JURNAL INFOTEL 2022-11-30T08:38:47+00:00 Eko Fajar Cahyadi Open Journal Systems <h2>About Jurnal INFOTEL</h2> <table border="0"> <tbody> <tr> <td><img src="" alt="telecommunication journal" width="180" height="250"></td> <td valign="top" align="justify"> <div style="background-color: #ebfeec; border: 1px solid #bae481; border-radius: 5px; text-align: justify; padding: 10px; font-family: sans-serif; font-size: 14px; margin-left: 10px;">Jurnal INFOTEL is a scientific journal published by Lembaga Penelitian dan Pengabdian Masyarakat (LPPM) of Institut Teknologi Telkom Purwokerto, Indonesia. Jurnal INFOTEL covers the field of <strong>informatics, telecommunication, and electronics</strong>. First published in 2009 for a printed version and published online in 2012. The aims of Jurnal INFOTEL are to disseminate research results and to improve the productivity of scientific publications. Jurnal INFOTEL is published quarterly in February, May, August and November. <strong>Starting in 2018, Jurnal INFOTEL uses English as the primary language..</strong></div> </td> </tr> </tbody> </table> <div style="text-align: justify;"> <p>&nbsp;</p> <h4><strong>Important For Authors (Since Volume 15 Number 1 2023)<br></strong></h4> <p>Reminder for all the authors, you are expected to submit papers that:<br> 1. are original and have not been submitted to any other publication.<br> 2. have at least 20 references with 80% of scientific Journals.<br> 3. use references published on the last 5 years.<br> 4. structured using IMRaD format.<br> 5. use template specified by Jurnal INFOTEL.<br> 6. use reference manager e.g. Mendeley or others when managing the references.<br>Thank you</p> <p>&nbsp;</p> </div> User requirements and interface design for collaboration research applications using user experience design process 2022-11-05T00:15:17+00:00 Abdul Karim Batubara Franindya Purwaningtyas Raissa Amanda Putri <p align="justify">In conducting collaborative research involving more than one researcher, a system is needed that can improve the performance of researchers in various ways. This study captures the challenges faced by researchers in collaborative research and defines the requirements for collaborative research systems needed to address these challenges. From the analysis of the needs obtained, the researchers designed a collaboration application interface. Collaboration applications are needed to facilitate communication between researchers, search for articles, share publications, and other applications. The distribution of questionnaires and interviews were conducted to obtain the requirements needed for the development of a collaboration system. This research informs system developers to support the development of collaborative systems. In this study, the level of need for a research collaboration system in the university environment will be analyzed along with an analysis of its needs and the design of the user interface.</p> 2022-11-01T00:00:00+00:00 ##submission.copyrightStatement## Opinion mining indonesian presidential election on twitter data based on decision tree method 2022-11-25T06:40:07+00:00 Nur Ghaniaviyanto Ramadhan Merlinda Wibowo Nur Fatin Liyana Mohd Rosely Christoph Quix <p>Indonesia is a country led by a president. The term of the leadership of a president will be democratically elected every five years. The current president will end his term of office in 2024. So that in that year, the people will hold a direct general election to determine the president between 2024 and 2029. Before the general election was held in Indonesia itself, it was thick related to the campaign for each presidential candidate carried out by his supporters. The campaign is carried out directly to village locations and on social media Twitter/Facebook/YouTube. His campaign writing on Twitter is exciting to analyze. Even now, many tweets related to the 2024 presidential election contain various opinions from the public. This study will examine the sentiment of someone's tweet to see the public's statement regarding the 2024 presidential election. The resulting sentiment categories are positive, negative, and neutral, and the word tweet related to the sentiment category will be visualized. The results of the sentiment category will then be classified using a tree-based method, namely a decision tree. The accuracy generated by applying the decision tree method is 99.3%. The decision tree method is also superior to the regression-based way by 2.5%.</p> 2022-11-01T00:00:00+00:00 ##submission.copyrightStatement## KNN imputation to missing values of regression-based rain duration prediction on BMKG data 2022-11-05T00:15:39+00:00 Ikke Dian Oktaviani Aji Gautama Putrada <p align="justify">The prediction of rain duration based on data from the Meteorology, Climatology, and Geophysics Agency (BMKG) is an important issue but remains an open problem. At the same time, several studies have shown that missing values can cause a decrease in the performance of the model in making predictions. This study proposes k-nearest neighbors (KNN) imputation to overcome the problem of missing values in predicting rain duration. The source of the rain duration prediction dataset is the BMKG data. We compared gradient boosting regression (GBR), adaptive boosting regression (ABR), and linear regression (LR) for the regression model for predicting rain duration. We compared the KNN imputation method with several benchmark methods, including zero imputation, mean imputation, and iterative imputation. Parameters <em><strong>r</strong></em><strong><sup>2</sup></strong>, mean squared error (<em><strong>MSE</strong></em>) and mean bias error (<em><strong>MBE</strong></em>) measure the performance of these imputation methods. The test results show that for rain duration prediction using the regression method, GBR shows the best performance, both for train data and test data with <strong><em>r</em><sup>2</sup> = 0.915</strong> and <strong>0.776</strong>, respectively. Then our proposed KNN imputation has the best performance for missing value imputation compared to the benchmark imputation method. The prediction values of <strong><em>r</em><sup>2</sup></strong> and <em><strong>MSE</strong></em>&nbsp;when using KNN imputation at&nbsp;<em><strong>Missing Percentage </strong></em><strong>= 90%</strong>&nbsp;are <strong>0.71</strong> and <strong>0.36</strong>, respectively.</p> 2022-11-01T00:00:00+00:00 ##submission.copyrightStatement## Customer satisfaction of urban farming application services: “e-Buruan Sae” 2022-11-10T00:38:41+00:00 Parman Sukarno Rio Guntur Utomo Rahmat Yasirandi Novian Anggis Suwastika <p>This study evaluates the customer satisfaction model in adopting the Web 2.0-based e-Buruan Sae application. The e-Buruan Sae application is an interactive Web 2.0-based application used by the government and the people of Bandung City to manage urban farming activities. This research is quantitative correlational research and applies a research method based on Design Research Methodology (DRM). The stages of this research are the literature review stage with the output of research objectives, the initial empirical analysis stage with the outputs of the hypothesis and research model, the experimental stage for data collection, and the final empirical analysis stage with the output of the data analysis results. This study uses six variables to measure customer satisfaction: ease of use, service quality, interactivity, trust, customer satisfaction, and IT development. The results of empirical testing show that the ease of use and IT development variables do not affect the customer satisfaction variable. In contrast, the remaining variables have a positive effect on customer satisfaction. This research produces measurements to evaluate customer satisfaction on the Web 2.0-based urban farming application.&nbsp;</p> 2022-11-10T00:28:01+00:00 ##submission.copyrightStatement## Linear polarization on radar cross section measurement for tank miniature 2022-11-05T00:16:07+00:00 Muhammad Panji Praja Wahyu Pamungkas <p align="justify">The use of radar technology, especially for the interests of state defense and security, has become the focus of development launched by the government of Indonesia. Equipment and vehicles in the defense and security sector are the top priority to be detected using radar technology. When a radar transmitter transmits its signal towards a target, some part of the signal will bounce in all directions or scattering, including to the receiver and some will be absorbed by the radar target. The radar target is assumed to have a small size, with the aim of focusing more on the beamwidth of the radar transmitting antenna to the target. This research has a focus on measuring radar targets in the form of defense equipment in the form of tanks made in miniature which are smaller than their original forms. The selected antenna polarization uses linear polarization with vertical and horizontal types. Each polarization will be compared with the value of the radar cross section (RCS) in the combination of the same polarization and different polarization. The measurement results show that the largest RCS value is obtained at an angle of 200° by 13 with a combination of Horizontal-Horizontal polarization and the smallest RCS value is obtained at an angle of 50° by -4 with a combination of Horizontal-Vertical polarization. With the results of these measurements, it can be concluded that the measurement of RCS for defense and security equipment can be carried out by measuring the miniature of the defense and security equipment</p> 2022-11-01T00:00:00+00:00 ##submission.copyrightStatement## A study of secure communication scheme in MQTT: TLS vs AES cryptography 2022-11-30T08:38:47+00:00 Favian Dewanta Baiq Yuniar Yustiarini Bangun Indrakusumo Radityo Harsritanto <p align="justify">The Internet of Things (IoT) technology requires low latency communications. One of the lightweight protocols in the IoT is the MQTT protocol. However, the MQTT protocol is not equipped with the appropriate security mechanism. As a consequence, the MQTT messages are easily eavesdropped and modified by the attackers. This research studies the use of AES cryptography-based communication scheme against the TLS-based communication scheme, which can be used to create end-to-end secure communication channels from the MQTT publishers to the MQTT subscribers. Experimental results show that the TLS-based communication scheme possess the highest cost in terms of communication delay and network cost among all schemes in the experiment. Eventually, the AES-based MQTT communication scheme is more appropriate for IoT environments because of its communication delay and network cost, which are considerably equal to the plaintext-based MQTT communications. &nbsp;</p> 2022-11-01T00:00:00+00:00 ##submission.copyrightStatement## Implementation of intrusion prevention system (IPS) to analysis triad cia on network security attacks on web server 2022-11-05T00:16:44+00:00 Amilia Anggraeni Jafaruddin Gusti Amri Ginting Syariful Ikhwan <p align="justify">Computer networks are built to achieve the main goal of communicating with each other . During the transmission process, it is expected that information can be conveyed quickly, efficiently and safely. Network security serves to avoid damage or even data loss caused by attacker activities during the communication process. Security aspects that need to be maintained in data information are Confidentiality, Integrity and Availability. Intrusion Prevention System is a solution that can maintain network security from various attacks. The Intrusion Prevention System will act as a protector on the network by detecting and preventing suspicious traffic on nodes in a network. The Intrusion Prevention System in its implementation has several tools which are used in this study, namely Snort and IPTables. Testing is done by performing attacks on the Web Server. The attacks carried out are Port Scanning, DDoS attacks and Brute Force. The results of this study are based on the CIA Triad with the three attacks having different characteristics in terms of cause and effect. On the defense side, Port Scanning and Brute Force can be easily prevented by IPS, but in DDoS attacks there are differences in results between drop and reject rule. In a DDoS attack with an action drop rule, it can recover the web server in 160 seconds while the action reject rule can be restored at 145 seconds which normally can be recovered in a DDoS attack in 165 seconds. The IPS server can also reduce resources when there is a DDoS attack by 9.2% .</p> 2022-11-01T00:00:00+00:00 ##submission.copyrightStatement## Evaluations of the predistortion technique by neural network algorithm in MIMO-OFDM system using USRP 2022-11-05T00:16:58+00:00 M Wisnu Gunawan Naufal Ammar Priambodo Melki Mario Gulo Arifin Arifin Yoedy Moegiharto Hendy Briantoro <p>MIMO OFDM is the key technology of 4G network system. MIMO-OFDM system&nbsp; enhances the spectrum efficiency and increases the capacity of the system. The implementation of USRP hardware to MIMO OFDM system has been attracted some researchers to conduct the experiments. So we conduct the experiments in a MIMO OFDM system that applies the predistortion technique.&nbsp; In this experiment, we evaluate performances of the predistortion technique by using the artificial neural network.&nbsp; USRP 2920 hardware which is supported by LabVIEW and Phyton software are used in this experiment. OFDM system uses 128 subcarriers to produce an OFDM symbol, and MIMO system uses 2 antennas at transmitter and receiver side. And no obstacles between Tx and Rx, or line of sight transmission scenarios. The performances of the predistortion technique using the artificial neural network algorithm are shown in symbol constellations or Error Vector Magnitude (EVM) at the receiver. And the texts or characters are used as the input of the system. From the experiment results can be seen that the distance between Tx and Rx affects the Error Vector Magnitude (EVM) and predistortion technique produces the Error vector magnitude (EVM) improvement. More shorter the distance between Tx and Rx can decrease distortions of the received signal,&nbsp; At the transmitter side, the performance of predistortion technique is shown as the linearization improvement of&nbsp; the non-linearity power amplifier. Therefore more wider the linear region of power amplifier results the decreasing in band distortion of transmitted signal, and can be seen as the Error Vector Magnitude (EVM) improvement.</p> 2022-11-01T00:00:00+00:00 ##submission.copyrightStatement## Evaluation of cellular network performance involving the LTE 1800 band and LTE 2100 band using the drive test method 2022-11-04T23:53:21+00:00 Yuliarman Saragih Ridwan Satrio Hadikusuma Agatha Elisabet S <p>In the 4G Network on the cellular system, the possibility of high traffic increase is a big problem for users, the proposed solution is to reduce the possibility of full traffic and decrease the quality of the cellular system by dividing the frequency channel into several parts. The purpose of this paper is to study the effect of network optimization on the value of Key Performance Indicator (KPI) in the LTE 1800 and LTE 2100 bands. KPI values, In the LTE 1800 and LTE 2100 bands tested using the drive test method using the Telkomsel sim card provider, the results show that the LTE 2100 band on the TML 013 site has a very high CSSR number compared to the band LTE 1800 which is 99.73% after optimization. The results showed that the LTE band 2100 is better than the LTE band 1800 in terms of KPI Summary.</p> 2022-11-04T23:53:21+00:00 ##submission.copyrightStatement## An Enhanced Trilateration Algorithm for Indoor RSSI Based Positioning System Using Zigbee Protocol 2022-11-26T09:27:52+00:00 Rafina Destiarti Ainul <p>Location information of the object based on wireless communication will play crucial role in several Wireless Sensor Network (WSN) applications. Some applications need to know the exact position of the object. The advantages of Zigbee as the part of Radio Frequency (RF) technology such as low cost, high scalability, high availability, and supporting topology for Indoor positioning system (IPS). In this paper, we propose IPS using Received Signal Strength Indicator (RSSI) based Zigbee protocol. The proposed approach is based on the enhancement of Trilateration algorithm. Basically, the main concept of the conventional trilateration is using three strongest RSSI from references node. However, the instability from measured RSSI influenced to its estimation result. Therefore quadratic weighted is adding to this proposed scheme as the enhanced trilateration algorithm. The estimated distance output from conventional trilateration algorithm will be used for calculating the weighted value and multiplying to each the reference node which produced lower estimation error. The simulation result show that using enhanced trilateration algorithm has capability to improve accuracy of estimated position up to 90.55 % with mean square error (MSE) 2.03 meters compared with only using conventional trilateration reached high estimated error up to 4.31 meters.</p> 2022-11-26T09:27:52+00:00 ##submission.copyrightStatement## Concurrently Wireless Sensor Network using Microcontroller for Home Monitoring Against Fire 2022-11-26T09:34:52+00:00 Putu Wiweka Prasetyananda Sunny Arief Sudiro Bheta Agus Wardijono <p>This paper proposes a prototype fire monitoring system with Wireless Sensor Network (WSN) in order to detect fires in several places at once and facilitate the placement of the detection. &nbsp;WSN is a technology where several sensors work together to establish communication over a wireless network. This prototype fire monitoring system can be monitored through the website in real time and the detection data is stored on the cloud server. This prototype fire monitoring system uses 4 sensor nodes, each of which is placed in several places to detect fires and sends the detection results to the master node. The master node receives and processes the data sent by the sensor node to generate 16 different conditions&nbsp;concurrently, in the event of a fire it will send a telegram message and the condition data to the cloud server. Several attempts to send data from the sensor node to the master node were completely successful and sending data from the master node to the cloud server as well as sending notification messages have been sent properly.</p> 2022-11-26T09:30:36+00:00 ##submission.copyrightStatement## Optimal planning on-grid power system for 2200VA household sector by considering economic criteria 2022-11-05T00:17:28+00:00 Bandiyah Sri Aprillia Kevin Octavianov Abdurohman <p class="Abstract"><span style="font-size: 10.0pt; font-weight: normal;">This study discusses efforts to model solar grid systems by considering economic and regulatory factors in system design. The Hybrid Optimization of Multiple Electric Renewables software is used to evaluate the economic viability of the on-grid PV technology that provides 2200VA of power in the household sector. Optimal costs are assessed from Net Present Cost (NPC) which is a cost analysis to determine investment feasibility based on interest rates and fees in the coming years and Break Even Point (BEP) which is the point where expenditure and income are balanced. The simulation results show that in the project period of 25 years the installation of on grid PV power system has an NPC that is 20% lower than the PLN network power supply with a BEP value lower than 15 years. The lowest NPC and BEP values were obtained from the installation of 7 PV panels with 300Wp capacity connected to the PLN network. This system is able to save electricity costs by IDR 23,060,260 compared to the use of 100% electricity from the State Electricity Enterprise grid. This system is worthy of being an economic tool for providing electricity services throughout the year and meeting rising energy demands in the household sector.</span></p> 2022-11-01T00:00:00+00:00 ##submission.copyrightStatement## Implementation of line detection self-driving car using HSV method based on raspberry pi 4 2022-11-05T00:17:43+00:00 Florentinus Budi Setiawan Eric Pratama Putra Leonardus Heru Pratomo Slamet Riyadi <p>With the development of technology, especially in the field of robotics, daily human activities can be carried out with artificial intelligence. One of the artificial intelligence technologies that help ease the burden on humans, especially in terms of driving, is self-driving cars. In this case, self-driving cars have several methods with GPS systems, radar, lidar, or cameras. In this study, a self-driving car system was designed on a navigation path model using a street mark detector with an intermediary sensor, namely a camera as a vision sensor. This self-driving car system uses a prototype called an autonomous car to walk on a path which is a self-driving car navigation direction based on the detected line to be able to detect camera sensors that process line images from the camera using HSV. method. In this study, a self-driving car system has been successfully designed using a microcontroller, namely Raspberry Pi 4 as a programmer and L298n motor driver, BTS7960 as a driver for a self-driving car. The Raspberry Pi 4 sends real-time images through the camera as a vision sensor which then detects a line to navigate the movement of this self-driving car. By using image processing, the resulting level of precision can reach the average value according to the direction of the self-driving car.</p> 2022-11-01T00:00:00+00:00 ##submission.copyrightStatement## Performance improvement of the shredder machines using IoT-based overheating controller feature 2022-11-05T00:17:57+00:00 Emy Setyaningsih Satriawan Dini Hariyanto Dewi Wahyuningtyas Samuel Kristiana <p>Plastic shredding plays an essential role in the plastic waste recycling process. Plastic waste can be enumerated manually using a knife and scissors or a crushing machine. The use of a shredder machine to chop plastic waste, especially those whose primary drive is an electric motor, often experience problems. The main obstacle is the need for high power consumption (more than 1 HP) and the reliability of the drive elements against overheating. Overheating can damage the electrical circuit components that connect the power supply to electric motors, especially AC electric motors, causing a lot of loss in terms of performance and user safety. Internet of Things (IoT) technology is widely used to minimize energy resources by automating various systems. This study proposed the design of a shredder machine with a control system using IoT technology integrated with a shredder and conveyor machine designed using the Quantity Functional Diagram (QFD) method. The advantages of the shredder machine presented in this study are that it can operate at home using electric power, is more flexible, and minimizes overheating with an IoT-based overheating controller. This research succeeded in keeping the temperature of the electric motor of the shredder machine stable at a temperature of 40℃-55℃. The average delay of the IoT module to control on and off the shredder machine design system in this study is 219 ms and 200 ms, which are in the good category according to the Telecommunications and Internet Protocol Harmonization Over Network (TIPHON) standard.</p> 2022-11-01T00:00:00+00:00 ##submission.copyrightStatement## Analysis and small-signal modeling of simplified cascade multiphase DC-DC buck converter 2022-11-05T00:18:11+00:00 Nungky Prameswari <p>One of the power converters that are often implemented in renewable energy applications is a DC-DC power converter. One of such converters is a step-down converter or buck converter whose output voltage is lower than its input. A novel DC-DC buck converter for low output-voltage and high output current applications is presented in this paper. When compared to the conventional buck converter, the voltage ratio of the proposed topology is higher. The output of this converter also has lower ripple. Thus, the proposed topology is appropriate for renewable applications. The operating principle and small-signal model analysis are discussed in detailed. Finally, a simulation studies is carried out by PSIM to verify performances of the offered topology</p> 2022-11-01T00:00:00+00:00 ##submission.copyrightStatement##