Claim Missing Document
Check
Articles

Found 2 Documents
Search

Aplikasi Metode Root-Locus dengan Aproksimasi Padé untuk Analisis Pengaruh Time Delay pada Kestabilan Sistem Kendali Arief Muhammad Luthfi Yanuar; Fuqaha Asnan Said; Reihan Diaz Pramudya; Jilan Ma’rifat Al Faiz; Tatyantoro Andrasto
JURAL RISET RUMPUN ILMU TEKNIK Vol. 4 No. 2 (2025): Agustus : Jurnal Riset Rumpun Ilmu Teknik
Publisher : Pusat riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jurritek.v4i2.5467

Abstract

Control systems with time delays introduce system stability problems because time delays cause exponential effects to the system response. Conventional root-locus methods cannot be used directly on systems with delays due to irrational mathematical forms. This study analyzes the shifting effect of time delay on the stability of linear control systems by using the first-order Padé approach to enable the application of the root-locus method. The system model used is a second-order linear system with a transfer function of , and is analyzed under conditions without delay and with delays of 0.5, 1, and 1.5 seconds. Simulations were performed using MATLAB software. The results show that the addition of delay causes a right pole shift of the imaginary axis, reduces the stability margin of the system, and results in a more oscillative response as well as a longer time for the system to stabilize. The first-order Padé approach is shown to be effective in facilitating the visual analysis of stability in time-delayed systems. The findings make a practical contribution in adapting classical analysis techniques to the needs of modern control systems and can be widely applied in the development of network-based control systems, industrial automation, and real-time control.
Analisis Komparatif Keamanan dan Kinerja Protokol Komunikasi pada Web of Things: Tinjauan Sistematis terhadap HTTP, CoAP, dan MQTT Faid Rama Daniy; Mirza Putra Firmansyah; Arief Muhammad Luthfi Yanuar; Putri Safira Augusta; Arief Arfriandi
JURAL RISET RUMPUN ILMU TEKNIK Vol. 5 No. 1 (2026): April: Jurnal Riset Rumpun Ilmu Teknik
Publisher : Pusat riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jurritek.v5i1.7684

Abstract

The integration of the Internet of Things (IoT) into the Web of Things (WoT) offers cross-platform interoperability but presents significant security challenges for constrained devices. This study aims to evaluate the effectiveness and efficiency of security mechanisms in three major WoT protocols: HTTP, CoAP, and MQTT. The research methodology employs a Systematic Literature Review (SLR) following PRISMA guidelines, reviewing 22 selected articles published between 2020 and 2025. The analysis utilizes PICOC criteria to compare communication overhead, computational consumption, and security mechanisms such as DTLS, OSCORE, and TLS integration. The results indicate that CoAP, combined with OSCORE and EDHOC mechanisms, provides the optimal balance between energy efficiency and end-to-end security for resource-constrained devices. MQTT demonstrates superiority in throughput and data transmission speed but requires additional security layers to ensure data confidentiality. Meanwhile, HTTP dominates in terms of Web service integration and access control, despite having the highest overhead burden. In conclusion, no single protocol is superior for all scenarios; the choice of protocol in WoT architecture must be based on the trade-offs between latency, resource efficiency, and system security requirements