Claim Missing Document
Check
Articles

Implementasi Pemrosesan Paralel untuk Ekstraksi Fitur QRS pada data Electrocardiography (ECG) menggunakan Algoritma Pan-Tompkins dengan Framework Renderscript Sabit Ihsan Maulana; Agung Setia Budi; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 3 (2021): Maret 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Telemedicine technology is increasingly needed for remote patient health care. Especially for patients with a high risk/severe disease such as heart disease. Due to its important role and benefits, a lot of research has been carried out to improve this technology so that it's relevant with current state-of-the-art technologies. One of the latest technologies that have been adapted on telemedicine research is cloud computing. With this combination, CPU intensive task can be transferred to the cloud. However, a new problems arose. The resulting system now will always depend on the internet, while not all areas are covered or have a good internet connection. Therefore, this researcher proposes a QRS detection system with parallel processing on the edge device using the Pan-Tompkins algorithm and Renderscript framework. This system is an Android-based application that receives ECG data and then performs the QRS detection process by utilizing Renderscript to perform parallel processing. Execution time on the detection process will be measured to determine the difference in performance with serial processing. The results of the detection process will be compared to determine the level of accuracy of the system. A profiler application will also be used to find out the CPU Utilization level. In testing, the system obtained 3 times smaller execution time with an average processing speed of 301,340 row/second. The system also obtained a sensitivity value of 99.64% and a positive predictivity value of 99.47%. The average CPU utilization on the system is at 82%, 32% higher than serial counterpart.
Implementasi Mekanisme Mini Batch Pada Transmisi Data Elektrokardiografi (EKG) dari Internet of Things (IoT) Gateway Berbasis Perangkat Mobile Android ke Broker MQTT Dwiyan Ramadhan Dharmanzah; Adhitya Bhawiyuga; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 2 (2021): Februari 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Acquisition Electrocardiography (ECG) data using Internet of Things (IoT) technology frequently generate a lot of data that need to considered the quality of ECG data. ECG data has a chance to detect a disease like heart disease. Accordingly, ECG data need high rate of quality for not losing any data when send to any networks. Implementation BLE (Bluetooth Low Energy) is using to support acquisition ECG data from heart sensor to smartphone. ECG data that required are convert to mini-batch in pre-processing method. Formatting mini-batch is done by grouping ECG data from 130 data per second up to 650 data per five seconds and convert to JSON array. Mini-batch data are transmitting to MQTT broker using MQTT QoS level 2 protocol. The testing is done by measuring latency and success ratio from each transmitted data using mini-batch and not using mini-batch. The results of measuring latency using mini batch are maximum latency is 1518 ms, minimum latency is 423 ms and average latency start from 531 ms up to 663 ms. In other measuring test without mini batch are maximum latency is 3389 ms, minimum latency is 1330 ms, and average latency is 1938 ms. In other measuring latency, success ratio also measured and acquired rate of success ratio using mini batch and without mini batch are 100% and 4,261%.
Implementasi Metode Kompresi Gambar dari Node Sensor ke Node Server untuk Meningkatkan Efisiensi Waktu Pengiriman pada Jaringan 6LoWPAN Mohammad Harits; Adhitya Bhawiyuga; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 2 (2021): Februari 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Wireless Sensor Network has been able to be applied in agriculture to monitor the condition of agricultural land, namely regarding the humidity, pH, and temperature of the soil. However, this monitoring process cannot take pictures on the location because Wireless Sensor Network has the disadvantage of not being able to send large datas. To solve this problem, you can use a large capacity communication module so that more data is sent and also use the compression method for data to reduce the size of data before being sent. The communication module used in this study is 6LoWPAN. 6LoWPAN was chosen because it has advantages in terms of transmission capacity, range and has a low power consumption. There are 2 compression methods used, namely the DCT algorithm which is used to reduce interpixel redundancy and RLE to condense the results of the DCT algorithm so it can be smaller. The results obtained after testing are that the application of the compression method can save image size by around 24% from the size of the original image and reduce the total package sent by about 77% of the original packet. Delivery performance using the compression method has the advantage of sending time but decreases the success rate and increases average delay when sending image data.
Implementasi Metode Ephemeral Diffie Hellman Over Cose (EDHOC) pada Wireless Sensor Network (WSN) sebagai Mekanisme Autentikasi berbasis Modul Komunikasi LoRa I Gede Wahyu Sanjaya; Adhitya Bhawiyuga; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 4 (2021): April 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In general WSN can be build with one node and one gateway. Comunication between node sensor and gateway using other device that support wireless network as bridge such as LoRa. WSN with LoRa does not have authentication system. If considering in few years, system without continous authentication also has a big risk so that is became a requirement to have countinous authentiction. With countinouse authentication node and gateway can still recognize their valid pair. Give more protection while comunicating. Use Ephemeral Diffie Hellman Over COSE (EDHOC) method as alternatif solution for fixing problem with key management approach. For reducing other party or illegal attacker probability of sniffing and eavesdropping while communicating. The result of this research found out system generate new key based on time configuration that already set for updating key authentication. Other than that performance system after applying countinous authentication has a significant effect such as does not impact delivery time and giving extra protection while communicating.
Implementasi Mekanisme Carry and Forward Antar Broker MQTT pada Lingkungan dengan Konektivitas Tidak Stabil (Intermittent Connection) Dyah Ayu Ocky Mawardani; Adhitya Bhawiyuga; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 4 (2021): April 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Connecting internal system of IoT through internet can be done using MQTT protocol. MQTT was designed for application that required data collection accross constrained networks. However, its architecture doesn't support to handle mobility if the disconnected period takes longer time. It also has not been able to handle the problem of data delivery in intermittent connectivity environment. As a solution to handle such problem, this research focused on implementation carry and forward mechanism between MQTT brokers. The tests that were carried out include functionality, success rate, and delay between nodes. In functionality test, the functional requirements that have been designed, can be met by server and client. In success rate test, the results show the success rate of data delivery is 100%. The average delay between nodes from publisher 1 to local broker 32.63 seconds, local broker to broker agent 33.01 seconds and broker agent to subscribers 1, 2, and 3 respectively, 603181.91 seconds, 603201.15 seconds, and 603193.48 seconds. Then, from publisher 2 to local broker 78.31 seconds, local broker to broker agent 30.90 seconds and broker agent to subscriber 1, 2, and 3 respectively, 2118.80 seconds, 2110.62 seconds, and 2112.32 seconds. Last, from publisher 3 to local broker 78.55 seconds, local broker to agent broker 30.90 seconds and agent broker to subscribers 1, 2 and 3, respectively, 605302.96 seconds, 605313.72 seconds, and 605322.29 seconds.
Implementasi Pemecahan Transmisi Data Citra pada Protokol Lora Ahmad Nasrul Illahi; Adhitya Bhawiyuga; Kasyful Amron
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 1 (2022): Januari 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Lora is one of the Low Power Wide Area (LPWA) networks that allows a device that has a small amount of energy to be distributed over a large area so as to create a network that is interconnected with each other. One of the challenges in LoRa is the packet payload capacity that is sent through this protocol. The LoRa protocol has a packet payload capacity of between 51 byte and 222 byte, so it has limitations in sending data with large file sizes such as image data. From this explanation, this research focuses on implementing a data splitting mechanism to overcome these deficiencies. In this study, the image data splitting process will be carried out in the end node, then the image data fragments will be merged back inside the gateway and the image will be displayed through the server. The test results obtained from the largest latency which is at a distance of 100 meters by 10 seconds, while the lowest latency is at a distance of 10 meters by 1 second. In addition to the latency measurement, there is a success ratio measurement for sending data fragments that produces a maksimal value of 100% and the lowest value of 20% at a distance of 100 meters. In addition, there is an RSSI measurement that is measured and produces the lowest value of -88 dbm and the highest -112 dbm.
Implementasi Algoritma Chaskey-12 Cipher untuk Mengamankan Data Sensor pada Komunikasi antara Node Sensor, Gateway dan Cloud Fanny Aulia Rifki; Adhitya Bhawiyuga; Ari Kusyanti
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 3 (2022): Mei 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data is one of the objects in a technology that is vulnerable to attacks on cryptographic aspects of confidentiality and integrity. Attacks on confidentiality and integrity aspects can be prevented by building a data security mechanism that implements cryptographic algorithms. However, not all technologies have data security mechanisms because the devices used have limited resources. So in this study, the authors build a data security mechanism on communication between sensor nodes, gateways, and the cloud using the Chaskey-12 cipher algorithm which is suitable for devices with limited resources. The author implements the Chaskey-12 cipher algorithm with CBC operating mode in the encryption and decryption process to ensure the confidentiality of sensor data. Meanwhile, to ensure the integrity of sensor data, the author implements the Chaskey-12 cipher algorithm in the process of tag formation and tag verification. Based on several test results in this study, it is known that the sensor, gateway, and cloud nodes successfully implement the Chaskey-12 cipher algorithm and carry out their functions in securing sensor data. The test vector test results show that the Chaskey-12 cipher algorithm in this study has been implemented according to the paper of the Chaskey-12 cipher algorithm creator. The performance test results show that node sensor, gateways, and cloud require a low average execution time with a high throughput value. The security test results show that the Chaskey-12 cipher algorithm implemented by the author succeeded in guaranteeing the confidentiality and integrity aspects of the sensor data security mechanism.
Evaluasi Kinerja Moodle E-learning pada Cluster Docker Swarm di Amazon Web Services Ahmad Aji Santoso; Adhitya Bhawiyuga; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 3 (2022): Mei 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

E-learning is a new way to learning to use electronic media typically involving the internet. E-learning has several advantages where students can access subject matter at any time. One of the most popular e-learning applications is Moodle. In its implementation, Moodle can be done using moodlecloud, on-premise and self-hosted servers. The implementation of the service moodle e-learning in self-hosted or using cloud computing services would be ideal option. The advantages offered by cloud computing services are a strong consideration, where not required financing and do not need to spend in early financing server maintenance. Service selection and deployment model greatly affect the performance of the Moodle application and also the financing from resource used. Moodle requires a service with good performance to cope with the number of users who use it, this becomes a polemic for moodle e-learning service providers, which is how the ideal deployment model to implement moodle e-learning applications on cloud computing services with high levels of performance and scalability and also service financing used. The test is done by providing requests in the form of enrol activities, view courses and quiz on docker swarm clusters built on aws services ec2 t2.medium, t3.medium and t3a.medium services with user rates of 40, 80, 120. The test includes performance testing with test parameters, namely throughput, success ratio, latency, use of cpu and memory resources. Based on the results of testing and cluster analysis, ec2 t3.medium and t2.medium have good performance based on the throughput and latency test values for enrol activities, view courses and quizzes, based on the success ratio test scores, clusters on ec2 t2.medium have good performance with an error value of 0% on enrol activities, 0% on view course activities and 0.1% on quiz activities with 120 user requests.
Implementasi Blockchain berbasis BigchainDB untuk Menjamin Keamanan Data dalam Sistem Pencatatan Rekam Medis Jogi Oliver Yohanes Tampubolon; Adhitya Bhawiyuga; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 3 (2022): Mei 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Increasing interest on digitalization of medical records and also the occurrence of a pandemic, pushes the increase usage of the Electronic Health Record (EHR) system by the health service providers. However, large amount of these systems still implements the centralized architecture that may pose risks such as data corruption, privacy infringement, and limited performance. Hence, blockchain technology are being researched as a substitute to handle data on EHR systems due to its decentralized architecture. The blockchain framework that is being researched in this report is BigchainDB, due to its capabilities on managing large-sized data similar to a conventional database. BigchainDB inherits the blockchain characteristics by also having a decentralized architecture, which means it can communicate its peers by using a peer-to-peer connection. BigchainDB also uses a consensus algorithm for transaction verification. BigchainDB consists of three main components; the “BigchainDB server”, which responsible for transaction handling from the web server to the blockchain, “Tendermint”, which responsible for the blockchain protocol and peer-to-peer communication, and “MongoDB", which responsible for the data storage. The BigchainDB also have data ownership control through the Role Based Access Control (RBAC) feature, which is a subsystem that allows the formation of data hierarchy that consists of roles and permissions for every transaction.
Pengembangan Aplikasi Layanan Kesehatan berbasis Web untuk Skrining Pendengaran menggunakan Arsitektur Clean (Studi Kasus: Fakultas Kedokteran Universitas Brawijaya) Harun Ulum Fajar; Agi Putra Kharisma; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 4 (2022): April 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The COVID-19 pandemic has had an impact on society. Interaction restrictions lead to the accessibility of public services, including public health services. Currently, the Faculty of Medicine, Universitas Brawijaya has conducted an online hearing screening process. However, it still does not meet the needs of doctors. The author initiated a research entitled "Development of Web-Based Health Service Applications for Hearing Screening (Case Study: Faculty of Medicine, Universitas Brawijaya)". The author chooses to use Clean Architecture by considering the ease of developing applications without the need to focus on a particular framework. The application is developed on the web so that it can be accessed through a browser. There are 3 tests, namely: functional testing, compatibility testing, and usability testing. In functional testing has been achieved 100% valid. The patient actor usability test got an A+ grade, the doctor actor got a C grade, and the Admin actor got an A grade. Compatibility testing has been running well on Chrome, Safari, Edge and Firefox browsers.
Co-Authors Achmad Basuki Achmad Bazuki Achmad Brahmantyo Arundaya Subianto Agi Putra Kharisma Agung Setia Budi Ahmad Aji Santoso Ahmad Nasrul Illahi Alan Maulana Hamid Alfian Rizky Susanto Alldo Raafi'ilman Ammar Waliyuddin Jannah Andhika Dwitama Putra Andri Warda Pratama Putra Annisa Puspa Kirana Annisa Widuri Murti Utami Apriyanto J.P.L Tobing Apriyanto Tobing Ardhian Rizki Ramadhani Ardi Rahmad Hermanto ari kusyanti Aria Tanzila Harfad Arya Wardhana Budi Utomo Aswin Suharsono Bagos Wahyu Suprayugi Baiq Findiarin Billyan Dany P Kartikasari Dany prima Kartikasari Dany Primanita Kartikasari Dany Primanita Kartikasari Dany Primanita Kartikasari Dedy Andrean Ardiansyah Delarta Tok Adin Dhiza Wahyu Firmansyah Donny Kurniawan Dwiyan Ramadhan Dharmanzah Dyah Ayu Ocky Mawardani Dyah Ayu Prabandari Ekky Pramudito Setiawan Fabiansyah Raam Pontoh Fadhlan Muhammad Fahmi Syahrulah Fajar Hamid Embutara Ratuloli Fanny Aulia Rifki Farah Nabilla Putri Irzan Fariz Andri Bakhtiar Fariz Andri Bakhtiar Fathan Muhammad Fatkhurrozi Fatkhurrozi Fauzan Pahlawan Ferra Adelinna Wibowo Putri Fidia Rosianti Firman Budi Safrizal Friska Anggia Nurlita Sari Haidar Arijuddin Harun Ulum Fajar Hendra Danu Laksana I Gede Wahyu Sanjaya Iskar Maulana Jodi Chris Jordan Sihombing Jogi Oliver Yohanes Tampubolon Kasyful Amron Kasyful Amron Kevin Jonathan Harnanta Khabban Sayyidi Razin Surya Kusnul Aeni Labib Imam Hidayat Lius Alviando Mahendra Data Mercury Fluorida Fibrianda Moch. Wildan Habibi Mochammad Hannats Hanafi Ichsan Moh Wildan Habibi Moh. Afif Ma'ruf Mohammad Harits Mohammad Zulfikar Muhammad Abdul Aziz Muhammad Aji Guna Darmawan Muhammad Chalif Nurfaizi Muhammad Fahmi Ali Fikri Muhammad Fauzi Muhammad Gigih Wicaksono Muhammad Hasbi Ash Shiddieqy Muhammad Irfan Syafi'i Muhammad Misbahul Munir Muhammad Rafi Fauzan Fathin Nico F. Sitorus Nimas Raya Ahsy Nur Fauzi Nuretha Hevy Purwaningtyas Ocki Bagus Pratama Ocki Bagus Pratama Pramukantoro, Eko Sakti Primantara Hari Trisnawan Rakhmadhany Primananda Refri Rifwan Daharmi Regita Yustania Esyaganitha Rembulan Suci Fii Jannatin Reza Andria Siregar Richad Gilang Wisduanto Riski Ananda Rizal Bayu Aji Pradana Rizky Haryandi Rahman Rizky Putra Pratama Sabit Ihsan Maulana Sabriansyah Rizqika Akbar Santoso, Bagus Jati Sapta Oryza Putra Sara Yosephina Satria Adhi Kharisma Satria Adi Kharisma Sofyan Ainurrachman Sukma Alamsyah Budianto Tsany Afif Wian Virgi Widasari, Edita Rosana Widhi Yahya Yosef Hesekiel Partogi