36 research outputs found
Total Cost of Ownership Formulation Analysis for Virtualization Data Center in University
Aspects of information technology has influenced the business processes of all types of organizations, including the educational institutions. Educational institutions have implemented a digital campus technology trends. At present many digital campus infrastructure technology brings cloud computing. With cloud computing as part of the IT strategy, an organization can increase their capacity to concentrate on running the business process without thinking of investing in large-scale IT as IT investment before the era of cloud computing.The implementation of cloud computing, based on virtualization technology. Previous research has established that the application of virtualization technology offers ease in data center management and reduce problems may arise when technology brings physical servers in the data center. This paper will discuss the application of virtualization technology in the data center an educational institution. It will calculate and discuss about total cost of ownership through application of virtualization technology on data cente
MACHINE LEARNING UNTUK LOCALIZATION DALAM GEDUNG BERBASIS RSS FINGERPRINT MENGGUNAKAN IEEE 802.11g
cross validation
This research discusses indoor localization using the IEEE 802.11g
wireless network with machine learning approach. Measurement of RSS method
is based on RSS-fingerprinting. Machine learning algorithms that are used for
estimating location of the RSS are kNN and Naive Bayes. In this research, indoor
localization is conducted in the entire room on the 3rd floor of Electrical
Engineering and Information Technology (JTETI) Universitas Gadjah Mada
(UGM) building. Area of the building is 1969,68 m
2
. Four different
configurations are provided in the experiments. The best configuration would be
used as indoor localization in all room of the 3rd floor.
The first experiment is measurement of RSS fingerprint with 2 m
2
area of
grid in 3rd floor corridor, the second experiment is measurement of RSS
fingerprint with 1 m
2
area of grid (the first and second experiments use all of the
permanent access point (AP) on the JTETI UGM building), the third experiment
is measurement of RSS fingerprint with 1 m
2
area of grid. The third experiment
only uses permanent AP on the third floor. The fourth experiment is measurement
of RSS fingerprint with 1 m
2
area of grid. The experiment is used two AP on the
3rd floor and three additional AP, which has set randomly on the 3rd floor.
Result of the experiments show that the best accuracy is obtained from the
fourth experiment, which uses RSS fingerprint with two AP on the 3rd floor and
three additional AP in 1 m
2
area dimension of grid. The accuracies that are
obtained using in the learning phase are 89,46% using kNN with
k = 1 and 43,74% using the Naive Bayes algorithm. Average errors of distance
estimation are 4,13 meters using kNN algorithm and 6,20 meters using Naive
Bayes algorithm in the online and post learning phase. From the experiments,
average errors of distance estimation for indoor localization in all room of 3rd
floor are 4,93 meters using kNN with k=1 and 6,29 meters using the Naive Bayes
algorithm in the offline and learning phase. In the online and post learning phase,
average errors of distance estimation average are obtained 5,25 meters using kNN
algorithm and 7,82 meters using Naive Bayes algorithm
ANALISIS POLA AKSES INTERNET DENGAN INTERVENSI EDUKASI DAN FILTERING BERDASARKAN LOG PROXY SQUID SERVER
Currently the Indonesian government tried to improve Information
Technology resources. Implementation can be seen from the procurement of
infrastructure, applications and Internet access. But efforts to measure and
improve utilization of these things are still minimal.
This research attempts to analyze the patterns of Internet access by
intervention in the form of virtual education using educational video and proxy
filtering, then look at the pattern of access changes that occur through the Squid
proxy log analysis. The results showed an increase in access to positive and
negative content decreased access.
The results of this research seeks to provide strategic advice on the use of
Internet access, particularly to local government to use the Internet can be more
optimal
ANALISIS PERFORMA CENTRAL AUTHENTICATION SERVICE (CAS) PADA JARINGAN SINGLE SIGN ON (SSO): Studi Kasus pada PSDI UGM
The Web application development indirectly demanding user applications to
manage user accounts and passwords application system as well, so as not to be
abused by parties not authorized. So many user account security methods have
been tried to solve the problem. Including by implementing Authentication
Service on Single Sign On (SSO) network by building a CAS Server as
authentication center and with a variety of programming languages.
This research was conducted in the offices of PSDI UGM by analyzing the
CAS Server (existing) built with JSP (Java Server Page), and CAS Server
(replica) that was built with the PHP programming language. Aside from that, this
thesis also discusses how to test the level of security and performance of the CAS
Server (existing as well as replica) using hacking application. Whereas the
methods used in this testing is white box and black box.
The results showed that the CAS Server (existing as well as replica) can not
be penetrated by hacking applications used above, if the CAS Server on both the
security protocol using SSL. However, the security protocol SSL is used on the
CAS Server (existing) still doubted the security level until there is clarification
directly from the Office of PSDI UGM. While the level of performance (response
time and load test) maximum on the CAS Server (existing)=4.480.000 user with
total time request=3.839,421 ms. While on the CAS Server (replica)= 4.490.000
user with total time request=5.406,568 ms.
Keywords - Single Sign On (SSO), Authentication, CAS Server, PHP, Hacking
MODEL IMPLEMENTASI CENTRALIZED AUTHENTICATION SERVICE PADA SISTEM SOFTWARE AS A SERVICE
Cloud computing is an evolving paradigm with tremendous momentum, but its unique aspects exacerbate security and privacy challenges. Trust and security have prevented businesses from fully accepting cloud platforms. Cloud computing as a computing solutions continues to expand even as the backbone of the Organization, in particular Cloud system-built Faculty of Engineering Muhammadiyah University of Magelang. On the other hand the growth of the number of users on the service Cloud-based school information system give rise to other problems.
The security and availability of the server machine to be a problem in the development of Cloud Computing Services. The difference model of authentication on any application such as school information systems and server machine threats to cloud service providers. Diversity model of authentication on each application and the server machine is placed on the same cloud system will complicate cloud manager in identifying attacks against cloud applications are built.
To resolve these problems then needed a model for authentication in the cloud service using single sign-on Protocol. By doing some testing of the implementation model, then the resulting performance measures for each installation that will be realized. Results of the measurement authentication model used to determine formula the authentication type that will be realized in the Faculty of Engineering Muhammadiyah University of Magelang
ANALISIS QUALITY OF SERVICE DARI LAYANAN INTERNET PROTOCOL TELEVISION (IPTV)
IPTV is convergency product between broadcasting, telecommunication and
information technology because given multimedia service which in the form of TV
broadcasting, video, audio, text, graphic, and data that transmitted to the customer
passing broadband using IP protocol (Internet Protocol). Service that given by IPTV
has better quality than convensional TV, such as voice over internet protocol (VoIP),
data (internet), and video on demand (VoD). Million people in the world were using
IPTV so that this technology has growth more raised and always increase every years.
IPTV is supporting by there is quality (QoS/QoE), security, realibility and possible
communication two ways or interactivitelly �real time�. So that, Quality of Service
(QoS) from IPTV service became main attention that can be save.
This research has purpose to analyze QoS (delay, jitter, MOS and throughput)
from IPTV service such as VoIP, internet (HTTP, FTP), and IPTV in the simulation.
The QoS result from simulation will be compare with standard ITUT (delay, jitter). This
research is implementation IPTV service in the OPNET simulator using four scenario,
that is: account bandwidth needed from masing service, calculate and compare the QoS
value, testing and implementation queue method, and choose the effective queue
method.
The result of this research is showing bandwidth requirement for downlink and
uplink from the services are VoIP 50 kbps (downlink) and 50 kbps, the internet are 54
kbps (downlink) and 54 kbps (uplink), and the IPTV service6538 kbps / 6.5 Mbps
(downlink) and 14 kbps (uplink). The QoS result showing that using bandwidth � 15
Mbps, resulting jitter value and delay that can tolera�t e 25o0r ms, the MOS
increasing became 200% and throughput 600%. The QoS that resulting from queue
method applying on the node SDLAM with bandwidth 8 Mbps, only can decrease the
value of delay and jitter 50% - 65% on the VoIP and internet services. Beside that, PQ
method became one of the queue method that can be optimalizing of QoS eventhough
only decrease the jitter 10%
PENGEMBANGAN PURWARUPA SISTEM PEMANTAU BANJIR LAHAR DINGIN MEMANFAATKAN PENGUKURAN INTENSITAS GETARAN DAN KEDALAMAN ALIRAN BERBASIS JARINGAN SENSOR NIRKABEL IQRF
s
Volcanic mudflows or lahars commonly occur following volcanic
eruptions. Lahar can cause catastrophic destruction in their paths because of
their energy and speed. Huge volume of lahars can bury dwelt areas. Lahars have
consistency, viscosity and approximate density of wet concrete, thus they make
higher vibration intensity on the riverbanks when flowing down compared to
what water does at the same depth and channel. These different vibration
intensities when combined with the depths of flow can become a useful indication
of lahar events.
Additional front-end sensors were built in this stud
ANALISIS DAN EVALUASI USER ACCEPTANCE DENGAN PENDEKATAN TECHNOLOGY ACCEPTANCE MODEL (TAM) PADA E-PROCUREMENT DI KABUPATEN KEBUMEN
Implementation of e-procurement in the mechanism of procurement on Kebumen
government regency makes a change from a manual system with a pattern into the
form of face to face towards electronic services. The policy raises the attitude and
behavior of users to accept the application and use it for real. This study aims to
obtain empirical evidence about the effect of acceptance aspects of convenience
(ease of use) and utility (usefulness) understanding of computers and the Internet
on e-procurement in Kebumen handle links by using a model approach to
technology acceptance model (TAM). Analysis stuctured equation modeling
(SEM) was used to determine the relationship between exogenous variables to
endogenous variables with the help of AMOS software.
Evaluation of analysis results are used as ingredients making technical
recommendations, practical as well as regulations on e-procurement, so that the
goals and objectives of the implementation of these policies can be achieved
PERANCANGAN SISTEM PEMANTAUAN KONEKSI JARINGAN SERAT OPTIK BERBASIS WEB UNTUK DIVISI TELKOM SOLO
Fiber opticis is one of transmission media that is able to transmit data with a
large capacity with high reliability. The reliability of optical fiber obtained by using
optical waves (laser light) as a carrier wave. Distribution of information on fiber optics
carries by the digital signal propagated in the form of light waves. Light waves can
carry more information (large capacity) with high speed. The data transfer rate that
can be able to do through the optical fiber can be reached 200,000 Mbps, a fantastic
value.
Base Station Control (BSC) is a telecommunications device that functions to
handle fiber-optic network. BSC is connected by Line Priter Terminal (LPT) 1 cable to
Nartscan. Interference breakdown which occure in the fiber optic network appeared on
BSC as an alert and it�s recorded in the Nartscan�s log. The breakdown in the fiber
optic network greatly affects the communication process that requires banwidth at high
speed. Fiber optic network dropped caused by wild excavation, fallen trees, and cable
theft. Nartscan and BSC located in Solo Network division offices and the fiber optic
network spread accross the regional areas, so if there is a fiber optic network dropped
in the center detected, then the officers in those regional areas can not directly
determine the location of the drop. Conditions that exist at the moment are to manually
notifications when there are alerts on BSC that the error has been recorded in Nartscan
offline. BSC and Nartscan only be monitored from the center, then the alert notification
is done manually by phone or sms by the officer on duty. It is considered less than the
maximum because of the down time to the management process takes a long time. A
fairly long process causes losses to the company due to the fiber optic network is the
primary network backbone or can not communicate. Seeing the problems faced by
Telkom Network Solo Division, it needed a system that could do the monitoring and
prevention of these disorders online and realtime.
The results of this web-based application design is able to sort out the BSC�s log
data stored in Nartscan that contains data relating interference fiber optic networks.
Web-based application will process the data in the Nartscan�s directory and can be
accessed online and real time data reloading every five seconds so that resulting
notification alerts that are connected to the intranet network Telkom. Web-based
applications capable to generating new database that has the data input fiture such as,
when processing time is complete, problems and solutions in the field in order to repair
the fiber-optic network
ANALISIS UNJUK KERJA ROUTING PROTOCOL OLSR PADA WIRELESS MESH NETWORK BERBASIS STANDAR IEEE 802.11b/g
Wireless Mesh Network (WMN) is a communication network model that
incorporates wireless technology and ad-hoc routing in a mesh topology.
Optimized Link State Routing Protocol (OLSR) is one of the routing protocols in
ad-hoc network that makes every wireless routers connected, communicated and
produced a wide range of network. This research analyses the performance of a
WMN testbed using the OLSR routing protocol.
To determine the performance of the WMN, throughput, latency, jitter,
and packet loss was measured on WMN tesbed. The testbed was built using five
wireless router Linksys WRT54GL with OpenWRT Freifunk firmware on the first
floor of the Central Administrative Office Building, Faculty of Engineering,
Gadjah Mada University, Yogyakarta.
Result of the analysis in WMN testbed are as follow