cover
Contact Name
Taufik Hidayat
Contact Email
thidayat.ft@unwir.ac.id
Phone
-
Journal Mail Official
teknik.komputer@unwir.ac.id
Editorial Address
Jl. Ir. H. Juanda KM.03, Singaraja, Indramayu - Jawa Barat 45312
Location
Kab. indramayu,
Jawa barat
INDONESIA
TEKNOKOM : Jurnal Teknologi dan Rekayasa Sistem Komputer
Published by Universitas Wiralodra
ISSN : 26218070     EISSN : 26863219     DOI : https://doi.org/10.31943/teknokom
Core Subject : Science,
Jurnal Teknologi dan Rekayasa Sistem Komputer (TEKNOKOM) with frequency 2 (two) times a year, ie in March and September. The editors receive scientific writings from lecturers, teachers and educational observers about the results of research, scientific studies and analysis and problem solving closely related to the field of ICT and System Computer.
Arjuna Subject : -
Articles 139 Documents
A 5G RURAL, REMOTE, AND DIFFICULT AREAS HOPE: A REVIEW Sihombing, Harry Candra
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (410.447 KB) | DOI: 10.31943/teknokom.v4i1.57

Abstract

The 5G cellular networks are “urban” areas technology in nature, extensively deployed where the user’s density is high to provide very high data rates, coupled with extremely low delays and dealing with very high mobility of users. On the contrary, one-third of people experience a lack of mobile broadband connectivity living in rural zones. These mobile broadband lacks recognized as the main barriers impairing the Sustainable Developing Goals (SDGs) defined by the United Nations. Those that are not currently covered will be unlikely to be covered also soon, as the network operators are not keen to invest in such zones, because of potentially low revenues. While it is confirmed that 5G would meet stringent requirements in urban zones, rural areas still suffer from almost inexistent MBB (Mobile Broadband) coverage, especially in the developing world. The big deal of isolated rural areas, which are sparsely inhabited by low-income populations, is that the classical access using traditional backhaul technologies is a bad solution for operators since it does not ensure a good ROI (Return of Investment).
DESIGN OF COMPUTER REPAIR SERVICES APPLICATION ANDROID-BASED Achmad Udin Zailani; Alvino Octaviano; Sholihin, Sholihin
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (305.814 KB) | DOI: 10.31943/teknokom.v4i1.58

Abstract

Computers are one form of advances in electronic and informatics technology; the function of the computer itself serves as a tool for writing, drawing, editing images or photographs, or as a means of storage. Android, a Linux-based operating system, is a smart operating system that can compete with operating systems on a computer. Some of the problems identified include user difficulties in overcoming computer damage to determine whether to repair or buy a new unit, difficulty in reaching authorized service providers, risks when deciding to repair at a public service place, and limited access to information and costs repairing computer damage. This research specifically designs an Android application-based computer service application that makes it easier for people to get service services. The above research results formulate computer repair services using an Android-based platform with Android Studio and MySQL as the database for this study. This application is expected to be useful for customers in terms of time and cost.
VPN SITE TO SITE IMPLEMENTATION USING PROTOCOL L2TP AND IPSEC Santoso, Budi; Sani, Asrul; Husain, T; Hendri, Nedi
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (854.231 KB) | DOI: 10.31943/teknokom.v4i1.59

Abstract

Data exchange communication has developed, which leads to centralized communication, and to achieve this communication requires a type of data communication whose data is accommodated on the server and can be accessed by clients, such as at organization. As a company engaged in education, the development of centralized data communication by utilizing the intranet network has been formed. The use of an intranet network allows data communication that is vulnerable to wiretapping. To fix this using a VPN network. L2TP and IPsec VPNs have different performances, especially in the level of security provided. In this study, an analysis of the L2TP and IPsec VPN network performance was carried out on the SMB Server on the Ubuntu server and the Mikrotik router for its VPN configuration. In this study, the L2TP and IPsec VPN was designed by configuring the Mikrotik RB 450G router and the SMB Server configuration using Command Line Interface on Ubuntu 18.04 server. For security analysis, use hacking methods to get VPN Server login data and sniffing methods to get SMB Server login data and SMB data. For performance analysis using parameters of delay, throughput, and packet loss. Wireshark is software for checking by capturing each packet of data from an interface. The research objective to be achieved is to design a VPN technology based on L2TP & IPSec, to be able to determine the resulting performance after implementing a VPN based on L2TP & Ip Sec. The result is that VPN can connect from HO to branch one and branch two or connect from public connection to local connection. The Ubuntu server used is also running well, so it helps the VPN process properly.
MOBILE SCANNER ADOPTION ANALYSIS BETWEEN EMPLOYMENT AND EDUCATIONAL BACKGROUND – AN ANALYSIS OF LOGISTIC REGRESSION Permana, Indra Surya; Hidayat, Taufik; Mahardiko, Rahutomo
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (280.25 KB) | DOI: 10.31943/teknokom.v4i2.56

Abstract

As of today, the mobile apps may be downloaded everywhere. The development of mobile apps depends on the type of the work. An increasing use of mobile app is scanner apps due to an easy use. This paper presents the regression analysis on employment and educational background of the mobile scanner app because this research used category in the questionnaire. The use of logistic regression is to prove that any different comparisons are detected between employment and educational background so that the use of mobile scanner can be optimally used. The results show that educational background and employment have vital roles for mobile scanner adoption. This study also proves that previous researches on mobile scanner adoption were true for UTAUT model and comparison analysis.
SECURITY ARCHITECTURE ON WIRELESS NETWORK TRAFFIC HANDOFF : A REVIEW Wibawa, Sigit
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (214.058 KB) | DOI: 10.31943/teknokom.v4i2.60

Abstract

This paper provides an overview of the wireless handoff process on wireless networks by investigating Authentication Protocol using EAP -AKA (Extensible Authentication Protocol) - Authentication and Key Agreement The EAP-AKA protocol was developed for LAN networks or mobile network devices, the authors found ineffective network procedures guaranteed that made the attacks MITM and DoS attacks may occur. In addition, we find the storage procedures and resource submissions not safe enough to withstand DoS attacks. Focusing on Both types of attacks, the authors are interested in existing security protocol methods and written by researchers, then perform Systematic Literature Review (SLR) by using international journals database ie from the IEEE organization with the use of wireless handoff attack keyword in the middle of the world and obtained some related journals which need further research to deepen the Systematic Literature review, by offering a structured, methodical, and meticulous approach to understanding the research trends of handoff security issues on wireless networks and mobile networks. The purpose of this research is to provide credible intellectual guidance for future researchers to help them identify areas in the study. Most SLR is limited to conference papers and journal articles published by IEEE from 2015 to 2021. This study reveals that the protocol, privacy and security of the handoff process are the least studied, while the operating problems, architecture, methods in the handoff process get much attention in the literature.
THE OPTIMIZE OF ASSOCIATION RULE METHOD FOR THE BEST BOOK PLACEMENT PATTERNS IN LIBRARY: A MONTHLY TRIAL Husain, T.; Hidayati, Nuzulul
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (665.225 KB) | DOI: 10.31943/teknokom.v4i2.63

Abstract

Data mining is the process of finding interesting patterns and knowledge from large amounts of data. Sources of information service, especially in the library, include books, reference books, serials, scientific gray literature (newsletters, reports, proceedings, dissertations, theses, and others). The importance of this research being carried out in the library in this study aims to implement data mining with the association rule method to solve problems, especially in the placement of shelves based on the category of the printed version of the book collection. This research method uses a qualitative research approach. Data was collected using documentation techniques and deep analysis of existing weaknesses to identify user needs whose information was obtained through observation and interviews with key informants (admin, user, etc.). For example, the determination of the best book placement patterns can be done by looking at the results of the tendency of visitors to borrow books based on a combination of 2 item sets with 60 percent of confidence value every month or week and must be evaluated or take a calculate again.
HOW MACHINE LEARNING METHOD PERFORMANCE FOR IMBALANCED DATA : Case Study: Classification of Working Status of Banten Province Sihombing, Pardomuan Robinson
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (173.515 KB) | DOI: 10.31943/teknokom.v4i2.64

Abstract

This study will examine the application of several classification methods to machine learning models by taking into account the case of imbalanced data. The research was conducted on a case study of classification modeling for working status in Banten Province in 2020. The data used comes from the National Labor Force Survey, Statistics Indonesia. The machine learning methods used are Classification and Regression Tree (CART), Naïve Bayes, Random Forest, Rotation Forest, Support Vector Machine (SVM), Neural Network Analysis, One Rule (OneR), and Boosting. Classification modeling using resample techniques in cases of imbalanced data and large data sets is proven to improve classification accuracy, especially for minority classes, which can be seen from the sensitivity and specificity values that are more balanced than the original data (without treatment). Furthermore, the eight classification models tested shows that the Boost model provides the best performance based on the highest sensitivity, specificity, G-mean, and kappa coefficient values. The most important/most influential variables in the classification of working status are marital status, education, and age.
A STUDY OF THE INFLUENCE OF 650 nm LASER INTERFERENCE ON VISIBLE LASER LIGHT COMMUNICATION SYSTEM Laksono, Pranoto Budi
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (492.243 KB) | DOI: 10.31943/teknokom.v4i2.66

Abstract

Visible Laser Light Communication System (VLLC) is a wireless communication system, using laser as the medium. In the data transfer process, it is possible to have optical interference where 2 laser beams coincide with one point on the reflector. Research on the effect of laser source interference has been carried out by several researchers including mitigation actions to reduce its effects. This experiment uses 2 optical distance sensors that produce a laser with a wavelength of 650 nm with a power <=4.1 mW and with the direction of the laser beam both of them cross each other. To determine the effect of the interference of two laser beams when crossing the communication process in the visible light communication system, a reflector is used which can capture the two laser beams and the reflector can be shifted gradually so that a condition can be obtained where the two laser beams meet at one point. From the measurements made at the points after the laser beam crossing, the measurements at the point where the beam crossed, and the measurements at the points before the beam crossing, it was obtained data, at the exact point where the laser beam crossed the interference occurred, which is indicated by unstable output voltage of the two lasers, so that communication at the point of intersection is disrupted. However, if outside the point of contact both before and after the point of contact, interference and communication systems will not occur.
ANALYSIS AND APPLICATION OF CLOUD STORAGE SECURITY UTILIZATION BASED ON AS A SERVICE (IaaS) INFRASTRUCTURE SERVICE MODEL AS A DOCUMENT SHARING MEDIA DURING PANDEMI Isra Wardanu, Fyan; Wibowo, Budi; Yuswanto, Andrie
TEKNOKOM Vol. 5 No. 1 (2022): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (302.766 KB) | DOI: 10.31943/teknokom.v5i1.67

Abstract

Storage via the cloud is very necessary which is carried out in this research can be used as a basis for research at PT. Indocode technology has a problem where the problem is that the process of storing and sharing data on storage media via the cloud can be used both on internal and external networks. Implementing cloud-based storage greatly simplifies the process of sharing files with employees or the board of directors to be able to filter which data can be accessed by all employees and limited needs.. The server is designed using the Owncloud application which aims to support the process of information or data transactions with commissioners, directors and employees using owncloud, so that the data transfer process no longer uses external storage from the internet or other physical storage media. In addition, the use of owncloud for enterprises is very helpful because it is easy to use and the file sharing capabilities can be adjusted according to the user's permissions and can be accessed anywhere and anytime.
ANALYSIS OF THE INFLUENCE OF LOOSE TERMINATION LEVEL WITH INCREASING TERMINATION TEMPERATURE OF ELECTRICAL EQUIPMENT USING INFRARED THERMOGRAPHY Laksono, Pranoto Budi
TEKNOKOM Vol. 5 No. 1 (2022): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (675.308 KB) | DOI: 10.31943/teknokom.v5i1.68

Abstract

The use of electrical energy in the industrial is very important to drive production machines. Machine maintenance is carried out so that the lifetime of the machine becomes longer so that the production process continues. Temperature is one of the most common indicators of the structural health of equipment and components. This means that the main symptoms of damage to machines and equipment can be indicated by increasing the temperature of the equipment. One of the symptoms of an increase in equipment temperature is due to a loose cable termination. The use of infrared thermography to measure the temperature rise due to loose termination is one of the methods in electrical machine maintenance. Previous studies using infrared thermography to measure the temperature rise due to loose termination have been carried out by many researchers, but these studies did not show a correlation between the level of loose termination and the increase in temperature but only stated that the loose termination caused an increase in temperature. This study focuses on finding the relationship between the level of loose termination compared to standard torque and the increase in temperature at the termination point. This is very useful as a quick overview in determining the level of urgency in maintenance activity, that percentage of loose termination of a certain value below the standard will give an increase in temperature of a certain value as well. This study resulted, for the torque setting condition 67% below the standard (loose) the temperature increase at the terminal was 13.4% - 15.6%, for the torque setting condition 33% below the standard temperature increase at the terminal of 12.3% -13.8% which mean that the increase in temperature is directly proportional to the level of slack termination and is also directly proportional to the increase in the motor speed. If the termination torque level is lower and the motor speed is increased, the terminal temperature rise will be drastically rise.

Page 4 of 14 | Total Record : 139