Claim Missing Document
Check
Articles

Found 6 Documents
Search

Smart Fisheries: Real-Time Water Quality Management and Automated Feeding System Design for Tilapia Farming using ESP32 Micro Controller Yudistira, Bagus Gede Krishna; Hapsari, Cindy; Adnyana, Gede Defry Widhi; Nath, Wiswa; Putra, I Putu Romyadhy Maha
Journal of Artificial Intelligence and Software Engineering Vol 5, No 2 (2025): June
Publisher : Politeknik Negeri Lhokseumawe

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30811/jaise.v5i2.7288

Abstract

The fisheries sector in Jinengdalem Village, Buleleng, Bali holds considerable potential but continues to face challenges related to operational efficiency and unstable production outcomes. This study proposes an innovative solution through Smart Fisheries: The AI-Powered IoT in Smart Fisheries, an intelligent aquaculture system powered by Artificial Intelligence (AI) and the Internet of Things (IoT). The system is designed to perform real-time monitoring of water parameters, automate feeding processes, and analyze fish growth in order to enhance aquaculture productivity and sustainability. The research methodology follows a Research and Development (RD) framework, utilizing the ADDIE model (Analysis, Design, Development, Implementation, Evaluation). Preliminary results indicate that the system provides accurate environmental data and supports data-driven decision-making in fishery management. This project is expected to serve as a replicable model for implementing digital aquaculture technologies in similar regions.
Analisis Komparatif Efektivitas Client-Side Encryption Cryptomator dan Rclone Crypt pada Google Drive AMBARA, I KOMANG WAHYU AMBARA PUTRA; Yudistira, Bagus Gede Krishna
Informatik : Jurnal Ilmu Komputer Vol 21 No 2 (2025): Agustus 2025
Publisher : Fakultas Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52958/iftk.v21i2.11801

Abstract

Penggunaan cloud storage seperti Google Drive yang semakin masif dihadapkan pada tantangan keamanan data. Client-Side Encryption (CSE) menjadi solusi penting untuk melindungi privasi pengguna, namun studi komparatif mengenai efektivitas perangkat lunak CSE masih terbatas. Penelitian ini melakukan analisis komparatif dengan pendekatan eksperimental untuk mengevaluasi efektivitas enkripsi client-side Cryptomator dan Rclone Crypt. Analisis mencakup parameter kinerja seperti kecepatan enkripsi dan unggah data, perubahan ukuran file, visibilitas metadata, aksesibilitas, portabilitas, dan kecepatan unduh data. Hasil pengujian menunjukkan Rclone Crypt secara konsisten dan signifikan secara statistik lebih unggul dalam hal kecepatan proses dan overhead ukuran file kurang dari setengah yang dihasilkan Cryptomator. Sebaliknya, Cryptomator menawarkan kemudahan penggunaan dan portabilitas yang lebih superior bagi pengguna umum, serta mampu menyamarkan struktur folder secara total untuk privasi yang lebih baik. Kesimpulan utama dari penelitian ini adalah adanya trade-off fundamental antara performa dan kemudahan penggunaan. Rclone Crypt direkomendasikan untuk pengguna teknis yang memprioritaskan kecepatan dan efisiensi, sedangkan Cryptomator menjadi solusi yang lebih tepat bagi pengguna non-teknis yang mengutamakan kesederhanaan dan privasi struktural. Penelitian ini memberikan panduan praktis bagi pengguna untuk memilih solusi CSE yang sesuai dengan kebutuhan teknis dan preferensi pengguna.
Implementation of Honey Encryption to Improve Resilience against Brute Force Attacks in Cloud-based Microservices Communication Purba, Gabriel Nathanael; Yudistira, Bagus Gede Krishna; Aryanto, Kadek Yota Ernanda
Journal of Artificial Intelligence and Software Engineering Vol 5, No 3 (2025): September
Publisher : Politeknik Negeri Lhokseumawe

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30811/jaise.v5i3.7211

Abstract

Arsitektur microservices berbasis cloud meningkatkan skalabilitas dan fleksibilitas sistem namun memperbesar risiko keamanan komunikasi antar layanan. Penelitian ini menerapkan Honey Encryption pada API Gateway di infrastruktur Amazon EC2, mengombinasikan Distribution Transforming Encoder dengan AES-CBC 256-bit untuk menjaga kerahasiaan dan integritas data. Hasil validasi menunjukkan bahwa dekripsi dengan kunci benar memulihkan data asli, sedangkan kunci salah menghasilkan decoy message yang plausible dan bervariasi per field, secara efektif menghambat upaya brute force. Evaluasi performa menegaskan bahwa waktu proses enkripsi dan dekripsi berbanding lurus dengan beban data namun tetap berada dalam batas latensi yang dapat diterima. Simulasi serangan memperlihatkan keunggulan decoy message dalam menyamarkan pesan asli, meningkatkan keamanan komunikasi data antar microservices.
Analisis Komparatif NetSpot dan Ekahau Dalam Optimalisasi Penempatan Access Point di DISDIKPORA Kabupaten Buleleng Purba, Darma Putra; Saskara, Gede Arna Jude; Yudistira, Bagus Gede Krishna
MULTINETICS Vol. 11 No. 02 (2025): MULTINETICS Nopember (2025)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v11i02.7905

Abstract

Optimal access point (AP) placement is essential to ensure uniform and high-quality WiFi signal coverage, particularly in government institutions such as the Department of Education, Youth, and Sports (DISDIKPORA) of Buleleng Regency. This study aims to analyze and compare the effectiveness of Ekahau AI Pro and NetSpot applications in optimizing AP placement. The research methodology integrates Comparative Analysis, Action Research, and Benchmarking, following a structured process consisting of diagnosis, action planning, action taking, evaluation, and learning. Measurements were conducted through active and passive surveys, with cross-validation performed using WiFi Analyzer as a reference tool. Data were collected based on key parameters: Received Signal Strength Indicator (RSSI), blank spot detection, result consistency, and time efficiency. The results indicate that both applications accurately detected all blank spots. However, Ekahau AI Pro demonstrated higher consistency, with only a 1.5 dBm deviation, making it well-suited for long-term planning in complex building environments, despite requiring more time and higher costs. In contrast, NetSpot delivered sufficiently accurate results with an average difference of 6.75 dBm and significantly faster execution time, making it ideal for rapid network audits under limited budgets. Based on the findings, Ekahau AI Pro is recommended for complex environments demanding high accuracy, while NetSpot is more appropriate for fast, dynamic, and cost-effective assessments. This study provides technical recommendations for WiFi network optimization at DISDIKPORA and offers strategic guidance for selecting suitable network mapping tools in similar organizations.
Implementasi Kubernetes Cluster untuk High Availability dan Load Balancing SIAK Undiksha Pradipta, Ketut Saka; Saskara, Gede Arna Jude; Yudistira, Bagus Gede Krishna
RIGGS: Journal of Artificial Intelligence and Digital Business Vol. 4 No. 4 (2026): November - January
Publisher : Prodi Bisnis Digital Universitas Pahlawan Tuanku Tambusai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/riggs.v4i4.5846

Abstract

Sistem Informasi Akademik (SIAK) merupakan layanan kritis pada lingkungan perguruan tinggi yang dituntut memiliki tingkat ketersediaan dan keandalan tinggi, khususnya pada periode lonjakan akses pengguna seperti pengisian KRS dan penginputan nilai. Pada Universitas Pendidikan Ganesha (Undiksha), arsitektur SIAK yang masih berbasis single server menimbulkan permasalahan berupa penurunan performa dan potensi downtime akibat keterbatasan mekanisme replikasi serta distribusi beban. Penelitian ini bertujuan mengevaluasi penerapan arsitektur Kubernetes Cluster untuk meningkatkan ketahanan layanan (service resilience), high availability, dan efektivitas load balancing pada SIAK Undiksha. Metode penelitian yang digunakan bersifat eksperimental teknis dengan melakukan simulasi kegagalan node dan variasi beban permintaan menggunakan Apache JMeter. Parameter yang dianalisis meliputi Mean Time to Repair (MTTR), tingkat availability, throughput, latency, dan error rate. Hasil pengujian menunjukkan bahwa Kubernetes Cluster mampu mempertahankan ketersediaan layanan di atas 99,9% pada skenario kegagalan satu node dengan waktu pemulihan rata-rata 60–70 detik. Pada pengujian performa, penerapan replikasi pod dan mekanisme load balancing internal Kubernetes mampu meningkatkan throughput secara signifikan serta menekan error rate hingga 0% pada beban menengah hingga tinggi. Temuan ini menunjukkan bahwa Kubernetes Cluster efektif dalam mengurangi risiko single point of failure serta meningkatkan resiliensi dan skalabilitas layanan akademik, meskipun performa sistem tetap dipengaruhi oleh kapasitas sumber daya dan konfigurasi cluster yang digunakan.
Analisis Kesadaran Keamanan Informasi Penggunaan Layanan M-Banking Menggunakan Human Aspects of Information Security Questionnaire Ananda, Ngurah Gede Prema Satya; Saskara, Gede Arna Jude; Yudistira, Bagus Gede Krishna
Journal of Informatics, Electrical and Electronics Engineering Vol. 5 No. 2 (2025): December 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jieee.v5i2.2792

Abstract

This study examines the gap between information security understanding and practice among employees of the Department of Trade, Industry, Cooperatives, Small and Medium Enterprises of Buleleng Regency when using M-Banking services vulnerable to phishing. Its objective is to measure the overall level of information security awareness and identify the weakest areas to serve as a basis for more focused mitigation recommendations. This research employs a quantitative approach using a survey method involving 119 employees. The research instrument was developed based on the Human Aspects of Information Security Questionnaire (HAIS-Q) framework to measure the dimensions of Knowledge, Attitude, and Behavior. The collected data were analyzed using the Multiple Weighted Score Analysis (MWSA) method to determine vulnerability scores and rankings. The overall level of employees' information security awareness falls into the “Good” category with a composite score of 3.69. However, the findings reveal a significant knowledge-attitude-behavior gap, where the "Good" scores for Knowledge and Attitude dimensions are not matched by the Behavior dimension score, which is categorized as “Moderate.” To bridge this gap, recommendations focus on developing Standard Operating Procedures (SOPs) designed as tools to foster secure habits. For effectiveness, SOP implementation must be supported by socialization activities oriented towards behavioral change, rather than mere information dissemination. This socialization should include practical training and direct simulations, particularly phishing attack simulations.