cover
Contact Name
Brian Rakhmat Aji
Contact Email
brianetlab@gmail.com
Phone
-
Journal Mail Official
ijid@uin-suka.ac.id
Editorial Address
-
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
IJID (International Journal on Informatics for Development)
ISSN : 22527834     EISSN : 25497448     DOI : -
Core Subject : Science,
One important point in the accreditation of higher education study programs is the availability of a journal that holds the results of research of many investigators. Since the year 2012, Informatics Department has English language. Journal called IJID International Journal on Informatics for Development. IJID Issues accommodate a variety of issues, the latest from the world of science and technology. One of the requirements of a quality journal if the journal is said to focus on one area of science and sustainability of IJID. We accept the scientific literature from the readers. And hopefully these journals can be useful for the development of IT in the world. Informatics Department Faculty of Science and Technology State Islamic University Sunan Kalijaga.
Arjuna Subject : -
Articles 5 Documents
Search results for , issue "Vol. 6 No. 2 (2017): IJID December" : 5 Documents clear
Design of Decision Support System Selection of Beach Tourism Object in GunungKidul using Fuzzy AHP Method Yudi Istianto; Bambang Sugiantoro
IJID (International Journal on Informatics for Development) Vol. 6 No. 2 (2017): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (355.233 KB) | DOI: 10.14421/ijid.2017.06203

Abstract

The tourism industry is currently one of the important assessments for a certain region. Gunungkidul has a lot of of beach tourism potentials until visitors are confused to choose the right beach. The purpose of this research is to analyze and apply Fuzzy Analytical Hierarchy Process method in calculating the selection of beach tourism object in Gunungkidul with eight main criteria into a website.Multi Criteria Decision Making (MCDM) is a decision-making method to establish the best alternative of a number of alternatives based on several criteria that will be considered. One method of MCDM is the Fuzzy Analytical Hierarchy Process method. Fuzzy Analytical Hierarchy Process is a method of developing Analytical Hierarchy Process (AHP), which can describe unclear decisions and minimize uncertainty on AHP. Fuzzy approach, especially triangular fuzzy number to AHP scale, is expected to minimize uncertainty so that expected result was obtained more accurately.The decision support system for choosing a beach resort in Gunungkidul has been successfully built by applying the Fuzzy Analytical Hierarchy Process method. The calculation of Fuzzy Analytical Hierarchy Process method with the same computer result with manual calculation. The testing system was done using Black Box method by testing Alpha and Betha. From the results of system testing, it was known that the average result of the overall function score was 104 which was on rating scale 97.51 - 120 (Very Good).
Wireless Access Points Placement Analysis on WI-FI Signal Coverage with BAYESIAN Probability Method Mahbub Puba Fawzan; Bambang Sugiantoro
IJID (International Journal on Informatics for Development) Vol. 6 No. 2 (2017): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (595.86 KB) | DOI: 10.14421/ijid.2017.06204

Abstract

Wireless networks in a room are strongly influenced by interference. To overcome the interference and so that the performance from the wireless network is getting better, then optimization is done. There are several types of propagation that can interfere with the performance of wireless networks, which include the number of transmitters (access points), free space loss, Received Signal Strength (RSSI), coverage that can be served, measuring attenuation on barriers (concrete walls, soft partitions, doors, and floors).This research is an analytical study where the purpose of this study is to determine the position of access point a good in the Shari'ah Faculty Building and the Law using the method of Bayesian probability. The first stage of this research is to determine the distance of the signal reception to find out the strength of the signal with manual random sampling so that the data obtained varies. The second stage is to determine the position of the access point with a choice of several points so that the best position can be compared based on the plan of the Syari'ah Faculty and Law Building. The last step is calculating probability by the method of Bayesian probability.The results of this study are the position of the access point best on the 3rd floor, namely at position B with a probability value of 13 while on the 4th floor the position of access the point best in position A with a value of 10, position D with a value of 13 and position E with a value of 13. The most influential propagation in the Syari'ah Faculty Building and the Law is a concrete wall with a size of 60% reducing the magnitude of the signal emitted.(Abstract)
Design and Implementation of Network Monitoring System on Local Area Network with Social Media Twitter Notification Bima Putra Winasis; Bambang Sugiantoro
IJID (International Journal on Informatics for Development) Vol. 6 No. 2 (2017): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (571.372 KB) | DOI: 10.14421/ijid.2017.06201

Abstract

A network administrator has responsibility and important role in a computer network. Network security and its services depend on the treatment performed by the administrator. Network administrators who understand the workings of a computer network is needed to obtain the necessary computer networks. One of the obligations of the administrator is to monitor a network which can be done by using the system monitor. Monitoring system is a task to check the computer, operating system and services of computer network to keep the network always work in optimal conditions. In an effort to monitor the condition of the network, one of the technologies that can be used is the notification on twitter social media for providing information in real time to the administrator. Twitter is a social media that is very widely used, free, and secure. Moreover, the use of social media twitter experiencing rapid development. Therefore, the selection of twitter as a medium for the use of the notification is expected to be the right strategy. This system will be made by sending notification via twitter when a LAN network is disconnected or attacked by intruders.Results from the development of systems that have been made based on testing the functionality of the system shows all functions of the system has been running well. While usability testing calculation of the total score of the test system interface to get a score of 38.75 out of a maximum scale of 50. This score is in the range 34-42 value (Satisfied) which means that the respondents were satisfied with the system interface. Therefore, this interface is good to be implemented in the system.
Availability Analysis with Failover Computer Cluster Method Case Study in Academic Information System of UIN Sunan Kalijaga Rizki Dewantara; Siska Iskandar; Agung Fatwanto
IJID (International Journal on Informatics for Development) Vol. 6 No. 2 (2017): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (467.063 KB) | DOI: 10.14421/ijid.2017.06205

Abstract

High-performance academic information systems and high availability services are requirement in every university. One of many reasons is for anticipation damage and fail server disrupting server network performance. Failover computer cluster method is applied to two servers: primary server as main server and secondary server as backup server. Four stages will be carried out: First: Installation and support software configuration. Second: installation and failover cluster configuration. Third: installation and Distributed Replicated Block Devices (DRBD) configuration. Forth: server testing with siege and nettool.This research conducted by doing server test before and after high availability. As if the main server has a system failure, it will automatically backup the main server to backup server to minimize user accessed data failures. System uses Ubuntu 16.04 LTS operating system. Based on the test data, it is acquired two data: packet data and data response time (ms). Data packets acquired from this research are: 233.3 average data sent; 228.3 average data received; 2.3 average data lost; while 59.7 average response time (ms) is showed; 2.7 minimum average; 633.8 maximum average. Data sent is 120B per data.
Analysys and Implementation IEEE 802.1Q to Improve Network Security Muhammad Syaeful Bahry; Bambang Sugiantoro
IJID (International Journal on Informatics for Development) Vol. 6 No. 2 (2017): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (585.9 KB) | DOI: 10.14421/ijid.2017.06202

Abstract

The development of technology today is very fast one only with the existence of the use of the computer network. This can be seen in the increasing number of organizations or companies that use the computer network to facilitate the flow of information within the organization or the company. But with the abundance of the use of network technology is only advancing network progressed only, but not maximize resource so that sometimes allows for the problem or traffic network. For that can be needed by network development solution made VLAN topology using NDLC method (Network Development Life Cycle). Vlans are able to improve the capabilities of the network and can reduce the amount of data that is sent to a destination that does not need to be so that the traffic in the network will be reduced by itself. In addition there is another reason why requires a VLAN is to reduce the possibility of the misuse of access rights. It can use the Mode Access. With the Mode will divide each Host into the VLAN each. With the existence of a VLAN shows can increase network ability as much as 13.4 %. With the data shows that a VLAN successful and able to make the network more efficient. In the VLAN network security aspect is able to optimize network security with the existence of access mode, so that the new host are not capable of entering it into the existing network topology.

Page 1 of 1 | Total Record : 5