Nyoman Bogi Aditya Karna

@https:

Telkom University



                 

https://researchid.co/nyoman.bogi

RESEARCH INTERESTS

Microprocessor, Cybersecurity, Intelligent IoT, Computer Vision, Smart Agriculture, Smart Fishery, Smart Home

40

Scopus Publications

Scopus Publications

  • Efficiency and Effectiveness of Water Sprinkler Usage in Balinese Agriculture
    Dewa Rahyuni, Nyoman Karna, Sofia Hertiana, Sussi, I Nyoman Ganeshan Ananda Putra, I Wayan Risko Surya Cita, I Kadek Andika Herlantika, and Made Adi Paramartha Putra

    IEEE
    As an agricultural country, Indonesia has quite extensive agricultural land so the majority of its population makes a living as farmers. Indonesian Central Bureau of Statistics explains in its report that as of August 2022, 28.6% of the Indonesian population works in the agriculture, forestry, and fishery sectors. The agricultural industry itself has several subsectors, one of which is the horticulture subsector. This subsector is quite popular with farmers because it has crops that are in great demand by consumers and have relatively profitable selling prices. Agriculture in Bali, Indonesia, especially the Sari Karya Tani Group, has complaints about weather factors that affect water availability. Bali is known as an area that has hot and humid weather, which makes farmers complain because they have to prepare an additional budget to buy water and pay for labor to water the plants. After all, horticultural plants require a stable level of soil moisture for the plants’ growth. To solve this problem, the farmers of the Sari Karya Tani Group want to implement a set of plant watering tools (water sprinklers), equipped with IoT devices for monitoring purposes. This sprinkler watering device is capable of shooting water upwards to form rain with a range of 3 to 25 meters, providing 300 liters of water per minute, which can penetrate the ground for 5 to 10 cm deep with 1 hour of watering. The IoT sub-system measures the environment to switched on the water sprinkler.

  • Air Quality Index Mapping Using Programmable Single Propeller UAV Towards Internet of Drone Things
    Nyoman Karna, Muhammad Alfarafi Maulana Firdausa, and Soo Young Shin

    IEEE
    Unmanned Aerial Vehicles (UAVs) with the advances in technologies are becoming more common, UAV has become a platform to gather data that humans simply cannot reach. With the mobility of a drone, it can cover a lot of areas in a single take, greatly benefiting the data gathering process. However, conventional model drones like quadcopter configurations are big and costly for mass implementation such as in Internet of Drone Things. To handle these issues, this research proposed the use of a Single propeller drone design, drone with only 1 propeller, that can lower the cost of making the drone unit and ease the data gathering process. The single propeller drone gathers data for the air quality measurement device that uses DHT22 as the humidity and temperature sensor and MQ-135 as the air quality sensor. From the test result, carried out on Sukapura Football Field, Bandung, Indonesia, the single propeller was able to obtain the air quality, sent it to Google Firebase, and displayed it using smartphone. The test showed a slight difference result in the air quality data between different placements of the sensors on the single propeller drone. The test also showed the difference between stationary single propeller drone, which gave 103 ppm, with hovering drone, which gave 124 ppm. Furter test showed there were no differences between temperature and humidity result, with a maximum of 24oC and 99.6% humidity. Besides the differences in the data quality, the test result was near accurate.

  • Recommendations for Standardizing IoT for Fire Alarm Control Panel Systems: Literature Review
    Fikri Nizar Gustiyana, Rendy Munadi, Nyoman Karna, and I Ketut Agung Enriko

    IEEE
    This research aims to provide recommendations regarding Internet of Things (IoT) standardization that can be applied to Fire Alarm Control Panels (FACP). FACP is a key component in a fire detection system that functions to monitor various fire detection devices, provide warnings, and control functions related to fire safety. With this research, it is hoped that it can recommend system standards for digitizing the FACP system by available literature. This research discusses related literature reviews on IoT architecture, namely the IoT device, IoT network, IoT Platform, and IoT Application sections by the FACP standardization reference. Based on the research results, it is known that the FACP device must have a minimum of 2 power supplies and 2 internet connections, it is recommended to use the MQTT data transmission protocol and display important information in the application section by the rules for displaying information in FACP in the form of location of the fire, the type of alarm, and the status of the detectors and alarms.

  • Smart Greenbox Design for Indoor Horticulture
    Nyoman Karna, Ayyub Nasrah Atmadja, Nurul Azizah, Sussi, and Dewa Rahyuni

    IEEE
    Indonesia is an agrarian country where most of the population is engaged in agriculture. One of the biggest commodities in Indonesian agriculture is the cayenne pepper. Cayenne pepper is a commodity with the highest level of production and demand every year. However, cayenne pepper is a plant that is prone to crop failure. The biggest causes are climate change and lack of knowledge about the parameters that mostly affect the growth of cayenne pepper plants. Therefore, this study aims to help horticulture enthusiasts plant and grow cayenne pepper plants using Smart Greenbox. The Smart Greenbox measures several parameters that affect the growth of a plant, including temperature, humidity, light intensity inside the box, and moisture with the pH level of the soil. All the data measurements will be sent to the IoT cloud so other Smart Greenbox can learn from each other. To help the learning process, a website and growth prediction model using machine learning will be a delivered solution to obtain the most dominant parameters to give optimal growth. The historical data measurement is also stored and displayed on the website to provide feedback for the user to monitor the plant's growth. The overall system test result reports that the device can run optimally 24/7 for 45 days while sending data to Google Firebase every 5 minutes. The website for dashboard functionality can display all information regarding the Cayenne Pepper plant inside the Smart Greenbox.

  • Web Application Firewall Using Proxy and Security Information and Event Management (SIEM) for OWASP Cyber Attack Detection
    Tia Rahmawati, Rama Wijaya Shiddiq, Mochamad Rizal Sumpena, Shendy Setiawan, Nyoman Karna, and Sofia Naning Hertiana

    IEEE
    Web applications face increasing security threats, with a 210% rise in attacks in 2022 compared to 2020, including 172 daily attacks per website and 2,306 weekly bot accesses. The most prevalent vulnerabilities are Cross-Site Scripting (XSS) affecting 1 million websites and SQL injection impacting 332,000 pages. To address these issues, a WordPress plugin is designed, integrating Security Information and Event Management (SIEM) and a proxy-based Web Application Firewall (WAF). The proxy based WAF enhances website security by detecting and blocking malicious requests based on OWASP rules, while SIEM collects and simplifies security data from various sources. This system effectively identifies XSS at 100%, SQL Injection at 97%, and Local File Inclusion (LFI) at 74% according to OWASP standards.

  • Towards Accurate Fused Deposition Modeling 3D Printer Fault Detection using Improved YOLOv8 with Hyperparameter Optimization
    Nyoman Bogi Aditya Karna, Made Adi Paramartha Putra, Syifa Maliah Rachmawati, Mideth Abisado, and Gabriel Avelino Sampedro

    Institute of Electrical and Electronics Engineers (IEEE)
    This research article presents an enhanced YOLOv8 model with an additional feature extraction layer integrated into the traditional YOLOv8 architecture to improve fault detection performance in smart additive manufacturing, specifically for FDM 3D printers. Hyperparameter optimization techniques are employed to ensure the model is trained with optimal input and batch size configurations. The findings demonstrate that the additional module successfully enhances the model’s performance in detecting faults during the FDM 3D printing process. The best results are achieved using the YOLOv8s model with an image input size of 640 and a batch size of 16, achieving a ${\\mathrm {mAP}}_{val}$ (50-95) of 89.7%. Despite the increased complexity from additional layers, there is a favorable trade-off between performance and complexity. Furthermore, a testbed implementation is conducted to validate the model’s performance in a real-world setting, showing that the fault detection latency remains insignificant even with multiple Raspberry Pi clients. Overall, this research provides insights into improving fault detection in smart additive manufacturing and highlights the effectiveness of the proposed YOLOv8 model with additional extraction layers.

  • Implementation and Analysis of Network Security in Raspberry Pi against DOS Attack with HIPS Snort
    Alfarizi Wiranata, Nyoman Karna, Arif Irawan, and Ian Agung Prakoso

    IEEE
    Cyber-attack is an inevitable risk from any business in internet era. Cyber-attack can originate from both internal employees and external sources. The office network can be in danger due to cyber-attack and can disturb the workflow. This issue can be prevented by Host Intrusion Prevention System (HIPS) Snort that secures the network through smart security in a box system with Raspberry Pi as the firewall to protect the user devices against Denial of Service (DoS) attacks. Raspberry Pi is configured to be the firewall with installing the HIPS Snort as a defence system to protect the user's work devices. This smart security in a box is installed between the user's devices before connected to the office network. The smart security in a box detects the misuse in the network for all data packets that are suspected of being DoS attacks and drops them. DoS attacks using SYN Flood and UDP Flood are going to put Snort to the test. The successful client connection when Snort is running are only the average of 48.60% and 46.31% for SYN Flood and UDP Flood attack respectively. When Snort is running, HIPS Snort can drop the average of 41.48% of SYN Flood attack and 28.27% of UDP Flood attack packets. CPU and Memory usage are higher when Snort is running. DoS SYN Flood attack consumes more CPU and Memory usage of Raspberry Pi with the average of 83.60% and 76.75% respectively when Snort is running.

  • Prototype of Chilli Plants Automation System in IoT-Based Smart Greenbox
    Ikram Andika Ukar, Nyoman Karna, and I Putu Yowan Nugraha Suparta

    IEEE
    An example of human hobby of today in urban areas is farming at home. The problem they face is that the majority of people in urban areas are busy with their work from morning to evening, so the plants they care for are difficult to look after. The presence of Internet of Things (IoT) technology is a big breakthrough for the problems that exist in society. With IoT, it is easier for people to monitor and control their plants at any time remotely. This study carried out the development of a prototype of an IoT-based automation system of plant watering for chili plants in a Greenbox. The prototype design of this research automation system is a cartesian robot with X and Y axes. The prototype performs automation depending on the input value of soil moisture or soil pH from the sensor. The result of this research is the achievement of an automation system for watering or giving liquid fertilizer to the Greenbox containing chili plants. The automation is based on input from sensor results. The obtained accuracy of the prototype reaches 95.53% for the X-axis and 99.15% for the Y-axis. The application of this prototype automation system is considered efficient in the use of human power. The quality of data transmission received is also quite good.

  • Implementation of Panic Button and Fingerprint Sensor on Security System RFID Using Internet of Things and e-KTP
    Ni Putu Ika Widiantari, Nyoman Karna, Sussi, I Putu Yowan Nugraha Suparta, and I Kadek Gowinda

    IEEE
    Security is one of the factors that need to be maintained in a scope. Security can be disrupted by threats in form of loss of valuables to violence. This phenomenon became the idea of developing security system based on fingerprint sensor and Radio Frequency Identification (RFID). Right now, Internet of Things (IoT) has implemented in many sectors, one of them is in security system. In this work, authors propose a system called smartdoors using NodeMCU ESP8266 which utilizes the use of RFID sensor and fingerprint sensor as user authentication. The functionality of this system is also tested by measuring effective distance user from fingerprint sensor and RFID sensor using e-KTP and for its performance, Quality of Service (QoS) method is used to measure the quality of this proposed system. From the test results on the RFID sensor, the optimal distance to detect e-KTP is 3.5 cm, while the fingerprint sensor can only be read by sticking it directly. QoS performance on the alert feature produces an average throughput value of 29,622 bps and delay value of 68.90 ms. The open and close features have an average throughput value of 42,156 bps and delay value of 48.57 ms. While the panic button has an average throughput value of 44,795 bps and delay value of 37.33 ms.

  • Vision-based Autonomous Landing System for Quadcopter Drone Using OpenMV
    Rizqy Ilmi Naufal, Nyoman Karna, and Soo Young Shin

    IEEE
    Nowadays, drones have a wider variety of applications. The drones are now used for daily activities that the demand for drones is increase and the shift to a lower price. Then, drones manufactured with poor build quality. Consequently, the drone is now more vulnerable to crashes. The crash on landing is one of the most common errors made by novice users. This research utilizes a vision-based precision landing method for quadcopter drones equipped with low-cost cameras capable of tracking AprilTag. The system deploy the Pixhawk as the flight controller, Mission Planner as the Ground Control Station (GCS) software, the OpenMV H7 camera, telemetry, and a computer. The test results obtained are the outdoor accuracy for 2 m altitude is outdoors 8.94 cm, semi-outdoor 9.1 cm, and indoor 11.7 cm. The average accuracy for 3 m altitude outdoors is 9.35 cm, semi-outdoor 9.45 cm, and indoor 10.8 cm, which indicates the system can perform vision-based autonomous landing for quadcopter.

  • Audio Band Analog Signal Measurement Instrument for Vocational School Practicum Aids
    Nyoman Karna, Ridha Negara, Bagus Aditya, Adinda Fatkhah Gifary, and Dewa Rahyuni

    IEEE
    In 2018, Indonesia has 14,064 vocational school (SMK) with 14,989 computer laboratories. All these computer laboratories are mainly used to provide students with skill about office tasks, such as word processor, spreadsheet, and presentation, with little addition like programming and design skill. As the emerging trends of electronics especially the IoT, it would be prudent to provide such skill to students to understand how signal and system works. However, many measurement instruments are quite expensive and not affordable for many vocational schools. To answer this problem, this research provides a prototype for measurement instrument to show analog signal on audio band (20Hz-20kHz) that utilize the PC in computer laboratories. To ensure students are all have the same understanding on electronics devices, this research also design a lab guide for student’s lab activity. To provide an audio band analog signal measurement instrument, authors use ADC (Analog to Digital Converter) within NodeMCU to create digital oscilloscope and spectrum analyzer.

  • Image-based Transmission Schema for Autonomous Wireless CCTV
    Nyoman Karna, Mulya Safira, and Yosi Madsu

    IEEE
    Regular image transmission on Closed-Circuit Television (CCTV) systems requires good network, especially for transmitting high quality digital image. However, sending high quality digital image through limited bandwidth needs several precautions and treatments, like which image to be sent, how the image will be sent and when. Without these precautions and treatments, in return it will results in energy inefficiency. The main purpose of this research is the power supply efficiency towards high quality digital image transmission schema for autonomous CCTV. This research considers individual but consecutive images transmission rather than video transmission to limit the processing time and power. This research focuses on high quality digital image transmission from a CCTV to collector node through Narrowband Internet of Things (NB-IoT) network. To improve the lifetime of the power supply of the CCTV, this research conducts performance measurement comparing on several digital image compression and transmission algorithm to find optimal bandwidth usage to arrange which data to be sent based on several conditions. The arranged data are sent to the collector node through NB-IoT. This research provides the algorithm in choosing image for transmission to reduce bandwidth usage and power consumption.

  • Security system with RFID control using E-KTP and internet of things
    Andi Ainun Najib, Rendy Munadi, and Nyoman Bogi Aditya Karna

    Institute of Advanced Engineering and Science
    Crimes against property without using violence, in this case, are theft and burglary is the type of crime that is most common every year. However, home security needs a security system that is more efficient and practical. To overcome this, an internet of things (IoT) is needed. This research evaluated the performance prototype by reading distance from the radio frequency identification (RFID) reader using E-KTP and quality of service performance (i.e throughput and delay) from application android. This research design smart door lock using RFID sensor, passive infrared sensor (PIR), solenoid as door locks, buzzer, led, E-KTP as RFID tags and also android application to controlling and monitoring made with android studio is connected to NodeMCU V3 ESP8266 as storage data and connect with firebase realtime database instead of conventional keys. This research focuses on performance prototype and quality of service from features application is work well. Related to previous works, our evaluation shows that the performance prototype can read identity card (E-KTP) with a maximum distance is 4 cm, and performance quality of service for an application show that throughput and delay with a perfect index according to standardization telecommunications and internet protocol harmonization over network (TIPHON) depending on what features are being evaluated.

  • Performance Analysis on Artificial Bee Colony Algorithm for Path Planning and Collision Avoidance in Swarm Unmanned Aerial Vehicle
    Gholiyana Muntasha, Nyoman Karna, and Soo Young Shin

    IEEE
    With the rapid advancement of wireless communication, sensors, and battery technologies, Swarm Unmanned Aerial Vehicles (UAVs) have been widely used for traffic surveillance, and military application. Swarm UAVs, however, need to plan paths through the atmosphere, effectively preventing any collision that can occur when flying a multiple UAV simultaneously. This study proposes to design an anti-collision and a path planning system of swarm UAVs by using Artificial Bee Colony (ABC) algorithm. The ABC algorithm is an optimization method inspired by the foraging behavior of honeybees. The self-organization trait of honeybees enables them to coordinate themselves to create a global and local optimum. The proposed system, however, uses the ABC algorithm to optimize UAV's velocity, i.e., to reach its destination efficiently in the shortest path while avoiding collision among drones. The establishment of a constraint of a minimum acceptable distance among UAVs enables the algorithm to search for an alternative path in avoiding a collision. The simulation, however, reveals a successful convergence of a swarm UAVs towards a destination with no collision. During the trial with 12 and 20 drones, for instance, all UAVs successfully arrive at their goals with 0 potential collisions. However, during the test with 50 drones, there are 12 possible collisions. Once swarm drones reach their goal position at rest, the cluster will not overlap with other agents, as demonstrated in the visualization. Therefore, the ABC algorithm has satisfied the success criteria for this project and is suitable for swarm drone applications.

  • IoT Long Range (LoRa) for Land Boundary Monitoring System
    Zaki Akhmad Faridzan, Ratna Mayasari, and Nyoman Karna

    IEEE
    The increasing population in Indonesia has resulted in an increase in the community's need for land ownership. Although the government has made regulations regarding the installation of land boundary markers using boundary markers, there are still several conflicts over land grabbing which are carried out by removing or removing land boundary markers that have been installed. For this reason, a prototype monitoring system for boundary markers based on the internet of things and a website was designed using the Long-Range (LoRa) module. LoRa or LoRaWAN is a Low Power Wide Area Network (LPWAN) technology. In this monitoring system, there is a GPS module on the LoRa end-device to detect the coordinates of the boundary markers. To make monitoring easier, the website designed will display data from the Firebase database. The system designed has QoS performance with a delay value from the LoRa end-device to the LoRa gateway at the lowest spreading factor of SF7, namely 0.751 seconds, while the highest is SF12, which is 2.514 seconds at a transmission distance of 500 m, and SF7 has the highest percentage of packet loss. The GPS used has an accuracy of 1.329096 m. SF7 has the lowest transmit current consumption compared to other SF when transmitting, namely 11.31 mA.

  • Designing a teaching aid for microprocessor class: Case study microprocessor interconnection with memory
    Gunna Cahya Wardiyani, Nyoman Karna, and Istikmal

    IEEE
    The learning process requires specific methods to achieve effective and efficient learning goals. Learning methodology is a way of carrying out activities between educators and students when interacting in the learning process. One of the learning methodology methods is the demonstration method, which using objects or other teaching materials at the time of teaching. Students expected can understand the correlation between microprocessors and memory practically is one of the main goals in the microprocessor lectures. This research aims to help the learning process in the microprocessors lecture by designing and implementing the teaching aid of the “Microprocessor Interconnection with Memory” module. This aid demonstrates an input and processes it into output in the form of lit LED using the 80C88 Microprocessor. The test results of this aid obtain an average of 75.34% by using the Mean Opinion Score (MOS) method.

  • IDS Performance Analysis using Anomaly-based Detection Method for DOS Attack
    Aghnia Fadhlillah, Nyoman Karna, and Arif Irawan

    IEEE
    Intrusion Detection System (IDS) is a system that could detect suspicious activity in a network. Two approaches are known for IDS, namely signature-based and anomaly-based. The anomaly-based detection method was chosen to detect suspicious and abnormal activity for the system that cannot be performed by the signature-based method. In this study, attack testing was carried out using three DoS tools, namely the LOIC, Torshammer, and Xerxes tools, with a test scenario using IDS and without IDS. From the test results that have been carried out, IDS has successfully detected the attacks that were sent, for the delivery of the most consecutive attack packages, namely Torshammer, Xerxes, and LOIC. In the detection of Torshammer attack tools on the target FTP Server, 9421 packages were obtained, for Xerxes tools as many as 10618 packages and LOIC tools as many as 6115 packages. Meanwhile, attacks on the target Web Server for Torshammer tools were 299 packages, for Xerxes tools as many as 530 packages, and for LOIC tools as many as 103 packages. The accuracy of the IDS performance results is 88.66%, the precision is 88.58% and the false positive rate is 63.17%.

  • Decision Tree-Based Bok Choy Growth Prediction Model for Smart Farm
    Aldi Sulthony Susilo, Nyoman Karna, and Ratna Mayasari

    IEEE
    Indonesia is an agricultural country that has a dependency on the horticulture sub-sector. Bok choy is included in the mustard greens group as one of the strategic products from the horticulture. The needs for mustard greens are getting higher. Based on Indonesia's Central Statistics Agency data in 2019, the mustard beans production rate increased only 2.63% higher than in 2018. If it does not meet the desired supply, it opens the possibility of a lack of bok choy supply at the market, resulting in high potential price fluctuations. These conditions initiate relevant system research to help the farmer develop a bok choy crop reference guide, especially in the seeding phase. In reducing the limitations caused by the lack of science and knowledge in the farmer environment, the prediction model is the proposed outcome by considering the use of IoT mechanism that has widely developed. The model is based on a system that integrates IoT's interest in the agriculture field, namely smart farm, for retrieving real-time data based on automatic control, MySQL database for storing data, and machine learning technique to establish the prediction model as the guide for the farmers to find appropriate parameters for planting bok choy. The prediction model performs using Python, a high-level popular programming language due to its ease and open source. Python interprets the bok choy growth dataset based on the irrigation system scenario from the integrated system with the relevant library of data preprocessing interest and the Decision Tree algorithm of the Scikit-learn library to train the model. The system conducts a series of machine learning phases to take the insight analysis needed to create a prediction model. The model performance metrics as the consideration in deciding the outcome model, which are accuracy and precision.

  • Designing a Teaching Aid for Microprocessor Class Case Study: How Microcontroller Works with Input-Output
    Nyoman Karna, Wina Azhariyati Muchlis, and Istikmal

    IEEE
    Microprocessors are one of the compulsory courses for second year Electrical Engineering's undergraduate student Telkom University. Student learns microprocessor using software simulator, which do not provide hardware simulation. Since learning is more effective and easier if something can be observed directly, this research implements a teaching aid to help the lecturer explaining microcontroller topic. This specific teaching aid can demonstrate the communication between ATmega328P microcontroller with input-output devices (SPST DIP switch, potentiometer, and LED lamps). To test the benefits of the teaching aid, we ask 5 students to try the system out based on the given worksheet. Using subjective test based on MOS (Mean Opinion Score), the teaching aid gives 52% in durability perspective, 74% in accuracy perspective, 70.46% in efficiency perspective, 86% in technical perspective, 94% in aesthetics perspective, and 92% in security perspective.

  • Air Quality Measurement Device Using Programmable Quadcopter Drone Towards Internet of Drone Things
    Nyoman Karna, Deriel Laska Lubna, and Soo Young Shin

    IEEE
    Air pollution is a condition in which air quality is damaged and contaminated either by harmful or harmless substances for living beings. That is the reason why smart cities monitor the air quality. However, the installation for air quality measurement system is mainly in an area where there is a lot of pollution from traffics. This research proposes air quality measurement system over the ground using programmable quadcopter drone towards Internet of Drone Things. The sensors used to measure the air quality are MQ-135 and DHT22. NodeMCU is used to process and send the measurement value to Firebase, which can be further monitored by smartphone in real time. Air quality measurement test was carried out in two places, location 1 is the one with quiet environment and surrounded by trees, and location 2 is a very busy place surrounded with construction sites, each with 3 different altitudes (0, 3, and 5 meters) and 4 different sampling time (09.00, 12.00, 16.00, and 21.00). The system shows that higher altitude (5 meters) gives better air quality index compared to on the ground measurement (0 meter). Morning time gives better air quality index compared to other sampling time, even at nighttime, especially where there are lots of tree surrounding the environment.

  • Experimental Security Analysis for Fake eNodeB Attack on LTE Network
    Fardan, Istikmal, Ikbal Mawaldi, Tides Anugraha, Ishak Ginting, and Nyoman Karna

    IEEE
    The Long Term Evolution (LTE) user network is the largest population used nowadays compared to 2G and 3G in mobile telecom landscape. It is declared that LTE has provided a strong security standard in term of protecting its user for security attack on mobile communication. Fake Base Station is one of attack scheme in mobile communication infrastructure. The paper showcases the experimental analysis of the vulnerability of the LTE network which is impact to the user if we perform Fake eNodeB attack. In this experiment, we use OpenAirInterface5G, an opensource cellular platform that supports the full stack of LTE including 5G standard as the Fake eNodeB. The attack is performed by impersonating a real 4G network Operator. The result of this attack is IMSI number of users is obtained which lead the users is traceable as well as it is possible to force the target unable to be served back by the legitimate base station which leads to Denial of Service (DOS) attack. We also point out on describing the flaws of the LTE protocol that lead into this possibility of attacking and its implication especially on user identity and user connection with the operator that possibly harmed. We describe also several options to overcome the issue in the future.

  • Performance Analysis on x86 Architecture Microprocessor for Lightweight Encryption
    Nyoman Karna, Shafira Febriani, Ramdhan Nugraha, and Dong-Seong Kim

    IEEE
    Encryption is a process to replace information with an unreadable code using specific algorithm so that only the people who have the key and algorithm can understand the original information. The encryption, and its follow up decryption process, requires high computational power, including transposition, substitution, and iteration, which affects the speed and various aspects of performance, especially when applied to a generic processor. This research tries to find the optimum machine instruction composition for lightweight encryption to establish a design for Application-specific Instruction Set Processor (ASIP). The lightweight encryption algorithms used in this research are the Data Encryption Standard (DES) and Advanced Encryption Standard (AES), implemented using x86 instruction set architecture and compare the results for the machine instruction composition and the computational speed between the two programs. For machine instruction composition, the result shows that AES requires fewer instructions with 1537 instructions on separate I/O data scenarios and 1487 instructions on data overwrite scenarios. Both algorithms show that the most widely used machine instruction type is the Data Transfer. From performance point of view, AES is faster than DES with an average computational time in separate I/O data scenarios is 0.0544653 seconds and for the data overwrite scenario is 0.0520902 seconds.

  • Machine instruction analysis for DCT algorithm using DLX architecture
    Believa Dyanneley, Nyoman Karna, Raditiana Patmasari, and Dong-Seong Kim

    IEEE
    One of the methods to reduce the size of images is by compressing the images. This research tried to find out the machine instruction set of DLX microprocessor to do image compression, in which the result will be used to design an ASIP microprocessor that has less power consumption compared to a general-purpose microprocessor with dozens of machine instruction. This ASIP microprocessor will become the heart of our next project, which is the autonomous seabed robot scanner that will be installed under the sea which relying on a rechargeable battery to supply the power. That is why this research is very crucial to reduce the power consumption of the microprocessor to save more energy for long term use. This research uses a simulation tool for DLX microprocessor, namely the WinDLX, to implement the algorithm of Discrete Cosine Transform (DCT) for image compression process. The result shows that the program requires a total of 14763 cycles executed with a total of 5920 instructions. The instructions which are often used in this experiment are LF (Load Float) which is used to load the value of matrices before being stored in the memory and multiplied to other matrices.

  • Google maps API implementation on IOT platform for tracking an object using GPS
    Achmad Mustofa Luthfi, Nyoman Karna, and Ratna Mayasari

    IEEE
    IoT is a technology that allows an object to connect to the internet so that it can be tracked and monitored. Implementing IoT requires a container called the IoT Platform. In the future, there will probably be many devices that use IoT, such as for monitoring, and of course, in a location, there will be many things that will be monitored. When these devices use the same sensor, it will be difficult when an investigation of the device will be carried out GPS can be used to get coordinates, so the location of the device can be detected using the geolocation feature. The IoT platform that is used does not yet have a feature that displays the location of an object, so the Google Maps API implementation is carried out on that platform. The results of the Neo-6m GPS module coordinate point has a difference in distance reaching around 1 to 2.5 meters, with reading coordinates on Google Maps directly or with a mobile phone. The results of the delay test parameters on good network conditions obtained an average delay of 0.326s and the results of the data transmission throughput test parameters using NodeMCU of 140.4 Bytes / s in 150 seconds.

  • Design and implementation of fire detection system using fuzzy logic algorithm
    Anak Agung Putu Bunga Surya Devi, Istikmal, and Nyoman Karna

    IEEE
    One of the features of a smart home is fire detection. There have been many developments in previous studies, but not many have implemented a detection system with the fuzzy logic method. Therefore, in this research we have developed a fire detection system that applies fuzzy logic methods and algorithms. We used Raspberry pi 3 as the embedded system, DHT-11 and MQ-2 sensors to detect fires. Detection results will be processed using a fuzzy system and the results will be notified through the WhatsApp application and monitored through the web. The test results show that the system that has been developed is running well and can be used as a fire detection system in smart homes.

RECENT SCHOLAR PUBLICATIONS