Claim Missing Document
Check
Articles

Found 2 Documents
Search

Aplikasi Kehadiran Mengajar Dosen Berbasis Website Pada Fakultas Ilmu Komputer Universitas Sriwijaya Dengan Menggunakan Metode Waterfall Syuryani, Devita; Nuzulastri, Sari; Rezky, Faula
Journal of Information System Research (JOSH) Vol 6 No 1 (2024): Oktober 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josh.v6i1.6012

Abstract

The process of recording lecturer attendance, which is one of the factors in teaching that must be recorded at each learning meeting, is carried out by lecturers and students directly (manually), by filling in the attendance list prepared by the admin staff of the study program. However, this process resulted in difficulties in the reporting process (recap of lecturer teaching attendance data) to be reported to the head of the study program, deputy dean for academic affairs. Attendance is a benchmark for determining the level of presence of lecturers in teaching at a university so that lectures can run well with activeness between lecturers and students who attend the lectures being held. To make it easier to create lecturer teaching attendance applications using the waterfall method and using web-based programming, namely PHP and MySQL. The application is created in accordance with the lecture schedule which functions as access control (schedule access control) to maintain order in taking attendance and make it easier for staff in the process of recording and monitoring lecturers' attendance and discipline in conducting lectures. Making this application serves to make it easier to record lecturer attendance and make it easier for study programs to monitor lecturer attendance. After using this attendance application, it makes it easier for lecturers to organize teaching time, as well as increasing the level of discipline for lecturers and making it easier for the lecturer performance assessment process carried out by the study program.
Clustering man in the middle attack on chain and graph-based blockchain in internet of things network using k-means Nuzulastri, Sari; Stiawan, Deris; Satria, Hadipurnawan; Budiarto, Rahmat
Computer Science and Information Technologies Vol 5, No 2: July 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v5i2.p176-185

Abstract

Network security on internet of things (IoT) devices in the IoT development process may open rooms for hackers and other problems if not properly protected, particularly in the addition of internet connectivity to computing device systems that are interrelated in transferring data automatically over the network. This study implements network detection on IoT network security resembles security systems from man in the middle (MITM) attacks on blockchains. Security systems that exist on blockchains are decentralized and have peer to peer characteristics which are categorized into several parts based on the type of architecture that suits their use cases such as blockchain chain based and graph based. This study uses the principal component analysis (PCA) to extract features from the transaction data processing on the blockchain process and produces 9 features before the k-means algorithm with the elbow technique was used for classifying the types of MITM attacks on IoT networks and comparing the types of blockchain chain-based and graph-based architectures in the form of visualizations as well. Experimental results show 97.16% of normal data and 2.84% of MITM attack data were observed.