cover
Contact Name
Amalia Eka Rakhmania
Contact Email
amaliaeka.rakhmania@polinema.ac.id
Phone
+62341-440424
Journal Mail Official
jtdjurnaljartel@polinema.ac.id
Editorial Address
Jl. Soekarno Hatta No. 9, Malang
Location
Kota malang,
Jawa timur
INDONESIA
Jurnal Jaringan Telekomunikasi
ISSN : 24070807     EISSN : 26546531     DOI : https://doi.org/10.33795
Jurnal Jaringan Telekomunikasi (Jurnal Jartel) merupakan jurnal repositori terbitan Program Studi Jaringan Telekomunikasi Digital, Politeknik Negeri Malang. Jurnal ini bertujuan menyediakan forum bagi para mahasiswa untuk berkontribusi dan menyebarluaskan karya baru inovatif yang berasal dari hasil penelitian di bidang Teknik Telekomunikasi, Informatika, Elektronika, Kelistrikan, maupun Kontrol dan Monitoring. Penerbitan dilakukan sebanyak empat kali per tahun dan seluruh artikel yang diterima dapat diakses secara online (akses terbuka).
Articles 256 Documents
Quality of Service Analysis in Hand Gesture Identification Application Based on Convex Hull Algorithm to Control a Learning Media Mitodius Nicho Swacaesar Setiawan; Nurul Hidayati; Rachmad Saptono
Jurnal Jaringan Telekomunikasi Vol 13 No 2 (2023): Vol. 13 No. 02 (2023) : June 2023
Publisher : Politeknik Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/jartel.v13i2.459

Abstract

The technique of human interaction with computers has developed very rapidly. Body movement is the easiest and most expressive way and hand movements are flexible. We can use gestures as a simple identification command. This research discusses the application of hand gesture reading as a remote control for learning media and analyzes its quality of service using Wireshark software. This system uses a Raspberry Pi as a computing center. Raspberry Pi reads hand gestures using the Convex Hull algorithm, which can read the number of fingers raised on the hand by taking the outermost point in the contour scan of the hand. Each gesture in the form of the number of fingers was allocated to the keyboard commands used to select answers on the learning media. On the learning media side, a quiz system was created that uses keyboard commands to select the answers. Then the Raspberry Pi is connected to the laptop using a third-party application called VNC. Based on QoS measurement results, the throughput result is 62 kbps, which is included in the very good category. Packet Loss of 0%, which is also included in the very good category. The delay of 52.2 ms, which is included in the very good category. Thus, the overall quality of the network can be categorized as very good.
Analysis and Implementation of the ISSAF Framework on OSSTMM on Website Security Vulnerabilities Testing in Polinema Muhammad Alif Nabila; Putri Elfa Mas'udia; Rachmad Saptono
Jurnal Jaringan Telekomunikasi Vol 13 No 1 (2023): Vol. 13 No. 01 (2023) : March 2023
Publisher : Politeknik Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/jartel.v13i1.511

Abstract

Along with the increasing number of websites circulating on the Internet, the security holes that arise are also increasing. The Electrical Engineering Department's website is no exception, especially on the Electrical Engineering Department's website which has never been audited to scan for security holes on the Electrical Engineering Department's website so the level of reliability of the Electrical Engineering Department's website cannot be known. On this basis, a study entitled "Analysis and Implementation of the ISSAF Framework for OSSTMM in Testing Website Security Gaps at Polynema" will be carried out. In this study, the authors tested security holes on the website at Polinema using the ISSAF and OSSTMM frameworks to scan for security holes on the Electrical Engineering Network website. Then from the test results, recommendations will be given to website managers to overcome existing security holes. Before giving recommendations, the author will try to update website security and re-test the updated website. This is done to prove whether updates made to website security can work effectively in overcoming security holes that were previously found. Based on the research that has been done, it is known that on the Electrical Engineering Department's website there are 21 security holes with 7 of them at medium level when testing for security holes using the ISSAF framework. And there are 17 security holes when testing security holes using the OSSTMM framework. The security holes include 10 open ports, DoS, brute-force, and there are security holes in the library used.
Implementation of Data Collection and Payment Control Systems Automatically Using Android -Based QR Code Afifah Nur Fauziah; Abdul Rasyid; Rieke Adriati Wijayanti
Jurnal Jaringan Telekomunikasi Vol 13 No 1 (2023): Vol. 13 No. 01 (2023) : March 2023
Publisher : Politeknik Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/jartel.v13i1.521

Abstract

The wider spread of the use of smartphones is also very helpful for UMKM not only in terms of marketing or sales, but daily operations. On the Senyum Manis cafe the owner of the business owner conducts data on stocks of goods, materials, and prices for drinks manually. When doing the process of collecting the goods manually there is an error in stock calculation so that it takes a long time to check the stock of the item. With this innovation using the application of QR Code which can be used as a label in every stock of goods and beverage materials. In this case the implementation of the RFID tag is also used to get the customer queue number. From this researcher the system is considered successful because the data input can appear in the application , QOS (Quality of Service) test results when uploading data get a 33K throughput value that belongs to the medium category, Packet Loss produces a value of 0.097% which is classified in a very good category, average delay produces a value of 87.4 s which is classified in a very good category . This aims to anticipate changes that will occur, the review is useful to see the condition of whether the system is in accordance with the needs of a sweet smile cafe and whether it is necessary to add or change the existing system in order to keep up with development technology.
Application of MikroTik Firewall for Website Access Restriction and Prevention of DoS (Denial of Service) Attacks on Internet Networks Al-Mahrusiyah Vocational School Lirboyo Asyiq Maulana; Nugroho Suharto; Aad Hariyadi
Jurnal Jaringan Telekomunikasi Vol 13 No 1 (2023): Vol. 13 No. 01 (2023) : March 2023
Publisher : Politeknik Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/jartel.v13i1.547

Abstract

Internet access is so easy that every level of society can access information from the website. If internet access is used positively, it will produce positive things for its users as well. Such as the facilities provided by the management of SMK Al-Mahrusiyah Lirboyo. Students, especially in the Computer and Network Engineering (TKJ) department, get facilities such as PCs in the lab or laptops along with internet access during productive learning hours. In its application in schools, students who are given laptop facilities and internet access do not always use it for learning. Questionnaire data showed that there were other things that were opened, including 37.7% of respondents finding and trying hacking tutorials, 35.8% playing social media, and 34% streaming movies. For this reason, a firewall is needed that restricts students' access to it. The firewall will be formulated with a script on the MikroTik router through the WinBox. The results of firewall tests using a combination of filters and Raw successfully blocked access to social media websites, streaming movies, and anime. The client cannot access and the display in the client browser displays continuous loading. Testing firewalls to ward off DoS attacks was also successful. When tested, LOIC did not send a single request packet and when the CPU resource was checked, the resource was only 1%. The use of firewalls with MikroTik routers is effective in limiting students' access to other things outside of learning. With this, it is hoped that students can better utilize facilities for learning.
Identification of Animal Meat as Halal Product Authentication Using the Box Counting Method Arum Andary Ratri; Ruth Ema Febrita; Indira Nuansa Ratri; I Wayan Suardinata
Jurnal Jaringan Telekomunikasi Vol 13 No 1 (2023): Vol. 13 No. 01 (2023) : March 2023
Publisher : Politeknik Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/jartel.v13i1.634

Abstract

Awareness and the need for authentication or assurance of the authenticity of halal foods is a challenge in many countries, especially in Muslim countries. So, many countries where the majority of the population is Muslim are quite strict in ensuring the sale and purchase of meat, especially in traditional markets. Therefore, this study aim is to find a system to identify the types of meat from the image, such as the initiation of the manufacture of practical technology for the authentication of halal products. In this study, the box-counting method was used to determine the fractal dimension value of the identified animal flesh image. The container counting method uses the texture of the animal’s meat that has unique characteristics of each type. The results of the identification of the animal meat obtained were 24 tests which were correctly identified from a total of 36 test data. This translates into a 66,67% success rate for the system.
Further simulation testing in CoopMAC-U for underwater acoustic sensor networks Muhammad Syirajuddin S.; Nurul Hidayati; Rieke Adriati Wijayanti; Ahmad Wilda Yulianto; Dianthy Marya
Jurnal Jaringan Telekomunikasi Vol 13 No 1 (2023): Vol. 13 No. 01 (2023) : March 2023
Publisher : Politeknik Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/jartel.v13i1.642

Abstract

In order for underwater wireless sensor networks to communicate more efficiently, MAC protocols are needed to control the use of acoustic channels. With the high propagation delay and the limited bandwidth available on the acoustic channel, a specially designed MAC protocol is needed for UWASN (Underwater Acoustic Sensor Networks). In this research, the adaptation of Cooperative MAC for underwater (CoopMAC-U) will be further studied to test the protocol performance. In the previous research, CoopMAC-U was simulated yet the fairness of the transmission was not simulated and tested. In this research, CoopMAC-U will be studied further and improved. The simulation result shows that the Improved CoopMAC-U protocol produces better-normalized throughput than the initial version of CoopMAC-U. The protocol is also proven that it is backward compatible between conventional mode and cooperative mode. For offered load greater than 0.2, both the initial version of CoopMAC-U and the Improved CoopMAC-U result in stagnant normalized throughputs but the improved ones double the value of the initial version.
Implementing Mail Administration Using the Codeigniter Framework Devit Suwardiyanto; Junaedi Adi Prasetyo; Umihanik Nor Aliza; Mohamad Dimyati Ayatullah
Jurnal Jaringan Telekomunikasi Vol 12 No 4 (2022): Vol. 12 No. 04 (2022) : December 2022
Publisher : Politeknik Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/jartel.v12i4.676

Abstract

Administration is the activity of systematically managing and recording data information to provide various information and also make it easier to retrieve it either partially or completely. The administration of mailing at SMK Negeri 1 Glagah is still conventional by recording incoming and outgoing mail using a book and storing the mail in an uncertain places. Some of the problems that can be solved with information technology, one of which is the storage of incoming and outgoing mail at SMK Negeri 1 Glagah. With a mail administration application that uses the CodeIgniter Framework and MySQL database, teachers who being admins or operators can directly enter incoming and outgoing mail data in the application, and they can directly distribute the mail to the receiver person through the application. Teacher who receive the mail will get a notification on the application if there is a new mail coming in. With the Mail Administration Application, staff and school principals can find out the existing mail data easily and computerized with accurate and archived data. The results of the questionnaire recapitulation can be concluded that the overall application quality level is in Good criteria, with a percentage of 84.33%.
Design and Implementation of 2x4 Octagonal Array Patch Microstrip Antennas using T-Slots at 2.4 GHz Frequency for Wifi Applications Muhammad Ibnu Muttaqin; Hendro Darmono; Koesmarijanto Koesmarijanto
Jurnal Jaringan Telekomunikasi Vol 13 No 2 (2023): Vol. 13 No. 02 (2023) : June 2023
Publisher : Politeknik Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/jartel.v13i2.431

Abstract

Wireless communication requires a useful device to transmit and receive electromagnetic waves. WiFi is a particular kind of wireless communication device used to send data over the internet network. The bandwidth and signal coverage of WiFi have significant limitations. As a result, an antenna is utilized to enhance signal reception in order to solve this issue. The research method used is to compare the design of the 2x4 octagonal microstrip array antenna using a T-slot and without the T-slot to see the results of simulation and testing in terms of return loss, VSWR, gain, and bandwidth. The results of bandwidth testing for octagonal microstrip antennas without a 2x4 T-slot array are 32 MHz, while for octagonal microstrip antennas using a 2x4 T-slot array of 40MHz. The octagonal microstrip antenna without a 2x4 T-Slot array has Return Loss of -18.2 dB and a VSWR of 1.280. The 2x4 octagonal T-Slot array microstrip antenna has Return Loss of -17.6 dB and a VSWR of 1.303. The test results 2x4 octagonal array microstrip antenna gain without using T-slot produces the largest gain of 9.55dBi, and the antenna using T-slot produces the largest gain of 12.55dBi.
A Design of Optimization of Goat Sales Based on The Website Taufik Indra P. Taufik; Lis Diana Mustafa; Waluyo Waluyo
Jurnal Jaringan Telekomunikasi Vol 13 No 2 (2023): Vol. 13 No. 02 (2023) : June 2023
Publisher : Politeknik Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/jartel.v13i2.542

Abstract

Currently, goat farming is one of the fastest growing businesses. Developments that occur include buying and selling that can be done through e-commerce available on digital media. E-commerce can increase sales from goat breeders through complete descriptions and goat productivity. Based on the description above, it is necessary tools and systems that can help increase the productivity of goat farmers. The method used is to carry out the process of weighing goats using loadcell, measuring goat body temperatures using MLX614 temperature sensors, and RFID sensors used to detect goat ID, goat type, and weighing time. In addition, it also uses Arduino as a microcontroller and raspberry pi as a server. There are sensor nodes and server nodes where data will be sent from the arduino uno sensor server node raspberry pi 3RF24L01. Communication technique is client server designed for communication between the client node and the server so that error the data transmission smaller. The results of testing tools and systems include testing the accuracy of sensors having several sensor values ??such as RFID, Loadcell and temperature sensors MLX90614 with several points, namely for RFID itself it is concluded that the success rate is read 100%, for the accuracy level of the loadcell sensor with a comparison of some of the scales carried out 10, the average error was 0.77% and the testing accuracy of the MLX90614 temperature sensor with a thermogun comparison, the average error value before calibration was 7.565%, while after calibration, the average error value was 0.507%.
Design Of Building Gear Motion Control Systems On Bicycles Using Voice Comments ilham ramadhan putra; Putri Elfa Mas'udia; Hadiwiyatno Hadiwiyatno
Jurnal Jaringan Telekomunikasi Vol 13 No 2 (2023): Vol. 13 No. 02 (2023) : June 2023
Publisher : Politeknik Negeri Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/jartel.v13i2.544

Abstract

Voice recognition is also connected to the microcontroller connected to the servo motor to move the derailleur rear as a gear drive. The results of research on the gear motion control system on bicycles using voice comments can move in the correct gear position. Storage of voice commands is done 7 times and repetition of the same command no later than 4 times while the fastest 2 times repetition. Test results in a crowded condition obtained 72% success and an average delay of 1.38 seconds and the test results in a quiet state obtained the success of 88% and an average delay of 1.20 seconds. The results of this study indicate that this study is able to move the gear in a moving state with voice commands in a quiet state, the maximum level of voice commands is 96.1 dB and the minimum level of voice commands is 80.2 dB when crowded, the maximum level of voice commands is 101.9 dB and obtained the minimum level of voice commands is 88.1 dB, but this research still has shortcomings, namely if the voice command given is above the maximum voice command level and below the minimum level, the voice command cannot be processed and the gear cannot move. seen from the difference between the maximum crowded state and the maximum quiet state of 5.8 dB and the difference between the minimum crowded state and the minimum quiet state of 7.9 dB.