Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fairuz Azmi is active.

Publication


Featured researches published by Fairuz Azmi.


IOP Conference Series: Materials Science and Engineering | 2017

Dragon Stream Cipher for Secure Blackbox Cockpit Voice Recorder

Fadira Akmal; Surya Michrandi Nasution; Fairuz Azmi

Aircraft blackbox is a device used to record all aircraft information, which consists of Flight Data Recorder (FDR) and Cockpit Voice Recorder (CVR). Cockpit Voice Recorder contains conversations in the aircraft during the flight.Investigations on aircraft crashes usually take a long time, because it is difficult to find the aircraft blackbox. Then blackbox should have the ability to send information to other places. Aircraft blackbox must have a data security system, data security is a very important part at the time of information exchange process. The system in this research is to perform the encryption and decryption process on Cockpit Voice Recorder by people who are entitled by using Dragon Stream Cipher algorithm. The tests performed are time of data encryption and decryption, and avalanche effect. Result in this paper show us time encryption and decryption are 0,85 seconds and 1,84 second for 30 seconds Cockpit Voice Recorder data witn an avalanche effect 48,67 %.


2017 5th International Conference on Instrumentation, Control, and Automation (ICA) | 2017

Weather prediction based on fuzzy logic algorithm for supporting general farming automation system

Aris Pujud Kurniawan; Agung Nugroho Jati; Fairuz Azmi

Many automation and monitoring systems in agriculture do not have a calculation system for watering based on weather. Of these issues, will be discussed weather prediction system using fuzzy logic algorithm for supporting General Farming Automation. The weather calculation system works by taking a weather prediction data from the Weather Service Provider (WSP). Furthermore, it also retrieves soil moisture sensor value and rainfall sensor value. After that, the system will calculate using fuzzy logic algorithm whether the plant should be watered or not. The weather calculation system will help the performance of the General Farming Automation Control System in order to work automatically. So, the plants still obtain water and nutrients intake are not excessive.


2017 5th International Conference on Instrumentation, Control, and Automation (ICA) | 2017

Mechanical design of CNC for general farming automation

Rakhmi Jauhari; Agung Nugroho Jati; Fairuz Azmi

Design of Mechanics for general farming is the first to be designed, prototyped and manufactured. Design of mechanics inspired by cncmachine. Cnc machine is applied to be flexible general farming automation foundation for experimental, prototyping, and hacking. The mechanical design has important parts for general farming automation. The first part is to make tracks. Tracks are one of the component that provides great precision and allows the mechanical design to return to the same position repeatedly like cnc machine. The second part is electronic. The electronic parts including all the power of the electricity used in general farming automation. The result of mechanical design in this study will be compared with the result of mechanical design that has been implemented in the greenhousse so that can be obtained the difference of each design.


2016 International Conference on Informatics and Computing (ICIC) | 2016

Okamoto-Uchiyama homomorphic encryption algorithm implementation in e-voting system

Rifki Suwandi; Surya Michrandi Nasution; Fairuz Azmi

Nowadays, the use of electronic voting in an election has been widely adopted as a replacement for conventional voting system. Apart from the benefits of using this system, in fact, there are still many problems that can occur, such as system errors, network security, data confidentiality, and others. One of the main problems is it does not guarantee the confidentiality and accuracy of the data that to be stored and used. Cryptography is the science of mathematical techniques to secure the message offer solutions for the related problems. This research implements Okamoto-Uchiyama algorithm as the offered solutions that utilize cryptography on the security of e-voting system to ensure the security and confidentiality of the voting data, as well as utilizing the homomorphic properties of this algorithm to do the counting. This algorithm will hide the data by encrypting the votes that chosen by the voters and the system can perform calculations using the data that still encrypted without having to be decrypted first.


2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC) | 2016

Prototype of Kleptocharger for Android device

Fahmi Siddiq; Surya Michrandi Nasution; Fairuz Azmi

Power bank is a device used to support charging up a device battery, especially a mobile phones battery. Since design of common power bank contain of battery cell and power controller, it will have some empty space to create a modified power bank. We could implement a tiny Micro controller named teensy. Teensy will create power bank detected as a storage media and all the selected data will be copied into media card in the power bank. Beside of teensy implement, we could also implement SD card shield for storing all the captured data. This concept is a proof concept that modified power bank could be implemented. The results of this research prove that a modified power bank only works one mode at a time.


2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC) | 2016

Implementation of low interaction web server honeypot using cubieboard

Dandy Kalma Rahmatullah; Suiya Michrandi Nasution; Fairuz Azmi

Internet technology today is not free from many problems or security holes. This security holes could be exploited by an unauthorized person to steal important data. The case of the attacks occurred because the party that was attacked also did not realize the importance of network security to be applied to the system. Honeypot is a system that is designed to resemble the original production system and is made with the intention to be attacked or compromised. In this research, Cubieboard implemented using low interaction honeypot as a decoy to attract attackers. The result of this research is a low interaction honeypot implemented on embedded system with the form of Cubieboard that can emulates security vulnerabilities such as directory buster brute force, LFI, and RFI with 100% success rate, but still could not emulates SQL Injection vulnerability. One of the result of stress test with 773 samples, obtained average time of 5275 ms, deviation 2067 ms, sample throughput 367.012 per minute, and with median 5381 ms. The stress test is conducted with 50 threads and 10 ramp-ups per second.


2016 International Conference on Informatics and Computing (ICIC) | 2016

Advanced e-voting system using Paillier homomorphic encryption algorithm

Shifa Manaruliesya Anggriane; Surya Michrandi Nasution; Fairuz Azmi


2016 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob) | 2016

Implementation of stream cipher Salsa20 algorithm to secure voice on push to talk application

Diyana Afdhila; Surya Michrandi Nasution; Fairuz Azmi


TELKOMNIKA : Indonesian Journal of Electrical Engineering | 2018

Secure E-Voting System by Utilizing Homomorphic Properties of the Encryption Algorithm

Rifki Suwandi; Surya Michrandi Nasution; Fairuz Azmi


Journal of Telecommunication, Electronic and Computer Engineering | 2017

Automatic Watering Plant Application Based on Android and Web Using REST Protocol

Restu Isjaka Purwandana; Fairuz Azmi; Agung Nugroho Jati

Collaboration


Dive into the Fairuz Azmi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge