Fariz Andri Bakhtiar
Fakultas Ilmu Komputer, Universitas Brawijaya

Published : 36 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 36 Documents
Search

Implementation Of Lossy Compression Method For Storage Saving On Fog Computing Rachmat Indra Permadi; Dany Primanita Kartikasari; Fariz Andri Bakhtiar
Ultima Computing : Jurnal Sistem Komputer Vol 13 No 2 (2021): Ultima Computing : Jurnal Sistem Komputer
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/sk.v13i2.2214

Abstract

Video surveillance is a technology that uses a camera as an image receiver or input and a monitor/TV as an image producer or output to covers in certain areas. In its application, video surveillance monitors an area/place using a camera that has been installed in that place. The camera periodically records the situation that occurs in a place which is then sent to the virtual storage room via the internet network which is then displayed on the monitor/TV. However, video surveillance has a weakness, the data/video generated is so large that the storage space becomes full. Based on the experiments that have been carried out previously, the concept of fog computing is applied which is connected to a CCTV camera installed in a room for 24 hours. From these experiments, the results obtained are quite large recordings of 4 GB. To reduce the use of excessive storage space, resource management is carried out using the lossy compression method. In this study, the concept of fog computing is applied to compress video using the lossy compression method. The lossy compression methods used in this study include; H.263, H.264, and MJPEG. In this study, a video with the H.263 codec was produced which resulted in an average video size of 57,282 KB. While the H.264 and MJPEG codecs produce an average video size of 166,350 KB and 303,555 KB.
Implementasi Algoritme Kriptografi Lizard untuk Mengamankan Pengiriman Data Menggunakan Arsitektur Web Service REST pada Mikrokontroler NodeMCU Kalbuadi Joyoputro; Ari Kusyanti; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1259.514 KB)

Abstract

There are three elements of security, which are data confidentiality, data integrity, and data availability. This research focuses data confidentiality on NodeMCU microcontroller device in an IoT environment. Relatively small NodeMCU processor and dynamic memory becomes a challenge in fulfilling the data confidentiality. Lizard stream cipher algorithm is implemented on NodeMCU. The JSON (JavaScript Object Notation) data will be encrypted into a cipher text using the Lizard algorithm keystream before being sent to the database server over the wireless wifi network. On the server side, the data will be decrypted into its original form and stored into the database. The process of sending data uses the REST (Representational State Transfer) web service architecture. There are four parts of testing to ensure the system has been running well, that is test vector validation testing, functional testing, time and memory performance testing, and security testing. The 216 and 352 bit keystream generated on NodeMCU devices takes 0.01 seconds and 3.4% of total dynamic memory, while encrypting 216 and 352 bits plain text takes 0.02 and 0.04 seconds with 0.3% of total dynamic memory. Implementation of Lizard algorithm has successfully guaranteed the data confidentiality.
Implementasi Protokol MQTT Untuk Sistem Monitoring Perangkat IoT Zavero Brillianata Abilovani; Widhi Yahya; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1146.976 KB)

Abstract

Internet era at this time has developed a technology called Internet of Things as known as IoT. Where IoT is able to transmit data automatically from computer to computer without the initiation from humans. However, with size and number of data that increased will be transmitted make IoT devices performance has a negative result. Efforts are being made to overcome these problems, namely the need for a system that is able to manage devices and can monitor and maintain availability of IoT devices. One way is to make an IoT device monitoring system that aims to monitor when there is a disruption to the device. By implementing the MQTT protocol which is a protocol that implements the publish-subscribe mechanism and runs on the application layer. The MQTT protocol can process the send and receive of messages to manage and monitor according to the user's wishes, because the send and receive of messages by predetermined topics. Based on results rather than testing, the MQTT protocol has a smaller resource requirement than the UDP protocol and has a smaller data packet size than the SNMP protocol. The IoT device monitoring system that uses the MQTT protocol also has a small delay of 0.008634 sec and a throughput value of 9.2 MBit / sec. So that the system can run on low bandwidth and high latency.
Implementasi Protokol Neighbor Discovery Pada Pembentukan Komunikasi Antara Node Sensor dan IoT Middleware Berbasis Jaringan 6LoWPAN Heru Dias Pambudhi; Eko Sakti Pramukantoro; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1243.872 KB)

Abstract

6LoWPAN is a network technology that is proven for IoT environment to facilitate the transmission of data from sensor node to IoT middleware. The advantages of 6LoWPAN are it is suitable for low-power device and has high scalability because it is based on IPv6. But, there is a challenge in forming communication between node sensor and the IoT middleware in 6LoWPAN, i.e. node sensor can't find out the existence and the middleware address. Beside that, node sensor also can't self-configured it's IP address using the prefix that is provided by the middleware. These problems can be resolved with Neighbor Discovery Protocol (NDP), which can give node sensor the ability to automatically find out the middleware existence and address also can self-configured it's IP address. NDP can be applied with radvd program on the middleware side and ndisc6 program on the node sensor side. The result of this research are node sensor can find out the existence and the middleware address, automatic IP addressing in node sensor, discovery delay around 1ms , the number of exchanged NDP control message of each node is six, packet delivery ratio of CoAP and MQTT are 93% and 100%, and the maximum reachability range is 105m.
Analisis Kinerja Protokol 6LoWPAN pada Jaringan Sensor Nirkabel dengan Topologi Jaringan Grid dan Topologi Jaringan Random Menggunakan Cooja Simulator Andre Hadi Saputra; Primantara Hari Trisnawan; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 4 (2019): April 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (813.536 KB)

Abstract

IPv6 over Low Power Wireless Personal Area Network (6LoWPAN), is an IPv6-based protocol that allows devices with small power consumption such as sensors to remain connected and participate in Internet of Things (IoT) with greater scalability. The presence of 6LoWPAN as an Internet protocol for wireless sensor networks that offers extensive scalability and interoperability. In this study a simulation of the use of the 6LoWPAN protocol on the Wireless Sensor Network (WSN) using Cooja simulator. After that, the analysis was carried out using the Wireshark application and the results of the Mote Output were calculated manually by reviewing the Quality of Service (QoS) parameters, such as throughput, delay and jitter to determine the performance of 6LoWPAN. Cooja Simulator is used because building a genuine propagation network is time consuming and costly. From the simulation results using grid topology and random toology that have different number of nodes and Routing Protocol for Low Power and Lossy Network (RPL). The acquisition of delay and jitter is calculated manually except throughput using the Wireshark application. The highest throughput, as well as the lowest delay and jitter, are obtained by grid network topology with the number of nodes 10 in a row which are 435 bps, 174 ms and 1,795 ms. It can be concluded that the performance of the 6LoWPAN protocol on wireless sensor networks with grid topology is better than random topologies.
Implementasi Constrained Application Protocol (CoAP) Pada Semantic IoT Web Service Made Rezananda Putra; Eko Sakti Pramukantoro; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 5 (2019): Mei 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (371.355 KB)

Abstract

Heterogeneous communication protocols in internet of things lead to problems of interoperability, in particular the syntactical interoperability. In previous research has developed semantic IoT web service that can receive data from the sensors node via HTTP. However, the use of HTTP is not enough to receive data from the sensors node with diverse communication protocols. These problems are also compounded by the existence of a sensor node has limited or resource-constrained. One of the solutions of these problems is the addition of communication protocol on semantic IoT web service to connect with a resource-constrained sensor node. Constrained Application Protocol (CoAP) is a communications protocol that is capable of handling the problems of resource-constrained. CoAP designed to use minimal resources, making it suitable to be implemented on the environment the IoT has limitations. Therefore, in this study will be added CoAP as the protocol communications on semantic IoT web service. In terms of functional test results indicate semantic IoT web service is able to accept JSON-shaped data, images and video via communication protocols CoAP. The addition of the CoAP on semantic IoT web service is also capable of handling the problems of interoperability, in particular the syntactical interoperability by providing communication protocol via HTTP and CoAP.
Implementasi Perangkat Internet Gateway Device Untuk Menghubungkan Infrastruktur IoT dan Aplikasi Cloud Menggunakan Narrowband Internet of Things (NB-IoT) Eric Ferdy Kurniawan; Eko Sakti Pramukantoro; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 6 (2019): Juni 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1316.028 KB)

Abstract

IoT architecture can be described with 4 parts, namely sensing, networks, middleware, and application. Generally part of the sensing and middleware are on the intranet, while the application was on the internet as a cloud-based. The condition of the Internet gateway device (IGD) acts as a part of the network architecture that is connecting the IoT middleware in the intranet and internet application in the cloud. IGD function takes the data from the middleware then forwarded to the application cloud. In this research, IGD based network of NB-IoT provide internet connectivity with smaller delay than previous research that uses IGD based network of GPRS. Two test scenarios conducted to measure the delay and throughput data delivery from IGD towards cloud application. In the first scenario, the received sensor data from middleware directly mailed toward the cloud, while the second scenario, the received sensor data from middleware collected and stored first in the JSON file during a span of certain then JSON file is sent towards the cloud. The first scenario test results showed that the mean average delay of 10 seconds and average throughput of 26000bps. Comparison of the test results between second scenario on this research and previous research looks significantly while sending data 2.5Mb data. In previous research, the delay resulted of the delivery 2574984 bytes data of 2818 seconds, while in this research were able to send 2648000 bytes with delay amounted to 22 seconds and average throughput of 97672.742bps.
Implementasi Mekanisme Pengiriman Data Kesehatan Berbasis Protokol Bluetooth Low Energy antara Smartwatch dengan IoT Middleware Reza Azzubair Wijonarko; Eko Sakti Pramukantoro; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 6 (2019): Juni 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (664.549 KB)

Abstract

The data sending mechanism between a resource-constrained sensor and an Internet-of-Things middleware (IoTM) must be considered to enable remote and periodical data recording. Such recording is paramount in the context of human heart monitoring. In a previous study, Bluetooth was used in a health-data sending mechanism from sensor to smartphone. However, the solution introduced new problem that is silo. Meanwhile, the Bluetooth Low Energy (BLE) protocol is more compatible to the resource-constrained sensor and has safe radiation levels. Also, the smartwatch is popular for recording human heart rate. Then, the silo can be averted by applying event-driven IoTM. Thus, this research proposes a health data-sending mechanism from smartwatch to IoTM utilizing BLE by implementing BLE gateway on the IoTM. The health data is the smartwatch user's heart rate measurement. The health data are uploaded to a cloud server via IoTM's internet gateway device (IGD) for analyzing. The research's result is a functional health data-sending mechanism that satisfies the sensor's resource-constrained characteristic. The health data has a maximum size of 17 byte. The optimal distance between the smartwatch and the IoTM is 10 meters, with a maximum end-to-end delay of 3.7 seconds and a minimum Packets Reception Ratio of 96%.
Optimasi Penempatan Relay Node Pada Wireless Sensor Networks Menggunakan Algoritme Particle Swarm Optimization (PSO) Abdul Aziz Hadyansyah Widada; Kasyful Amron; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 7 (2019): Juli 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1281.508 KB)

Abstract

Precision agriculture is predicted to become the future of the agricultural industry. The application of information technology to enhanced production automation or land security requires that agricultural areas be filled with sensing devices. In fact, many sensors that have been deployed on land cannot send data optimally. The battery lifetime of wireless sensing devices causes network connectivity to be less and affects the final results of land monitoring. Relay node placement in wireless sensor networks field presents a power-limiting solution by dividing the role of data actuators and as hops that forward data towards internet gateway. However, the application of two-tier communication architecture using relay requires a high cost, so that the relay placement needs to be optimized. The research was conducted aimed at optimizing the placement of relays on agricultural land, by proposing optimization strategies that are adapted to conditions in the field. PSO (Particle Swarm Optimization) algorithm is used as a relay placement optimization heuristic method. The results of relay placement optimization show that a collection of relays that are optimized in number and position can produce maximum connectivity value compared to its placement deterministically. The complexity of the method will increase 19-35 percent as the number of relays is considered.
Implementasi Digital Signature pada Secure Electronic Prescription menggunakan Digital Signature Algorithm berbasis Android Hanaria Rotua Tampubolon; Ari Kusyanti; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (388.493 KB)

Abstract

Medication safety is a term to describe safety precautions from drug use. Medication safety prevents deaths that were caused by drugs that were prescribed wrongly. One of the main causes of wrongly prescribing a drug is the pharmacist not being able to read a doctor's instruction which is not standardized. Such problems can be overcome by using e-prescription, which can be utilized by doctor's and other medical staff to prescribe and send the prescription. However, there are risks of forgery and denial of the e-prescription. Therefore, a security mechanism needs to be installed on the e-prescription to guarantee integrity, authentication, and non-repudiation, which is in the form of a digital signature. This research will explain the design, implementation, security, and performance of the Android based e-prescription using the Digital Signature Algoritm method and SHA-1 as a hash function. The research results test the integrity aspect using a brute force, collision attack, and birthday attack. However, the integrity aspect could not be fulfilled, because the hash function being used which was SHA-1, was very vulnerable to the previously mentioned attack types. To ensure the authentication and non-repudiation aspect, a test was conducted and both aspects were fulfilled. The process of forming and verifying the signature required 6.36963 ms and 11,79276 ms respectively. The implementation of the digital signature on the e-prescription using DSA in this research was considered a success in the authentication and non-repudiation aspects.