cover
Contact Name
Talitha Amanda
Contact Email
talitha@utmj.ac.id
Phone
+6200000
Journal Mail Official
manajer@journal.utmj.ac.id
Editorial Address
Minangkabau Barat No.60
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
Jurnal Jaringan dan Rekayasa Komputer
ISSN : -     EISSN : 31250254     DOI : https://doi.org/10.37932/jarekom.v1i1.909
Core Subject :
JAREKOM: Jurnal Jaringan dan Rekayasa Komputer adalah jurnal ilmiah berbasis peer-review yang diterbitkan secara resmi oleh Universitas Teknologi Muhammadiyah Jakarta (UTM Jakarta) sejak tahun 2025. Berada di bawah naungan Lembaga Penelitian dan Pengabdian Masyarakat (LPPM) UTM Jakarta, jurnal ini memiliki misi untuk menyebarluaskan, mengembangkan, dan memfasilitasi hasil penelitian teoretis maupun eksperimental di bidang informatika, rekayasa komputer, dan ilmu komputer. Seluruh manuskrip yang masuk wajib melalui proses penelaahan sejawat (peer-review) dan penyuntingan yang ketat, di mana keputusan akhir penerimaan naskah sepenuhnya didasarkan pada rapat Dewan Redaksi. Kebijakan Akses Terbuka (Open Access Policy) JAREKOM menerapkan kebijakan Akses Terbuka (Open Access). Seluruh konten tersedia secara bebas tanpa biaya bagi pengguna maupun institusi. Pengguna diizinkan untuk membaca, mengunduh, menyalin, mendistribusikan, mencetak, mencari, atau menautkan ke teks lengkap artikel, serta menggunakannya untuk tujuan akademis yang sah lainnya sesuai dengan lisensi yang ditentukan. Fokus dan Ruang Lingkup (Focus and Scope) JAREKOM menerima naskah ilmiah orisinal, artikel ulasan (review article), dan studi kasus yang relevan dengan bidang-bidang berikut: Jaringan Komputer & Komunikasi Data Internet of Things (IoT) & Komputasi Awan (Cloud Computing) Robotika, Sistem Digital, & Otomasi Industri Keamanan Jaringan & Siber Kecerdasan Buatan (AI) & Pembelajaran Mesin (Machine Learning) Data Mining & Pengolahan Data Besar Komputer Multimedia & Rekayasa Perangkat Lunak Kebijakan Plagiarisme Untuk menjaga integritas akademik, seluruh manuskrip harus bebas dari segala bentuk plagiarisme. Penulis sangat disarankan untuk melakukan pengecekan kemiripan teks secara mandiri sebelum mengirimkan naskah. Dewan Redaksi memeriksa tingkat kemiripan setiap artikel menggunakan perangkat lunak iThenticate. Naskah dengan tingkat kemiripan (similarity index) yang tinggi akan langsung ditolak. Hak Cipta dan Lisensi Hak cipta atas naskah yang diterbitkan dipegang sepenuhnya oleh JAREKOM: Jurnal Jaringan dan Rekayasa Komputer. Semua artikel didistribusikan di bawah Lisensi Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0). Sistem Pengarsipan Jurnal ini menggunakan sistem LOCKSS dan CLOCKSS untuk menciptakan sistem pengarsipan terdistribusi di antara perpustakaan yang berpartisipasi, serta mengizinkan perpustakaan tersebut untuk membuat arsip permanen jurnal demi tujuan pelestarian dan pemulihan data digital jangka panjang. Informasi Publikasi Frekuensi Terbit: 2 (dua) kali setahun (Juni dan Desember). Penerbit: Universitas Teknologi Muhammadiyah Jakarta (UTM Jakarta). Afiliasi Resmi: Program Studi S1 Rekayasa Komputer & Lembaga Penelitian dan Pengabdian Masyarakat (LPPM) Universitas Teknologi Muhammadiyah Jakarta.
Arjuna Subject : -
Articles 8 Documents
Analisis Risiko dan Strategi Keamanan dalam Jaringan Peer-to-Peer (P2P) dan Jaringan dengan Internet of Everything (IOE) untuk Smart Campus
Jurnal Rekayasa Komputer Vol 1 No 1 (2025): JUNI 2025
Publisher : Universitas Teknologi Muhammadiyah Jakarta (UTM Jakarta)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37932/jarekom.v1i1.900

Abstract

Digital transformation within campus environments through the integration of Peer-to-Peer (P2P) networks and the Internet of Everything (IoE) offers high efficiency and intelligent connectivity, yet introduces significant challenges regarding network security and vulnerability risks. This study aims to analyze these risks and design contemporary technology-based security strategies to support Smart Campus systems. Utilizing a Research and Development approach, a hybrid security model was developed based on adaptive encryption technologies and AI-driven monitoring. Experimental results demonstrate a 72% increase in threat detection capabilities and an average attack mitigation response time of 3.4 seconds.  
Evaluasi Kecepatan dan Keamanan Jaringan Wifi 6 Untuk Konektivitas Masa Depan
Jurnal Rekayasa Komputer Vol 1 No 1 (2025): JUNI 2025
Publisher : Universitas Teknologi Muhammadiyah Jakarta (UTM Jakarta)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37932/jarekom.v1i1.902

Abstract

WiFi 6 (802.11ax) represents the latest generation of wireless network technology, offering advancements in speed, efficiency, and security. This study aims to evaluate the performance of WiFi 6 in the context of future connectivity, specifically regarding data transfer speeds and protection against cyber security threats. Utilizing a Research and Development approach, this research delivers an implementation model and a technology-based WiFi 6 monitoring system prototype. The results indicate that WiFi 6 demonstrates significant effectiveness in improving network quality, yet continues to face certain security barriers. Solutions based on adaptive encryption systems and real-time monitoring are proposed as novel innovations. Furthermore, the findings show that WiFi 6 can increase speeds by up to 40% and provide enhanced protection through WPA3. This study presents a novel contribution to mapping the positive impacts of WiFi 6 for future connectivity, particularly in meeting the demands of IoT devices and high-density user environments.  
Pengaruh Virtual Private Network (VPN) Terhadap Keamanan dan Performa Akses Jaringan
Jurnal Rekayasa Komputer Vol 1 No 1 (2025): JUNI 2025
Publisher : Universitas Teknologi Muhammadiyah Jakarta (UTM Jakarta)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37932/jarekom.v1i1.903

Abstract

Virtual Private Networks (VPN) represent a popular solution for securing network access, particularly within the context of remote work and sensitive data access. However, VPN usage also affects network performance metrics such as latency and access speed. This study aims to evaluate the impact of VPNs on network security and performance utilizing a Research and Development approach. Experimental results demonstrate a 65% increase in access security alongside a 22% decrease in performance, with variations depending on the type of VPN protocol deployed. With the growing demand for personal data protection, VPNs play a vital role in maintaining privacy and securing digital communications. Nevertheless, the impact of VPN usage on network performance, specifically regarding access speed and latency, frequently remains a subject of debate. The research findings show that although VPNs can reduce access speed, newer technologies such as WireGuard and IKEv2 have mitigated these negative performance impacts. This study provides useful insights for individuals and organizations in selecting VPN services that align with their specific requirements.  
Desain Software-Defined Networking (SDN) Berbasis Nano AI Untuk Skalabilitas Jaringan Cloud
Jurnal Rekayasa Komputer Vol 1 No 1 (2025): JUNI 2025
Publisher : Universitas Teknologi Muhammadiyah Jakarta (UTM Jakarta)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37932/jarekom.v1i1.904

Abstract

Rapid digital transformation demands flexible, automated, and scalable network solutions. Software-Defined Networking (SDN) serves as the foundation of modern networks, yet its management requires enhanced intelligence to support cloud service scalability. This article proposes an SDN design based on nano AI, which is a micro-artificial intelligence system for real-time automated network management. A Research and Development approach is utilized to develop the prototype and system model. Experimental results demonstrate a 43% increase in network management efficiency, a 27% reduction in latency, and a significant improvement in cloud system scalability.  
Model Jaringan Neural Untuk Deteksi Anomali Pada Sistem Keamanan (SIBER): Rancangan, Implementasi, dan Analisis
Jurnal Rekayasa Komputer Vol 1 No 1 (2025): JUNI 2025
Publisher : Universitas Teknologi Muhammadiyah Jakarta (UTM Jakarta)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37932/jarekom.v1i1.905

Abstract

The increase in complex and dynamic cyber attacks drives the need for artificial intelligence-based anomaly detection systems. This article develops a neural network model to detect anomalies in cyber security systems utilizing a Research and Development approach. The model is developed using deep learning approaches (Autoencoder and LSTM) and evaluated against real-world network traffic data. The results demonstrate high effectiveness in detecting intrusions in real-time. This model introduces a technology-based innovation with a positive impact on the national digital security landscape.  
Desain Sistem Jaringan Untuk Smart Factory Berbasis Industrial Internet of Things (Iiot)
Jurnal Rekayasa Komputer Vol 1 No 1 (2025): JUNI 2025
Publisher : Universitas Teknologi Muhammadiyah Jakarta (UTM Jakarta)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37932/jarekom.v1i1.907

Abstract

The Industrial Revolution 4.0 drives the transformation of production systems toward the smart factory concept. Industrial Internet of Things (IIoT) implementation serves as the primary key to creating adaptive, efficient, and intelligent production systems. This study aims to design an optimal network system model to support the performance of IIoT-based smart factories. Utilizing a Research and Development approach, this research develops a network system prototype and model focusing on data transmission effectiveness, security, and scalability. Evaluation results demonstrate that the designed network model enhances IIoT device communication efficiency and delivers a positive impact on industrial productivity.  
Penggunaan Container Networking dalam Pengelolaan Infrastruktur Cloud-Native
Jurnal Rekayasa Komputer Vol 1 No 1 (2025): JUNI 2025
Publisher : Universitas Teknologi Muhammadiyah Jakarta (UTM Jakarta)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37932/jarekom.v1i1.908

Abstract

Digital transformation drives organizations to adopt cloud-native technologies to improve efficiency and operational flexibility. Container networking becomes a key element in cloud-native infrastructure management because it enables optimal inter-container communication. This article aims to analyze the role, advantages, barriers, and implementation strategies of container networking within the cloud-native ecosystem. The research method used is descriptive qualitative with a case study approach. The research results show that container networking implementation increases the scalability, reliability, and security of cloud-native infrastructure, despite challenges in network management and data security. This article also proposes an adaptive and innovative container networking management model to enhance operational efficiency in cloud-native environments.
Model Transformasi Keamanan Digital dalam Jaringan Peer-to-Peer (P2P) untuk Efisiensi Tinggi Smart Campus
Jurnal Rekayasa Komputer Vol 1 No 1 (2025): JUNI 2025
Publisher : Universitas Teknologi Muhammadiyah Jakarta (UTM Jakarta)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37932/jarekom.v1i1.909

Abstract

Digital transformation within campus environments via Peer-to-Peer (P2P) networks and the Internet of Everything (IoE) integration offers high efficiency and intelligent connectivity, yet introduces significant network security risks. This study analyzes these risks and designs contemporary technology-based security strategies to support Smart Campus systems. Utilizing a Research and Development approach, a hybrid security model based on adaptive encryption and AI-driven monitoring was developed. Experimental results demonstrate a 72% increase in threat detection capabilities and an average attack mitigation response time of 3.4 seconds. This article proposes a digital security transformation model built upon a P2P architecture to enhance network efficiency and resilience. Furthermore, this study examines security strategies, technological innovations, and their implementation impacts on smart campus operational efficiency. Through case studies and network simulations, this article offers a novel contribution to adaptive digital security design.

Page 1 of 1 | Total Record : 8


Filter by Year

2025 2025