Claim Missing Document
Check
Articles

Found 16 Documents
Search

Rancang Bangun Sistem Penyiraman Otomatis Berbasis Internet of Things Pada Tanaman Hias Sirih Gading Putri Ayu Wulandari; Phyta Rahima; Sirojul Hadi; Khairan Marzuki
Jurnal Bumigora Information Technology (BITe) Vol 2 No 2 (2020)
Publisher : Prodi Ilmu Komputer Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v2i2.886

Abstract

Kemajuan teknologi dari waktu ke waktu telah berkembang dengan pesat sehingga dapat memberikan banyak kemudahan bagi manusia untuk melakukan pekerjaan sehari-hari seperti melakukan perawatan pada tanaman hias yang berada di dalam rumah. Salah satu contoh tanaman hias yang ada dirumah yaitu tanaman sirih gading. Untuk merawat tanaman diperlukan air untuk melakukan penyiraman. Penyiraman yang teratur merupakan rutinitas penting di lakukan untuk menjaga tanaman terus tumbuh dan berkembang. Pekerjaan yang dilakukan secara rutin dan terjadwal dapat dilakukan dengan memanfaatkan teknologi sensor dan internet of things (IoT) untuk melakukan kontrol dan pemantauan. Teknologi tersebut dapat digunakan untuk membangun sistem yang berfungsi untuk melakukan perawatan dan penyiraman pada tanaman hias sirih gading. IoT merupakan sebuah sistem yang memungkinkan setiap device dapat berkomunikasi, melakukan kontrol dan pemantauan melalui jaringan internet. Hasil yang dicapai setelah penelitian ini dilakukan yaitu dihasilkan sebuah sistem penyiraman otomatis berbasis internet of things dengan menggunakan NodeMCU yang terintegrasi dengan Telegram untuk melakukan perawatan dan penyiraman pada tanaman hias sirih gading. Hasil dari penelitian ini yaitu suhu lingkungan pada tanaman berada pada rentang 24oC–29oC dan rata-rata error pengukuran suhu menggunakan sensor DHT11 yaitu sebesar 2,07%. Pengukuran kelembaban tanah pada tanaman hias sirih gading berada pada rentang 47%-65%.
Development of OnlineWeb-Based New Student Graduation Application in Junior High School Jusmita Weriza; Ismail Husein; Noranizamardia Noranizamardia; M Fakhariza; Khairan Marzuki
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 21 No 3 (2022)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (623.135 KB) | DOI: 10.30812/matrik.v21i3.1830

Abstract

The student graduation information system is integral to managing and carrying out school information system activities. Especially in Junior High Schools (SMP) today, many still have not used a website-based information system due to the new internet network entering this area. In meeting the admin’s need, in particular, to deal with the problem of passing the distribution of receiving information or announcements, documentation of activities, teaching materials, and registration of new student participants have not run optimally as expected. In the system development method in this research, the author uses the System Development Life Cycle (SDLC) with the Waterfall model approach, which consists of 5 stages: analysis, design, implementation, testing, and implementation. The system design tool uses the UML (Unified Modeling Language) method using use-case diagrams according to system requirements. In developing the SDLC method in this study, the authors used it until the design stage. The results obtained from this research are a Web-based application system for new students’ graduation. With this tool, several related files will be generated. This new system can improve the quality of further student admissions, graduation information and school information through the website.
Automated University Lecture Schedule Generator based on Evolutionary Algorithm yusri ikhwani; Khairan Marzuki; As’ary Ramadhan
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 22 No 1 (2022)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v22i1.2215

Abstract

university is a complicated work so in the implementation it have violation of the constraints and it also takes a lot of time since it is created manually. In this paper evolutionary algorithm (EA) is used to create an effective and feasible schedules based on the real data input that is obtained from each department. The objective functions in EA contribute in gaining the fitness function to solve the constraints problem in the schedule by applying weighting for each hard constraints. The objective function is gained from the total of infringement in each soft constraints addition by score weighting. The genetic operator used in EA is stochastic variation Operator. As far as the reproduction operator is concerned, the tournament selection was used with size 3. Crossover operator is conducted after selection process with crossover probability equal to 0.05 and mutation rate is 0.1. The size of population was set to 9 and stopping criteria algorithm was left run for fitness value = 1. The simulation result shows that EA can create lecture schedules efficiently and feasibly. Moreover, it is also faster with the execution time of the proposed EA is less than 30 and easier than creating manually.
Bandwith Optimization on Hotspot using PCQ Method And L2tp VPN Routing for Online Game Latency Usman Ibnu Affan; Khairan Marzuki; Lalu Zazuli Azhar Mardedi
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 2 (2022): September 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (601.979 KB) | DOI: 10.30812/ijecsa.v1i2.2379

Abstract

VPN L2TP (Layer 2 Tunneling Protocol) is available on one of the services at Mikrotik. L2TP is a development of PPTP and a combination of L2F. The network security protocol and encryption used for authentication is the same as PPTP. However, to communicate, L2TP requires UDP port 1701 so that the security is better, L2TP is connected to IPSec to L2TP/IPSec. An example of its use is for the Windows operating system, which by default the Windows OS uses L2TP/IPSec. However, the consequences in terms of configuration are not as simple as PPTP. The client side must also support IPSec when implementing L2TP/IPSec. In terms of encryption, of course, encryption on L2TP/IPSec has a higher level of security than PPTP which uses MPPE. Traffic passing through the L2TP tunnel will experience overhead. The L2TP protocol is more firewall friendly than other types of VPNs such as PPTP. This is a big advantage if using this protocol, because most firewalls do not support GRE. However, L2TP does not have encryption, so it requires additional services to support higher security. So the author concludes that it will be easier to configure with online games. Online game is a type of computer game that is currently growing and requires a computer network . The networks that are usually used are internet networks or internet wifi and the like and always use current technology, such as modems and cable connections. Therefore, internet service providers (ISPs) must provide stable and fast internet quality. Bandwidth Needs Online games must be supported by an internet network that supports the speed and stability of the internet connection, especially the stability of the latency of the online game itself
Application of Domain Keys Identified Mail, Sender Policy Framework, Anti-Spam, and Anti-Virus: The Analysis on Mail Servers Khairan Marzuki; Naufal Hanif; I Putu Hariyadi
International Journal of Electronics and Communications Systems Vol 2, No 2 (2022): International Journal of Electronics and Communications System
Publisher : Raden Intan State Islamic University of Lampung, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1422.667 KB) | DOI: 10.24042/ijecs.v2i2.13543

Abstract

Viruses spread through email are often sent by irresponsible parties that aim to infect email users' servers. This background encouraged the author to analyze the application of DKIM, SPF, anti-spam, and anti-virus to avoid spam, viruses, and spoofing activities. The goal is for the server to prevent spam, spoofing, and viruses to ensure the security and convenience of email users and prevent the impact of losses caused by them. The design and analysis of DKIM, SPF, anti-spam, and anti-virus applications use the NDLC methodology. The process includes designing spam, spoofing, and virus filtering systems and performing installation and configuration simulations. The next stage is implementation, during which the previously developed system is tested on the spam filtering system, spoofing, and viruses. The last stage is the monitoring stage, where supervision is conducted on the approach to determine its success level. This study concludes that applying the DKIM protocol can prevent spoofing through private and public key-matching methods for authentication. Meanwhile, the application of the SPF protocol can prevent spoofing by authorizing the IP address of the sending server. Additionally, SpamAssassin, ClamAV and Amavisd-New can prevent spam and viruses from entering by checking email headers, bodies, and attachments.
Automation of Open VSwitch-Based Virtual Network Configuration Using Ansible on Proxmox Virtual Environment Khairan Marzuki; Muhammad Idham Kholid; I Putu Hariyadi; Lalu Zazuli Azhar Mardedi
International Journal of Electronics and Communications Systems Vol 3, No 1 (2023): International Journal of Electronics and Communications System
Publisher : Raden Intan State Islamic University of Lampung, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24042/ijecs.v3i1.16524

Abstract

Proxmox has a feature that can build a private network in it. Each host on a private network on Proxmox generally shares physical resources, including network connections using a virtual network, one of which is a VLAN. The Proxmox server supports Open VSwitch as a virtual switch. Open virtual switch, an alternative virtual switch quite popular among cloud developers, can be a solution for managing traffic between Virtual Machins and external communications. The method used in this study is the Network Development Life Cycle (NDLC). After applying the automation engine using Ansible, it overcame the problem, namely speeding up configuration and reducing human error or errors in configuring virtual networks. The automation system can speed up the virtual network management process compared to the manual method based on 5 (five) experiments, namely when the manufacturing operation has an average time of 08 minutes and 42 seconds faster. Whereas when the addition operation has an average faster time of 08 minutes 17 seconds. On the other hand, when the deletion operation has an average time of 42 seconds faster.