cover
Contact Name
Taufik Hidayat
Contact Email
thidayat.ft@unwir.ac.id
Phone
-
Journal Mail Official
teknik.komputer@unwir.ac.id
Editorial Address
Jl. Ir. H. Juanda KM.03, Singaraja, Indramayu - Jawa Barat 45312
Location
Kab. indramayu,
Jawa barat
INDONESIA
TEKNOKOM : Jurnal Teknologi dan Rekayasa Sistem Komputer
Published by Universitas Wiralodra
ISSN : 26218070     EISSN : 26863219     DOI : https://doi.org/10.31943/teknokom
Core Subject : Science,
Jurnal Teknologi dan Rekayasa Sistem Komputer (TEKNOKOM) with frequency 2 (two) times a year, ie in March and September. The editors receive scientific writings from lecturers, teachers and educational observers about the results of research, scientific studies and analysis and problem solving closely related to the field of ICT and System Computer.
Arjuna Subject : -
Articles 12 Documents
Search results for , issue "Vol. 4 No. 2 (2021): TEKNOKOM" : 12 Documents clear
MOBILE SCANNER ADOPTION ANALYSIS BETWEEN EMPLOYMENT AND EDUCATIONAL BACKGROUND – AN ANALYSIS OF LOGISTIC REGRESSION Permana, Indra Surya; Hidayat, Taufik; Mahardiko, Rahutomo
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (280.25 KB) | DOI: 10.31943/teknokom.v4i2.56

Abstract

As of today, the mobile apps may be downloaded everywhere. The development of mobile apps depends on the type of the work. An increasing use of mobile app is scanner apps due to an easy use. This paper presents the regression analysis on employment and educational background of the mobile scanner app because this research used category in the questionnaire. The use of logistic regression is to prove that any different comparisons are detected between employment and educational background so that the use of mobile scanner can be optimally used. The results show that educational background and employment have vital roles for mobile scanner adoption. This study also proves that previous researches on mobile scanner adoption were true for UTAUT model and comparison analysis.
SECURITY ARCHITECTURE ON WIRELESS NETWORK TRAFFIC HANDOFF : A REVIEW Wibawa, Sigit
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (214.058 KB) | DOI: 10.31943/teknokom.v4i2.60

Abstract

This paper provides an overview of the wireless handoff process on wireless networks by investigating Authentication Protocol using EAP -AKA (Extensible Authentication Protocol) - Authentication and Key Agreement The EAP-AKA protocol was developed for LAN networks or mobile network devices, the authors found ineffective network procedures guaranteed that made the attacks MITM and DoS attacks may occur. In addition, we find the storage procedures and resource submissions not safe enough to withstand DoS attacks. Focusing on Both types of attacks, the authors are interested in existing security protocol methods and written by researchers, then perform Systematic Literature Review (SLR) by using international journals database ie from the IEEE organization with the use of wireless handoff attack keyword in the middle of the world and obtained some related journals which need further research to deepen the Systematic Literature review, by offering a structured, methodical, and meticulous approach to understanding the research trends of handoff security issues on wireless networks and mobile networks. The purpose of this research is to provide credible intellectual guidance for future researchers to help them identify areas in the study. Most SLR is limited to conference papers and journal articles published by IEEE from 2015 to 2021. This study reveals that the protocol, privacy and security of the handoff process are the least studied, while the operating problems, architecture, methods in the handoff process get much attention in the literature.
THE OPTIMIZE OF ASSOCIATION RULE METHOD FOR THE BEST BOOK PLACEMENT PATTERNS IN LIBRARY: A MONTHLY TRIAL Husain, T.; Hidayati, Nuzulul
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (665.225 KB) | DOI: 10.31943/teknokom.v4i2.63

Abstract

Data mining is the process of finding interesting patterns and knowledge from large amounts of data. Sources of information service, especially in the library, include books, reference books, serials, scientific gray literature (newsletters, reports, proceedings, dissertations, theses, and others). The importance of this research being carried out in the library in this study aims to implement data mining with the association rule method to solve problems, especially in the placement of shelves based on the category of the printed version of the book collection. This research method uses a qualitative research approach. Data was collected using documentation techniques and deep analysis of existing weaknesses to identify user needs whose information was obtained through observation and interviews with key informants (admin, user, etc.). For example, the determination of the best book placement patterns can be done by looking at the results of the tendency of visitors to borrow books based on a combination of 2 item sets with 60 percent of confidence value every month or week and must be evaluated or take a calculate again.
HOW MACHINE LEARNING METHOD PERFORMANCE FOR IMBALANCED DATA : Case Study: Classification of Working Status of Banten Province Sihombing, Pardomuan Robinson
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (173.515 KB) | DOI: 10.31943/teknokom.v4i2.64

Abstract

This study will examine the application of several classification methods to machine learning models by taking into account the case of imbalanced data. The research was conducted on a case study of classification modeling for working status in Banten Province in 2020. The data used comes from the National Labor Force Survey, Statistics Indonesia. The machine learning methods used are Classification and Regression Tree (CART), Naïve Bayes, Random Forest, Rotation Forest, Support Vector Machine (SVM), Neural Network Analysis, One Rule (OneR), and Boosting. Classification modeling using resample techniques in cases of imbalanced data and large data sets is proven to improve classification accuracy, especially for minority classes, which can be seen from the sensitivity and specificity values that are more balanced than the original data (without treatment). Furthermore, the eight classification models tested shows that the Boost model provides the best performance based on the highest sensitivity, specificity, G-mean, and kappa coefficient values. The most important/most influential variables in the classification of working status are marital status, education, and age.
A STUDY OF THE INFLUENCE OF 650 nm LASER INTERFERENCE ON VISIBLE LASER LIGHT COMMUNICATION SYSTEM Laksono, Pranoto Budi
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (492.243 KB) | DOI: 10.31943/teknokom.v4i2.66

Abstract

Visible Laser Light Communication System (VLLC) is a wireless communication system, using laser as the medium. In the data transfer process, it is possible to have optical interference where 2 laser beams coincide with one point on the reflector. Research on the effect of laser source interference has been carried out by several researchers including mitigation actions to reduce its effects. This experiment uses 2 optical distance sensors that produce a laser with a wavelength of 650 nm with a power <=4.1 mW and with the direction of the laser beam both of them cross each other. To determine the effect of the interference of two laser beams when crossing the communication process in the visible light communication system, a reflector is used which can capture the two laser beams and the reflector can be shifted gradually so that a condition can be obtained where the two laser beams meet at one point. From the measurements made at the points after the laser beam crossing, the measurements at the point where the beam crossed, and the measurements at the points before the beam crossing, it was obtained data, at the exact point where the laser beam crossed the interference occurred, which is indicated by unstable output voltage of the two lasers, so that communication at the point of intersection is disrupted. However, if outside the point of contact both before and after the point of contact, interference and communication systems will not occur.
UTILIZATION OF ADC PIN ON ARDUINO NANO TO MEASURE VOLTAGE OF A BATTERY
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (551.193 KB) | DOI: 10.31943/teknokom.v4i2.71

Abstract

MOBILE SCANNER ADOPTION ANALYSIS BETWEEN EMPLOYMENT AND EDUCATIONAL BACKGROUND – AN ANALYSIS OF LOGISTIC REGRESSION Indra Surya Permana; Taufik Hidayat; Rahutomo Mahardiko
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (280.25 KB) | DOI: 10.31943/teknokom.v4i2.56

Abstract

As of today, the mobile apps may be downloaded everywhere. The development of mobile apps depends on the type of the work. An increasing use of mobile app is scanner apps due to an easy use. This paper presents the regression analysis on employment and educational background of the mobile scanner app because this research used category in the questionnaire. The use of logistic regression is to prove that any different comparisons are detected between employment and educational background so that the use of mobile scanner can be optimally used. The results show that educational background and employment have vital roles for mobile scanner adoption. This study also proves that previous researches on mobile scanner adoption were true for UTAUT model and comparison analysis.
SECURITY ARCHITECTURE ON WIRELESS NETWORK TRAFFIC HANDOFF : A REVIEW Sigit Wibawa
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (214.058 KB) | DOI: 10.31943/teknokom.v4i2.60

Abstract

This paper provides an overview of the wireless handoff process on wireless networks by investigating Authentication Protocol using EAP -AKA (Extensible Authentication Protocol) - Authentication and Key Agreement The EAP-AKA protocol was developed for LAN networks or mobile network devices, the authors found ineffective network procedures guaranteed that made the attacks MITM and DoS attacks may occur. In addition, we find the storage procedures and resource submissions not safe enough to withstand DoS attacks. Focusing on Both types of attacks, the authors are interested in existing security protocol methods and written by researchers, then perform Systematic Literature Review (SLR) by using international journals database ie from the IEEE organization with the use of wireless handoff attack keyword in the middle of the world and obtained some related journals which need further research to deepen the Systematic Literature review, by offering a structured, methodical, and meticulous approach to understanding the research trends of handoff security issues on wireless networks and mobile networks. The purpose of this research is to provide credible intellectual guidance for future researchers to help them identify areas in the study. Most SLR is limited to conference papers and journal articles published by IEEE from 2015 to 2021. This study reveals that the protocol, privacy and security of the handoff process are the least studied, while the operating problems, architecture, methods in the handoff process get much attention in the literature.
THE OPTIMIZE OF ASSOCIATION RULE METHOD FOR THE BEST BOOK PLACEMENT PATTERNS IN LIBRARY: A MONTHLY TRIAL T. Husain; Nuzulul Hidayati
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (665.225 KB) | DOI: 10.31943/teknokom.v4i2.63

Abstract

Data mining is the process of finding interesting patterns and knowledge from large amounts of data. Sources of information service, especially in the library, include books, reference books, serials, scientific gray literature (newsletters, reports, proceedings, dissertations, theses, and others). The importance of this research being carried out in the library in this study aims to implement data mining with the association rule method to solve problems, especially in the placement of shelves based on the category of the printed version of the book collection. This research method uses a qualitative research approach. Data was collected using documentation techniques and deep analysis of existing weaknesses to identify user needs whose information was obtained through observation and interviews with key informants (admin, user, etc.). For example, the determination of the best book placement patterns can be done by looking at the results of the tendency of visitors to borrow books based on a combination of 2 item sets with 60 percent of confidence value every month or week and must be evaluated or take a calculate again.
HOW MACHINE LEARNING METHOD PERFORMANCE FOR IMBALANCED DATA : Case Study: Classification of Working Status of Banten Province Pardomuan Robinson Sihombing
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (173.515 KB) | DOI: 10.31943/teknokom.v4i2.64

Abstract

This study will examine the application of several classification methods to machine learning models by taking into account the case of imbalanced data. The research was conducted on a case study of classification modeling for working status in Banten Province in 2020. The data used comes from the National Labor Force Survey, Statistics Indonesia. The machine learning methods used are Classification and Regression Tree (CART), Naïve Bayes, Random Forest, Rotation Forest, Support Vector Machine (SVM), Neural Network Analysis, One Rule (OneR), and Boosting. Classification modeling using resample techniques in cases of imbalanced data and large data sets is proven to improve classification accuracy, especially for minority classes, which can be seen from the sensitivity and specificity values that are more balanced than the original data (without treatment). Furthermore, the eight classification models tested shows that the Boost model provides the best performance based on the highest sensitivity, specificity, G-mean, and kappa coefficient values. The most important/most influential variables in the classification of working status are marital status, education, and age.

Page 1 of 2 | Total Record : 12