cover
Contact Name
Iklima Ermis
Contact Email
iklimaermis.ismail@tik.pnj.ac.id
Phone
-
Journal Mail Official
anita.hidayati@tik.pnj.ac.id
Editorial Address
-
Location
Kota depok,
Jawa barat
INDONESIA
MULTINETICS
ISSN : 24432245     EISSN : 24432334     DOI : -
Core Subject : Science,
Multinetics is a peer-reviewed journal is published twice a year (May and November). Multinetics aims to provide a forum exchange and an interface between researchers and practitioners in any computer and informatics engineering related field. Scopes this journal are Content-Based Multimedia Retrieval, Multimedia Application, Mobile Computing & Applications, The Internet of Things, Information Systems and Technologies, E- Learning & Distance Learning, Infrastructure Systems and Services, E-Business & E-Commerce, Artificial Intelligence, Embedded System, Network & Data Communication, Big Data and Data Mining, Software Engineering, Computer Network and Architecture, Soft Computing and Intelligent System and Networks and Telecommunication Systems
Arjuna Subject : -
Articles 314 Documents
Deteksi Penyakit Pada Daun Padi Berbasis Pengolahan Citra Menggunakan Metode Convolutional Neural Network (CNN) Sheila, Syenira; Permata Sari, Irma; Bagas Saputra, Adrie; Kharil Anwar, Muhammad; Restu Pujianto, Farid
MULTINETICS Vol. 9 No. 1 (2023): MULTINETICS Mei (2023)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v9i1.5255

Abstract

Abstract - Rice, produced by rice plants, is a staple food for the people of Asia, especially Indonesia. The amount of rice consumption is increasing along with the increase in population. Therefore, it is essential to keep rice production stable so that demand can be fulfilled. Leaf disease of rice plants is the biggest cause of crop failure which can lead to production instability. This study aims to detect disease in rice plant leaves based on their type using the Convolutional Neural Network (CNN) with the VGG16 architecture base model. In this study, a dataset of rice plant leaf images was collected using the secondary data collection method. The dataset was obtained from the Kaggle dataset repository in .csv format published by Vbookshelf. The image dataset consists of 120 data which is divided into 3 classes based on the type of rice leaf disease namely bacterial leaf bright, brown spot, and leaf smut with each class consisting of 40 image data. In this study, the resizing process was carried out on image data with a size of 224x224 pixels and image data augmentation. The training and testing results in this study showed that the training accuracy value reached 0.9861 and the validation accuracy value reached 1.0. By using the accuracy value in the Confusion Matrix which is equal to 100%, it is obtained that the results of applying the Convolutional Neural Network (CNN) have perfect accuracy.
Asesmen Standar Pembelajaran Jarak Jauh Universitas Berdasarkan ISO 29994:2021 Santosa, Iqbal; Nurtrisha, Widyatasya Agustika
MULTINETICS Vol. 9 No. 1 (2023): MULTINETICS Mei (2023)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v9i1.5349

Abstract

The ISO standard 29994:2021 provides requirements for Distance Learning (PJJ) services that are not yet covered in ISO 29993:2017 which focus on learning services outside of formal education. PJJ at Telkom University has been implemented in the Informatics Distance Education Undergraduate Study Program since 2019, with the Technical Implementation Unit (UPT), namely the Postgraduate and Advanced Learning (PSAL) Directorate. This Study Program has not implemented any standards including ISO 29994:2021 in its learning services. Using the five phases of COBIT 2019 Implementation, an overview of the current conditions of the implementation of PJJ management, the gaps with the requirements of ISO 29994:2021 and recommendations for improvement are obtained. The result was that there were 4 clauses in ISO 29994:2021 which had not been fully met by Distance Learning Service Providers and were given recommendations for 18 points of improvement, namely 8 aspects of people, 4 aspects of process, and 6 aspects of technology. This recommendation is expected to be a reference for improving PJJ services at Telkom University and other Distance Learning Service Providers so they can compete internationally according to ISO 29994:2021 standards.
Analisis QoS Pengaplikasian Network Slicing Pada Topologi Abilene Jaringan SDN Menggunakan FlowVisor Dan POX Controller Putra, Fadly Firmansyah; Dewanta, Favian; Naning Hertiana, Sofia
MULTINETICS Vol. 9 No. 1 (2023): MULTINETICS Mei (2023)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v9i1.5498

Abstract

Software Defined Network (SDN) is a new paradigm in computer networks that separates the data plane and the control plane. With this separation, network configuration will be easier to do, not as complicated as conventional networks. This research discusses how to implement the network slicing method using FlowVisor on the SDN network with POX as the controller. Network slicing allows each network slice to be designed to guarantee different levels of network performance. The emulator used to design the topology as well as the data plane is Mininet. The results of this researchs indicate that FlowVisor can isolate flowspace for each slice on the SDN network based on the TCP port that is passed when communication occurs between hosts. Comparison of SDN networks without using the network slicing method with SDN networks using the network slicing method produces values that are not much significant, but the QoS parameter values are better on SDN networks without network slicing. Throughput on 1 Mbps link bandwidth is 0.8 Mbps, slow slice 0.79 Mbps, on 10 Mbps link bandwidth is 7.4 Mbps, fast slice is 6.6 Mbps. Delay on 1 Mbps link bandwidth is 1.361 ms, slow slice 1.389 ms, on 10 Mbps link bandwidth 0.155 ms, fast slice 0.2426 ms. Jitter on 1 Mbps link bandwidth is 0.000283 ms, slow slice 0.000257 ms, on 10 Mbps link bandwidth 0.0000304 ms, fast slice is 0.0000347 ms.
Sistem Informasi Inventory Kartu Uang Elektronik Berbasis Web Pada Bank XYZ Oktaviana, Shinta; Gunawan, Edwin
MULTINETICS Vol. 9 No. 1 (2023): MULTINETICS Mei (2023)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v9i1.5550

Abstract

With the advancement of technology, it is hoped that people can create innovations that make work more efficient and faster through the creation of conventional systems becoming computerized. Currently, the card inventory system at PT. Bank XYZ still uses a manual system. Due to incorrect data input and slow data updates affecting business processes, the development of the card inventory system through the website was carried out. The waterfall method is used as the development method to ensure that user needs are well identified and documentation is available. The purpose of the manual process being turned digital is to provide better service to customers and employees, and as part of the effort to accelerate digital transformation and e-business implementation in the company
IMPLEMENTASI DAN ANALISIS MIGRASI DATA LMS PADA KLASTER KUBERNETES ANTAR-PUBLIC CLOUD MENGGUNAKAN BACKUP DAN RESTORE Ranunegoro, Adimas Fachri; Dewanta, Favian; Aditya, Bagus
MULTINETICS Vol. 9 No. 1 (2023): MULTINETICS Mei (2023)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v9i1.5556

Abstract

Moodle is one of the media for learning management systems that are widely used today because non-face-to-face learning is unavoidable. Fluctuating user traffic makes moodle suitable for deployment to a public cloud. Public clouds are easier to scale, especially when combined with a container orchestrator such as Kubernetes. However, there are times when it is necessary to migrate data on a Kubernetes cluster from a public cloud to another public cloud to mitigate disasters in a specific region in the public cloud. Moodle applications can be routed to different regions, but this will cause high latency. This problem can be solved by migrating the Kubernetes cluster on Google Cloud to the same region on Microsoft Azure as an alternative public cloud. This final project will discuss the migration of a kubernetes cluster along with persistent volume data between public clouds from Google Cloud Platform to Microsoft Azure and vice versa using backup and restore methods. Velero is used as a backup and restore tool, then the restic plugin is added so that Velero can also backup and restore persistent volumes located outside the Kubernetes cluster. The test results show that Velero with the restic plugin can backup and restore persistent volumes outside the cluster. The larger the data size, the longer the backup, restore, and migration time will be. Backup and restore time for each incremental size of approximately 500 MB will increase the backup and restore time by approximately 10 seconds. Meanwhile, on the utility side, the amount of CPU usage during restore consumes more resources than when backup. At the time of backup, the maximum CPU spike was 3.5% at 3 GB data size in both public cloud clusters. Meanwhile, at the time of restore, the maximum CPU spike is 5% at 3 GB of data size.
Hyperparameter Tuning Menggunakan GridsearchCV pada Random Forest untuk Deteksi Malware Muhamad Malik Matin, Iik
MULTINETICS Vol. 9 No. 1 (2023): MULTINETICS Mei (2023)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v9i1.5578

Abstract

Random forest is one of the popular machine learning algorithms used for classification tasks. In malware detection tasks, random forest can help identify malware with good accuracy. However, to improve model performance, a hyperparameter tuning process is required. GridsearchCV is a hyperparameter tuning method that allows the user to scan a number of selected hyperparameters. In this paper, we conduct experiments using GridsearchCV to perform hyperparameter tuning on Random forests for malware detection tasks. The experimental results show that by performing hyperparameter tuning, we can improve the model's accuracy in identifying malware
Rancang Bangun Smart Gloves Untuk Penyandang Disabilitas Sensorik Rungu Wicara Fandhilah; Kasoni , Dian; ningsih, Liesna; Pardi, Muhammad
MULTINETICS Vol. 9 No. 1 (2023): MULTINETICS Mei (2023)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v9i1.5779

Abstract

Abstract - Communication is the most important need for humans as social beings to be able to interact with one human being and the other, for normal people communication does not experience obstacles. Unlike people with deaf and speech disabilities, they have difficulty communicating with others or with normal people, and normal people who do not understand sign language have difficulty interacting with the speech impaired and the deaf. For this reason, gloves are made as a communication aid for people with deaf and speech disabilities, these gloves can translate wetness of gestures by utilizing flex sensors on each finger segment. The data from the flex sensor is processed by Arduino Nano then the data is sent by the Bluetooth Transmitter and received by the Bluetooth Receiver then processed by Arduino Uno before being displayed on the 16x2 LCD, the final result after testing on the tool, the sensor is able to read letters and signal words, the accuracy rate of reading letter cues reaches 67% and word cues reach 44%, the sensor value always changes because the sensor reads the curve of the finger of the hand. ‘ Keywords: Communication, Sign Language, Gloves, Flex Sensors, Bluetooth.
Pengembangan Animasi Interaktif Sebagai Media Pembelajaran Kebudayaan Indonesia Dengan Model ADDIE Rosmiati, Mia; Sulistiyah, Sulistiyah; Farabi, Nur Ali; Susanti, Susanti
MULTINETICS Vol. 9 No. 1 (2023): MULTINETICS Mei (2023)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v9i1.5846

Abstract

Learning media that only rely on writing tools such as books, paper, pencils or pens in the teaching and learning process cause communication errors between parents, teachers and children or students. In this case the learning media must be more creative in applying learning methods to increase interest in learning in children. With this interactive animation application learning to know Indonesian culture, it is hoped that it can provide benefits for our children. Indonesian culture interactive animation was developed using the ADDIE (Analysis, Design, Development, Implementation, and Evaluation) software development model. The learning media presented is of course learning while playing with the aim of fostering interest in learning and introducing information technology to children, especially regarding Indonesian arts and culture. Based on the calculation results of the questionnaire, it was obtained that 95.5% answered yes and 4.5% answered no. So that it results that students can easily use this application, become more interested in learning interactive animation to know Indonesian art and culture and can be used as a tool that can help students learn to recognize interactive animation to know Indonesian art and culture so that learning is not boring.
Forensik Serangan Ransomware Ryuk pada Jaringan Cloud Kusuma, Ridho Surya
MULTINETICS Vol. 9 No. 2 (2023): MULTINETICS Nopember (2023)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v9i2.5234

Abstract

Technological advancements have made data a valuable asset; data protection and security are important from various threats such as damage, natural disasters, loss, and cybercrime. In recent years, ransomware attacks have become such a real threat that nowadays, the virus encrypts important data, then demands a financial ransom from the victim by threatening to publish, delete or withhold access. This study conducts network forensic investigations using live forensic methods in network traffic to find traces of perpetrators. This method requires precision and accuracy because data traffic speed is calculated per millisecond, then utilizes the Wireshark tool for data packet analysis. The stages begin with preservation, collection, examination, and research. The following are the investigation results, including the time of the attack, Ip Address, Mac Address, Port, Protocol, and phishing website URL addresses from infected computers. Based on the data obtained, this research is following the expected goals.
Pengaruh Penetration Testing Dalam Menguji Celah Keamanan Pada Website (Studi Kasus: Dinas Kependudukan dan Pencatatan Sipil Kota Kediri) Yudo, Yudo Bismo Utomo
MULTINETICS Vol. 10 No. 2 (2024): MULTINETICS Nopember (2024)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In all-digital era now, every population data is stored and processed through the website. With this website, the flow of information and communication between residents and government can be done easily. However, behind these advantages, there are also several weaknesses, namely security holes that can be accessed by irresponsible people, as well as data leakage cases that often occur. Seeing these problems, the author tested security gaps using the penetration testing method on the Information Technology-Based Population Administration System Service (SAKTI) on website. The results obtained from this research, the SAKTI website managed by the Kediri City disdukcapil found the impact of an open response code gap with the possibility of sensitive data exposure and found upload pages for RCE (Remote Code Excecution) exploitation and malware inject. For the CVSS assessment, the Base Score gets 8.1 points at the High level. While the recommendation is in the form of improving unrestricted file upload and sensitive data exposure or information disclosure by restricting public access.

Filter by Year

2015 2025


Filter By Issues
All Issue Vol. 11 No. 02 (2025): MULTINETICS Nopember (2025) Vol. 11 No. 1 (2025): MULTINETICS Mei (2025) Vol. 10 No. 2 (2024): MULTINETICS Nopember (2024) Vol. 10 No. 1 (2024): MULTINETICS Mei (2024) Vol. 9 No. 2 (2023): MULTINETICS Nopember (2023) Vol. 9 No. 1 (2023): MULTINETICS Mei (2023) Vol. 8 No. 2 (2022): MULTINETICS Nopember (2022) Vol. 8 No. 1 (2022): MULTINETICS Mei (2022) Vol. 7 No. 2 (2021): MULTINETICS Nopember (2021) Vol. 7 No. 1 (2021): MULTINETICS Mei (2021) Vol. 6 No. 2 (2020): MULTINETICS Nopember (2020) Vol 6, No 1 (2020): Multinetics May (2020) Vol. 6 No. 1 (2020): MULTINETICS Mei (2020) Vol. 5 No. 2 (2019): MULTINETICS Nopember (2019) Vol 5, No 2 (2019): Multinetics Nopember (2019) Vol 5, No 1 (2019): MULTINETICS MEI (2019) Vol 5, No 1 (2019): MULTINETICS MEI (2019) Vol. 5 No. 1 (2019): MULTINETICS Mei (2019) Vol. 4 No. 2 (2018): MULTINETICS Nopember (2018) Vol 4, No 2 (2018): MULTINETICS NOPEMBER (2018) Vol 4, No 2 (2018): MULTINETICS NOPEMBER (2018) Vol 4, No 1 (2018): MULTINETICS MEI (2018) Vol. 4 No. 1 (2018): MULTINETICS Mei (2018) Vol. 3 No. 2 (2017): MULTINETICS Nopember (2017) Vol 3, No 2 (2017): MULTINETICS NOPEMBER (2017) Vol. 3 No. 1 (2017): MULTINETICS Mei (2017) Vol 3, No 1 (2017): MULTINETICS Mei (2017) Vol. 2 No. 2 (2016): MULTINETICS Nopember (2016) Vol 2, No 2 (2016): MULTINETICS Nopember (2016) Vol 2, No 1 (2016): MULTINETICS Mei (2016) Vol. 2 No. 1 (2016): MULTINETICS Mei (2016) Vol 1, No 2 (2015): MULTINETICS Nopember (2015) Vol. 1 No. 2 (2015): MULTINETICS Nopember (2015) Vol 1, No 1 (2015): MULTINETICS Mei (2015) Vol. 1 No. 1 (2015): MULTINETICS Mei (2015) More Issue