cover
Contact Name
Rahmad Hidayat
Contact Email
rahmad_hidayat@pnl.ac.id
Phone
+6285277807726
Journal Mail Official
admin.trik@pnl.ac.id
Editorial Address
Jl. Medan - Banda Aceh No.Km. 280 3, RW.Buketrata, Mesjid Punteut, Kec. Blang Mangat, Kota Lhokseumawe, Aceh 24301
Location
Kota lhokseumawe,
Aceh
INDONESIA
Jurnal Teknologi Rekayasa Informasi dan Komputer
ISSN : 25812882     EISSN : 27971724     DOI : http://dx.doi.org/10.30811/jtrik.v8i1
Core Subject : Science,
Jurnal Teknologi Rekayasa Informasi dan Komputer (JTRIK) merupakan media publikasi hasil penelitian yang diterbitkan oleh Politeknik Negeri Lhokseumawe. JTRIK dipublikasikan setiap 2 bulan yaitu maret dan september baik secara print dan online. Scope jurnal ini meliputi bidang ilmu komputer, pemrosesan citra, jaringan komputer, keamanan komputer, multimedia, pengembangan perangkat lunak dan internet of things
Articles 8 Documents
Search results for , issue "Vol 8, No 2 (2025): JURNAL TRIK - POLITEKNIK NEGERI LHOKSEUMAWE" : 8 Documents clear
Implementasi Keamanan Jaringan Dengan Metode Web Application Firewall (WAF) Nurhayati, Nurhayati; Atthariq, Atthariq; Aswandi, Aswandi
Jurnal Teknologi Rekayasa Informasi dan Komputer Vol 8, No 2 (2025): JURNAL TRIK - POLITEKNIK NEGERI LHOKSEUMAWE
Publisher : Politeknik Negeri Lhokseumawe

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30811/jtrik.v8i2.7449

Abstract

Keamanan jaringan komputer merupakan bagian sebuah sistem yang sangat penting untuk menjaga validitas dan integritas data serta menjamin ketersediaan layanan pengguna dari mana dan kapan saja. Dengan pemanfaatan jaringan digunakan dapat mengancam keamanan pada jaringan yang digunakan. Pada penelitian ini akan dibangun sebuah keamanan jaringan berbasis aplikasi sebagai solusi untuk meningkatkan tingkat perlindungan dan deteksi terhadap serangan cyber yang mengancam aplikasi dan data yang disimpan dalam lingkup jaringan tersebut. Penelitian ini mengajukan penerapan keamanan jaringan dengan metode Web Application Firewall pada dinas komunikasi dan informatika aceh tengah. Dimana pemanfaatan teknologi informasi dan internet pada diskominfo aceh tengah untuk mendukung keamanan web belum optimal. Web application firewall adalah keamanan yang dirancang untuk melindungi dari serangan cyber dan ancaman keamanan. Hasil pengujian yang telah dilakukan sebanyak 60 kali percobaan dengan jenis serangan SQL Injection, Cross Site Scripting (XSS), dan Denial Of Service (DoS) menunjukan kualitas sangat tinggi yaitu 100%. Bedasarkan hasil pengujian dapat disimpulkan bahwa menerapkan metodeWAF lebih baik dalam melindungi keamanan web dari sernagan cyber.
Online Warehouse Application at PT. PLN (Persero) ULP Lhokseumawe City Subhina, Yusma; Salahuddin, Salahuddin; Khadafi, Muhammad
Jurnal Teknologi Rekayasa Informasi dan Komputer Vol 8, No 2 (2025): JURNAL TRIK - POLITEKNIK NEGERI LHOKSEUMAWE
Publisher : Politeknik Negeri Lhokseumawe

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30811/jtrik.v8i2.7456

Abstract

PT PLN (Persero) ULP Lhokseumawe City is one of the State-Owned Enterprises engaged in the provision of electricity for distribution to the community. PT PLN (Persero) ULP Lhokseumawe City has a warehouse that serves as a material storage facility, functioning as a transaction location for incoming and outgoing materials, as well as for monitoring material stocks. The warehouse serves as a storage facility for materials required by all companies. Materials are tools used to meet the needs of workers and the community in supporting the distribution of electricity. Without materials, activities related to electricity cannot be carried out; therefore, it is necessary to have information about material stocks to ensure the smooth operation of a job. At the PLN ULP Lhokseumawe City office, material data collection is still conducted manually using notes or transaction recording books. If you pay attention, the manual system is not safe, because if the data is lost it cannot be recovered. Additionally, materials can be shipped from the warehouse without the supervisor's knowledge, resulting in material stock reports that do not accurately reflect the material stock in the warehouse. Material inventory is a common issue that arises when material stocks run low and technical officers require materials to support the distribution of electricity to customers. In the warehouse, some materials are rarely issued by warehouse officers, resulting in a significant accumulation of unused materials. Therefore, an application is needed to control materials in the PT PLN ULP Lhokseumawe City warehouse based on the web. The purpose of creating this application is to enable the monitoring, management, and control of materials in the warehouse, allowing for the printing of reports based on the materials stored. This can facilitate the supervision of the release of goods that are not carelessly issued and technical officers are not short of material stock. These reports will later be compiled by the TUG (Warehouse Administration) as determined by PT.PLN (Persero).
Implementation of Fuzzy Logic in NPCs for Online Multiplayer Games Using Photon Haris, Muhammad; Mursyidah, Mursyidah; Atthariq, Atthariq
Jurnal Teknologi Rekayasa Informasi dan Komputer Vol 8, No 2 (2025): JURNAL TRIK - POLITEKNIK NEGERI LHOKSEUMAWE
Publisher : Politeknik Negeri Lhokseumawe

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30811/jtrik.v8i1.7435

Abstract

This thesis discusses the implementation of fuzzy logic techniques in managing the behavior of non-playable characters (NPC) in a game with online multiplayer features that utilize the Photon platform. Games with online multiplayer modes have become very popular, but managing NPC behavior in a multiplayer context is often a complex challenge, requiring high adaptability to changes in the environment and player behavior. This research describes the process of implementing fuzzy logic on NPCs to improve interactivity and player experience. in multiplayer online games. There are three main components in this study: the NPC behavior model, the selection of relevant environmental variables, and the design of fuzzy rules for decision making. In addition, this thesis also describes the integration of Photon technology as a multiplayer platform, which allows players to interact in real-time in the game.The experimental and evaluation results show that the use of fuzzy logic in managing NPC behavior in multiplayer online games can increase the level of realism in player interactions with NPC characters. This makes a positive contribution to the player's gaming experience and results in a more challenging and exciting gameplay in an online multiplayer context. This research provides valuable insights into the use of fuzzy logic in online multiplayer games as well as the integration of Photon as an effective multiplayer platform.
Network Security Analysis Using Snort With Intrusion Detection System (IDS) Method For Computer Network Security Optimization Afrizal, Muhammad Rizki; Amri, Amri; Jamilah, Jamilah
Jurnal Teknologi Rekayasa Informasi dan Komputer Vol 8, No 2 (2025): JURNAL TRIK - POLITEKNIK NEGERI LHOKSEUMAWE
Publisher : Politeknik Negeri Lhokseumawe

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30811/jtrik.v8i2.7460

Abstract

Information technology, particularly computer networks, enables the rapid and complex exchange of information. Proper network management is necessary to maximize the utilization of this information. However, the more extensive the network, the more difficult it is to manage. Threats to network security, such as attacks by hackers and crackers, are increasingly widespread. These attacks can disrupt normal operations and steal critical information. In response to these threats, security systems such as the Snort IDS have been developed. Snort functions to detect and prevent attacks, as well as monitor network traffic for suspicious activity. This study aims to determine the success rate of an Intrusion Detection System (IDS) in securing computer networks against various types of attacks, whether single or multiple attacks are simultaneously executed. The study used an IDS method installed on a server to monitor network traffic. Snort's success in detecting a single attack was 100%, and its success in detecting two attacks simultaneously was 100% if there were no more than two types of attacks. Based on the results of the analysis, Snort can be implemented as an intrusion detection system on the Ubuntu 22.4 Linux operating system to detect attacks in the form of port scanning, DOS, DDOS, and brute force by capturing the attacker's IP address, which produces a response and impact on the computer's CPU that exceeds capacity.
Rancang Bangun Mesin Pembuat Keripik Pisang Sistem Mata Pisau Vertikal Kapasitas 50 Kg/Jam Sopiandi, Sopiandi
Jurnal Teknologi Rekayasa Informasi dan Komputer Vol 8, No 2 (2025): JURNAL TRIK - POLITEKNIK NEGERI LHOKSEUMAWE
Publisher : Politeknik Negeri Lhokseumawe

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30811/jtrik.v8i2.7632

Abstract

Keripik pisang tersebar luas di berbagai daerah di Indonesia dan menjadi komoditas andalan untuk pencarian masyarakat. Proses pembuatan keripik pisang sangat mudah dan menggunakan alat sederhana. Prinsip dasar kerja dari mesin pembuat keripik pisang adalah pisang dimasukkan ke dalam tempat pemasukan pisang, pisang berikutnya didorong ke dalam pisau perajang dan mengalami proses penghancuran. Kemudian pisang yang telah diaduk dibagikan ke wadah melalui corong keluaran. Dalam mendesain mesin ini kami menambahkan ide ke sistem input pisang menggunakan pegas otomatis, sehingga proses merajut dapat dilakukan dengan mengatur beberapa pisang pada pegas pendorong otomatis, dengan bantuan oleh pegas mendorong kita dapat mempersingkat waktu dan meningkatkan kapasitas produksi. Untuk mendapatkan hasil rajutan yang baik Perlu memperhatikan kecepatan engine, tecture pisang dan tegangan geser pada pegas yang mendorong. Metode desain dilakukan melalui survei lapangan, sehingga diperoleh desain yang sederhana. Pada mesin ini menggunakan spesifikasi yaitu putaran daya motor AC 0,5 HP 1330 rpm, diameter puli motor adalah 75 mm dan diameter poros puli adalah 300 mm dengan bahan pulley standar. belt-V digunakan pada tipe A-49 dengan bagian trapesium.
Implementasi Intrusion Detection System Menggunakan Suricata Pada Jaringan Komputer Zaini, Muhammad; Atthariq, Atthariq; Anwar, Anwar
Jurnal Teknologi Rekayasa Informasi dan Komputer Vol 8, No 2 (2025): JURNAL TRIK - POLITEKNIK NEGERI LHOKSEUMAWE
Publisher : Politeknik Negeri Lhokseumawe

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30811/jtrik.v8i2.7440

Abstract

Dalam era konektivitas jaringan yang semakin meluas, keamanan informasi dan sistem komputer menjadi hal yang sangat penting. Serangan penyusupan (intrusion) menjadi ancaman serius terhadap integritas dan ketersediaan sistem komputer yang terhubung ke jaringan, seperti yang dialami oleh Warnet Warpess.net. Dalam konteks ini, penelitian ini bertujuan untuk meningkatkan keamanan jaringan komputer dengan menerapkan Intrusion Detection System (IDS) berbasis open-source Suricata. Metode penelitian yang digunakan adalah penetration test, yang melibatkan simulasi serangan jaringan untuk mengidentifikasi kerentanan jaringan. Penelitian ini menggunakan alat Hping3 untuk melakukan serangan pada alamat IP server, sementara IDS Suricata digunakan untuk mendeteksi serangan tersebut. Hasil penelitian menunjukkan bahwa Suricata mampu mendeteksi jenis serangan Denial of Service (DoS), seperti ping flood, syn flood, dan random source, sementara serangan pemindaian port tidak terdeteksi. Serangan SYN Flood adalah yang paling sering terdeteksi, dengan jumlah paket serangan yang signifikan. Penggunaan IDS memungkinkan administrator untuk mengidentifikasi port dan protokol yang disusupi oleh penyerang.
Multiplayer Quiz Adventure Educational Game Arts and Culture Using the Fisher-Yates Shuffle Algorithm Devnanza, Rahul; Mursyidah, Mursyidah; Atthariq, Atthariq
Jurnal Teknologi Rekayasa Informasi dan Komputer Vol 8, No 2 (2025): JURNAL TRIK - POLITEKNIK NEGERI LHOKSEUMAWE
Publisher : Politeknik Negeri Lhokseumawe

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30811/jtrik.v8i2.7481

Abstract

The rapid development of games, with a wide variety of genres, includes strategy, adventure, arcade, puzzle, sports, and more, packaged in PlayStation games, PC games, and mobile devices. Games with educational content are better known as educational games. These educational games aim to stimulate interest in learning the subject matter while playing, so that with a sense of enjoyment, it is hoped that it will be easier to understand the material presented. As we know, arts and culture play a crucial role in shaping a nation's identity. Appreciating arts and culture has a positive impact in helping society understand the historical roots, values, and cultural heritage that form the basis of cultural diversity. However, often the teaching of arts and culture in educational environments does not create sufficient appeal and does not meet expected standards. Therefore, creative and innovative approaches are needed so that the younger generation can be more actively involved in learning and appreciating arts and culture in an interesting and interactive way. The author hopes that this video game will be an interesting alternative to traditional learning approaches. This game itself uses the Fisher-Yates Shuffle algorithm to randomize quiz questions so that each game has a different order. In this game, players are invited on an adventure to overcome the obstacles presented. Furthermore, players are expected to answer questions about arts and culture, which will broaden their knowledge and understanding. Furthermore, players will find these questions entertaining and challenging.
WHATSAPP MESSENGER DATA BACKUP AND RECOVERY ANALYSIS USING MOBILEDIT FORENSIC EXPRESS AND DR.FONE Prasetio, Prasetio; Aswandi, Aswandi; Safar, Ilham
Jurnal Teknologi Rekayasa Informasi dan Komputer Vol 8, No 2 (2025): JURNAL TRIK - POLITEKNIK NEGERI LHOKSEUMAWE
Publisher : Politeknik Negeri Lhokseumawe

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30811/jtrik.v8i2.7437

Abstract

This research is motivated by how to backup data and recover data that has been lost due to carelessness or user error in using this WhatsApp messenger application, this research aims to Backup and Recover data on the WhatsApp messenger application that has been deleted, lost data, failure, and damage (failure). The results of the study show that the Mobiledit Forensic Express application has different levels of success in backing up and recovering data. This application cannot recover conversation data that has a percentage (50%), but is able to backup and recover various WhatsApp data such as; Links, Status, WhatsApp Animated Gifs, WhatsApp Audio, WhatsApp Documents, WhatsApp Images, WhatsApp Sticker, WhatsApp Video, WhatsApp Video Notes, and WhatsApp Voice Notes (100%) data that can be backed up and recovered by the Mobiledit Forensic Express application. While the Dr.Fone application can backup data and recover WhatsApp chat data with a percentage (80%), but data such as WhatsApp attachments (Audio, Documents, Images, Stickers, Videos, and Voice Notes) only get (50%) because it can only recover new and undamaged photos or videos from the WhatsApp application. By comparing or searching for which applications are relevant for conducting research can help the forensic team and can make it easier for those who want to backup data and recover data in the WhatsApp application using applications that support this research, Mobiledit Forensic Express and Dr.Fone.

Page 1 of 1 | Total Record : 8