p-Index From 2020 - 2025
0.817
P-Index
This Author published in this journals
All Journal TEKNOINFO Intelmatics
Sediyono, Agung
Universitas Trisakti

Published : 5 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 5 Documents
Search

PERBANDINGAN WFQ DAN FIFO PADA END-TO-END DELAY VolP Sediyono, Agung; Rahman, Hendry
TEKNOINFO Vol 1, No 1 (2008): Vol. 1 No 1 Januari 2008
Publisher : TEKNOINFO

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Kualitas suara pada VolP sangat rentan terhadap delay. Permasalahan delay end-toend diatasi dengan pemilihan code voice yang cocok dan penerapan QoS. Penerapan QoS secara differensial dilakukan dengan penerapan penjadwalan paket dengan penerapan metode antrian. Oleh karena itu perlu dilakukan pemilihan kombinasi yang cocok antara code voice dan metode antrian yang akan digunakan sehingga delay endto-end menjadi minimum pada bandwitdh jaringan tertÞntl PAne!itian ini mêncoba untuk menentukan kombinasi tersebut. Dalam penelitian ini metode antrian yang akan diteliti adalah Weighted Fair Queuing (WFQ) dan First In First Out (FIFO). Analisa perbandingan metode antrian WFQ dan FIFO menggunakan software Network Simulator. Berdasarkan hasil simulasi, metode antrian WFQ dengan code voice G.711 menghasilkan nilai rata-rata end-toend delay lebih rendah daripada metode antrian FIFO. Dan dapat memenuhi persyaratan rekomendasi ITU-T mengenai komunikasi one way delay yaitu kurang dari 150 ms.
KOMPARASI FUNGSI HASH MD5 dan SHA FAMILY PADA IMPLEMENTASI BLOOM FILTER Sediyono, Agung
TEKNOINFO Vol 1, No 1 (2007): Voı. 1. No, 1 Januari 2007
Publisher : TEKNOINFO

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The bloom filter is a compact data structure that can be applied as a table look up. It uses a hash and modulo function to convert the string into the bit position of bloom filters. The bloom filter has a false positive weakness because of the impairment of hash function and limitation of bloom size. Therefore, it is important to choose the best hash function so that the false positive rate minimum. This research compares hash function: SHA family and MD5 and chooses which one outperform based on the minimum of false positive rate.
Analysis Of Topic Movement & Conversation Membership On Twitter Using K-Means Clustering Sediyono, Agung; Valentino Hutagalung, Josua; Solihah, Binti
Intelmatics Vol. 4 No. 2 (2024): Juli-Desember
Publisher : Penerbitan Universitas Trisakti

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25105/v4i2.21002

Abstract

Humans are born to socialize with each other. Social media is one of the media to be able to socialize with each other. Twitter is one of the social media that contains hundreds of millions of tweets where the tweet contains news, products that are currently popular, even about the daily life of users who can change. Social Context Analysis is a tool to analyze social changes and individual needs in society from time to time. In this study, the author uses the K-means Clustering method to group topics on Twitter. In its implementation, this research is expected to be able to see the occurrence of topic movements and membership movements on Twitter topics.
The Opportunity of Ai Technology to Increase The Value Chain of Oil Palm Plantation Sediyono, Agung; Solihah, Binti
Intelmatics Vol. 5 No. 1 (2025): January-June
Publisher : Penerbitan Universitas Trisakti

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25105/v5i1.22477

Abstract

Indonesia produced 58,4% of worldwide oil palm production, and the contribution of the plantation sub-sector in 2022 is 3,76% of PDB and 30,32% of the Agriculture, Forestry, and Fishery sectors. However, oil palm production in Indonesia is lack of productivity and efficiency compared to other countries, especially Malaysia.  Therefore, this paper tries to explore the opportunities of AI technology to increase the value chain of the oil palm plantation, especially in productivity and efficiency. The scope of exploration started from oil palm seeding, nursery,  planting,  and harvesting. Based on the oil palm plantation value chain review and the previous research works in AI implementation on value chain respectively, it can be concluded that AI technology has been explored to be implemented in oil palm plantations intensively. However, there is still enough room for improvement especially in accuracy rate and adoption feasibility for smallholder planters. Moreover, IoT and drone technology have a big potential to be adopted because the plantation is mostly hard-to-reach areas by humans, for instance high oil palm bunch, long distance journey for inspection and maintenance, wild animal threat, etc.  
Analysis of the Suitability of Fortigate Firewall Performance Limiting the Use of Social Media Streaming During Operating Hours at PT. Asaba Digital Innotech Saputra, Erwan; Budi Santoso, Gatot; Sediyono, Agung
Intelmatics Vol. 5 No. 2 (2025): July-December
Publisher : Penerbitan Universitas Trisakti

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25105/v5i2.23394

Abstract

Initial network analysis at PT ASABA Digital Innotech identified very high bandwidth consumption for non-work activities, with total usage in 30 days reaching 195 GB for social media and 448 GB for streaming media. This research aims to implement and measure the effectiveness of access restriction policies using Fortigate firewalls to significantly reduce this traffic. Using the Network Development Life Cycle (NDLC) method, a rule policy based on FortiGuard Web Filtering and Application Control was designed to block access during working hours (08.00-17.00), with the exception of breaks (12.00-13.00) and for specific user groups (Board of Directors and Marketing team).The implementation results show a drastic and measurable decrease in bandwidth usage. Social media traffic was reduced from 195 GB to 7 GB, equivalent to a 96.41% reduction.Meanwhile, streaming media traffic dropped from 448 GB to 52 GB, a reduction of 88.39%.The effectiveness of the policy was validated through analysis of firewall logs that consistently displayed a Deny status: UTM Blocked for thousands of prohibited access attempts. Based on this data, it is concluded that the Fortigate configuration is very effective in optimizing network bandwidth usage. This study recommends the use of schedule policies for flexibility and the integration of deep packet inspection to anticipate bypass methods by users.