Claim Missing Document
Check
Articles

A Review Paper on Big Data and Data Mining Concepts and Techniques Prasdika, Prasdika; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 7, No 1 (2018): IJID June
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (451.52 KB) | DOI: 10.14421/ijid.2018.07107

Abstract

In the digital era like today the growth of data in the database is very rapid, all things related to technology have a large contribution to data growth as well as social media, financial technology and scientific data. Therefore, topics such as big data and data mining are topics that are often discussed. Data mining is a method of extracting information through from big data to produce an information pattern or data anomaly 
Analysis and Testing of Data Transmission of Providers in Indonesia using GSM and CDMA Modem Hakim, Fani Rakhman; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 6, No 1 (2017): IJID June
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2017.06104

Abstract

The technology of internet nowadays has become most important aspect and becomes primary need for certain group of peoples who work in some field like education,economy,health,etc. One of the biggest problem which mostly brought by so many people is speed in data transfer. This paper emphasize in directly testing the quality of data transmission from each transmission technology. The equipment used by this paper is ZTE Join Air help, the simcard provided by Telkomsel,XL, and indosat, while CDMA technology used simcard provided by smartfren and esia and modem provided by Smartfren which its series is EC176-2. The parameters used for testing in this paper are throughput, time, jitter dan packet loss. this paper used data gathering method, for each operator and the testing used by this paper is downloading some files from local and non local server, then comparing parameter value between operators.
APPLICATION FOR MOBILE AGENT TO ACCESS MYSQL Sugiantoro, Bambang; Wardoyo, Retantyo; Hartati, Sri; Istiyanto, Jazi Eko
IJID (International Journal on Informatics for Development) Vol 1, No 2 (2012): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (322.188 KB) | DOI: 10.14421/ijid.2012.01204

Abstract

Availability of information is increasing rapidly, the method for encoding and storage of information also increased. The number of sources of information brings several problems, among them about how to combine the distributed data storage and different. Information on an organization or company is usually stored in separate locations and different formats. When there is an increase in storage capacity and the amount of information search costs, the company faced with an abundance amount of data. System development methodology used is Rapid Application Development (RAD) with a development framework Guidlines for Rapid Application Engineering (GRAPPLE). The software used in building this application is Borland Jbuilder 9. Rational Rose 2000 is used for the analysis and design using Unified Modeling Language (UML). Mysql server is a type of database to be accessed on each operating system. Operating system used in this study is Windows XP and Linux Fedora Core. This application was developed with aglets, which is one of software for building mobile agent applications.
Analysis of QOS VLAN Based on Djikstra’s Algorithm on Open Shortest Path First(OSPF) Alfani, Muhammad Nur; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 7, No 2 (2018): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2018.07205

Abstract

As an institution engaged in SMK Muhammadiyah 03 Yogyakarta  requires network infrastructure as a medium of communication. Infrastructure in SMK Muhammadiyah based VLAN but still using static routing and star topologies as a medium of communication between router. This leads to the main router performance overburdened  which makes the network infrastructure down. It is necessary to reform the network, especially in the communication protocol on the router by using protocol Open Shortest Path First(OSPF). OSPF is a link state-based routing protocol that uses Dijkstra’s algorithm to find the best path is taken as a communication medium. Makin paths made by considering various aspects of the parameters that affect network traffic. OSPF can minimize down on network infrastructure caused by the buren of a huge traffic to maintain the stability of traffic on communication lines. The results using the method QOS on infrastructure with the OSPF protocol can be classified very nice. It is obtaine from the measurement parameter delay <150 ms, packet loss (0%), an bandwidth has a very goo category based on the standard TIPHON. From the results of the QOS parameters also obtained a decrease in delay value by 31% on infrastructure with the OSPF protocol. This proves that the network traffic is more stable when using OSPF protocol.
Design and Implementation of Network Monitoring System on Local Area Network with Social Media Twitter Notification Winasis, Bima Putra; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 6, No 2 (2017): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2017.06201

Abstract

A network administrator has responsibility and important role in a computer network. Network security and its services depend on the treatment performed by the administrator. Network administrators who understand the workings of a computer network is needed to obtain the necessary computer networks. One of the obligations of the administrator is to monitor a network which can be done by using the system monitor. Monitoring system is a task to check the computer, operating system and services of computer network to keep the network always work in optimal conditions. In an effort to monitor the condition of the network, one of the technologies that can be used is the notification on twitter social media for providing information in real time to the administrator. Twitter is a social media that is very widely used, free, and secure. Moreover, the use of social media twitter experiencing rapid development. Therefore, the selection of twitter as a medium for the use of the notification is expected to be the right strategy. This system will be made by sending notification via twitter when a LAN network is disconnected or attacked by intruders.Results from the development of systems that have been made based on testing the functionality of the system shows all functions of the system has been running well. While usability testing calculation of the total score of the test system interface to get a score of 38.75 out of a maximum scale of 50. This score is in the range 34-42 value (Satisfied) which means that the respondents were satisfied with the system interface. Therefore, this interface is good to be implemented in the system.
The Implementation of Representation State Transfer (REST) Architecture Academic Information System Integrated in Pandanaran Islamic Senior High School Hambali, Muhammad; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 7, No 1 (2018): IJID June
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2018.07101

Abstract

In the rapid development of technology and the increasing speed of information flow due to globalization, making the role of information is vital and crucial to an educational institution. Institutions of Sunan Pandanaran implement policies of separate education system among male students with female students. This triggered a few problems, especially in the Senior high school of Sunan Pandanaran where researched by the author. The focus of the research is how to implement thearchitecture of Representational State Transfer (REST) on the integrated system academic information between two separate data server so that student academic data can be served easily from two different servers. Through the system resulting from this research, researchers offered easy access to student academic data that can then be recycled by the user into a useful information.  The research methodology where used in this research is system development. The steps begin with a preliminary study research,data collection, design models, identifying system requirements and system development methods.At the end, this research produced a integrated academic system information between male school servers with a female school server where implemented using Representational State Transfer architecture. So that student academic data can be presented either to the user in order to be recycled into useful information.
Honeypot Log Analysis as a Network Security Support Widodo, Tri; Muhsina, Elvanisa Ayu; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 2, No 1 (2013): IJID May
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (816.809 KB) | DOI: 10.14421/ijid.2013.02102

Abstract

The development of information and communication technology could not be separated from the development of computer network and interconnected network (internet). On the other side, there are people who try to access the information illegally, even try to disturb and destroy the flow of information. These people are called hacker or cracker. Because of that reason, it is needed tools to prevent this information. Those tools are like firewall, IPS (Intrusion prevention system), IDS (intrusion detection system), anti-virus, and other tools. This research does literature review by analyzing one of IDS tools that is honeypot using a method of data analyzing using secondary data from Honey net Project Research at January 7th until 29th 2003. The result published by those researchers is a DDOS attack was happen at January 18th and 19th 2003 that caused one of the computer servers with IP (internet protocol) 10.1.1.101 went down at January 19th 2003. A computer with IP 10.1.1.101 at January18th 2003 started to get over packets, that is 293 packet or 41.1% from 707 packets, but the computer had not gone down yet. However, at January 19th 2003 the computer got more packets, that was 795 packets or 58% from 1,370 packets, that cause the computer became down. The evidence was unconnected computers at January 20th 2003. Based on these analyzing we concludes that honeypot is very effective to be a supporting tool to detect a network intrusion, especially DDOS. And the addition value of honeypot implementation is a log which gives information for network administrators to know any activities on the network, both normal activities, or disadvantage activities.
EKSPLORASI BUKTI DIGITAL PADA SMART ROUTER MENGGUNAKAN METODE LIVE FORENSICS Supriyono, Abdul Rohman; Sugiantoro, Bambang; Prayudi, Yudi
Infotekmesin Vol 10, No 2 (2019): Infotekmesin: Juli 2019
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (554.582 KB) | DOI: 10.35970/infotekmesin.v10i2.48

Abstract

Network devices as media file sharing and can be used as file servers have begun to appear, just as smart router devices can be used as file servers by adding USB Thumb drive as storage media. With the diversity of router devices, it becomes a challenge in digital forensic science when a case occurs by utilizing a smart router device related to file-sharing services. Then it is necessary to study the right method in investigating smart router devices. This paper discusses the use of the live forensics acquisition method in investigating smart router devices, against system log files related to file-sharing activities. In identifying the process of searching, recognizing, and documenting potential things as digital evidence of processing devices and digital media storage. The acquisition process uses two methods, namely the live acquisition method on the router device and physical acquisition on the device that is used as storage media on the smart router.
Studies the Cold Cooling using Bio-Nanofluids, Characteristics and Applications in Milling Operations on High-Hardness Steels Sugiantoro, Bambang; Sutarno, Sutarno; Sakuri, Sakuri; Rusnaldhy, Rusnaldhy
Rekayasa Mesin Vol 10, No 1 (2019)
Publisher : Jurusan Teknik Mesin, Fakultas Teknik, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21776/ub.jrm.2019.010.01.10

Abstract

The cooling system has an important role in the quality of machining results, the cooling fluid (air/fluid) are developed to be able to reduce heat and friction arising from the formation of the product, but also environment-friendly. The use of natural oils has been tested in various machining conditions with a minimum quantity lubrications (MQL) method, including the addition of materials that can improve fluid convective properties. Cooling performance with natural materials results in surface roughness according to product smoothness requirements according to ASTM classification and is able to maintain a low tool temperature and reduce chatter/tools vibration. Improvement of the MQL process, temperature, and compressed air pressure conditions determine cooling performance, the lower the compressed air temperature will increase the fluid's ability to reduce tool temperature and increase durability and tool life. The process of forming steel with high hardness requires a cooling system with special conditions. The properties of natural oils will be enhanced by the convective thermophysical properties by the addition of Titanium Oxide (TiO2), CuO and Aluminum Oxide (AL2O3). Natural oils used in the study are corn oil, sunflower oil, water with the addition of nanoparticles. The formation of nanofluids uses magnetic stirrer with varying time and rotation speed, and % weight ratio. The MQL System is equipped with cold air from the compressor which is cooled by utilizing the evaporation/refrigeration process which is kept constant at 10oC. The cooling system is equipped with a microcontroller/interface to keep the air temperature/pressure constant. In this paper the data presented is a study of cooling in the hard milling process to determine the most nanofluid/dominant factors that affect the results. The results showed that the use of cutting fluids reinforced by nanoparticles in natural oils in a minimum amount increased lubrication properties. There is a significant effect on the use of cooling fluid types with surface roughness, fluids with high lubrication properties, significant to reduce surface roughness, cutting temperature and power consumption. The nanofluid prove was able to apply in an environment-friendly manufacturing process very promising.
Analysis of Physical and Mechanical Properties of Multiwalled Carbon Nano Tubes (MW-CNTs) Reinforced Mineral Composites as an Environmentally Friendly Machine Structure Setiyawan, Khanif; Sugiantoro, Bambang; Sutisna, Utis; Rusnaldhy, Rusnaldhy; Widyanto, Susilo Adi
Jurnal Rekayasa Mesin Vol 10, No 3 (2019)
Publisher : Jurusan Teknik Mesin, Fakultas Teknik, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21776/ub.jrm.2019.010.03.14

Abstract

The Rigidity, absorption resistance, and vibration damping are important factors for the formation of static components and structures with excitation force loads. The development of new materials from composites for metal substitution has achieved better properties. The use of rocks with reinforcement CNTs can produce higher damping properties than metal casting, but young modulus is low. The Composite polymer material made from volcanic rock can be cast with epoxy with a variation of the aggregate ratio using compressive press able to improve mechanical properties. The volcanic rocks used in this study are granite, silica, and volcanic sand, using carbon nanotubes MW-CNTs as reinforcement. This research was conducted to produce structures with high strength and rigidity. The material are classified dimensions coarse (0,2-0,5 mm), medium (20 μm-50 μm), and fine (0.125mm/0.50 mm). Based on SEM/EDX test results of granite, silica, and volcanic sand have high silica content (with the sharp crystalline form that has the potential to strengthen the composite bond. The fly ash has high silica content, with round and fine crystals form. The specimen formation method refers to the dimensions of the composite specimen bending test according to ASTM D 645. The combination of materials that warns hardness and elongations, in separate tests of volcanic sand and granite which has the highest hardness, the use of CNTs can increase the hardness of 15% in each specimen, increase bending testing at 220% to 300%, prove that the inside of the crystalline bond forms ductile properties.
Co-Authors Abdul Haris Muhammad Abdullah, Mohd. Fikri Azli bin Afrianto, Nurdi Agung Fatwanto Ahmad Luthfie Ahmad Subki Akbar, Bintang Faisal Akbar, Muhammad Tulus Akbar, Reonaldo Al Jum'ah, Muhammad Na'im Alfani, Muhammad Nur Alfarizi, Naufal Faiz Alifah Amalia Amalia, Alifah Amanulloh, Rivkih Amin Pujiati Amin Retnoningsih Anbari, Muhamad Zaki Arromdoni, Bad’ul Hilmi Astari, M Rizky Asyhab, Naufal bahary, muhammad syaiful Bahry, Muhammad Syaeful Budi Permana Putra Budiman, Kholiq Candra, Dori Gusti Alex Dewantara, Rizki Efdika, Muhamad Fadil Elvanisa Ayu Muhsina, Elvanisa Ayu Endra Yuliawan Fahmi Romisa Gatra, Ramadhan Gunawan Gunawan Habibah, Berlian Ummu Hafizuddin, Faiz Akhmad Hakim, Fani Rakhman Hanif Hanif Hartono Hartono Helmi Rachman Hikmatyar, Firmansyah Gustav Idir Fitriyanto Idir Ika Arfiani Imtikhan Azmi, Himawan Istianto, Yudi Izdiharsant, Almaas Jazi Eko Istiyanto Karmesti, Danissa Wirna Kesumahadi, Lisdianto Dwi Khanif Setiyawan Mahbub Puba Fawzan Mahbub Puba Fawzan, Mahbub Puba Mahmuda, Muhimmatul Mardlian, M. Sa’id Abdurrohman Kunta Maria Ulfa Siregar Maria Ulfah Siregar Maria Ulfah Siregar Meiditra, Irzon Merisa Kurniasari Fadilla Muhamad Fadli Muhamad Zaki Anbari Muhammad Hambali, Muhammad Muhammad Reza Velayani Muhammad Taufiq Nuruzzaman Mujahidah, Latifatul Mulyana, Riyan Nana Supriyana Ngisomudin, Ngisomudin Nora Lizarti Nuruzzaman, Muhammad Taufiq Pomalingo, Suwito Prasdika, Prasdika Pratiwi, Millati Putry Wahyu Setyaningsih Qorry Aina Fitroh Rachman, Helmi Rahmadhan Gatra Retantyo Wardoyo Rini Audia Rinny Asasunnaja Riwanto, Yudha Romisa, Fahmi Rusnaldhy, Rusnaldhy Sakuri, Sakuri Sakuri, Sakuri Shofwatul 'Uyun Shofwatul ‘Uyun Son’Aniy, Irham Sophan Sofian Sri Hartati Sucinta, Hanny Handayani Sumarsono , Sumarsono Supriyono, Abdul Rohman Susilo Adi Widyanto Sutarno Sutarno Tasya Kumala Dewi, Bella Tri Widodo Utis Sutisna Warso Warso, Warso Wicaksono, Nur Kukuh Wildan Nadiyal Ahsan Winasis, Bima Putra Wishnu, Asep Yudi prayudi Yuha Bani Mahardhika