, dari jarak pengujian 1 meter, 2 meter, dan 5 meter. Pada jarak 1 meter didapatkan hasil terbaik dengan penurunan error bit dari 19,04% menjadi 0% pada 32-QAM dan penurunan error bit dari 28,57% menjadi 4,76% pada 64-QAM.   ABSTRACT Wireless network security is one of the essential things in communication systems. Since the signal is sent from the sender through a wireless channel, the legitimate receiver and eavesdropper can easily capture and store signal information. This study explores a wireless communication security scheme where the scheme used is subcarrier randomization. The transmitter and receiver must be synchronized to return the subcarrier to its original position. This system uses the RSA algorithm as synchronization. Subcarrier randomization security is implemented in OFDM system. OFDM system is implemented using USRP. The results from this study prove that security techniques don't reduce system performance, and can even reduce the number of errors due to synchronization techniques with RSA synchronization technique, with 1 meter, 2 meters, and 5 meters experiments. At 1meter distance is the best result with bit error drop from 19.04% to 0% on 32-QAM and a bit error drop from 28.57% to 4.76% on 64-QAM.
Steganography Based on Data Mapping and LSB Substitution With RSS Key Generation SUMADI, MUHAMMAD TAUFIQ; SUDARSONO, AMANG; YULIANA, MIKE
ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika Vol 10, No 1: Published January 2022
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/elkomika.v10i1.1

Abstract

ABSTRAKUntuk menghindari pihak ketiga yang tidak berwenang, berbagai solusi keamanan telah dibuat untuk mengamankan kerahasiaan pesan atau informasi, salah satunya adalah steganografi. Penelitian ini mengusulkan teknik pembangkitan kunci dalam proses steganografi. Secara umum steganografi menggunakan konsep kunci simetris, dimana metode ini membutuhkan pihak ketiga dalam proses pendistribusian kunci rahasia. Solusi dari permasalahan tersebut penulis mengusulkan metode baru dengan menggabungkan pembangkitan kunci rahasia menggunakan RSS pada jaringan nirkabel dengan steganografi untuk menyembunyikan pesan. Sistem yang kami usulkan diterapkan pada kondisi statis dan kondisi dinamis untuk menguji kinerja. Pada proses pembangkitan kunci didapatkan waktu rata-rata 110,52 detik untuk membangkitkan kunci. Pada proses embedding, waktu komputasi rata-rata untuk 65.536 karakter adalah 6,38 detik untuk menghasilkan citra stego. Pada proses ekstraksi didapatkan waktu komputasi rata-rata 0,63 detik untuk mendapatkan pesan rahasia.Kata kunci: RSS, Key Generation, Symmetric Cryptography, Steganography. ABSTRACTTo avoid unauthorised third parties, variety of security solutions have been created to secure the confidentiality of messages or information, one of which is steganography. This study proposes key generation technique in the steganography process. In general, steganography uses a symmetric key concept, where this method requires a third party in the secret key distribution process. The solution to this problem the authors propose a new method by combining secret key generation using RSS on a wireless network with steganography for hiding messages. To test performance, our proposed system is used in both static and dynamic condition. In the key generation process, an average time of 110.52 seconds was obtained to generate keys. In the embedding process, the average computation time for 65,536 characters is 6.38 seconds to produce a stego image. In the extraction process, an average computation time of 0.63 seconds is obtained to get a secret message.Keywords: RSS, Key Generation, Symmetric Cryptography, Steganography.
Implementation of Secret Key Generation on Mobile Crowdsensing Application to Secure Tracking Location of Motorcyclists Dewi, Ni Made Lintang Asvini; Sudarsono, Amang; Yuliana, Mike
The Indonesian Journal of Computer Science Vol. 12 No. 4 (2023): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v12i4.3259

Abstract

Mobile crowdsensing is a method for collecting many data from sensors on smartphone. In this research, mobile crowdsensing application will be developed to display location of motorcyclits who connected in an Ad-Hoc network along with a security system using the Secret Key Generation (SKG) scheme to generate a secret key that will be used to encrypt and decrypt the data. From the results it can be concluded that the highest measurement correlation is 0.0398 and the lowest is 0.0018 but after randomness extraction proccess, the highest correlation is 0.996 and the lowest is 0.978. After encryption, information of Alice and Bob is stored as random character in database and decrypted as plaintext as shown as in application. In the attacking result, the data after encrypted just shown random character in traffic monitor. When the eavesdroppers manipulate its IP address like Alice's, they can’t connect to Bob.
Co-Authors Abd. Rasyid Syamsuri Adam Surya Putra Adam Surya Putra Afifah Dwi Ramadhani agostinho marques ximenes Ahmad Zainudin Ali Ridho Barakbah Anang Budikarso Anang Budikarso, Anang Anang Siswanto Anang Siswanto, Anang Anindya Dwi Putri Islamidina Ari Wijayanti Ari Wijayanti Aries Pratiarso Aries Pratiarso Aries Pratiarso, Aries Astin, Novita Astin, Novita Bambang Sumantri Bayu Dwiyan Satria Bih Hwang Lee Bima Sena Bayu Dewantara Dadet Pramadihanto Darmawan, Zakha Maisat Eka Darmawan, Zakha Maisat Eka Dewi, Florista Dewi, Inka Trisna Dewi, Ni Made Lintang Asvini Dian Neipa Purnamasari Donny Farhan Eko Prayitno Farel Juliansyah Farhan, Donny Febby Ronaldo Fitri, Novi Aryani Florista Dewi Gulo, Melki Mario Gunawan, M. Wisnu Hadi, Mochammad Zen Samsono Haniah Mahmudah Hari Wahyuningrat S. Hary Oktavianto Haryadi Amran Hasan Basri Hasan Basri Hendy Briantoro Heru Iswanto, Heru Hidayah, Nuril Hudhajanto, Rizky Pratama Hudhajanto, Rizky Pratama I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Aswara Ida Anisah Idris Winarno Indah Yulia Prafitaning Tiyas, Indah Yulia Prafitaning Ismed Jauhar, Ismed Juliansyah, Farel Kevin Prima Pambudi, Kevin Prima Lordan Kimbal, Heaven Louis Nashih Uluwan Arif M Udin Harun Al Rasyid, M Udin Harun M. Cahyo Kriswantoro Mahardhika, Yesta Medya Mahmudah, Haniah Mala Nurilmala Mike Yuliana Mochammad Zen Samsono Hadi Mohamad Ridwan Muhammad Taufiq Sumadi Nanang Syahroni Ni Made Lintang Asvini Dewi Nihayatus Sa'adah Ningsih, Norma Nisa, Choirun Choirun Nisa Nur Nur Adi Siswandari Nurul Fahmi Nurul Fahmi Priambodo, Naufal Ammar Prima Kristalina Putra, Adam Surya Qoirul Setiawan, Qoirul R Rizki Rachmadi Rafina Destiarti Ainul Rahardita Widyatra Ramadhani, Afifah Dwi Reni Soelistijorini Renovita Edelani Rini Satiti Rokhmat Albasyih Sa'adah, Nihayatus Samsul Huda Samsul Huda Santoso, Tribudi Saputro, Anton Cahyo Satiti, Rini Sa’adah, Nihayatus Soelistijorini, Reni Sritrusta Sukaridhoto Subhan, Muh Syahroni, Nanang Taufiqurrahman, Muh. Alfan Taufiqurrahman, Muh. Alfan Titon Dutono Tri Budi Santoso Tri Budi Santoso Tri Harsono Tri Susanti TRI SUSANTI Tribudi Santoso Vivien Arief Wardhany Wahjoe Tjatur Sesulihatien Wahyuningrat S., Hari Winarmo, Idris Ximenes, Agostinho Marques Yoedy Moegiharto, Yoedy Yoga Yuniadi Yudha, R. Gaguk Pratama Yudha, R. Gaguk Pratama Yuliana, Mike