Claim Missing Document
Check
Articles

Analisis Tingkat Penerimaan Pengguna Layanan Cloud Storage Menggunakan Metode Technology Acceptance Model 3 (TAM3) Pada Dinas Perpustakaan Dan Arsip Kota Pekanbaru Adinda Zilly Arsyika; Ery Safrianti; Linna Oktaviana Sari
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 6 (2019): Edisi 2 Juli s/d Desember 2019
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data are valuable information in an agency or an institution, both engaged in politics, culture, education, economics and etc. Therefore, data very important to be properly maintained and stored by the relevant agencies. Nowadays, data are no longer just archived on a piece of paper but also stored in a storage medium that uses internet network to access it. Library and Archives Service (DISPUSIP) in Pekanbaru,Riau Province, Indonesia is a government institution that embodies the seriousness of the local Government in Pekanbaru to educate the life of Indonesia. DISPUSIP Pekanbaru, has problems in managing data storage. In this case, it is necessary to have file management which includes data storage and file sharing in a computer that is made a server, so all data will be stored centrally. Data storage on a server side or known as cloud computing is a technology where is owners data do data storage on server storage or known as cloud storage. Cloud storage used in this study is OwnCloud. After OwnCloud operates, it is required analyzing the use of OwnCloud. OwnCloud is a private cloud service. With OwnCloud, IT can maintain complete control over all documents or archives in DISPUSIP, knowing exactly where the data is at all times and deciding who might or might not have access to certain documents and folders. This analysis is intended to determine the acceptance of Cloud Storage with a OwnCloud that will be assessed by DISPUSIP employees. Analysis in this study will use the Technology Acceptance Model 3 (TAM3) method by revealing the influences of 16 hypotheses. Computer Anxiety has a positive impact on Perceived Ease Of Use, Computer Self Efficacy has a positive impact on Perceived Ease of Use, Image has a positive impact on Perceived Usefulness, Job Relevance has a positive impact on Perceived Usefulness, Object Usability has a positive impact on Perceived Ease of Use, Output Quality has a positive impact on Perceived Usefulness, Perceived Ease of Use has a positive impact on Behavioral intention, Perceived Ease of Use has a positive impact on Perceived Usefulness, Perceptions of External Control has a positive impact on Perceived Ease of Use, Result Demonstrability has a positive impact on Perceived Usefulness, Subjective Norm has a positive impact on Image, Subjective Norm has a positive impact on Perceived Usefulness, Behavioral Intention does not have a positive impact on Use behavior, Computer Playfulness does not have a positive impact on Perceived Ease of Use, Perceived Enjoyment does not have a positive impact on Perceived Ease of Use and Perceived Usefulness does not have a positive impact on Behavioral Intention. From the test results 12 hypotheses have a positive impact and 4 hypotheses do not have a positive impact on research in DISPUSIP. Keywords: Cloud Storage, Cloud Computing, OwnCloud , Technology Acceptance Model 3 (TAM3), Library and Archives Service (DISPUSIP) Pekanbaru.
Analisis Kecepatan Routing Discovery Untuk Routing Protocol AODV, OLSR, Dan ZRP Pada Mobile Ad Hoc Network Tulus Rahayu; Ery Syafrianti; Linna Oktaviana Sari
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 6 (2019): Edisi 2 Juli s/d Desember 2019
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Ad hoc network is wireless network without a consistent node infrastructure. Every node could be used as a router to track another node in a network. Ad hoc could use several routing protocols. AODV, OLSR, and ZRP are among of them that are efficient for Ad Hoc network within each of their own type of routing protocol. Every routing protocol has different ability and various speed in order to track routing path in a network. The aim of this research is to determine Routing Discovery time for routing protocol AODV, OLSR, and ZRP in mobile ad hoc network (MANET). The research used the scenario where node's position is random within determined area. The results show that the routing discovery time for protocol AODV, OLSR, and ZRP are 0.035811829 seconds, 5.817611777 seconds and 1.052782493 seconds, respectively. Thus, AODV routing protocol has faster routing discovery time than the routing protocol OLSR and ZRP. Keywords : Ad Hoc Network, routing protocol, routing discovery, AODV, OLSR, ZRP.
Pemodelan Sistem Keamanan Snort Intrusion Detection System (IDS) Pada Jaringan Yang Berbasis Software Defined Network (SDN) Yosef Asido Manalu; Linna Oktaviana Sari
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 5 (2018): Edisi 2 Juli s/d Desember 2018
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Software Defined Network (SDN) is a centralized network where control plane and data plane embedded in different systems. However, controller is an indivual threat to the security of data packet that passes OpenFlow Network. Security on a computer network is the top priority in designing a network. This research is performed by designing a tree network topology in SDN from and simulated on the mininet software. Then, snort activation is done on protected Host with snort detection system. Attack test is done on Host 8 as an Attacker and Host 1 becomes the Target of attack using hping3 application. Test results of Ddos attack by Host 8 uses IP Address 192.168.10.14 and Host 1 uses IP Address 192.168.10.7. Attack priority level is done on Level 1 (high attack category). After detection by snort, notification is displayed on BASE with intrusion that processed by IDS with UDP messagesKeywords : SDN, Ddos, Security Network, Snort
Perencanaan Jaringan LTE TDD (Time Division Duplex) 2300 MHz Di Kota Pekanbaru Rozy Syaputra; Linna Oktaviana Sari
Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains Vol 4, No 2 (2017): Wisuda Oktober Tahun 2017
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Teknik dan Sains

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Technological developments, especially in the field of information and telecommunications are grew rapidly. Thus the consumer needs high mobility and able to support services such as VoIP, video conference, upload/download, etc. Therefore, it needs mobile communication services to support the needs of consumers with optimal performance. LTE is an enhanced technology which is developed by 3GPP to support the needs of consumers that has improved the previous technologies. This research proposes the network planning LTE TDD duplexing technique using a frequency of 2300 MHz in the city of Pekanbaru, Riau, with the bandwidth of 10 MHz and 15 MHz, respectively. The network design and simulation was done by radio planning software Atoll v3.1.2. In the design simulation such parameters are measured i.e. coverage dimensioning simulation with signal level prediction. The results shows the signal level coverage including 512 sites with bandwidth of 10 MHz and 351 sites with bandwidth of 15 MHz, respectively.Keywords : LTE, TDD, Bandwidth, Coverage planning, Atoll
COMPARISON OF BACKGROUND SUBTRACTION, SOBEL, ADAPTIVE MOTION DETECTION, FRAME DIFFERENCES, AND ACCUMULATIVE DIFFERENCES IMAGES ON MOTION DETECTION Dara Incam Ramadhan; Indah Permata Sari; Linna Oktaviana Sari
SINERGI Vol 22, No 1 (2018)
Publisher : Universitas Mercu Buana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (634.376 KB) | DOI: 10.22441/sinergi.2018.1.009

Abstract

Nowadays, digital image processing is not only used to recognize motionless objects, but also used to recognize motions objects on video. One use of moving object recognition on video is to detect motion, which implementation can be used on security cameras. Various methods used to detect motion have been developed so that in this research compared some motion detection methods, namely Background Substraction, Adaptive Motion Detection, Sobel, Frame Differences and Accumulative Differences Images (ADI). Each method has a different level of accuracy. In the background substraction method, the result obtained 86.1% accuracy in the room and 88.3% outdoors. In the sobel method the result of motion detection depends on the lighting conditions of the room being supervised. When the room is in bright condition, the accuracy of the system decreases and when the room is dark, the accuracy of the system increases with an accuracy of 80%. In the adaptive motion detection method, motion can be detected with a condition in camera visibility there is no object that is easy to move. In the frame difference method, testing on RBG image using average computation with threshold of 35 gives the best value. In the ADI method, the result of accuracy in motion detection reached 95.12%.
Perancangan LTE Menggunakan Metode Coverage Dimensioning di Kabupaten Kuantan Singingi Linna Oktaviana Sari; Arif Fauzar; Ery Safrianti; Rahmat Rizal Andhi
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 2 No 3 (2018): Desember 2018
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (824.364 KB) | DOI: 10.29207/resti.v2i3.560

Abstract

The need for LTE network is not only required by urban communities, but also rural communities. Kuantan Singingi is one of the districts in Riau province, has a lot of potential that can be developed, especially tourism. To develop the potential, Kuantan singingi needs internet network with better signal quality. To meet the needs of high quality internet in Kuantan Singingi then in this research has been done design of LTE internet network in Kuantan Singingi area by using Coverage Dimensioning method with FDD as duplex at 5 MHz bandwidth. The design is done for planning until 2020. The design results have been obtained that Kuantan Singingi requires 54 eNodeBs with cell radius about 6690 meters. In addition, the average RSRP -80dBm obtained with the widest coverage area reaches 99.5%. Then the uplink service area reaches 100% for using 16QAM 3/5 modulation, while downlink service area reaches 71% for QPSK 3/5 modulation.
The Impact of Beamforming, Power Control, and Sectorization on CDMA Capacity Linna Oktaviana Sari
Seminar Nasional Teknologi Informasi Komunikasi dan Industri 2011: SNTIKI 3
Publisher : UIN Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (369.711 KB)

Abstract

Capacity of CDMA was limited by interferences and could be optimalyzed by reduce interferences to fulfill requirements of multiclass services. In this research, the impact of imperfect power control and imperfect sectorization to reverse-link user capacity of CDMA system based on signal to interference ratio (SIR) by using beamforming at mobile station transmitter and base station receiver have been analyzed. Beamforming would be used with assumed each element has uniformly excited, equally spaced linear array. CDMA system use hexagonal macro cell in home cell base station, which divided effectively into 3 sectors with 120o beam width. User capacities was influenced by power control factor, number of antenna beamforming elements and sectors, overlap angle due to imperfect sectorization, imperfect power control, SIR and processing gain CDMA. Results of this research indicate that the system with power control and sectorization using beamforming has larger capacity of multiclass system than without beamforming. Keywords: Beamforming, Power Control, Sectorization, Multiclass, CDMA.
Perancangan Perangkat Lunak Kriptografi Citra Digital dengan FFT Kunci Chaos Linna Oktaviana Sari
Seminar Nasional Teknologi Informasi Komunikasi dan Industri 2012: SNTIKI 4
Publisher : UIN Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (530.712 KB)

Abstract

Cryptography can be performed on the image. The image is a type of digital media is most vulnerable to illegal actions. To secure the transmitted digital image, digital image must be encrypted into an image that has no meaning. However, not all encryption methods used in the text can be applied to image encryption because a slow process. This can be solved by applying a special encryption method for digital images. In this study, cryptographic software has been designed to secure the digital image using FFT as the encryption algorithm, inverse FFT as the decryption algorithm and the logistic equation of chaos as the key. The software designed to use GUI Matlab R2010a. The results showed that the cryptographic software has been designed, can make the process of encryption and decryption on digital images using algorithms FFT, IFFT and chaos as the key, with less than 1 second.Keywords: Cryptography, digital Image, FFT, Chaos.
PROGRAM PENGADAAN DAN OPTIMALISASI JARINGAN INTERNET SEKOLAH UNTUK PEMBELAJARAN DARING DALAM MASA PANDEMI COVID 19 DI SMAN 2 RUMBIO Ery Safrianti; Dian Yayan Sukama; Edi Susilo; Feranita Feranita; Linna Oktaviana Sari
Share : Journal of Service Learning Vol. 8 No. 1 (2022): FEBRUARY 2022
Publisher : Institute of Research and Community Outreach - Petra Christian University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1071.163 KB) | DOI: 10.9744/share.8.1.33-42

Abstract

Kondisi saat ini dengan adanya wabah penyakit pandemi Covid 19 telah menimbulkan permasalah baru dalam penyelenggaraan pendidikan secara konvensional. Pertemuan tatap muka langsung antara guru dan siswa belum diizinkan untuk diselenggarakan. Salah satu cara yang dapat dilakukan adalah pembelajaran daring melalui jaringan internet. Metode Pembelajaran ini juga dilaksanakan oleh Sekolah Menengah Atas Negeri 2 (SMAN 2) Rumbio. Namun ada keterbatasan sarana fisik seperti jaringan internet dan perangkat komputer. Disamping itu juga keterbatasan kemampuan penguasaaan teknologi yang mendukung pembelajaran daring. Sambungan internet dilakukan melalui perangkat handphone dan belum ada koneksi internet yang baik. Lokasi sekolah yang cukup jauh dari pusat kota menyebabkan sulitnya mendapatkan akses internet melalui jaringan kabel. Salah satu cara yang dilakukan untuk mendapatkan akses internet adalah dengan memanfaatkan jaringan seluler. Untuk mendapatkan koneksi internet jaringan seluler diperlukan perangkat modem GSM. Koneksi internet yang telah diperoleh bisa dibagikan kepada beberapa komputer melalui jaringan baik secara wired maupun wireless. Selanjutnya perlu dilakukan pelatihan bagi para guru agar memiliki pengetahuan tambahan mengenai model pembelajaran daring. Fasilitas perangkat lunak yang banyak tersedia seperti Google Suite for education perlu dikuasai oleh guru, sehingga dapat dimanfaatkan dengan maksimal demi kepentingan para siswa. Program pengadaan dan optimalisasi jaringan internet sekolah untuk pembelajaran daring dalam masa pandemi covid 19 di SMAN 2 Rumbio Jaya sudah berhasil dilaksanakan dengan baik. Melalui penambahan perangkat jaringan dan modem internet, sarana akses jaringan internet untuk pembelajaran dapat lebih meningkat. Pelatihan pembelajaran daring dilaksanakan sesuai dengan kondisi dan kebutuhan para guru setelah dilakukan pemetaan melalui survey awal secara online. Hasil survey awal menunjukkan kemampuan yang masih terbatas dalam pengelolaan kelas dan pemanfaatan fasilitas yang disediakan google suite for education untuk pembelajaran daring, seperti pembuatan soal ujian online melalui penggunaan google form.
Sistem Otomatisasi Pemberi Pakan Ikan Lele Berbasis Arduino Uno Feranita Feranita; Firdaus Firdaus; Ery Safrianti; Linna Oktaviana Sari; Aldy Fadilla
JTEV (Jurnal Teknik Elektro dan Vokasional) Vol 5, No 1.1 (2019): Edisi khusus prosiding FORTEI 2019
Publisher : Universitas Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (238.477 KB) | DOI: 10.24036/jtev.v5i1.1.106139

Abstract

Otomatisasi pemberi pakan ikan lele berbasis arduino ini bertujuan untuk merancang bangun alat pemberi makan ikan lele secara otomatis berdasarkan jadwal makan dan berat ikan berbasis arduino uno.Alat Pemberi pakan ini menggunakan RTC untuk pengatur waktu dan pengatur jadwal pakan ikan dilengkapi juga dengan motor DC sebagai penebar pakan. Tegangan operasional alat yang digunakan rangkaian kontrol membutuhkan tegangan 5V dan 12V. Berat pakan yang dikeluarkan berdasarkan berat ikan lele dan banyaknya jumlah ikan. Jumlah anakan ikan lele dalam penelitian ini dibuat bervariasi, yaitu 750 ekor, 1500 ekor dan 3000 ekor dengan panjang anakan 7 sampai 8 cm per ekor. Jadwal pemberi pakan yang telah dijadwalkan yaitu pada pukul 09.00 WIB untuk pagi, pukul 16.00 WIB untuk pemberian pakan siang dan 21.00 WIB untuk pemberian pakan malam.Dari hasil pengujian, alat dapat bekerja dengan baik sesuai jadwal yang ditentukan dengan berat pakan yang keluar 150 gr selama 5,04 detik untuk anakan sebanyak 750 ekor, 300 gr selama 8,36 detik untuk anakan sebanyak 1500 ekor dan 600 gr untuk anakan sebanyak 3000 ekor.
Co-Authors Abiyyah, Liandri Talitha Adi Syahputra Adinda Zilly Arsyika Agam Murtio Putra, Agam Murtio Ahmad Romadan Akbar, Zatryandy Aksana, Anandaku Aldi Kurniawan Batubara Aldi, Robi Aldy Fadilla Alfon Sera Anashroh Rizkiyah Siregar Andhi, Rahmat Rizal Andika Prinanda Angreany Yasmin Anhar Anhar Anhar Arianda, Habil Putra Arif Fauzar Arif Fauzar Arum Parastika As’ari, Azi Azmi, Agusurio Batubara, Aldi Kurniawan Batubara, Aldi Kurniawan Berlian, Dini Candra Galang Gemilang Putra Cristin Manora Dahliyusmanto, Dahliyusmanto Danny Wijaya Dara Incam Ramadhan Dara Incam Ramadhan, Dara Incam Darbi, Ahmad Dian Yayan Sukama Dian Yayan Sukma, Dian Yayan Dwi Putra Retdha Yuhana Edi Susilo Edi Susilo Erma Yuli Clara Saragih Ery Safrianti Ery Syafrianti Eryzal SP Siregar Fajar Kurniawan Feranita Feranita Feranita Feranita Feranita Feranita Feranita Feranita Feranita Jalil Feranita Jalil Fikri, Muhammad Haikal Firdaus Firmawan, Andes Fitri Wulandari Fitriani Saputri Fitriani Saputri Fri Murdiya, Fri Friska Yudhistira Gemilang, Hafiz Pradana Gozali, M Moriandy Hakim Ata Attaturk Hapzi Ali Haritsi, Salman Al Haziq Hazman Hazline Atika Suri Helena Helena, Helena Heryanto Chandra Indah Permata Sari Indah Permata Sari Indra Putra Wijaya, Indra Putra Irsan Fitrah Adhil IRSAN TAUFIK ALI Jalil, Feranita Julhendra, Satria Kiki Julita Ningsih Kurniawan, M. R. Lamhot Raden Sitorus M Arif Syiaruddin M. Fajar Edwin Saputra Mahan, Rian Arighi Marpaung, Ranto Anjasmara Marwa Miri Al-Haque Mei Safrina Mudinillah, Adam Muhammad Ariq Istiqlal, Muhammad Ariq Muhammad Gunawan Muhammad Rasyidin Siregar Muhammad Ridwan Saputra Muhammad Rizki Radhelan Mutia Indah Lestari Nestor Hasudungan Silaban, Nestor Hasudungan Nobon Lazirsah Adnil Nur Aprilia Sari Nurhalim Dani Ali Nurhidayah Rahman Pinarian Elni Endra Saneni Prio Setyo Putri Ramadhani Muliaqalbi R.A Rizka Qori Yuliani Putri Rahmad Rudi Clinton Rahmat, Fajar Ramadhan Imam Dzaky Ramadhani, Cut Muthia Retdha Yuhana, Dwi Putra Reza Pahlevi Rezki Ananda Gusma Rhendy Theopilus Silalahi, Rhendy Theopilus Riadi, Rahadatul ‘Aisy Rian Arighi Mahan Ridho Yatullah Ridho Zikril Hidayatullah Rifaldo, Rifaldo Riki Desrianto Rina Ayu Nabila Riyati Pasaribu Romadan, Ahmad Rosma, Iswadi Hasyim Rozy Syaputra Ryant Pratama Salhazan Salhazan Salim, Kelvin Rainey Saljuwita, Saljuwita Salwa Madihah Syahnevi Samudra, Bayu Saputra, Fanny Eka Satiarini, Astri Seprita Wulansari Sihotang, Hari Siti Maryam Sri Ayuni Sugianto, Aktub Suwitno Suwitno Suwitno, Suwitno Syah, Maulana Syahrul Taufano, Haza Tulus Rahayu Tulus Rahayu, Tulus Utari Nurul Fajar Nasution Valentino, Novri Veni Yuherlina Putri, Veni Yuherlina Wahyuningtias, Defvi Wijaya, Alvansya Hawari Wijayanto, M. Rido Yosef Asido Manalu Yostisel Oktaria Yusnita Rahayu Zikri Pradana