Claim Missing Document
Check
Articles

Found 4 Documents
Search

Analysis of the Advantages and Disadvantages of Using MikroTik in Computer Network Implementation Khazanatul Asrar; Dirja Nur Ilham; Muhammad Khoiruddin Harahap; T. Sukma Achriadi Sukiman; Nurul Hamdi
JATAED: Journal of Appropriate Technology for Agriculture, Environment, and Development Vol. 3 No. 2 (2026): JATAED: Journal of Appropriate Technology for Agriculture, Environment, and Dev
Publisher : LEMBAGA KAJIAN PEMBANGUNAN PERTANIAN DAN LINGKUNGAN (LKPPL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62671/jataed.v3i2.97

Abstract

The rapid growth of information technology has increased the demand for reliable, secure, and efficient computer network infrastructures. MikroTik is widely adopted as a cost-effective networking solution, particularly for small to medium-scale networks. This study aims to analyze the advantages and disadvantages of using MikroTik in computer network implementations based on previous empirical studies. This research employs a literature review method by analyzing more than fifteen scientific articles published within the last five years. The reviewed studies focus on bandwidth management, firewall configuration, network security, Quality of Service (QoS), and network monitoring using MikroTik RouterOS. The findings indicate that MikroTik offers several advantages, including flexible configuration, comprehensive RouterOS features, effective bandwidth management, and relatively low implementation costs. However, several limitations were identified, such as configuration complexity, non-optimal default security settings, performance degradation under high traffic loads, and limited scalability for large enterprise networks. With proper configuration and the integration of additional security mechanisms, MikroTik remains an effective and efficient solution for small to medium-scale network implementations.
Website-Based Text Encryption Simulation with Hill Chiper T. Sukma Achriadi Sukiman; Anni Zulfia; Annisa Karima; Athiyatul Ulya; Muharratul Mina Rizky
Brilliance: Research of Artificial Intelligence Vol. 5 No. 2 (2025): Brilliance: Research of Artificial Intelligence, Article Research November 2025
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v5i2.5757

Abstract

Data security has become increasingly crucial in the modern digital era, where almost all types of information ranging from text, images, to audio are stored and exchanged in digital form through open networks. The rapid growth of internet-based communication makes data highly vulnerable to interception, modification, or misuse by unauthorized parties. Cryptography is one of the most effective solutions to address these challenges. Among the classical cryptographic techniques, the Hill Cipher remains relevant today because it is based on linear algebra and matrix transformations, which provide a strong mathematical foundation and can be adapted for modern computational implementation. In this study, a web-based application was developed using the Python Flask framework to implement the Hill Cipher algorithm. The application enables users to perform both encryption and decryption of text and images through an interactive interface. Users can input plaintext and key matrices, and the system processes the data to produce encrypted or decrypted outputs in real time. This design not only demonstrates the practicality of applying classical cryptographic concepts with contemporary web technologies but also serves as a valuable educational tool. The results show that the application performs effectively, producing accurate outputs, while also supporting user learning in understanding encryption–decryption processes and guiding efforts to secure digital information.
AI Decision Support for Demand Forecasting and Retail Stock Using Random Forest Anni Zulfia; Tasya Nadhira Ilfa; Zayyani Damia; T. Sukma Achriadi Sukiman; Annisa Karima
Brilliance: Research of Artificial Intelligence Vol. 5 No. 2 (2025): Brilliance: Research of Artificial Intelligence, Article Research November 2025
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v5i2.5901

Abstract

Out-of-stock or excess inventory is a major challenge in retail supply chain management, especially in dynamic urban areas. This stock imbalance not only causes financial losses, but can also reduce customer satisfaction due to products being unavailable when needed. This study developed an artificial intelligence (AI)-based decision support system using the Random Forest algorithm to predict daily demand in retail stores. The model was trained using historical sales data that included various variables such as date, product category, and previous sales trends. After the training process, the model was implemented in the form of an interactive web application using Streamlit, which allows users to easily access the system through a browser without the need for special installation. Testing results show that the model is capable of predicting demand for the next 7 days with a fairly good level of accuracy, as indicated by a Mean Absolute Error (MAE) value of ±4.613 units per day. This application not only provides demand predictions but also presents data visualizations and automatic restocking recommendations based on the prediction results. Thus, this system is expected to help store managers make more accurate, efficient, and data-driven restocking decisions. Additionally, the use of Streamlit simplifies the process of distributing the system widely and enhances accessibility for end-users, including those without a technical background. This research opens opportunities for further development through the integration of real-time data and other AI methods to improve prediction accuracy in the future.
Information Security Risk Analysis Using ISO 31000:2018 and ISO 27001:2022 Athiyatul Ulya; Annisa Karima; T. Sukma Achriadi Sukiman; Anni Zulfia; Rafika Rahmawati
Brilliance: Research of Artificial Intelligence Vol. 5 No. 2 (2025): Brilliance: Research of Artificial Intelligence, Article Research November 2025
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v5i2.6564

Abstract

Information system risk audits are an important step in ensuring the security, effectiveness, and efficiency of the systems used by organizations. However, the fast advancement of information and communication technologies has made information?security threats more intricate, arising not only from internal sources like employee carelessness but also from external sources such as cyber?attacks, malware, and data?theft. This study aims to analyze information security risks at the Central Statistics Agency (BPS) of Lhokseumawe by referring to two international standards, namely ISO/IEC 27001:2022 and ISO 31000:2018. The research approach used is descriptive qualitative with a case study method. Data collection techniques were conducted through interviews, observations, and document studies. The results of the study indicate that there are still various security gaps, both technical and non-technical, such as weak system authentication, the absence of adequate security policies, and the lack of incident handling procedures. This study successfully compiled a risk register containing 30 types of risks along with their causes, impacts, likelihood levels, and relevant mitigation recommendations. Improvement recommendations include strengthening technical controls, updating information security policies, enhancing human resource capacity, and conducting regular internal audits. The results of this study are expected to serve as a reference for strengthening information security systems in a systematic and standardized manner within the BPS environment.