cover
Contact Name
Marlindia Ike Sari, S.T., M.T.
Contact Email
ike@tass.telkomuniversity.ac.id
Phone
+6281321405381
Journal Mail Official
ijait@tass.telkomuniversity.ac.id
Editorial Address
International Journal of Applied Information Technology (IJAIT) Fakultas Ilmu Terapan Universitas Telkom; Gd. Selaru Lt. 3 - Jl. Telekomunikasi No. 1 Bandung
Location
Kota bandung,
Jawa barat
INDONESIA
IJAIT (International Journal of Applied Information Technology)
Published by Universitas Telkom
ISSN : -     EISSN : 25811223     DOI : https://doi.org/10.25124/ijait
Core Subject : Science,
International Journal of Applied Information Technology covers a broad range of research topics in information technology. The topics include, but are not limited to avionics, bio medical instrumentation, biometric, computer network design, cryptography, data compression, digital signal processing, embedded system, enterprise information system, green energy & computing, interactive programming, internet of things, IT management and governance, IT-business strategic alignment, mobile and ubiquitous computing, monitoring system and techniques, multimedia processing, network security, power electronics, remote monitoring and sensing device, robotics and avionics, signal processing circuits, smart cities and smart grids, telecommunication devices & methods, telecommunication fundamentals.
Articles 8 Documents
Search results for , issue "Vol 1 No 01 (2017)" : 8 Documents clear
Prototype Design of Remote Monitoring Software of Street Lighting System Ely Rosely
IJAIT (International Journal of Applied Information Technology) Vol 1 No 01 (2017)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v1i02.873

Abstract

Street lightings are used in public area to support people activities throughout the night. Maintenance activities are needed to keep the availability of street lights. The advanced of technologies give ideas to create such tools to support the maintenance. Monitoring and controlling tools are proposed to maintain the availability of street lightings. This paper describes a design of web-based remote monitoring software of street lighting. The street lights should be equipped with GPRS module in transmitting data to the software. This research follows three steps: literature review, analysis, and design. The design tools such as BPMN, use case, ERD, and mockup are used to describe the system. The software can be used to monitor the street lights in the widespread area without having to come to the location.
Performance Analysis of Frame Relay Network Using OSPF (Open Shortest Path First) and MPLS (Multi-Protocol Label Switching) based on GNS3 Andi Harits; Moch. Fahru Rizal; Periyadi Periyadi
IJAIT (International Journal of Applied Information Technology) Vol 1 No 01 (2017)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v1i02.869

Abstract

Communication today requires a secure, reliable and efficient network, especially on enterprise networks. This research focuses on combining advantages from Frame Relay, MPLS and OSPF into a modeled multi-site network. The combination is compared to the original OSPF network and analyzed for its throughput, packet loss, and delay. To meet the demand for efficient and resilient network, and to emphasize the advantages of MPLS-OSP as well as to avoid traffic shifting, specific network topology models are applied: full mesh with virtual circuit in core network connected to OSPF nodes for the rest. From analysis and comparison of network quality values obtained at, this combination attests to be reliable and robust network architecture without trading off its efficiency. The average throughput value of the combination networks was 18.47 bps, which is better compared to the OSPF. The average delay and packet loss from combination network also show better results, which are 59.90ms and 2.01% respectively. The results shows that the combination of Frame Relay, OSPF andMPLS generates better performance as well as significant improvement in network security.
Implementation of Management and Network Security Using Endian UTM Firewall Fikri Muhammad Arifin; Giva Andriana Mutiara; Ismail Ismail
IJAIT (International Journal of Applied Information Technology) Vol 1 No 01 (2017)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v1i02.874

Abstract

Internet is a source of information which is widely used today. However, the mode of internet abused becomes more various and unavoidable. The internet abused can be done from external or internal networks. Unified Threat Management (UTM) is one of a good solution to secure the networks, because it has several security features such as firewall, proxy, Intrusion Prevention System (IPS) and several other security features in one package. Endian is an UTM distro which is an open source in large community. Besides having some security features, Endian also has some network management features such as DHCP, routing, and VPN. This research put Endian as the center of a network topology that connected to the internal network/LAN, DMZ Server, and Internet Network/WAN. The tests are conducted in the form of implementation of DHCP feature, content filtering, port restrictions on interzone, and the response of the IPS features that exist on the Endian while receiving the attack. The results showed that Endian UTM is quite well in maintaining the security of the networks.
Development IT Adoption Method for E-learning in Merged University Bayu Rima Aditya; Mary Handoko Wijoyo
IJAIT (International Journal of Applied Information Technology) Vol 1 No 01 (2017)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v1i02.870

Abstract

This research presents an overview to develop an IT adoption method for e-learning in a Merged University. The development of IT adoption method in the Merged University is done by adjusting the gap between three elements: IT maturity level (in this case IT for elearning), category adopter of each Merged University and IT adoption criteria of individual actors of adoption. The maturity level of IT maturity level refers to Gartner, Hype Cycle, and Priority Matrix. Classification groups refer to adopter categories according to Rogers. The adoption model uses UTAUT model. For the process, a priority calculation method utilizes Analytical Hierarchy Process (AHP). IT adoption method for e-learning in a Merged University has been tested and can be applied Telkom University, formed from four universities.
Proposed IT Governance at Hospital Based on COBIT 5 Framework Heru Nugroho
IJAIT (International Journal of Applied Information Technology) Vol 1 No 01 (2017)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v1i02.875

Abstract

Information Technology (IT) Governance in Hospitals describe how to create an IT governance process that increases the number of IT projects that support the strategy of a hospital and are completed on-time and on- budget. Good IT governance aligns decisions about the use of IT with desired behaviors and organizational objectives. The existence of good IT governance at Hospitals is expected to provide improvement on quality,functionality, and ease of use of the service. Enablers in COBIT 5 framework can be applie in practical situations and can be used to implement effective and efficient information governance and data management of IT governance for Hospital. In this paper, we propose IT governance in Hospital base on COBIT 5 framework. In the preparation of the proposed IT governance model, the enablers that exist in COBIT 5 framework is used as a determining factor. For performing the optimization of IT services to achieve the normal vision andmission uses base on a model of IT governance for a hospital.
An Experimental Connectivity Performance of Simple Wireless Mesh Implementation Using Wireless Distribution System (WDS) Dicky Muhammad; Gita Indah Hapsari; Giva Andriana Mutiara
IJAIT (International Journal of Applied Information Technology) Vol 1 No 01 (2017)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v1i02.871

Abstract

Today wireless technology grows rapidly, especially in the field of telecommunications and communications. Computer networks now widely utilizes wireless. Wireless Mesh Network is one of the method which is use to communicate computer wirelessly. One important factor in application of wireless network is how to extend wireless signal coverage. Wireless Distribution System is one way to expand the wireless network by mean of wireless interconnection of access point on the network IEEE 8022.11. This study suggests how to build a simple wireless computer network using WDS technology and describes connectivity performance and its signal coverage. The test result of connectivity performance shows that the connectivity between two computers work properly for reliability and multi SSID testing. However, the connectivity was not success in multichannel testing. Furthermore the test result of coverage shows that the range of wireless signal coverage reaches 39 meters with different circumstance room.
Scrambling and De-Scrambling Implementation Using Linear Feedback Shift Register Method on FPGA Manda Lurina; Sugondo Hadiyoso; Rina Pudji Astuti
IJAIT (International Journal of Applied Information Technology) Vol 1 No 01 (2017)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v1i02.876

Abstract

Digital broadband communications require a fast, functional and efficient system. In a digital communication system, a long sequence of bits '0' or '1' will inherits the loss of bit synchronization, and hence it can cause the false detection on the receiver. To avoid this, long sequence of bits will be randomized first so that long sequence of bits '0' or '1' can be removed. This randomization process is called scrambling and the circuit that works for the process is a scrambler. In the receiver there is a descrambler that serves to return the bits to their original information. This paper presents a design of scrambler and descrambler using a combination of Linear Feedback Shift Register (LFSR) with 15 registers, XOR logic gates, and Pseudo Random Binary Sequence (PRBS) generator structure with polynomial 1 + x14 + x15. One of the two main parts of LFSR is the shift register while the other is the feedback. In LFSR, the bits contained within the selected position in the shift register will be combined in a function and the result will be put back into this register's input bit. Feedback also makes the system more stable and no error occurrence. Then special tap is taken from a certain point in XOR and returned as a feedback register. The system is implemented on FPGA board Altera De0-Nano EP4CE22F17C6 Cyclone IV E. Resource memory required <1% of available memory. Bit rate that can be achieved with clock speed 50MHz is 335570.47 bps.
Simulation of Memory-Based 1024-Point Fast Fourier Transform for Broadband Wireless Access Technology on FPGA Dinda Pramanta; Denny Darlis; Iswahyudi Hidayat
IJAIT (International Journal of Applied Information Technology) Vol 1 No 01 (2017)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v1i02.872

Abstract

The limited radio frequency spectrum that can be used for transmission leads to bandwidth and power efficiency being a key requirement in the development of wireless access technology from 3G to 5G today. Data communication technology also requires this as mentioned on high speed network standards such as DSL, WLAN and WMAN with its products ADSL, WiFi and Wimax. In the last few decades we have seen the evolution of the Orthogonal Frequency Division Multiplexing (OFDM) modulation technique used in the technologies mentioned earlier to this day. This technique is regarded as a standard technology for broadband wireless access technology. In hardware implementation, the most preferred by many researchers is the Field Programmable Gate Array chip, as it can be reconfigured. The OFDM technique can be easily implemented because it uses Fast Fourier Transform (FFT) algorithms that are coding and programming capable of reducing the computational time of Discrete Fourier Transform. This paper discusses the implementation of the memory-based 1024-point IFFT / FFT for BWA communications. The design is focused on synthesizing and implementing the system block FFT 1024-point radix-4 using Decimation in Frequency (DIF) method. Implementation for IFFT / FFT 1024-point resource usage slice number 1%, the number of slice flip-flop 1%, the number 4 LUT (Look Up Table) 1%, and the number of IOB 27%. of the FPGA are used.

Page 1 of 1 | Total Record : 8