Articles
            
            
            
            
            
                            
                    
                        Studi Perbandingan Library Untuk Implementasi Network Automation Menggunakan Paramiko Dan Netmiko Pada Router Mikrotik 
                    
                    Luis Geraldo Mauboy; 
Theophilus Wellem                    
                     JURIKOM (Jurnal Riset Komputer) Vol 9, No 4 (2022): Agustus 2022 
                    
                    Publisher : STMIK Budi Darma 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.30865/jurikom.v9i4.4420                            
                                            
                    
                        
                            
                            
                                
In recent years, network automation has emerged as a solution to the impracticality of manually configuring network devices by network administrators. By implementing network automation, network administrators can configure and manage network devices automatically using scripts or software that is run from one of the hosts or servers in the network. This paper aims to conduct a comparative study through the implementation of cases for network automation. Four scenarios are taken as examples for the implementation of network automation, among others, static routing, dynamic routing, network address translation (NAT), and simple network management protocol (SNMP). The automation scripts are realized using Python libraries, namely Paramiko and Netmiko. Tests and simulations were carried out using the GNS3 simulator software with a network topology consisting of two Mikrotik routers, one Ethernet switch, one Network Automation server, and two computers as clients. The experiment results show that automation using the Paramiko library is better than automation using the Netmiko library in terms of the time required for the execution of configuration scripts. The average execution time for the four implemented scenarios is 3.66 seconds.
                            
                         
                     
                 
                
                            
                    
                        Perancangan dan Implementasi Sistem Pemantauan Suhu dan Ketinggian Air pada Akuarium Ikan Hias berbasis IoT 
                    
                    Piter Wijaya; 
Theophilus Wellem                    
                     Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 1 (2022): September 2022 
                    
                    Publisher : STMIK Budi Darma 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.30865/json.v4i1.4539                            
                                            
                    
                        
                            
                            
                                
Environmental monitoring and control systems of various electronic equipment such as sensors, actuators, televisions, lights, and surveillance cameras are one of the essential applications of Internet-of-Things (IoT). The utilization of IoT has also given birth to the smart home concept, which is realized in the form of home automation, where various equipment at home is equipped with a microcontroller and WiFi module such that they can connect to the Internet and interact with each other. One of the equipment at home that can be monitored and controlled using IoT technology is a fish aquarium which is commonly owned by ornamental fish cultivators or people who have a hobby of taking care of ornamental fish. Taking care of ornamental fish requires special attention to the parameters of temperature and water quality such that the fish can grow well. This study aims to design and implement an IoT-based temperature and water level monitoring system in an aquarium. The hardware in this system is implemented using NodeMCU ESP8266 as the central controller and the WiFi module that connects the system to the Internet, temperature sensor DS18B20, ultrasonic sensor HC-SR04, and relays to turn on and off equipment controlled by the system. In addition, Telegram bots are used to give commands to control equipment and receive notifications from the system. The testing results show that the designed system can work according to predetermined specifications. If the water temperature in the aquarium is outside of a specified range (24°C to 32°C), the system will activate a fan or a heater to adjust the water temperature.
                            
                         
                     
                 
                
                            
                    
                        Academic Document Authentication using Elliptic Curve Digital Signature Algorithm and QR Code 
                    
                    Theophilus Wellem; 
Yessica Nataliani; 
Ade Iriani                    
                     JOIV : International Journal on Informatics Visualization Vol 6, No 3 (2022) 
                    
                    Publisher : Society of Visual Informatics 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.30630/joiv.6.2.872                            
                                            
                    
                        
                            
                            
                                
Paper-based documents or printed documents such as recommendation letters, academic transcripts, and diplomas are prone to forgery. Several methods have been used to protect them, such as watermarking, security holograms, or using paper with specific security features. This paper presents a document authentication system that utilizes QR code and ECDSA as the digital signature algorithm to protect this kind of document from counterfeiting. A digital signature is a well-known technique in modern cryptography used for providing data integrity and authentication. The idea proposed herein is to put a QR code in the printed documents where the QR code includes a digital signature. The signature can later be authenticated using the proposed system by uploading the document for authentication or scanning the document's QR code. The proposed system is particularly developed for digital signature generation and verification of students' final project approval documents as the case study. In traditional settings, the approval form is typically signed directly by the student's advisor dan co-advisor using handwritten signatures. However, using the conventional handwritten signature, the signature on the approval form can be falsified. Therefore, a digital signature generation and verification system is implemented herein to avoid handwritten signature falsification. The advisors can use this system to sign the approval form using a digital signature instead of a handwritten one. The signature is stored in a QR code and is generated using ECDSA with SHA-256 as the hash function. The proposed system is evaluated using documents (i.e., approval forms) with genuine and forged QR codes.  The evaluation results showed that the system could verify the authenticity of the approval forms, which contain genuine QR codes. The approval forms that contained forged QR codes were correctly identified.
                            
                         
                     
                 
                
                            
                    
                        Pembangunan dan Pelatihan Website Gereja Bagi Jemaat Gereja Kristen Jawa Kana Pabelan 
                    
                    Suharyadi Suharyadi; 
Tintien Koerniawati; 
Irwan Sembiring; 
Adriyanto Juliastomo Gundo; 
Theophilus Hermanus Wellem; 
Yessica Nataliani                    
                     Magistrorum et Scholarium: Jurnal Pengabdian Masyarakat Vol 3 No 1 (2022) 
                    
                    Publisher : Universitas Kristen Satya Wacana Salatiga 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                    
                    
                        
                            
                            
                                
Gereja Kristen Jawa Kana Pabelan adalah gereja yang baru didewasakan pada tahun 2019. Gereja ini memiliki permasalahan dalam hal penyebaran informasi kepada jemaat, baik informasi mengenai permasalahan administratif maupun penyebaran Firman Tuhan. Meskipun masa pandemi Covid 19 sudah berangsur berkurang, namun pembatasan kerumunan masih diterapkan, hal ini yang menjadi salah satu penyebab penyebaran informasi kurang maksimal. Pendekatan Teknologi Informasi melalui pembangunan website menjadi solusi untuk pemecahan masalah tersebut. Program pengabdian masyarakat yang dilakukan oleh tim Pengabdian Masyarakat FTI, adalah pembangunan website GKJ Kana Pebelan, pelatihan administrator website kepada admin gereja, dan pelatihan contributor berita kepada komisi pemuda/remaja. Keberadaan website sangat efektif dalam penyebaran informasi, hal ini dibuktikan sampai saat ini sudah 13.093 kali diakses, hal ini menjadi salah satu indikator bahwa website sering dikunjungi untuk mengakses informasi gereja.
                            
                         
                     
                 
                
                            
                    
                        PERANCANGAN DAN IMPLEMENTASI APLIKASI ANDROID UNTUK LAYANAN INFORMASI PARIWISATA 
                    
                    Fransiscus Bryan Prasetio; 
Theophilus Wellem                    
                     IT Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi Vol 1 No 2 (2022): IT-Explore Juni 2022 
                    
                    Publisher : Fakultas Teknologi Informasi, Universitas Kristen Satya Wacana 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                    |
                            
                            
                                Full PDF (1074.947 KB)
                            
                                                                                    
                            | 
                                DOI: 10.24246/itexplore.v1i2.2022.pp114-132                            
                                            
                    
                        
                            
                            
                                
Android-based applications have been widely used to do daily activities such as online shopping, playing games, video streaming, and watching sports matches. One of the most commonly used applications is applications that assist people for flight or train ticket reservations, hotel bookings, and other recreation purposes. Some tourism companies in Indonesia also develop Android-based applications to provide information and services for their business. Nevertheless, with many tourism destinations in Indonesia, not all tourist attractions have services through Android-based applications published on the Google Play Store. This study aims to design and implement Android-based applications for tourism information services in two tourist attractions as the case study, namely Tay Kak Sie Temple in Semarang City and Beach tourism in Bangka Island, to help tourists obtaining information about both tourist attractions. Both applications are implemented using Compro Mobile App Builder. The testing results using the black box method demonstrate that the implementation of the two applications can run according to the specified specifications.
                            
                         
                     
                 
                
                            
                    
                        Implementasi Sistem untuk Mendeteksi Jarak Aman Kendaraan Bermotor menggunakan Arduino dan Sensor Ultrasonik 
                    
                    Yonas Juniantiko Putro; 
Theophilus Wellem                    
                     Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 3 (2023): Maret 2023 
                    
                    Publisher : STMIK Budi Darma 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.30865/json.v4i3.5853                            
                                            
                    
                        
                            
                            
                                
Traffic accidents can occur due to driver error, natural factors (bad weather, heavy rain), or technical factors (for example, uneven roads or potholes). When driving a vehicle on the highway, a driver must always maintain a distance from the vehicle in front of it to reduce the risk of an accident. Likewise, when parking the vehicle, the driver must be able to maintain a distance from other objects around the vehicle so as not to crash into the object. To assist the driver in obtaining information about the vehicle's distance to the surrounding objects, this research designs and implements a system to detect the safe distance from a vehicle to other vehicles or objects in front of it. The hardware used in this system is an Arduino Uno R3 microcontroller board, an HC-SR04 ultrasonic sensor to measure distance, an LCD to display measurement results, and an LED and an electronic buzzer used as indicator and alarm when the distance is not safe. The test results show that the implemented system can measure the distance from a motorbike to objects in front of it and warns the driver by activating the LED and the buzzer if the distance is ranging 40 cm to 50 cm which indicates that the distance is not safe.
                            
                         
                     
                 
                
                            
                    
                        PERANCANGAN DAN IMPLEMENTASI SISTEM KONTROL UNTUK TEMPAT SAMPAH OTOMATIS MENGGUNAKAN ARDUINO DAN SENSOR ULTRASONIK 
                    
                    Jonathan Putera Perdana; 
Theophilus Wellem                    
                     IT Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi Vol 2 No 2 (2023): IT-Explore Juni 2023 
                    
                    Publisher : Fakultas Teknologi Informasi, Universitas Kristen Satya Wacana 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.24246/itexplore.v2i2.2023.pp104-117                            
                                            
                    
                        
                            
                            
                                
Internet-of-Things (IoT) merupakan teknologi yang mengintegrasikan berbagai peralatan dengan Internet. Salah satu pemanfaatan IoT adalah sistem kontrol elektronik pada berbagai peralatan rumah. Peralatan rumah dapat dilengkapi dengan mikrokontroler, sensor, dan aktuator, serta modul komunikasi, sehingga dapat dihubungkan ke internet dan dipantau dari jarak jauh. Salah satu peralatan atau objek yang ada di rumah adalah tempat sampah yang umumnya terbuat dari plastik, tetapi umumnya belum dapat dipantau dan dikontrol otomatis. Tujuan penelitian ini adalah untuk merancang sistem kontrol untuk membuka dan menutup tempat sampah secara otomatis menggunakan Arduino sebagai pengontrol sistem, sensor ultrasonik sebagai pendeteksi objek yang mendekat, motor servo yang berguna untuk menggerakkan tutup tempat sampah, dan buzzer serta LED sebagai indikator ketika terdapat objek yang mendekat. Hasil pengujian sistem menunjukkan bahwa tempat sampah dapat membuka tutupnya secara otomatis saat mendeteksi objek pada jarak paling jauh 50 cm dengan delay selama dua detik, dan kemudian akan tertutup secara otomatis ketika objek tersebut menjauh dari tempat sampah tersebut.
                            
                         
                     
                 
                
                            
                    
                        SIMULASI JARINGAN IEEE 802.11AX WIFI 6 MENGGUNAKAN SIMULATOR NS-3 UNTUK PENGUKURAN THROUGHPUT PADA BAND FREKUENSI 6 GHZ 
                    
                    Yeheskiel Mandala Putra; 
Theophilus Wellem                    
                     Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 4 No. 3 (2023): Jurnal Indonesia : Manajemen Informatika dan Komunikasi (JIMIK) 
                    
                    Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) AMIK Indonesia 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.35870/jimik.v4i3.298                            
                                            
                    
                        
                            
                            
                                
The current generation WiFi technology, WiFi 6/6E, is based on the IEEE 802.11ax standard. The IEEE 802.11ax standard introduces several new features that make WiFi 6 superior to its predecessors, for example, 1024-QAM modulation and 6 GHz frequency band for WiFi 6E. This study aims to study the IEEE 802.11ax WiFi 6 standard, simulate an IEEE 802.11ax WiFi 6 network, and observe the throughput achieved in the 6 GHz frequency band using various payload sizes. The simulation is carried out using ns-3, a network simulator for various network models such as Ethernet, WiFi, and 4G LTE. The network topology used in the simulation consists of an access point (AP) and a client station (STA). The simulation results show that payload size significantly affects the network throughput. Simulations with a payload size of 64 and 1500 bytes, at a channel bandwidth (CBW) of 160 MHz and a guard interval (GI) of 800 ns, produce a throughput of 51 Mbps and 766.536 Mbps, respectively.
                            
                         
                     
                 
                
                            
                    
                        Implementation of Wireless User Authentication using WLC-Forti Framework 
                    
                    Ignatius Agus Supriyono; 
Irwan Sembiring; 
Adi Setiawan; 
Iwan Setyawan; 
Theophilus Wellem; 
Henderi; 
Ilham Hizbuloh                    
                     Aptisi Transactions On Technopreneurship (ATT) Vol 5 No 2sp (2023): Special Issue: Support Technopreneurship in the Medical 
                    
                    Publisher : Pandawan 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.34306/att.v5i2sp.346                            
                                            
                    
                        
                            
                            
                                
Internet access at this time is a daily necessity that cannot be denied. It is certain that most institutions and business entities require internet access in carrying out their activities, including educational institutions. With the development of mobile computer technology in which more users use mobile devices to access the internet, wireless-based network infrastructure is a demand that cannot be postponed any longer. By using a wireless connection to connect to the network, authentication becomes something that must be considered, the use of access to the network by unwanted parties can harm other parties. Changing passwords regularly is important to avoid misuse of access to the network by other parties. This paper presents a problem where when an educational institution implements the Bring Your Own Device (BYOD) program, students and teachers cannot change passwords using the personal device used, this is because the personal device is not registered with the domain controller at the institution. The solution proposed in this article is to move the NPS RADIUS server function on the local site to LDAP in the cloud using a combination of WLC which handles Wi-Fi clients and Fortinet which handles authentication to the cloud. The implementation results show that the WLC-Forti framework functions well.
                            
                         
                     
                 
                
                            
                    
                        SIMULASI SKEMA MODULASI 1024-QAM DAN 4096-QAM PADA SISTEM KOMUNIKASI DIGITAL 
                    
                    Danang Maulana Ikhsan; 
Theophilus Wellem                    
                     Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 4 No. 3 (2023): Jurnal Indonesia : Manajemen Informatika dan Komunikasi (JIMIK) 
                    
                    Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) AMIK Indonesia 
                    
                         Show Abstract
                        | 
                             Download Original
                        
                        | 
                            
                                Original Source
                            
                        
                        | 
                            
                                Check in Google Scholar
                            
                        
                                                                                    
                            | 
                                DOI: 10.35870/jimik.v4i3.321                            
                                            
                    
                        
                            
                            
                                
Quadrature amplitude modulation (QAM) is a modulation scheme used by digital communication systems to obtain high data rates in bandwidth-limited channels. M-ary QAM schemes with M values greater than 256 are currently used by wireless network standards, such as WiFi 6 and WiFi 7 (final standard will be released in 2024), which use the 1024-QAM and 4096-QAM modulation schemes, respectively. With the continuous development of technology for digital communication systems, both wireline and wireless, it is essential to research regarding advanced modulation schemes. This study discusses the simulation of the 1024-QAM and 4096-QAM modulation schemes using MATLAB software to compare the performance of the two modulation schemes in data transmission through the AWGN channel without using an error control code. The simulation results show that 4096-QAM is superior to 1024-QAM but requires higher Eb/N0 and SNR values. The Eb/N0 value required by the 4096-QAM to achieve a bit error ratio (BER) of 10-4 is 31 dB, while the 1024-QAM requires an Eb/N0 value of 26 dB.