Claim Missing Document
Check
Articles

Found 20 Documents
Search

ANALISIS QOS MENGGUNAKAN WIRESHARK TERHADAP KINERJA JARINGAN WLAN CV. VICTORY GLOBALINDO JAYA Gary, Gary; Maslan, Andi
JATI (Jurnal Mahasiswa Teknik Informatika) Vol. 8 No. 6 (2024): JATI Vol. 8 No. 6
Publisher : Institut Teknologi Nasional Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/jati.v8i6.12011

Abstract

Di era digital saat ini, jaringan yang cepat dan andal sangat penting untuk menunjang operasi bisnis, termasuk di perusahaan supplier scaffolding seperti CV. Victory Globalindo Jaya. CV. Victory Globalindo Jaya menghadapi tantangan dalam mempertahankan kinerja jaringan WLAN yang memadai untuk mendukung operasional bisnisnya. Kinerja jaringan yang kurang optimal menyebabkan terganggunya efisiensi dan produktivitas, yang dapat berdampak pada kegiatan operasional. Untuk mengatasi permasalahan ini, dilakukan analisis Quality of Service (QoS) guna mengidentifikasi parameter yang perlu ditingkatkan. Pengukuran dilakukan menggunakan aplikasi Wireshark dengan parameter utama: throughput, packet loss, delay, dan jitter, melalui observasi dua skenario berbeda, yaitu pukul 10:00 – 11:00 dan 14:00 – 15:00. Hasil analisis menunjukkan bahwa throughput berada dalam kategori "Jelek" (129.91 Kbps dan 80.32 Kbps), sementara packet loss (6.71% dan 6.11%), delay (29.77 ms dan 38.45 ms), serta jitter (29.77 ms dan 38.45 ms) berada dalam kategori baik. Kendala utama ada pada throughput, sehingga peningkatan pada parameter ini diperlukan untuk memastikan jaringan yang stabil dan mendukung operasional Perusahaan
Malware Classification and Detection using Variations of Machine Learning Algorithm Models Maslan, Andi; Hamid, Abdul
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol. 11 No. 1 (2025): March
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v11i1.30477

Abstract

Malware attacks are attacks carried out by an attacker by sending malicious codes to various files or even many packages and servers. Therefore, reliable network operations are a factor that needs to be considered to prevent attacks as early as possible in order to avoid more severe system damage. Types of attacks can be Ping of Death, flooding, remote-controlled attacks, UDP flooding, and Smurf Attacks.  Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. The purpose of the study is to detect, classify malware attacks using a variety of ML Algorithm models such as SVM, KNN and Neural Network and testing detection performance. The research stage starts from pre-Processing, extraction, feature selection and classification processes and performance testing. Training and testing data in the study used a mixed model, namely data division, split model and cross validation. The results of the study concluded that the best algorithm for detecting malware packages is the Neural Network for the Feature Combination category with an accuracy rate of 96.91%, Recall of 97.35% and Precision of 96.78%. So that the study can have implications for cyber experts to be able to prevent malware attacks early. While further research requires a special algorithm to improve malware attack detection, in addition to KNN, SVM and Neural Network. And another research challenge is to focus on feature extraction techniques on datasets that have unbalanced or varied features with the Natural Language Processing (NLP) approach. So this research can be used as a reference for researchers who are conducting research in the same field.
SISTEM PEMBUANGAN SAMPAH OTOMATIS MENGGUNAKAN AUTOMATIC GUIDED VEHICLE BERBASIS GPS ULTRASONIK Yonanta, Rhesty Dian; Maslan, Andi
Computer Science and Industrial Engineering Vol 3 No 2 (2020): comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT In a housing complex, there are many conditions that make people do not care about cleanliness in the environment because there are various factors that are mostly caused by the waste disposal site is too far away and the time of collection of garbage for TPS officers when taking garbage to housing is not timely and less disciplined due to limitations labor so that a solution will be needed to overcome these problems. In this final project an automatic waste disposal system will be designed using an ultrasonic GPS-based automatic guide vehicle. In the robot car will be programmed a timing that will set the time lag needed for this robot car to take garbage from one house to another following the route that has been set. The way this robot works if there is a blockage in front of the house automatically it will automatically stop and because there is an Ultrasonic GPS sensor that helps it. The results of the final project of an automatic garbage disposal system using an ultrasonic GPS-based automatic guide vehicle can transport as much as 5kg of garbage. To run this robot using the Arduino Uno. Keywords: Rubbish, Automatic guide vehicle, GPS ultrasonik
KEAMANAN JARINGAN DARI SERANGAN PAKET DATA SNIFFING DI PT RADEN SYAID KANTOR POS PIAYU KOTA BATAM ihsana, angga novenzo; Maslan, Andi
Computer Science and Industrial Engineering Vol 3 No 5 (2020): comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Pada era jaman moden ini hapir semua orang menggunakan internet untuk mencari data penting atau kerja, dan lain-lain. Dalam hal ini ke aman jaringan di butuhkan untuk menajaga ke stabilan dalam berinternet atau dalam berbagai transaksi yang terjadi dalam jaringan. Pada kasus ini keaaman jaringan sangat berperan penting untuk mernajaga dan menstabilkan kinerja sistem. Salah satu aplikasi yang di gunakan dalam jurnal ini adalah snort yang di mana dapat melihat paket data yang berjalan pada interface jaringan, Dan snort juga dapat memblok IP atau MAC addres yang di anggap berbahaya. Bukan cuman itu saja di penelitian ini juga menggunakan Wireshark yang di mana bisa melihat aktifitas apa saja yang berjalan pada jaringan terbut. Sehingga untuk keaman jaringan yang lebih baik. Pada peneletian kali ini untuk menguji apakah sebuah sistem telah aman atau tidak menggunakan LOIC ,NMAP, WinArpAttacker. Yang di mana aplikasi tersebut di peruntukan untuk penyerangan
IMPLEMENTASI METODE K-NEAREST NEIGHBORDALAM PERAMALAN PENJUALAN MOBIL BEKAS DI KOTA BATAM Rafsyanzani s, Firman Firmansyah; Maslan, Andi
Computer Science and Industrial Engineering Vol 4 No 2 (2021): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT The development of information technology begins to enter the most important part in a field of work, information obtained in a job is general and specific. Computers are one of the results of technological developments that can be used to help all types of work, including transactions in business work, with those in the computer software, a user can perform transaction operations quickly. The use of computers is also needed by a marketing. Car sales of PT. Auto Grace is a company engaged in the sale and purchase of used cars, an area domiciled in the city of Batam. Car sales at PT. Auto Grace is currently still unstable and many cars are not sold and are not maintained due to the lack of consumer interest in buying. So that the company does not experience sales problems, the company leadership must be able to find solutions in a way that is able to predict. So this study aims to predict car sales using the K-NN algorithm. The data set used to predict is taken from sales data from 2017 to 2020. After analysis using the K-NN algorithm, with the help of rapidminer software, the accuracy rate in predicting sales is 63.89% with a precision level of 100%. . The question of take that sale car at year 2021 will experience a decline, due to the outbreak of the Covid-19 virus which has resulted in an economic recession.
MEMBANGUN PC CLONNING BERBASIS WINCONNECT Utomo, Imam Budi; Maslan, Andi
Computer Science and Industrial Engineering Vol 4 No 2 (2021): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Operating systems have become a necessity today in various government agencies, industry, and universities and have used computers to help with daily work. As users, of course, they want the ease of operating a system, such as sharing files, sharing windows, sharing the internet, and sharing various kinds of multimedia. In connection with sharing an operating system or windows, of course the term remote desktop is known, this term is rarely known by users, even never used. Based on these problems, this study discusses Building a PC Clonning Network Using Winconnect and Remote Desktop. From this problem, the purpose of this research is to build a PC Clonning network that functions to minimize or cover the shortcomings of PC specifications that do not meet the standards accurately, effectively, and efficiently and also to be able to determine the success of the PC Cloning that it has built, so that it can walk more significantly and can be enjoyed. To achieve this goal, direct observation (observation) and descriptive statistics are used, so that the results of these methods have been obtained from observations and statistical analysis in the observation process, with PC Clonning users can access the windows display remotely, save upgrade costs, increase pc performance. The test results in this study showed the success rate of PC Clonning with remote desktop on PC 1 (one) to PC 4 (four), it was seen that before cloning the processor was 0%, memory was 19%, network was 0%, while after the cloning process the processor was still steady at 0%, memory increased to 20% and networking to 0.01%. Second, processor 0%, memory 21%, network 0%, processor 1%, memory 23% and networking to 0.04%. Third, 1% processor, 30% memory, 0% network, 4% processor, memory increased to 32% and networking to 8%. And fourth, processor 7%, memory 63%, network 0%, processor 20%, memory increased to 65% and networking to 0.01%.
PERANCANGAN PRIVATE CLOUD COMPUTING MENGGUNAKAN OWNCLOUD Wiyono, Pieter; Maslan, Andi
Computer Science and Industrial Engineering Vol 5 No 2 (2021): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cloud computing has an important role for development of technology. Cloud computing is the use of internet network technology to become a central server for managing and storing data. Cloud computing is very useful, especially for large companies, because it saves more data storage space, data is also safer than those who still store data in conventional ways such as using a flash or hard disk. In addition, by using cloud storage, users such as employees in companies can send data to each other quickly, so they can save time and be more efficient in their performance. The problems that are transported are how users can store and exchange data, the process of designing cloud storage, and also utilizing cloud storage services. The purpose of this research is to design, implement, and evaluate private cloud storage. Based on the objectives, the result of this research is the system design is done using PHP to design the web interface. From the web interface it is connected to OwnCloud using the REST API protocol. After that, the private cloud storage system is implemented in a company and evaluated so that it gets a system that can run and function properly.
APLIKASI PROMOSI PROPERTI BERBASIS WEB MENGGUNAKAN METODE WATERFALL Gunawan, Heri; Maslan, Andi
Computer Science and Industrial Engineering Vol 6 No 2 (2022): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Until now, technological advances that continue to develop rapidly have made all jobs in life switch to using complex of technology that can facilitate all types of business activities will be easier, faster, and more efficient PT Winner Nusantara Jaya is a company engaged in property sales. The problem often faced by property sales companies is that they still use print media and social media in property promotion so it is necessary to have an information system that contains complete information about the properties that exist in PT. winner archipelago jaya information on business marketing activities as well as sales. In modeling the system that will be used by researchers is UML for the research program using the PHP programming language and also for the researcher database using MYSQL the result of the design of this information system is to assist consumers in finding property products at PT. winner archipelago jaya.
PERANCANGAN APLIKASI E-GALON BERBASIS ANDROID Tampubolon, Piala; Maslan, Andi
Computer Science and Industrial Engineering Vol 6 No 5 (2022): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

abstract
IMPLEMENTASI CAESAR CIPHER PADA ALGORITMA KRIPTOGRAFI KLASIK DALAM PENYANDIAN PESAN Ziliwu, Krisma Budi; Maslan, Andi; Kremer, Hendri
Computer Science and Industrial Engineering Vol 7 No 2 (2022): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Criptography is an art of knowledge to learn of securing the information in a message. The security of the message consists of confidentiality, integrity and authentication. The key for coding the message to convert the original message into readable form has different algorithms. The difference of algorithm based of what the key used when encript and descrypt the message. Symmetric key cryptography uses same key when user do encrypt and descrypt. But when user do encrypt and descrypt with different key it’s called asymmetric key cryptography. The main topic of this paper will be concerned about how to do symmetric key algorithm with subtitution method. Caesar cipher is example of subtitution method.