Articles
PROTOTIPE SISTEM MONITORING DAN PENGGANTIAN OTOMATIS INTRAVENOUS FLUID DROPS
Afrizal Awlan Suryandaru;
Nyoman Putra Sastra;
Gst A Komang Diafari Djuni
Jurnal SPEKTRUM Vol 8 No 2 (2021): Jurnal SPEKTRUM
Publisher : Program Studi Teknik Elektro UNUD
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/SPEKTRUM.2021.v08.i02.p27
The giving of intravenous fluids to patients is dispense fluids into the veins using aninfusion set with a certain amount and period. Patients who are given intravenous fluids willconstantly be monitored by a nurse manually and regularly. In this study, a monitoring systemand automatic replacement of intravenous fluids drops were designed to make it easier fornurses to monitor and change infusions automatically. The monitoring system is designed totake advantage of the Telegram communication application integrated with the NodeMCUESP8266. In contrast, the automatic replacement system utilizes an infrared sensor to detectfluid availability. Based on the research results, the infrared sensor will have a logic '1' if infusionfluid is more than 50ml, and the sensor will have a logic '0' if infusion fluid is less than 50ml. Thefastest system response to send sensor data to Telegram Bot reached 01.10 seconds, while thefastest system response to receive orders from Telegram Bot reached 05.70 seconds.
OPTIMASI NIRKABEL LOCAL AREA NETWORK FAKULTAS TEKNIK KAMPUS SUDIRMAN UNIVERSITAS UDAYANA
Komang Yuda Krisnawan;
Nyoman Putra Sastra;
N.M.A.E.D. Wirastuti
Jurnal SPEKTRUM Vol 5 No 1 (2018): Jurnal SPEKTRUM
Publisher : Program Studi Teknik Elektro UNUD
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (888.547 KB)
|
DOI: 10.24843/SPEKTRUM.2018.v05.i01.p15
One of the changes in the field of telecommunications is the use of wireless technology. Wireless technology is applied to computer networks better known as Wireless Local Area Network (WLAN). Network coverage quality measurements can be seen from categories of delay or suspension, excess queues on the network, increased traffic, and output results. By using Wi-Fi Analyzer and Ekahau software we get the Quality of Service (QoS) value to see how good the coverage of the existing wireless network is. The result of the measurement is analyzed to get the adjustment of the wireless area coverage formula so that it can find the maximum range used as a reference in placing the ideal access point. The addition of access point points is done on all buildings where at some point the area can not be reached as a whole.
TAMEx framework as an alternative for e-exam implementation in wireless network
Gede Sukadarmika;
Rukmi Sari Hartati;
Linawati Linawati;
Nyoman Putra Sastra
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 5: October 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i5.15774
One of significant change in learning process is exam implementation applying a computer-based test (e-exam) rather than paper-based test. Many institutions currently use wireless network with bring your own device (BYOD) policy for their e-exam implementation, due to limitation of space and user terminals. Moreover it is hard to maintain the availability of reliable signal quality in wireless network for all users during e-exam process. Therefore, this research proposes a development of time adaptive for mobile exam (TAMEx) framework to provide all users with good quality of service of e-exam in wireless network environment when dealing with signal quality variations. The received signal strength indication (RSSI) is the main indicator of the signal quality. The framework supports e-exam implementation in wirelesslocal area network and the use of BYOD mechanism. The research shows that the framework successfully has provided time compensation for the users who experienced temporary connection loss due to bad signal quality. The result exhibits that tiny processing time has been needed for signal loss detection, user’s request of compensation time, and server’s execution. In conclusion, the TAMEx could guarantee good services for all users who doing e-exam in wireless network environment.
Evaluasi Pengembangan Disaster Recovery Center untuk Data Center Universitas Udayana
Kheri Arionadi Shobirin;
Nyoman Putra Sastra;
Made Sudarma
Jurnal Teknologi Elektro Vol 20 No 1 (2021): (Januari - Juni ) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/MITE.2021.v20i01.P20
Data Center has a vital and strategic role in supporting university operations. Based on Government Regulation No.17 of 2019 article 20 section 1: Every Data Center owner must have a Disaster Recovery Center. Evaluation of Disaster Recovery Center Development for Udayana University Data Center conducted by considering aspects of natural threats, human threats, environmental threats, existing Data Center specification, virtualization, and cloud technology used to maintain the availability of Data Center services for Udayana University with the most efficient development costs. Using cost comparation for DRC development and operation for 3 years, found that implementation cost of Cloud DRC 3 times higher compare to Conventional DRC. High cloud computing cost contribute 67% of Cloud DRC cost structure.
Penerapan Keamanan Jaringan Menggunakan Sistem Snort dan Honeypot Sebagai Pendeteksi dan Pencegah Malware
Agus Riki Gunawan;
Nyoman Putra Sastra;
Dewa Made Wiharta
Jurnal Teknologi Elektro Vol 20 No 1 (2021): (Januari - Juni ) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/MITE.2021.v20i01.P09
Intisari- Sistem komputer yang terkoneksi jaringan internet beresiko terhadap ancaman atau serangan. Sistem Snort dan Honeypot merupakan sistem kemanan berlapis yang dimana jaringan internal akan di awasi selama 24 jam setiap harinya, sehingga jika terdapat data masuk yang mencurigakan sistem akan memberikan informasi otomatis bahwa adanya serangan berupa malware atau hacker. Snort dapat mendeteksi dan menyimpan 250519 jumlah data dengan 27 atribut yang disediakan Snort secara default. Honeypot dapat mendeteksi dan menyimpan sebanyak 248.574 data yang dimana tercatat 10 jenis serangan. System honeypot mendeteksi 10 jenis serangan yang berbeda dengan IP address pada setiap serangan. Dari 10 jenis serangan diambil 5 jenis serangan terbesar dan 5 IP address terbesar pada setiap jenis serangan. Sehingga fungsi sistem snort dan honeypot telah dapat mendeteksi adanya serangan serta menyimpan data penyerang pada sistem, dan dapat berjalan secara bersamaan pada satu jaringan. Kata kunci : Snort IDS, Honeypot, Keamanan Jaringan, Malware
LOAD BALANCING UNTUK PERBANDINGAN KINERJA VIRTUALISASI SERVER VMWARE DAN XEN SERVER
I Gede Primanata;
Nyoman Putra Sastra;
Dewa Made Wiharta
Jurnal SPEKTRUM Vol 5 No 1 (2018): Jurnal SPEKTRUM
Publisher : Program Studi Teknik Elektro UNUD
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (526.465 KB)
|
DOI: 10.24843/SPEKTRUM.2018.v05.i01.p05
This study aims to compare VMware server virtualization technology and Xen server that simulates hardware into the software. In order to share loads can be balanced on both virtual servers, this research used HAproxy as Load Balancing which is implemented on Apache Web Server so performance from CPU usage side, memory and access speed from VMware and Xen server virtualization can be compared. By comparing these two models, it is expected to be used as a reference for selecting virtualization models for shared resource needs on one or more physical servers. From the results of testing in this study, it was found that the performance of VMware is better than Xen when viewed from the CPU usage. CPU usage in VMware is lower than Xen with 1.57% when handling one website and 1.58% when handling two websites. In terms of memory usage Xen Server is more efficient in memory usage when compared to VMware, Xen is more efficient memory of 29.11% and 34.84% for handling one and two websites when compared to VMware. While in terms of data access speed on Xen faster than VMware, which is about 42,132 Kbps.
Token-based Single Sign-on with JWT as Information System Dashboard for Government
I Putu Arie Pratama;
Linawati Linawati;
Nyoman Putra Sastra
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 4: August 2018
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v16i4.8388
Various web-based information systems are developed by Indonesian government to improve quality of services for their society. It encourages users, generally civil servants, to perform different authentications on used information systems and have to remember credentials. Account management of the users poses another challenge for administrators. Single Sign-On (SSO) can be the solution by providing a service of centralized authentication and user account management. This study applies a token-based SSO architecture and uses Json Web Token (JWT) to grant permission authorities, since JWT can provide a claim process between 2 parties. Additionally, the built-in dashboard lists associated information systems to facilitate accessing for the authenticated users. This study will discuss JWT implementation on the dashboard of government information systems that implements SSO, which will generate the permission authorities securely for connected information systems on SSO.
Penerapan Teknologi Informasi dalam Reformasi Birokrasi pada Bidang Pendidikan
dian krisnandari;
Dewa Made Wiharta;
Nyoman Putra Sastra
Jurnal Teknologi Elektro Vol 18 No 2 (2019): (Mei-Agustus) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (509.747 KB)
|
DOI: 10.24843/MITE.2019.v18i02.P19
Universities are currently implementing information technology to create bureaucratic reform. This is done because the demands of the era and information technology are increasingly growing to be more sophisticated. In higher education both management and service are supported by the role of information technology. In the application of information technology, it certainly must be supported by apparatus resources that have good performance. In higher education the application of information technology is used in managing performance and service management. The application of information technology in performance management will encourage universities to achieve their mission. While in the service process, the application of information technology will have a positive impact because services will be carried out efficiently, effectively and transparently. Information technology is applied to services to create a service that is fast, precise, efficient and professional. In addition, to create good governance in bureaucratic reform, information technology must be integrated so as to foster rapid information between units in higher education. The application of information technology in higher education is one of the main steps in realizing bureaucratic reform. Keywords— Higher Education, Bureaucratic Reform, Information Technology.
Enhanced Audio Steganografi dengan Algoritma Advanced Encryption Standard untuk Pengamanan Data pada File Audio
Ida Bagus Adisimakrisna Peling;
Nyoman Putra Sastra
Jurnal Teknologi Elektro Vol 17 No 1 (2018): (Januari - April) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (453.089 KB)
|
DOI: 10.24843/MITE.2018.v17i01.P09
Ease of accessing and delivering information makes the Internet more and more needed. But the ease also provides greater opportunities for leaking of information that is confidential. To handle the security of information exchange that is confidential then developed the method of data security on audio using AES (Advanced Encryption Standard) and EAS (Enhanced Audio Steganography) algorithm. From the research results can be concluded by using AES method as cryptography and EAS as steganography, audio file quality can be said good because of the overall test scenario conducted the lowest SNR value obtained is 49.33dB while the highest SNR value is 51.10dB.
Analisis Performansi Dan Efisiensi Cloud Computing Pada Sistem Perbankan
Ketut Adi Kurniawan;
N Putra Sastra;
M Sudarma
Jurnal Teknologi Elektro Vol 19 No 1 (2020): (Januari - Juni ) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.24843/MITE.2020.v19i01.P02
The use of physical server for Bank Mandiri branch office operations has several shortcomings, namely the high server procurement costs, limited part upgrading, maintenance costs, land requirements and electricity consumption. An alternative that can be used is cloud computing technology based on virtualization with the ROCCA adoption method. In this research, cloud computing is implemented to run the operational applications of Bank Mandiri branch offices using Microsoft Hyper-V virtualization. Then the performance and value of cost efficiency are compared to the physical server. Implementation results indicate the ROCCA method can be used for cloud computing adoption in the banking sector. Measurement of physical server performance reaches a score of 36% while the cloud server 9%, physical server memory reaches a score of 35% while the cloud server 50%, and the physical server harddisk reach a score of 48% and cloud server 52%. A higher percentage indicates better performance. Regarding to network speed, the physical server reaches a bandwidth of 94.9 Mbits / sec, while the cloud server 94.1 Mbits / sec. In terms of investment efficiency is not too significant, where in 5 years the efficiency value is 1.8% and for 10 years it is 2.81%.