Rakhmadhany Primananda

ORCID: 0000-0003-0551-9410
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • IoT-based Control Systems
  • IoT and GPS-based Vehicle Safety Systems
  • IoT Networks and Protocols
  • IoT-based Smart Home Systems
  • Data Mining and Machine Learning Applications
  • Edcuational Technology Systems
  • Advanced Malware Detection Techniques
  • Decision Support System Applications
  • Chaos-based Image/Signal Encryption
  • Context-Aware Activity Recognition Systems
  • Multimedia Learning Systems
  • Computer Science and Engineering
  • Cryptographic Implementations and Security
  • Traffic Prediction and Management Techniques
  • Engineering Education and Technology
  • Engineering and Technology Innovations
  • Vehicular Ad Hoc Networks (VANETs)
  • Educational Methods and Technology
  • Coding theory and cryptography
  • Caching and Content Delivery
  • Mobile and Web Applications
  • Image Retrieval and Classification Techniques
  • Fire Detection and Safety Systems
  • Blockchain Technology in Education and Learning

University of Brawijaya
2017-2023

Keterbatasan sumber daya dalam implementasi server menjadi salah satu aspek yang perlu diperhatikan. Penggunaan Raspberry Pi, merupakan sebuah perangkat dengan ukuran kecil dan dapat digunakan sebagai fisik konsumsi rendah, solusi. Namun, untuk menghindari overload pada penggunaan cluster pemerataan beban kerja dari ke lainnya relevan. Cluster menggunakan Docker swarm memungkinkan pengaturan lebih mudah efisien banyak node cluster. Pemerataan load balancing algoritma Least Connection....

10.25126/jtiik.1229452 article cc-by-sa Jurnal Teknologi Informasi dan Ilmu Komputer 2025-04-24

Keterbatasan sumber daya dalam implementasi server menjadi salah satu aspek yang perlu diperhatikan. Penggunaan Raspberry Pi, merupakan sebuah perangkat dengan ukuran kecil dan dapat digunakan sebagai fisik konsumsi rendah, solusi. Namun, untuk menghindari overload pada penggunaan cluster pemerataan beban kerja dari ke lainnya relevan. Cluster menggunakan Docker swarm memungkinkan pengaturan lebih mudah efisien banyak node cluster. Pemerataan load balancing algoritma Least Connection....

10.25126/jtiik.2025129452 article cc-by-sa Jurnal Teknologi Informasi dan Ilmu Komputer 2025-04-24

ADHD (Attention Deficit Hyperactivity Disorder) adalah gangguan perkembangan otak pada anak yang mengakibatkan meningkatnya aktifitas motorik sehingga menyebabkan penderitanya menjadi hiperaktif, impulsif dan inatentif. Kondisi ini sering memperlihatkan tingkah laku tidak wajar seperti selalu bergerak tanpa tujuan, gelisah, atau bisa duduk dengan tenang. Gangguan terbagi tiga jenis yaitu Hiperaktif, Inatentif Impulsif. Salah satu cara untuk mendiagnosa diderita oleh konseling. Tujuan dari...

10.25126/jtiik.2019621265 article ID cc-by-sa Jurnal Teknologi Informasi dan Ilmu Komputer 2019-02-25

Nowadays, Wireless Sensor Network (WSN) is rapidly growing because it can be applied in various fields such as agriculture, transportation, and mining. Security one of the main focuses development wireless sensor networks. In this paper, a Hybrid Cryptography security mechanism was implemented using an Advanced Encryption Standard (AES) encryption algorithm to carry out data Hash-based Message Authentication Code (HMAC) ensure integrity. testing done by performing brute force...

10.1145/3479645.3479694 article EN 2021-09-13

Smart home system is one of the most popular applications and research interests in past decade. This can give many features such as monitoring, appliance control, automation system, energy-saving, security. A smart normally has a centralized architecture. architecture gives advantage being easy to manage. However, fault-tolerance problem. If center (master station) down, then entire will be failed. needs mechanism avoid failure when master station down. Furthermore, for big scale...

10.1145/3427423.3427458 article EN 2020-11-16

The widespread use of Internet Things (IoT) has effect in a growing number hardware devices that can be controlled and monitored using variety applications. It affects the amount data must collected to analyzed processed according user requirement. greater results requirement storage media access management scalability are effective efficient. cloud-based infrastructure namely Openstack. Implementation this research by involving two physical device server as main located network Faculty...

10.25126/jitecs.201942100 article EN cc-by-sa Journal of Information Technology and Computer Science 2019-10-14

<p class="Abstrak"><span>Permasalahan pada sistem di gedung parkir bertingkat salah satunya sulit menemukan ruang yang kosong. Adanya dinding beton tebal dan struktur bangunan dengan beberapa lantai mengakibatkan jarak pandang pencarian berkurang.</span><span>Berdasarkan hal ini, dibutuhkan s</span><span lang="IN">istem</span><span lang="IN">untuk memberi informasi ketersediaan tiap agar </span><span>ruang</span><span...

10.25126/jtiik.20231036073 article ID cc-by-sa Jurnal Teknologi Informasi dan Ilmu Komputer 2023-07-01

Kesehatan merupakan faktor penting dalam kehidupan manusia. Oleh karena itu, paper ini kami menawarkan pendekatan efektif dan efisien mendeteksi dini kesehatan. Deteksi dapat menghindari berbagai risiko penyakit terhindar dari komplikasi, serta menghemat biaya pengobatan. Sebagian besar alat deteksi kesehatan menggunakan metode invasif, sementara sistem contactless. Sensor pulse Oximater MAX30100 sensor suhu MLX90614 digunakan untuk mengukur tingkat saturasi oksigen, detak jantung tubuh....

10.25126/jtiik.20231056956 article ID cc-by-sa Jurnal Teknologi Informasi dan Ilmu Komputer 2023-10-30

Internet of Things (IoT) technology is one the supporters Industry 4.0 which requires a minimum human error and runs 24/7 so that easier to manage more accurate without intervention. One current trending IoT communication modules Long Range (LoRa). LoRa has advantage long distances energy-saving modules. However, also drawback where it transmits data via radio waves other with same frequency can receive even though they are not legitimate recipients. Therefore, this study implements MICKEY...

10.1145/3626641.3627018 article EN 2023-10-24

A vehicle accident report system was designed to detect accidents accurately and send message related person. However, after accident, some components or modules can be damaged it may cause failure of detection. Therefore, Triple Modular Redundancy (TMR) method implemented in the mask faults within ensure continue working. TMR is one passive hardware redundancy methods. The includes three MPU-6050 sensors functioning as tilt provide redundancy, a TC9548A module serving an I2C multiplexer,...

10.25126/jitecs.202383569 article EN cc-by-sa Journal of Information Technology and Computer Science 2023-12-15

Kesehatan merupakan faktor penting dalam kehidupan manusia. Oleh karena itu, paper ini kami menawarkan pendekatan efektif dan efisien mendeteksi dini kesehatan. Deteksi dapat menghindari berbagai risiko penyakit terhindar dari komplikasi, serta menghemat biaya pengobatan. Sebagian besar alat deteksi kesehatan menggunakan metode invasif, sementara sistem contactless. Sensor pulse Oximater MAX30100 sensor suhu MLX90614 digunakan untuk mengukur tingkat saturasi oksigen, detak jantung tubuh....

10.25126/jtiik.2023106956 article ID cc-by-sa Jurnal Teknologi Informasi dan Ilmu Komputer 2023-10-30

Permasalahan pada sistem di gedung parkir bertingkat salah satunya sulit menemukan ruang yang kosong. Adanya dinding beton tebal dan struktur bangunan dengan beberapa lantai mengakibatkan jarak pandang pencarian berkurang.Berdasarkan hal ini, dibutuhkan sistemuntuk memberi informasi ketersediaan tiap agar dapat lebih efektif efisien. Sistem ini menggunakan sensor ultrasonik HC-SR04 danmodul transceiver nRF24L01 disertai teknologi Internet of Things diakses melalui Thingspeak LCD 20x4. Pada...

10.25126/jtiik.2023106073 article ID cc-by-sa Jurnal Teknologi Informasi dan Ilmu Komputer 2023-07-01

Internet of Things (IoT) is an interconnection among devices or "things" that exchange data between them. A man-in-the-middle can be performed when two IoT are communicating, therefore secure transmission has emerged as a challenging task. There numbers existing cryptography algorithms offers protection. However, their utilization in questionable since the hardware not suitable for inexpensive yet efficient encryption process. This paper proposed implementation Grain winner eSTREAM project...

10.1109/tssa.2017.8272898 article EN 2017-10-01

Web-based applications can be accessed from anywhere at any time as long the user is connected to internet and works on a different platform. Besides for media information, website in educations used teaching learning activities or known e-learning. The benefits of using e-learning are student learn anytime anywhere, but when connection has problem not reached. In implementation, highly depends stable connection. If there disruption access, system working properly. Delay tolerant networking...

10.1109/siet.2017.8304121 article EN 2017-11-01

Over the past decades, security become most challenging task in Internet of Things. Therefore, a convenient hardware cryptographic module is required to provide accelerated operations such as encryption. This study investigates implementation Lizard cipher on three Arduino platforms determine its performance. successful implementing platform constrained devices and resulting 0.98 MB memory utilization. The execution time compared among variants, i.e Mega, Nano Uno with ANOVA test. Tukey’s...

10.14569/ijacsa.2019.0101169 article EN International Journal of Advanced Computer Science and Applications 2019-01-01

<p>Smart home systems become an interesting topics in the last few years. Many researchers have been studied some features. Most of smart system use a centralized architecture know as (CSHS). The centralizedmechanism is easy to manage and configure. However, fault-tolerant systemparadigm it produces problem. entire will fail, if master station fails.Another problem CSHS mechanism gives more data-flow. This condition makes has greater delay time. To solve problem, we proposea...

10.11591/ijece.v12i4.pp4439-4448 article EN International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering 2022-05-24

Wireless sensor network (WSN) merupakan sistem yang terdiri dari node otonom terdistribusi pada suatu area untuk melakukan fungsi tertentu. Konsumsi energi sangat perlu diperhatikan dalam jalannya WSN maka itu diimplementasikan protokol routing dapat meningkatkan efisiensi salah satunya adalah cluster-based. Protokol Hybrid Energy-Efficient Distributed (HEED) cluster-based dengan komunikasi multi-hop cluster head-nya. Tujuan HEED membentuk baik jaringan. Penelitian ini bertujuan...

10.25126/jtiik.2022976835 article ID cc-by-sa Jurnal Teknologi Informasi dan Ilmu Komputer 2022-12-29

In Computer Vision, Shape Feature is one of the important features besides color and texture. A Geometric type Features uses parameters from Region Interest as input such Area, bounding rectangle's width length, Axis Length, Centroid, Perimeter. The Rectangularity, Eccentricity, Elongation rely on rectangle which invariant to rotation. Circularity rotation scale but only captures general information object's area. This research proposes a basic that invariant. First, it finds centroid using...

10.1145/3568231.3568247 article EN 2022-11-22

LoRa (Long Range) as the latest wireless IoT connectivity is evolving and gaining popularity in low-power operated embedded systems. uses frequency its communication method has a feature called broadcast. In this study connects an end device gateway to transmits data via broadcast with same frequency. However, sent over vulnerable third-party attacks. This proposed security measure form of encryption. SIMON algorithm applied secure important accessed by unauthorized party. There are 10...

10.1145/3568231.3568263 article EN 2022-11-22

Vehicular Ad-hoc Network (VANET) is a type of wireless network with Dedicated Short-Range Communication (DSRC) that enables communication between vehicles (V2V) and to infrastructure around them (V2I). VANET has several security requirements consider in order maintain the functionality. Availability most important requirement due its responsibility maintaining functionality network, attack on availability may cause lack reduce efficiency VANET. One threat black hole. In this paper, we...

10.31937/sk.v14i2.2779 article EN cc-by-sa Ultima Computing Jurnal Sistem Komputer 2022-12-28

Fires in the house occur due to several things, such as an electrical short circuit, and another cause is a gas leak from LPG cylinder. This fire caused by lack of security public knowledge, dangers levels leaking cylinders, presence small fires, temperatures too high these. Fire detectors leaks are provided home environment. detection includes preventive efforts before occurs can be extinguished immediately. The method prototype using MQ-6 sensor, sensor DHT-22 temperature multihop routing....

10.25126/jitecs.72449 article EN cc-by-sa Journal of Information Technology and Computer Science 2022-11-24

Wireless sensor networks (WSN) Environment is a collection of nodes that sensing and sending data to other in large number nodes. One the WSN concepts continuous or periodic collection, then obtained can be further processed. From this process, it possible produce data, so process storing becomes high load. Data from vary greatly, which affects on data. Therefore, study needed analyze WSN's ability send store amounts Message query telemetry protocol (MQTT) used because could save resources...

10.12928/telkomnika.v19i4.18358 article EN cc-by-sa TELKOMNIKA (Telecommunication Computing Electronics and Control) 2021-08-01
Coming Soon ...