Rakhmadhany Primananda
Fakultas Ilmu Komputer , Universitas Brawijaya

Published : 151 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Analisis Kinerja LoRa SX1278 Menggunakan Topologi Star Berdasarkan Jarak dan Besar Data Pada WSN Fathia Ningtyasari Aroeboesman; Mochammad Hannats Hanafi Ichsan; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (304.236 KB)

Abstract

Data transmission is one of the technological advancements that began to be applied in various fields such as education, military or personal needs. Data transmission is widely known as sending messages between one point to another which is useful for getting or exchanging information. Data transmission needs technology and tools that can support the process. Wireless Sensor Network is one of technology that supports transmission data based on wireless, making it easier to implement. Ones of module that can support data transmission is LoRa SX1278, support data transmission systems with a wide range of distances and capable of sending large amounts of data. In this study there are 4 LoRa modules, where 1 module function as a master module and 3 modules function as slaves. Using a star topology, data transmission is carried out between modules by passing one master module as the bridge. Where the purpose of this study is to analyze the performance of LoRa module by looking at the results of Delay, RSSI, Throughput and SNR values that are generated when data transmission takes place. In testing, the farthest distance of transmission is 300 m and the shortest distance is 10 m by sending the smallest data 1 byte and the largest is 251 bytes.
Implementasi Low Power pada Monitoring Gas Berbahaya untuk Kandang Ayam dengan menggunakan Protokol HTTP dan ESP8266 Frans Muliawan Panjaya; Mochammad Hannats Hanafi Ichsan; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (292.677 KB)

Abstract

The more number of chickens can make a very negative impact because of the increasing number of chicken manure in the cage. Chicken manure that is stacked in large quantities in a cage will produce a variety of harmful gases. If harmful gases arising from chicken coops exposed directly to humans will cause directly to the parts of organs in the body and respiratory problems. With the presence of a dangerous gas system in chicken coops, high risk can be prevented and used more easily in anticipating it. To be efficient in running system devices, the device in designing the system will utilize low power work for savings in power consumption. Power efficiency is carried out for battery energy sources used in the device to work in a relatively long period of time. The use of a low power system in Arduino Uno to implement devices on power consumption that is used more efficiently will not run out quickly. Sleep power down mode is used as a feature in this low power so that some sub-systems in the monitoring system of dangerous gas exposure in the chicken coop can be temporarily turned off. The resulting test is in the conclusion that the system can run as desired. Tested with MQ-4 and MQ-135 sensors there is a reading of the detected gas value with the value in the sensor. In testing low power power consumption on a device capable of suppressing currents of 11 to 12 mA from 183.95 mA with normal conditions or wake mode.
Implementasi Encounter Record untuk menangani Flood Attack pada Routing Protocol Epidemic dan Routing Protocol Spray-And-Wait DTN Yefta Kristiyanto; Rakhmadhany Primananda; Dany Primanita Kartikasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 6 (2019): Juni 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (469.834 KB)

Abstract

Delay Tolerant Network (DTN) is a network architecture that can be applied in areas that have a delay But. DTN has limits on its network storage size. DTN has two routing protocols, single-copy and multi-copy routing. In multi-copy, resources become full faster because they are used to store message replicas and its becomes more vulnerable to flood attacks than single-copy routing protocol. Flood attack is an attack from a malicious node by sending a huge number of packets into the network. Encounter records are one of many security mechanism that can be used to detect flood attack on DTN. In this research, ER development was carried to handle flood attack. The time needed to detect flood attacks in Epidemic is 1.22349 seconds and in Spray-and-wait routing is 0.97765 second. The accuracy of detection using ER is more than 80% for both protocols. Difference of PDR result of using ER and without ER in Epidemic 17.209% and in Spray-and-wait is 66.7139%. The average latency in epidemic routing is 2774.35489 ms and in spray-and-wait routing is 2794.70716 ms. The result of overhead ratio in epidemic routing is 281.52343 and in Spray-and-wait routing is 8.82161.
Implementasi Intrusion Prevention System (IPS) berbasis Athena untuk Mencegah Serangan DDoS pada Arsitektur Software-Defined Network (SDN) Muhammad Farradhika Muntaha; Primantara Hari Trisnawan; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 7 (2019): Juli 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (742.414 KB)

Abstract

Distributed Denial of Service (DDoS) are common and popular attacks on the SDN layer, namely the data plane. In this study, Athena-based Intrusion Prevention System (IPS) is applied to prevent and reduce the impact of DDoS attacks, especially TCP SYN flood and UDP flood. Two test scenarios were carried out to determine the IPS performance. The first scenario, comparing the impact of DDoS attacks without and with applied IPS to throughput and CPU usage on the controller. The second scenario, comparing the speed of the prevention function based on features in the detection model. The first test results show that IPS is able to prevent DDoS attacks as proven by the decrease in the throughput. The throughput when normal and IPS is applied against TCP SYN flood and UDP flood attacks for transmit parameters of 3956 pps, 4045 pps and 3919 pps while for receive parameters it is 4720 pps, 4793 pps and 4692 pps. IPS is also able to reduce the CPU load on the controller when those attacks are carried out each at 4.95% and 7.9%. The second test result concludes that the more appropriate and correct features are used for training, the faster IPS in recognizing the characteristics of dangerous hosts. This is proven by the average speed of prevention for each attack using 10 features each at 5.78 seconds and 5.99 seconds while the 5 features each at 12.42 seconds and 11.42 seconds. Moreover, IPS can be applied to hardware with specifications as in this study.
Pengaruh Data Video Streaming pada Kinerja Protokol Optimized Link State Routing (OLSR) menggunakan Teknologi Wireless Mesh Network Shindy Maria Ulfa; Rakhmadhany Primananda; Primantara Hari Trisnawan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 7 (2019): Juli 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (260.221 KB)

Abstract

In the past few years, streaming media has been enhanced within the wireless network, which is known as wireless mesh network. There is challenge if streaming connected through WMN, which is caused that streaming application requires broad bandwidth for high speed data within multi-hop media as well, thus produces packet value loss and delay significantly, while the streaming depends on packet loss and delay. That is why the purpose of this research is to figure the effect of streaming on optimized link state routing performance using wireless mesh network technology. As for the parameters used to know streaming quality in the network are; delay, packet loss, throughput and jitter. The testing has been done through some scenarios, which are; connection amongst client - server, streaming testing within 1 Mbps bandwidth, streaming testing within 2 Mbps bandwidth. The testing result of those scenarios deliver the highest throughput value as 928 kbps, value of the smallest delay is produced as 12.6 ms, the lowest jitter value as 0.0000098ms, produces packet loss value as 0.00018%. Based on the testing result, thus video streaming occurs on optimized link state routing performance using wireless mesh network technology shows a very good result.
Implementasi Protokol Universal Plug and Play (UPnP) pada Sensor dan Aktuator untuk Otomasi Lampu Muhammad Mahar Jahary; Mochammad Hannats Hanafi Ichsan; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 7 (2019): Juli 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (934.621 KB)

Abstract

The use of wireless network technology is very popular, especially for use in smart homes. The amount of technology contained in the home provides an increase in the quality of human life because it provides efficiency in carrying out activities. However, the disadvantage of many technologies is the use that still uses a lot of control to run the technology. To be able to correct this problem, this study developed the use of Universal Plug and Play protocol (UPnP) to connect from various device technologies to one control. UPnP can run with various programming languages ​​and can communicate automatically by utilizing discovery and description functions. The researcher made the first two smart home devices using a raspberry pi device for the center of the system on the device and used the PIR sensor as input value from the captured infrared intensity while for the actuator using the lamp. then the second device uses raspberry pi as a performance center and LDR sensor to capture the light emission. Control points as users also use raspberry pi can be searched, found and requested for any services contained in the smart home device. Once recognized, the user can request status from the current condition of the device or send an order to turn on or turn off the light. The results of the study to test the response time performance between control points and one smart home device obtained an average of 293.32 milliseconds for the first time, averaging 169.76 milliseconds for response time after first being recognized and an average of 726 milliseconds for time the control point response is connected to two smart home devices for the first time.
Analisis Kinerja Routing Protocol Low Power and Lousy Network Pada Contiki Cooja dengan Menggunakan Metode Time of Arrival Putri Ayu Delina Sari; Mochammad Hannats Hanafi Ichsan; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 7 (2019): Juli 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1057.519 KB)

Abstract

Wireless Sensor Network (WSN) is a technology that develops very rapidly and causes it to be used on devices that we encounter everyday. All sensor nodes have various addresses and have the ability to retrieve, process and send data. Due to limited resources, WSN nodes have the ability to process and use energy consumption power which at each node is low, which makes the writer feel the need for RPL performance research, namely routing protocol specifically for low power radio and has the advantage that each node has processor power limited, low memory, low energy consumption on Contiki cooja simulator and low data rates. This study tested five scenarios, namely 10, 20, 30, 40 and 50 nodes with parameters of distance localization, routing overhead and packet delivery ratio. The test results show the influence of these parameters with the number of different nodes in a network. The localization test results show the results of testing where if the communication between client nodes and server nodes takes a long time, it can be seen that the distance between these nodes is getting farther away. The routing overhead test results show a trend of increasing values ​​as the number of nodes increases. In routing overhead testing using 10, 20, 30, 40 and 50 Nodes, respectively 64.58%, 72%, 72.93%, 73.01% and 75.56%. The results show that the more nodes on a network, the greater the Packet Delivery Ratio
Implementasi Algoritme Weighted Least Connection Berbasis Agen Pada POX Controller Untuk Load Balancing Web Server Pada Software Defined Network Getdra Saragih Sumbayak; Heru Nurwarsito; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1910.879 KB)

Abstract

Internet users are increasing, causing access demands to a service to increase, which results in the possibility of overloading the server as well. This problem can solve with load balancing technology. The development of network architecture now leads to the Software Defined Network (SDN) because SDN is a architecture that is manageable, dynamic, cost-effective, and adaptable. Previous research has applied load balancing technology on SDN networks using the weighted least-connection algorithm. However, the research still uses flow, which has expired time. In other studies that use the least connection algorithm (LCA) have overcome the problem of expired flow using psutil agents. But the results of the study showed very high CPU usage and unstable traffic distribution. Therefore, this study will apply the psutil agent-based method to the Load Balancing system on SDN networks using the weighted least connection (WLCA) algorithm and determine the performance of the agent-based method. The functional test results show that the psutil agent can send the value of the information on the number of connections on the server to the controller with an error value of 0%. The application of the psutil agent to the weighted least connection algorithm is also better. In testing 500 requests, the response time of WLCA was 29ms while at LCA was 33ms, the value of memory utilization in WLCA was 20.9% while LCA was 21% and the value of CPU utilization in WLCA was 81.2% while at LCA is 84.3%. On the other side, on the 300 and 500 request tests, WLCA algorithm traffic distribution is more stable compared to the LCA algorithm.
Implementasi Algoritme COZMO untuk Enkripsi dan Dekripsi Data pada QR Payment Suhadak Akbar; Ari Kusyanti; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (504.703 KB)

Abstract

QR payment is a payment method by scanning the QR code from mobile application. QR payment requires a security method so that the transaction data cannot be misused or manipulated by certain parties. Cryptography is one of the techniques that can be used to improve data security. One algorithm that can be used is COZMO algorithm. This algorithm is a stream cipher algorithm formed by a combination of Trivium and A5/1. COZMO algorithm is implemented on two Android applications for customer and cashier using the Java programming language and encrypting the transaction data. Based on the input length during the time performance test, 37 characters took 2.05 seconds, 68 characters required 2.06 seconds, while 169 characters took 2.15 seconds. These results indicated that the number of inputs could affect the processing time. A test was conducted over the input length of 68 characters in order to compare the application's performance time before and after implementing the COZMO algorithm which resulting a time difference of 0.3 seconds on the customer's application and 0.4 seconds on the cashier's application. Statistical calculations of the test results showed significant differences after the COZMO algorithm was applied. On the security test, the ciphertext only attack on ciphertexts could not find any plaintext due to the key used was too long. These results showed that COZMO algorithm could be used to secure transaction data.
Implementasi Algoritme Acorn untuk Pengamanan Data pada Protokol MQTT menggunakan Perangkat Wemos ESP8266 Mabda Amnesti Hananto; Ari Kusyanti; Rakhmadhany Primananda
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (534.971 KB)

Abstract

Security attacks are threat that could happen on computer network. One of the attacks could happen on data transmission process. Cryptography could be the solution for securing the process of data transmission process. Acorn algorithm is a cryptography algorithm that guarantees two security aspects which are confidentiality and authentication. Acorn algorithm is implemented on devices that have a limited resource such as Wemos ESP8266 microcontroller. MQTT is a delivery protocol used in this research. The components of MQTT are publisher, subscriber and broker. Publisher sends ciphertext and tag to the broker according to the topic. Subscriber subscribs to the broker according to the topic for receiving ciphertext and tag. Test vector testing, encryption and decryption performance testing, also security testing is conducted to make sure the system is working properly. The average time result on encryption is 312.6 milliseconds, and decryption is 61.2 milliseconds. Security testing is conducted by doing an attack such as ciphertext-only attack and impersonation. The result of the security testing, Acorn algorithm has a security aspect that cannot be attacked or breached.
Co-Authors Abimanyu Sri Setyo Abraham Arya Satyana Achmad Basuki Adhitya Bhawiyuga Aditya Geraldo Aditya Hermawan Aditya Prayudhi Agiya Yoshua Agung Setia Budi Ahdi Hudaya Ahmad Fajri Rahman Ahmad Faris Adhnaufal Ahmad Fikri Marzuqi Ahmad Ghufron Agustian Ajeng Nurrohmah Akbar Pandu Segara Alfrienza Tighfaraka Alifibioneri Ali Ali Ammar Waliyuddin Jannah Andi Yudiko Leonardo Solin Andre Ananda Pratama Andre Rizki Haryuaditya Andrean Dwi Andaru Andreas Widyatmoko Anggit Surya Gumilang Aprilia Kartika Sriastunti ari kusyanti Arief Indra Rivaldy Permana Arief Sukma Indrayana Arif Rahmanto Arya Sena Marga Mukti Asroful Khusna Arifianto Aswin Suharsono Aulia Nabih Rizqullah Bagas Gerry Caesario Bagos Wahyu Suprayugi Baiq Findiarin Billyan Bambang Gunawan Tanjung Bayu Bagus Prabowo Bella Aulia Rahmataufany Brillian Taufan Budiyanto Budiyanto Cakra Bhirawa Chrisyantar Hasiholan Da'imul Royan Dahnial Syauqy Damianus Dewa Pratama Daniel H. Simatupang Dany Primanita Kartikasari Dany Rahmana David Isura Dedy Andrean Ardiansyah Dedy Tinovrasibo Nababan Desy Ulina Purba Dhani Wahyu Wijaya Dimas Malik Ibrahim Edgar Juvianno Santoso Eka Putri Aprilianingsih Eko Aditya Ramadianto Eko Setiawan Enggar Saka Dirgantara Erricson Bernedy Setiawan Fadila Rafi Alifiandi Fahmi Ardiansyah Faizal Ramadhan Fajra Rizky Faris Naufal Al Farros Fariz Andri Bakhtiar Fathia Ningtyasari Aroeboesman Feriz Pradibya Uditama Fikri Miftah Akmaludin Firza Nur Hibatullah Fitriyah, Hurriyatul Frans Muliawan Panjaya Galeh Fatma Eko Ardiansa Galih Bhaktiar Candra Getdra Saragih Sumbayak Gibran Haq Giservin Tifira Zain Hafizhul Karim Helmy Rafi Nawawi Heri Setiawan Heru Nurwarsito Heru Nurwasito Hidayatus Syafa'ah Holden Gunawan Hudan Abdur Rochman I Putu Krisna Yoga Tanaya Igo Vicky Firmandia Ira Oktavianti Irfani Fadlan Irvan Ramadan Irvan Wahyu Bagus Pratama Irvana Alfiyan Nur Irwan Primadana Mulya Izaaz Waskito Widyarto Jefri Muhrimansyah Jenrinaldo Tampubolon Jodi Prayoga Wahyudwi Kasyful Amron Kevin Charlie Kurnia Ade Prasetia Laisa Ryry Pudja Mentari Lastio Irfathan Ananda Lucky Ronny Chandra Negara Lutfi Fanani Lyna Dwi Maryati M Ilham Fadilah Akbar M. Ammar Batistuta Haryawan Mabda Amnesti Hananto Mahendra Data Moch. Wahyu Imam Santosa Mochamad Hannats Hanafi Ichsan Mochammad Hannats Hanafi Ichsan Moh Irfan Haris Mohamad Ilham Firdaus Mohamad Lutfi Muhammad Afian Musthofa Muhammad Alfarizi Muhammad Fachri Hasibuan Muhammad Farradhika Muntaha Muhammad Fattah Na'im Pang Ripto Muhammad Hannats Hanafi Ichsan Muhammad Mahar Jahary Muhammad Naufal Aziz Huryansyah Muhammad Nursodik Wicaksono Muhammad Rasyid Perdana Muhammad Reza Wahyu Chrisdyan Muhammad Risyat Nashrullah Muhammad Sabilillah Mukhamad Roni Nugraha Pangestu Nur Cahyo Utomo Nuril Huda Pramudya Mahardika Kusumawardhana Pramukantoro, Eko Sakti Prastise Titahningsih Primantara Hari Trisnawan Putri Ayu Delina Sari Putri Rizqia Hardein Rendyanto Adi Kurniawan Resya Wakhid Ardiansyah Retno Perwita Sari Reynald Novaldi Reza Andria Siregar Rifki Pinto Hidayat Risailin Dwi Jaka Fauzi Riza Anisul Fu'ad Rizal Maulana Rizqi Agung Dwi Nugraha Sabriansyah Rizqika Akbar Salsabila Salsabila Sastra Ginata Satria Kencana P. Kacaribu Selma Aulia Sekarrizky Shindy Maria Ulfa Siwi Rahmat Januar Suhadak Akbar Sultan Achmad Chidir Fajar Sutikno Sutikno Syahifudin Shahid Syahmi Rifqi Hudha Perwira Syifaul Hud'riyah Tugar Aris Andika Prastiyo Raharjo Upik Jamil Shobrina Vico Andrea Budi Harto Wahyu Pria Purnama Wian Virgi Widasari, Edita Rosana Widhi Yahya Wijaya Kurniawan Wisnu Fajar Dewantara Yefta Kristiyanto Yemima Dara Gloriawati Yugi Trilia Septiana Zaky Farsi