Jurnal RESISTOR (Rekayasa Sistem Komputer) https://ejournal.instiki.ac.id/index.php/jurnalresistor <p align="justify">RESISTOR (Rekayasa Sistem Komputer) Journal is a journal published by Prahasta Publisher managed by the Directorate for Research and Community Service (DRPM) Institut Bisnis dan Teknologi Indonesia, with <a href="http://issn.lipi.go.id/issn.cgi?daftar&amp;1510723173&amp;1&amp;&amp;" target="_blank" rel="noopener">e-ISSN 2598-9650</a> and <a href="http://issn.lipi.go.id/issn.cgi?daftar&amp;1509272214&amp;1&amp;&amp;" target="_blank" rel="noopener">p-ISSN: 2598-7542.</a> RESISTOR Journal was first published in April 2018 and has a publishing period third in a year, namely in April, August, and October. RESISTOR Journal has been indexed on : <strong>Google Scholar, One Search Indonesia, BASE, </strong>dan<strong> Neliti</strong>. Focus and scope of RESISTOR Journal includes: <strong>(a)Biomedical Engineering, (b)Cloud Infrastructure, (c)Computer Network and Architecture, (d)Computer Security, (e)Computer Vision, (f)Cultural Tourism Application, (g)Digital Forensics, E(h)mbedded System, (i)Internet of Things, (j)Machine Learning, (k)Power, Energy, and Industry Applications, (l)Remote Sensing, (m)Robotics and Automation, (n)Signal Processing and Analysis, (o)Soft Computing, and (p)Wireless Sensor Network. </strong>All articles in RESISTOR Journal will be processed by the editor through the Online Journal System (OJS), and the author can monitor the entire process in the member area. The articles published in RESISTOR Journal, both in hard and soft copy form, are available as open access for educational, research and library purposes, and beyond that purpose, the editorial board of the RESISTOR Journal is not responsible for copyright infringement.</p> <div><a href="http://jurnal.stiki-indonesia.ac.id/index.php/jurnalresistor/about/submissions"><img src="https://ejournal.instiki.ac.id/public/site/images/adminjurnal/submit2.png" /></a></div> en-US <p>Copyright in each article belongs to the author.</p> <ol> <li>The authors admit that RESISTOR Journal as a publisher who published the first time under&nbsp;&nbsp;<img src="https://ejournal.stiki-indonesia.ac.id/public/site/images/adminjurnal/by-nc-sa-ccLicense.png">&nbsp;<a href="http://creativecommons.org/licenses/by-nc-sa/4.0" target="_blank" rel="noopener">Attribution-NonCommercial-ShareAlike 4.0 International&nbsp;(CC BY-NC-SA 4.0)</a> License.</li> <li>Authors can include writing separately, regulate distribution of non-ekskulif of manuscripts that have been published in this journal into another version (eg sent to respository institution author, publication into a book, etc.), by recognizing that the manuscripts have been published for the first time in RESISTOR Journal</li> </ol> adnyana@instiki.ac.id (I Gede Adnyana, S.T., M.T.) iwansudipa@instiki.ac.id (I Gede Iwan Sudipa, S.Kom., M.Cs.) Wed, 12 Mar 2025 07:23:55 +0000 OJS 3.2.1.5 http://blogs.law.harvard.edu/tech/rss 60 Implementasi Keamanan Rumah Pintar Berbasis Android Dengan Teknologi IoT Dan NodeMCU ESP8266 https://ejournal.instiki.ac.id/index.php/jurnalresistor/article/view/1674 <p><em>The rise of theft that harms homeowners is often caused by a lack of supervision and the high cost of security, so many homeowners do not prioritize the security of their homes. This research aims to develop an Android-based smart home security system that utilizes Internet of Things (IoT) technology as an effective and affordable solution to improve home security. The research method used is a qualitative method, with an observation approach and literature study to obtain information related to the implementation of IoT in home security systems. The system was designed using the NodeMCU ESP8266 and the xtreme programming (XP) system development method, which allows for rapid iteration and continuous development. The resulting system offers various security features, including door, kitchen, room, CCTV, and Auto Transfer Switch (ATS) Power security. The results show that the system has an accuracy of 95% in detecting security intrusions, with an average response time delay of 2 seconds. Thus, this security system is expected to be an effective and affordable solution to improve home security.</em></p> Adnan Aditya M Muntahar, Agus Pramono Copyright (c) 2025 Adnan Aditya M Muntahar, Agus Pramono https://creativecommons.org/licenses/by-nc-sa/4.0 https://ejournal.instiki.ac.id/index.php/jurnalresistor/article/view/1674 Tue, 31 Dec 2024 00:00:00 +0000 Rancang Bangun Alat Monitoring pada Sepeda Statis Berbasis Internet of Things https://ejournal.instiki.ac.id/index.php/jurnalresistor/article/view/1684 <p><em>The IoT-Based Monitoring Device for Optimal Health and Fitness on a Stationary Bike is designed to monitor body conditions during exercise. The device utilizes the ESP32 microcontroller and multiple sensors, including the MAX30100 for heart rate, MLX 90614 for body temperature, and MQ135 for air quality, integrated with IoT technology. The objective of this research is to develop an IoT-based monitoring device that can provide accurate and consistent health information The sensor data is transmitted via the internet to a server, enabling monitoring through a mobile application or web platform. This research employed an experimental method involving hardware functionality tests, voltage measurements, and sensor accuracy analysis. The results indicate that the device operates as expected, with a measurement error rate of less than 5%. This system offers ease of use and accessibility, allowing users to monitor their health in real-time, making it an effective solution to support optimal health and fitness.</em></p> <p> </p> Sholihin Sholihin, Emilia Hesti, Eka Susanti, Mutiara, Ningsih Ruspita Sari Copyright (c) 2025 Sholihin Sholihin, Emilia Hesti, Eka Susanti, Mutiara, Ningsih Ruspita Sari https://creativecommons.org/licenses/by-nc-sa/4.0 https://ejournal.instiki.ac.id/index.php/jurnalresistor/article/view/1684 Tue, 31 Dec 2024 00:00:00 +0000 Analisis Pengaruh Parameter Fisik Terhadap Jarak Jangkauan dan Keandalan Data LoRa SX1276 https://ejournal.instiki.ac.id/index.php/jurnalresistor/article/view/1666 <p><em>In the era of the Internet of Things (IoT), Long Range (LoRa) wireless communication technology has become a popular choice for applications that require wide coverage and low power consumption. This study aims to analyze the impact of various physical parameters on the range and data reliability of the LoRa SX1276 module. The physical parameters evaluated include Tx Power, bandwidth, code rate, and spreading factor. The purpose of this research is to understand the effect of each physical parameter of the LoRa SX1276 on range and data reliability. The research uses the R&amp;D (research and development) method with the ADDIE development model. It involves experiments with parameter variations and statistical analysis to determine their relationships and effects. The results show that physical parameters influence the range and data reliability of the LoRa SX1276. Increasing values of Tx Power, code rate, and spreading factor lead to greater range, while increasing bandwidth reduces the range. This analysis is expected to provide practical guidance for optimizing LoRa SX1276 configurations in IoT implementations, contributing significantly to enhancing the reliability and efficiency of wireless communication networks.</em></p> Faris Muhammad Fahrezi, Muhammad Arif Sulaiman, Toni Toni Copyright (c) 2025 Faris Muhammad Fahrezi, Muhammad Arif Sulaiman, Toni Toni https://creativecommons.org/licenses/by-nc-sa/4.0 https://ejournal.instiki.ac.id/index.php/jurnalresistor/article/view/1666 Tue, 31 Dec 2024 00:00:00 +0000 Generator Load Optimization Management on Tourist Ships in Labuan Bajo https://ejournal.instiki.ac.id/index.php/jurnalresistor/article/view/1766 <p style="font-weight: 400;"><em>Labuan Bajo is a premier tourist destination in Indonesia, experiencing a significant increase in visitors. The intensive use of tourist ships leads to high energy consumption, increased carbon emissions, and rising operational costs. Therefore, an efficient energy management strategy is essential to support sustainable tourism. This study aims to develop a model and simulation for optimizing generator load on tourist ships to improve energy efficiency and reduce environmental impact. The research methodology includes modeling the ship's electrical system, simulating generator loading, and analyzing the implementation of energy-saving technologies, such as replacing conventional lights with LED lighting. The simulation results indicate a significant improvement in generator load efficiency, with the average load decreasing from 90.95% to 83.38%. Daily energy consumption was reduced from 78 kWh to 72.7 kWh, while the implementation of LED lighting lowered electricity consumption by 61.63%. Additionally, optimizing generator loads resulted in a 20-30% reduction in fuel consumption, directly lowering carbon emissions and operational expenses. Compared to previous studies, this research provides a more comprehensive analysis by integrating load optimization with energy-saving technologies. These findings highlight the importance of implementing an effective energy management system for tourist ships, offering a reference for operators to enhance sustainability in Labuan Bajo's tourism industry.</em></p> I Made Aditya Nugraha, I Gusti Made Ngurah Desnanjaya, Putu Indra Pramana Copyright (c) 2025 I Made Aditya Nugraha, I Gusti Made Ngurah Desnanjaya, Putu Indra Pramana https://creativecommons.org/licenses/by-nc-sa/4.0 https://ejournal.instiki.ac.id/index.php/jurnalresistor/article/view/1766 Tue, 31 Dec 2024 00:00:00 +0000 Identifikasi Celah Kerentanan Keamanan Pada Website Dengan Metode Pengujian Penetrasi OWASP ZAP https://ejournal.instiki.ac.id/index.php/jurnalresistor/article/view/1459 <p><em>Resepedia is a website that presents a variety of food recipes and culinary articles. In addition, resepedia also stores user data including sensitive information such as names, emails, and passwords. The existence of this information carries a potential security risk, which can cause potential leakage of user data that can make misuse of data or information. Therefore, this study uses OWASP Zed Attack Proxy (OWASP ZAP) to identify security holes and evaluate potential risks on the Resepedia website. The results identified 16 types of potential threats, with 3 categories having a Medium threat level, 6 categories having a Low threat level, and 7 categories being Informative. Thus, the level of information security on the Resepedia website is considered to be at the Medium level. This research proves that OWASP ZAP can be used to identify information security </em><em>vulnerabilities</em><em> based on the results obtained.</em> <em>This research is expected to provide an in-depth understanding, comprehensive security risk analysis, and become the foundation for further research related to security analysis on the website.</em></p> Devani Laras Sati, Devina Laras Sita, Khairunnisak Nur Isnaini Copyright (c) 2025 Devani Laras Sati, Devina Laras Sita, Khairunnisak Nur Isnaini https://creativecommons.org/licenses/by-nc-sa/4.0 https://ejournal.instiki.ac.id/index.php/jurnalresistor/article/view/1459 Tue, 31 Dec 2024 00:00:00 +0000 Analisis Forensik Pemalsuan Dokumen PDF Menggunakan Metode National Institute of Justice (NIJ) https://ejournal.instiki.ac.id/index.php/jurnalresistor/article/view/1460 <p><em>With the rapid growth of information and communication technology, the need for a sophisticated digital forensic approach to security has become more urgent. The problem that needs to be resolved using digital forensic steps is the indication of alteration and falsification of documents with the .pdf extension. By involving various forensic analysis methods, such as metadata examination, physical observation, hash value, analysis using Principal Component Analysis (PCA), and the use of forensic tools such as Adobe Acrobat Reader, Exiftools, imageforensic.org and HashMyFile, it is expected to address existing crime cases. This research aims to study the challenges posed by digital documents, emphasizing the need for innovative approaches to uncover hidden information, detect alterations, and authenticate the integrity of PDF files. The combination of the NIJ method and Analysis using PCA produces an accurate and precise analysis as seen from the dimensionality reduction capability of PCA. The results show that the NIJ method and PCA analysis can be used to prove the authenticity of a PDF document by finding changes in the PDF document. In addition, this research also provides recommendations for the development of forensic techniques in supporting the reliability and security of digital documents. It is hoped that this research can make a valuable contribution to the development of forensic techniques.</em></p> Marcel Afandi, Rifki Amrulloh, Khairunnisak Nur Isnaini, Didit Suhartono Copyright (c) 2025 Marcel Afandi, Rifki Amrulloh, Khairunnisak Nur Isnaini, Didit Suhartono https://creativecommons.org/licenses/by-nc-sa/4.0 https://ejournal.instiki.ac.id/index.php/jurnalresistor/article/view/1460 Tue, 31 Dec 2024 00:00:00 +0000