Claim Missing Document
Check
Articles

Found 30 Documents
Search

Implementasi Manajemen Jaringan di SMA Kartini Batam Haeruddin Haeruddin; M. Nahrul Indriawan
National Conference for Community Service Project (NaCosPro) Vol 4 No 1 (2022): The 4th National Conference of Community Service Project 2022
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/nacospro.v4i1.7102

Abstract

SMA Kartini Batam adalah salah satu usaha Yayasan Keluarga Batam yang membantu pemerintah menanggulangi masalah pendidikan di Pulau Batam, SMA Kartini Batam merupakan salah satu SMA tertua yang berada di kota Batam. Saat ini, ketersediaan jaringan pada SMA Kartini Batam belum terkonfigurasi dengan baik dan mempengaruhi proses pembelajaran pada sekolah apalagi sebentar lagi memasuki kurikulum baru yang bergantung pada teknologi. Metodologi yang diterapakan pada penelitian ini yaitu metode NDLC (Network Development Life Cycle) dimana metode ini berfungsi sebagai perancangan dan pengembangan infrastruktur pada jaringan. Hasil dari penelitian ini berupa rancangan dan implementasi jaringan berupa topologi jaringan, manajemen IP, konfigurasi dasar, konfigurasi fail over, kebijakan frewall, konfigurasi hotspot, konfigurasi AP, manajemen bandwidth dan firewall sehingga dapat menyelesaikan masalah jaringan yang ada pada SMA Kartini Batam.
Pengembangan aplikasi ujian berbasis web pada SMK Maitreyawira Patrick Pratama Hendri; Haeruddin Haeruddin
National Conference for Community Service Project (NaCosPro) Vol 4 No 1 (2022): The 4th National Conference of Community Service Project 2022
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/nacospro.v4i1.7131

Abstract

SMK Maitreyawira Batam sudah melakukan proses pembelajaran secara daring selama masa pandemi covid-19 ini. Oleh karena itu dibutuhkan sebuah aplikasi yang dapat mengakomodasi seluruh kebutuhan ujian siswa secara daring. Dalam pengembangan aplikasi ujian online dilakukan dengan metode WSDM, dimana perancangan aplikasi tersebut dapat memenuhi seluruh kebutuhan yang diminta oleh SMK Maitreyawira. Dengan adanya aplikai ujian online ini, SMK Maitreyawira bisa mengurangi pekerjaan dan waktu yang dibutuhkan relatif lebih sedikit sehingga lebih efisien dan efektif.
Ketersediaan Tinggi Infrastruktur Elearning Berbasis Komputasi Awan Haeruddin Haeruddin
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 10 No 1 (2023): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v10i1.5050

Abstract

Dalam rangkah mencegah penyebaran COVID-19 proses pembelajaran tidak dapat dilakukan secara tatap muka. Salah satu alternatif yang dapat di lakukan adalah Program Belajar Jarak Jauh. Konten pembelajaran diakses secara online pada sistem e-learning, yang memungkinkan pelajar untuk melihat dan berinteraksi dengan pengajar melalui media web browser pada perangkat laptop, personal komputer, atau layanan mobile lainnya. Dalam mendukung proses pembelajaran secara efektif dan efisien sistem e-learning tentu saja membutuhkan infrastruktur yang handal yang dapat diakses oleh banyak pengguna dalam waktu yang bersamaan. Membangun infrastruktur yang handal secara mandiri dapat menimbulkan beban kerja, perawatan dan biaya yang tinggi. Dalam mengatasi masalah ini dapat menggunakan Cloud Computing. Ini beroperasi pada jaringan internet dan memiliki fitur virtualisasi, komputasi grid, komputasi otonom dan utilitas, dengan model pay-go-use di mana klien membayar sumber daya yang diminta atau yang di gunakan saja. Salah satu penyedia layanan cloud adalah Amazon Web Service. Layanan ini dapat membuat web server untuk menerapkan high availability e-learning yang di dukung fitur Auto Scaling Instance EC2, Elastic Load Balancer, Elastic File Sistem, VPC, Database, dan konfigurasi dapat dilakukan secara otomasi dengan CloudFormation sesuai template yang telah di buat YAML. Sedangkan metode pengembangan infrastruktur high availability e-learning adalah Network Development Life Cycle.
Pengembangan Aplikasi Emoticon Recognition dan Facial Recognition menggunakan Algoritma Local Binary Pattern Histogram (LBPH) dan Convolutional Neural Network (CNN) Haeruddin Haeruddin; Herman Herman; Patrick Pratama Hendri
Jurnal Teknologi Terpadu Vol. 9 No. 1 (2023): Juli, 2023
Publisher : LPPM STT Terpadu Nurul Fikri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54914/jtt.v9i1.613

Abstract

In the current modern era facial recognition technology can be found inside of everyday life, but said technology still has a big problem which is deepfake, where in which a deepfake can bypass security systems created with facial recognition as its base, one facial aspect that a deepfake cannot replicate perfectly is the emotion that can be observed from expression, which is why an emotion can be used as a tool to detect a deepfake, which is why an application that can detect both face and emotion at the same time is needed to add security to facial recognition technology, writer has succeeded in creating an application that can do both emotion recognition and facial recognition at the same time using LBPH (Local Binary Pattern Histogram) algorithm and purposive sampling technique for the facial recognition aspect with 67.5% accuracy and CNN (Convolutional Neural Network) algorithm using FER2013 (Facial emotion Recognition 2013) dataset for the emotion recognition aspect with 58.4% accuracy, with CRISP-DM method that can achieve the average accuracy rate of 63%, because currently not many research combine facial recognition using LBPH (Local Binary Pattern Histogram) algorithm and emotion recognition using CNN (Convolutional Neural Network) algorithm at the same time.
Analisis Keamanan Jaringan WPA2-PSK Menggunakan Metode Penetration Testing (Studi Kasus : TP-Link Archer A6) Haeruddin Haeruddin; Arif Kurniadi
CoMBInES - Conference on Management, Business, Innovation, Education and Social Sciences Vol 1 No 1 (2021): Conference on Management, Business, Innovation, Education and Social Sciences (Co
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Jaringan wireless adalah sebuah teknologi yang digunakan untuk menerima maupun mengirim di jaringan lokal tanpa menggunakan kabel atau melalui gelombang radio. Kelemahan jaringan wireless adalah orang sekitar bisa melakukan hacking menggunakan tools yang tersedia di internet untuk mendapatkan password atau mengambil data secara ilegal. Penelitian ini menggunakan metode Penetration Testing untuk menganalisis sistem keamanan jaringan WLAN ditempat umum, hotspot, dan kafe. Tujuannya untuk mensimulasikan bentuk serangan jaringan menggunakan tools yang tersedia di kali linux. Hasil dari penelitian ini menunjukan bahwa hanya dua dari tiga serangan yang berhasil. Oleh karena itu, harus meningkatkan keamanan pada simulasi yang berhasil dilaksanakan.
ANALYSIS OF THE USE OF L2TP AND SSTP VPNS DURING THE COVID-19 PANDEMIC Haeruddin Haeruddin; Kelvin Kelvin
CoMBInES - Conference on Management, Business, Innovation, Education and Social Sciences Vol 2 No 1 (2022): The 2nd Conference on Management, Business, Innovation, Education and Social Scie
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

COVID-19 is a virus have developed into a global pandemic. This has resulted in millions of employees around the world currently working from home. Virtual Private Network (VPN) can be used to provide employees access to office data from home. This study analyzes the differences between L2TP/IPsec and SSTP VPN protocols to choose a VPN technology that is suitable for use according to user needs. This is done by building the VPN network in according to the device requirements, QoS, security, and scalability parameters using Network Development Life Cycle (NDLC) method. The results of this study indicate that both types of VPNs have their respective advantages and disadvantages in terms of performance, security and scalability. The results of this study are expected to provide an overview for users to consider the type of VPN that suits their needs.
ANALYSIS OF ZEROTIER'S USAGE DURING THE COVID-19 PANDEMIC Stefanus Eko Prasetyo; Frans Hadinata; Haeruddin Haeruddin
CoMBInES - Conference on Management, Business, Innovation, Education and Social Sciences Vol 2 No 1 (2022): The 2nd Conference on Management, Business, Innovation, Education and Social Scie
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

During this COVID-19 pandemic, most office employees are required to implement health protocols such as washing hands, wearing masks, and social distancing. The application of health protocols in the world of work can be in the form of Work From Home. Work From Home is one way to implement social distancing to reduce the spread of the coronavirus or COVID-19. In this case, employees find it difficult to access office data. For this reason, secure technology such as VPN is needed to connect the office network to the home network so that every employee can access the data in the office. With the hope that these employees can work productively even though they are not in the office. That technology is ZeroTier. ZeroTier is a technology that allows connecting personal devices and other devices without having to be in a close location. Devices also don't have to be connected to the same network to use ZeroTier. The method used in this research is the Network Development Life Cycle. With the results of the research that ZeroTier's extensive scalability and operating system support are quite varied, it is possible for every end-user who has an internet network to connect to the same ZeroTier server network. That way each end-user can communicate directly like being on a local network such as pinging, file sharing, or printer sharing.
IMPROVEMENT WEBSITE SECURITY SYSTEM USING OWASP METHOD Haeruddin Haeruddin; Hermanto Hermanto
CoMBInES - Conference on Management, Business, Innovation, Education and Social Sciences Vol 2 No 1 (2022): The 2nd Conference on Management, Business, Innovation, Education and Social Scie
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Website service has become a Cross-Platform that is most often used by everyone to get the information they need. Website is a site that is published on the internet and can be accessed by all internet users, so security system is very important to keep the website safe from the threat of hacker attacks. Therefore, it is necessary to test the security of website services. In testing the website security system vb the method used is Open Web Application Security Project (OWASP). OWASP is an open source framework that serves to provide information on security vulnerabilities and recommendations for improvements that can be made to web-based services. This method has become a guide for analyzing and checking the security of a website. With this analysis, we can find out the risk of threats that arise on a website service and make it easier to take preventive actions based on the recommendations that have been obtained
Smart Home Network Desıgn Usıng The Network Development Lıfe Cycle Method Haeruddin Haeruddin; Tiara Tiara
CoMBInES - Conference on Management, Business, Innovation, Education and Social Sciences Vol 1 No 1 (2021): Conference on Management, Business, Innovation, Education and Social Sciences (Co
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this modern era, almost all electronic devices can be connected to a computer network. Not only electronic items such as smartphones, laptops, computers, household appliances can also be connected to a computer network. This is all thanks to the concept of a smart home which allows us to build any device in the home just by talking without supervision, and we can manage it through our closest device. Our life is easier because we do not need to exert much energy anymore. The purpose of this research is how to design and implement a network for a smart home using the Network Development Life Cycle method. This network design is connected to smart home devices such as routers, smart speakers, smart lamps, smart TVs, smartphones, and laptops. The interconnection media used are wired and wireless. The network to be implemented as a security system that is one of the accesses to IoT users and devices and has bandwidth settings so that all devices get bandwidth allocation so that they can be accessed easily
ANALYSIS OF MPLS L3 AND MPLS L2 VPN NETWORK USE DURING THE COVID-2019 PANDEMIC TO SUPPORT WORK FROM HOME Haeruddin Haeruddin; Efendi Efendi
CoMBInES - Conference on Management, Business, Innovation, Education and Social Sciences Vol 2 No 1 (2022): The 2nd Conference on Management, Business, Innovation, Education and Social Scie
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

From the end of 2019 to 2021 the coronavirus (COVID-19) had hit most countries, the use of information and communication technology as a guide in social distancing restrictions proposed by the government and the health department during the pandemic. The purpose of this study is how to implement and compare the use of MPLS VPN L3 and L2 networks during the COVID-19 period to support the world of education and industry by using implementation parameters, Quality of Service (QoS), security, and scalability. In this research, the method used is the Network Development Life Cycle (NDLC), using several stages, namely analysis, design, implementation, and monitoring. The results of this study provide an overview of the world of education and industry in determining and implementing MPLS technology that suits their needs.