Claim Missing Document
Check
Articles

Implementasi Sistem Tracking Posisi Ambulans pada Smart Dispatcher Menggunakan Metode Komunikasi Publish/Subscribe Farah Nabilla Putri Irzan; Dany Primanita Kartikasari; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 1 (2020): Januari 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (384.317 KB)

Abstract

Ambulance is a vehicle equipped with medical equipment to transport sick person or accident victims. Ambulance tracking is needed to determine the location of the ambulance. Therefore ambulance tracking system is built to track the location of the ambulance. In this system an android application is used to send ambulance data, a web server to receive ambulance data and an android application for patients. Ambulance entity sends data to the data receiver center to store the location of the ambulances and find nearest ambulance to the patient. Data transmission between data sender and the data receiver used publish/subscribe communication method. The results of accuracy testing of distance determination with haversine formula is 99.88810212129279 and the average error is 0.1118978787072161%. The response time for sending data from the publisher to the subscriber has an average time of 880.2 milliseconds. Response time sending requests from the patient's android application to the web server with 1000 ambulance data in the database has an average response time of 70.06666667 milliseconds, 2000 ambulance data has an average response time of 109.6206897 milliseconds, 3000 ambulance data has an average the average response time was 143.7 milliseconds, 4000 ambulance data had an average response time of 187.9666667 milliseconds, and 5000 ambulance data had an average response time of 238.2 milliseconds.
Implementasi Akuisisi Data Biosignal Manusia dengan Mekanisme Store-Forward Pada Perangkat Smartwatch Berbasis Wear Os Menggunakan Protokol Komunikasi Bluetooth Low Energy Apriyanto J.P.L Tobing; Adhitya Bhawiyuga; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 2 (2020): Februari 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (356.403 KB)

Abstract

The most important thing from IoT Smart Healthcare in measuring a patient's health condition is the ability to acquire the patient's biosignal data. Wearable smartwatch devices can be used to acquire biosignal data in the form of heartbeats and data in the form of the number of footsteps to acceleration. However, data acquisition cannot be done for a long time due to the computational and resource limitations of the device. A strategy is needed in acquiring data so that data acquisition is still be done optimally. The proposed strategy for resolving these problems consists of applying the indirect model and the store-forward method. In the indirect model, a gateway is developed on a smartphone device and uses the BLE and MQTT communication protocols. The store-forward method is applied to smartwatch devices so that data acquisition continues even though it cannot connect directly to the gateway device. This research successfully implemented the proposed system. The test results provide a ratio of the success of sending data from sensor nodes to the cloud of 0.998. This success value is influenced by the MQTT protocol, because the success value of sending data using the BLE communication model of 1 for each test scenario. Projected increase in memory every 15 minutes when acquiring data using the store-forward method of 100 KB and data entry of 2,340. There are differences in the delay in each communication protocol. In communication with BLE, the delay during the sending process varies but is stable with an average of 1.13 seconds.
Implementasi Pemilihan Master Berdasarkan Kapasitas Energi Menggunakan Metode Bully Leader Election pada JSN Berbasis LoRa Ardi Rahmad Hermanto; Mochammad Hannats Hanafi Ichsan; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 2 (2020): Februari 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (467.876 KB)

Abstract

Wireless Sensor Networks are a series of nodes. That's nodes will make a network. On this network, there is a Master node that works to collect data from all nodes in the network. If the Master node dies then the distribution process will stop. To overcome this we need an algorithm that can overcome these problems. Bully Leader Election applies an algorithm to select leaders with the highest authority among other nodes. The selection is made by checking the energy capacity of each Slave node and then the Slave node with the largest energy capacity is selected as the Master node. The system is implemented on nodes with the LoRa communication protocol. Each selection process will have the same time slot so sending messages do not clash with each other. The choice of the Master node will be influenced by the energy capacity of each node. The more energy that is owned, the life of a node will be longer. By utilizing the energy capacity in the selection of new masters, it is hoped that the possibility of dead Master nodes will be smaller.
Implementasi MQTT Broker dengan Kemampuan Auto Scaling pada Internet of Things Kevin Jonathan Harnanta; Adhitya Bhawiyuga; Achmad Basuki
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 6 (2020): Juni 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Internet of Things is a topic of discussion that is growing rapidly now. One protocol commonly used in communication between IoT devices is MQTT. In communication, these devices are interconnected with brokers MQTT. But along with the growth of IoT devices that make connection requests to MQTT brokers, MQTT brokers have decreased resources, and become a single point of failure. Therefore we need MQTT brokers who are able to have auto scaling capabilities so they can adapt to the growing demand for connections from IoT devices. In its implementation, MQTT broker is placed in a container and orchestrated with kubernetes so that it has the ability to auto scaling. In testing, a comparison is made between MQTT brokers with auto scaling capability and without auto scaling capability. Testing is done by measuring the maximum number of clients that can be connected, and the number of connections lost at the time the test is running. As a result, MQTT brokers with auto scaling capabilities can receive connection requests from clients 27% better than MQTT brokers without auto scaling capabilities. Whereas in measuring the number of disconnected connections, MQTT broker with auto scaling capability is able to provide 54.42% fewer disconnected connections than MQTT broker without auto scaling capability.
Pengembangan Platform Pengolahan Data Sensor Internet of Things Berjenis Streaming dengan Komputasi Terdistribusi Menggunakan Spark Streaming Fidia Rosianti; Adhitya Bhawiyuga; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 7 (2020): Juli 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Stream processing is becoming essential of IoT stack to increase the values and benefits for the organization. Along with the growth in streaming data, centralized architecture will cause large delays for providing service. To solve this problem, additional resources or machines in the cluster are needed to maintain processing performance. This research proposes to develop a distributed IoT data stream processing platform using Spark Streaming. Throughput and latency show high results, 321.4 records/s and 13.3 seconds, if the amount of data processed is less than the available resources.While the system capability scenario of up to 12 seconds of batch interval shows the highest throughput and latency, 2112.4 records/s and 5.93 seconds. Furthermore, the fault tolerance scenario shows that 6 nodes can process faster with 60 seconds. Spark Streaming also shows the ability to use distributed resources efficiently by showing CPU and memory usage across all nodes having no significant differences. The average difference in memory and CPU usage at each node is 3.6% and 2.04%.
Implementasi Sistem Penentuan Lokasi Dalam Gedung (Indoor Localization) Menggunakan Metode Fingerprinting Berjenis Monitor Based Localization (MBL) Dengan Teknologi Bluetooth Low Energy (BLE) Muhammad Hasbi Ash Shiddieqy; Adhitya Bhawiyuga; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 8 (2020): Agustus 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Besides being famous for its accuracy in determining outdoor location, GPS technology also has weaknesses in determining indoor location due to signal attenuation. Therefore, to determine the indoor location, one of the methods that can be used is the fingerprinting method. The fingerprinting method is a method for determining location by classifying the obtained signal patterns into location names based on the signal characteristics at a location. . One technology that can be utilized to produce signals in the fingerprinting method is Bluetooth Low Energy (BLE) technology. BLE technology is used because it has several advantages such as fast advertisement packet duration, small device size, can use long-lasting batteries, etc. In this research, the fingerprinting method and BLE technology use the concept of Monitor Based Localization (MBL). The MBL concept is a concept where the device to be located only emits a passive signal, while other devices will determine the location. Percentage of the system error in determining location reaches 15.24% which means it has accuracy in determining location of 84.76%. The errors in determining location can be caused by the similarity of signal patterns at certain points at 2 different locations.
Implementasi Container Live Migration Antar-Cloud Provider Menggunakan Podman dan CRIU Muhammad Abdul Aziz; Adhitya Bhawiyuga; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 9 (2020): September 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cloud computing is an important technology and is quite widely used today. Some companies that provide cloud computing services now are Google, Microsoft, IBM and Amazon. One of the popular cloud computing services is virtualization. Virtualization allows a single machine to perform multiple roles of a running service. In the application of virtualization in cloud computing, live migration is a very important process. Live migration of a virtual machine requires the entire state of the source virtual machine to be moved to the destination virtual machine. On the other hand, there is a live migration technique called container live migration which only requires the state of the service to be moved. This research applies container live migration techniques to move services from one virtual machine to another, without having to move the entire state from the source virtual machine to the destination virtual machine, using Podman and CRIU. With Podman, a service can run as an isolated process, independent of its surroundings. With CRIU, services can be stopped and transferred from one machine to another. The results of functional testing show that the proposed live migration method is capable of moving services between different cloud providers. The results of testing the implementation of container live migration between cloud providers using Podman and CRIU show an average downtime of 34.618 seconds, and an average migration time of 71.627 seconds.
Implementasi Autentikasi Berbasis Token Menggunakan Platform-Agnostic Security Tokens (PASETO) Sebagai Mekanisme Autentikansi RESTful API Nico F. Sitorus; Ari Kusyanti; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 11 (2020): November 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

RESTful API is a client-server communication architecture standard for web services, but low in terms of security. RESTful API data security uses authentication to limit access to the API by not saving the session state, so that token-based authentication is required which is sent via a request header such as JSON Web Token (JWT). JWT tokens can be forged by exploiting None algorithm, utilizing JWT mechanism which always believes in token's header that contains token's algorithm used, and using HMAC algorithm which was already to be exploited. Token forgery can be overcome by not using None algorithm and changing JWT's mechanism. JWT's mechanism can be replaced with a standard that only provides the version and purpose of the cryptographic protocol used and always compares the version and purpose of the cryptographic protocol used with the token's header had sent. HMAC algorithm can be replaced with BLAKE2b algorithm. Its power equivalent to SHA-3, but faster than SHA-1 and MD5. PASETO also uses XChaCha20-Poly1305 algorithm for encryption and Ed25519 algorithm for signatures. PASETO can be implemented using python, using a wrapper for Libsodium library so that it can be used in python, and childprocess with nodeJS.
Implementasi Continuous Authentication dengan Token pada Wireless Sensor Network (WSN) berbasis LoRaWAN Regita Yustania Esyaganitha; Adhitya Bhawiyuga; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 1 (2021): Januari 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Wireless sensor network is a part of Internet of Things (IoT) used to sensing an environment, collecting the sensed data, and sending the information to a nearer gateway on the same wireless sensor network environment. Communication between sensor node and gateway needs to be connected to a wireless communication module to finally called a wireless sensor network, one of many technologies that support a wireless connection for wireless sensor network is LoRaWAN. Long-range and low-power feature that provided by LoRa making it the attractive candidate for smart sensing devices that usually used to sense temperature, air pressure, humidity, resonance, and many more according to needs. On a fast-paced moving environment, authentication between device to device is a mandatory issue that needs to be fixed to ease an authentication without enlarge the security gap. This research proposed an idea of lightweight authentication and enhanced security using a dynamic value as example is token that never have the same values for the whole communication session. With the advantage of using token with timeouts, continuous authentication supposed to reduce the possibility of invalid node or intruder node to join the existed communication. The result of this research is, continuous authentication can distinguish the valid node with the invalid one based on their id and the token value that used for authentication. Besides, the system performance with continuous authentication shows 100% success rate on an ideal time and average time needed for sensor node to generate an authentication token is 41,5 ms.
Implementasi Skema Anti-Collision Menggunakan Metode TDMA dan TPSN pada Sistem WSN Berbasis LoRa Fajar Hamid Embutara Ratuloli; Agung Setia Budi; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 1 (2021): Januari 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The usage of LoRa-based Wireless Sensor Network (WSN) overcomes a common problem of WSN, that its communication capabilities over a near range. LoRa is a radio spectrum modulation technology that accommodates long distances communication with low power consumption. But the current weakness of system, the delivery data is interfering with each other which causes data loss. Time Division Multiple Access (TDMA) method is used to avoid this problem. TDMA is a scheduling method that divides by timeslot, and it compatible with LoRa because it works on single frequency. In a TDMA implementation, all device times must be synchronized with each other so that sending scheduling can occur. Time Synchronization Protocol for Sensor Network (TPSN) method is used as a time synchronization method that supports the WSN system. The implementation of TPSN is divided into 2 phase, namely the Discovery Phase and the Synchronization Phase. Functionality testing is carried out so that the system can works as needed. The accuracy testing of time using the TPSN method obtained results of 79.7%. Performance testing of delivery scheduling using the TDMA method shows that the increase in delivery time is 28.37 milliseconds at sensor node 1 and an increase in delivery time is 37.11 milliseconds at sensor node 2.The success rate in delivery using the TPSN and TDMA methods is 96%.
Co-Authors Achmad Basuki Achmad Bazuki Achmad Brahmantyo Arundaya Subianto Agi Putra Kharisma Agung Setia Budi Ahmad Aji Santoso Ahmad Nasrul Illahi Alan Maulana Hamid Alfian Rizky Susanto Alldo Raafi'ilman Ammar Waliyuddin Jannah Andhika Dwitama Putra Andri Warda Pratama Putra Annisa Puspa Kirana Annisa Widuri Murti Utami Apriyanto J.P.L Tobing Apriyanto Tobing Ardhian Rizki Ramadhani Ardi Rahmad Hermanto ari kusyanti Aria Tanzila Harfad Arya Wardhana Budi Utomo Aswin Suharsono Bagos Wahyu Suprayugi Baiq Findiarin Billyan Dany P Kartikasari Dany prima Kartikasari Dany Primanita Kartikasari Dany Primanita Kartikasari Dany Primanita Kartikasari Dedy Andrean Ardiansyah Delarta Tok Adin Dhiza Wahyu Firmansyah Donny Kurniawan Dwiyan Ramadhan Dharmanzah Dyah Ayu Ocky Mawardani Dyah Ayu Prabandari Ekky Pramudito Setiawan Fabiansyah Raam Pontoh Fadhlan Muhammad Fahmi Syahrulah Fajar Hamid Embutara Ratuloli Fanny Aulia Rifki Farah Nabilla Putri Irzan Fariz Andri Bakhtiar Fariz Andri Bakhtiar Fathan Muhammad Fatkhurrozi Fatkhurrozi Fauzan Pahlawan Ferra Adelinna Wibowo Putri Fidia Rosianti Firman Budi Safrizal Friska Anggia Nurlita Sari Haidar Arijuddin Harun Ulum Fajar Hendra Danu Laksana I Gede Wahyu Sanjaya Iskar Maulana Jodi Chris Jordan Sihombing Jogi Oliver Yohanes Tampubolon Kasyful Amron Kasyful Amron Kevin Jonathan Harnanta Khabban Sayyidi Razin Surya Kusnul Aeni Labib Imam Hidayat Lius Alviando Mahendra Data Mercury Fluorida Fibrianda Moch. Wildan Habibi Mochammad Hannats Hanafi Ichsan Moh Wildan Habibi Moh. Afif Ma'ruf Mohammad Harits Mohammad Zulfikar Muhammad Abdul Aziz Muhammad Aji Guna Darmawan Muhammad Chalif Nurfaizi Muhammad Fahmi Ali Fikri Muhammad Fauzi Muhammad Gigih Wicaksono Muhammad Hasbi Ash Shiddieqy Muhammad Irfan Syafi'i Muhammad Misbahul Munir Muhammad Rafi Fauzan Fathin Nico F. Sitorus Nimas Raya Ahsy Nur Fauzi Nuretha Hevy Purwaningtyas Ocki Bagus Pratama Ocki Bagus Pratama Pramukantoro, Eko Sakti Primantara Hari Trisnawan Rakhmadhany Primananda Refri Rifwan Daharmi Regita Yustania Esyaganitha Rembulan Suci Fii Jannatin Reza Andria Siregar Richad Gilang Wisduanto Riski Ananda Rizal Bayu Aji Pradana Rizky Haryandi Rahman Rizky Putra Pratama Sabit Ihsan Maulana Sabriansyah Rizqika Akbar Santoso, Bagus Jati Sapta Oryza Putra Sara Yosephina Satria Adhi Kharisma Satria Adi Kharisma Sofyan Ainurrachman Sukma Alamsyah Budianto Tsany Afif Wian Virgi Widasari, Edita Rosana Widhi Yahya Yosef Hesekiel Partogi