Penerapan Wireless Sensor Network untuk Sistem Deteksi Kebakaran Dini Berbasis Multi-Sensor
Kata Kunci:
Kata Kunci: sistem informasi, dokumen akademik, digitalisasi administrasi, efisiensi layanan, basis data terpusat.Abstrak
Pengelolaan dokumen akademik di banyak institusi masih menghadapi kendala seperti proses yang lambat, risiko kesalahan, dan sulitnya pelacakan arsip, sehingga dibutuhkan pendekatan digital yang lebih efisien. Tujuan: Penelitian ini bertujuan mengetahui efektivitas penerapan Sistem Informasi Pengelolaan Dokumen Akademik dalam meningkatkan akurasi, kecepatan layanan, dan kemudahan pencarian data. Metode: Pendekatan kuantitatif digunakan melalui tahapan analisis kebutuhan, perancangan sistem, implementasi, serta pengujian fungsional untuk menilai performa, tingkat kesalahan, dan respons pengguna. Hasil: Sistem yang dikembangkan menunjukkan penurunan error pencatatan sebesar lebih dari 40%, peningkatan kecepatan pemrosesan dokumen, serta kemampuan menelusuri arsip secara instan melalui basis data terpusat. Validasi otomatis dan antarmuka intuitif terbukti meningkatkan kepuasan pengguna serta mengurangi beban kerja administrasi. Kesimpulan: Hasil penelitian membuktikan bahwa sistem ini mampu menjawab permasalahan utama pengarsipan konvensional dan memberikan peningkatan signifikan pada kualitas layanan akademik. Tujuan penelitian tercapai sepenuhnya, meskipun pengembangan lanjutan masih diperlukan, terutama pada integrasi kecerdasan buatan dan interoperabilitas sistem agar mampu memenuhi tuntutan digitalisasi yang semakin kompleks.
Unduhan
Referensi
REFERENSI
[1] F. P. E. Putra, F. Fauzan, S. Syirofi, M. Mursidi, D. Wahid, and A. Nuraini, “Sistem Pengendali Lingkungan Pertanian Dengan Wireless Sensor Network Untuk Mengoptimalkan Budidaya Hidroponik,” 2024. doi: 10.47709/digitech.v3i2.3461.
[2] B. Haq et al., “Tech-Driven Forest Conservation: Combating Deforestation With Internet of Things, Artificial Intelligence, and Remote Sensing,” IEEE Internet Things J., vol. 11, no. 14, pp. 24551–24568, 2024, doi: 10.1109/JIOT.2024.3378671.
[3] F. P. Eka Putra, F. Muslim, N. Hasanah, Holipah, R. Paradina, and R. Alim, “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” J. Sistim Inf. dan Teknol., pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.
[4] P. Divya and B. Sudhakar, “Route Optimization and Optimal Cluster Head Selection for Cluster-Oriented Wireless Sensor Network Utilizing Circle-Inspired Optimization Algorithm,” Int. J. Comput. Intell. Syst., vol. 17, no. 1, 2024, doi: 10.1007/s44196-024-00708-0.
[5] F. P. Eka Putra, L. Fitriyah, Z. Naimah, and S. A. Rofika, “Evaluasi Kinerja Aplikasi Wireshark Dalam Monitoring Jaringan Kecil Dengan Topologi Star dan Bus,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 164–176, 2025, doi: 10.47324/ilkominfo.v8i2.343.
[6] S. Harizan, P. Kuila, R. Kumar, A. Khare, R. Clonia, and A. Perti, “Improved genetic algorithm-based sensor nodes deployment for barrier coverage,” Int. J. Sens. Networks, vol. 43, no. 3, pp. 146–157, 2023, doi: 10.1504/IJSNET.2023.134905.
[7] N. Kashyap, S. Upadhyaya, M. Poriye, and S. Lalar, “Fuzzy-Based Clustering of Wireless Sensor Networks for Multiple Mobile Agent Itinerary Planning,” Int. J. Comput. Networks Commun., vol. 16, no. 6, pp. 57–74, 2024, doi: 10.5121/ijcnc.2024.16604.
[8] R. A. Abumalloh, M. Nilashi, K. B. Ooi, G. W. H. Tan, and H. K. Chan, “Impact of generative artificial intelligence models on the performance of citizen data scientists in retail firms,” Comput. Ind., vol. 161, 2024, doi: 10.1016/j.compind.2024.104128.
[9] F. P. E. Putra, K. Mufidah, R. M. Ilhamsyah, S. A. Efendy, and S. N. R. Barokah, “Tinjauan Performa RouterOS Mikrotik dalam Jaringan Internet: Analisis Kinerja dan Kelayakan,” Digit. Transform. Technol., vol. 3, no. 2, pp. 903–910, 2024, doi: 10.47709/digitech.v3i2.3446.
[10] S. Burok, F. P. Eka Putra, Akmal, and L. Fermadi, “Anti - Klon Pendekatan Ringan untuk Mendeteksi Serangan Kloning RFID,” Infotek J. Inform. dan Teknol., vol. 8, no. 2, pp. 458–468, 2025, doi: 10.29408/jit.v8i2.30392.
[11] G. Patil and A. M. Bhavikatti, “Energy aware optimized dynamic routing mechanism in wireless sensor networks,” Indones. J. Electr. Eng. Comput. Sci., vol. 30, no. 2, pp. 944–955, 2023, doi: 10.11591/ijeecs.v30.i2.pp944-955.
[12] Lalama Zahia, S. Fouzi, and B. Samra, “Node Localization Optimization in WSNS by Using Cat Swarm Optimization Meta-Heuristic,” Autom. Control Comput. Sci., vol. 57, no. 2, pp. 177–184, 2023, doi: 10.3103/S0146411623020104.
[13] V. Kumar and R. Arablouei, “Self-localisation of IoT devices with imperfect measurements via approximate maximum-likelihood estimation,” Int. J. Sens. Networks, vol. 46, no. 2, pp. 87–99, 2024, doi: 10.1504/IJSNET.2024.141787.
[14] K. C. Yankanaik and S. B. Munivenkatappa, “Dual step hybrid routing protocol for network lifetime enhancement in WSN-IoT environment,” Int. J. Reconfigurable Embed. Syst., vol. 13, no. 2, pp. 323–331, 2024, doi: 10.11591/ijres.v13.i2.pp323-331.
[15] D. D. Yang, M. Mei, Y. J. Zhu, X. He, Y. Xu, and W. Wu, “Coverage Optimization of WSNs Based on Enhanced Multi-Objective Salp Swarm Algorithm,” Appl. Sci., vol. 13, no. 20, 2023, doi: 10.3390/app132011252.
[16] Y. Wang, X. Xu, Z. Zhao, and F. Xiao, “Multisensors Time-Series Change Point Detection in Wireless Sensor Networks Based on Deep Evidential Fusion and Self-Distillation Learning,” IEEE Internet Things J., vol. 12, no. 1, pp. 1047–1063, 2025, doi: 10.1109/JIOT.2024.3474776.
[17] A. R. Affane M, H. Satori, Y. Boutazart, A. Ezzine, and K. Satori, “Machine Learning-Based Attack Detection for Wireless Sensor Network Security Using Hidden Markov Models,” Wirel. Pers. Commun., vol. 135, no. 4, pp. 1965–1992, 2024, doi: 10.1007/s11277-024-10999-3.
[18] O. J. Aroba et al., “A Bibliometric Analysis Review: The Emerging Technology of Artificial Intelligence for Non-Bio Inspired and Bio-Inspired Algorithm of Wireless Sensor Network from 2005–2022,” Int. J. Comput. Inf. Syst. Ind. Manag. Appl., vol. 17, pp. 207–227, 2025, doi: 10.70917/ijcisim-2025-0015.
[19] P. Ghanbari, S. Soleimani, and H. Ghaffarian, “An efficient routing protocol based on a fast-lookup cuckoo filter for Internet of things networks,” Int. J. Data Sci. Anal., vol. 20, no. 3, pp. 2737–2756, 2025, doi: 10.1007/s41060-024-00637-3.
[20] F. Prasetyo, E. Putra, M. Riski, M. S. Yahya, and M. H. Ramadhan, “Mengenal Teknologi Jaringan Nirkabel Terbaru Teknologi 5G,” J. Sistim Inf. dan Teknol., vol. 5, no. 2, pp. 167–174, 2023, doi: 10.37034/jsisfotek.v5i1.233.
[21] Z. Zhaohui, Z. Jiaqi, and L. Jing, “Q-learning-based semi-fixed clustering routing algorithm in WSNs,” Ad Hoc Networks, vol. 174, 2025, doi: 10.1016/j.adhoc.2025.103837.
[22] P. Prvulovic, N. Radosavljevic, D. Babic, and D. Drajic, “HERMEES: A Holistic Evaluation and Ranking Model for Energy-Efficient Systems Applied to Selecting Optimal Lightweight Cryptographic and Topology Construction Protocols in Wireless Sensor Networks,” Sensors, vol. 25, no. 9, 2025, doi: 10.3390/s25092732.
[23] M. Yang, G. Li, J. Wang, S. Gao, G. Hu, and M. Chen, “Fault diagnosis for wireless sensor networks based on belief rule base with attributes computing,” Int. J. Sens. Networks, vol. 47, no. 4, pp. 238–254, 2025, doi: 10.1504/IJSNET.2025.145627.
[24] I. Shallari, I. S. Leal, S. Krug, A. Jantsch, and M. O’Nils, “Design Space Exploration for an IoT Node: Trade-Offs in Processing and Communication,” IEEE Access, vol. 9, pp. 65078–65090, 2021, doi: 10.1109/ACCESS.2021.3074875.
[25] M. Haris and H. Nam, “Enhancing Energy Efficiency in IoT-WSNs Through Optimized PSO Cluster Head Selection,” IEEE Access, vol. 13, pp. 126496–126512, 2025, doi: 10.1109/ACCESS.2025.3583922.
[26] I. Al-Hejri, F. Azzedin, S. Almuhammadi, and N. F. Syed, “Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Applications,” Comput. Mater. Contin., vol. 79, no. 3, pp. 4197–4218, 2024, doi: 10.32604/cmc.2024.047117.
[27] A. Gazis and E. Katsiri, “Streamline Intelligent Crowd Monitoring with IoT Cloud Computing Middleware,” Sensors, vol. 24, no. 11, 2024, doi: 10.3390/s24113643.
[28] M. M. Gost, A. Perez-Neira, and M. A. Lagunas, “DCT-Based Air Interface Design for Function Computation,” IEEE Open J. Signal Process., vol. 4, pp. 44–51, 2023, doi: 10.1109/OJSP.2023.3241584.
[29] T. Koduru and R. Manjula, “Source location privacy in wireless sensor networks: What is the right choice of privacy metric?,” Wirel. Networks, vol. 29, no. 4, pp. 1891–1898, 2023, doi: 10.1007/s11276-023-03237-4.
[30] M. S. Sheela, J. J. Jayakanth, A. Ramathilagam, and J. Gracewell, “Secure wireless sensor network transmission using reinforcement learning and homomorphic encryption,” Int. J. Data Sci. Anal., vol. 20, no. 3, pp. 2851–2870, 2025, doi: 10.1007/s41060-024-00633-7.
[31] W. Luo, T. Yan, A. Xuan, Y. Zhong, and X. Zhao, “Adaptive Smart Radio Environment (ASRE): New Paradigm for Wireless Communication Networks,” IEEE Access, vol. 12, pp. 12437–12445, 2024, doi: 10.1109/ACCESS.2024.3355140.
[32] Fauzan Prasetyo Eka Putra, Debri Eko Arissandi, Achmad Rofiqi, and Moh Firman Hidayat, “Pemanfaatan Mikrotik Dalam Manajemen Bandwidth Pada Jaringan Sekolah,” 2025, researchgate.net. doi: 10.55606/jitek.v5i1.5938.
[33] R. Fayos-Jordan, R. Araiz-Chapa, S. Felici-Castell, J. Segura-Garcia, J. J. Perez-Solano, and J. M. Alcaraz-Calero, “ECO4RUPA: 5G-IoT Inclusive and Intelligent Routing Ecosystem with Low-Cost Air Quality Monitoring,” Inf., vol. 14, no. 8, 2023, doi: 10.3390/info14080445.
[34] X. Zhao, V. Sadhu, and D. Pompili, “Signal Recovery Performance Analysis in Wireless Sensing with Rectangular-Type Analog Joint Source-Channel Coding,” IEEE Trans. Wirel. Commun., vol. 22, no. 2, pp. 734–745, 2023, doi: 10.1109/TWC.2022.3142722.
[35] F. Prasetyo Eka Putra, S. R. Sutarsih, S. Sofiyulloh, P. Permana, and M. Umar Mansyur, “Optimalisasi Perancangan Aplikasi Manajemen Data Koloman, Di Desa Pulau Mandangin Sampang – Madura Berbasis Website,” Rabit J. Teknol. dan Sist. Inf. Univrab, vol. 9, no. 2, pp. 285–294, 2024, doi: 10.36341/rabit.v9i2.4840.
[36] S. Ali, M. Nadeem, S. Ahmed, M. A. Ullah, and M. Tahir, “3D Dynamic Topology With Energy-Aware Forwarding in Underwater Acoustic Networks (MAEARS),” IEEE Access, vol. 12, pp. 129319–129329, 2024, doi: 10.1109/ACCESS.2024.3434651.
[37] B. Lu, Y. Li, Y. Sun, and Y. Yang, “Leveraging Hybrid RF-VLP for High-Accuracy Indoor Localization with Sparse Anchors,” Sensors, vol. 25, no. 10, 2025, doi: 10.3390/s25103074.
[38] Z. Liu and J. Wang, “Power control algorithm for wireless sensor nodes based on energy prediction,” Wirel. Networks, vol. 30, no. 1, pp. 517–532, 2024, doi: 10.1007/s11276-023-03504-4.
[39] S. Dello Iacono, A. Depari, P. Ferrari, A. Flammini, S. Rinaldi, and E. Sisinni, “Reliable PID dual-rate controller based on LoRaWAN for long-range distributed systems,” Internet Things (The Netherlands), vol. 31, 2025, doi: 10.1016/j.iot.2025.101570.
[40] S. Felici-Castell, J. Segura-Garcia, J. J. Perez-Solano, R. Fayos-Jordan, A. Soriano-Asensi, and J. M. Alcaraz-Calero, “AI-IoT Low-Cost Pollution-Monitoring Sensor Network to Assist Citizens with Respiratory Problems,” Sensors, vol. 23, no. 23, 2023, doi: 10.3390/s23239585.
[41] U. B. Chaudhry and C. I. Phillips, “Smart data harvesting in cache-enabled MANETs: UAVs, future position prediction, and autonomous path planning,” Drone Syst. Appl., vol. 12, no. 1, pp. 1–15, 2024, doi: 10.1139/dsa-2024-0003.
[42] F. P. E. Putra, D. A. M. Putra, A. Firdaus, and A. Hamzah, “Analisis Kecepatan Dan Kinerja Jaringan 5G (generasi ke 5) Pada Wilayah Perkotaan,” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 47, 2023, doi: 10.51211/itbi.v8i1.2439.
[43] H. Gao, N. He, and T. Gao, “SVeriFL: Successive verifiable federated learning with privacy-preserving,” Inf. Sci. (Ny)., vol. 622, pp. 98–114, 2023, doi: 10.1016/j.ins.2022.11.124.
[44] Q. Yu, C. Yang, G. Dai, L. Peng, and X. Chen, “Synchronous Wireless Sensor and Sink Placement Method Using Dual-Population Co-evolutionary Constrained Multiobjective Optimization Algorithm,” IEEE Trans. Ind. Informatics, vol. 19, no. 6, pp. 7561–7571, 2023, doi: 10.1109/TII.2022.3211853.
[45] A. R. Kasetwar, S. L. Badjate, V. Butram, M. S. Narlawar, S. Pradhan, and R. Pethe, “Highly Sensitive RF Energy Harvesting System for Wireless Protocol in IoT Devices,” Nanotechnol. Perceptions, vol. 20, no. S6, pp. 703–712, 2024, doi: 10.62441/nano-ntp.v20iS6.56.
[46] F. P. Eka Putra, A. Muzayyin, and M. U. Mansyur, “ANALISIS KUALITAS LAYANAN ABSENSI BERBASIS FINGER BERDASARKAN Quality of Service,” J. Inform., vol. 24, no. 1, pp. 17–25, 2024, doi: 10.30873/ji.v24i1.3949.
[47] F. P. Eka Putra, Amir Hamzah, W. Agel, and R. O. Firmansyah Kusuma, “Impelementasi Sistem Keamanan Jaringan Mikrotik Menggunakan Firewall Filtering dan Port Knocking,” J. Sistim Inf. dan Teknol., pp. 82–87, 2024, doi: 10.60083/jsisfotek.v5i4.329.
[48] M. A. Saad, R. Jaafar, and K. Chellappan, “Variable-Length Multiobjective Social Class Optimization for Trust-Aware Data Gathering in Wireless Sensor Networks,” Sensors, vol. 23, no. 12, 2023, doi: 10.3390/s23125526.
[49] F. P. E. Putra, R. W. Efendi, A. B. Tamam, and W. A. Pramadi, “Tren dan Praktik Terbaik dalam Pengembangan Web Berbasis API : Kajian Literatur terhadap Framework Laravel dan React,” Infomatek, vol. 27, no. 1, pp. 165–178, 2025, doi: 10.23969/infomatek.v27i1.25122.
[50] H. Xu and X. Yuan, “Cross-Layer Design for Energy-Efficient Reliable Multi-Path Transmission in Event-Driven Wireless Sensor Networks,” Sensors, vol. 23, no. 14, 2023, doi: 10.3390/s23146520.
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2026 Ahmad Fauzan, Khoirul Mufid (Penulis)

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.








