Fariz Andri Bakhtiar
Fakultas Ilmu Komputer, Universitas Brawijaya

Published : 36 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 36 Documents
Search

Pengembangan Lightweight Data Analytic Pada Perangkat Edge Agus Adyandana; Eko Sakti Pramukantoro; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (567.119 KB)

Abstract

Nowdays, Internet of Things (IoT) technology developed to solve human problem. IoT technology developed in many fields already. Internet of Health Things (IoHT) is an IoT technology that developed in health field. IoT device produce an unuseful data for human before it's analyzed and visualized. Therefore we need an application that can store data, analyze data, and show analysis result. Researcher tried to solve it by developing a lightweight data analytic on resource constrained device in edge computing environment. Lightweight data analytic is an application that can store data, analyze data, and show analysis result which in order implemented by MongoDB, Sklearn, dan Flask. This research decided to focus on applications ability to analyze data with lightweight technology. This research use machine learning as application data analyzer. Testing is done by functional testing and scalability performance testing. The results of functional testing found that all application lightweight data analytic functional was running accordance what it needed. While scalability performance testing divided into data analytic testing and resource usage with runtime, CPU usage, memory usage, and disk I/O usage parameters. The results of data analytic performance testing found that application could handle 1000 data on used devices. But application still work on edge device, that is Raspberry Pi Zero W device and Raspberry Pi 3B+ device. Based on it, researcher can conclude that this application could be a solution of lightweight data analytic development on edge device with resource constraint.
Implementasi Video Conference dengan File Sharing menggunakan WebRTC Fathi Nur Azzam; Dany Primanita Kartikasari; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 10 (2019): Oktober 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (381.091 KB)

Abstract

Meeting or consultation serves to bring two or more people to discuss together. Technology serves to facilitate access communication meetings and consultations are video conferencing. Video conferencing is communication using audio and video which connects users even though they are not in the same place and time. There is a service to share data or called file sharing when using video conferencing. Applications support video conferencing and file sharing is Skype, Cisco Webex, and Zoom. However, the above application has a disadvantage that each operating system is different and application installation is required for each different device. WebRTC is a solution to the problem. WebRTC can run on all browsers, open-source, and free. WebRTC uses JavaScript-based APIs to establish peer-to-peer connections. WebRTC requires two additional servers namely STUN and TURN to communicate peer-to-peer through NAT. Testing is to measure the reliability of file sharing to video conferencing. Testing is using six types of connections and three types of file sizes. First test result file sharing does not affect video conferencing because it runs on a different port. One Way Delay test results increase in line with the increase in the size of the file sent.
Implementasi WebRTC Pada Sistem Broadcast Pembelajaran Untuk Menampilkan Bahasa Isyarat Farouq Alamsyah; Dany Primanita Kartikasari; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 10 (2019): Oktober 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (415.063 KB)

Abstract

In public schools, deaf people have communication problems when teaching in class. Teaching in class depends on using verbal communication between students and students. This means that students and other students have communication problems with deaf people. Based on these problems, we need tools that can help students, especially the deaf in the classroom. The system in question has the main feature of converting sound into sign language in real-time while learning takes place. The system was built using Web Real-time Communication (WebRTC) is a protocol for sending data in real-time. WebRTC's Application Programming Interface (API) is free and is supported by all web browsers. In this research, network system performance testing is performed to determine the quality of the system and the use of computer resources on the side of the user. Testing is divided into two test environments namely local networks and different networks. In each testing environment, four stages of testing are conducted based on the number of users, namely 5 students, 10 students, 20 students, and 40 students. The test results show that there is an increase in jitter, delay, packet loss, memory, and processor for each additional student.
Implementasi Algoritme Acorn untuk Pengamanan Data pada WSN Nadya Puspitasari; Ari Kusyanti; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 1 (2020): Januari 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (457.053 KB)

Abstract

The Wireless Sensor Network (WSN) has brought Internet of Things (IoT) into a new era because the sensor network that developed by WSN will be using various communication protocols. WSN also performs several communication models, one of WSN's communication models is a master-slave communication model which is a node-to-node communication model. LoRa is one of the technological development at WSN, which scope wide area and has low power consumption. The use of LoRa is very common nowadays, but LoRa's communication remains unsafe. Without security in LoRa, an intruder can obtain data by sniffing. Data protection is an important issue in the implementation of IoT so the data transferred by LoRa must be secured. An encryption algorithm such as Acorn algorithm can be used to secure data. Besides being able to transform data into new forms, the Acorn algorithm can also generate tags to check the authenticity of the data. The data communication on LoRa using the master-slave communication model can be secured by implementing the algorithm. This is proven by the results of research carried out through sniffing attacks and also active attacks called Known Plaintext Attacks (KPA). Sniffing attacks carried out after the implementation of the Acorn algorithm is only capable of producing encrypted data. As a result of attacks with known-plaintext attacks, attacks do not succeed in getting keys from related ciphertext and plaintext. It can be concluded from the test results by sniffing attacks and known-plaintext attacks that the implementation of the Acorn algorithm has succeeded in securing the data sent by LoRa.
Implementasi Mekanisme Publish-Subscribe pada Pemantauan Kehadiran Beacon menggunakan Protokol Bluetooth Low Energy Fikry Juan Aulia; Dany Primanita Kartikasari; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 7 (2020): Juli 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Population growth which always increases every year has an impact on the need for public transportation services. In this case, the role of technology is needed in the needs of public transportation services. Angkot is one type of public transportation service used by many residents and currently, the Malang City government has provided information on public transportation routes on the MediaCentre website. However, the problem that occurs is that there is no direct information at the bus stop. This study builds an angkot system system for bus stops with the aim of making it easier to see the angkot when passing the bus stop. The Bluetooth Low Energy (BLE) protocol is used in this study to be embedded in public transportation in the form of a beacon module. The Message Queue Telemetry (MQTT) protocol is used as a communication protocol between stops, using a cloud brokerage service on cloud.mqtt.com. The tests are limited to only 3 pieces of public transportation at one stop. The results of the system functionality test result in all functionality requirements being met. The results of the response time test for the detection of incoming angkot resulted in the highest average detection of 3 angkot with a scanning time of 0.247563 seconds and the lowest average scanning time of 0.117454 seconds. Another response time test is the time of sending data from the bus stop that supervises the angkot to the next stop with the highest average time on the detection of 2 angkots at once with 0.981685 seconds and the lowest average time at 0.792323 seconds. The result of the distance tester is that the maximum range between public transportation and bus stops is 30 meters
Implementasi Metode Multi-Agent Untuk Mendeteksi Rogue Access Point (RAP) Dhimas Satriawan Utama; Dany Primanita Kartikasari; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 9 (2020): September 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Wireless Local Area Network (WLAN) is a technology that is very popular with the public. The reason is because the user is not bothered with the length of the cable that must be connected to the device. However, there are weaknesses that can harm the user actively or passively. The weakness of this technology is that the transmission media is too open and a weak encryption scheme that can provide a path for hackers to enter the network. Rogue Access Point (RAP) is one of the most dangerous attacks on this technology. Thus, this study aims to detect RAP on the network. To achieve the objectives of this study, a Multi-Agent method is used to detect the presence of RAP on the network. The Multi-Agent method used in this study consists of a Master Agent and a Slave Agent to detect RAP. The Master Agent is pinned on the Network Manager device while the Slave Agent is pinned on the PC Staff. Slave Agent acts as a sensor while the Master Agent has the role to decide whether the findings from Slave are RAP or not. The results of the study were obtained based on two tests, namely the accuracy test resulted in 80% of the ten experiments while the detection time obtained a value of 1.94 seconds. The conclusion of this research is the Multi-Agent method successfully detected the presence of RAP on the network resulting in an 80% value for the accuracy test and 1.94 seconds for the detection time test. So, the Multi-Agent method can detect RAP well.
Implementasi Container Live Migration Antar-Cloud Provider Menggunakan Podman dan CRIU Muhammad Abdul Aziz; Adhitya Bhawiyuga; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 9 (2020): September 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cloud computing is an important technology and is quite widely used today. Some companies that provide cloud computing services now are Google, Microsoft, IBM and Amazon. One of the popular cloud computing services is virtualization. Virtualization allows a single machine to perform multiple roles of a running service. In the application of virtualization in cloud computing, live migration is a very important process. Live migration of a virtual machine requires the entire state of the source virtual machine to be moved to the destination virtual machine. On the other hand, there is a live migration technique called container live migration which only requires the state of the service to be moved. This research applies container live migration techniques to move services from one virtual machine to another, without having to move the entire state from the source virtual machine to the destination virtual machine, using Podman and CRIU. With Podman, a service can run as an isolated process, independent of its surroundings. With CRIU, services can be stopped and transferred from one machine to another. The results of functional testing show that the proposed live migration method is capable of moving services between different cloud providers. The results of testing the implementation of container live migration between cloud providers using Podman and CRIU show an average downtime of 34.618 seconds, and an average migration time of 71.627 seconds.
Implementasi Opsi Jumbo Packet Header Ipv6 pada Ethernet Jumbo Frame Putu Ade Arta Kusuma Putra Suparta; Primantara Hari Trisnawan; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 10 (2020): Oktober 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The use of IPv4 in addressing causes problems with the growing number of internet users. IPv6 is designed to overcome the weaknesses of IPv4. This study uses the IPv6 Extension Header feature to accommodate larger packet shipments than ordinary IPv6 packets. UDP is a protocol used in streaming applications that allows efficient packet transfer of resources. Large UDP packet delivery requires a large throughput, because the size of the package sent is large. Throughput is the number of packets that can be sent and received within a certain period from source to destination. The solution to sending packets that have sizes over 1500 bytes is to increase throughput by creating a new header option on IPv6 that is able to accommodate payload sizes that exceed 1500 bytes to 9000 bytes. Also can utilize Ethernet jumbo frames (up to 9000 bytes) that currently using ethernet frames, to reduce network overhead. As a result, the new header implemented as the IPv6 jumbo packet header is successfully run on the NS-3 simulator and can send packets over 1500 bytes to less than 9000 bytes as many as 100 packets on a jumbo ethernet frame network. So it can reduce the overhead header.
Implementasi Algoritme Salsa20 untuk Pengamanan Search Keyword Dokumen Terenkripsi Muhammad Thareq Parsaulian Beyri; Ari Kusyanti; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 10 (2020): Oktober 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

As the digital era develops, large-sized storage media are needed by many groups such as companies, government agencies, and organizations to store data or files. Also, storage media are needed that can facilitate more than one user in accessing data anywhere simultaneously. Cloud storage answers these needs. The stored data will be placed on the server. However, with the convenience provided by cloud storage, some aspects need to be considered by the user, namely the security of user data so that the data can only be accessed by the data owner or the party is given access. By applying encryption, data can only be accessed by the owner of the encryption key. In this study the encryption algorithm used is Salsa20. Salsa20 algorithm is a proven algorithm for its level of security. The Salsa20 algorithm was chosen because it takes up less memory compared to other algorithms. The secured data are the documents and the keywords. The contents of the document and keywords are encrypted into a new form, ciphertext. The ciphertext security level of this research is proven by active attack testing. But before that, the ciphertext is validated first with a test vector. Vector testing is done by matching the input and ciphertext in the journal. Vector testing results produce a valid status for each scenario. With the validation of the ciphertext in this study, data security is further tested using active attack method, the Known Plaintext Attack (KPA). The KPA attack on ciphertext was declared a failure in getting the key. Based on testing the time of encryption and decryption, it can be concluded that the difference in time of encryption and decryption is not large.
Implementasi Paradigma Publish-Subscribe Untuk Menjalankan Event-Based Monitoring Pada Sistem Pengamatan Kandang Ternak Adytya Tri Syahrul Alim; Dany Primanita Kartikasari; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 10 (2020): Oktober 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Broiler chickens are one of the main needs of the community. Poultry production ranks at the top in meeting meat needs by contributing 70 percent of the total 3.5 million tons of meat production throughout Indonesia. The potential for fulfilling the needs of chicken meat has a high risk with high environmental temperatures due to global warming. The factors that cause crop failure due to climate change are the influence of weather conditions, cages and the environment caused by the chickens being susceptible to infection. So that we need a system that can monitor the conditions of the cage to adjust the condition of the chicken's body with the surrounding environment. The system that is made consists of 3 components, namely publisher, broker, subscriber. The first component is a series of DHT11 temperature and humidity sensors on the ESP8266 as a microcontroller and also as a WIFI module, coupled with a USB webcam camera to monitor conditions in the cage as a publisher. Then the Raspberry Pi microcomputer acts as a server as well as functions as a broker. Data transmission is carried out using the help of a wireless network and data processing is carried out in a local broker. From the research made, the test results obtained are as expected and obtained the system performance which refers to the average latency value below 1ms, namely 0.31 ms. Keywords: IoT, raspberry pi, temperature and humidity, MQTT, publish subscribe