Claim Missing Document
Check
Articles

Found 4 Documents
Search

Implementasi Backup Koneksi Jaringan Menggunakan Metode Failover MikroTik pada PT Tiga Kawan Sertifikasi Raharjo, Pratama Putra; Setiawan, Kiki; Kastum
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 3 (2024): September
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i3.974

Abstract

The internet plays a vital role in supporting business operations in companies or organizations by accelerating the flow of information and enabling real-time connections. According to a report by We Are Social, the number of internet users in Indonesia reached 213 million in January 2023, accounting for about 77% of the total population. However, despite the numerous ISPs in Indonesia, not all internet services are affordable or of high quality, and some areas remain inaccessible to providers using fiber optic connections. PT. Tiga Kawan Sertifikasi, a company engaged in legal services in Tangerang, faces challenges with its internet connection as it relies solely on a single provider, Orbit from Telkomsel. Issues arise when the modem signal frequently drops due to the use of SIM card media instead of fiber optic cables. The proposed solution is to add another provider as an alternative and implement a failover method on a Mikrotik router to ensure a stable connection.
K-Means Clustering Analysis of Poverty Data in Cilacap District Setiawan, Kiki; Kastum; Pratama, Yuliya Putri
International Journal Software Engineering and Computer Science (IJSECS) Vol. 5 No. 1 (2025): APRIL 2025
Publisher : Lembaga Komunitas Informasi Teknologi Aceh (KITA)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/ijsecs.v5i1.3759

Abstract

Poverty stands as a complex structural obstacle within social development frameworks. The COVID-19 pandemic intensified poverty dynamics in Indonesia which saw poverty rates increase by 9.78% in March and reach 10.19% by September. Local Bureau of Statistics data shows that the poverty rate in Cilacap Regency dropped to 10.99% (around 191,000 people) in March 2024 from 10.68% (186,080 people) in March 2023. The study uses k-means clustering methodology for analysis and maps poverty-prone areas utilizing QGIS software. The analysis revealed 12 sub-districts and 14 neighborhood units (RW) alongside a single community unit (RT) that show unique poverty characteristics. The silhouette coefficient evaluation produced a 0.55 score which showed a moderate cluster structure and acceptable cluster placement. The research provides empirical evidence about poverty distribution which shows how data mining methods can enhance spatial socioeconomic studies. The study presents a detailed analysis of poverty stratification across Cilacap Regency through the application of sophisticated computational methods.
Real-Time Face Recognition System with Enhanced Security Using Cryptographic Hash-Based Encrypted Embedding Matching Zaidan, Rodhi Shafia; Kastum; Mulyana, Dadang Iskandar
Journal Innovations Computer Science Vol. 4 No. 2 (2025): November
Publisher : Yayasan Kawanad

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56347/jics.v4i2.322

Abstract

This study presents the development and evaluation of a secure and efficient real-time face recognition system for school attendance, integrating cancelable biometrics with cryptographic hashing. A total of 115 face samples were collected from students and teachers under diverse lighting, pose, and expression conditions. Images were pre-processed using Contrast Limited Adaptive Histogram Equalization (CLAHE) and Gamma Correction, followed by feature extraction with ResNet-128D, key-based random projection, binarization into 128-bit templates, and SHA-256 hashing. Evaluation results demonstrated an accuracy of 86.09%, precision of 100%, recall of 86.09%, and F1-score of 92.52%, with an average latency of 281.71 ms, remaining well below the operational threshold of 500 ms. Offline pre-processing improved the F1-Score by 7.50% on large datasets and 7.28% on smaller datasets without sacrificing processing speed. From a security perspective, the system achieved zero false acceptances (FAR = 0%) and allowed template regeneration when compromised, reinforcing privacy preservation. These findings validate the feasibility of combining cancelable biometrics with cryptographic hashing to balance accuracy, speed, and security in practical attendance systems. The research underscores its broader applicability to access control and public security, while future work should emphasize adaptive pre-processing, diverse hardware validation, and hardware acceleration for robust real-time deployment.
Real-Time Face Recognition System with Enhanced Security Using Cryptographic Hash-Based Encrypted Embedding Matching Zaidan, Rodhi Shafia; Kastum; Mulyana, Dadang Iskandar
Journal Innovations Computer Science Vol. 4 No. 2 (2025): November
Publisher : Yayasan Kawanad

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56347/jics.v4i2.322

Abstract

This study presents the development and evaluation of a secure and efficient real-time face recognition system for school attendance, integrating cancelable biometrics with cryptographic hashing. A total of 115 face samples were collected from students and teachers under diverse lighting, pose, and expression conditions. Images were pre-processed using Contrast Limited Adaptive Histogram Equalization (CLAHE) and Gamma Correction, followed by feature extraction with ResNet-128D, key-based random projection, binarization into 128-bit templates, and SHA-256 hashing. Evaluation results demonstrated an accuracy of 86.09%, precision of 100%, recall of 86.09%, and F1-score of 92.52%, with an average latency of 281.71 ms, remaining well below the operational threshold of 500 ms. Offline pre-processing improved the F1-Score by 7.50% on large datasets and 7.28% on smaller datasets without sacrificing processing speed. From a security perspective, the system achieved zero false acceptances (FAR = 0%) and allowed template regeneration when compromised, reinforcing privacy preservation. These findings validate the feasibility of combining cancelable biometrics with cryptographic hashing to balance accuracy, speed, and security in practical attendance systems. The research underscores its broader applicability to access control and public security, while future work should emphasize adaptive pre-processing, diverse hardware validation, and hardware acceleration for robust real-time deployment.