Claim Missing Document
Check
Articles

Found 9 Documents
Search

The Effectiveness of Automated Sonic Bloom Method in An IoT-Based Hydroponic System Seli Suhesti; Aji Gautama Putrada; Rizka Reza Pahlevi
International Journal on Information and Communication Technology (IJoICT) Vol. 7 No. 2 (2021): December 2021
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/ijoict.v7i2.572

Abstract

One of the solutions for food security is planting using hydroponic method and to increase productivity and help hydroponic grow faster and facilitate in monitoring hydroponic growth, sonic bloom and Internet of Things (IoT) are two technologies that can be used. However, in previous studies, the two systems have not been interconnected. The aim of this study is to evaluate the effectiveness of the combination of the two systems mentioned, hence creating an automated sonic bloom method in an IoT-based hydroponic system. To test the proposed method, this system is implemented with bok choi as the hydroponic plant using the DFT technique. The automated sonic bloom is embedded to the IoT system with DF Player Mini module, RTC module, and speakers. The evaluation is done by comparing growth parameters and the crop parameters. The results show that the system with sonic bloom produces fresh weight of 0,44-0,56 g and dry weight of 0,21–0,33 g. The mentioned results are superior to the system without sonic bloom, where fresh weight is 0,17–0,25 g and dry weight is 0,08–0,13 g. It can be concluded that the IoT-based sonic bloom system is effective in increasing the growth rate and hydroponic production rate.
An Evaluation of Complementary Filter Method in Increasing the Performance of Motion Tracking Gloves for Virtual Reality Games Fairus Zuhair Azizy Atoir; Aji Gautama Putrada; Rizka Reza Pahlevi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 6, No. 2, May 2021
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v6i2.1234

Abstract

In the use of Virtual Reality-based video games, users need additional devices to interact, one of which is a Motion Tracking Glove. The Motion Tracking Glove is one of the enhancements that users can use to interact with objects in VR video games. To get the angle value, an accelerometer sensor is used in the MPU6050 module. However, the problem that arises is the accuracy of the sensor because VR demands a low error rate. The purpose of this study is to improve the accuracy of the angular value of the accelerometer sensor value with a complementary filter. Complementary filters can increase the accuracy of the accelerometer sensor by combining its value with the gyroscope sensor value. The Motion Tracking Glove is built using the Arduino Nano and the MPU6050 module to capture angles that move according to hand movements, to connect and exchange data to the main VR device, the Motion Tracking Glove using the Bluetooth module. The results are RMSE 0.6 and MAPE 2.5% with a static Motion Tracking Glove position without movement. In sending Motion Tracking Glove data using the Bluetooth module, the resulting delay time when sending ranges from 0.1 second to 0.4 seconds by trying to move the Motion Tracking Glove from 0 degrees to 90 degrees and back to 0 degrees.
Automate All Platform Yang Membantu Pelaku Bisnis F&b Menjadi Automasi Melalui Aplikasi Animo (auto Calculation) Belva Rabbani Driantama; Subkhan Ibnu Aji; Dicky Prasetiyo; Mar Ayu Fotina; Muhammad Alkahfi Khuzaimy Abdullah; Irfan Nugraha; Aji Gautama Putrada; Rizka Reza Pahlevi
eProceedings of Engineering Vol 8, No 5 (2021): Oktober 2021
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Website Animo merupakan salah satu produk dari AutomateAll yang dalam tahap pengebangan startegi bisnis. Untuk mengukur keberhasilan website Animo, dibutuhkannya penelitian dibidang user experience (UX). Penulis menerapkan metode usability testing dalam pengujiannya, guna mencapai keberhasilan untuk website animo. Tujuan dari penelitian ini adalah untuk mengevaluasi user experience website Animo berdasarkan hasil analisis usability testing, sehingga diharapkan dengan adanya evaluasi ini website akan perbaiki pada tahap pengembangan selanjutnya. Berdasarkan hasil analisis data dengan menggunakan metode usability testing, disimpulkan bahwa website Animo masih membutuhkan pengembangan lebih lanjut pada segi keramahan pengguna. Kata kunci : user experience, website Animo, usability testing
Aplikasi Enterprise Document Digital Signature Menggunakan Rsa Dan Sha256 Untuk Wfh Di Era Pandemi Covid-19 Rafie Afif Andika; Aji Gautama Putradana; Rizka Reza Pahlevi
eProceedings of Engineering Vol 8, No 5 (2021): Oktober 2021
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dalam situasi WFH ditengah Pandemi COVID-19 dimana beberapa hal dikerjakan dengan pemanfaatan internet, aktivitas seperti mengirim dokumen secara online dengan scan tanda tangan sudah menjadi hal yang standar. Namun, tanda tangan yang dipindai dapat dengan mudah dipalsukan, dicuri, dan disalahgunakan. Penelitian ini bertujuan untuk membuat dan mengimplementasikan aplikasi tanda tangan digital dokumen perusahaan menggunakan RSA dan SHA256 sehingga sistem WFH di era pandemi COVID-19 dapat terselenggara dengan efektif dan aman. Sebagai bukti konsep, aplikasi dummy untuk perusahaan dibuat. Aplikasi ini merupakan sebuah sistem terdistribusi yang dapat berbagi dokumen untuk pemegang dokumen (pemohon), pemegang tanda tangan (signer), dan pemverifikasi tanda tangan dan dokumen (verifier). Dua skenario tanda tangan digital dibuat untuk perbandingan, satu menggunakan enkripsi RSA 2048 bit dan yang lainnya menggunakan enkripsi RSA 4098 bit. Dari hasil pengujian overhead RSA 4096 bit membutuhkan waktu kurang lebih 4 kali dari waktu overhead RSA 2048 bit untuk proses signature dan proses verifikasi. Namun, melalui perhitungan simulasi brute force, RSA 4096 bit membutuhkan sekitar 10616 kali lebih lama untuk diretas dibandingkan dengan RSA 2048 bit. Selain itu, melalui uji integritas, verifier dapat mendeteksi jika dokumen atau kunci tanda tangan apabila dipalsukan. Kata kunci : digital signature, SHA256, RSA, enterprise, COVID-19, brute force attack
Implementation of Event-Based Dynamic Authentication on MQTT Protocol Rizka Reza Pahlevi; Parman Sukarno; Bayu Erfianto
Jurnal Rekayasa Elektrika Vol 15, No 2 (2019)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (734.611 KB) | DOI: 10.17529/jre.v15i2.13963

Abstract

This paper proposes an authentication mechanism on the MQ Telemetry Transport (MQTT) protocol. The exchange of data in the IoT system became an important activity. The MQTT protocol is a fast and lightweight communication protocol for IoT. One of the problems with the MQTT protocol is that there is no security mechanism in the initial setup. One security attack may occur during the client registration phase. The client registration phase has a vulnerability to accept false clients due to the absence of an authentication mechanism. An authentication mechanism has been previously made using Transport Layer Security (TLS). However, the TLS mechanism consumes more than 100 KB of data memory and is not suitable for devices that have limitations. Therefore, a suitable authentication mechanism for constraint devices is required. This paper proposes a protocol for authentication mechanisms using dynamic and event-based authentication for the MQTT protocol. The eventbased is used to reduce the computing burden of constraint devices. Dynamic usage is intended to provide different authentication properties for each session so that it can improve authentication security. As results, the applied of the event-based dynamic authentication protocol was successful in the constraint devices of  microcontrollers and broker. The microcontroller, as a client, is able to process the proposed protocol. The client uses 52% of the memory for the proposed protocol and only consumes 2% higher than the protocol without security. The broker can find authentic clients and constraint devices capable of computing to carry out mutual authentication processes to clients. The broker uses a maximum of 4.3 MB of real memory and a maximum CPU usage of 3.7%.
Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare Rizka Reza Pahlevi; Parman Sukarno; Bayu Erfianto
Jurnal Rekayasa Elektrika Vol 17, No 2 (2021)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (497.867 KB) | DOI: 10.17529/jre.v17i2.20428

Abstract

Replay and eavesdropping attacks threaten the information security that is held by smart healthcare devices. An authenticated key exchange method to provide cryptography sessions is the best way to provide information security and secure authentication. However, smart healthcare devices do not have sufficient computation to perform heavy cryptography processes due to the limitations of the embedded devices used. We propose an authenticated key exchange protocol based on a physical unclonable function (PUF). The proposed protocol aimed to countermeasure from replay and eavesdropping attacks. We designed our protocol with one handshake process and three authentication processes. We evaluated our proposed protocol using Tamarin Prover. From the results of the evaluation, our proposed protocol can exchange properties correctly between communication actors and is valid in proving each lemma in eavesdropping and replay attacks.
An Evaluation of SVM in Hand Gesture Detection Using IMU-Based Smartwatches for Smart Lighting Control Maya Ameliasari; Aji Gautama Putrada; Rizka Reza Pahlevi
JURNAL INFOTEL Vol 13 No 2 (2021): May 2021
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v13i2.656

Abstract

Hand gesture detection with a smartwatch can be used as a smart lighting control on the internet of things (IoT) environment using machine learning techniques such as support vector machine (SVM). However, several parameters affect the SVM model's performance and need to be evaluated. This study evaluates the parameters in building an SVM model for hand gesture detection in intelligent lighting control. In this study, eight gestures were defined to turn on and off four different lights, and then the data were collected through a smartwatch with an Inertial Measurement Unit (IMU) sensor. Feature selection using Pearson Correlation is then carried out on 36 features extracted from each gesture data. Finally, two sets of gestures were compared to evaluate the effect of gesture selection on model performance. The first set of gestures show that the accuracy of 10 features compared to the accuracy of 36 features is 94% compared to 71%, respectively. Furthermore, the second set of gestures has an accuracy lower than the first set of gestures, which is 64%. Results show that the lower the number of features, the better the accuracy. Then, the set of gestures that are not too distinctive show lower accuracy than the highly distinctive gesture sets. The conclusion is, in implementing gesture detection with SVM, low data dimensions need to be maintained through feature selection methods, and a distinctive set of gesture selection is required for a model with good performance.
Secure MQTT PUF-Based Key Exchange Protocol for Smart Healthcare Rizka Reza Pahlevi; Parman Sukarno; Bayu Erfianto
Jurnal Rekayasa Elektrika Vol 17, No 2 (2021)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v17i2.20428

Abstract

Replay and eavesdropping attacks threaten the information security that is held by smart healthcare devices. An authenticated key exchange method to provide cryptography sessions is the best way to provide information security and secure authentication. However, smart healthcare devices do not have sufficient computation to perform heavy cryptography processes due to the limitations of the embedded devices used. We propose an authenticated key exchange protocol based on a physical unclonable function (PUF). The proposed protocol aimed to countermeasure from replay and eavesdropping attacks. We designed our protocol with one handshake process and three authentication processes. We evaluated our proposed protocol using Tamarin Prover. From the results of the evaluation, our proposed protocol can exchange properties correctly between communication actors and is valid in proving each lemma in eavesdropping and replay attacks.
Implementation of Event-Based Dynamic Authentication on MQTT Protocol Rizka Reza Pahlevi; Parman Sukarno; Bayu Erfianto
Jurnal Rekayasa Elektrika Vol 15, No 2 (2019)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v15i2.13963

Abstract

This paper proposes an authentication mechanism on the MQ Telemetry Transport (MQTT) protocol. The exchange of data in the IoT system became an important activity. The MQTT protocol is a fast and lightweight communication protocol for IoT. One of the problems with the MQTT protocol is that there is no security mechanism in the initial setup. One security attack may occur during the client registration phase. The client registration phase has a vulnerability to accept false clients due to the absence of an authentication mechanism. An authentication mechanism has been previously made using Transport Layer Security (TLS). However, the TLS mechanism consumes more than 100 KB of data memory and is not suitable for devices that have limitations. Therefore, a suitable authentication mechanism for constraint devices is required. This paper proposes a protocol for authentication mechanisms using dynamic and event-based authentication for the MQTT protocol. The eventbased is used to reduce the computing burden of constraint devices. Dynamic usage is intended to provide different authentication properties for each session so that it can improve authentication security. As results, the applied of the event-based dynamic authentication protocol was successful in the constraint devices of  microcontrollers and broker. The microcontroller, as a client, is able to process the proposed protocol. The client uses 52% of the memory for the proposed protocol and only consumes 2% higher than the protocol without security. The broker can find authentic clients and constraint devices capable of computing to carry out mutual authentication processes to clients. The broker uses a maximum of 4.3 MB of real memory and a maximum CPU usage of 3.7%.