TEKNOKOM : Jurnal Teknologi dan Rekayasa Sistem Komputer
Jurnal Teknologi dan Rekayasa Sistem Komputer (TEKNOKOM) with frequency 2 (two) times a year, ie in March and September. The editors receive scientific writings from lecturers, teachers and educational observers about the results of research, scientific studies and analysis and problem solving closely related to the field of ICT and System Computer.
Articles
139 Documents
ANALISA MODIFIKASI ALGORITMA STEMMING UNTUK KASUS OVERSTEMMING
Stephanie Betha Rossi Hersianie
TEKNOKOM Vol. 3 No. 2 (2020): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (409.529 KB)
|
DOI: 10.31943/teknokom.v3i2.51
Overstemming merupakan pemenggalan kata ke bentuk asal (root word) yang berlebihan. Hal ini menyebabkan kata tersebut bermakna sangat berbeda dengan kata asal. Namun, stem yang dihasilkan sama bentuknya. Untuk mengatasi permasalahan tersebut, penelitian sebelumnya telah menerapkan algoritma stemming dengan tabel aturan kata. Namun kekurangan dari tabel aturan kata ini adalah kesulitan dalam menambahkan jenis kata yang mengalami overstemming. Oleh karena itu, penelitian ini bertujuan untuk memodifikasi algoritma overstemming tersebut. Penelitian ini akan menggabungkan algoritma stemming (hybrid stemming) yaitu algoritma look-up table, tabel aturan kata dan algoritma stemming Porter yang biasa digunakan. Dataset yang digunakan dalam pengujian adalah atribut judul pada dokumen publikasi ilmiah. Hasil pengujian menunjukkan bahwa modifikasi algoritma stemming menghasilkan recall sebesar 89, 9%.Saran untuk penelitian selanjutnya adalah pengujian dapat dilakukan menggunakan atribut lainnnya pada dokumen publikasi.
ANALISIS KELAYAKAN IMPLEMENTASI INTERNET OF THINGS: DENGAN MEMAMFAATKAN ELECTRONIC CONTROL UNIT MODUL PADA MODA TRANSPORTASI DARAT RODA 4
Sigit Wibawa
TEKNOKOM Vol. 3 No. 2 (2020): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (390.211 KB)
|
DOI: 10.31943/teknokom.v3i2.52
“Internet of Things” adalah babak baru Perkembangan teknologi modern pada saat ini hampir semua perangkat dan mesin bisa berkomunikasi, interaksi dan komunikasi mesin dengan mesin, komputer dengan komputer sangat menarik untuk dilakukan penelitian dan dilakukan analisa implementasi, komunikasi mesin dengan mesin atau komputer dengan komputer membutuhkan satu protokol atau antarmuka sebagai sarana untuk interaksi antara pengguna dengan sistem operasi, kendaraan atau alat transportasi darat sudah dilengkapi dengan Electronic Control Unit (ECU), dengan konektor OBD-2 penulis memamfaatkannya sebagai protokol antarmuka komunikasi dengan perangkat telpon gengam melalui bluetooth sehingga kondisi dan status kendaraan bisa diketahui dan hasilnya bisa digunakan untuk pendahuluan analisa seorang mekanik di bengkel dan status kendaraan ini bahkan kita bisa bagikan di media sosial.
RAW DATA SECURITY BY USING ELGAMAL AND SHA 256 PUBLIC KEY ALGORITHM
Indra Surya Permana;
Taufik Hidayat;
Rahutomo Mahardiko
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (163.842 KB)
|
DOI: 10.31943/teknokom.v4i1.53
The development of information technology has grown exponentially and various of data collections and its method has been obtained. In the era of big data, data has now become an asset that held important values, while in the implementation of data delivery, it clearly is not always safe. One of the method to secure data delivery is data encryption using Cryptography. Cryptography provides an encryption service to secure data delivery by transforming it to random values so that it can no longer be read. The goal in this study was to produce an application that could be used to encrypt data, using ElGamal's cryptography method and hash checking using the SHA256 algorithm. After encryption, to ensure the encrypted data is still the original data without any changes or manipulation by unauthorized 3rd party then done by checking the hash generated using SHA256 algorithm. The data used in this study was a sample of raw data from the ATPWTP survey (ability to pay and willing to pay) conducted by the BPS Cirebon (Central Statistics) in 2019 and the data was in the form of Excel and txt files. The encryption process resulted in a cipher larger than the plaintext and takes longer for the data encryption process than during the data cipher decryption process.
A SYSTEMATIC REVIEW METHOD FOR SECURITY ANALYSIS OF INTERNET OF THINGS ON HONEYPOT DETECTION
Andrie Yuswanto;
Budi Wibowo
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (225.547 KB)
|
DOI: 10.31943/teknokom.v4i1.54
A very significant increase in the spread of malware has resulted in malware analysis. A recent approach to using the internet of things has been put forward by many researchers. Iot tool learning approaches as a more effective and efficient approach to dealing with malware compared to conventional approaches. At the same time, the researchers transformed the honeypot as a device capable of gathering malware information. The honeypot is designed as a malware trap and is stored on the provided system. Then log the managed events and gather information about the activity and identity of the attacker. This paper aims to use a honeypot in machine learning to deal with malware The Systematic Literature Review (SLR) method was used to identify 207 . Then 12 papers were selected to be investigated based on inclusion and exclusion criteria. The technique used by most researchers is to utilize the available honeypot dataset. Meanwhile, based on the type of malware being analyzed, honeypot in machine learning is mostly used to collect IoT-based malware.
MOBILE SCANNER ADOPTION ANALYSIS BETWEEN EMPLOYMENT AND EDUCATIONAL BACKGROUND – AN ANALYSIS OF LOGISTIC REGRESSION
Indra Surya Permana;
Taufik Hidayat;
Rahutomo Mahardiko
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (280.25 KB)
|
DOI: 10.31943/teknokom.v4i2.56
As of today, the mobile apps may be downloaded everywhere. The development of mobile apps depends on the type of the work. An increasing use of mobile app is scanner apps due to an easy use. This paper presents the regression analysis on employment and educational background of the mobile scanner app because this research used category in the questionnaire. The use of logistic regression is to prove that any different comparisons are detected between employment and educational background so that the use of mobile scanner can be optimally used. The results show that educational background and employment have vital roles for mobile scanner adoption. This study also proves that previous researches on mobile scanner adoption were true for UTAUT model and comparison analysis.
A 5G RURAL, REMOTE, AND DIFFICULT AREAS HOPE: A REVIEW
Harry Candra Sihombing
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (410.447 KB)
|
DOI: 10.31943/teknokom.v4i1.57
The 5G cellular networks are “urban” areas technology in nature, extensively deployed where the user’s density is high to provide very high data rates, coupled with extremely low delays and dealing with very high mobility of users. On the contrary, one-third of people experience a lack of mobile broadband connectivity living in rural zones. These mobile broadband lacks recognized as the main barriers impairing the Sustainable Developing Goals (SDGs) defined by the United Nations. Those that are not currently covered will be unlikely to be covered also soon, as the network operators are not keen to invest in such zones, because of potentially low revenues. While it is confirmed that 5G would meet stringent requirements in urban zones, rural areas still suffer from almost inexistent MBB (Mobile Broadband) coverage, especially in the developing world. The big deal of isolated rural areas, which are sparsely inhabited by low-income populations, is that the classical access using traditional backhaul technologies is a bad solution for operators since it does not ensure a good ROI (Return of Investment).
DESIGN OF COMPUTER REPAIR SERVICES APPLICATION ANDROID-BASED
Achmad Udin Zailani;
Alvino Octaviano;
Sholihin Sholihin
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (305.814 KB)
|
DOI: 10.31943/teknokom.v4i1.58
Computers are one form of advances in electronic and informatics technology; the function of the computer itself serves as a tool for writing, drawing, editing images or photographs, or as a means of storage. Android, a Linux-based operating system, is a smart operating system that can compete with operating systems on a computer. Some of the problems identified include user difficulties in overcoming computer damage to determine whether to repair or buy a new unit, difficulty in reaching authorized service providers, risks when deciding to repair at a public service place, and limited access to information and costs repairing computer damage. This research specifically designs an Android application-based computer service application that makes it easier for people to get service services. The above research results formulate computer repair services using an Android-based platform with Android Studio and MySQL as the database for this study. This application is expected to be useful for customers in terms of time and cost.
VPN SITE TO SITE IMPLEMENTATION USING PROTOCOL L2TP AND IPSEC
Budi Santoso;
Asrul Sani;
T. Husain;
Nedi Hendri
TEKNOKOM Vol. 4 No. 1 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (854.231 KB)
|
DOI: 10.31943/teknokom.v4i1.59
Data exchange communication has developed, which leads to centralized communication, and to achieve this communication requires a type of data communication whose data is accommodated on the server and can be accessed by clients, such as at organization. As a company engaged in education, the development of centralized data communication by utilizing the intranet network has been formed. The use of an intranet network allows data communication that is vulnerable to wiretapping. To fix this using a VPN network. L2TP and IPsec VPNs have different performances, especially in the level of security provided. In this study, an analysis of the L2TP and IPsec VPN network performance was carried out on the SMB Server on the Ubuntu server and the Mikrotik router for its VPN configuration. In this study, the L2TP and IPsec VPN was designed by configuring the Mikrotik RB 450G router and the SMB Server configuration using Command Line Interface on Ubuntu 18.04 server. For security analysis, use hacking methods to get VPN Server login data and sniffing methods to get SMB Server login data and SMB data. For performance analysis using parameters of delay, throughput, and packet loss. Wireshark is software for checking by capturing each packet of data from an interface. The research objective to be achieved is to design a VPN technology based on L2TP & IPSec, to be able to determine the resulting performance after implementing a VPN based on L2TP & Ip Sec. The result is that VPN can connect from HO to branch one and branch two or connect from public connection to local connection. The Ubuntu server used is also running well, so it helps the VPN process properly.
SECURITY ARCHITECTURE ON WIRELESS NETWORK TRAFFIC HANDOFF : A REVIEW
Sigit Wibawa
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (214.058 KB)
|
DOI: 10.31943/teknokom.v4i2.60
This paper provides an overview of the wireless handoff process on wireless networks by investigating Authentication Protocol using EAP -AKA (Extensible Authentication Protocol) - Authentication and Key Agreement The EAP-AKA protocol was developed for LAN networks or mobile network devices, the authors found ineffective network procedures guaranteed that made the attacks MITM and DoS attacks may occur. In addition, we find the storage procedures and resource submissions not safe enough to withstand DoS attacks. Focusing on Both types of attacks, the authors are interested in existing security protocol methods and written by researchers, then perform Systematic Literature Review (SLR) by using international journals database ie from the IEEE organization with the use of wireless handoff attack keyword in the middle of the world and obtained some related journals which need further research to deepen the Systematic Literature review, by offering a structured, methodical, and meticulous approach to understanding the research trends of handoff security issues on wireless networks and mobile networks. The purpose of this research is to provide credible intellectual guidance for future researchers to help them identify areas in the study. Most SLR is limited to conference papers and journal articles published by IEEE from 2015 to 2021. This study reveals that the protocol, privacy and security of the handoff process are the least studied, while the operating problems, architecture, methods in the handoff process get much attention in the literature.
THE OPTIMIZE OF ASSOCIATION RULE METHOD FOR THE BEST BOOK PLACEMENT PATTERNS IN LIBRARY: A MONTHLY TRIAL
T. Husain;
Nuzulul Hidayati
TEKNOKOM Vol. 4 No. 2 (2021): TEKNOKOM
Publisher : Department of Computer Engineering, Universitas Wiralodra
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (665.225 KB)
|
DOI: 10.31943/teknokom.v4i2.63
Data mining is the process of finding interesting patterns and knowledge from large amounts of data. Sources of information service, especially in the library, include books, reference books, serials, scientific gray literature (newsletters, reports, proceedings, dissertations, theses, and others). The importance of this research being carried out in the library in this study aims to implement data mining with the association rule method to solve problems, especially in the placement of shelves based on the category of the printed version of the book collection. This research method uses a qualitative research approach. Data was collected using documentation techniques and deep analysis of existing weaknesses to identify user needs whose information was obtained through observation and interviews with key informants (admin, user, etc.). For example, the determination of the best book placement patterns can be done by looking at the results of the tendency of visitors to borrow books based on a combination of 2 item sets with 60 percent of confidence value every month or week and must be evaluated or take a calculate again.