Claim Missing Document
Check
Articles

Effect Of Distance On Wi-Fi Signal Quality In The Home Environment Putra, Fauzan Prasetyo Eka; Ubaidi, Ubaidi; Kusuma, R. Okky Firmansyah; Syam, Abd Mu’iz; Efendy, Satrio Ananta
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.4319

Abstract

This study aims to analyze the effect of distance on Wi-Fi signal quality in a home environment. With the increasing use of wireless devices and applications that rely on internet connectivity, Wi-Fi signal quality has become crucial to support daily activities such as streaming, online gaming, remote work, and smart home automation. This research employs an experimental method by measuring signal strength and data transmission speed at various distances from the Wi-Fi router. Measurements were taken at several points, ranging from 1 meter to 15 meters from the router, in different rooms and through different obstacles like walls and furniture.To conduct the analysis, a Wi-Fi analyzer was used to measure signal strength (in dBm) and a speed test was employed to determine data transmission speed (in Mbps) at each distance. The results showed that the greater the distance from the router, the Wi-Fi signal strength decreased significantly, leading to a corresponding decrease in data transmission speed. In addition, obstacles such as walls and electronic interference further degraded the signal quality.This study concludes that optimizing router placement and using signal booster devices, such as Wi-Fi extenders or mesh networks, can be effective solutions to improve Wi-Fi signal quality at home. It also highlights the importance of understanding and managing home network infrastructure to maximize Wi-Fi usage efficiency. By strategically placing routers and employing additional network hardware, users can ensure a stable and fast internet connection throughout their home, enhancing the overall user experience and productivity. Research provides valuable insights for homeowners and technology enthusiasts on how to achieve optimal Wi-Fi performance in various home environments.
Analysis of Phishing Attack Trends, Impacts and Prevention Methods: Literature Study Fauzan Prasetyo Eka Putra; Ubaidi; Achmad Zulfikri; Goffal Arifin; Ilhamsyah, Revi Mario
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.4357

Abstract

Phishing is a growing form of cybercrime that poses a serious threat to information security in the digital world. This article aims to analyze the latest trends in phishing attacks and evaluate effective prevention methods. Using data from cybersecurity reports, case studies, and academic literature, this research identifies the latest phishing techniques such as spear phishing, whaling, and smishing that are increasingly sophisticated and difficult to detect. The analysis showed that while anti-phishing technologies such as email filters, two-factor authentication (2FA), and encryption have undergone significant developments, user awareness and education remain key factors in preventing phishing attacks. Additionally, strict policies and procedures at the organizational level also play an important role in reducing risk. The case studies presented in this article demonstrate the successful implementation of various prevention methods in several organizations, although challenges in terms of technology adoption and user training remain. For example, spear phishing and whaling have been effectively countered by tailored training programs and advanced threat detection systems. The article concludes by providing practical recommendations to increase user awareness and strengthen organizational policies to protect against phishing attacks. It also includes foresight to illustrate the possible evolution of phishing attacks, emphasizing the need for continuous innovation in cyber defense strategies. This comprehensive approach underscores the importance of a multi-layered defense system that combines technological solutions with human vigilance to effectively combat the ever-evolving threat of phishing.
Computer Network Management Optimization Through Big Data Analysis Using Time Series Analysis Method Putra, Fauzan Prasetyo Eka; Ubaidi, Ubaidi; Huda, Moh Abroril; Hasbullah, Hasbullah; Rohman, Abd
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.4373

Abstract

Efficient management of computer networks is becoming increasingly important in the ever-evolving digital age. With the ever-increasing volume of data in the network environment, sophisticated approaches are needed to analyse and optimise network performance. One promising approach is the use of big data analysis with time series analysis methods. In this context, this research aims to explore the potential application of big data analysis using the time series analysis method in computer network management. By combining the power of big data analysis with time series analysis methodology. One of the main applications of  big data analysis in computer networks is security threat detection. By analysing unusual traffic patterns or suspicious behaviour, the system can identify potential attacks or data leaks more quickly and efficiently. In addition, big data analytics can also be used to optimise network performance by identifying bottlenecks, predicting capacity requirements, and improving the efficiency of resource usage by utilising big data analytics in the context of computer networks. However, challenges related to data privacy and security remain a major concern that must be addressed in the application of this technology. Therefore, it is important to develop a framework that takes into account the security and privacy aspects of data throughout the big data analysis process. Through this research, it is hoped that innovative solutions to the challenges of managing complex computer networks in the evolving digital era can be found, as well as provide a solid foundation for further research in this field.
4G LTE Network Performance Analysis Provider 3 In Pamekasan Using The G-Nettrack Application Putra, Fauzan Prasetyo Eka; Ubaidi, Ubaidi; Mahendra, Mahendra; Surur, Miftahus; Rizki, Abdulloh
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.4376

Abstract

This research evaluates the performance of 4G LTE Provider 3 network services in Pamekasan City using the drive test method using the G-NetTrack application. The goal is to understand network performance in providing high-quality internet access in the ever-evolving digital era. This research is important because people's needs for fast and reliable internet access are increasing, especially in cities with high population density such as Pamekasan. Field measurement results show that Provider 3's 4G LTE network has good service quality with stable download and upload speeds and adequate signal strength. Drive tests were conducted by driving along predetermined routes while recording data on signal strength, internet speed, latency, and other relevant parameters. The data collected from each location was analyzed to compare the performance of various service providers. This analysis provides a comprehensive picture of network performance and can be used to provide recommendations to both consumers and other concerned parties. The conclusion of this study includes an evaluation of the performance of each provider based on the drive test results, as well as providing recommendations for future service improvements. The results of this study provide useful insights to understand and improve user experience in telecommunication connectivity in Pamekasan City, and can be used to improve user experience.
Netvista Public Wireless Network Quality Analysis Using Quality Of Service Parameters Putra, Fauzan Prasetyo Eka; Ubaidi, Ubaidi; Mayangsari, Dwi; Hasanah, Nor
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.4388

Abstract

The use of public wireless networks is increasingly used by the public because it is able to touch all walks of life using the internet because of its affordable prices. Apart from the affordable price, the ease of accessing this network so that many people prefer to take advantage of public wifi. However, with the increasing number of network users, of course, it will affect the quality of the network. Based on these problems, the researcher decided to conduct a study to analyze the quality of the public wireless network from NETVISTA. The NETVISTA public wireless network can be accessed in Kangenan Gg. 1, so the researcher decided to conduct research at the location for 2 days. This study aims to determine the quality of the internet connection network based on QoS parameters by knowing the delay, throughput, and packet loss obtained from the axence nettols application which will later be compared with the TYPHON standard so that the quality of the NETVISTA public wireless network can be known. The method used in this study is descriptive analysis. From this study, the results were obtained that many users (category: "Busy") the quality of Netvista's public wireless network was less satisfactory or at point 2.6, while when there were few users (category: "Not Busy") the quality of Netvista's wireless network was satisfactory or at point 3.1. The best time on holidays is between 11.00-12.00 and 22.01-00.00, while the best time on active days is 04.01-10.59 and 12.01-16.00.
PEMBERDAYAAN SEKOLAH INKLUSI MELALUI E-MODUL BERJENJANG SEBAGAI PENGEMBANGAN KOMPETENSI GURU DALAM PEMENUHAN LAYANAN PENDIDIKAN INKLUSIF Zayyadi, Moh; Lanya, Harfin; Anjarani, Devie Reztia; Putra, Fauzan Prasetyo Eka; Mansyur, Muhammad Umar; Isma’el, M; Sholihah, Wildanus
Jurnal Likhitaprajna Vol 8 No 2 (2024)
Publisher : FKIP Universitas Wisnuwardhana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37303/peduli.v8i2.681

Abstract

Tujuan pengabdian ini adalah memberikan pemberdayaan sekolah inklusi SDN Barkot 5 Pamekasan melalui E-Modul Berjenjang sebagai pengembangan kompetensi guru dalam pemenuhan layanan pendidikan inklusif. Kegiatan pengabdian dilaksanakan di SDN Barkot 5 Pamekasan dengan sasaran pengembangan kompetensi guru. Metode pelaksanaan kegiatan yang digunakan identifikasi dan asesmen awal, profil belajar siswa, perencanaan rancangan pembelajaran E-Modul Berjenjang, pelatihan dan pedampingan, penilaian dan evaluasi, dan asesmen hasil. Dengan kegiatan pendampingan ini, kegiatan pemberdayaan ini sesuai tujuan yang ingin dicapai yakni layanan pendidikan yang mengikutsertakan siswa berkebutuhan khusus untuk belajar bersama dengan siswa lainnya dan sebagai pengembangan kompetensi guru dalam pemenuhan layanan pendidikan inklusif. media E-Modul berjenjang dapat diterapkan dalam pembelajaran di kelas. Penggunaan teknologi dapat membantu guru dalam melaksanakan pembelajaran di kelas. E-Modul Berjenjang bisa diterapkan dan relevan dalam pembelajaran dan peserta sudah memiliki bayangan yang lebih luas tentang e modul serta dapat dipraktikkan dalam proses pembelajaran
Design of Inventory Management Information System (Si Menris) Kamoning Community Health Center Website Based Safiuddin, Safiuddin; Fahmi, Zainol; Putra, Fauzan Prasetyo Eka
Journal of Information System Research (JOSH) Vol 5 No 4 (2024): Juli 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josh.v5i4.5433

Abstract

At the Puskesmas Kamoning health facility, inventory management is still done manually using paper, Microsoft Excel, and Google Spreadsheets shared via WhatsApp. So it's difficult for officers to organise the data and monitor the stock of goods with the available data. It's becoming inefficient and less accurate. In addition, there are limited working hours for accessing equipment data until data is lost or duplication occurs. The researchers developed a web-based inventory information system to replace the manual process. The system will make inventory management easier, ranging from recording to monitoring to stock management, and will also meet information needs faster and more accurately. Stages and procedures for designing an inventory management information system (Si Menris) using the waterfall model. PHP and CSS are programming languages supported by MySQL as a data storage database. This system uses black box testing to test errors in the system. This Inventory Management Information System (Si Menris) helps inventory management get more accurate, faster data. Besides that, the system can make it easier for employees to make inventory service complaints.
Analisis Keamanan Jaringan Dari Serangan Malware Menggunakan Filtering Firewall Dengan Port Blocking Zulfikri, Achmad; Putra, Fauzan Prasetyo Eka; Huda, Moh Abroril; Hasbullah; Mahendra; Miftahus Surur
Digital Transformation Technology Vol. 3 No. 2 (2023): Artikel Periode September 2023
Publisher : Information Technology and Science(ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/digitech.v3i2.3379

Abstract

Jaringan komputer memiliki peranan penting dalam kegiatan belajar mengajar di sekolah, akan tetapi adapula dampak negatif yang ditimbulkan. Salah satunya rawan di serang oleh malware seperti virus dan lain sebagainya. Berdasarka permasalahan tersebut maka dilakukan penelitian yang bertujuan untuk mengatasi permasalahan-permasalahan disebabkan oleh penyebaran malware yang terdapat dalam jaringan. Salah satu dampak adanya malware dalam jaringan kampus adalah overload traffic bandwidth, sehingga menyebabkan kendala bandwidth yang cepat habis atau lalu lintas transfer data baik yang masuk maupun yang keluar menjadi lambat dari biasanya. Umumnya sebuah kampus atau universitas memiliki struktur jaringan yang didalamnya dikelola oleh satu atau lebih router di dalam mengelola jaringan dan bandwidth. Beberapa router memiliki kemampuan pengaturan firewall yang sudah cukum mumpuni namun perlu dikelola lebih spsesifik berdasarkan kebutuhan skala jaringan dan bandwidth yang tersedia. Dengan menciptakan rule-rule yang baik di dalam firewall akan lebih mudah dalam melakukan filtering terhadap lalu lintas trafik jaringan dan bandwidth sehingga dapat menciptakan keamanan dan kenyamanan pengguna jaringan dan bandwidth. Hasil penelitian ini menunjukkan kinerja dari mikrotik router board RB 1100 AHx2 yang dapat memfilter aktivitas malware dengan rule yang telah ditanamkan
Tinjauan Performa RouterOS Mikrotik dalam Jaringan Internet: Analisis Kinerja dan Kelayakan Putra, Fauzan Prasetyo Eka; Mufidah, Khafifatul; Ilhamsyah, Revi Mario; Efendy, Satrio Ananta; Barokah, Selviana Nur Rizqi
Digital Transformation Technology Vol. 3 No. 2 (2023): Artikel Periode September 2023
Publisher : Information Technology and Science(ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/digitech.v3i2.3446

Abstract

Konektivitas internet yang profesional jadi sesuatu keharusan dalam area digital dikala ini. Dalam konteks ini, RouterOS MikroTik memainkan kedudukan berarti selaku sistem pembedahan yang digunakan pada router serta fitur jaringan. Riset ini bertujuan buat menyelidiki serta menganalisis performa RouterOS MikroTik dalam mengalami tantangan yang dialami oleh jaringan internet yang terus tumbuh.Tata cara analisis mengaitkan pengukuran kecepatan, efisiensi, serta keandalan router dalam mengelola kemudian lintas informasi. Tidak hanya itu, penilaian dicoba terhadap respons router terhadap beban jaringan yang bermacam- macam, keamanan yang diberikan terhadap ancaman jaringan, keahlian pengelolaan protokol, serta skalabilitas dalam menunjang perkembangan jaringan. Hasil analisis ini membagikan pengetahuan mendalam tentang sepanjang mana RouterOS MikroTik bisa penuhi tuntutan kinerja dalam skenario pemakaian nyata. Khasiatnya mencakup uraian yang lebih baik dalam pengelolaan jaringan, pemilihan konfigurasi yang maksimal, serta kenaikan efisiensi operasional. 
Pengembangan Sistem Pemantauan Lingkungan Berbasis Internet of Things (IoT) di Kampus Putra, Fauzan Prasetyo Eka; Mahmud, M. Amir; Maqom, Iksya Syariifal
Digital Transformation Technology Vol. 3 No. 2 (2023): Artikel Periode September 2023
Publisher : Information Technology and Science(ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/digitech.v3i2.3457

Abstract

Penelitian ini bertujuan untuk mengembangkan sistem pemantauan lingkungan kampus yang inovatif dengan memanfaatkan Internet of Things (IoT). Sistem ini dirancang untuk secara real-time memantau parameter lingkungan kritis seperti kualitas udara, suhu, kelembaban, dan kualitas air. Dengan menerapkan teknologi IoT, penelitian ini diharapkan dapat memberikan data yang akurat dan terkini untuk mendukung pengambilan keputusan dan manajemen proaktif lingkungan kampus. Proses pengembangan sistem ini mencakup desain dan implementasi perangkat keras dan perangkat lunak yang terintegrasi secara efisien. Pengujian kinerja dan evaluasi efektivitas sistem akan menjadi fokus utama penelitian ini. Diharapkan bahwa hasil penelitian akan menghasilkan pemahaman mendalam tentang bagaimana implementasi teknologi IoT dapat meningkatkan efisiensi dan keefektifan pemantauan lingkungan kampus. Studi ini tidak hanya memberikan kontribusi pada perkembangan teknologi IoT, tetapi juga memiliki dampak positif pada manajemen lingkungan kampus dan upaya keberlanjutan. Data yang dikumpulkan melalui sistem ini dapat digunakan untuk mengidentifikasi pola-pola lingkungan, mendukung kebijakan pengurangan dampak lingkungan, dan merancang langkah-langkah proaktif untuk menjaga keseimbangan ekosistem kampus. Sebagai hasilnya, penelitian ini diharapkan memberikan landasan bagi pengembangan sistem serupa di lingkungan pendidikan lainnya dan mempromosikan kesadaran akan pentingnya teknologi berbasis IoT dalam menjaga keberlanjutan dan kesejahteraan lingkungan.
Co-Authors ., Ubaidi Abd Muiz Syam Abd Rohman Abd Rohman, Abd Abdul Adim Mubarok Abdulloh Rizki Achmad Rofiqi Achmad Zulfikri Achmad Zulfikri Afifatun Nahriyah Agel, Walid Agus Irmawan Ainur Rofiq Hafsi Akbar , Nawawi Muhammad Alfin Firdaus Alief Nuraini Alim, Royfal Amir Hamzah Amir Hamzah Amir Hamzah Anggreni Amba Sugi, Senah Anjarani, Devie Reztia Arifin, Goffal Arifin, Mohammad Nazir Arifin, Mohammad Nazir Asmat Baidawi Aziz, Mohammad Barokah, Selviana Nur Rizqi Dafid, Mohammat Debri Eko Arissandi Dewi, Nindian Puspa Dian Tri Agustina Dimas Arman Maulana Putra Durrohman Wahid Dwi Mayangsari Edo Saputra Efendi, Reynal Widya Efendy, Satrio Ananta Fahmi, Zainol Fauzan Fauzan Fauzan . Firmansyah Kusuma, R. Okky Frediyanto Gelu, Leonard Peter Goffal Arifin Goffal Arifin Hamdlani Hamdlani Harfin Lanya, Harfin Hari, Nirwana Haidar Hasan Basri Hasbullah Hasbullah Hasbullah Hasbullah Hasbullah Holipah Huda, Moh Abroril Iksan Iksya Syariifal Maqom Ilhamsyah, Revi Mario Irfan, Moh. Irwan Darmawan Isma’el, M Jannah, Ukhti Raudhatul Khafifatul Mufidah Khafifatul Mufidah Khairurrozi, Khairurrozi Khana Zulfana Imam Khana Zulfana Imam Kusuma, Okky Firmansyah Kusuma, R. Okky Firmansyah M. Amir Mahmud Mahendra Mahendra Mahendra, Mahendra Mahmud, M. Amir Maktsuful Ghummah Mansyur, Muhammad Umar Maqom, Iksya Syariifal Maulana, Fairuz Iqbal Miftahus Surur Miftahus Surur Miftahus Surur, Miftahus Moch. Amir Mahmud Moh Abroril Huda Moh Firman Hidayat Moh Mursidi Moh Nazir Moh Riski Moh Syahdan Moh. Amrullah Moh. Nazir Arifin Mohammad Aziz Mohammad Nazir Arifin Mohammad Syaltut Abduh Javier Mu'minin, Fadilatul Mu'nim, M. Zaini Mubarok, Abdul Adim Mufidah, Khafifatul Muhammad Umar Mansyur Muhammad Umar Mansyur Muim, Zaini Mujibur Rohman, Mujibur Mursidi, Moh Mursidi, Moh. Muslim, Farhan Mustafida Mustafida Nailus Saadah Nawawi Muhammad Akbar Nor Hasanah Nuraini, Alief Nurul Fajrin Ariyani Nurul Fajrin Ariyani Paradina, Reni Permana, Putra Pramadi, Walid Agel Rachman, Anang Fakchtur Rachman, Anang Faktchur Rafli Hidayatullah Ramadhani, Nilam Reni Paradina Retno Sukmawati Revi Mario Ilhamsyah Riyan Riyan Riyanarto Sarno Rizki, Abdulloh Royhan Alfadili Safiuddin Safiuddin Safiuddin, Safiuddin Said, Badar Samsul Arifin Samsul Arifin Satrio Ananta Efendy Sa’id, Badar Seindi Pujiastutik D. Selviana Nur Rizqi Barokah Sholihah, Wildanus Siti Ririn Sutarsih Sofiyullah Sofiyulloh, Sofiyulloh Sutarsih, Siti Ririn Syafi’i, Imam Syahdayana Arifin Syam, Abd Muiz Syam, Abd Mu’iz Syam, Abd. Mu’iz Syirofi Syirofi Syirofi, Syirofi Tamam, Alief Badrit Tarisha Ramadhanty Triana Selvia Khusnul Khotimah Tryamina Salsabila Ubaidi Ubaidi, Ubaidi Ulfatul Hasanah Umar Mansyur, Muhammad Wahid, Durrahman Wahid, Durrohman Wahyu Hidayatullah Wicaksono Febriantoro, Wicaksono Yasir Zain Yayu Rahma Febriani Yogi Setiawan Zayyadi, Moh Zulfikri, Achmad