Edita Rosana Widasari
Fakultas Ilmu Komputer, Universitas Brawijaya

Published : 57 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Implementasi Gateway berbasis NRF24L01 dan ESP8266 pada Protokol Message Queue Telemetry Transport - Sensor Network (MQTT-SN) Harry Mulya; Sabriansyah Rizqika Akbar; Edita Rosana Widasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 1 No 12 (2017): Desember 2017
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1539.626 KB)

Abstract

Wireless Sensor Network (WSN) is a wireless network that consists of multiple sensor nodes. WSN can be implemented using a Message Queue Protocol Telemetry Transport (MQTT). MQTT is a protocol that runs of the TCP / IP protocol, so each node that doesn't have a network interface can't use this protocol. Message Queue Telemetry Transport protocol - Sensor Node (MQTT-SN) was created to connect the devices. The gateway is an intermediary between the sensor nodes that run in the MQTT-SN protocol with the broker that runs on the MQTT protocol. Advertisement and discovery is a mechanism used for the client to traces the identity of the gateway, so the client can connect with the gateway. This mechanism is very important because it is the first process before doing other processes such as publishing process. Therefore, this research proposed to implement the mechanism on microcontroller arduino pro-mini and NRF24L01 as communication module. The result of this research is the client able to recognize the existing gateway ID and gateway managed to pass data onto the client to the broker, which marked the receipt of the data by the subscriber.
Implementasi Sistem Pendeteksi Ketinggian Air Dengan Menggunakan Wireless Sensor Network Node Point To Point Moch Rizki Cahyadi; Sabriansyah Rizqika Akbar; Edita Rosana Widasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 2 (2018): Februari 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1352.118 KB)

Abstract

Siltation caused by erosion of soil in river is also a constriction caused by existence of illegal buildings built in watershed. This condition causes water capacity of river smaller, causing river overflow and flooding occurs. Use ultrasonic sensors as water level detection can done to determine increase water level in river. Sending one data to one computer becomes ineffective because the number of devices required. Point-to-point routing method can be a solution to solve problem. Through this method, user doesn't need to monitor one data from one node. River height data will sent by nodes to gateway so that only requires one device connected to computer. This research implements point-to-point routing as communication method of river water level detection system using nRF24L01 communication module. The system designed to transmit obtained data by node to gateway. Gateway will receive data from node, then program will created display in graphical form. From the results of tests conducted level of accuracy of ultrasonic sensors more than 89%. The data reading on the prototype has an accuracy 80%. Data delivery has 100% accuracy. System functional test results can display graphs that indicate functionality of mqtt and websocket features on system.
Perancangan Sistem Deteksi dan Pengenalan Rambu Peringatan Menggunakan Metode Template Matching Thomas Oddy Chrisdwianto; Hurriyatul Fitriyah; Edita Rosana Widasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 3 (2018): Maret 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1101.796 KB)

Abstract

Digital image processing is useful for fixing image quality, so it we can recognize objects and provide the information we need. The first step of digital image processing is data acquisition. This process is to get the data that we need from the image. After that is the process of segmentation by grouping the image. The final step is the selection and extracting process, from this process we can analyze and display the information that contained in the image. One of the use of digital image processing is that it can be applied to the vehicle system as automatic driver assistant. With that system we can reduce the rate of accidents caused by human factors. Automatic driver assistant driver system can also help the driver for parking, auto pilot driving, detect traffic signs and assist the driver in performing the appropriate action. In this study, the detected traffic signs was a warning sign. Warning signs have an important role to warn the dangers that drivers must be faced. One of the simplest and easiest methods to recognize images is by using the Template Matching method. This method works by matching the images taken with the template. This method has a high success rate. The results of the program success rate test in recognizing the warning signals reached 88%.
Analisis Performa Centralized Firewall pada Multi Domain Controller di Arsitektur Software - Defined Networking (SDN) Rifki Pinto Hidayat; Rakhmadhany Primananda; Edita Rosana Widasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 7 (2018): Juli 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (845.751 KB)

Abstract

Software Defined Networking is the latest breakthrough in modern network modeling where control plane and data plane have been separated from each other. Where on the SDN control plane is placed on the controller in charge of organizing and providing all the needs that exist in the network. The controller will monitor the state of the network and also perform the repair process in case of damage to the network, one of which can be caused by Denial of Service (DoS) and Distributed - Denial of Service (DDoS) Attacks attacks. With implementing a centralized firewall on the controller, the controller can quickly detect when a network attacks occurs either by hosts hosted on their domains or by hosts in other network domains, so the process of own attack subscribing becomes faster and more effective. That things proved based on the average attack time the required subscription is about 6.042 seconds with average use of cpu resource is 18.4% and bitrate received by host victim 13.582 Kbps after attacking by the controller, indicating that the implementation of centralized firewall in the controller can quickly detect and subscribe to attack that occur, using a resource cpu that is not too large and pressing the number of packets of data sent so as to save on bandwidth usage in the network.
Analisis Performa Routing SPIN (Sensor Protocol for Information Via Negotiation) pada Wireless Sensor Network Salsabila Salsabila; Rakhmadhany Primananda; Edita Rosana Widasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 9 (2018): September 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (708.331 KB)

Abstract

Wireless Sensor Network is a network consisting of several nodes that have dynamic properties. This technology can be used to solve existing problems on routing. An example is SPIN routing. In this research the writer tries to analyze SPIN-BC and SPIN-RL routing, which SPIN-BC and SPIN-RL routing can overcome traffic queue on data delivery and can communicate more than one node (broadcast). The research aimed at determining the performance of SPIN-BC and SPIN-RL. routing anymore and the performance of both routing that were done by testing with some parameters. These parameters were Average Latency, Number Data Packets Forwarded, Tx Power, Number Tx.Frames and Memory Node. In the test that had been done by SPIN-BC and SPIN-RL routing with nodes of 4,8,12,16, and 20 had latency mean value of 0.01856 ms, while the SPIN-RL routing had an average value of 0.83633 ms. The average test of NB Packet Data Forward on SPIN-BC routing was obtained averaged of 1.605 ms and SPIN-RL was obtained average of 7.88917 ms. The average value that was obtained by TX Power on SPIN-BC and SPIN-RL routing testing was 0.63292 mw. Furthermore, the average result that was obtained from Nb Tx Frame parameter on SPIN-BC routing was 1.7 ms, while SPIN-RL was obtained average of 7.9 ms. Then the test of the average result from the memory node was on SPIN-BC 7,56 MB, and SPIN-RL 34,454 MB. Based on the average results above, it can be concluded that SPIN-RL had better performance compared with SPIN-BC, because SPIN-RL can cope with command transmission error that was caused by data loss.
Analisis Perbandingan Kinerja Protokol AOMDV, DSDV, Dan ZRP Sebagai Protokol Routing Pada Mobile Ad-Hoc Network (MANET) Fatkhurrozi Fatkhurrozi; Edita Rosana Widasari; Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 10 (2018): Oktober 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (707.941 KB)

Abstract

Natural disaster is an event that can cause damage to communication network's infrastructure in a region. Therefore, a network technology that is able to run independently without the infrastructure of communication and internet networks; such as BTS, router, or access point, is required. The technology is called Mobile Ad-Hoc Network (MANET). MANET is a wireless network consisting of a set of mobile nodes that communicate in a multi-hop manner inside a dynamic topology without depending on a supporting infrastructure. MANET routing protocols are generally classified into three types, such as reactive, proactive, and hybrid routing protocols. These three types of routing protocols have different algorithms in route search methods. Among the three types of routing protocols, there are AOMDV, DSDV, and ZRP. This research was propsed to compare the performance of three different types of routing protocols, such as AOMDV, DSDV, and ZRP when simulated in different scopes. Simulations were performed using Network Simulator 2 and measured by four parameters such as throughput, end-to-end delay, packet delivery ratio, and normalized routing load. Based on the tests that were conducted in different range area and number of mobile nodes scenarios, it can be concluded that AOMDV has the highest average packet delivery ratio and throughput value. On the other hand, it was found that the best average value was obtained by DSDV protocol during the measurement of end-to-end delay and normalized routing load.
Implementasi Wireless Sensor Network Pada Keamanan Rumah Menggunakan Sensor Pir Muhammad Risyat Nashrullah; Rakhmadhany Primananda; Edita Rosana Widasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (531.028 KB)

Abstract

Home security is a matter of privacy, many people keep property at home. Many criminal acts and increasing from year to year make people become uneasy. One such crime is theft in a house left behind by the inhabitants. To overcome the crime of theft is needed a security system in an empty house. However, home security systems made so far still have many drawbacks such as, security is only focused on one point, security guard rental to keep the house at risk of theft with violence, installing CCTV at risk of the perpetrator can damage CCTV so difficult in observation. Wireless Sensor Network (WSN) is an embedded system equipment in which there is one or more sensors and equipped with communication system equipment. By utilizing WSN technology can be made home security system that can monitor many points and communication between points done wirelessly. Transceiver module used in this research is wifi module ESP8266 and protocol that used is Hypertext Transfer Protocol (HTTP). Based on the results of tests conducted on wireless delivery has a success rate of 100% at a distance of 5 meters between the point of installation of sensors with human objects, and at a distance of 6 meters sensors can detect but has a success rate of 70%. Based on the results of testing the system as a whole, the system can be controlled and provide reports through android applications online with a success rate of 100%.
Prototipe Sistem Keamanan Parkir berbasis Teknologi RFID Sasmita Eko Raharjo; Agung Setia Budi; Edita Rosana Widasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 3 (2022): Mei 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Parking is a process for every vehicle that stops at a certain place. Parking areas owned by agencies, institutions, and institutions should prioritize service and security for the sake of parking eligibility. The parking system that has been implemented so far is still being implemented with limited number of human guards, so it has many loopholes for theft to occur without the vehicle owner knowing. RFID technology is a solution for today in solving the problem of theft and contactless technology. Several studies have been conducted, many of which are used only as a parking area monitoring tool. The lack of a system/tool that is usually used to respond when a vehicle is lost belonging to a parking area user is a problem for both the parking area owner and the vehicle owner. This security system is made using RFID technology, Load-Cell sensors, and GSM modules as a solution to related problems. From the manufacture of the system, of course, it is necessary to test the problem of delay or response speed when a theft occurs. The results of the tests and analyzes carried out get pretty good numbers, namely around 2 seconds to provide notification in the form of SMS to vehicle owners, and about 5 seconds for the system to close the portal when it is open. The response given is the result of data transactions from the sensor node to the Gatekeeper node using the ESP-NOW protocol communication. The Gatekeeper node is also used to communicate with the basis data, in terms of verifying whether the user is registered or not. Registered user data will of course be recorded when accessing the parking area when entering or exiting and displayed on a web page.
Pengendalian Kelembaban dan PH pada Alat Semai Otomatis berdasarkan Sensor Kelembaban, PH, dan Arduino menggunakan Regresi Linier Dody Kristian Manalu; Hurriyatul Fitriyah; Edita Rosana Widasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 4 (2022): April 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Humidity and acidity (PH) are essential factors because if rockwool is too acidic not moist or dry the plant growth rate will be slower. A pH that is too acidic or alkaline can result in the deposition of nutrients and inorganic substances in hydroponics so that plant growth is less than optimal. Temperature also plays an important role in plant growth. With this the author will create a system using a Soil Moisture sensor a PH-4502C sensor and a Linear Regression method that is connected to the Arduino Uno and will issue an output that is flowing water through a water pump with the condition that the humidity in the rockwool has not met the set point as well as for the pH will flow PHUP water if the pH conditions on Pakcoy plants are low and will flow PHDOWN if the pH conditions on Pakcoy plants are high. For this system there are 25 training data including 20 data as training data and 5 data as test data. The results obtained from the Linear Regression test are MAPE and RMSE for humidity 5,1% and 0.12 while for PH are 5,2% and 0.17 and the results of Pakcoy seed plants can grow perfectly as expected.
Simulasi Algoritme Hector SLAM untuk Pemetaan 2D pada Quadcopter berbasis ROS Selina Kusmiawati; Eko Setiawan; Edita Rosana Widasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 5 (2022): Mei 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Quadcopter is an Unmanned Aerial Vehicle (UAV) that is deployed to operate in areas that are not maximally accessible by Unmanned Ground Vehicles (UGV) in geographic structures that have been distorted due to natural disasters. Quadcopter requires the ability to recognize the surrounding environment by using a map. A map is a set of features that describe the environment such as walls, obstacles, landmarks, etc. Maps are relatively easy to make in a static environment, but in a disaster-damaged environment, maps will be more difficult to create because the environment has changed. The solution to this problem is that the quadcopter must be able to build its own environmental map. To build a map, a mapping process is needed that can be done using Simultaneous Localization and Mapping (SLAM). Hector SLAM is one of the SLAM algorithms which works based on scan matching technique and without odometer. Simulations were carried out to test the 2D mapping results from the Hector SLAM algorithm. The mapping was carried out with a LiDAR sensor embedded in the quadcopter and tested in 3 different environments. Simulations were carried out with 3D Gazebo and Rviz simulators based on Robot Operating System (ROS). There are 36 test scenarios carried out with the best map accuracy obtained with a Structural Similarity Index (SSIM) value of 0.78, Mean Squared Error (MSE) value of 5344.1, and Pixel Matching percentage of 89.59%.