Claim Missing Document
Check
Articles

PROTOTIPE SISTEM MONITORING DAN PENGGANTIAN OTOMATIS INTRAVENOUS FLUID DROPS Afrizal Awlan Suryandaru; Nyoman Putra Sastra; Gst A Komang Diafari Djuni
Jurnal SPEKTRUM Vol 8 No 2 (2021): Jurnal SPEKTRUM
Publisher : Program Studi Teknik Elektro UNUD

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/SPEKTRUM.2021.v08.i02.p27

Abstract

The giving of intravenous fluids to patients is dispense fluids into the veins using aninfusion set with a certain amount and period. Patients who are given intravenous fluids willconstantly be monitored by a nurse manually and regularly. In this study, a monitoring systemand automatic replacement of intravenous fluids drops were designed to make it easier fornurses to monitor and change infusions automatically. The monitoring system is designed totake advantage of the Telegram communication application integrated with the NodeMCUESP8266. In contrast, the automatic replacement system utilizes an infrared sensor to detectfluid availability. Based on the research results, the infrared sensor will have a logic '1' if infusionfluid is more than 50ml, and the sensor will have a logic '0' if infusion fluid is less than 50ml. Thefastest system response to send sensor data to Telegram Bot reached 01.10 seconds, while thefastest system response to receive orders from Telegram Bot reached 05.70 seconds.
OPTIMASI NIRKABEL LOCAL AREA NETWORK FAKULTAS TEKNIK KAMPUS SUDIRMAN UNIVERSITAS UDAYANA Komang Yuda Krisnawan; Nyoman Putra Sastra; N.M.A.E.D. Wirastuti
Jurnal SPEKTRUM Vol 5 No 1 (2018): Jurnal SPEKTRUM
Publisher : Program Studi Teknik Elektro UNUD

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (888.547 KB) | DOI: 10.24843/SPEKTRUM.2018.v05.i01.p15

Abstract

One of the changes in the field of telecommunications is the use of wireless technology. Wireless technology is applied to computer networks better known as Wireless Local Area Network (WLAN). Network coverage quality measurements can be seen from categories of delay or suspension, excess queues on the network, increased traffic, and output results. By using Wi-Fi Analyzer and Ekahau software we get the Quality of Service (QoS) value to see how good the coverage of the existing wireless network is. The result of the measurement is analyzed to get the adjustment of the wireless area coverage formula so that it can find the maximum range used as a reference in placing the ideal access point. The addition of access point points is done on all buildings where at some point the area can not be reached as a whole.
TAMEx framework as an alternative for e-exam implementation in wireless network Gede Sukadarmika; Rukmi Sari Hartati; Linawati Linawati; Nyoman Putra Sastra
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 5: October 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i5.15774

Abstract

One of significant change in learning process is exam implementation applying a computer-based test (e-exam) rather than paper-based test. Many institutions currently use wireless network with bring your own device (BYOD) policy for their e-exam implementation, due to limitation of space and user terminals. Moreover it is hard to maintain the availability of reliable signal quality in wireless network for all users during e-exam process. Therefore, this research proposes a development of time adaptive for mobile exam (TAMEx) framework to provide all users with good quality of service of e-exam in wireless network environment when dealing with signal quality variations. The received signal strength indication (RSSI) is the main indicator of the signal quality. The framework supports e-exam implementation in wirelesslocal area network and the use of BYOD mechanism. The research shows that the framework successfully has provided time compensation for the users who experienced temporary connection loss due to bad signal quality. The result exhibits that tiny processing time has been needed for signal loss detection, user’s request of compensation time, and server’s execution. In conclusion, the TAMEx could guarantee good services for all users who doing e-exam in wireless network environment.
Evaluasi Pengembangan Disaster Recovery Center untuk Data Center Universitas Udayana Kheri Arionadi Shobirin; Nyoman Putra Sastra; Made Sudarma
Jurnal Teknologi Elektro Vol 20 No 1 (2021): (Januari - Juni ) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/MITE.2021.v20i01.P20

Abstract

Data Center has a vital and strategic role in supporting university operations. Based on Government Regulation No.17 of 2019 article 20 section 1: Every Data Center owner must have a Disaster Recovery Center. Evaluation of Disaster Recovery Center Development for Udayana University Data Center conducted by considering aspects of natural threats, human threats, environmental threats, existing Data Center specification, virtualization, and cloud technology used to maintain the availability of Data Center services for Udayana University with the most efficient development costs. Using cost comparation for DRC development and operation for 3 years, found that implementation cost of Cloud DRC 3 times higher compare to Conventional DRC. High cloud computing cost contribute 67% of Cloud DRC cost structure.
Penerapan Keamanan Jaringan Menggunakan Sistem Snort dan Honeypot Sebagai Pendeteksi dan Pencegah Malware Agus Riki Gunawan; Nyoman Putra Sastra; Dewa Made Wiharta
Jurnal Teknologi Elektro Vol 20 No 1 (2021): (Januari - Juni ) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/MITE.2021.v20i01.P09

Abstract

Intisari- Sistem komputer yang terkoneksi jaringan internet beresiko terhadap ancaman atau serangan. Sistem Snort dan Honeypot merupakan sistem kemanan berlapis yang dimana jaringan internal akan di awasi selama 24 jam setiap harinya, sehingga jika terdapat data masuk yang mencurigakan sistem akan memberikan informasi otomatis bahwa adanya serangan berupa malware atau hacker. Snort dapat mendeteksi dan menyimpan 250519 jumlah data dengan 27 atribut yang disediakan Snort secara default. Honeypot dapat mendeteksi dan menyimpan sebanyak 248.574 data yang dimana tercatat 10 jenis serangan. System honeypot mendeteksi 10 jenis serangan yang berbeda dengan IP address pada setiap serangan. Dari 10 jenis serangan diambil 5 jenis serangan terbesar dan 5 IP address terbesar pada setiap jenis serangan. Sehingga fungsi sistem snort dan honeypot telah dapat mendeteksi adanya serangan serta menyimpan data penyerang pada sistem, dan dapat berjalan secara bersamaan pada satu jaringan. Kata kunci : Snort IDS, Honeypot, Keamanan Jaringan, Malware
LOAD BALANCING UNTUK PERBANDINGAN KINERJA VIRTUALISASI SERVER VMWARE DAN XEN SERVER I Gede Primanata; Nyoman Putra Sastra; Dewa Made Wiharta
Jurnal SPEKTRUM Vol 5 No 1 (2018): Jurnal SPEKTRUM
Publisher : Program Studi Teknik Elektro UNUD

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (526.465 KB) | DOI: 10.24843/SPEKTRUM.2018.v05.i01.p05

Abstract

This study aims to compare VMware server virtualization technology and Xen server that simulates hardware into the software. In order to share loads can be balanced on both virtual servers, this research used HAproxy as Load Balancing which is implemented on Apache Web Server so performance from CPU usage side, memory and access speed from VMware and Xen server virtualization can be compared. By comparing these two models, it is expected to be used as a reference for selecting virtualization models for shared resource needs on one or more physical servers. From the results of testing in this study, it was found that the performance of VMware is better than Xen when viewed from the CPU usage. CPU usage in VMware is lower than Xen with 1.57% when handling one website and 1.58% when handling two websites. In terms of memory usage Xen Server is more efficient in memory usage when compared to VMware, Xen is more efficient memory of 29.11% and 34.84% for handling one and two websites when compared to VMware. While in terms of data access speed on Xen faster than VMware, which is about 42,132 Kbps.
Token-based Single Sign-on with JWT as Information System Dashboard for Government I Putu Arie Pratama; Linawati Linawati; Nyoman Putra Sastra
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 4: August 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i4.8388

Abstract

Various web-based information systems are developed by Indonesian government to improve quality of services for their society. It encourages users, generally civil servants, to perform different authentications on used information systems and have to remember credentials. Account management of the users poses another challenge for administrators. Single Sign-On (SSO) can be the solution by providing a service of centralized authentication and user account management. This study applies a token-based SSO architecture and uses Json Web Token (JWT) to grant permission authorities, since JWT can provide a claim process between 2 parties. Additionally, the built-in dashboard lists associated information systems to facilitate accessing for the authenticated users. This study will discuss JWT implementation on the dashboard of government information systems that implements SSO, which will generate the permission authorities securely for connected information systems on SSO.
Penerapan Teknologi Informasi dalam Reformasi Birokrasi pada Bidang Pendidikan dian krisnandari; Dewa Made Wiharta; Nyoman Putra Sastra
Jurnal Teknologi Elektro Vol 18 No 2 (2019): (Mei-Agustus) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (509.747 KB) | DOI: 10.24843/MITE.2019.v18i02.P19

Abstract

Universities are currently implementing information technology to create bureaucratic reform. This is done because the demands of the era and information technology are increasingly growing to be more sophisticated. In higher education both management and service are supported by the role of information technology. In the application of information technology, it certainly must be supported by apparatus resources that have good performance. In higher education the application of information technology is used in managing performance and service management. The application of information technology in performance management will encourage universities to achieve their mission. While in the service process, the application of information technology will have a positive impact because services will be carried out efficiently, effectively and transparently. Information technology is applied to services to create a service that is fast, precise, efficient and professional. In addition, to create good governance in bureaucratic reform, information technology must be integrated so as to foster rapid information between units in higher education. The application of information technology in higher education is one of the main steps in realizing bureaucratic reform. Keywords— Higher Education, Bureaucratic Reform, Information Technology.
Enhanced Audio Steganografi dengan Algoritma Advanced Encryption Standard untuk Pengamanan Data pada File Audio Ida Bagus Adisimakrisna Peling; Nyoman Putra Sastra
Jurnal Teknologi Elektro Vol 17 No 1 (2018): (Januari - April) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (453.089 KB) | DOI: 10.24843/MITE.2018.v17i01.P09

Abstract

Ease of accessing and delivering information makes the Internet more and more needed. But the ease also provides greater opportunities for leaking of information that is confidential. To handle the security of information exchange that is confidential then developed the method of data security on audio using AES (Advanced Encryption Standard) and EAS (Enhanced Audio Steganography) algorithm. From the research results can be concluded by using AES method as cryptography and EAS as steganography, audio file quality can be said good because of the overall test scenario conducted the lowest SNR value obtained is 49.33dB while the highest SNR value is 51.10dB.
Analisis Performansi Dan Efisiensi Cloud Computing Pada Sistem Perbankan Ketut Adi Kurniawan; N Putra Sastra; M Sudarma
Jurnal Teknologi Elektro Vol 19 No 1 (2020): (Januari - Juni ) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/MITE.2020.v19i01.P02

Abstract

The use of physical server for Bank Mandiri branch office operations has several shortcomings, namely the high server procurement costs, limited part upgrading, maintenance costs, land requirements and electricity consumption. An alternative that can be used is cloud computing technology based on virtualization with the ROCCA adoption method. In this research, cloud computing is implemented to run the operational applications of Bank Mandiri branch offices using Microsoft Hyper-V virtualization. Then the performance and value of cost efficiency are compared to the physical server. Implementation results indicate the ROCCA method can be used for cloud computing adoption in the banking sector. Measurement of physical server performance reaches a score of 36% while the cloud server 9%, physical server memory reaches a score of 35% while the cloud server 50%, and the physical server harddisk reach a score of 48% and cloud server 52%. A higher percentage indicates better performance. Regarding to network speed, the physical server reaches a bandwidth of 94.9 Mbits / sec, while the cloud server 94.1 Mbits / sec. In terms of investment efficiency is not too significant, where in 5 years the efficiency value is 1.8% and for 10 years it is 2.81%.
Co-Authors A.A.N. Amrita Afrizal Awlan Suryandaru agung aditya nugraha Agus Riki Gunawan Agus Supranartha Anak Agung Bagus Rama Windhu Putra Asri Prameshwari Bayu Bimantara Putra Cokorda Gde Wahyu Pramana D. M. Wiharta Dewa Made Wiharta Dewa Made Wiharta Dewa Made Wiharta Dewa Made Wiharta dian krisnandari Duman Care Khrisne Dwi Yoga Pratama Fajar Purnama Gamantyo Hendrantoro Gede Sukadarmika Gede Sukadarmika Gede Sukadarmika Gst A Komang Diafari Djuni Gusti Ketut Bella I G. A. K. Diafari Djuni Hartawan I Gede Made Surya Bumi Pracasitaram I Gede Primanata I Gusti Ayu Garnita Darma Putri I Gusti Made Arya Sasmita I Ketut Gede Darma Putra I Ketut Sukawanana Putra I Made Agung Pranata I Made Arsa Suyadnya I Made Oka Widyantara I Made Oka Widyantara I Made Rai Suarimbawa I Made Sastra Dwikiarta I Made Sudarma I Made Sukarsa I Putu Agus Eka Darma Udayana I Putu Aldha Rasjman Sayoga I Putu Arie Pratama I Putu Bayu Negara I Putu Suryadharma I Wayan Adi Juliawan Pawana I Wayan Krisna Saputra I Wayan Manik Suhartanta Ida Bagus Adisimakrisna Peling Ida Bagus Vidananda Agastya Ketut Adi Kurniawan Kheri Arionadi Shobirin Komang Sri Utami Komang Tania Paramecwari Komang Yuda Krisnawan Kurniawijaya, Putu Andhika L. linawati Lie Jasa Linawati . Linawati Linawati Linawati Linawati M Sudarma M. Azman Maricar Made Sudarma made sutha yadnya Michael Angelo Vincensio Simon Muhammad Anshari N.M.A.E.D. Wirastuti Negara, I Putu Bayu Ni Komang Ayu Sri Anggreni Ni Komang Utari Yulianingsih Ni Putu Diah Arista Ningsih Nicko Satrio Pambudi NMAE Dewi Wirastuti Nurulita Aini nyoman pramaita Oka Widyantara Pande Ketut Sudiarta Pasek Agus Ariawan Putu Andhika Kurniawijaya Rio Juniyantara Putra Rukmi Sari Hartati Rukmi Sari Hartati Widyadi Setiawan Wirawan Wirawan Yohanes Hendra Nugroho