Rakhmadhany Primananda
Fakultas Ilmu Komputer , Universitas Brawijaya

Published : 151 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Penerapan Mekanisme Transmisi Data ECG Berbasis Teknologi LoRa (Long Range) Fadila Rafi Alifiandi; Eko Sakti Pramukantoro; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 1 (2020): Januari 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (395.917 KB)

Abstract

In 2016, cardiovascular disease was the number one cause of death in the world. It was happened because cardiovascular disease was often detected late. The application of Internet of Things (IoT) in electrocardiogram (ECG) monitoring is considered as a solution to that problem. At this moment, an ECG monitoring system has been developed using IoT architecture. That system consists of ECG sensor nodes that use WiFi to transmit ECG data to the data storage on the cloud. However, WiFi is considered unsuitable to be used in IoT applications because of its large frame overhead and high power consumption. Therefore, a mechanism for transmitting ECG data based on LoRa technology, which is considered suitable because of its small frame overhead and low power consumption, is designed. This research produced a mechanism where sensor nodes are able to record and send ECG data to the LoRa gateway and LoRa gateway is able to forward received ECG data to the application on the cloud. However, the applied ECG data transmission mechanism in this research resulted 25,5 seconds end-to-end delay. So, it didn't fulfill the requirement in ECG data transmission for non-critical monitoring uses, the unfulfilled requirement is 4 seconds maximum delay.
Implementasi Algoritme SPECK Pada Fuzzy Keyword Search Dalam Network Storage Syahmi Rifqi Hudha Perwira; Ari Kusyanti; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 1 (2020): Januari 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (670.26 KB)

Abstract

The advantage of using network storage is users can access data easily and network storage will provide storage with unlimited capacity. However, there is a lack of data privacy and confidentiality in network storage and also there is possibility of internal attacks and external attacks if the data stored is not encrypted. SQL injection is one of them, SQL injection is used to get additional information by accessing the SQL console. Therefore, the stored data must be encrypted in order to overcome the attack. One of the ways to secure this data is to apply the SPECK algorithm to ensure data confidentiality. The SPECK algorithm is applied to securing files and data in the database. Tests that carried out in this study are test vector validation, system functionality, system non-functionality, active attack system security test, passive attack system security test and encryption and decryption validation. Test vector result from system is matched with the ciphertext result obtained from the journal, using input such as plaintext and key that also obtained from the journal.
Deteksi Sinkhole Attack pada MANET dengan Protokol Routing AODV Menggunakan Perbedaan Sequence Number Muhammad Nursodik Wicaksono; Dany Primanita Kartikasari; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 1 (2020): Januari 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (468.081 KB)

Abstract

In a MANET network that utilize AODV as the routing protocol, a routing table is updated every time there is a demand from a node. This can in turn create a security vulnerability, one of them is the possibility of sinkhole attack. Sinkhole attack is an attack that occurs when a routing table is being made or updated, where malicious node will advertise fake RREP to deceive the route making process so that all the data will go to the malicious node. Because of that, this research focuses on making a sinkhole attack detection system on MANET network. The proposed system uses detection algorithm that observes the difference between sequence number. Previous research has shown success in detecting malicious package by using RREQ message package, therefore a different approach will be used in this research in which the modification is made in the RREP processing by comparing the incoming RREP sequence number with the existing threshold so that a valid RREP can be identified from the fake one. Test result done in a simulation with OMNET++ shows that the implementation of the detection algorithm has successfully been done with an average detection rate of 97.5% and caused the increase of Packet Delivery Ratio performance when compared to the one without detection algorithm. But with the side effect of also increasing the routing overhead load of the network.
Implementasi Protokol LoRa pada Akuisisi Data Sensor Perikanan menggunakan Drone Agent sebagai Node Perantara Ammar Waliyuddin Jannah; Rakhmadhany Primananda; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 1 (2020): Januari 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (445.888 KB)

Abstract

Smart aquaculture is one of the aquaculture concepts that applies the concept of the Internet of Things (IoT) in monitoring water quality remotely. The components used are sensor nodes, gateways, and clouds. These three components play a role in sending and retrieving water quality data using the LoRa and MQTT communication protocols. LoRa communication is used to send and receive data between the sensor node and the gateway, while communication to connect the gateway to the cloud uses the MQTT protocol. Water quality monitoring has been studied before but still has limitations in certain conditions, where the sensor node and the cloud do not have a direct connection. Then the data transmission from the research cannot be done so an agent as an intermediary sensor node is needed for the cloud. One agent that can be used as an intermediary sensor node to the cloud is the drone. The drone agent is used as a gateway to connect the sensor node and the cloud. There are two tests conducted, namely functional testing and performance testing. In functional testing, sensor nodes that have been implemented successfully retrieve data using temperature, pH, dissolved oxygen, and turbididty sensors. Performance testing is carried out to determine the ability of the system when sending sensor data to the drone agent. Performance testing is measured by sending delay and success ratio parameters with 1hop distance scenario. The results of the 1hop distance scenario test with a drone flight height of 10m from the ground, at 100m distance variation gets an average delivery delay of 523.53 ms with a success ratio of 100%, at 300m distance variation gets a mean shipping delay of 747.43 ms with a success ratio of 100%, at a variation of distance 600m has an average delivery delay of 541.70 ms with a success ratio of 90%.
Penerapan Antarmuka Transmisi Data EKG Berbasis Komunikasi BLE (Bluetooth Low Energy) Pada Mobile Middleware Yugi Trilia Septiana; Eko Sakti Pramukantoro; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 2 (2020): Februari 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1145.967 KB)

Abstract

In 2016, the first cause of death in the world was heart disease. It happened because heart disease was often detected late. Internet of Health Things (IoHT) is one of the technological developments of the IoT that can be used as a solution to the problem of electrocardiogram monitoring (ECG). The system consists of AD8232 ECG sensor that connected to an ESP32 sensor that has a BLE module to send the data that was obtained from sensor ECG to mobile middleware. BLE is one of the data transmission media that has advantages in the use of low power, low radiation that make the BLE is suitable to be used in human body. BLE is one of Low-Power Wide-Area-Network (LP-WAN) protocol that makes BLE suitable to be used in IoT environment. This research resulted in a measurement of the performance of the ESP32 BLE sensor node that is capable of processing and sending ECG data to mobile middleware with a delay of 4.02 seconds. So, the results didn't fulfill the requirements in ECG data transmission which is 4 seconds maximum for monitoring uses delay.
Implementasi Protokol UPnP untuk Discovery Node Sensor berbasis nRF24L01 pada Gateway Wireless Sensor Network Jenrinaldo Tampubolon; Rakhmadhany Primananda; Agung Setia Budi
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 5 (2020): Mei 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (750.235 KB)

Abstract

Wireless Sensor Network (WSN) technology becomes a popular technology these days and it even becomes one of the most promising Internet of Things (IoT) applications. Heterogeneous network sensors are needed for integrated sensing systems. Universal Plug and Play (UPnP) is one of the most promising technologies that enable network and service deployments. The UPnP protocol was previously successfully implemented on IP-based Smart Home devices that function for device and service recognition through the UPnP discovery and description stages. This research creates a gateway on non-IP-based wireless sensor nodes which implements the search and recognition system of sensor nodes using the concept of the UPnP protocol to recognize sensor nodes so that interoperability in WSN can be improved. There are two tests conducted, namely functional testing and system performance testing with several scenarios. In functional testing, the system can perform discovery, addressing, and description. Performance testing is measured when the system performs the discovery and data transmission by using delay parameter and success ratio with a total of 10 tests with several variations of distance. The results of the total average delay discovery tests with distance of 5m, 30m, 60m, 90m and 100m are 6,195s, 50,845s, 29,549s, 21,605s and 26,534s with total success ratio of 100%, 98%, 98 %, 90% and 83%. The results of the total average delay of sending data with distance of 5m, 30m, 60m, 90m and 100m in sequence are 0.959s, 2,231s, 3,807s, 3,480s and 3,713s with total success ratio of 95%, 85%, 88%, 95% and 95%.
Implementasi RFID untuk Tracking Rute Perjalanan Kereta Api dan Penggerak Wesel Secara Otomatis Erricson Bernedy Setiawan; Rakhmadhany Primananda; Agung Setia Budi
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 5 (2020): Mei 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

information regarding train travel routes has not been clearly recorded while at the station or leaving the station, this causes passengers to experience confusion to find that information. The application of RFID technology in every station that is passed by the train will get real-time and Web-based information. So that passengers feel more comfortable to have the history of train travel and the leadership of the station can calculate the time of arrival of each train are seen on the website. The RFID tags installed on the locomotive stores the information needed, which is the train ID, destination, previous station, current station, and next station. After identification, the information will be recorded automatically in a database, then the information on the RFID tag will be updated according to the next trip. The information is also used to move the Wessel automatically according to the destination to be addressed. This system applies a Wireless Sensor Node by using NRF24L01 as a communication module. The RFID-RC522 module was chosen because not only can it be used to identify RFID tags, but it can also perform writing modes to block data on the RFID Tag. The interface used consists of a desktop-based interface that is used when wanting to update information on RFID Tags and a web-based interface is used to display information about train travel history in real-time. There are two tests on this system, namely functional testing and performance testing. In functional testing, the base station can communicate with sensor nodes and actuators, sensor nodes can identify and update data on RFID tags, actuators work according to commands given by the base station, then the base station can perform automatic updates to the database. Performance testing is measured by sending delay parameters between nodes in each process. The results of testing when identifying an average delay of 63,875ms, when updating information received an average delay of 44,625ms, and testing on the branching path got an average delay of 21.5ms.
Implementasi Fault Tolerant System Menggunakan Metode Self-Purging Redundancy Pada Sistem Pendeteksi Kebakaran Irfani Fadlan; Rakhmadhany Primananda; Wijaya Kurniawan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 6 (2020): Juni 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Fire can occur anytime, anywhere and it cannot be predicted. When this disaster occurs, it can cause material, non-material loss and even cause casualties. Current fire detection systems ranging from flame detectors and even sprinklers can detect signs of a fire. But when there are component errors, the system cannot function as it should. System failures can occur when these errors continue continuously. The application of fault tolerant systems with hardware redundancy techniques is the solution for the problems above. Self-purging redundancy is one of the methods found in hardware redundancy. This method is applied by reducing the microcontroller data processing MQ-2 gas sensor, KY-026 fire sensor and LM35 temperature sensor. Using I2C communication data is forwarded to the switch and collected in the voter to be voted on with the majority vote logic. The result data of vote is used by the system as a determinant of the fire conditions and displayed on the LCD, then the voter returns the results of the vote to the switch for validation of a failed module. If a module failure is detected, the module will be removed from the system. From testing, the system successfully operates correctly in accordance with its functions and successfully performs fault masking, detection and location and recovery when the 3-module scan fails. Increased system reliability by 16.17% from 83.51% to 99.68%.
Implementasi Sistem Transmisi Data Sensor Healthcare Berbasis Zigbee Dengan Protokol Ad-hoc On Demand Distance Vector Satria Kencana P. Kacaribu; Rakhmadhany Primananda; Agung Setia Budi
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 6 (2020): Juni 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Sensor Network is a technology that has been widely researched, one of which is in the field of health (healthcare). This technology is used for health monitoring and intensive patient monitoring. Based on intensive care room data from RSUP Dr. In the July-September 2014 period there were 239 intensive care patients. Therefore, a system that can work efficiently in multi-patient monitoring is needed. Use Ad-hoc On-Demand Distance Vector (AODV) routing protocol to manage route search for AODV is needed only when there is a routing request. Zigbee can be used in areas with difficult environmental conditions with a transfer speed up to 250 Kbps. WiFi uses an overhead frame measuring 34 bytes and consumes 400 mA when transmitting and 20 mA when standby, while ZigBee uses an overhead frame measuring only 2-7 bytes and consumes 28-44 mA when transmitting and has a sleep mode to save energy . This researched applies a routing mechanism where the coordinator available to sending and receiving packets through the router node. Router nodes can receiving and forwarding data packets to end devices and coordinators. End devices can receiving and sending data packets to the coordinator. This mechanism using four scenarios produces an average end-to-end delay in 100 meters distance is 4.209 seconds. This mechanism with four scenarios results in convergence time in 100 meters distance is 5.293 seconds.
Pengaruh Nilai Radius terhadap Pemilihan Zona Optimal Protokol ZRP (Zone Routing Protocol) pada Lingkungan MANET (Mobile Adhoc Network) Daniel H. Simatupang; Primantara Hari Trisnawan; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 6 (2020): Juni 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A manet network is made up of moving nodes (mobile), each node that can establish communication with another without requiring a constant channel or template for that matter. The characteristic of manet is self-indulgence in which there is no need for a definition of infrastructure first. The kinds of protocols available in manet vary so much as proactive, reactive and hybrid protocols. The formation of zones depends on the manually designated radius values, the radius values has a significant share in the routing process. The observation of radius values affects the performance of ZRP's routing protocol using an NS-2 simulator. With a variation in number of nodes 20, 40, 60 and 80, variations in value radius 2, 3, 4 and 5 at area 1000m x 1000m using Random Way Point movements. Based on testing of ZRP's routing protocol with the packet delivery ratio (PDR), normalized routing load (NRL), end-to-end delay, throughput parameters with value radius 2 show better results in all test scenario for test parameters. For the parameters of the convergence time test, the value of radius 4 shows better on the entire test scenario.
Co-Authors Abimanyu Sri Setyo Abraham Arya Satyana Achmad Basuki Adhitya Bhawiyuga Aditya Geraldo Aditya Hermawan Aditya Prayudhi Agiya Yoshua Agung Setia Budi Ahdi Hudaya Ahmad Fajri Rahman Ahmad Faris Adhnaufal Ahmad Fikri Marzuqi Ahmad Ghufron Agustian Ajeng Nurrohmah Akbar Pandu Segara Alfrienza Tighfaraka Alifibioneri Ali Ali Ammar Waliyuddin Jannah Andi Yudiko Leonardo Solin Andre Ananda Pratama Andre Rizki Haryuaditya Andrean Dwi Andaru Andreas Widyatmoko Anggit Surya Gumilang Aprilia Kartika Sriastunti ari kusyanti Arief Indra Rivaldy Permana Arief Sukma Indrayana Arif Rahmanto Arya Sena Marga Mukti Asroful Khusna Arifianto Aswin Suharsono Aulia Nabih Rizqullah Bagas Gerry Caesario Bagos Wahyu Suprayugi Baiq Findiarin Billyan Bambang Gunawan Tanjung Bayu Bagus Prabowo Bella Aulia Rahmataufany Brillian Taufan Budiyanto Budiyanto Cakra Bhirawa Chrisyantar Hasiholan Da'imul Royan Dahnial Syauqy Damianus Dewa Pratama Daniel H. Simatupang Dany Primanita Kartikasari Dany Rahmana David Isura Dedy Andrean Ardiansyah Dedy Tinovrasibo Nababan Desy Ulina Purba Dhani Wahyu Wijaya Dimas Malik Ibrahim Edgar Juvianno Santoso Eka Putri Aprilianingsih Eko Aditya Ramadianto Eko Setiawan Enggar Saka Dirgantara Erricson Bernedy Setiawan Fadila Rafi Alifiandi Fahmi Ardiansyah Faizal Ramadhan Fajra Rizky Faris Naufal Al Farros Fariz Andri Bakhtiar Fathia Ningtyasari Aroeboesman Feriz Pradibya Uditama Fikri Miftah Akmaludin Firza Nur Hibatullah Fitriyah, Hurriyatul Frans Muliawan Panjaya Galeh Fatma Eko Ardiansa Galih Bhaktiar Candra Getdra Saragih Sumbayak Gibran Haq Giservin Tifira Zain Hafizhul Karim Helmy Rafi Nawawi Heri Setiawan Heru Nurwarsito Heru Nurwasito Hidayatus Syafa'ah Holden Gunawan Hudan Abdur Rochman I Putu Krisna Yoga Tanaya Igo Vicky Firmandia Ira Oktavianti Irfani Fadlan Irvan Ramadan Irvan Wahyu Bagus Pratama Irvana Alfiyan Nur Irwan Primadana Mulya Izaaz Waskito Widyarto Jefri Muhrimansyah Jenrinaldo Tampubolon Jodi Prayoga Wahyudwi Kasyful Amron Kevin Charlie Kurnia Ade Prasetia Laisa Ryry Pudja Mentari Lastio Irfathan Ananda Lucky Ronny Chandra Negara Lutfi Fanani Lyna Dwi Maryati M Ilham Fadilah Akbar M. Ammar Batistuta Haryawan Mabda Amnesti Hananto Mahendra Data Moch. Wahyu Imam Santosa Mochamad Hannats Hanafi Ichsan Mochammad Hannats Hanafi Ichsan Moh Irfan Haris Mohamad Ilham Firdaus Mohamad Lutfi Muhammad Afian Musthofa Muhammad Alfarizi Muhammad Fachri Hasibuan Muhammad Farradhika Muntaha Muhammad Fattah Na'im Pang Ripto Muhammad Hannats Hanafi Ichsan Muhammad Mahar Jahary Muhammad Naufal Aziz Huryansyah Muhammad Nursodik Wicaksono Muhammad Rasyid Perdana Muhammad Reza Wahyu Chrisdyan Muhammad Risyat Nashrullah Muhammad Sabilillah Mukhamad Roni Nugraha Pangestu Nur Cahyo Utomo Nuril Huda Pramudya Mahardika Kusumawardhana Pramukantoro, Eko Sakti Prastise Titahningsih Primantara Hari Trisnawan Putri Ayu Delina Sari Putri Rizqia Hardein Rendyanto Adi Kurniawan Resya Wakhid Ardiansyah Retno Perwita Sari Reynald Novaldi Reza Andria Siregar Rifki Pinto Hidayat Risailin Dwi Jaka Fauzi Riza Anisul Fu'ad Rizal Maulana Rizqi Agung Dwi Nugraha Sabriansyah Rizqika Akbar Salsabila Salsabila Sastra Ginata Satria Kencana P. Kacaribu Selma Aulia Sekarrizky Shindy Maria Ulfa Siwi Rahmat Januar Suhadak Akbar Sultan Achmad Chidir Fajar Sutikno Sutikno Syahifudin Shahid Syahmi Rifqi Hudha Perwira Syifaul Hud'riyah Tugar Aris Andika Prastiyo Raharjo Upik Jamil Shobrina Vico Andrea Budi Harto Wahyu Pria Purnama Wian Virgi Widasari, Edita Rosana Widhi Yahya Wijaya Kurniawan Wisnu Fajar Dewantara Yefta Kristiyanto Yemima Dara Gloriawati Yugi Trilia Septiana Zaky Farsi