Claim Missing Document
Check
Articles

Found 5 Documents
Search

Optimisasi Penempatan Posisi Access Point pada Jaringan Wi-Fi Menggunakan Metode Simulated Annealing Nila Feby Puspitasari; Reza Pulungan
Creative Information Technology Journal Vol 2, No 1 (2014): November - Januari
Publisher : UNIVERSITAS AMIKOM YOGYAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (752.649 KB) | DOI: 10.24076/citec.2014v2i1.37

Abstract

Penempatan access point pada jaringan Wi-Fi yang tepat sangat diperlukan untuk mengoptimalkan kekuatan sinyal yang diterima dari transmitter terhadap receiver. Parameter yang paling mempengaruhi dalam menentukan performa access point adalah nilai kekuatan sinyal, karena nilai inilah yang akan digunakan untuk menentukan coverage area (cakupan sinyal) dari sebuah transmitter (access point).Pada penelitan ini telah dilakukan pengukuran terhadap kekuatan sinyal access point terhadap penerima di ruang dosen dan lobi gedung 2 lantai 1 STMIK AMIKOM Yogyakarta yang diukur menggunakan aplikasi inSSIDer dan menghasilkan nilai RSSI (Received Signal Strength Indication) dari sebuah transmitter terhadap receiver. Dalam pengukuran juga digunakan propagasi Line Of Sight (LOS) dan propagasi Non Line Of Sight (NLOS). Data yang diperoleh dari hasil pengukuran di lapangan digunakan untuk melakukan pemodelan penempatan access point menggunakan metode simulated anneling. Kekuatan sinyal RSSI yang diterima oleh receiver tidak hanya bergantung pada jarak antara transmitter dan receiver, akan tetapi menunjukkan variasi yang besar terhadap fading dan shadowing pada sebuah lokasi, juga pengaruh interferensi dapat menyebabkan penurunan sinyal (RSSI) yang diterima oleh receiver.Dari hasil penelitian yang dilakukan, diharapkan dapat menghasilkan pemodelan yang sesuai dan tepat guna dalam melakukan optimisasi penempatan access point pada jaringan Wi-Fi menggunakan metode simulated annealing.Access point placement on Wi-Fi networks is needed to optimize the strength of signal received by receiver from transmitter. The most influential parameter in determining the performance of access point position is signal strength, because this value will be used to determine the coverage area of a transmitter.In this research, signal strengths of access point to receiver in the faculty room and the lobby floor 1 of building 2 at STMIK AMIKOM Yogyakarta have been measured using inSSIDer application and results in the values of RSSI from transmitter to receiver. Also measured are LOS propagation and NLOS propagation. Data obtained from the field measurements are used to model and analyse the influence of access point placement using simulated annealing. It is found that the RSSI signal strength received by the receiver does not only depend on the distance between the transmitter and receiver, but also shows large variations caused by the fading and shadowing at a location. The interference also causes a decrease in the signal (RSSI) received by the receiver.The research conducted is expected to generate an appropriate model and analysis for further optimization of access point position on Wi-Fi network using simulated annealing.
PENGEMBANGAN PROTOTIPE ALAT KEAMANAN BARANG ELEKTRONIK BERBASIS INTERNET OF THINGS (IOT) Nur Athif Oldika Gunawan; Nila Feby Puspitasari; Bambang Pilu Hartato
JURNAL ELEKTROSISTA Vol. 12 No. 1 (2024): DESEMBER 2024
Publisher : PPM Sdirjianbang Akademi Militer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63824/jtep.v12i1.242

Abstract

The increasing security risks today have driven the development of more sophisticated protection solutions, especially for personal electronic goods. This study aims to design and implement an innovative Internet of Things (IoT)-based security device, designed to protect electronic goods such as mobile phones, laptops, and other electronic devices. The technology used includes the integration of smart sensors, such as GPS, Ultrasonic, and Passive Infrared, which function to detect threats accurately and responsively. This prototype-based system is equipped with smart sensors designed to detect potential threats to personal goods. In addition, a user application was successfully developed to support efficient interaction between users and the system. The test results show that this system is portable and capable of providing real-time notifications to users regarding threats to electronic goods, as well as responding to these threats quickly and appropriately. The approach taken not only emphasizes physical security, but also integrates modern technology to provide an efficient, practical, and easily accessible monitoring experience. This study offers an innovative solution in protecting personal electronic goods in the digital era.
PROTOTIPE ALAT PEMILAH SAMPAH CERDAS BERBASIS INTERNET OF THINGS Rio Ramadhan; Nila Feby Puspitasari
JURNAL ELEKTROSISTA Vol. 10 No. 2 (2023): JUNI 2023
Publisher : PPM Sdirjianbang Akademi Militer

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1273.408 KB) | DOI: 10.63824/jtep.v10i2.91

Abstract

Sorting waste is the process of separating the types of waste based on their categories or characteristics. The purpose of segregating waste is to facilitate waste management in a more effective and efficient manner, as well as to support better recycling or waste management activities. One of the current problems is waste contamination. When the waste that has been separated is mixed again in the process of collecting or transporting waste. This can happen if there is no clear separation between the different types of waste or if there is negligence in the waste management process. Contamination of waste reduces the effectiveness of sorting and can hinder recycling efforts. What can be done to overcome this problem is to adopt technology to support a smarter and more sustainable waste sorting process, one of which is implementing the Internet of Things (IoT) in the waste sorting process can help increase efficiency, reduce costs, and optimize waste management efficiently. Whole. This study aims to create a prototype of an Internet of Things-based Smart Waste Sorting Tool which is expected to increase efficiency in the waste sorting process. Prototyping of this tool utilizes the Arduino Nano and Wemos D1 microcontrollers as operating centers. The input to this tool is in the form of sensors to distinguish types of plastic and paper waste using ultrasonic sensors while for metal waste using inductive sensors. To send and receive notifications using the Blynk app.    
IMPLEMENTASI FIREWALL FILTER RULE DAN RAW SEBAGAI METODE PENGAMANAN JARINGAN PADA PERPUSTAKAAN XYZ Makruf Ngabdur Rokhman; Eka Fariza Rizaldy; Nasywa Abdullah; Nila Feby Puspitasari
JURNAL ELEKTROSISTA Vol. 11 No. 1 (2023): DESEMBER 2023
Publisher : PPM Sdirjianbang Akademi Militer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63824/jtep.v11i1.142

Abstract

Perpustakaan XYZ merupakan salah satu tempat belajar siswa yang ramai pengunjungnya, disana tersedia layanan jaringan internet yang dapat dimanfaatkan untuk kegiatan belajar. Jaringan internet yang tersedia pada perpustakaan belum menerapkan monitoring jaringan dan keamanan jaringan, sehingga jaringan internet masih rentan terhadap serangan siber salah satunya adalah Distributed Denial of Service syn attack (DDoS). Penelitian ini bertujuan untuk meningkatkan keamanan dan pengawasan akses internet di lingkungan perpustakaan XYZ dan menciptakan lingkungan belajar yang bebas dari konten yang tidak layak menggunakan firewall filter rule dan mengatasi serangan Distributed Denial of Service syn attack (DDoS) menggunakan firewall raw, serta monitoring jaringan dengan the dude. Untuk mencapai tujuan tersebut diperlukan manajemen jaringan dengan menggunakan perangkat mikrotik routerboard. Pada mikrotik sudah tersedia fitur Firewall (Filter rules, Raw, dan Address list). Dengan menggunakan router mikrotik, monitoring jaringan dapat dilakukan dengan memanfaatkan perangkat lunak The Dude. Hasil dari penelitian ini adalah dapat memberikan gambaran efektivitas monitoring jaringan, membatasi akses ke situs yang tidak layak (web filtering), dan keamanan perangkat jaringan dari serangan Distributed Denial of Service syn attack (DDoS). Di sisi lain, Perpustakaan XYZ akan memiliki akses internet yang melindungi penggunanya dari situs atau web yang berisi konten yang tidak layak. Perangkat router manajemen di perpustakaan XYZ terlindungi dari serangan Distributed Denial of Service syn attack (DDoS). Serta Perpustakaan XYZ akan memiliki perangkat yang digunakan untuk memantau lalu lintas data atau kondisi perangkat jaringan.  
ANALISIS KERENTANAN WEBSITE XYZ REPOSITORY MANAGEMENT PROJECT Cipto Ardiantoro; Nila Feby Puspitasari
JURNAL ELEKTROSISTA Vol. 11 No. 2 (2024): JUNI 2024
Publisher : PPM Sdirjianbang Akademi Militer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63824/jtep.v11i2.192

Abstract

The XYZ Repository Management Project website is a platform used to manage, develop, and collaborate on the digital work of informatics students. The security of this website is very important to maintain the confidentiality and integrity of data. This study aims to analyze the vulnerability of the XYZ Repository Management Project website. This study uses the Penetration Testing and Vulnerability Scanning methods to identify and evaluate various vulnerabilities on the XYZ Repository Management Project website. The research methodology involves several stages, namely information collection, penetration testing based on NIST (National Institute of Standards and Technology) standards which include several stages, namely planning, discovery, attack and reporting. The tools used in this test include open-source software such as OWASP ZAP, Burp Suite, and Nmap. The results of the study indicate that there are several vulnerabilities on the XYZ Repository Management Project website. These vulnerabilities include the disclosure of info.php file configuration information, IDOR URL Manipulation that displays user email information and indicates that there is a significant gap in the security protection of the website. The implications of these findings will be further analyzed to provide appropriate mitigation recommendations. This research is expected to contribute to improving the security of the XYZ Repository Management Project website and provide insight for developers and system administrators in managing and improving their systems. The results of this study also emphasize the importance of implementing periodic security testing to identify and address vulnerabilities that may arise along with the development of new technologies and attack methods.