Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Journal of Computer Science and Informatics Engineering (J-Cosine)

Rancang Bangun Aplikasi Bantu Hafal Al-Qur'an Metode At-Taisir Berbasis Android Nurul Hidayah; Royana Afwani; Andy Hidayat Jatmika
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 3 No 1 (2019): June 2019
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1540.287 KB) | DOI: 10.29303/jcosine.v3i1.233

Abstract

The At-Taisir method is a memorization method of the Qur'an which was inaugurated in 2018. This method was initiated by Adi Hidayat and implemented a one-page one-day memorization system of the Qur'an. Usually, when memorizing the Qur'an, the memorizer is flexible in choosing the memorization schedule and memorization amount. But in this method, the memorizer has presented a schedule and amount of memorization so that the memorizer becomes more disciplined and bound. Currently, the activity of memorizing the Qur'an with the At-Taisir method is done manually. This study aims to display the At-Taisir method which was previously still in manual form into a mobile application using Android technology with the native application types. This is expected to make the process of memorizing using the At-Taisir method easier to do without having to wait to get the At-Taisir manuscript first. This application is designed with a dynamic display so that if one day the application wants to be developed again, then only need to add the required database. Based on the results of testing carried out the percentage of success of the application reached 85.9%.
Optimasi Protokol Routing ZRP Menggunakan PA-SHORT untuk Mengurangi Jumlah Hop Pada Suatu Rute di Jaringan Manet Laeli Oktami; Andy Hidayat Jatmika; Nadiyasari Agitha
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 3 No 2 (2019): December 2019
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1244.883 KB) | DOI: 10.29303/jcosine.v3i2.239

Abstract

The author made modifications to several parts of the ZRP routing protocol, named PASHORT-ZRP. In this study, the authors conducted 5 experiments with which resulted in an increase in throughput on PASHORT-ZRP in the area of ??1000×1000 m2 of 52.081 % for node 20, 81.475 % for nodes 60, and 34,912 % for node 100. Results of average end-to-end delay in PASHORT-ZRP contains a decrease of 0.737 % for node 20, 0.365 % for node 60, and 0.939 % for node 100 in area 500×500 m2. The results of the packet delivery ratio on PASHOR-ZRP found an increase of 64.931% for node 20, 7.763% for node 60, and 26.644% for node 100 in the area of ??500×500 m2. in the 1000×1000 m2 area the results of routing overhead on PASHORT-ZRP contain a decrease of 36,815 % for node 20, 56.267 % for node 60, and 37.538 % for node 100.
Deteksi dan Pencegahan Serangan Wormhole pada Protokol Routing AOMDV menggunakan Gabungan Metode Delphi dan RTT-TC pada Jaringan MANET Nini Kurnia Safitri; Andy Hidayat Jatmika; Moh. Ali Albar
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 3 No 1 (2019): June 2019
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (218.634 KB) | DOI: 10.29303/jcosine.v3i1.242

Abstract

Mobile Ad Hoc Network (MANET) is a network consisting of a group of mobile nodes that don't have a fixed infrastructure. This causes the MANET to be vulnerable to attacks that can interfere with the process of communication and data transmission on the network. One type of attack that can attack the MANET is a wormhole attack. The wormhole is an attack on a network where there are two or more wormhole nodes that are interconnected and work together to attack network traffic or discard data packets it receives. Each wormhole node will be connected to each other using a wormhole link. To prevent wormhole attacks, the method that can be used is the Delay Per Hop Indicator (Delphi) method and the Round Trip Time and Topological Comparison (RTT-TC) method. The Delphi detects wormhole attacks by calculating the delay in each hop from the source node to the destination node. Whereas in the RTT-TC, wormhole attacks are detected by calculating the value of round trip time and topological comparison. The Delphi and RTT-TC methods have their advantages and disadvantages. In this study, it was proposed to combine the Delphi and RTT-TC methods to cover the disadvantage of each method.
Meningkatkan Kinerja Protokol Routing Aomdv Dalam Memilih Node Tetangga Berdasarkan Bandwidth, Round Trip Time, Dan Packet Loss Ratio Untuk Menemukan Rute Terbaik: Improving AOMDV Routing Protocol Choosing Neighboor Node Based on Bandwidth, Round Trip Time, and Packet Delivery Ratio to Choose the Best Route I Putu Gede Krisna Parwata; Andy Hidayat Jatmika; Ariyan Zubaidi
Journal of Computer Science and Informatics Engineering (J-Cosine) Vol 6 No 2 (2022): December 2022
Publisher : Informatics Engineering Dept., Faculty of Engineering, University of Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/jcosine.v6i2.433

Abstract

Mobile ad hoc network or in short MANET is a group of node that exchange the information from source node to destination node on wireless network. The main problem in MANET is on the network structure that change continously that is cause by node mobility that made route disconnected. If route disconnect there will be another route discovery processes that will take much time. AOMDV (Ad hoc On-demand Multipath Distance Vector) routing protocol works by doing broadcast Route Request Packet (RREQ) from source node to neighbor node (intermediate node) and then it will continously until it arrives to destination node. AOMDV didnt choose the best neighbor node while broadcast RREQ packet so the route constructed have high possibility to disconnected and must re-broadcast until it find stable route and it will be a long time and not effective. To solve this problem it proposed to add a modification with AOMDV routing protocol with calculation of bandwidth, round trip time, and packet loss ratio to choose neighbor node to find the best route. Routing protocol performance will tested using test parameter throughput, delay, and packet delivery ratio to choose the best neighbor node. Based on test result, the proposed modification can improve the preformance of AOMDV routing protocol. After modification, average throughput has improved 43.26 %, Packet Delivery Ratio (PDR) improved 3.15 % and average end-to-end delay reduce 31.26%.