cover
Contact Name
Puput Dani Prasetyo Adi
Contact Email
puput@ascee.org
Phone
+6281227103387
Journal Mail Official
puput@ascee.org
Editorial Address
Jl. Kemantren 3 RT.04 RW 13 Kelurahan Bandungrejosari Kecamatan Sukun Malang
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Internet of Things and Artificial Intelligence Journal
ISSN : -     EISSN : 27744353     DOI : https://doi.org/10.31763/iota
Internet of Things and Artificial Intelligence Journal (IOTA) is a journal that is officially under the auspices of the Association for Scientific Computing, Electronics, and Engineering (ASCEE), Internet of Things and Artificial Intelligence Journal is a journal that focuses on the Internet of Things (IoT), ISSN 2774-4353, publishing the latest papers in the IoT field and Artificial Intelligence (AI) i.e., Machine Learning (ML), and Deep Learning (DL)., etc., Topics can be included in this journal : IoT for various applications ( medical, sport, agriculture, smart city, smart home, smart environment, etc.) IoT communication and networking protocols ( LoRa, WiFi, Bluetooth Low Energy, etc.) IoT enabling technologies IoT system architecture IoT with a Recently Sensors Technology IoT with Wireless Sensor Network (WSNs) Technology Cloud-based IoT IoT data analytics IoT Security IoT Management Services IoT with Low Power and Energy Harvesting Future technologies for IoT Future Internet design for IoT Artificial Intelligence (AI), Machine Learning (ML), Deep Learning (DL) Drone or UAV, and IoT Analyzes IoT with a Financial Technology (FINTECH) Managemen approach IoT for Education Technology IoT for Industry Computers & Security :: computer security, audit, control and data integrity in all sectors - industry, commerce and academia Computer application for Economy, Finance, Business, Micro, Small & Medium Enterprises (MSMEs), Accounting, Management, and other sectors Review articles on international & national legal rules in the use of computer software, internet of things, frequency usage, etc. Internet of Things and Artificial Intelligence Journal has a frequency of being published 4 times a year or 4 issues every year (February, May, August, and November) with the Peer review process.
Articles 174 Documents
Development Of an Intelligent Clothes Drying System with Real-Time Monitoring and Control Kurkure, Girish; Ramani, Shivangi
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 2 (2023): Volume 3 Issue 2, 2023 [May]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i2.599

Abstract

The unpredictable climate and the increasing need for clean and dry clothes have made it challenging for individuals to perform daily tasks such as laundry. The high costs of using a laundry service and the difficulty of drying clothes outdoors or indoors make it imperative to develop an innovative solution to tackle this problem. This research proposes an intelligent IoT device that incorporates a dryer hanger with AI analytics to track the status of clothes and dry them effectively and efficiently. The device is designed to ensure safety and prevent unpleasant odors caused by mold growth and pollen. The proposed solution is particularly beneficial for individuals who are disabled or have a busy schedule as it eliminates the need to check the status of clothes being dried frequently. The device's effectiveness will be assessed by conducting experiments to evaluate its drying speed, energy consumption, and safety. The study results will provide insight into the device's feasibility and potential impact on mitigating the challenges associated with laundry tasks.
Implementation of Smart Farming for Oyster Mushroom Cultivation Based on Wireless Sensor Network Using ESP8266 Wahid, Abdul; Syahbani, Dimas; Adiba, Fhatiah
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 2 (2023): Volume 3 Issue 2, 2023 [May]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i2.610

Abstract

Internet of Things (IoT) technology can facilitate daily work in various fields. This study aims to implement smart farming for oyster mushroom cultivation based on Wireless Sensor Network (WSN) and ESP8266. The sensors used are temperature and humidity sensors with NodeMCU ESP8266 as a microcontroller so that they can take advantage of the Internet of Things (IoT) concept. The design of the prototype tool is designed in the form of a prototype box. The prototype box has 2 rooms that aim to apply the Wireless Sensor Network (WSN) method, so that data in each different room can be retrieved and then sent the data to the website. Tests were carried out to measure the comparison of temperature and humidity sensors with manual measurement tools. The results of this study show an absolute error average of 0.606% for temperature data and an absolute error of 0.627% for humidity data. This shows that the overall system is good and responsive.
Internet of Things: A Hypothetical and Prototyping Platform for CRASP Methodology Tatapudi, Gopikrishna
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 2 (2023): Volume 3 Issue 2, 2023 [May]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i2.619

Abstract

The construction industry has always been considered one of the most dangerous industrial sectors. Construction workers are often exposed to considerable risks, including falling from heights, unguarded machinery, or being stuck by heavy construction equipment. The construction business employs both skilled and unskilled laborers susceptible to accidents and health hazards on the construction site. Numerous accidents occur at construction sites despite the existence of labor safety rules. A Korean case study statistics showed the significance of construction health and safety management. By adopting CRASP methodology and applying innovative methods such as the intervention of ICT and the IoT, i.e., the prototype development through the Arduino platform could implement the automated features of construction health and safety management features. This research concludes that the CRASP conceptual methodology could be adaptable that drives the manifestation of IoT-based prototyping. IoT-based prototype functional features showed the feasibility of implementing automated construction health and safety management on-site.
Prevention practices accounting fraud in managing village-owned business units and its approach using AI Werastuti, Desak Nyoman Sri; Atmadja, Anantawikrama Tungga; Musmini, Lucy Sri; Adiputra, I Made Pradana; Sutoto, Agung; Hidayatulloh, A.Nururrochman; Sudarmanto, Eko; Purwanti, Purwanti; Sulistyowati, Nur Wahyuning
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 2 (2023): Volume 3 Issue 2, 2023 [May]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i2.623

Abstract

This study explores the practice of preventing accounting fraud in village-owned business units. The method used in this research is descriptive qualitative, and the approach is Artificial Intelligence (AI). For the descriptive qualitative methodology, the primary informants are several administrators of village-owned business units. The results of this study are two approaches, and the first is the conventional way, namely prevention carried out through work culture, opportunity removal, and financial report assessment; the 2nd approach is through technology or Artificial Intelligence applications. This research implies that work culture, elimination of opportunities, and evaluation of financial statements can prevent accounting fraud significantly if it is strengthened in written regulations. Bumdes managers need to make standard operating procedures in their activities. The AI approach results in Automated Data Analysis, Real-time Monitoring, Document Verification, and Automated Reporting System.
A Smart Water Tank for Control and Monitoring Based on IoT Technology Parenreng, Jumadi M.; Lamada, Mustari S; Baktiar, Nurul Isra Humaira; Adibah, Fhatiah; Risal, Andi Akram Nur
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 2 (2023): Volume 3 Issue 2, 2023 [May]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i2.626

Abstract

This research is a Research and Development study, developing a tool to overcome water wastage and monitor water conditions in the tandon. This tool uses water flow, pH, and turbidity sensors connected to a telegram bot and LCD. This research applies a prototype model that includes problem identification, needs analysis, literature study, tool design, program coding, tool installation, and tool testing. Functional testing of the tool shows that all components function correctly. From the test results obtained comparison test of measuring water volume entering using the water flow in the sensor and measuring cup results in an MPE of 0.067, while measuring water volume exiting using the water flow out the sensor and measuring cup results in an MPE of 0.048. Comparison test of measuring pH using a pH sensor and pH meter results in an MPE of 0.067. Measuring water turbidity level using a turbidity sensor shows the ability of the sensor to measure turbidity on various water samples. The telegram bot, LCD monitoring, and automatic water pump systems work well.
Security Performance of LoRaWAN Servers using Advanced Encryption Standard adi, Puput Dani Prasetyo
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 3 (2023): Vol. 3 No. 3 (2023): Volume 3 Issue 3, 2023 [August]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i3.632

Abstract

One of the essential components in LoRaWAN is managing the server with all existing components, including Device Management, Data forwarding, Network security, and real-time network monitoring. It is necessary to manage the uplink and downlink of the LoRaWAN server and maintain the quality of data transmission from the LoRa end node to the LoRaWAN server. Depending on the service provider, the LoRaWAN Server provides space for payload, uplink, and downlink data. How many times in a day, week, month, or even year? This discussion depends on the LoRaWAN server provider. Some are open sources, and some provide free uplink and downlink services. Settings on the LoRaWAN Server will determine how much data will enter the server or the network size. Security is also an essential parameter, e.g., encryption or authentication, supported by the feature requirements used on the server, which will determine the type of communication that LoRa will apply, for example, multi-communication or analysis data. Centralized management, Security, scalability, and cost-effectiveness are essential parameters if LoRaWAN is managed well.
Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN) rosyidah, aliyyah; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 3 (2023): Vol. 3 No. 3 (2023): Volume 3 Issue 3, 2023 [August]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i3.613

Abstract

The network security system is continuously advancing alongside technological developments. VPNs, which utilize open networks, aim to provide security by leveraging IPSec to transmit private data through L2TP tunneling strategy from the server to the branch computer/client and vice versa. Conversely, it can also lead to poor security practices. VPNs are implemented using the layer 2 IPSec tunneling protocol with two MikroTik devices. Testing is conducted to assess the security and speed of the network using the command line and MikroTik Winbox, where the server monitors packet delays to determine the improvement in network security quality. This research has identified several weaknesses in implementing this VPN protocol, namely the need for caution regarding the security of transmitted data to prevent misuse by the VPN provider
Detection of Bruteforce Attacks on the MQTT Protocol Using Random Forest Algorithm Akbar, Galuh Muhammad Iman; Hariyadi , Mokhamad Amin; Hanani, Ajib
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 3 (2023): Vol. 3 No. 3 (2023): Volume 3 Issue 3, 2023 [August]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i3.630

Abstract

Bruteforce is a hacking technique that launches an attack by guessing the username and password of the system that is the target of the attack. The Bruteforce attack on the MQTT protocol is an attack that often occurs on the IoT, so it is necessary to detect attacks on the MQTT protocol to find out normal traffic and brute force traffic. Random Forest was chosen because this method can classify a lot of data in a relatively short time, and the results from Random Forest can improve accuracy and prevent overfitting in the data classification process. This study uses two types of data: primary data from the hacking environment lab and secondary data from the IEEE Data Port MQTT-IOT-IDS2020 dataset. Trials on primary data and the results obtained are accuracy of 99.55%, precision of 100%, recall of 99.54%, and f-measure of 99.77%, the duration needed to get these results with 1796 data lines, i.e., for 0 seconds. As for the secondary data, the researcher obtained an accuracy of 99.77%, a precision of 100%, a recall of 99.43%, and an f-measure of 98.71%, the duration required to obtain these results with 85002 data lines, i.e., for 62 seconds.
Security System Analysis Using the HTTP Protocol Against Packet Sniffing Attacks Manguling, Inez sri wahyuningsi; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 4 (2023): Vol. 3 No. 4 (2023): Volume 3 Issue 4, 2023 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i4.612

Abstract

The security level of the SIM MBKM website information system needs to be analyzed because it is accessed by many students who provide essential data. The security testing process for the SIM MBKM system uses the software Ettercap and Wireshark to test the system's security level and network data against cybercrime attacks. The results of these experiments showed the same essential data, but Wireshark displayed more personal information. The difference lies in the system architecture using different methods or stages, namely ARP Poisoning and Filtering HTTP. The third difference is the estimated time taken during the experiment. Ettercap and Wireshark applications enable eavesdropping on confidential and essential data and information. Through security testing using Ettercap and Wireshark, more critical data is displayed. solutions and preventive actions can be implemented by encrypting confidential data and improving website security using the HTTPS (Hypertext Transfer Protocol Secure) protocol.
Network Security Analysis Using Switch Port Security CPT Istiqamah, Nurfadilah; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 4 (2023): Vol. 3 No. 4 (2023): Volume 3 Issue 4, 2023 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i4.614

Abstract

The gradual advancement of information network technology has rapidly increased due to the growing demand for efficient, stable, and fast network connectivity, as well as reliable information security. One factor that influences network quality is network security, which encompasses various techniques to enhance network security, such as building firewalls, layer seven protocols, and port security. Port security utilizes existing ports to enable secure switching access. The switch can protect the local area network (LAN). Several types of switch port security are commonly used, including default/static port security, dynamic learning port security, and sticky port security.

Page 6 of 18 | Total Record : 174