Claim Missing Document
Check
Articles

Soil moisture prototype soil moisture sensor YL-69 for Gaharu (Aquilaria malaccensis) tree planting media Kartadie, Rikie; Nugroho, Muhammad Agung; Prayitna, Adiyuda; Kusjani, Adi; Mardika, Ardeana Galih
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 3: December 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i3.pp1163-1171

Abstract

Soil moisture, defined as the amount of water present in the spaces between soil particles, plays a critical role in plant growth. Excessive soil moisture can lead to issues such as root rot, deviating from the ideal conditions required for root absorption. To address this, we developed a prototype tool using the YL-69 soil moisture sensor to monitor and control the soil moisture levels in Agarwood/Gaharu tree planting media. The prototype was designed to activate a water pump when soil moisture exceeded 80%, ensuring optimal humidity for plant growth. Once the moisture level dropped below 80%, the pump was deactivated to prevent overwatering. The YL-69 sensor demonstrated an accuracy of 88.76% under controlled conditions. This study highlights the potential of using low-cost sensors for automated soil moisture management in small-scale Gaharu cultivation.
Enhancing SDN Controller Resilience to DDoS Attacks with IAT-Based Detection on CICIoT2023 Nugroho, Muhammad Agung; Kartadie, Rikie
JURNAL INFOTEL Vol 17 No 3 (2025): August
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v17i3.1414

Abstract

This study addresses the vulnerability of Software-Defined Networking (SDN) controllers to Distributed Denial of Service (DDoS) attacks, a critical issue for secure smart city and e-government applications. Using the CICIoT2023 dataset. Methods: We employed Random Forest with Recursive Feature Elimination and Cross-Validation (RFECV) to identify critical features for DDoS detection, validated through simulations in a Mininet/ONOS environment. Results reveal Inter-Arrival Time (IAT) as the most significant feature (importance score: 0.3200), with Controller Resources being the most vulnerable component (vulnerability score: 0.9048). DDoS-ICMP_Flood was the most effective attack (vulnerability score: 1.00), while Controller Distribution achieved a mitigation effectiveness of 0.9048. This research introduces a novel temporal feature-based detection approach, outperforming volume-based methods, and proposes adaptive mitigation strategies for SDN resilience. These findings enhance secure SDN deployment in dynamic IoT-driven environments.
Optimizing LSTM-CNN for Lightweight and Accurate DDoS Detection in SDN Environments Kartadie, Rikie; Kusjani, Adi; Kusnanto, Yudhi; Harnaningrum, Lucia Nugraheni
Scientific Journal of Informatics Vol. 12 No. 2: May 2025
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v12i2.24531

Abstract

Purpose: This study optimizes the LSTM-CNN model to detect Distributed Denial of Service (DDoS) attacks in Software-Defined Networking (SDN)-based networks and improves accuracy, computational efficiency, and class imbalance handling. Methods: We developed an Improved LSTM-CNN by removing the Conv1D layer, reducing LSTM units to 64, and using 21 features with a 5-timestep approach. The InSDN dataset (50,000 samples) was preprocessed with one-hot encoding, MinMaxScaler normalization, and sequence formation. Class imbalance was managed using class weights (0:2.0, 1:0.5) instead of SMOTE, with performance compared against Baseline LSTM-CNN and Dense-only models optimized with the Sine Cosine Algorithm (SCA). Result: The Improved LSTM-CNN achieved 0.99 accuracy, 0.93 F1-score for Benign traffic, and 1.00 for Malicious traffic, with ~25,000 parameters and 125 ms inference time on Google Colab. It outperformed Baseline LSTM-CNN (0.08 accuracy) and was more efficient than Dense-only (46,000 parameters), with a false positive rate of ~1%. Novelty: This research presents a lightweight, efficient DDoS detection solution for SDN, leveraging temporal modeling and class weights, suitable for resource-constrained controllers like OpenDaylight or ONOS. However, its generalization is limited by dataset diversity, necessitating broader validation.
Pembuatan Dan Edukasi Pengelolaan Website Untuk Branding Usaha Jasa Travel Kartadie, Rikie; Kurniawan, Edi; Auliadi, Anissa Sahda
ABDIMASKU : JURNAL PENGABDIAN MASYARAKAT Vol 6, No 3 (2023): September 2023
Publisher : LPPM UNIVERSITAS DIAN NUSWANTORO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/ja.v6i3.1439

Abstract

Dunia bisnis saat ini mengarah pada penggunaan teknologi informasi untuk mendukung e bisnis, terutama bisnis-to-consumer. Oleh karena itu, diharapkan bahwa pelaku usaha dapat mengikuti perkembangan yang terjadi dalam dunia bisnis tersebut. Bisnis pariwisata (jasa travel) metrans kekurangan sumber daya manusia untuk mengelola informasi teknologi e bisnis. Penulis menawarkan solusi untuk masalah tersebut dalam kegiatan pengabdian ini, yaitu pembuatan dan pelatihan pengelolaan situs online Jasa Travel. Analisa kebutuhan, desain konten, desain template, pembelian domain dan hosting, instalasi dan pengaturan website, dan pelatihan pengelolaan website adalah semua bagian dari proses kegiatan ini. Salah satu hasil dari kegiatan pengabdian ini adalah situs online untuk jasa travel, yang dapat digunakan untuk mempromosikan bisnis dan berkomunikasi dengan calon pelanggan.
DATA PIPELINE ARCHITECTURE FOR ACADEMIC INFORMATION SYSTEM AT AKADEMI TEKNIK BIAK Israel Mnsen, Heman Koreri; Purnomosidi, Bambang; Kartadie, Rikie; Kurnaedi, Didi
Journal of Intelligent Software Systems Vol 3, No 1 (2024): July 2024
Publisher : LPPM UTDI (d.h STMIK AKAKOM) Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26798/jiss.v3i1.1335

Abstract

In development a information system Intergrated, Architecture planning is the first step must be established. The planning of development in a information system is needed in order to a system can be running according to necessity. The data is used for this research, that is internal data of Biak Technical Academy College and external data of Institution of high education service at IV area in Biak Papua. The main goal of this research is design architecture pipelines data of ATB college. The architecture of pipelines is used for carrying resources of big data from one area to the other area in far distance to be efficiency. The method is used for this research, that is Estract Transform Load (ETL). The process of estract data is needed a special supporting library on apache spark in using library spark session. This spark session is established in order to call data of Biak Technical Academy college with csv extension can be run on apache spark. After the process of estract is established, apache spark will read data with csv extension and establish transform data. The process of transform data csv extension will be loaded in to a frame data as a output of processing ETL The result of research is apache spark technology can be easy for writers in design process information system of Biak Technical Academy and to be one of the best solution in processing Estract Load Transform (ETL) data with the big scale and real-time
Sosialisasi Waspada Pencurian Data dan Aplikasi Berbahaya Bagi Anak pada DP3APPKB Surabaya Nasyuha, Asyahri Hadi; Kartadie, Rikie; Leswanto, Tomi
Dedikasi Sains dan Teknologi (DST) Vol. 4 No. 1 (2024): Artikel Periode Mei 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/dst.v4i1.3953

Abstract

Pencurian data dan aplikasi berbahaya bagi anak yang ada pada perangkat smartphone bisa menjadi masalah yang sangat buruk bagi seluruh Masyarakat. Hal itu masih dapat dicegah dengan memberikan informasi terkait semua kegiatan dan komponen dalam melakukan pencurian data dan jenis-jenis aplikasi yang berbahaya bagi anak. Kegiatan lain yang bisa dilakukan dalam mencegah dan mengatasi masalah tersebut dengan memberikan sosialisasi yang mengkaji materi dari masalah pencurian data dan aplikasi berbahaya bagi anak. Kegiatan sosialisasi ini dilakukan di Kota Surabaya yang diadakan oleh Dinas Pengendalian Penduduk, Pemberdayaan Perempuan dan Perlindungan Anak (DP3APPKB) Surabaya via zoom meeting dengan penyampaian materi yang bertema “Waspada Pencurian Data dan Aplikasi Berbahaya Bagi Anak." Kegiatan ini diikuti lebih dari lebih dari 700 pengguna Zoom Meeting dari seluruh wilayah yang ada di Kota Surabaya. Tujuan sosialisasi ini adalah untuk meningkatkan kesadaran dan pengetahuan Masyarakat Surabaya, khususnya para orang tua, mengenai bahaya pencurian data dan aplikasi berbahaya yang dapat mempengaruhi anak-anak. Masyarakat mendapatkan pembekalan terkait informasi cara mengidentifikasi tahapan pencurian data dan jenis aplikasi berbahaya, teknik untuk melindungi data pribadi dan memberikan wawasan kepada orang tua untuk mengawasi anak-anak terhadap penggunaan smartphone, serta mencegah akses konten yang tidak sesuai bagi anak.