Claim Missing Document
Check
Articles

Found 7 Documents
Search
Journal : Journal of Computer Science and Informatics Engineering (J-Cosine)

perancangan dan implementasi sistem pelaporan monitoring spektrum frekuensi radio Eet Widarini; I Gede Pasek Suta Wijaya; Andy Hidayat Jatmika
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 2 No 1 (2018): Juni 2018
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1652.765 KB) | DOI: 10.29303/jcosine.v2i1.33

Abstract

Loka Monitor Spektrum Frekuensi Radio Mataram office is technical implementation unit is in the Directorate General of Resources and Post and Information. This unit is in charge to implementing the monitoring and control in the field of radio frequency spectrum. This includes monitoring activities consisted of observation frequency band, radio station fixed service / mobile, radio broadcasting and television broadcasting. Currently, the reporting of data processing for monitoring activities is still done manually. To search for any deviation either center frequency deviation, bandwidth deviation nor search for legality of a station so the data must be analyzed one by one. While for the report generation and monitoring data recapitulation that has been processed will be sorted, then be transferred to ROL format (Report Online) as a report to the central office. Therefore, required a system that can process data computerized in order to obtain information about deviations. And required a system that can create reports and monitoring activities recapitulation per point location, per day, per week, per month, per three months, per six months and per year. The system is built by using CodeIgniter framework with the programming language PHP and HTML. The system was developed with six stages : data collecting, literature study, system design, coding / implementation, testing and reporting. Based on the test results that have been done on reporting system that were tested on 6 respondents of employees and 30 informatics students with the average percentage of the answer is 90.65% it the proposed system is already running well according to user needs.
ANALISIS PENGARUH JUMLAH CLIENT DAN JARAK CAKUPAN WIRELESS AP IEEE 802.11 N TERHADAP KUALITAS JARINGAN WLAN MENGGUNAKAN TEKNIK UR DAN WDS Ilmiatul Hafazah; I Wayan Agus Arimbawa; Andy Hidayat Jatmika
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 2 No 1 (2018): Juni 2018
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (907.402 KB) | DOI: 10.29303/jcosine.v2i1.99

Abstract

The most widely circulated standard WLAN network in the market today is IEEE 802.11n. To build a more practical WLAN network using UR and WDS techniques. This study aims to measure and analyze the effect of the number of clients and distance to the quality of WLAN networks using UR and WDS techniques with parameters of bandwidth, jitter, and packet loss. The results of data analysis are known that the more clients and the further distance the transmission can reduce the quality of UR and WDS networks. The best network quality is generated UR network at 7.5 m distance with bandwidth average of 11934.7035 Kbps, jitter average 2,3563135 ms, and packet loss average 1.90% compared to WDS network with average bandwidth 3846.9135 Kbps, average jitter 9.496095 ms, and packet loss average 5.23%. The worst quality network produced by WDS network at 30 m distance with bandwidth average of 898.32735 Kbps, jitter average of 37.32591 ms, and the average packet loss of 47.10% compared to UR network with an average bandwidth of 8859,797 Kbps, the average jitter 13.082195 ms, and the average packet loss of 19.24%. The overall result of the measurement is known that UR technique is superior to WDS in building a WLAN network.
Analisis Pengaruh Metode LET Pada Protokol Routing Proaktif dan Reaktif Pada Jaringan MANET Hidayatul Akbar; Andy Hidayat Jatmika; Moh. Ali Albar
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 2 No 2 (2018): Desember 2018
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (567.995 KB) | DOI: 10.29303/jcosine.v2i2.143

Abstract

Protokol Destination-Sequenced Distance Vector (DSDV) merupakan salah satu protokol proaktif yang ada pada jaringan Mobile Ad-Hoc dimana protokol ini tidak cocok untuk digunakan pada jaringan dengan mobilitas tinggi dikarenakan DSDV perlu memperbaharui tabel routing secara rutin jika terdapat link antar node yang terputus karena terdapat node yang bergerak keluar dari jangkauan sinyal transmisi dan protokol AODV merupakan protokol yang cocok dengan mobilitas tinggi karena bersifat reaktif. Sehingga dalam pencarian rute yang stabil dapat dilakukan dengan memilih rute yang memiliki kemungkinan kecil terputus. Algoritma LET digunakan pada protokol DSDV untuk menemukan rute yang paling stabil dengan mengetahui estimasi waktu antar dua node tetap terhubung berdasarkan posisi, kecepetan dan jangkauan sinyal transmisi kemudian dibandingkan dengan protokol routing AODV berdasarkan parameter berupa throughput, packet delivery ratio dan delay. Hasil penelitian menunjukkan bahwa protokol routing S-DSDV memiliki kinerja yang lebih baik dari protokol routing DSDV standar. Kata kunci : DSDV, Link Expiration Time, AODV, MANET, Routing Protocol
Implementation of the Best Neighboring Node Selection Algorithm on DSR Routing Protocol in MANET Andy Hidayat Jatmika; Susilo Pandu Waskito; Ariyan Zubaidi
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 6 No 1 (2022): June 2022
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v6i1.435

Abstract

Mobile Ad Hoc Network (MANET) is a wireless telecommunications technology that consists of a collection of dynamic nodes. Due to these properties resulted in the mobility of nodes in MANET. So that every relationship between nodes will always change and cause the process of finding a vulnerable route to take a long time. Each node also has a role as a host or router in exchanging information. In MANET delivery assurance and the ability to deal with path changes on an ad hoc basis are critical. So that in sending data packets from the source node to the destination node, a Routing protocol is needed. The routing protocol Dynamic Source Routing (DSR) in the route search process broadcasts RREQ to all neighboring nodes (intermediate nodes) without knowing whether the node is the best node or not. So that the possibility of the route being interrupted because it is not composed of the best nodes can occur. A modification of the DSR routing protocol is proposed by finding the best intermediate node based on parameters, namely bandwidth, RTT, packet loss ratio. Then the neighboring nodes (intermediate nodes) that have been selected will arrange the delivery route from the source node to the destination node. The performance of the modified DSR and DSR routing protocols will then be measured using test parameters, namely throughput, packet delivery ratio (PDR) and average end to end delay. Based on the results of research trials, the application of the modified DSR method can improve the performance of the DSR protocol. Which after the application of the method, the average throughput increased by 25%, Packet Delivery Ratio (PDR) was 1.11% and the average end-to-end delay decreased by 17.64 %.
Analysis of Android Malware "Undangan Pernikahan.Apk" Using Static and Dynamic Methods Muhammad Syafa Asgani; Raphael Bianco Huwae; Andy Hidayat Jatmika
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 8 No 1 (2024): Juni 2024
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i1.599

Abstract

This research aims to analyze Android malware "UndanganPernikahan.apk" using static methods with reverse engineering techniques and dynamic analysis. The analysis process uses several tools to understand the characteristics, behavior, and impact of the malware after installation on an Android device. The research shows that this malware covertly steals user credentials through several vulnerabilities. The "UndanganPernikahan" malware is a type of spyware disguised as a wedding invitation and runs in the background without the user's knowledge. To avoid similar malware infections, it is recommended to always update the system and applications, only download applications from trusted sources, and conduct digital security training.
Android-Based Porang Cultivation Application Design for North Lombok District Porang Farmers Raphael Bianco Huwae; Andy Hidayat Jatmika; Moh. Ali Albar; Ahmad Zafrullah Mardiansyah; Noor Alamsyah
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 8 No 2 (2024): Desember 2024
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i2.600

Abstract

Porang is a plant that has the potential to be developed as an export commodity as a food ingredient or industrial ingredient (i.e., food, cosmetics, medicine, or health). North lombok regency location is one of the districts in ntb that currently has potential for developing porang farming businesses. Porang farming is currently carried out in 2 subdistricts, namely gangga and bayan, and has 800 farmer members with a land area of 1000 ha. Having an android-based application will help with the management of farmer administration. Based on the results of black-box testing, all features were confirmed to function properly. Additionally, the System Usability Scale (SUS) evaluation involving 30 users yielded an average score of 74.16, placing it within the acceptable category).
Information Systems Security Risk Management Using the COBIT 2019 Framework and NIST 800-30 on the Website People's Representative Council NTB Alvionita Safira Wahab; Raphael Bianco Huwae; Andy Hidayat Jatmika
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 9 No 1 (2025): Juni 2025
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v8i1.617

Abstract

This research analyzes information security risk management on the website of the Regional People's Representative Council (DPRD) of West Nusa Tenggara (NTB) using the COBIT 2019 and NIST 800-30 frameworks. The main objective of this research is to identify weaknesses in existing security controls and provide recommendations for improvements to deal with cyber threats, specifically DDoS, cross-site scripting (XSS), deface, and SQL injection attacks, which can disrupt service availability and data security. The research methods included interviews with five key stakeholders who have responsibilities in information security, as well as the distribution of questionnaires to ten IT staff. Data from the interviews and questionnaires were analyzed using risk mapping according to the COBIT 2019 framework and NIST 800-30 to identify capability gaps. The results showed specific weaknesses in the management of controls against XSS and DDoS threats, especially in the aspects of monitoring and incident response. The research conclusions emphasize the need to improve risk management through the addition of more up-to-date security technology, increased security awareness and training for staff, and regular security audits to ensure the sustainability of risk management. Recommendations include the implementation of a more sophisticated threat detection system, periodic training for staff, and a more structured incident response procedure to improve security and ensure continuity of public services through the DPRD NTB website.