Claim Missing Document
Check
Articles

Found 13 Documents
Search

Simulation of Mobile LoRa Gateway for Smart Electricity Meter Sugianto, Sugianto; Anhar, Azwar Al; Harwahyu, Ruki; Sari, Riri Fitri
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (680.261 KB) | DOI: 10.11591/eecsi.v5.1649

Abstract

LoRa is a viable connectivity technology for smart electricity meter. In addition to measuring electricity usage, a smart electricity meter enables many features for smart grid, safety, etc. LoRa is advertised to be capable in very long range transmission and low power consumption. However, LoRa uses sub 1 GHz unlicensed spectrum. In the era of connected smart things, this spectrum is very crowded and will be even more crowded. In this paper we propose the use of mobile LoRa gateway for smart electricity meter. With mobile LoRa gateway, the transmission range can be decreased. Thus, LoRa end devices can save more power and nearby systems can reuse the same band with less interference. We study the performance via simulation using modified LoRaSim. The result shows that the performance of LoRa mobile gateway can be achieved.
Performance Comparison of Schedulers in MmWave Communication using NS-3 Sinaga, Victor Lamboy; Yuniarto, Rakhmat; Hermawan, Tofan; Harwahyu, Ruki; Sari, Riri Fitri
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 7, No 1: EECSI 2020
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v7.2083

Abstract

Millimeter-wave (mmWave) has proven to provide the bandwidth requirement for the new radio (NR) on 5G. MmWave has been developed as a new technology to support enhanced mobile broadband (eMBB), massive machine-type communication (mMTC), and ultra-reliable low latency communication (URLLC). Since using a high frequency, mmWave also has some disadvantages that could not be avoided, such as small coverage, high signal attenuation, limited against some obstacles, and sensitive to the influence of signal quality. This paper discusses the effect of signal quality on 5G performance using mmWave while sending or receiving packet data by using three types of the scheduler, such as Round Robin, Proportional Fairness, and Max Rate scheduler. Signal quality will impact the value of modulation and coding scheme (MCS) that will be used. Our experiments using NS-3 based on the scenario showed that in the same location and number of UEs, performance throughput using Round Robin and Max Rate with excellent signal strength could reach the maximum throughput. The use of Proportional Fairness could lead only to reaching 50% of the maximum throughput. On the other hand, the use of the Proportional Fairness scheduler causes the weak signal to be unstable. Using Round Robin scheduler, the throughput is more stable. Different from the result using the Max Rate scheduler, the UE with the best signal quality compared to other UEs, was the only UE that get the resources allocation.
Implementation of Secure Work From Home System Based on Blockchain using NS3 Simulation Apriani, Mega; Rousstia, Diwandaru; Rifai, Fajar; Harwahyu, Ruki; Sari, Riri Fitri
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 7, No 1: EECSI 2020
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v7.2087

Abstract

Work from Home (WFH) is an activity carrying out official duties, completing outputs, coordination, meetings, and other tasks from the residence of employees. Implement WFH many users use the zoom application has vulnerabilities. The network architecture used refers to the simple experiment network. In Secure WFH there are 3 offices connected through a router. Each client in each office is connected to the router via a Virtual Private Network (VPN) on a peer-to-peer (P2P). That architecture has 18 nodes that will be simulated. Secure WFH simulation with blockchain combines secure WFH with a bitcoin code simulator from Arthur Gervais's. Implementation of blockchain on secure WFH can increase security but the resulting speed decreases. The decrease in speed when implementing secure WFH is due to the generate block process and the verification process.
Simulation of Mobile LoRa Gateway for Smart Electricity Meter Sugianto Sugianto; Azwar Al Anhar; Ruki Harwahyu; Riri Fitri Sari
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (680.261 KB) | DOI: 10.11591/eecsi.v5.1649

Abstract

LoRa is a viable connectivity technology for smart electricity meter. In addition to measuring electricity usage, a smart electricity meter enables many features for smart grid, safety, etc. LoRa is advertised to be capable in very long range transmission and low power consumption. However, LoRa uses sub 1 GHz unlicensed spectrum. In the era of connected smart things, this spectrum is very crowded and will be even more crowded. In this paper we propose the use of mobile LoRa gateway for smart electricity meter. With mobile LoRa gateway, the transmission range can be decreased. Thus, LoRa end devices can save more power and nearby systems can reuse the same band with less interference. We study the performance via simulation using modified LoRaSim. The result shows that the performance of LoRa mobile gateway can be achieved.
Rethinking Classroom Ventilation in post pandemic Situation Ruki Harwahyu; Hastin Setiani; Muhammad Surya Faroghi; Riri Fitri Sari
Journal of Sustainability Perspectives Vol 2, No 2: Desember 2022
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (304.841 KB) | DOI: 10.14710/jsp.2022.15479

Abstract

This paper aims to contribute in outlining the latest findings and formulating a simple practice in providing sufficient air circulation for classroom activities in preparation for the post-pandemic era. During this pandemic, remote learning over the internet has been a viable solution everywhere, including adopted by education institution to keep serving the learning process. However, as more and more people involved and the time elapses, several disadvantages of e-learning are realized. In addition, education institution should be prepared for the upcoming offline learning activity in post-pandemic era. This paper aims to refine the minimum airflow requirement for the classroom, finetuned based on student activity, ceiling height. Student activity is being the focus rather than teacher because student represents the majority of classroom occupant. In addition, a discussion on how it can be achieved using simpler ventilation system is presented. ON/OFF scheme for the usage of the active ventilation is also elaborated.Keyword: classroom, post-pandemic era, ventilation system, air circulation.
Analysis of the Interfacial Reaction between Bulk Metallic Glass Coated Copper, Nickel, and Titanium with Lead-Free Solders Laksono, Andromeda Dwi; Yen, Yee-wen; Tanjung, Rifqi Aulia; Amatosa, Teodoro A.; Harwahyu, Ruki
Makara Journal of Technology Vol. 25, No. 1
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Bulk metallic glass (BMG) has good mechanical strength, high hardness, wear resistance, and corrosion resistance with promising application in various industries. However, for the industrial production of BMG, the main issue is how to overcome limitations of joining with other materials. The present study focuses on solder processing at low operating temperature to avoid exceeding the recrystallization temperature. A feasible joining process for BMG was developed using lead-free solders. The BMG surface is pre-plated with copper, nickel, or titanium as a wetting layer. The reaction temperature is set between the glass transition temperature of BMG and the melting point of the solder. After a reflowing and aging process, the joint sample was examined using SEM, EDS, EPMA, and XRD. The Cu–Zr based BMG can be successfully joined with Sn-58Bi solder after plating Cu on the BMG surface. A diffusion layer was observed and the thickness increased with longer aging time. The main components of the diffusion layer are ZrO2 and Cu10Zr7.
Implementing the Chaotic Permutation Multicircular Cryptography Technique using Asymmetric Key Aria Lesmana; Ruki Harwahyu; Yohan Suryanto
ULTIMATICS Vol 14 No 2 (2022): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ti.v14i2.2837

Abstract

In digital computing, cryptographic methods considers performance in both speed and security. This study aims to explore and improve a permutation-based symmetric chaotic cryptography technique called Chaotic Permutation Multicircular (CPMC). In this study, a method is proposed to implement asymmetric key system from CPMC technique by generating a reverser key for reverting the permutation result of CPMC encryption back to its original arrangement using the same function as encryption. The reverser key alongside the CPMC key act as encryption and decryption key pair. The pair key generation and cryptographic function utilizes the encryption function of CPMC technique dubbed CPMC Shrinking algorithm. Asymmetric implementation can simplify CPMC technique by also using CPMC Shrinking algorithm for decryption, therefore enabling it as a single function for encryption and decryption. The asymmetric single function cryptography test show improvement in speed from faster cryptographic speed in decryption compared to initial implementation by average of 75.87%
Rethinking Classroom Ventilation in post pandemic Situation Ruki Harwahyu; Hastin Setiani; Muhammad Surya Faroghi; Riri Fitri Sari
Journal of Sustainability Perspectives Vol 2, No 2: Desember 2022
Publisher : Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (304.841 KB) | DOI: 10.14710/jsp.2022.15479

Abstract

This paper aims to contribute in outlining the latest findings and formulating a simple practice in providing sufficient air circulation for classroom activities in preparation for the post-pandemic era. During this pandemic, remote learning over the internet has been a viable solution everywhere, including adopted by education institution to keep serving the learning process. However, as more and more people involved and the time elapses, several disadvantages of e-learning are realized. In addition, education institution should be prepared for the upcoming offline learning activity in post-pandemic era. This paper aims to refine the minimum airflow requirement for the classroom, finetuned based on student activity, ceiling height. Student activity is being the focus rather than teacher because student represents the majority of classroom occupant. In addition, a discussion on how it can be achieved using simpler ventilation system is presented. ON/OFF scheme for the usage of the active ventilation is also elaborated.Keyword: classroom, post-pandemic era, ventilation system, air circulation.
DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS Muhammad Fahmi Al Azhar; Ruki Harwahyu
MULTITEK INDONESIA Vol 17, No 1 (2023): Juli
Publisher : Universitas Muhammadiyah Ponorogo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24269/mtkind.v17i1.7267

Abstract

SQL Injection attacks are still one type of attack that often occurs in web-based applications. The causes and ways to prevent SQL Injection have been widely explained in various sources. Unfortunately, until now, SQL Injection vulnerabilities are still often found in multiple applications. Web-based application frameworks that already have functions to protect against attacks are often not used optimally. This is inseparable from the role of programmers, who often forget the rules for writing program code to prevent SQL Injection attacks. We conducted this research to detect SQL Injection vulnerabilities in source code using a case study of the PHP CodeIgniter framework. We compared this research with static analysis tools like RIPS, Synopsys Coverity, and Sonarqube. The tool we have developed can detect SQL Injection vulnerabilities that cannot be detected by the two tools with an accuracy of 88.8%. The results of our research can provide suggestions for programmers so that they can improve the code they write.
Intrusion Detection System on Nowaday's Attack using Ensemble Learning Fajar Henri Erasmus Ndolu; Ruki Harwahyu
IJNMT (International Journal of New Media Technology) Vol 10 No 1 (2023): IJNMT
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ijnmt.v10i1.3210

Abstract

Attacks on computer networks are becoming more and more widespread nowadays, making this an important issue that must be considered . These attacks can be detected with the Intrusion Detection System (IDS). However, at this time there are new attacks that have not been detected by IDS. Therefore, ensemble learning is used. This research we used Random Forest algorithm for attack detection as an increase in the ability of IDS to detect cyber attacks. The use of the CSE-CIC-IDS2018 dataset is used in this research as a current representative dataset for cyber attack detection. The results of this study we get a binary classification accuracy of 99.6856% and an f1-score of 99.5803% and a multiclass classification accuracy of 99.6944 and an f1-score of 97.8032% with a data ratio ratio dataset of 3:1 normal class to attack class.