Claim Missing Document
Check
Articles

Found 19 Documents
Search

Komparasi Analisa Kinerja Mesh Interface Dan Bridge Interface Pada Wireless WDS Mesh Network Arief Ikhwan Wicaksono; Rama Sahtyawan; Agung Priyanto
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 5 No. 1 (2020): Mei 2020
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (223.894 KB) | DOI: 10.14421/jiska.2020.51-05

Abstract

Wireless mesh networking provides a solution to the problem of network distribution that has been constrained by cable networks and wireless networks that are not directly related to other wireless networks. Some of the advantages of wireless mesh technology include extended coverages, robustness, self-configuration, easy maintenance, and low cost. Based on the problems described in the previous paragraph, this research will analyze the performance of two wireless mesh distribution methods using several topology scenarios which will later be considered to affect the quality of network distribution WDS Mesh distribution methods that will be compared in this study are WDS Mesh with Mesh Interface, and WDS Mesh with Bridge Interface. Evaluation of the two methods will be conducted periodically to get the results of the analysis which will be used to do re-configuring to maximize the features and advantages of mesh technology in maintaining reliable network quality.
Penilaian Kinerja Guru Madrasah Aliyah Kepenuhan Menggunakan Metode Multi Attribute Uttility Theory (MAUT) Mirajul Rifqi; Dona Dona; Rama Sahtyawan
REMIK: Riset dan E-Jurnal Manajemen Informatika Komputer Vol. 7 No. 4 (2023): Volume 7 Nomor 4 Oktober 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/remik.v7i4.13111

Abstract

Sekolah merupakan salah satu instansi manusia terpenting, tempat proses belajar mengajar berlangsung. Sekolah menambah pengetahuan anak didik tentang dunia, serta membantu anak didik menyesuaikan diri dengan derap kemajuan dan perubahan cepat yang terjadi dalam kehidupan modern. Penilaian kerja merupakan pengukuran organisasi terhadap tugas dan kewajiban dari setiap individu. Nilai penting dari penilaian kinerja guru adalah menyangkut penentuan tingkat kontribusi individu atau kinerja yang dilakukan dalam menyelesaikan tugas-tugas yang menjadi tanggung jawab sebagai guru. Untuk itu diperlukan alat bantu yang akan memberikan dukungan dan kemudahan penentuan keputusan dalam penilaian kinerja guru berdasarkan berbagai pertimbangan yang telah ditentukan dengan menggunakan sistem pendukung keputusan,Salah satu metode sistem pendukung keputusan adalah metode MAUT (Multi Attribute Utility Theory). Metode Multi Attribute Utility Theory (MAUT). Kriteria yang digunakan dalam penilaian kinerja guru ini adalah pedagogik, keperibadian, sosial dan professional. Dari penelitian yang dilakukan, ada tujuh orang guru yang mendapatkan nilai lebih dari 60 dan mendapatkan predikat kinerja baik.
IMPLEMENTASI PI-HOLE UNTUK MEMBANGUN SISTEM PERTAHANAN JARINGAN DARI SERANGAN MALVERTISING Nindya Dwi Anggana; Dedi Hariyadi; Rama Sahtyawan; Alfun Roehatul Jannah
Jurnal Teknomatika Vol 15 No 1 (2022): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v15i1.1104

Abstract

The Internet has revolutionized human activities in the digital era, providing new avenues for innovation and connectivity. Online advertising, a significant aspect of this digital landscape, enables advertisers to reach diverse audiences. However, this convenience has also attracted cybercriminals who exploit online advertisements to deploy malicious ads, commonly known as malvertising. This study focuses on implementing Pi-Hole, a network defense system, to combat web-based malvertising attacks and reduce associated risks. Utilizing a Raspberry Pi 3 model B+ device, the Pi-Hole system is deployed within the DMZ network at FTTI Universitas Jenderal Achmad Yani Yogyakarta. By capturing query logs, Pi-Hole effectively blocks malicious ads by employing an adlist. The research was conducted over a 14-day period, from July 26 to August 8, 2022. The results demonstrate the efficacy of the Pi-Hole defense system, with a remarkable 22.7% of the total captured queries, amounting to 895,077 queries, being successfully blocked. Additionally, testing from the client's perspective confirmed the system's ability to prevent ads from appearing on websites and mobile applications. The implementation of Pi-Hole on the FTTI network at Jenderal Achmad Yani Yogyakarta University provides a robust defense against malvertising attacks. By blocking malicious ads, Pi-Hole safeguards users' browsing experiences and reduces the risk of potential harm from online advertisements. This research contributes to the growing body of knowledge on network security and offers practical insights for organizations and individuals seeking effective measures to counter web-based malvertising attacks.
Analisis Kesadaran Cyber Security di Kalangan Pengguna Layanan Keuangan Digital Indonesia Maulida Farahanita; Chanief Budi Setiawan; Rama Sahtyawan; Nurul Fatimah
Jurnal Teknomatika Vol 15 No 1 (2022): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v15i1.1119

Abstract

The rapid development of information technology has led most people to choose to use digital banking and financial services to carry out various financial transactions. The most common crimes that occur are in the banking industry, including hacking (hacking of digital services), skimming (copying data information from digital service users), defacing (replacing or modifying digital service pages), phishing (deception of digital service users), BEC (business email compromise), and social engineering (social engineering to digital service users). To measure the level of cyber security awareness among users of digital financial services in Indonesia using the AHP method. This research is a quantitative study by distributing online questionnaires, then analyzed using the AHP method to find out which criteria have the highest or lowest scores. The largest weight of these criteria is knowledge of 0.5009, then sequentially is attitude of 0.3307, and behavior of 0.173. Digital financial service users already have insight or knowledge regarding how to maintain the security of their personal data, but it is still lacking in its application, so it is necessary to conduct in-depth re-education regarding the big risks given by carelessly maintaining privacy data. On the Attitude criteria; users still save PIN/passwords in smartphone notes, install applications outside the Play Store or App Store, rarely update the operating system on their smartphones, and leave their smartphones to other people or public places. On the Behavior criteria; users still use the same PIN/password on different accounts.
Analisis Quality of Service (QOS) pada Akses Game Online Menggunakan Standar Tiphon Bambang Nakulo; Chanief Budi Setiawan; Rama Sahtyawan; M. Abu Amar Al Badawi
Jurnal Teknomatika Vol 15 No 1 (2022): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v15i1.1130

Abstract

The quality of internet service plays a crucial role in online gaming experiences. This study focuses on assessing the quality of internet services provided by 6 cellular cards in Indonesia using the TIPHON standard. The objective is to determine the suitability of these services for online gaming on a website. Data packets generated during online gaming sessions were captured using the Wireshark application in three different locations. The captured data was processed using the TIPHON standard formula to evaluate the quality of internet service provided by the 6 cellular cards. The analysis of the captured data revealed that three cellular cards, namely Telkomsel, XL, and Tri, demonstrated good performance in terms of providing a quality online gaming experience. The results were consistent across the three tested locations. Based on the TIPHON standard, the evaluation of 6 cellular cards in three different locations indicated that three of them (Telkomsel, XL, and Tri) offer suitable internet service for playing online games on the website.
Analisis Tingkat Security Awareness-Personal Threat Terhadap Ancaman Phishing Dengan Metode Technology Threat Avoidance Theory (TTAT) Daila Sari, Indah; Hariyadi, Dedy; Sahtyawan, Rama; Kusumaningtyas, Netania Indi
Jurnal Teknomatika Vol 16 No 2 (2023): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v16i2.1250

Abstract

Phishing is a sort of cybercrime that involves obtaining sensitive information through the use of email, SMS, or compromised websites. The effects of phishing are caused by factors in the Technology Threat Avoidance Theory. The single best way to stop phishing attacks is to increase awareness of the risk of them happening among users or end users (human firewall). To determine the next steps in raising user knowledge, it is necessary to measure cybersecurity awareness, particularly against phishing assaults. Identify a few significant cybersecurity awareness of FTTI University of Jenderal Achmad Yani students in Yogyakarta. The investigation in this case included a phishing test and also employed online observation using observers who were asked questions based on the Technology Threat Avoidance Theory (TTAT). Using the MANOVA analysis method, factors influencing cybersecurity awareness analysis is conducted. Based on the analysis and testing of phishing tests as well as online questionnaires from the sample population, it shows that the sample is at a poor level of awareness. While the analysis of cybersecurity influence factors using the MANOVA analysis method shows that the results of the sig.> 0.05 value so that h0 is rejected. Based on the results of the study, it was concluded that FTTI students were still vulnerable to phishing attacks. Factor analysis using the MANOVA method shows that the dependent factor affects the level of cybersecurity awareness of the respondents but there is no significant difference between the dependent factors.
Analisis Tingkat Security Awareness-Personal Threat Terhadap Ancaman Phishing Dengan Metode Technology Threat Avoidance Theory (TTAT) Daila Sari, Indah; Hariyadi, Dedy; Sahtyawan, Rama; Kusumaningtyas, Netania Indi
Jurnal Teknomatika Vol 16 No 2 (2023): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v16i2.1250

Abstract

Phishing is a sort of cybercrime that involves obtaining sensitive information through the use of email, SMS, or compromised websites. The effects of phishing are caused by factors in the Technology Threat Avoidance Theory. The single best way to stop phishing attacks is to increase awareness of the risk of them happening among users or end users (human firewall). To determine the next steps in raising user knowledge, it is necessary to measure cybersecurity awareness, particularly against phishing assaults. Identify a few significant cybersecurity awareness of FTTI University of Jenderal Achmad Yani students in Yogyakarta. The investigation in this case included a phishing test and also employed online observation using observers who were asked questions based on the Technology Threat Avoidance Theory (TTAT). Using the MANOVA analysis method, factors influencing cybersecurity awareness analysis is conducted. Based on the analysis and testing of phishing tests as well as online questionnaires from the sample population, it shows that the sample is at a poor level of awareness. While the analysis of cybersecurity influence factors using the MANOVA analysis method shows that the results of the sig.> 0.05 value so that h0 is rejected. Based on the results of the study, it was concluded that FTTI students were still vulnerable to phishing attacks. Factor analysis using the MANOVA method shows that the dependent factor affects the level of cybersecurity awareness of the respondents but there is no significant difference between the dependent factors.
Pengaruh Parameter Cetak Mesin 3D Printer FDM Terhadap Warping Untuk Material PMMA Rosid, Ibnu Abdul; Sahtyawan, Rama; Pratama, Putri Noviana Nih; Safitri, Safitri
JTERA (Jurnal Teknologi Rekayasa) Vol 9, No 2: December 2024
Publisher : Politeknik Sukabumi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31544/jtera.v9.i2.2024.137-144

Abstract

Teknologi 3D Printer FDM merupakan salah satu teknologi manufaktur yang berkembang di Era Revolusi Industri 4.0 dan secara umum telah digunakan diberbagai bidang. Salah satu material yang dapat digunakan pada Mesin 3D Printer FDM adalah Polymethyl Methacrylate (PMMA), materil tersebut umum digunakan pada bidang medis. Pada proses eksperimen dilakukan analisis warping pada Material PMMA yang dicetak menggunakan Mesin 3D Printer FDM. Pendekatan penyusunan dan analisis eksperimen menggunakan 2 pangkat k factorial design. Parameter yang digunakan yaitu nozzle temperatur dengan nilai level yaitu 220°C dan 240°C, bed temperature dengan nilai level 60°C dan 90°C, layer height dengan nilai level 0,25 mm dan 0,3 mm serta first layer height sebesar 0,4 mm dan 0,8 mm. Pada hasil generate run time didapatkan 16 run time dengan jumlah replikasi 3 kali, sehingga didapatkan run time replikasi sejumlah 48 run time. Besar warping terkecil sebesar 3,590 mm, terbesar sebesar 5,135 mm serta rata-rata nilai warping sebesar 4,915. Pada hasil ANOVA didapatkan P-Value kurang dari alpha = 0,05 yaitu parameter LH, interaksi NT, FLH dan interaksi NT, BT dan LH. Sehingga diperlukan analisis lanjutan terhadap parameter dan nilai level untuk mendapatkan parameter dan nilai level yang berpengaruh secara signifikan terhadap terjadinya warping.
Penerapan Mesin Daur Ulang Sampah Plastik Menggunakan Metode Fuzzy Tsukamoto Berbasis Teknologi Internet Of Things (Iot) Sahtyawan, Rama; Wibowo, Teguh; Sahudi, Suwarno
Angkasa: Jurnal Ilmiah Bidang Teknologi Vol 17, No 2 (2025)
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/angkasa.v17i2.3255

Abstract

This research aims to design an Internet of Things (IoT)-based plastic waste recycling machine using the Fuzzy Tsukamoto method to overcome the problem of overheating in electric motors and improve waste management efficiency. The methods used include literature studies, designing a microcontroller-based system (ESP32), temperature sensors, inductive proximity sensors, and implementing the Fuzzy Tsukamoto algorithm for automatic temperature control. The results show that the machine is capable of shredding plastic with a capacity of 20 kg/hour and controlling the motor temperature in real-time through the MIT Inventor application. Tests prove that the motor temperature rises faster during shredding (30°C–55°C in 35 minutes) compared to no-load (90 minutes). The system also successfully detects metal and stops operation automatically to prevent damage. The conclusion of the study states that the integration of IoT and Fuzzy Tsukamoto is effective in optimizing machine performance, reducing the risk of overheating, and facilitating remote monitoring. Suggestions for further development include improving the cooling system and sensor calibration for long-term stability.