cover
Contact Name
Mira Maisura
Contact Email
jurnal.cyberspace@ar-raniry.ac.id
Phone
-
Journal Mail Official
jurnal.cyberspace@ar-raniry.ac.id
Editorial Address
Information Technology Education (PTI) Department administration office, Faculty of Education and Teacher Training (FTK) Building B 1st Floor, Ar-Raniry State Islamic University, Darussalam, Banda Aceh, 23111.
Location
Kota banda aceh,
Aceh
INDONESIA
Cyberspace: Jurnal Pendidikan Teknologi Informasi
ISSN : 25982079     EISSN : 25979671     DOI : -
Core Subject : Science, Education,
Cyberspace: Jurnal Pendidikan Teknologi Informasi is an open access, peer-reviewed journal that will consider any original scientific article that expands the field of information technology education and various other related applied computer sciences themes. The journal publishes articles of interest to Information technology teachers, researchers and practitioners. Manuscripts must be original and educationally interesting to the audience in the field. The goal is to promote concepts and ideas developed in this area of study by publishing relevant peer-reviewed scientific information and discussion. This will help information technology practitioners to advance their knowledge for greater benefit and output in their professional contexts.
Articles 7 Documents
Search results for , issue "Vol 5, No 1 (2021)" : 7 Documents clear
DESIGNING SCHOOL INFORMATION SYSTEM OF GUPPI GALAWATI SENIOR HIGH SCHOOL IN SORONG REGENCY Iriene Surya Rajagukguk; Dewi Astuti
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 1 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1053.983 KB) | DOI: 10.22373/cj.v5i1.7852

Abstract

At present the school is trying to become an educational institution that is able to serve the community in the delivery of information, one of which is the GUPPI Salawati High School, Sorong Regency. So far, the information about school information is still done manually by using banners, brochures and the latest information is still posted on the announcement board, even having to come directly to the school to get information. The method used in the development and design of this system is the Waterfall Method. The purpose of designing this information system is to facilitate those who need information about Salawati GUPPI high school.
SAFE ROUTING MODEL AND BALANCED LOAD MODEL FOR WIRELESS SENSOR NETWORK Julianto Agus Prabowo; Harry Dhika
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 1 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (937.733 KB) | DOI: 10.22373/cj.v5i1.8420

Abstract

Wireless Sensor Networks (WSNs) play a very important role in providing realtime data access for Big Data and Internet. However, the open deployment, energy constraint, and lack of centralized administration make WSNs very vulnerable to various kinds of malicious attacks. In WSNs identifying malicious sensor devices and eliminating their sensed information plays a very important role for mission critical applications. Standard cryptography and authentication schemes cannot be directly used in WSNs because of the resource constraint nature of sensor devices. Thus, energy efficient and low latency methodology is required for minimizing the impact of malicious sensor devices. This paper presents a Secure and Load Balanced Routing (SLBR) scheme for heterogeneous clustered based WSNs. SLBR presents a better trust-based security metric that overcomes the problem when sensors keep oscillating from good to bad state and vice versa, and also SLBR balances load among CH. Thus, aids in achieving better security, packet transmission, and energy efficiency performance. Experiments are conducted to evaluate the performance of proposed SLBR model over existing trust-based routing model namely Exponential Cat Swarm Optimization (ECSO). The result attained shows SLBR model attains better performance than ECSO in terms of energy efficiency (i.e., network lifetime considering first sensor device death and total sensor device death), communication overhead, throughput, packet processing latency, malicious sensor device misclassification rate and identification.
THE PHENOMENON OF GOOGLE EFFECT, DIGITAL AMNESIA AND NOMOPHOBIA IN ACADEMIC PERSPECTIVE Nazaruddin Musa; Mohd Sobhi Ishak
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 1 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1490.397 KB) | DOI: 10.22373/cj.v5i1.8219

Abstract

This study aims to determine the behavior and perceptions of students about Google Effect, Digital Amnesia, and Nomophobia syndromes, among students. For this purpose, a quantitative approach is used through an online survey method using Google Form. The number of samples is 110 out of a total population of 636 students of Library and Information Science of UIN Ar-Raniry Banda Aceh. Samples were taken randomly for 5 days. The results are as follows; 84.5 % of students have used smartphones as a reminder, 70.9 % used as their external memory. Meanwhile, 73.6 % feel confused by information overload,78.9 % feel annoyed by hyperlinks, 51 % feel more motivated to answer questions,59 % feel more confident in discussing new things when a smartphone in hand, 78,2 % said that a smartphone can help in understanding the material being taught. In terms of perception, students stated that nomophobia, digital amnesia, and the Google effect are common phenomena in the digital age, 59.1 %, 88.1 %, and 69.1 % respectively. Based on the findings, it is recommended that longitudinal research is needed to examine the long-term effects of this phenomenon to find out whether the high dependence on smart technology will strengthen or weaken the human brain's ability to think and take action independently since it is rarely activated?.
COMPUTER HARDWARE RECOGNITION APPLICATION WITH AUGMENTED REALITY TECHNOLOGY Repiliya Repiliya; Zaid Romegar Mair
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 1 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (651.861 KB) | DOI: 10.22373/cj.v5i1.7865

Abstract

In the highly development of technology, thus encouraged to human activity facilitation. One of them was education that required technology in applying the learning system to be effective and flexible. Augmented Reality (AR) was a concept of combining virtual and work reality. Augmented Reality could provide advantages in the interaction between humans and computers, it could be a solution in applying teaching and learning process application in computer majors education, it would be interactive by using 3D.In the 3D object was generated into the the real image so visualization was looked like the original object. The strengthness of this application that the object could rotated so it was looked clearly from any side. This application gave many benefits for the users to know and use the hardware computer in clearly and understandable.
IMPLEMENTATION OF GENERIC ROUTING ENCAPSULATION USING CISCO PACKTER TRACER Muhammad Kahfi Aulia; Djuniadi Djuniadi
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 1 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (444.484 KB) | DOI: 10.22373/cj.v5i1.8563

Abstract

Virtual Private Network (VPN) is a technology that offers low-cost remote access solutions for companies. The IPSec protocol provides cryptography services and network security for data transmission. Generic Routing Encapsulation (GRE) tunnel exists to encapsulate multicast and broadcast packets into unicast packets. This is very usable which IPSec does not support encryption of multicast and broadcast packets. The target of this simulation is that Router 1 shows that the network is protected by GRE. The first thing to do is set the network topology. Here, for example, there are two offices that want to transmit data to each other. Each of these offices has a switch, FTP server, DNS server, router, and PC. Then set the IP address of each device and connect it with cables. Router 2 and Router 3 function to connect the two offices in one WAN network. Each of these data transmissions is IPSec protected for data encryption protection then GRE coated for transmission encapsulation. From simulation results, we can conclude that both network can be connected and communicated each other with protection from GRE tunnel.
HYPERTEXT BASED INTERACTIVE MEDIA ANALYSIS IN GROWING STUDENT READING INTEREST THROUGH ONLINE LEARNING Aqidatul Izza; Munawir Munawir
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 1 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (643.672 KB) | DOI: 10.22373/cj.v5i1.8793

Abstract

This study discusses the analysis of hypertext-based interactive media in fostering student interest in reading through online learning. The purpose of this study was to determine the use and effectiveness of hypertext-based interactive media use in fostering student reading interest through online learning and the impact of hypertext-based interactive media on students' reading interest through online learning conducted at MTsN 1 Sidoarjo. This study uses a descriptive research method with a qualitative approach. Data collection using, observation, questionnaires, interviews and documentation. The results showed that: 1) The results of the observations proved that students had good enthusiasm. In this learning, Islamic education teachers use interactive media in the form of power points; 2) PAI teachers make various efforts to foster students' reading interest when learning online, one of which is trying to get used to the small things that are applied to students by utilizing the media; 3) From the results of a questionnaire which shows that students' reading interest has increased even though gradually. This can be seen from the aspects of preference, interest, attention and involvement. Keywords: Interactive Media, Hypertext, Reading Interest
COMPARISON OF SUPPORT VECTOR MACHINE AND DECISION TREE METHODS IN THE CLASSIFICATION OF BREAST CANCER Helmi Imaduddin; Brian Aditya Hermansyah; Frischa Aura Salsabilla B
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 1 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (628.898 KB) | DOI: 10.22373/cj.v5i1.8805

Abstract

One of the most dangerous cancers in the world is breast cancer. This cancer occurs in many women, in some cases this cancer can also affect men, but it is very rare. The effects of this cancer are very dangerous for humans, in the worst case it can lead to death. So that serious prevention is needed against this cancer. One prevention can be done by early detection. This study aims to implement machine learning methods to detect breast cancer in women. The algorithms used are Support Vector Machine (SVM) and Decision Tree (DT). After classifying the data provided, a comparison is made to find out which machine learning method has the best performance. The data used comes from the Gynecology Department of the University Hospital Center of Coimbra (CHUC), and can be downloaded for free on the UCI repository website. The results of this study indicate that the SVM algorithm with feature selection obtains the best classification results by obtaining an accuracy of 87.5%, a sensitivity of 90%, and a specificity of 85%. Thus this research obtains good results to be able to help provide solutions to detect breast cancer.

Page 1 of 1 | Total Record : 7