13 research outputs found

    Penerapan metode mfep dalam penerimaan dosen baru di stmik bina nusantara jaya

    Get PDF
    Kualitas sebuah perguruan tinggi tidak lepas dari kualitas/ kinerja dari para dosen dan karyawannya, sehingga sebuah perguruan tinggi haruslah bijak dan cermat dalam memilih dosen/ calon dosen karena ini sangat berkaitan erat dengan pemahaman mahasiswa, sehingga seringkali perguruan tinggi melakukan seleksi cukup ketat terhadap calon dosen yang akan melamar, Pada Stmik Bina Nusantara Jaya telah diadakan seleksi atau ujian untuk para calon dosen yang akan melamar namun masalah yang dihadapi saat ini adalah para penyeleksi hanya menjumlahkan nilai yang telah didapat oleh para pelamar pada setiap sub ujian, karena dirasa perlu ada nilai kepentingan yang berbeda yang mana saat ini ujian berisi Tes Psikologi, Tes Matematika, Tes Mata Kuliah Pemrograman, Tes Kemampuan Mengajar, dan Tes Wawancara. Untuk itulah penulis merasa perlu penghitungan sistem pendukung keputusan dengan metode Multi Factor Evaluation Process (MFEP), dari hasil penghitungan dari alternatif yang tersedia diperoleh hasil bahwa pelamar 8 meraih nilai sebesar 8,5 yang dapat dijadikan acuan bagi pihak STMIK Bina Nusantara Jaya Lubuklinggau

    Mitigasi Keamanan Dynamic Host Control Protocl (DHCP) Untuk Mengurangi Serangan Pada Local Area Network (LAN)

    Get PDF
    Keamanan jaringan telah menjadi perhatian lebih karena pesatnya pertumbuhan dan perluasan Internet. Sementara ada beberapa cara untuk memberikan keamanan pada layer application, transport, atau network layers, data link layer (Layer 2) keamanan belum bisa diterapkan secara maksimal. protokol data link layer yang digunakan dalam Local Area Network (LAN) tidak dirancang dengan keamanan yang secara signature. Dynamic Host Control Protocol (DHCP) adalah salah satu jaringan yang paling banyak digunakan untuk konfigurasi host yang bekerja dalam data menghubungkan lapisan. DHCP rentan terhadap sejumlah serangan, seperti serangan DHCP rogue Server, serangan DHCP Starvation, dan serangan DHCP Snooping. Pembahasan prototype terhadap keamanan jaringan yang disebut Mitigasi Keamanan Dynamic Host Control Protocol (DHCP) Untuk Mengurangi Serangan pada Local Area Network (LAN)

    PENERAPAN WEB PROXY DAN MANAGEMENT BANDWIDTH MENGGUNAKAN MIKROTIK ROUTERBOARD PADA KANTOR POS PALEMBANG 30000

    Get PDF
    The Palembang 30000 POS office which is supported by information technology has a computer network that is directly connected to the ISP (Internet Service Provider) which has a bandwidth allocation of 20 Mbps. The problem at the Palembang 30000 POS Office is that there is no web proxy and Bandwidth Management application, so employees can access various sites that interfere with employee performance and employees who use the internet for free result in uneven bandwidth usage. The purpose of this study is to implement a web proxy and bandwidth management, so that the bandwidth is evenly distributed, therefore it is necessary to divide the bandwidth using a proxy routerboard, the method used for bandwidth distribution is using the simple queue method. By implementing a web proxy, it can control internet usage and block website sites that have the potential to interfere with employee performance, by making bandwidth management able to limit bandwidth usage and share bandwidth equally on each client, so internet access is now running more stable.The Palembang 30000 POS office which is supported by information technology has a computer network that is directly connected to the ISP (Internet Service Provider) which has a bandwidth allocation of 20 Mbps. The problem at the Palembang 30000 POS Office is that there is no web proxy and Bandwidth Management application, so employees can access various sites that interfere with employee performance and employees who use the internet for free result in uneven bandwidth usage. The purpose of this study is to implement a web proxy and bandwidth management, so that the bandwidth is evenly distributed, therefore it is necessary to divide the bandwidth using a proxy routerboard, the method used for bandwidth distribution is using the simple queue method. By implementing a web proxy, it can control internet usage and block website sites that have the potential to interfere with employee performance, by making bandwidth management able to limit bandwidth usage and share bandwidth equally on each client, so internet access is now running more stable

    The Use of Alternative Energy as a Driver Fishing Boat

    Get PDF
    The use of outboard engines commonly used by fishing boats is considered no longer effective, considering the price of BBM (Fuel Oil) which always increases and the effects caused by the use of outboard engines are not environmentally friendly such as producing noise and air pollution caused. This research aims to overcome the problems of using outboard engines by utilizing solar panels to convert sunlight into electrical energy and DC 775 motors as boat propulsion. The use of solar panels with a tracker system to maximize solar panels in producing electrical energy which is then stored in a battery to drive a DC motor. The results of the calculation of a battery with a capacity of 20 Ah can drive the boat for 3.7 hours, where fishermen need 1 liter of fuel to run the outboard engine for 30 minutes. The maximum boat speed generated is 5.76 knots. The results of the analysis in terms of costs incurred for fuel operations are 0% because they utilize sunlight and there is no pollution and noise generated when the boat works. Future development can replace the battery with a larger capacity and add solar panels for faster battery charging. With this research, researchers hope to help fishermen in reducing operational costs and the success of catching more fish

    PROTOTIPE METERAN AIR DIGITAL BERBASIS NOVOTON NUC ARM 120 SEBAGAI PEMBANDING DENGAN METERAN AIR ANALOG PDAM

    Get PDF
    PDAM (Perusahaan Daerah Air Minum) sebagai penyedia layanan air bersih di kota-kota umumnya, memberikan tarif pemakaian untuk setiap meter kubik yang dipakai penggunanya atau pelanggannya. Alat yang digunakan untuk pengukuran air yang biasa disebut masyarakat adalah meteran air. Meteran air ini digunakan hampir seluruh PDAM yang ada di Indonesia, dimana meteran air yang digunakan masih banyak yang berupa analog. Banyak kasus pengukuran menggunakan alat analog kurang dalam keakuratan hasil ukurnya. Oleh sebab itu penelitian dan pembuatan alat meteran air digital perlu dilakukan mengingat banyak kasus pengukuran dengan menggunakan meteran digital lebih akurat. Meteran digital ini mempunyai keunggulan dari meteran air digital dan analog lainnya, yaitu hanya membaca volume air yang melewati meteran digital tersebut. Keunggulan ini terjadi disebabkan adanya penambahan sensor air (water brick sensor) pada rangkaian meteran air digital. Fungsi dari Sensor air adalah untuk mendeteksi adanya air dan memerintahkan mikrokontroler Nuvoton ARM NUC120. Berdasarkan hasil pengamatan pada meteran analog diperoleh nilai 1900 ml dengan ukuran standar normal 2000 ml sedangkan meteran digital  diperoleh nilai diatas 2000 ml pada waktu yang sama dengan  analog

    Mitigasi Distributed Denial Of Service(DDoS) Attack Pada Arsitektur Software Defined Network (SDN)

    Get PDF
    Pada era globalisasi perkembangan teknologi informasi telah semakin canggih dan berkembang sangat pesat serta keamanan jaringan komputer begitu penting untuk diterapkan dalam teknologi informasi, dimana keamanan jaringan digunakan untuk mengidentifikasi user ilegal dalam computer network. SDN (Software Defined Networking) adalah teknologi yang dapat membantu mengelola serta memelihara jaringan secara terprogram untuk meningkatkan kinerja dan monitoring jaringan. Arsitekur Software Defined Networking menerapkan desain manajemen jaringan yang memisahkan control plane dari data plane yang bertujuan untuk memprogram perangkat secara terpusat. Terlepas dari keunggulan yang dimiliki SDN ada masalah besar yang patut diwaspadai yaitu serangan DDoS Attack. Penelitian ini bertujuan untuk melakukan mitigasi terhadap serangan DDoS untuk arsitektur SDN pada Jaringan Wireless. Serangan yang digunakan adalah serangan Ping of Death dan pengujian dilakukan dengan membandingkan hasil traffic saat tidak menjalankan aturan mitigasi dan menjalankan aturan mitigasi. Hasil pengujian dengan tidak menjalankan aturan mitigasi, rata-rata jumlah packet yang masuk yaitu 1.000M dan ketika menjalankan aturan mitigasi rata-rata jumlah packet menurun menjadi 1.000K

    IMPLEMENTASI DESAIN JARINGAN HOTSPOT BERBASIS MIKROTIK DENGAN METODE NDLC (NETWORK DEVELOPMENT LIFE CYCLE) PADA PT KIRANA PERMATA

    Get PDF
    In this technological development the need for the internet is no longer a foreign thing for the community. With the internet that can connect to each other between one network to a number of networks in the world. Internet use cannot be separated from the existence of the internet service provider itself. To be able to connect to the internet network, a Hotspot facility is needed as a connectivity connecting access to the internet network. The purpose of this study is to design a Hotspot network to increase the efficiency of using computer networks at PT Kirana Permata. In designing this network design using the NDLC method which can be used as a development of network infrastructure to be more optimal. So that the system can run optimally, settings are made on the routerboard which is used as an internet connection from the ISP to the internet user network. For this reason, a network topology that has been designed to be implemented on PT Kirana Permata's computer network is used. So it is hoped that the network topology design can make computer networks more structured. Even so, monitoring still needs to be done to observe data traffic as a network monitor so that it can run as smoothly as expected. This network design plan produces a new network topology that is more efficient and flexible. With the Hotspot network at PT Kirana Permata, the use of the internet network is more accessible for guests and employes.In this technological development the need for the internet is no longer a foreign thing for the community. With the internet that can connect to each other between one network to a number of networks in the world. Internet use cannot be separated from the existence of the internet service provider itself. To be able to connect to the internet network, a Hotspot facility is needed as a connectivity connecting access to the internet network. The purpose of this study is to design a Hotspot network to increase the efficiency of using computer networks at PT Kirana Permata. In designing this network design using the NDLC method which can be used as a development of network infrastructure to be more optimal. So that the system can run optimally, settings are made on the routerboard which is used as an internet connection from the ISP to the internet user network. For this reason, a network topology that has been designed to be implemented on PT Kirana Permata's computer network is used. So it is hoped that the network topology design can make computer networks more structured. Even so, monitoring still needs to be done to observe data traffic as a network monitor so that it can run as smoothly as expected. This network design plan produces a new network topology that is more efficient and flexible. With the Hotspot network at PT Kirana Permata, the use of the internet network is more accessible for guests and employes

    Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security

    Get PDF
    Dibutuhkannya komunikasi dalam menunjang interaksi antar perusahaan yang memiliki kaitan yang sangat erat terhadap perkembangan teknologi informasi melalui jaringan komputer. Virtual Private Network atau biasa disebut VPN memiliki peran penting dalam perkembangan sistem keamanan dalam jaringan internet, terutama dalam membatasi hak akses terhadap server, database, dan sejenisnya dalam meminimalisir terjadinya akses illegal terhadap data-data penting perusahaan. VPN memiliki beberapa tipe salah seperti VPN Tunnel dan IPSec, VPN Tunnel memiliki konsep yang lebih sederhana dibandingkan dengan IPSec karena dapat menghubungkan server dan client secara remoteaccess yang hanya membutuhkan 1 router saja yang terhubung pada sisi server. IPSec memiliki tingkat keamanan yang lebih tinggi dibandingkan dengan VPN Tunnel dengan jalur komunikasi dilengkapi dengan kriptografi. IPSec yang berjalan pada L2TP memiliki tingkat kinerja yang lebih baik dibandingkan VPN Tunnel berdasarkan hasil yang telah di dapatkan, karena konsep yang mengharuskan router terkoneksi secara point-to-point. Kata Kunci - Virtual Private Network (VPN), IPSec, Tunneling, Quality of Service, Peformanc

    Analisis Kerentanan Keamanan Sistem Informasi Akademik Universitas Bina Darma Menggunakan OWASP

    Get PDF
    Sistem Keamanan Informasi Akademik Universitas Bina Darma ialah suatu sistem berbasis web yang mengolah semua data ataupun informasi dan melakukan berbagai proses kegiatan akademik dimana melibatkan tenaga pendidik dan peserta didik, administrasi akademik, data nilai mahasiswa dan masih banyak lagi yang berkaitan dengan akademik. Pastinya data akademik tersebut sangat penting dan harus dijaga keamanannya. Oleh kareena itu, perlu dilakukan analisis kerentanan keamanan . Pada penelitian ini peneliti menggunakan metode Action Research  yang menitikberatkan pada hasil scan yang berkaitan dengan celah keamanan dari website tersebut dan juga Framework OWASP dalam pengujian. Hasil dari penelitian ini sendiri yakni memberi informasi mengenai port-port mana yang saja yang terbuka dan juga solusi untuk meningkatkan keamanan website dan meminimalisir terjadinya Attack yang dilakukan oleh Hacker

    Analisis ANALISIS COVERAGE AREA JARINGAN 4G LTE TELKOMSEL, XL AXIATA DAN INDOSAT OOREDOO DI KECAMATAN BAYUNG LENCIR, KABUPATEN MUSI BANYUASIN, PROVINSI SUMATERA SELATAN.

    No full text
    The research is to analyze the coverage area of ​​the 4G LTE network of telecommunications operators Telkomsel, XL Axiata, and Indosat Ooredo in Bayung Lencir District, Musi Banyuasin Regency, South Sumatra Province, Indonesia. The information obtained by the result of this research is expected to be useful for the public to determine and choose a telecommunications operator that has the widest coverage area and is a catalyst for improvement for telecommunications operators whose coverage area is not yet wide. This study will analyze the parameters of the 4G LTE network coverage area, namely: Reference Signal Received Power (RSRP) and Signal to Noise Ratio (SINR), on the 4G LTE network. The aim of this study to analyze the coverage area of ​​the 4G LTE network of Telkomsel, XL Axiata and Indosat Ooredoo in Bayung Lencir District, Musi Banyuasin Regency, South Sumatra Province using the G-NetTrack Pro application. The study was conducted in 9 villages/kelurahan in Bayung Lencir District, Musi Banyuasin District, South Sumatra Province. The results of the measurement of the coverage area parameters using the G-NetTrack Pro software were then analyzed statistically with the Single Factor Analysis of Variance. The results of the study, that  find RSRP and SINR parameters for cellular operators Telkomsel, XL Axiata, and Indosat Ooredoo, it was found that statistically the RSRP value between operators was not significantly different, which means that the RSRP values ​​for Telkomsel, XL Axiata, and Indosat Ooredoo were considered the same and the SINR parameter for operators Telkomsel, XL Axiata, and Indosat Ooredoo are statistically different where the SINR value of Telkomsel is the highest, followed by Indosat Ooredo at position number 2, and XL Axiata at position 3.The research is to analyze the coverage area of ​​the 4G LTE network of telecommunications operators Telkomsel, XL Axiata, and Indosat Ooredo in Bayung Lencir District, Musi Banyuasin Regency, South Sumatra Province, Indonesia. The information obtained by the result of this research is expected to be useful for the public to determine and choose a telecommunications operator that has the widest coverage area and is a catalyst for improvement for telecommunications operators whose coverage area is not yet wide. This study will analyze the parameters of the 4G LTE network coverage area, namely: Reference Signal Received Power (RSRP) and Signal to Noise Ratio (SINR), on the 4G LTE network. The aim of this study to analyze the coverage area of ​​the 4G LTE network of Telkomsel, XL Axiata and Indosat Ooredoo in Bayung Lencir District, Musi Banyuasin Regency, South Sumatra Province using the G-NetTrack Pro application. The study was conducted in 9 villages/kelurahan in Bayung Lencir District, Musi Banyuasin District, South Sumatra Province. The results of the measurement of the coverage area parameters using the G-NetTrack Pro software were then analyzed statistically with the Single Factor Analysis of Variance. The results of the study, that  find RSRP and SINR parameters for cellular operators Telkomsel, XL Axiata, and Indosat Ooredoo, it was found that statistically the RSRP value between operators was not significantly different, which means that the RSRP values ​​for Telkomsel, XL Axiata, and Indosat Ooredoo were considered the same and the SINR parameter for operators Telkomsel, XL Axiata, and Indosat Ooredoo are statistically different where the SINR value of Telkomsel is the highest, followed by Indosat Ooredo at position number 2, and XL Axiata at position 3
    corecore