Claim Missing Document
Check
Articles

Found 5 Documents
Search

Randomness of encryption keys generated by super H-antimagic total labeling Antonius Cahya Prihandoko; Yudha Alif Auliya; Diksy Media Firmansyah; S Slamin
Indonesian Journal of Combinatorics Vol 4, No 1 (2020)
Publisher : Indonesian Combinatorial Society (InaCombS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/ijc.2020.4.1.3

Abstract

SuperH-antimagic total labeling (SHATL) can be utilized to generate encryption keys. The keys are then used to establish the improved block and stream ciphers. In these ciphers, different blocks were encrypted by the different keys, but all block keys were connected one another. These conditions make the developed cryptosystems more secure and require less keys storage capacity compared to the ordinary block and stream cipher. The randomness of the generated keys, however, still need to be tested. The test is necessary to ensure that there is no specific pattern that can be utilized by any intruder to guess the keys. This paper presents the randomness tests applied to all key sequences generated by both the improved block scheme and the stream based scheme.
Wireless Area Network Infrastructure Model on Gili Ketapang Island Using Open Shortest Path First Routing Protocol Diah Ayu Retnani Wulandari; Yudha Alif Auliya; Antonius Cahya Prihandoko; Slamin Slamin; Mohammad Zarkasi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 7, No. 1, February 2022
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v7i1.1373

Abstract

This study aims to model the network for the archipelago and tourism on Gili Ketapang. The network model implemented is a wireless WAN network infrastructure to meet the needs of a reliable tourist area. This model implements DHCP and OSPF as the routing protocol. The methodology used is to perform simulations using a packet tracer in designing the network through several scenarios with parameters for assessing delay and packet loss. At the time of implementation, it began with a cluster area with the parameters of the number of business units spread across each hamlet. This network design utilizes OSPF, DHCP, and wireless network infrastructure resulting in the most considerable delay of 0.021 and packet loss of less than 3% so that it is included in the excellent category. The implementation results using the OSPF routing protocol, several paths do not go through the shortest path because they have to go through the backbone area, but because OSPF is a link-state, the cost is meager than the shortest path.
Pelatihan Pemanfaatan Google Sites dan Integrasi Nama Domain Sebagai Sarana Publikasi Informasi pada TKIT Buah Hati Kita Jember Mohammad Zarkasi; Priza Pandunata; Muhammad 'Ariful Furqon; Diah Ayu Retnani Wulandari; Yudha Alif Auliya
Ilmu Komputer untuk Masyarakat Vol 3, No 1 (2022)
Publisher : Universitas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkomas.v3i1.1255

Abstract

Taman Kanak-kanak Islam Terpadu (TKIT) Buah Hati Kita Jember terletak kurang lebih 2 km dari Universitas Jember. Dalam kegiatan penerimaan siswa baru, selama ini TK masih melakukan publikasi dengan cara-cara yang konvensional, seperti dengan memasang banner dan menyebar pamphlet dengan mencantumkan kontak telepon TK bagi orang tua yang menginginkan informasi lebih lanjut. Hal ini dinilai kurang efisien pada kondisi masyarakat yang semakin terbiasa menggunakan perangkat berbasis teknologi informasi dalam kesehariannya berupa smartphone dan komputer. Oleh karena itu, pada kegiatan Pengabdian kepada Masyarakat (PkM) ini dilakukan pelatihan kepada para guru di TKIT Buah Hati Kita Jember dalam memanfaatkan layanan Content Management System (CMS) yang disediakan oleh Google, yaitu Google Sites untuk membuat web profile TKIT. Melalui web profile tersebut, pihak TKIT secara mandiri dapat mempromosikan keunggulan sekolah, album kegiatan dan juga pengumuman penerimaan siswa baru dengan cara menuliskannya pada Google Sites. Selain itu, tim pelaksana pengabdian juga membantu mengintegrasikan web profile yang telah dibuat dengan nama domain dengan akhiran .sch.id agar web tersebut lebih mudah diakses dan diingat oleh masyarakat.
Detail Engineering Deisgn Perancangan Detail Engineering Design Infrastruktur Jaringan Komputer RSUD X Kota Y Aditya Ari Fikri; Diah Ayu Retnani Wulandari; Yudha Alif Auliya
INFORMAL: Informatics Journal Vol 7 No 3 (2022): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v7i3.35144

Abstract

Detailed Engineering Design Computer networks in hospitals are complete planning drawings that include architectural drawings and detailed elements that support the implementation of computer networks and are supported by technical documents in them. DED is required in hospitals as an attachment to the Network infrastructure submission document used for all hospital operations, health services, and other purposes. The method used in analyzing and designing the Detail Engineering Design is using the Gap Analysis Method (GAP). The proposed recommendations include network topology based on an analysis of existing needs and DED results for the computer network of X City Y Hospital. The topology testing parameters consider QOS (Quality of Service), which consists of ping testing on all devices, Traffic Block Firewall, and web server access. The test results were carried out using three parameters, namely the ping test, traffic block, and web server access, where all tests have been successful and are by the steps in carrying out the test.
Rancang Bangun Chatbot Pengaduan Kekerasan Perempuan Anak Dengan Metode Fuzzy String Matching Dan Enhanced Confix Stripping Stemmer Al Muhtadi Billah; Diah Ayu Retnani Wulandari; Yudha Alif Auliya
INFORMAL: Informatics Journal Vol 8 No 2 (2023): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v8i2.42310

Abstract

Violence against women is a serious issue affecting many individuals in society. In Indonesia, including Kota Probolinggo, the number of cases of violence against women remains high. This research aims to design a chatbot application as a means for reporting violence against women and children (VAWC) in Kota Probolinggo. The application provides an anonymous and safe space for victims to report their complaints without revealing their identities. Additionally, the chatbot delivers information and education about different types of violence against women and preventive measures. The development of the chatbot application utilizes Fuzzy String Matching, Enhanced Confix Stripping Stemmer, and preprocessing methods to enhance data search accuracy and provide appropriate responses to users. The testing results show that the chatbot offers responses with satisfactory accuracy. Leveraging AI technology in the form of a chatbot is expected to provide an effective solution in addressing and preventing violence against women, offering a secure and anonymous platform for victims to report incidents. The application is envisioned to offer better support and assistance to victims of violence. The chatbot application implements fuzzy string matching, the Levenshtein distance algorithm, and Enhanced Confix Stripping Stemmer to process user input before matching it with the database. During the Enhanced Confix Stripping Stemmer process, sentences are transformed into an array of basic words, enhancing the accuracy of data matching when using fuzzy string matching and the Levenshtein distance algorithm. Testing results indicate a 4.77% difference between manual calculations and the chatbot system. This difference may be attributed to variations in text processing and other factors.