Claim Missing Document
Check
Articles

Found 35 Documents
Search

Network Log Implementation for GRU Based Bandwidth Classification Nurcahyo, Azriel Christian; Huong Yong Ting; Abdulwahab Funsho Atanda
Journal of Computers and Digital Business Vol. 4 No. 2 (2025)
Publisher : PT. Delitekno Media Madiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56427/jcbd.v4i2.763

Abstract

Network bandwidth management using log data is a challenging task, especially in anomaly detection, e.g., fraudulent bandwidth that violates the Service Level Agreement (SLA). The present study suggests a deep learning automatic classification method for network logs, which leverages the Gated Recurrent Unit (GRU) and is used in time-series tensor configurations given as [N, 5, 15]. Data was gathered in real time during 29 days with the aid of a MikroTik RB1100AHx router, and it created more than 867,000 rows of data with three logs per second. The logs were classified into three classes: Genuine, Fake, and No Heavy Activity. Pre-processing involved windowing sequences, normalisation, and SMOTE balancing, whereas the GRU model comprised update and reset gates, followed by a Dense layer and a Softmax 3-class output. The model was trained with categorical cross-entropy loss and optimized with the Adam optimizer, validated with a 5-fold cross-validation strategy. The results achieved a 86.8% mean accuracy and an F1 score of 0.90 in the classification of Genuine Bandwidth, indicating that the GRU can successfully detect temporal patterns in network logs. This system is locally deployable through the G-Radio interface, demonstrating its feasibility, scalability, and substantial contribution to automatic bandwidth classification without packet inspection.
Prototype Sistem Pengunci Pintu Melalui Internet Menggunakan Arduino Uno Berbasis Android Latif, Kurniadin Abdul; Wahyudi, Wahyudi; Nurcahyo, Azriel Christian
Jurnal Bumigora Information Technology (BITe) Vol. 3 No. 1 (2021)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v3i1.1327

Abstract

Internet of Think (IoT) is emerging as a big issue on the internet, it is expected that billions of objects will be equipped with various types of sensors connected to the internet through networks as well as technology support such as embedded sensors and actualization. This study aims to design and analyze the application of a prototype door locking system via the internet using Arduino Uno based on Android. This research uses the SDLC method in designing and developing a prototype door lock system over the internet using Arduino Uno based on Android. There are 3 stages of the SDLC method used in this research, namely Requirements Analysis, System Design, and System Implementation. The input from this system is in the form of on and off commands from smartphones that are sent to thingspeak as a server service and will be continued to Arduino devices that have been connected to a solenoid doorlock. If the door is opened, the magnetic sensor switch will send the information back to Thingspeak and continue to the smartphone as feedback. The results of the tests that have been carried out are that the average time required for lock = 4.36 seconds and unlock = 5.30 seconds, while the average sensor test time required to send sensor data with conditions Open = 12.33 seconds and Closed = 12.43 seconds. The delay time depends on the condition of the network connected to the system.
Pelatihan dan Pendampingan Penggunaan Aplikasi Absensi Digital Perumdam Tirta Bengkayang Mira, Mira; Nurcahyo, Azriel Christian; Gudiato, Candra
Abditeknika Jurnal Pengabdian Masyarakat Vol. 5 No. 1 (2025): April
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/abditeknika.v5i1.4988

Abstract

  Sistem atau aplikasi absensi digital telah banyak diterapkan oleh instansi pemerintah, swasta, perguruan tinggi dan instansi lainnya dalam hal ini Perumdam Tirta Bengkayang. Sistem Informasi Absensi Perumdam Tirta Bengkayang merupakan kerangka kerja yang digunakan untuk memudahkan pendataan kehadiran pegawai. Sistem absensi digital yang digunakan pada saat ini  memiliki keterbatasan seperti belum dapat menghitung jam efektif kerja secara otomatis serta belum terdapat fitur untuk mengantur jam presensi secara fleksibel. Dibalik sistem digital yang telah banyak diterapkan tidak menutup kemungkinan bahwa proses pengoperasian dengan fitur dan menu yang ada dapat membingungkan penggunanya. Oleh karena itu diperlukan pelatihan dan pendampingan penggunaan aplikasi agar user dapat mengenali fungsi  fitur dan menu yang tersedia. Tujuan dari pengabdian masyarakat ini adalah penulis akan membantu pihak Perumdam Tirta Bengkayang dalam pelatihan serta pendampingan sistem informasi absensi untuk memastikan sistem berjalan sesuai dengan fungsinya dan dapat dipahami oleh pengguna sistem. Berdasarkan hasil kegiatan pengabdian pelatihan dan pendampingan, bahwa pegawai dan admin dapat mengimplementasikan sesuai fungsi fitur masing-masing sistem. Sedangkan proses pendamping lebih dominan untuk admin, mengingat fungsi fitur yang terdapat pada admin lebih bervariasi, namun tidak membatasi untuk pegawai yang mengalami kendala seperti tiak dapat absen dan lupa password. Adapun masalah yang telah diatasi pada proses pendampingan seperti ekspor dan olah data pegawai dengan menghitung jam efektif masuk kerja menggunakan rumus pada excel. Menambah data admin, membuat dan mempublish pengumuman, serta bukti lampiran check-in dan check-out berupa foto selfie.   Digital attendance systems or applications have been widely implemented by government agencies, private companies, universities and other agencies in this case Perumdam Tirta Bengkayang. The Perumdam Tirta Bengkayang Attendance Information System is a framework used to facilitate employee attendance data collection. Behind the digital system that has been widely implemented, it is possible that the operating process with existing features and menus can confuse its users. Therefore, training and assistance are needed in using the application so that users can recognize the functions of the available features and menus. The purpose of this community service is that the author will assist Perumdam Tirta Bengkayang in training and assistance for the attendance information system to ensure that the system runs according to its function and can be understood by system users. Based on the results of the training and assistance service activities, employees and admins can implement according to the function of each system's features. While the assistance process is more dominant for the admin, considering that the function of the features contained in the admin is more varied, but does not limit employees who experience obstacles such as not being able to be absent and forgetting passwords. The problems that have been resolved in the assistance process such as exporting and processing employee data with the calculation of effective hours of work using formulas in Excel. Add admin data, create and publish announcements, and attach proof of check-in and check-out in the form of selfie photos.
Classification of Simulated Fake Bandwidth Data Using LSTM Nurcahyo, Azriel Christian; Yong, Alan Ting Huong; Atanda, Abdulwahab Funsho
TEPIAN Vol. 5 No. 3 (2024): September 2024
Publisher : Politeknik Pertanian Negeri Samarinda

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51967/tepian.v5i3.3106

Abstract

Hardly will someone acknowledge that the bandwidth we use every day is as authentic as most ISPs advertise, even those offering dedicated services. There are usually shortcomings, especially on upload and download bandwidth speeds. This paper presents the classification of simulated fake bandwidth data using the Long Short-Term Memory model, which though seldom found, is a very effective approach in network analysis. There were 1400 bandwidth data points collected from the MikroTik RB 1100 AHx device in a month, then further processed with normalization, and divided to have 80% training and 20% testing. The LSTM model applied had an accuracy rate of 98.93%, proving that it is capable of classifying either genuine or fake bandwidth instances accordingly. Of 1,400 test data points, the model managed to classify 723 as fake bandwidth and another 677 as genuine, resulting in a classification error rate of only 1.07%. The results clearly prove that LSTM has huge potential for real-time bandwidth manipulation detection, key to enhancing trust and efficiency in network management. In this respect, this research shows that bandwidth analysis combined with LSTM can be an original solution for network monitoring
Quality of Service (QoS) Analysis of the Internet Network at Diskominfo Bengkayang Regency Sari, Maya; Cahyaningtyas, Christian; Nurcahyo, Azriel Christian
REKA ELKOMIKA: Jurnal Pengabdian kepada Masyarakat Vol 6, No 3 (2025): Reka Elkomika
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/rekaelkomika.v6i3.207-216

Abstract

The rapid growth in internet usage in recent years has placed significant demands on network service quality. Technological developments and increasingly complex communication needs have made it important to improve the Quality of Service (QoS) of internet networks at Diskominfo Bengkayang Regency. Optimal Quality of Service is essential to support critical applicationssuch as video conferencing, streaming, and other real-time applications. Obstacles such as high latency, low throughput, and lack of prioritization in traffic management can hinder the user experience and reduce service effectiveness. By optimizing QoS, not only does it ensure that critical services receive the appropriate priority, but it also improves the overall efficiency of network resource usage. The involvement of this prioritization scheme in the network infrastructure provides a holistic solution, combining a deep understanding of latency, throughput, and prioritization needs. All of this is done in an effort to optimize QoS so that users can enjoy a good experience when using internet access.