Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Jurnal Media Computer Science

Computer Network Management Using a Mikrotik Router at the Immigration Office Class I TPI Bengkulu City Al-Hidayat Jambak; Hari Aspriyono; Abdussalam Al Akbar
Jurnal Media Computer Science Vol 1 No 1 (2022): Januari
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1183.67 KB) | DOI: 10.37676/jmcs.v1i1.1909

Abstract

The Bengkulu City Immigration Office Class I TPI Bengkulu City, located in Bengkulu City, on Jl. Development of number 23 Padang Harapan Bengkulu. The problems that occur in the office lie in the network that is not well organized, the internet connection is slow, and the network is less secure because it only uses Wired Equivalent Privacy (WEP) as security protection in the network, and Bandwidth is not evenly distributed throughout each computer. . Based on the results of discussions that have been carried out with the immigration office and immigration IT (data attached). then to solve the problems described above, at the immigration office it is necessary to create an alternative that is used to solve the problem, namely making a network management system that is more secure and regular in bandwidth usage, using a proxy as a router, and bandwidth management management using load balancing techniques. with the PCC (Peer Connection Classifier) method The application of bandwidth management using load balancing techniques at the Bengkulu City TPI class I immigration office was successfully carried out because it distributed traffic loads on two or more ISP (Internet service provider) connection lines. With the implementation of bandwidth management, it can help distribute bandwidth evenly throughout the Client PC. Based on the tests conducted at the Immigration Office Class I TPI Bengkulu city, it can be concluded that the implementation of bandwidth management has been successful, where PC Clients can access the internet evenly, and the use of internet access is more scheduled during working hours, rest hours, and outside working hours.
Implementation of the Turbo Boyer Moore Method in Searching Thesis Titles at the Website-Based Faculty of Economics Gustian Febri Syah Putra; Juju Jumadi; Abdussalam Al Akbar
Jurnal Media Computer Science Vol 2 No 2 (2023): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v2i2.4377

Abstract

Every year, students are required to complete a final project in the form of a thesis as one of the graduation requirements. However, in determining a thesis title that is relevant to the chosen scientific field, students often experience difficulties. The number of thesis titles available in libraries and websites can confuse students in choosing the right title. One method that can be used to achieve this goal is the Turbo Boyer-Moore pattern search method. Turbo Boyer-Moore is one of the efficient pattern matching algorithms to search for certain words or phrases in text. From the results of the tests carried out, it can be concluded that the implementation of the designed program in searching and detecting the same title with a similarity percentage.
Android-Based Cryptography Applications Using The Rail Fence Cipher Algorithm Raden Diky Zailani; Khairil Khairil; Abdussalam Al Akbar
Jurnal Media Computer Science Vol 2 No 2 (2023): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v2i2.4569

Abstract

Android-based cryptographic applications using the rail fence cipher algorithm are made using the Java programming language (AndroidStudio), the PHP programming language (JSON File Web Service) and the MySQL database. This application has a url link for storing PHP files and message data in the database, while the url link is http://railfencecipher.my.id/. An Android-based cryptographic application using the rail fence cipher algorithm has been uploaded to Google Playstore by entering the rail keyword fence cipher. An android-based cryptographic application using the rail fence cipher algorithm can be used to assist communication between the two parties, both the sender and the recipient of the message. In addition, this application has implemented a rail fence cipher algorithm that is used to maintain the confidentiality of the message stored in the application's database. The records in the message body column in the database are in random form, therefore they cannot be read. This of course makes the application maintain the confidentiality of the messages sent, because there is a process of scrambling (encryption) of the message. Based on the results of the tests that have been carried out, the functionality of the android-based cryptographic application using the rail fence cipher algorithm runs well as expected and the message sent between the recipient and the sender is kept confidential because the message is encrypted.
The Design And Implementation Of Computer Network Monitoring And Security System Using Linux Ubuntu Server Anisa Dewi Sahara; Sapri Sapri; Abdussalam Al Akbar
Jurnal Media Computer Science Vol 3 No 1 (2024): Januari
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v3i1.5328

Abstract

One system that can carry out network monitoring is using ntopng tool or application. Linux Ubuntu Server is an open source operating system, this operating system is very good for use as a server because it does not require high hardware specifications and can also be obtained for free because it is open source. Ntopng in carrying out network monitoring is very well applied at SMK S 1 Pembangunan of Bengkulu City, this is because at SMK S 1 Pembangunan of Bengkulu City, the computer network in the computer and visual laboratory is used by students, both for learning and teaching activities as well as the media used by students to fill their free time. When monitoring the network, Ntopng can do this based on the IP address of the device connected to the network