Claim Missing Document
Check
Articles

Found 38 Documents
Search

Pengaturan Bandwidth Management dan Time Limitation Berbasis User Manajer Mikrotik Husain Husain; Anthony Anggrawan; Heroe Santoso; Hengki Tamando Sihotang; Dadang Pyanto; Fadiel Rahmad Hidayat
Jurnal Mantik Penusa Vol. 2 No. 2 (2018): Computer Science
Publisher : Lembaga Penelitian dan Pengabdian (LPPM) STMIK Pelita Nusantara Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (409.183 KB)

Abstract

ANALISA PENERAPAN SERVER DEPLOYMENT MENGGUNAKAN KUBERNETES UNTUK MENGHINDARI SINGLE OF FAILURE lilik Widyawati; Heroe Santoso; Hamdika Budiman
Jurnal Informatika Teknologi dan Sains Vol 3 No 1 (2021): EDISI 7
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (190.827 KB) | DOI: 10.51401/jinteks.v3i1.944

Abstract

Distributed computing systems are one of the requirements in implementing server-based applications such as database servers and web servers in order to achieve high levels of performance. The problem that often occurs is failure on the server so that the performance of a server is disrupted, so it takes a deployment technique that can be used to provide a distributed system with high performance. Container-based virtualization is the choice for running distributed systems because of its lightweight architecture, fast performance and resource efficiency. One of the container-based virtualisations is the introduction of a distributed systems development tool called Kubernetes, which allows managing server deployments to provide high availability systems. The system development methodology used is the Network Development Life Cycle (NDLC). Of the 6 stages, only 3 stages are used, namely Analysis, Design, and Simulation Prototyping. The test or test scenario carried out is Ftp Deploy and Nginx Web Server so that it can maintain availability and the system is able to failover when a server failure occurs
Analisa Cakupan Area Signal Wireless Fidelity Terhadap Kualitas Layanan Dengan Metode Top Down Network Raisul Azhar; I Putu Hariyadi; Heroe Santoso; I Gede Bagus Arthana
Jurnal Bumigora Information Technology (BITe) Vol 4 No 2 (2022)
Publisher : Prodi Ilmu Komputer Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v4i2.2431

Abstract

The proper placement of Access Point (AP) devices will affect network connectivity. This study applies the Top-Down Network Design Method which consists of the Needs Analysis Stage, Logic Design and Physical Design. This method is used to map processes that occur by identifying the needs of all internet users, designing network topology logic and determining the physical design of computer networks to be implemented. The purpose of this study is to determine the quality of connectivity from the proper Access Point range of Access Point devices and there are no deadzone s that occur and their impact on the quality of network service to users. The conclusion of this study is that it is able to improve the quality of connectivity from the reach of internet user Access Points so that there are no more dead zone coverage areas that occur in class 1 and 2 floor buildings as well as graduate buildings in the best coverage area in the 50m range for the 2.4GHz frequency. With a total of 450 users (students and lecturers), it is sufficient to provide a minimum of 125.25Mbps internet bandwidth and required 5 Access Point units and 3 wireless router units as a whole. Placement of different locations from AP devices determines good or bad quality of service produced and there is still a packet loss of 5.9% and a Throughput of 15.93Mbps in the lecturer room and in other areas.
Home Security Voice Notification System With Arduino Sensor, PIR based SMS Gateway Muh Thariq Ali Mujitomo; Heroe Santoso; Lilik Widyawati; Dadang Priyanto
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 1 (2022): March 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (439.189 KB) | DOI: 10.30812/ijecsa.v1i1.1793

Abstract

The level of crime that afflicts households such as theft and robbery is still common. Many thefts occur when the homeowner is away and the house is staying for a long time. Although some residential neighborhoods already have security officers, human limitations can be a gap for perpetrators of theft. To overcome this, we need a guard who is always there to monitor the house to avoid theft. In this case the risk of guards on duty to guard the house is very large, such as acts of theft accompanied by violence. The design and manufacture of this system uses the Network Development Life Cycle (NDLC) method. NDLC is a method that relies on previous development processes such as business strategy planning, application development lifecycle, and data distribution analysis. There are 6 stages in the Network Development Life Cycle (NDLC) namely Analysis, Design, Simulation Prototyping, Implementation, Monitoring, Management. The purpose of this research is Designing a home security system that can guard the house in real time and can be accessed remotely. The conclusion of this research is that the entire system is proven to be able to work in detecting, giving warnings, and making calls to the user.Network Development Life Cycle (NDLC) namely Analysis, Design, Simulation Prototyping, Implementation, Monitoring, Management. The purpose of this research is Designing a home security system that can guard the house in real time and can be accessed remotely. The conclusion of this research is that the entire system is proven to be able to work in detecting, giving warnings, and making calls to the user.
Implementation Of The Simple Additive Weighting Method At Universitas Terbuka Mataram For New Employee Recruitment Husain Husain; Heroe Santoso; Helna Wardhana; Muhammad Irwan Ardiasyah; Nurul Fitriani
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 1 (2022): March 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (314.698 KB) | DOI: 10.30812/ijecsa.v1i1.1814

Abstract

An agency will thrive if it is supported by qualified employees. So that employees are certainly one of the most important assets in an institution, both private and public institutions, so that agencies are required to recruit prospective contract employees who have competence and talent to support the implementation of work at the Open University of Mataram City. Skilled workers who can bring institutions forward and compete with other agencies so that they can keep up with the times, and the recruitment aspect is starting to get a special view, because the recruitment process is not in accordance with the needs at the Mataram Open University so that it can hinder the rate of development of the agency itself. Therefore, a decision support system is needed for the contract employee recruitment process at the Universitas Terbuka Mataram. Therefore, a decision support system is needed for the contract employee recruitment process at universitas Terbuka Mataram campus. This decision support system uses the Simple Additive Weighting SAW method. In this case, prospective employees are compared with one another so as to provide an output value of priority intensity which results in a system that provides an assessment of each employee. This decision support system helps evaluate each employee, make changes to the criteria, and changes the weight values. This is useful to facilitate decision making related to employee selection issues, so that the most appropriate employees will be received in the company. The purpose of this study was to select the best candidate for employees at the Universitas Terbuka Mataram. The results of this study indicate that the SAW method is appropriate for selecting the best prospective employees because it can obtain qualified employees in accordance with the expectations of the company and the leadership.
Penerapan Algoritma K-Means Berbasis Spasial Untuk Pengelompokan Potensi Virus Covid-19 Di Kabupaten Dompu Ahmat Adil; I Made Yadi Darma; Heroe Santoso; Lalu Sofiyandi Prayatna
SATIN - Sains dan Teknologi Informasi Vol 9 No 1 (2023): SATIN - Sains dan Teknologi Informasi
Publisher : STMIK Amik Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (671.693 KB) | DOI: 10.33372/stn.v9i1.954

Abstract

Pandemi COVID-19 memiliki dampak sosial-ekonomi yang besar, termasuk tingkat kemiskinan pada 2020 mencapai 12,4% atau akan ada 8,5 juta orang miskin baru. Kasus COVID-19 pertama kali yang tercatat di Kabupaten Dompu terjadi pada tanggal 18 April 2020. Penelitian ini bertujuan untuk mengimplementasikan Metode K-means berbasis spasial untuk mengetahui potensi penyebaran COVID-19 di Kabupaten Dompu. Metode yang digunakan dalam penelitian ini adalah data mining dengan menerapkan algorithma K-Means. Algoritma K-Means memiliki fungsi untuk mengelompokkan data kedalam cluster. Hasil yang diperoleh berdasarkan Analisa algoritma k-means terkait potensi penyebaran covid 19 di kabupaten Dompu dibagi menjadi 2 cluster diantaranya cluster 1 dalam kelompok zona orange 3 kecamatan yaitu kecamatan Woja, Dompu dan Hu’u, dan cluster 2 dalam zona merah 5 kecamatan yaitu Kilo, Pajo, Manggelewa, Kempo, Pekat. Pengelompokan data ini diimplementasikan kedalam data spasial yaitu data keruangan area yang merupakan potensi penyebaran covid 19. Kesimpulan yang didapatkan adalah metode K-Means berhasil mengelompokkan potensi penyebaran covid-19 di Kabupaten Dompu dengan 2 cluster diantaranya cluster 1 dalam kelompok zona orange 3 kecamatan, dan cluster 2 dalam zona merah 5 kecamatan. Dan dari hasil akhir usability penggunaan aplikasi menyimpulkan bahwa penerapan metode K-Means dalam pengelompokan penyebaran kasus covid-19 di kabupaten Dompu “Sangat Baik”
SISTEM PENDUKUNG KEPUTUSAN KELOMPOK PENENTUAN DOSEN PENGAMPU MATA KULIAH DENGAN METODE PROMETHEE DAN BORDA Heroe Santoso; Raisul Azhar; I Putu Hariyadi; Husain, Husain; Yayan Suganda
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 4 No. 1 (2023): Juni 2023
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46764/teknimedia.v4i1.88

Abstract

Lecturers are professional educators and scientists with the main task of teaching, transforming, developing and disseminating science, technology, and art (IPTEKS) through teaching, research and community service. The position of lecturers as professionals serves to increase the dignity of lecturers and develop science and technology to improve the quality of national education. The goal is to implement the national education system and realize the goals of national education. The head of the study program and the dean in determining the lecturers for the courses are still done manually based on the competence of each lecturer and looking at the previous semester's teacher decisions. In this method of determination, of course, the results obtained are still not optimal because there are still some lecturers who do not match the competencies/qualifications of the courses being taught. Based on the problems above, the faculty will think of a better system, namely switching from a manual system to a Group Decision Support System (GDSS). The GDSS method used is the promethee and borda method which is one method of solving decision-making problems in a group. With promethee and borda method, several different opinions or perceptions about a decision can be combined into a group/joint decision. That way, the resulting decisions can be accepted by the group. The system development method uses the waterfall method which consists of several stages, including: data collection stage, analysis stage, design stage, coding stage and testing stage. The conclusion of this study resulted in a Group Decision Support System for determining the lecturers of courses using the borda method. Based on the results of system testing, respondents stated that the system can simplify and speed up the process of determining the course lecturers.
IMPLEMENTATION OF CONTINUOUS INTEGRATION/CONTINUOUS DEPLOYMENT TO AUTOMATE COMPUTER NETWORK INFRASTRUCTURE CONFIGURATION MANAGEMENT Hariyadi, I Putu; Raisul Azhar; Heroe Santoso; Khairan Marzuki; I Made Yadi Dharma
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 4 No. 2 (2023): Desember 2023
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46764/teknimedia.v4i2.127

Abstract

Computer network infrastructure is one of the supporting components for smooth operations for companies that utilize Information and Communication Technology (ICT). Companies are required to continue to innovate to continue to grow so it requires various adjustments, including changes to the policy configuration of computer network infrastructure. Implementation of configuration changes to computer network infrastructure if done manually will be inefficient and ineffective. In addition, it is prone to errors as a result of human error resulting in downtime. The application of Continuous Integration/Continuous Deployment (CI/CD) can be a solution to overcome these problems. This study analyzes the implementation of CI/CD on network infrastructure which is simulated using the PNETLab and GitLab CI/CD tools as well as Ansible Configuration Management. Based on the tests conducted five times, it can be concluded that the Ansible Playbook that has been created and integrated with the GitLab CI/CD pipeline can be used to automate configuration management of MikroTik-based network infrastructure that is simulated in PNETLab. CI/CD can speed up the implementation of configuration changes on network devices through an automated process. Testing additional configurations on the test network takes an average of 82.6 seconds. Meanwhile, on the production network, it takes an average of 80.2 seconds. On the other hand, testing the configuration deletion on the test network takes an average of 56.6 seconds. Meanwhile, on the production network, the average is 54.4 seconds. In addition, the application of CI/CD can minimize errors because before the configuration is applied to the production network, the configuration is tested first on the test network automatically. Application of the configuration to the production network is carried out only if testing of the configuration on the test network is successful. The CI/CD mechanism can improve the performance and reliability of computer network infrastructure.
Internet Machine Prototype with a Coin Payment Using a Rock Pi Microcontroller Azhar, Raisul; Santoso, Heroe; Hariyadi, I Putu; Husain, Husain; Afriandi, Mahsus
Jurnal Bumigora Information Technology (BITe) Vol 6 No 1 (2024)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v6i1.3543

Abstract

Background: Coins are widely used in game machines to play game applications. Internet use is usually done by purchasing an internet package. This method is often used, but coins are rarely used.Objective: The aim of this research is how to make a machine that is capable of using coins as internet payment, especially hotspots.Methods: The research method was carried out using an experimental method with stages of analysis, prototype design, and testing using a descriptive approach.Result: This research produced 1 one-unit prototype machine equipped with an application for internet hotspots by inserting IDR 500 and IDR 1000 coins with connection limits according to the value of the coins entered.Conclusion: This research produces prototypes and coin internet application software.
Analisa Quality Of Service Menggunakan Aplikasi Gnump3d sebagai Server Media Streaming Azhar, Raisul; Santoso, Heroe; Faisal, Faisal
Jurnal Bumigora Information Technology (BITe) Vol 3 No 1 (2021)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v3i1.1320

Abstract

– Streaming is a term for a video or audio file that can be played without first downloading the file. Streaming can also be interpreted as a technique used to transfer data so that it can be processed continuously and continuously. Currently, there are many applications that run audio and video streaming, such as Gnump3d, Spotify, Joox, Deezer and so on. The number of applications does not guarantee the quality of service or good QoS if run on the internet network that passes through many network devices. QoS problems on Audio Streaming media will not be seen much on physical servers but will be seen if the application is installed on a Virtual Private Server. The purpose of this study is to determine the level of service quality or QoS generated by a Gnump3d application installed on a VPS by only paying attention to the parameters of Delay, Jiiter, Packet, Loss and Throughput. The research methodology uses the Network Development Life Cycle (NDLC) methodology. The results of this study obtained that the QoS of audio streaming is considered good based on the TIPHON QoS measurement standard and only one QoS parameter is considered to have failed, namely Jitter because it has a value that does not match the standard.