10 research outputs found

    PERAN ALGORITMA CAESAR CIPHER DALAM MEMBANGUN KARAKTER AKAN KESADARAN KEAMANAN INFORMASI

    Get PDF
    Caesar cipher adalah algoritma cipher substitusi yang menggunakan konsep pergeseran huruf dengan modulo 26. Secara matematis dapat dirumuskan sebagai berikut S= (T+K) Modulo 26. S= Teks Sandi T= Teks Terang K=Kunci. Algoritma ini biasanya digunakan untuk proses enkripsi suatu informasi yang bersifat khusus atau rahasia pada zaman romawi. Pada zaman sekarang aspek kesadaran keamanan informasi menjadi suatu yang penting bagi masyarakat dunia. Perkembangan teknologi yang terus meningkat selalu diimbangi dengan kecanggihan tindak kejahatan. Hanya mengandalkan sistem keamanan tanpa disertai dengan pengembangan pola berfikir akan menjadi sia-sia. Pengenalan algoritma Caesar Cipher yang mudah dipahami ini kepada guru dan murid akan membangun karakter dan pola berfikir sehingga terciptanya masyarakat kreatif, cerdas, dan sadar akan keamanan. Kata kunci: Algoritma, Caesar Cipher, Karakter, Keamana

    DATA AVAILABILITY IN DECENTRALIZED DATA STORAGE USING FOUR-NODE INTERPLANETARY FILE SYSTEM

    Get PDF
    Centralized storage is a data storage model in which data is stored and managed in a single physical location or centralized system. In this model, all data and information are stored on servers or data centers managed by one entity or organization. This model also has disadvantages such as risk of system failure against distributed denial of service (DDoS) attacks, natural disasters, and hardware failures causing a single point of failure. This threat results in loss of data and a lack of user confidence in the availability of data in centralized storage. This study proposes to evaluate the availability of data in decentralized data storage using a four-node interplanetary file system (IPFS) that is interconnected with a swarm key as the authentication key. Unlike centralized storage which has only one data center, four-node IPFS allows users to upload and download data from four interconnected data centers. This can avoid dependence on the central server and reduce server load. The evaluation results show that decentralized data storage using a four-node IPFS system is three times more resilient than centralized storage against a single point of failure. This system can increase data availability so that organizations can minimize data loss from the threat of system failure

    Optimization of maximum lift to drag ratio on airfoil design based on artificial neural network utilizing genetic algorithm

    Get PDF
    This paper deals with an alternative design method of airfoil for wind turbine blade for low wind speed based on combination of smart computing and numerical optimization. In this work, a simulation of Artificial Neural Network (ANN) for determining the relation between airfoil geometry and its aerodynamic characteristics was conducted. First, several airfoil geometries were generated through transformation of complex variables (Joukowski transformation), and then lift and drag coefficients of each airfoil were determined using CFD (Computational Fluid Dynamics). In present study, the ANN training was conducted using airfoil geometry and its aerodynamic characteristics as input and output, respectively. Therefore, lift and drag coefficients can be directly determined only by giving the airfoil geometry without having to perform wind tunnel experiment or numerical computation. Moreover, the optimization was conducted to obtain an airfoil geometry which gives maximum lift to drag ratio (CL/CD) for specific Reynolds number. For this purpose Genetic Algorithm (GA) was applied as optimizer. The results were validated using commercial CFD and it can be shown that the result are satisfactory with error approximately of 6%

    STRATEGI KOMPUTASI AWAN: ROADMAP FOR CLOUD COMPUTING ADAPTION (ROCCA) - IDENTIFIKASI RESIKO PADA INSTANSI X

    Get PDF
    Cloud computing (komputasi awan) merupakan sebuah pengembangan infrastruktur Teknologi Informasi yang dapat memberikan solusi atas keterbatasan kemampuan dari beberapa lembaga pemerintah. Tujuan dilakukan penelitan yaitu untuk mengetahui kemudahan, dan memetakan dalam implementasi peralihan data komputasi awan. Penggabunagn ROCCA – identifikasi resiko pada komputasi jaringan di instansi X dapat membuat tahapan migrasi menjadi terstruktur. Selain metoda ROCCA yang generik, sehingga dapat “dilakukan penyesuaian” modelnya dengan menyisipkan identifikasi resiko. Sebagai jaminan agar data sivitas dapat menggunakan data sebagai bagian dari pekerjaan korporat.Metoda yang digunakan dengan menggabungkan ROCCA Adoption Framework dan identifikasi resiko. Masing-masing tahapan pada ROCCA telah disisipkan identifikasi resiko yang dapat memantau dan melakukan evaluasi pada tiap tahapannya. Hasil dari penelitian ini berupa tahapan dari ROCCA dengan indentifikasi resiko agar pelaksanaan migrasi data ke komputasi awan terencana dengan baik dan berjalan dengan baik. Diperlukan evaluasi pada tiap tahapan terutama pada tahapan migrasi, selain itu singkronisasi dan layanan data untuk sivitas, perlu dievaluasi sesuai dengan identifikasi yang telah dilakukan. Komputasi awan pada intansi X lebih mendekati model implementasi Private Cloud as a service (PaaS) dan layanan Infrastructure as a Service (IaaS)

    Perancangan komik dengan tema bahaya narkoba dan kiat untuk mengatasinya

    No full text
    The Killing Substance merupakan rancangan komik yang memiliki tema tentang narkoba dan remaja. Cerita komik ini dilatarbelakangi oleh maraknya penyalahgunaan narkoba yang telah mengakibatkan rusaknya generasi penerus bangsa. Melalui pendekatan gaya ilustrasi pengarang, komik ini menyampaikan pesan kepada kaum remaja untuk menghindari pemakaian narkoba

    Desain dan Analisis Sistem CyberShare Menggunakan Four Node Interplanetary File System (IPFS)

    No full text
    Cybersecurity information sharing is a proactive and collaborative measure in enhancing organizational security by exchanging cybersecurity information using a centralized repository service. However, in practice, the use of centralized services poses a threat to distributed denial-of-service (DDoS) attacks which can result in system failure and cause single point of failure as well as man-in-the-middle (MITM) attacks which can result in modification of information and theft of exchanged information. This threat results in a lack of user confidence in the confidentiality, integrity, and availability of information. This study proposes the design of a secure cybersecurity information sharing (CyberShare) system using a private interplanetary file system (IPFS) network as a decentralized information storage. Unlike centralized storage which only has a single-node, CyberShare systems use four-node IPFS interconnected with swarm keys as authentication keys. This system allows users to store and share information from the sender to the recipient of information, avoiding dependence on a central server and reducing server load. The results of the analysis show that the proposed CyberShare system can guarantee the confidentiality, integrity, and availability of cyber security information. CyberShare systems can enhance the security of the information exchanged so that organizations can safely share and utilize cybersecurity information

    Secure Cybersecurity Information Sharing for Sectoral Organizations Using Ethereum Blockchain and IPFS

    No full text
    The COVID-19 pandemic has resulted in increased cross-sector cyber-attacks. Passive and reactive cybersecurity techniques relying solely on technology are insufficient to combat sophisticated attacks, necessitating proactive and collaborative security measures to minimize attacks. Cybersecurity Information Sharing (CIS) enhances security via proactive and collaborative cybersecurity information exchange, but its implementation via cloud services faces threats from man in the middle (MITM) and distributed denial of service (DDoS) attacks, as well as a vulnerability in cloud storage involving centralized data control. These threats and vulnerabilities result in a lack of user confidence in the confidentiality, integrity, and availability of information. This paper proposes Secure Cybersecurity Information Sharing (SCIS) to secure Cybersecurity Information in sectoral organizations using the private interplanetary file system (IPFS) network and the private Ethereum Blockchain network. Private Ethereum Blockchain enables secure and transparent transaction logging, while Private IPFS network provides decentralized storage, addressing vulnerabilities in centralized storage systems. The outcomes of the tests reveal that the suggested SCIS system offers cybersecurity information availability, confidentiality, and integrity. SCIS provides a high level of security to protect cybersecurity information exchanged between sectoral organizations using the Private Ethereum Blockchain network and the Private IPFS network so that organizations can safely share and utilize information.  The COVID-19 pandemic has resulted in increased cross-sector cyber-attacks. Passive and reactive cybersecurity techniques relying solely on technology are insufficient to combat sophisticated attacks, necessitating proactive and collaborative security measures to minimize attacks. Cybersecurity Information Sharing (CIS) enhances security via proactive and collaborative cybersecurity information exchange, but its implementation via cloud services faces threats from man in the middle (MITM) and distributed denial of service (DDoS) attacks, as well as a vulnerability in cloud storage involving centralized data control. These threats and vulnerabilities result in a lack of user confidence in the confidentiality, integrity, and availability of information. This paper proposes Secure Cybersecurity Information Sharing (SCIS) to secure Cybersecurity Information in sectoral organizations using the private interplanetary file system (IPFS) network and the private Ethereum Blockchain network. Private Ethereum Blockchain enables secure and transparent transaction logging, while Private IPFS network provides decentralized storage, addressing vulnerabilities in centralized storage systems. The outcomes of the tests reveal that the suggested SCIS system offers cybersecurity information availability, confidentiality, and integrity. SCIS provides a high level of security to protect cybersecurity information exchanged between sectoral organizations using the Private Ethereum Blockchain network and the Private IPFS network so that organizations can safely share and utilize information

    PENGEMBANGAN PERANCANGAN AIRFOIL SUDU TURBIN ANGIN KECEPATAN RENDAH BERBASIS INVERSE DESIGN METHOD MENGGUNAKAN ARTIFICIAL NEURAL NETWORK

    Get PDF
    The technical problems in utilization of wind energy as electric power plant in Indonesia is mainly due to the low of average wind velocity which is in the range of 2,5 - 6 m/s. On the other side, the available windmills in the market so far were suited to the home land manufacturer condition, where the average of wind velocity is high enough (above 8 m/s). Therefore, it is a need to develop wind turbine suitably for climate condition in Indonesia. One of the important aspects in turbine blade design is airfoil selection. In this research a methodology of turbine blade design based on intelligent computation has been developed. Using this method the airfoil geometry is no longer as a limitation (constraint) in a wind turbine blade design, therefore the design process can be conducted more easy. Firstly, several airfoil profiles were generated by complex variable transformation (Joukowski transformation) then lift, drag and aerodynamic moment coefficients were numerically calculated by CFD (Computational Fluid Dynamics). The obtained data were used to train the Artificial Neural Network (ANN). By the trained ANN, airfoil geometry can be determined directly with the given aerodynamic forces and moment coefficients instead of wind tunnel experiment or even numerical computation. The ANN result shows good enough for the level of accuracy for even a variety of different training functions
    corecore