Jurnal Rekayasa elektrika
The journal publishes original papers in the field of electrical, computer and informatics engineering which covers, but not limited to, the following scope: Electronics: Electronic Materials, Microelectronic System, Design and Implementation of Application Specific Integrated Circuits (ASIC), VLSI Design, System-on-a-Chip (SoC) and Electronic Instrumentation Using CAD Tools, digital signal & data Processing, , Biomedical Transducers and instrumentation, Medical Imaging Equipment and Techniques, Biomedical Imaging and Image Processing, Biomechanics and Rehabilitation Engineering, Biomaterials and Drug Delivery Systems; Electrical: Electrical Engineering Materials, Electric Power Generation, Transmission and Distribution, Power Electronics, Power Quality, Power Economic, FACTS, Renewable Energy, Electric Traction, Electromagnetic Compatibility, High Voltage Insulation Technologies, High Voltage Apparatuses, Lightning Detection and Protection, Power System Analysis, SCADA, Electrical Measurements; Telecommunication: Modulation and Signal Processing for Telecommunication, Information Theory and Coding, Antenna and Wave Propagation, Wireless and Mobile Communications, Radio Communication, Communication Electronics and Microwave, Radar Imaging, Distributed Platform, Communication Network and Systems, Telematics Services and Security Network; Control: Optimal, Robust and Adaptive Controls, Non Linear and Stochastic Controls, Modeling and Identification, Robotics, Image Based Control, Hybrid and Switching Control, Process Optimization and Scheduling, Control and Intelligent Systems, Artificial Intelligent and Expert System, Fuzzy Logic and Neural Network, Complex Adaptive Systems; Computer and Informatics: Computer Architecture, Parallel and Distributed Computer, Pervasive Computing, Computer Network, Embedded System, Human—Computer Interaction, Virtual/Augmented Reality, Computer Security, Software Engineering (Software: Lifecycle, Management, Engineering Process, Engineering Tools and Methods), Programming (Programming Methodology and Paradigm), Data Engineering (Data and Knowledge level Modeling, Information Management (DB) practices, Knowledge Based Management System, Knowledge Discovery in Data), Network Traffic Modeling, Performance Modeling, Dependable Computing, High Performance Computing, Computer Security, Human-Machine Interface, Stochastic Systems, Information Theory, Intelligent Systems, IT Governance, Networking Technology, Optical Communication Technology, Next Generation Media, Robotic Instrumentation, Information Search Engine, Multimedia Security, Computer Vision, Information Retrieval, Intelligent System, Distributed Computing System, Mobile Processing, Next Network Generation, Computer Network Security, Natural Language Processing, Business Process, Cognitive Systems. Signal and System: Detection, estimation and prediction for signals and systems, Pattern recognition and classification, Artificial intelligence and data analytics, Machine learning, Deep learning, Audio and speech signal processing, Image, video, and multimedia signal processing, Sensor signal processing, Biomedical signal processing and systems, Bio-inspired systems, Coding and compression, Cryptography, and information hiding
Articles
22 Documents
Search results for
, issue
"Vol 15, No 2 (2019)"
:
22 Documents
clear
Prototipe Deteksi PEN dalam Tubuh Menggunakan B-Mode Ultrasonic Scanning
Chandra Edy Prianto;
Agus Indra Gunawan;
Niam Tamami
Jurnal Rekayasa Elektrika Vol 15, No 2 (2019)
Publisher : Universitas Syiah Kuala
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.17529/jre.v15i2.13893
Internal fixation is a method of healing fractures by connecting them using metal called pen. Pen metal in the body isn’t permanent, when the bone was strong the pen must be removed to avoid infection. In finding the pen, X-Ray are usually used. But X-Ray has bad effect, so not everyone is allowed to use it. The solution given by make prototype to detect pen location using B-Mode ultrasonic scanning method, it uses 5MHz single transducerultrasonic. Objects measurement is the animal bones connected with metals placed in the jelly with different heights. From the two transducers, the concave surface transducer has a better result and smaller percentage error than the flat surface transducer. The concave surface transducer has a focal length area 1.94cm above the transducer surface. The maximum slope angle of the object is 20o, which more than that makes the echo signal unreadable the object.The measurement results of objects displayed in the B-Mode 1 dimensional on PC that displays the structure of the bottom surface of an object, based on comparison between the actual object and the B-Mode display an error less than 6%, meaning B-Mode can represent the surface structure bottom of the actual object.
Implementation of Event-Based Dynamic Authentication on MQTT Protocol
Rizka Reza Pahlevi;
Parman Sukarno;
Bayu Erfianto
Jurnal Rekayasa Elektrika Vol 15, No 2 (2019)
Publisher : Universitas Syiah Kuala
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.17529/jre.v15i2.13963
This paper proposes an authentication mechanism on the MQ Telemetry Transport (MQTT) protocol. The exchange of data in the IoT system became an important activity. The MQTT protocol is a fast and lightweight communication protocol for IoT. One of the problems with the MQTT protocol is that there is no security mechanism in the initial setup. One security attack may occur during the client registration phase. The client registration phase has a vulnerability to accept false clients due to the absence of an authentication mechanism. An authentication mechanism has been previously made using Transport Layer Security (TLS). However, the TLS mechanism consumes more than 100 KB of data memory and is not suitable for devices that have limitations. Therefore, a suitable authentication mechanism for constraint devices is required. This paper proposes a protocol for authentication mechanisms using dynamic and event-based authentication for the MQTT protocol. The eventbased is used to reduce the computing burden of constraint devices. Dynamic usage is intended to provide different authentication properties for each session so that it can improve authentication security. As results, the applied of the event-based dynamic authentication protocol was successful in the constraint devices of microcontrollers and broker. The microcontroller, as a client, is able to process the proposed protocol. The client uses 52% of the memory for the proposed protocol and only consumes 2% higher than the protocol without security. The broker can find authentic clients and constraint devices capable of computing to carry out mutual authentication processes to clients. The broker uses a maximum of 4.3 MB of real memory and a maximum CPU usage of 3.7%.