TEKNOKOM
Latest Publications


TOTAL DOCUMENTS

39
(FIVE YEARS 34)

H-INDEX

1
(FIVE YEARS 0)

Published By Universitas Wiralodra

2686-3219, 2621-8070

TEKNOKOM ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 66-72
Author(s):  
Muh Pauzan ◽  
Indri Yanti

TEKNOKOM ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 53-59
Author(s):  
T. Husain ◽  
Nuzulul Hidayati

Data mining is the process of finding interesting patterns and knowledge from large amounts of data. Sources of information service, especially in the library, include books, reference books, serials, scientific gray literature (newsletters, reports, proceedings, dissertations, theses, and others). The importance of this research being carried out in the library in this study aims to implement data mining with the association rule method to solve problems, especially in the placement of shelves based on the category of the printed version of the book collection. This research method uses a qualitative research approach. Data was collected using documentation techniques and deep analysis of existing weaknesses to identify user needs whose information was obtained through observation and interviews with key informants (admin, user, etc.). For example, the determination of the best book placement patterns can be done by looking at the results of the tendency of visitors to borrow books based on a combination of 2 item sets with 60 percent of confidence value every month or week and must be evaluated or take a calculate again.


TEKNOKOM ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 60-65
Author(s):  
Pranoto Budi Laksono

Visible Laser Light Communication System (VLLC) is a wireless communication system, using laser as the medium. In the data transfer process, it is possible to have optical interference where 2 laser beams coincide with one point on the reflector. Research on the effect of laser source interference has been carried out by several researchers including mitigation actions to reduce its effects. This experiment uses 2 optical distance sensors that produce a laser with a wavelength of 650 nm with a power <=4.1 mW and with the direction of the laser beam both of them cross each other. To determine the effect of the interference of two laser beams when crossing the communication process in the visible light communication system, a reflector is used which can capture the two laser beams and the reflector can be shifted gradually so that a condition can be obtained where the two laser beams meet at one point. From the measurements made at the points after the laser beam crossing, the measurements at the point where the beam crossed, and the measurements at the points before the beam crossing, it was obtained data, at the exact point where the laser beam crossed the interference occurred, which is indicated by unstable output voltage of the two lasers, so that communication at the point of intersection is disrupted. However, if outside the point of contact both before and after the point of contact, interference and communication systems will not occur.


TEKNOKOM ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 48-52
Author(s):  
Pardomuan Robinson Sihombing

This study will examine the application of several classification methods to machine learning models by taking into account the case of imbalanced data. The research was conducted on a case study of classification modeling for working status in Banten Province in 2020. The data used comes from the National Labor Force Survey, Statistics Indonesia. The machine learning methods used are Classification and Regression Tree (CART), Naïve Bayes, Random Forest, Rotation Forest, Support Vector Machine (SVM), Neural Network Analysis, One Rule (OneR), and Boosting. Classification modeling using resample techniques in cases of imbalanced data and large data sets is proven to improve classification accuracy, especially for minority classes, which can be seen from the sensitivity and specificity values that are more balanced than the original data (without treatment). Furthermore, the eight classification models tested shows that the Boost model provides the best performance based on the highest sensitivity, specificity, G-mean, and kappa coefficient values. The most important/most influential variables in the classification of working status are marital status, education, and age.


TEKNOKOM ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 43-47
Author(s):  
Sigit Wibawa

This paper provides an overview of the wireless handoff process on wireless networks by investigating Authentication Protocol using EAP -AKA (Extensible Authentication Protocol) - Authentication and Key Agreement The EAP-AKA protocol was developed for LAN networks or mobile network devices, the authors found ineffective network procedures guaranteed that made the attacks MITM and DoS attacks may occur. In addition, we find the storage procedures and resource submissions not safe enough to withstand DoS attacks. Focusing on Both types of attacks, the authors are interested in existing security protocol methods and written by researchers, then perform Systematic Literature Review (SLR) by using international journals database ie from the IEEE organization with the use of wireless handoff attack keyword in the middle of the world and obtained some related journals which need further research to deepen the Systematic Literature review, by offering a structured, methodical, and meticulous approach to understanding the research trends of handoff security issues on wireless networks and mobile networks. The purpose of this research is to provide credible intellectual guidance for future researchers to help them identify areas in the study. Most SLR is limited to conference papers and journal articles published by IEEE from 2015 to 2021. This study reveals that the protocol, privacy and security of the handoff process are the least studied, while the operating problems, architecture, methods in the handoff process get much attention in the literature.


TEKNOKOM ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 37-42
Author(s):  
Indra Surya Permana ◽  
Taufik Hidayat ◽  
Rahutomo Mahardiko

As of today, the mobile apps may be downloaded everywhere. The development of mobile apps depends on the type of the work. An increasing use of mobile app is scanner apps due to an easy use. This paper presents the regression analysis on employment and educational background of the mobile scanner app because this research used category in the questionnaire. The use of logistic regression is to prove that any different comparisons are detected between employment and educational background so that the use of mobile scanner can be optimally used. The results show that educational background and employment have vital roles for mobile scanner adoption. This study also proves that previous researches on mobile scanner adoption were true for UTAUT model and comparison analysis.


TEKNOKOM ◽  
2021 ◽  
Vol 4 (1) ◽  
pp. 30-36
Author(s):  
Budi Santoso ◽  
Asrul Sani ◽  
T. Husain ◽  
Nedi Hendri

Data exchange communication has developed, which leads to centralized communication, and to achieve this communication requires a type of data communication whose data is accommodated on the server and can be accessed by clients, such as at organization. As a company engaged in education, the development of centralized data communication by utilizing the intranet network has been formed. The use of an intranet network allows data communication that is vulnerable to wiretapping. To fix this using a VPN network. L2TP and IPsec VPNs have different performances, especially in the level of security provided. In this study, an analysis of the L2TP and IPsec VPN network performance was carried out on the SMB Server on the Ubuntu server and the Mikrotik router for its VPN configuration. In this study, the L2TP and IPsec VPN was designed by configuring the Mikrotik RB 450G router and the SMB Server configuration using Command Line Interface on Ubuntu 18.04 server. For security analysis, use hacking methods to get VPN Server login data and sniffing methods to get SMB Server login data and SMB data. For performance analysis using parameters of delay, throughput, and packet loss. Wireshark is software for checking by capturing each packet of data from an interface. The research objective to be achieved is to design a VPN technology based on L2TP & IPSec, to be able to determine the resulting performance after implementing a VPN based on L2TP & Ip Sec. The result is that VPN can connect from HO to branch one and branch two or connect from public connection to local connection. The Ubuntu server used is also running well, so it helps the VPN process properly.


TEKNOKOM ◽  
2021 ◽  
Vol 4 (1) ◽  
pp. 7-15
Author(s):  
Achmad Udin Zailani ◽  
Alvino Octaviano ◽  
Sholihin Sholihin

Computers are one form of advances in electronic and informatics technology; the function of the computer itself serves as a tool for writing, drawing, editing images or photographs, or as a means of storage. Android, a Linux-based operating system, is a smart operating system that can compete with operating systems on a computer. Some of the problems identified include user difficulties in overcoming computer damage to determine whether to repair or buy a new unit, difficulty in reaching authorized service providers, risks when deciding to repair at a public service place, and limited access to information and costs repairing computer damage. This research specifically designs an Android application-based computer service application that makes it easier for people to get service services. The above research results formulate computer repair services using an Android-based platform with Android Studio and MySQL as the database for this study. This application is expected to be useful for customers in terms of time and cost.


TEKNOKOM ◽  
2021 ◽  
Vol 4 (1) ◽  
pp. 21-29
Author(s):  
Harry Candra Sihombing

The 5G cellular networks are “urban” areas technology in nature, extensively deployed where the user’s density is high to provide very high data rates, coupled with extremely low delays and dealing with very high mobility of users. On the contrary, one-third of people experience a lack of mobile broadband connectivity living in rural zones. These mobile broadband lacks recognized as the main barriers impairing the Sustainable Developing Goals (SDGs) defined by the United Nations. Those that are not currently covered will be unlikely to be covered also soon, as the network operators are not keen to invest in such zones, because of potentially low revenues. While it is confirmed that 5G would meet stringent requirements in urban zones, rural areas still suffer from almost inexistent MBB (Mobile Broadband) coverage, especially in the developing world. The big deal of isolated rural areas, which are sparsely inhabited by low-income populations, is that the classical access using traditional backhaul technologies is a bad solution for operators since it does not ensure a good ROI (Return of Investment).


TEKNOKOM ◽  
2021 ◽  
Vol 4 (1) ◽  
pp. 16-20
Author(s):  
Andrie Yuswanto ◽  
Budi Wibowo

A very significant increase in the spread of malware has resulted in malware analysis. A recent approach to using the internet of things has been put forward by many researchers. Iot tool learning approaches as a more effective and efficient approach to dealing with malware compared to conventional approaches. At the same time, the researchers transformed the honeypot as a device capable of gathering malware information. The honeypot is designed as a malware trap and is stored on the provided system. Then log the managed events and gather information about the activity and identity of the attacker. This paper aims to use a honeypot in machine learning to deal with malware The Systematic Literature Review (SLR) method was used to identify 207. Then 10 papers were selected to be investigated based on inclusion and exclusion criteria. . The technique used by most researchers is to utilize the available honeypot dataset. Meanwhile, based on the type of malware being analyzed, honeypot in machine learning is mostly used to collect IoT-based malware.


Sign in / Sign up

Export Citation Format

Share Document