Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING

Self Services And Monitoring Of Weak Heart Disease Based On The Internet Of Things And Mobile App Using Certainty Factor Somantri Somantri; Ikhsan Fazriawan; Adinda Laila Putri; Rafika Ariaty Maulani
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 5, No 2 (2022): Issues January 2022
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31289/jite.v5i2.6195

Abstract

Heart disease can be suffered by anyone regardless of age and gender. Heart disease can be caused by many things, such as unhealthy lifestyles (smoking), as well as heredity. Low self-awareness of someone with weak heart disease to monitor their heart health regularly. To diagnose weak heart disease, this system uses the Certainy Factor method. With this method, patients can find out the results of the decision whether the patient is at risk of developing weak heart disease or heart health conditions in normal circumstances. This method can provide comparative results (and decision results) of several parameters (tested), one of which is the heart rate parameter. Therefore, the authors build a mobile application system with the concept of service and monitoring of weak heart disease named "iHeart". With this application, patients can monitor and detect weak heart disease and use various features (features) contained in the application. One of the iHeart application facilities is the GUI Chart for heart rate monitoring. This application can also accommodate the patient's heart rate history data into a database as a data storage medium. This application system uses IoT technology, which makes it easy for users or patients and practitioners to see the results of a heartbeat to find out whether a patient has a weak heart or not, in real-time via a smartphone (smartphone) without interfering with patient mobility.
Design and Build a Network Security System Using Port Knocking, DMZ and IDS Techniques at SMA Negeri 1 Warungkiara Somantri Somantri; Rahman Zulkarnaen; Gina Purnama Insany
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol. 7 No. 1 (2023): Issues July 2023
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31289/jite.v7i1.9674

Abstract

The network security system of SMA Negeri 1 Warungkiara needs improvement to be more effective in safeguarding data integrity and confidentiality. Currently, it only relies on a filter rule security, which is not robust enough to fend off hacker attacks. Therefore, advanced security techniques such as Port Knocking, DMZ, and IDS are required. Port Knocking serves as additional authentication by accessing ports in a specific sequence to prevent unauthorized access. DMZ is used to isolate the internal network from direct attacks. IDS is used to detect suspicious activities and alert the administrator. The system was tested against various attacks such as port scanning, DDoS, and Ping of Death, and it was proven to reduce server resource usage from 34% to 6%. The test results show that this security system provides strong protection and preserves the integrity and confidentiality of data within the school network.