Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : JURTEII: Jurnal Teknologi Informasi

Analisis Keamanan Jaringan Wi-Fi Terhadap Serangan Packet Sniffing di Universitas PGRI Sumatera Barat Fatimah Fatimah; Thomson Mary; Anggri Yulio Pernanda
JURTEII: Jurnal Teknologi Informasi Vol 1, No 2 (2022)
Publisher : Universitas PGRI Sumatera Barat

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1353.589 KB) | DOI: 10.22202/jurteii.2022.5707

Abstract

Universitas PGRI Sumatera Barat has wi-fi which does not rule out attacks on wi-fi networks carried out by hackers. Network Security is a protector in a network system in the process of preventing unauthorized and irresponsible network users. This research includes descriptive research. Descriptive research method is a research method that aims to explain an event. This research was conducted by testing and analyzing the test results on network security using Wireshark and Ettercap applications (Kali Linux OS). The results of this study in the form of a wi-fi network security system in building A1, building B1, building D1 at University of PGRI West Sumatra is good. During the scan for hosts, the IP of the laptop victim of the packet snffing attack was not found.
Klasterisasi Minat Baca Mahasiswa Menggunakan Metode K-Means Edwar Rosman; Fathurrahman Kurniawan Ikhsan; Anggri Yulio Pernanda
JURTEII: Jurnal Teknologi Informasi Vol 1, No 2 (2022)
Publisher : Universitas PGRI Sumatera Barat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22202/jurteii.2022.6034

Abstract

What can do one of the ways to increase student interest in reading by increasing the collection of books in the Kerinci IAIN library. But so far, determining the collection of books to be added is still done manually, so it takes a long time besides that the process of adding books which refers to the statistics of borrowing the most books, makes the collection of books less diverse. For this reason, a book collection clustering method is needed using the k-Means method to obtain optimal results. Book collections are grouped into 3 clusters that are, considerations that need to be added, priorities to be added, and not need to be added can be a reference for librarians in maximizing the process of adding book collections.
Implementation of INLISLite in the Library of SMA Negeri 1 Padang Sago Lisa Davici; Ade Pratama; Anggri Yulio Pernanda
JURTEII: Jurnal Teknologi Informasi Vol 2, No 2 (2023): IN-PRESS
Publisher : Universitas PGRI Sumatera Barat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22202/jurteii.2022.6703

Abstract

This study aims to implement a computerized library information system using INLISLite, and find out the results of the validity of its use in libraries. This research uses the method of reuse based software engineering to be used in the implementation stage, using parallel conversion techniques. The results showed that the INLISLite-based library information system that has been implemented can bring many benefits to libraries in managing collections faster and saving time, especially in inputting data such as member registration, book collection, book borrowing, book returns, and reporting. The validity of this system has been tested by providing questionnaires to validators and system users, which showed that the system and beta tested assessment of all validation results reached an average of 90.14% with the category of very valid.