Claim Missing Document
Check
Articles

Found 2 Documents
Search

Effect of Workload Server on Server Room Temperature: An IoT-Based Monitoring Sabam Parjuangan; Cecep Hendrik
Prosiding International conference on Information Technology and Business (ICITB) 2020: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 6
Publisher : Proceeding International Conference on Information Technology and Business

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A server was the computer device that served one or more computing devices (clients). The servers that serve client had high-speed processor specifications. Each of the service requests increased the server workload. This increasing workload logically increased the work of the processor so that the processor temperature was increasing. This article described comprehensively the changes of the server room temperature due to the increasing workload of the server. The objective of this study was finding out the effect of the server engine workload on the server room temperature. The method used in this study was the IoT-Based monitoring method. The temperature sensor was used and combined with the Node MCU connected to the website server as a tabulation of the observation data. It was designed to avoid the heat caused by external factors (e.g., humans). The sensors were placed on the server rack. The result of this study was that the increasing workload of the server did not have a significant effect on the server room temperature. The result of this study was expected to be the input for designing the server chassis and the server roomKeywords: Server, Temperature, IoT-Based Monitoring, Workload.
Forensics Investigation on Image Files using Quantization Value Sabam Parjuangan; Muhammad Hafif; Suhardi Suhardi
Prosiding International conference on Information Technology and Business (ICITB) 2020: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 6
Publisher : Proceeding International Conference on Information Technology and Business

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Image files were one of the evidences as a result of the forensic investigations on cybercrimes. The process of acquiring the evidence must have a high accuracy. The image files were obtained from social media that had incomplete metadata. This article outlined an in-depth approach for forensic investigation on image files. The method of this forensic examination conducted to the image files was through the investigative action procedures so that the incomplete metadata can still be analyzed. The data analysis technique used in this study was JPEG Analysis, ELA, and Noise methods. The result of this study was that the characteristics of the image files were able to be identified from social media through editting, and originating processes. The forensic measures described in this study were also able to prove the image file modifications.Keywords:     Image Forensics, Cybercrimes, Quantization