Claim Missing Document
Check
Articles

Found 29 Documents
Search

Analisis Network Incident Packet Capture (PCAP) Menggunakan Wireshark Nurwan Reza Fachrur Rozi, Nurwan Reza Fachrur Rozi
Journal of Informatics and Communication Technology (JICT) Vol. 5 No. 2 (2023)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52661/j_ict.v5i2.239

Abstract

Pada artikel ini, penulis mengembangkan kerangka analisis kausal peristiwa kritis dalam penelitian studi kasus. Peristiwa penting didefinisikan sebagai peristiwa kontinjensi yang mempunyai dampak sebab akibat terhadap hasil suatu kasus tertentu. Penulisan ini menggunakan analisis teori himpunan untuk memberikan definisi dan alat pengukuran untuk menguji kontingensi dan signifikansi kausal dalam penelitian studi kasus. Seperangkat alat tersebut terdiri dari pedoman untuk menyimpulkan tingkat kontinjensi kejadian dengan menggunakan ekspektasi teoretis. Perangkat lainnya adalah pedoman untuk menggunakan kasus-kasus kontrafaktual guna menentukan sejauh mana peristiwa-peristiwa tertentu diperlukan dan cukup untuk menghasilkan hasil tertentu dalam kasus-kasus tertentu. Menyadari bahwa situasi akses jaringan menjadi sangat lambat. Praduga ada aktivitas yang tidak biasa terjadi di jaringan, dan aktivitas serangan mungkin telah terjadi. Untuk mengetahui penyebabnya, menganalisis hasil sniffing trafik menggunakan Wireshark. Dua kali penggalian data dilakukan pada waktu dan kesempatan yang berbeda. Menyelidiki kejadian tersebut dengan melakukan analisis pada data PCAP pada File Attack a.pcap atau Attack a.pcap. Hasil analisa dibahas dengan mengamati trafik yang dihasilkan pada jaringan dengan menangkap file PCAP.
Chance Evaluation and Improvement of Get to Control Data Security Administration Based On ISO/IEC 27001 at Telkom University Jakarta Campus Fachrur Rozi, Nurwan Reza; Agustav Wirabudi, Andri; Arandiant Rozano, Seandy
International Journal of Science Education and Cultural Studies Vol. 3 No. 2 (2024): ijsecs
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/ijsecs.v3i2.246

Abstract

The digital-based smart campus system, consisting of components such as the campus application, digital presence with QR code, and campus development dashboard, is one of the services offered by Telkom University Jakarta Campus. In addition, it utilizes artificial intelligence (AI) technology, especially image recognition, to support the Green Campus concept and increase environmental protection efforts, demonstrating the university's dedication to utilizing innovative technologies for a sustainable future. Therefore, the security of information assets is very important. Issues of confidentiality, integrity, and availability can arise if the information security system is not properly managed. This research aims to improve the security information system by conducting a risk assessment using the OCTAVE method. This risk assessment aims to identify the most significant impacts when risks occur and prioritize the most important risks. According to ISO/IEC 27001:2013, safety controls and targets are established. The results of this research are purpose and security management documents, risk management documents, and operational standards of procedures (SOPs). Risk management documents related to information security include risk assessment, risk identification, risk analysis, and evaluation at the campus. Standard Operational Procedures (SOP) documentation includes policy documents, work instructions, and work records that are consistent with the selection of objective controls and security controls for risk management.
Enhancement of images compression using channel attention and post-filtering based on deep autoencoder Wirabudi, Andri Agustav; Fachrurrozi, Nurwan Reza; Dorand, Pietra; Royhan, Muhamad
International Journal of Advances in Intelligent Informatics Vol 10, No 3 (2024): August 2024
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/ijain.v10i3.1499

Abstract

Image compression is a crucial research topic in today's information age, especially to meet the demand for balanced data compression efficiency with the quality of the resulting image reconstruction. Common methods used for image compression nowadays are based on autoencoders with deep learning foundations. However, these methods have limitations as they only consider residual values in processed images to achieve existing compression efficiency with less satisfying reconstruction results. To address this issue, we introduce the Attention Block mechanism to improve coding efficiency even further. Additionally, we introduce post-filtering methods to enhance the final reconstruction results of images. Experimental results using two datasets, CLIC for training and KODAK for testing, demonstrate that this method outperforms several previous research methods. With an efficiency coding improvement of -28.16%, an average PSNR improvement of 34%, and an MS-SSIM improvement of 8%, the model in this study significantly enhances the rate-distortion (RD) performance compared to previous approaches.
Komunikasi Cahaya Tampak untuk Model Sistem Pintu Otomatis Berbasis Internet of Things NATALI, YUS; R. F, NURWAN; NURHAYATI, ADE; RIZKY, M.; A, M. NABIL; M, MOSES; ROIHAN, M.; S, ALVA NURVINA; DORAND, PIETRA; SUYATNO, SUYATNO
ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika Vol 12, No 4: Published October 2024
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/elkomika.v12i4.938

Abstract

ABSTRAKKomunikasi cahaya tampak (Visible Light Communication) merupakan solusi untuk komunikasi berkecepatan tinggi pada sistem berbasis Internet of Things. Model pintu otomatis berbasis IoT menggunakan komunikasi cahaya tampak berhasil dibuat untuk keamanan rumah. Komunikasi tersebut dengan panjang gelombang 650 nm berwarna merah diujicobakan untuk jarak 20 cm. Penerima fotodioda mengaktifkan motor servo untuk membuka pintu dengan maksimal sudut rotasi 120 derajat. Ada enam macam kondisi pintu terbuka yang ditampilkan di LCD dan dikirimkan melalui internet ke website. Secara keseluruhan sistem berjalan dengan baik. Komunikasi cahaya tampak juga diujicobakan sebagai sinyal pembawa dengan mendeteksi tegangan yang dikirimkan oleh laser di fotodioda. Berdasarkan ujicoba didapatkan data yang dikirimkan dapat diterima dengan baik, walaupun perubahan tegangan turun sampai dengan 1.5% di fotodioda.Kata kunci: komunikasi cahaya tampak (Visible Light Communication), Internet of Things, pintu otomatis, keamanan, sinyal pembawa ABSTRACTVisible Light Communication (VLC) is a solution for high-speed communication that can be utilized for Internet of Things (IoT) systems. An automatic door model based on IoT using VLC has been successfully assembled for user security at home. This communication, with a wavelength of 650 nm in red light, was tested for 20 cm. The photodiode receiver activates the servo motor to open the door with a maximum rotation angle of 120 degrees. The open door process consists of 6 different conditions displayed on the LCD and transmitted via the internet to the website. In a comprehensive evaluation, the system operates optimally. In addition, VLC was also tested as a carrier signal to examine the voltage sent by the laser. Based on the experiment, the data sent can still be received well, even though there is a voltage change up to 1.5% at the photodiode receiver.Keywords: Visible Light Communications (VLC), Internet of Things, automatic door, security, carrier signal
IMPLEMENTASI VLAN ROUTER ON A STICK MENGGUNAKAN GNS3 V2.2.23 UNTUK MENINGKATKAN PERFORMANSI JARINGAN KOMPUTER: (Studi Kasus di Institut Teknologi Telkom Jakarta) Purnama Alkhoir; Ade Nurhayati; Nurwan Reza Fachrurrozi
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Untuk mebuat jaringan yang handal, dikembangkan lah berbagai teknik khusus, seperti teknik subnetting dan penggunaan hardware yang lebih baik (antara lain switch dan router) maka muncullah konsep VLAN (Virtual Local Area Network). Agar antar VLAN dapat berkomunikasi dibutuhkan suatu jembatan yang berada pada lapisan OSI layer 3 yaitu router. Dengan menggunakan konfigurasi router “Router on a stick”, yang mana sebuah interface physical me-routing traffic antara beberapa VLAN pada satu network. Router interface dikonfigurasikan untuk beroperasi sebagai link trunk dan terhubung dengan sebuah port switch dalam mode trunk. Router menunjukkan inter-VLAN routing dengan menerima traffic VLAN yang telah di tag pada interface trunk dari switch dan secara internal merutekan antar VLAN menggunakan sub-interface.. Implementasi VLAN Router on a Stick dapat meningkatkan performansi jaringan computer dalam perkembangan jaringan computer kedepannya.
IMPLEMENTASI VLAN ROUTER ON A STICK MENGGUNAKAN GNS3 V2.2.23 UNTUK MENINGKATKAN PERFORMANSI JARINGAN KOMPUTER: (Studi Kasus di Institut Teknologi Telkom Jakarta) Purnama Alkhoir; Ade Nurhayati; Nurwan Reza Fachrurrozi
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Untuk mebuat jaringan yang handal, dikembangkan lah berbagai teknik khusus, seperti teknik subnetting dan penggunaan hardware yang lebih baik (antara lain switch dan router) maka muncullah konsep VLAN (Virtual Local Area Network). Agar antar VLAN dapat berkomunikasi dibutuhkan suatu jembatan yang berada pada lapisan OSI layer 3 yaitu router. Dengan menggunakan konfigurasi router “Router on a stick”, yang mana sebuah interface physical me-routing traffic antara beberapa VLAN pada satu network. Router interface dikonfigurasikan untuk beroperasi sebagai link trunk dan terhubung dengan sebuah port switch dalam mode trunk. Router menunjukkan inter-VLAN routing dengan menerima traffic VLAN yang telah di tag pada interface trunk dari switch dan secara internal merutekan antar VLAN menggunakan sub-interface.. Implementasi VLAN Router on a Stick dapat meningkatkan performansi jaringan computer dalam perkembangan jaringan computer kedepannya.
Smart Home Security System Using Object Recognition with the EfficientDet Algorithm: A Real-Time Approach Suyatno, Suyatno; Natali, Yus; Reza Fachrurrozi, Nurwan; Roihan, Muhamad; Dorand, Pietra; Ghani, Naufal
International Journal of Engineering Continuity Vol. 4 No. 1 (2025): ijec
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/ijec.v4i1.400

Abstract

The EfficientDet method, which is implemented on the Raspberry Pi for real-time detection in resource-constrained contexts, is the basis for the smart home security system presented in this study.  The system integrates CCTV cameras, motion sensors, and detectors to identify and classify objects, sending notifications via WhatsApp via the Twilio API.  The EfficientDet-D0 model achieves an accuracy of 94.8%, an average processing time of 45 ms, and a memory usage of about 850 MB.  When compared to moving individuals or non-human things, testing shows that stationary human items have a higher detection accuracy.  Notifications are transmitted roughly every three seconds, with an average latency of 1.4 to 1.8 seconds.  The suggested method provides object recognition, real-time monitoring, and configuration flexibility in contrast to traditional IoT-based systems.  These results highlight the potential of EfficientDet as a reliable and adaptable solution for home security.  Future improvements include improving accuracy in a variety of environmental conditions and implementing adaptive learning.
Implementation OSPFv3 For Internet Protocol Verses 6 (IPv6) Based On Juniper Routers Use Emulator Virtual Engine – Next Generation (Eve-NG) Fachrur Rozi, Nurwan Reza; Nurhayati, Ade; Arandiant Rozano, Seandy
International Journal of Engineering Continuity Vol. 3 No. 1 (2024): ijec
Publisher : Sultan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/ijec.v3i1.141

Abstract

Advances in computer network technology and increased use of Internet information have reduced IPv4 offerings. This requires a computer network protocol that can replace the role of IPv4 which is currently limited/loose. Also known as Internet Protocol Verses 6 (IPv6), it aims to improve on IPv4 and does not represent a fundamental change from IPv4. Features that are available in IPv4 are also available in IPv6, but features that do not work in IPv4 are available in IPv4. IPv6 is no longer used. A transition mechanism is required to forward IPv6 packets to an existing IPv4 network and vice versa. One of the available mechanisms is automatic tunneling (abbreviated as Tunneling). The EVE-NG simulator is used to implement and study the routing protocol (OSPFv3) on IPv6 networks. To check the results, use the traceroute, ping command. The Juniper platform is implemented in this small virtual network to test the OSPFv3 protocol on an IPv6 network. This research explains how to assign IPv6 addresses on Juniper routers and end devices as well as their configuration. The Internet protocol layer is responsible for receiving and sending data packets within the network. In the virtual environment simulation mode, Juniper packets are analyzed and packet forwarding via IPv6 on OSPFv3 is used to make decisions for protocols in the IPv6 environment that are faster, and more secure.
Sosialisasi Dan Penerapan Instalasi Prototipe Panel Surya 150 WP di SMK Prudent School Kota Tanggerang Royhan, Muhamad; Dorand, Pietra; Nurhayati, Ade; Fachrur Rozi, Nurwan Reza
Jurnal Pengabdian Masyarakat Sultan Indonesia Vol. 1 No. 2 (2024): Abdisultan
Publisher : Sultan Publsiher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58291/abdisultan.v1i2.249

Abstract

As a power plant, the sun can produce unlimited light. Use of solar panels as a transformation device that transforms solar energy into electricity. The electricity produced is sent to the battery and stored as an emergency resource. Much appreciated for progressed innovation, sun-oriented boards can be utilized as a substitution for current power; in any case, the State Power Enterprise still gives power. SMK understudies can learn the significance of the plan and utilization of sun-based boards. In the other stage, SMK understudies will utilize model sun-based boards to introduce the coach given. Through the execution and socialization of sun-powered boards, SMK Judicious School City Tangerang works as arranged, and understudies can introduce models accurately from control to stack. Understudies and instructors will get fabric and explanations of current advancements within the most recent sun-oriented modules to empower advanced improvement.