首页 > 最新文献

IJID International Journal on Informatics for Development最新文献

英文 中文
Comparison of Dijkstra dan Floyd-Warshall Algorithm to Determine the Best Route of Train Dijkstra-dan-Floyd-Warshall算法确定最佳列车路线的比较
Pub Date : 2019-01-07 DOI: 10.14421/IJID.2018.07202
Tri Setya Dermawan
Abstract - The best route is the path found based on the minimum price of a train journey using the Dijkstra and Floyd-Warshall algorithms. This study aims to find out the comparison of Dijkstra and Floyd-Warshall algorithms in finding the best path on a train trip. The results of route discovery will be displayed in a web-based application using the PHP programming language and MySQL database. The results of these two algorithms are compared using 4 parameters: time complexity, memory complexity, level of completion and level of optimization.Based on the comparison results from the implementation that Dijkstra's algorithm has a time complexity of 81 faster than the Floyd-Warshall algorithm. For the memory complexity, Dijkstra's algorithm uses a memory of 512616 bytes less than the Floyd-Warshall algorithm for the executive category. Whereas for the economic category the Dijkstra algorithm uses a memory of 482488 bytes less than the Floyd-Warshall algorithm. For the level of completion of the two algorithms, there is no error. In addition, for the level of optimization the Dijkstra algorithm has advantages in this study, namely the data used is dynamic or variable data in each stage of the process.
摘要-最佳路线是使用Dijkstra和Floyd-Warshall算法根据火车旅行的最低价格找到的路径。本研究旨在比较Dijkstra和Floyd-Warshall算法在火车旅行中寻找最佳路径的效果。路线发现的结果将使用PHP编程语言和MySQL数据库显示在基于web的应用程序中。使用4个参数对这两种算法的结果进行了比较:时间复杂度、内存复杂度、完成程度和优化程度。基于实现的比较结果,Dijkstra算法的时间复杂度比Floyd-Warshall算法快81。就内存复杂性而言,Dijkstra的算法在执行类别中使用的内存比Floyd-Warshall算法少512616字节。而对于经济类别,Dijkstra算法使用的内存比Floyd-Warshall算法少482488字节。对于这两种算法的完成程度,没有错误。此外,就优化水平而言,Dijkstra算法在本研究中具有优势,即所使用的数据是过程每个阶段的动态或可变数据。
{"title":"Comparison of Dijkstra dan Floyd-Warshall Algorithm to Determine the Best Route of Train","authors":"Tri Setya Dermawan","doi":"10.14421/IJID.2018.07202","DOIUrl":"https://doi.org/10.14421/IJID.2018.07202","url":null,"abstract":"Abstract - The best route is the path found based on the minimum price of a train journey using the Dijkstra and Floyd-Warshall algorithms. This study aims to find out the comparison of Dijkstra and Floyd-Warshall algorithms in finding the best path on a train trip. The results of route discovery will be displayed in a web-based application using the PHP programming language and MySQL database. The results of these two algorithms are compared using 4 parameters: time complexity, memory complexity, level of completion and level of optimization.Based on the comparison results from the implementation that Dijkstra's algorithm has a time complexity of 81 faster than the Floyd-Warshall algorithm. For the memory complexity, Dijkstra's algorithm uses a memory of 512616 bytes less than the Floyd-Warshall algorithm for the executive category. Whereas for the economic category the Dijkstra algorithm uses a memory of 482488 bytes less than the Floyd-Warshall algorithm. For the level of completion of the two algorithms, there is no error. In addition, for the level of optimization the Dijkstra algorithm has advantages in this study, namely the data used is dynamic or variable data in each stage of the process.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49413468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis of QOS VLAN Based on Djikstra’s Algorithm on Open Shortest Path First(OSPF) 基于Djikstra开放最短路径优先(OSPF)算法的QOS VLAN分析
Pub Date : 2019-01-07 DOI: 10.14421/IJID.2018.07205
M. Alfani, B. Sugiantoro
As an institution engaged in SMK Muhammadiyah 03 Yogyakarta  requires network infrastructure as a medium of communication. Infrastructure in SMK Muhammadiyah based VLAN but still using static routing and star topologies as a medium of communication between router. This leads to the main router performance overburdened  which makes the network infrastructure down. It is necessary to reform the network, especially in the communication protocol on the router by using protocol Open Shortest Path First(OSPF). OSPF is a link state-based routing protocol that uses Dijkstra’s algorithm to find the best path is taken as a communication medium. Makin paths made by considering various aspects of the parameters that affect network traffic. OSPF can minimize down on network infrastructure caused by the buren of a huge traffic to maintain the stability of traffic on communication lines. The results using the method QOS on infrastructure with the OSPF protocol can be classified very nice. It is obtaine from the measurement parameter delay <150 ms, packet loss (0%), an bandwidth has a very goo category based on the standard TIPHON. From the results of the QOS parameters also obtained a decrease in delay value by 31% on infrastructure with the OSPF protocol. This proves that the network traffic is more stable when using OSPF protocol.
作为一家从事SMK Muhammadiyah 03 Yogyakarta的机构,需要网络基础设施作为通信媒介。基于SMK Muhammadiyah VLAN的基础设施,但仍使用静态路由和星形拓扑作为路由器之间的通信媒介。这导致主路由器性能负担过重,从而导致网络基础设施瘫痪。利用开放式最短路径优先协议(OSPF)对网络进行改造,特别是在路由器上的通信协议方面。OSPF是一种基于链路状态的路由协议,它使用Dijkstra的算法来寻找最佳路径。通过考虑影响网络流量的参数的各个方面而形成的Makin路径。OSPF可以最大限度地减少由于大量流量的增加而对网络基础设施造成的停机,以保持通信线路流量的稳定性。在OSPF协议的基础设施上使用QOS方法的结果可以被分类为非常好的结果。它是从测量参数延迟<150ms、分组丢失(0%)中获得的,带宽基于标准TIPHON具有非常好的类别。根据QOS参数的结果,在使用OSPF协议的基础设施上,延迟值也降低了31%。这证明了使用OSPF协议时网络流量更加稳定。
{"title":"Analysis of QOS VLAN Based on Djikstra’s Algorithm on Open Shortest Path First(OSPF)","authors":"M. Alfani, B. Sugiantoro","doi":"10.14421/IJID.2018.07205","DOIUrl":"https://doi.org/10.14421/IJID.2018.07205","url":null,"abstract":"As an institution engaged in SMK Muhammadiyah 03 Yogyakarta  requires network infrastructure as a medium of communication. Infrastructure in SMK Muhammadiyah based VLAN but still using static routing and star topologies as a medium of communication between router. This leads to the main router performance overburdened  which makes the network infrastructure down. It is necessary to reform the network, especially in the communication protocol on the router by using protocol Open Shortest Path First(OSPF). OSPF is a link state-based routing protocol that uses Dijkstra’s algorithm to find the best path is taken as a communication medium. Makin paths made by considering various aspects of the parameters that affect network traffic. OSPF can minimize down on network infrastructure caused by the buren of a huge traffic to maintain the stability of traffic on communication lines. The results using the method QOS on infrastructure with the OSPF protocol can be classified very nice. It is obtaine from the measurement parameter delay <150 ms, packet loss (0%), an bandwidth has a very goo category based on the standard TIPHON. From the results of the QOS parameters also obtained a decrease in delay value by 31% on infrastructure with the OSPF protocol. This proves that the network traffic is more stable when using OSPF protocol.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48420421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases 安卓智能手机处理网络犯罪案件的数字取证分析
Pub Date : 2019-01-07 DOI: 10.14421/IJID.2018.07204
Firmansyah Gustav Hikmatyar, B. Sugiantoro
As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.
随着时代的进步,法医学得到了迅速的发展。取证科学扩展到了新的技术领域,包括数字取证、计算机取证和移动取证。分析和收集数据的移动取证是从各种资源中获得的,例如操作系统、通信线路以及各种存储介质。当今最流行的移动操作系统是基于安卓操作系统的智能手机。有了安卓技术,犯罪分子可以将该技术用作犯罪媒介,包括压倒一切的犯罪思想、犯罪目标和犯罪场景。在这个最终项目中,使用取证移动应用程序来获取手机演员中的数据,其形式为文本、声音、图片和视频,这些数据已在智能手机中删除或尚未删除。在本研究中,作者使用通用计算机取证调查模型(GCFIM)来调查犯罪现场。在GCFIM模型中,调查员可能能够返回到前一阶段,因为情况可能会发生变化(物理和数字)、使用的调查工具、使用的犯罪工具以及调查专业知识水平。本研究还增加了单词TF-IDF的加权方法,该方法可以帮助以单词/文本的形式找到数字证据中的关键词。
{"title":"Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases","authors":"Firmansyah Gustav Hikmatyar, B. Sugiantoro","doi":"10.14421/IJID.2018.07204","DOIUrl":"https://doi.org/10.14421/IJID.2018.07204","url":null,"abstract":"As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49581289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Analysis of Personality Characteristic Using the Naïve Bayess Classifier Algorithm (Case Study Official Twitter of Basuki Tjahaja Purnama's and Anies Baswedan) 使用Naïve贝叶斯分类器算法分析人格特征(以Basuki Tjahaja Purnama's和Anies Baswedan的官方推特为例)
Pub Date : 2019-01-07 DOI: 10.14421/ijid.2018.07203
Ireicca Agustiorini Harsehanto, M. D. R. Wahyudi
Abstract - This research uses data from social media Twitter based on the results of tweets from user_timeline @basuki_btp and @aniesbaswedan. This study uses 2100 tweet data. Data that has been collected is then pre-processed first and labeled manually. The next process is classification using the Naïve Bayess Classifier Algorithm using the Big Five Personality Theory. Based on the test results using 500 tweet data as training data and 1600 tweet data as testing data. The classification results obtained by using the Naïve Bayes Classifier Method and grouped in the "Big Five" personality groups: Openness, Conscientiousness, Extraversion, Agreeableness and Neuroticism on tweet data in Indonesian.
摘要:本研究使用来自社交媒体Twitter的数据,基于user_timeline @basuki_btp和@aniesbaswedan的tweet结果。本研究使用了2100条推特数据。收集到的数据首先进行预处理,然后手工标记。下一个过程是使用Naïve贝叶斯分类器算法使用大五人格理论进行分类。基于以500条推文数据作为训练数据,1600条推文数据作为测试数据的测试结果。利用Naïve贝叶斯分类器方法对印度尼西亚人的推特数据进行分类,将分类结果归为“五大”人格组:开放性、严谨性、外向性、亲和性和神经质。
{"title":"Analysis of Personality Characteristic Using the Naïve Bayess Classifier Algorithm (Case Study Official Twitter of Basuki Tjahaja Purnama's and Anies Baswedan)","authors":"Ireicca Agustiorini Harsehanto, M. D. R. Wahyudi","doi":"10.14421/ijid.2018.07203","DOIUrl":"https://doi.org/10.14421/ijid.2018.07203","url":null,"abstract":"Abstract - This research uses data from social media Twitter based on the results of tweets from user_timeline @basuki_btp and @aniesbaswedan. This study uses 2100 tweet data. Data that has been collected is then pre-processed first and labeled manually. The next process is classification using the Naïve Bayess Classifier Algorithm using the Big Five Personality Theory. Based on the test results using 500 tweet data as training data and 1600 tweet data as testing data. The classification results obtained by using the Naïve Bayes Classifier Method and grouped in the \"Big Five\" personality groups: Openness, Conscientiousness, Extraversion, Agreeableness and Neuroticism on tweet data in Indonesian.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46219388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Implementation of Web-Based Payroll Information System in Universitas Proklamasi 45 Yogyakarta 基于web的工资单信息系统在日惹大学的实现
Pub Date : 2019-01-07 DOI: 10.14421/IJID.2018.07201
M. U. Siregar, Devara Eko Katon Mahardika
Universitas Proklamasi 45 Yogyakarta is a private university which is supervised by a Foundation that has implemented various information systems in various fields of work. However, in the payroll process of the employees are still done manually and have not utilized a computerized system, such as attendance recap, wage recapitulation that is additional salary to basic salary, and the sum of salary received by employees. This makes the payroll process less effective and efficient. This study aims to establish a proposed system that is a web-based information system of employee payroll in the Universitas Proklamasi 45 Yogyakarta with the PHP programming language using Codeigniter Framework and MySQL as its database. The system development method used is the Extreme Programming method. This method was chosen because it promotes intense communication between the client and the system developer so that when there are changes or errors in the system, the developer is always ready to fix it. Extreme Programming also has a simple stage, namely planning, design, coding, and testing. The results of this study are the result of a web-based employee payroll information system that has various actors involved in the management and processing of its data. With this information system, the employee payroll process becomes more effective and efficient, because payroll data is processed and calculated by the system so that it has a high level of data accuracy and does not require a long time in the calculation process.
Universitas Proklamasi 45 Yogyakarta是一所私立大学,由一个基金会监督,该基金会在各个工作领域实施了各种信息系统。然而,在员工的工资发放过程中,仍然是手工完成的,并没有采用计算机化的系统,如考勤汇总,工资汇总,即基本工资的附加工资,以及员工收到的工资总额。这使得薪资流程的效率和效率降低。本研究的目的是在Universitas Proklamasi 45 Yogyakarta建立一个基于web的员工工资信息系统,该系统采用PHP编程语言,使用Codeigniter框架和MySQL作为数据库。使用的系统开发方法是极限编程方法。之所以选择这种方法,是因为它促进了客户端和系统开发人员之间的紧密沟通,以便当系统中出现更改或错误时,开发人员总是准备好修复它。极限编程也有一个简单的阶段,即计划、设计、编码和测试。本研究的结果是基于web的员工工资信息系统的结果,该系统有各种参与者参与其数据的管理和处理。有了这个信息系统,员工的工资单处理变得更加有效和高效,因为工资单数据是由系统进行处理和计算的,因此具有很高的数据准确性,并且在计算过程中不需要花费很长的时间。
{"title":"An Implementation of Web-Based Payroll Information System in Universitas Proklamasi 45 Yogyakarta","authors":"M. U. Siregar, Devara Eko Katon Mahardika","doi":"10.14421/IJID.2018.07201","DOIUrl":"https://doi.org/10.14421/IJID.2018.07201","url":null,"abstract":"Universitas Proklamasi 45 Yogyakarta is a private university which is supervised by a Foundation that has implemented various information systems in various fields of work. However, in the payroll process of the employees are still done manually and have not utilized a computerized system, such as attendance recap, wage recapitulation that is additional salary to basic salary, and the sum of salary received by employees. This makes the payroll process less effective and efficient. This study aims to establish a proposed system that is a web-based information system of employee payroll in the Universitas Proklamasi 45 Yogyakarta with the PHP programming language using Codeigniter Framework and MySQL as its database. The system development method used is the Extreme Programming method. This method was chosen because it promotes intense communication between the client and the system developer so that when there are changes or errors in the system, the developer is always ready to fix it. Extreme Programming also has a simple stage, namely planning, design, coding, and testing. The results of this study are the result of a web-based employee payroll information system that has various actors involved in the management and processing of its data. With this information system, the employee payroll process becomes more effective and efficient, because payroll data is processed and calculated by the system so that it has a high level of data accuracy and does not require a long time in the calculation process.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":"7 1","pages":"48-53"},"PeriodicalIF":0.0,"publicationDate":"2019-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66960615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review Paper on Big Data and Data Mining Concepts and Techniques 大数据与数据挖掘概念与技术综述
Pub Date : 2018-12-04 DOI: 10.14421/IJID.2018.07107
Prasdika Prasdika, B. Sugiantoro
In the digital era like today the growth of data in the database is very rapid, all things related to technology have a large contribution to data growth as well as social media, financial technology and scientific data. Therefore, topics such as big data and data mining are topics that are often discussed. Data mining is a method of extracting information through from big data to produce an information pattern or data anomaly 
在今天这样的数字时代,数据库中的数据增长非常迅速,所有与技术相关的东西都对数据增长做出了巨大贡献,社交媒体、金融技术和科学数据也是如此。因此,诸如大数据和数据挖掘之类的话题是经常被讨论的话题。数据挖掘是一种通过从大数据中提取信息来产生信息模式或数据异常的方法
{"title":"A Review Paper on Big Data and Data Mining Concepts and Techniques","authors":"Prasdika Prasdika, B. Sugiantoro","doi":"10.14421/IJID.2018.07107","DOIUrl":"https://doi.org/10.14421/IJID.2018.07107","url":null,"abstract":"In the digital era like today the growth of data in the database is very rapid, all things related to technology have a large contribution to data growth as well as social media, financial technology and scientific data. Therefore, topics such as big data and data mining are topics that are often discussed. Data mining is a method of extracting information through from big data to produce an information pattern or data anomaly ","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43580829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Scanner and Parser for Z Specifications 用于Z规范的扫描器和解析器
Pub Date : 2018-11-28 DOI: 10.14421/ijid.2018.07104
M. U. Siregar, J. Derrick
This paper describes our research on implementing a scanner and parsers for Z specifications. Rather to code them from scratch, we use tools that have specialities on creating such tasks. These tools generate several Java files which can be integrated with a main program in Java. Our research could produce a scanner and parser for Z specifications. These tools could benefit Z specifications to be studied further.
本文描述了我们对实现Z规范的扫描器和解析器的研究。而不是从头开始编写它们,我们使用专门用于创建此类任务的工具。这些工具生成几个Java文件,这些文件可以与Java中的主程序集成。我们的研究可以为Z规范生成一个扫描器和解析器。这些工具有助于进一步研究Z规范。
{"title":"A Scanner and Parser for Z Specifications","authors":"M. U. Siregar, J. Derrick","doi":"10.14421/ijid.2018.07104","DOIUrl":"https://doi.org/10.14421/ijid.2018.07104","url":null,"abstract":"This paper describes our research on implementing a scanner and parsers for Z specifications. Rather to code them from scratch, we use tools that have specialities on creating such tasks. These tools generate several Java files which can be integrated with a main program in Java. Our research could produce a scanner and parser for Z specifications. These tools could benefit Z specifications to be studied further.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45750604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of Network Monitoring System on Local Area Network with Social Media Twitter Notification 基于社交媒体Twitter通知的局域网网络监控系统的设计与实现
Pub Date : 2018-11-28 DOI: 10.14421/ijid.2017.06201
Bima Putra Winasis, B. Sugiantoro
A network administrator has responsibility and important role in a computer network. Network security and its services depend on the treatment performed by the administrator. Network administrators who understand the workings of a computer network is needed to obtain the necessary computer networks. One of the obligations of the administrator is to monitor a network which can be done by using the system monitor. Monitoring system is a task to check the computer, operating system and services of computer network to keep the network always work in optimal conditions. In an effort to monitor the condition of the network, one of the technologies that can be used is the notification on twitter social media for providing information in real time to the administrator. Twitter is a social media that is very widely used, free, and secure. Moreover, the use of social media twitter experiencing rapid development. Therefore, the selection of twitter as a medium for the use of the notification is expected to be the right strategy. This system will be made by sending notification via twitter when a LAN network is disconnected or attacked by intruders.Results from the development of systems that have been made based on testing the functionality of the system shows all functions of the system has been running well. While usability testing calculation of the total score of the test system interface to get a score of 38.75 out of a maximum scale of 50. This score is in the range 34-42 value (Satisfied) which means that the respondents were satisfied with the system interface. Therefore, this interface is good to be implemented in the system.
网络管理员在计算机网络中负有重要的责任和角色。网络安全及其服务取决于管理员的处理方式。了解计算机网络工作原理的网络管理员是获得计算机网络所必需的。管理员的职责之一是监视网络,这可以通过使用系统监视器来完成。监控系统是对计算机、操作系统和计算机网络服务进行监控,以保证网络始终处于最佳状态的一项任务。为了监测网络状况,可以使用的技术之一是twitter社交媒体上的通知,以便向管理员实时提供信息。Twitter是一个被广泛使用、免费且安全的社交媒体。此外,社交媒体twitter的使用经历了快速发展。因此,选择twitter作为使用通知的媒介有望成为正确的策略。该系统将在局域网络中断或受到入侵者攻击时,通过twitter发送通知。根据系统的开发结果,对系统的功能进行了测试,结果表明系统各项功能运行良好。而可用性测试则计算测试系统界面的总分,得到38.75分,满分50分。这个分数的范围是34-42(满意),这意味着受访者对系统界面感到满意。因此,该接口很适合在系统中实现。
{"title":"Design and Implementation of Network Monitoring System on Local Area Network with Social Media Twitter Notification","authors":"Bima Putra Winasis, B. Sugiantoro","doi":"10.14421/ijid.2017.06201","DOIUrl":"https://doi.org/10.14421/ijid.2017.06201","url":null,"abstract":"A network administrator has responsibility and important role in a computer network. Network security and its services depend on the treatment performed by the administrator. Network administrators who understand the workings of a computer network is needed to obtain the necessary computer networks. One of the obligations of the administrator is to monitor a network which can be done by using the system monitor. Monitoring system is a task to check the computer, operating system and services of computer network to keep the network always work in optimal conditions. In an effort to monitor the condition of the network, one of the technologies that can be used is the notification on twitter social media for providing information in real time to the administrator. Twitter is a social media that is very widely used, free, and secure. Moreover, the use of social media twitter experiencing rapid development. Therefore, the selection of twitter as a medium for the use of the notification is expected to be the right strategy. This system will be made by sending notification via twitter when a LAN network is disconnected or attacked by intruders.Results from the development of systems that have been made based on testing the functionality of the system shows all functions of the system has been running well. While usability testing calculation of the total score of the test system interface to get a score of 38.75 out of a maximum scale of 50. This score is in the range 34-42 value (Satisfied) which means that the respondents were satisfied with the system interface. Therefore, this interface is good to be implemented in the system.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43406410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Implementation of Representation State Transfer (REST) Architecture Academic Information System Integrated in Pandanaran Islamic Senior High School 表示状态转移(REST)架构学术信息系统集成在潘达那兰伊斯兰高中的实现
Pub Date : 2018-11-28 DOI: 10.14421/ijid.2018.07101
Muh. Hambali, B. Sugiantoro
In the rapid development of technology and the increasing speed of information flow due to globalization, making the role of information is vital and crucial to an educational institution. Institutions of Sunan Pandanaran implement policies of separate education system among male students with female students. This triggered a few problems, especially in the Senior high school of Sunan Pandanaran where researched by the author. The focus of the research is how to implement thearchitecture of Representational State Transfer (REST) on the integrated system academic information between two separate data server so that student academic data can be served easily from two different servers. Through the system resulting from this research, researchers offered easy access to student academic data that can then be recycled by the user into a useful information.  The research methodology where used in this research is system development. The steps begin with a preliminary study research,data collection, design models, identifying system requirements and system development methods.At the end, this research produced a integrated academic system information between male school servers with a female school server where implemented using Representational State Transfer architecture. So that student academic data can be presented either to the user in order to be recycled into useful information.
随着科技的飞速发展和全球化带来的信息流动速度的加快,发挥信息的作用对于教育机构来说是至关重要的。苏南潘达那兰各院校实行男女分教制度。这引发了一些问题,特别是在笔者所研究的苏南潘达那兰高中。研究的重点是如何在两个独立的数据服务器之间实现集成系统学术信息的Representational State Transfer (REST)架构,使学生的学术数据可以从两个不同的服务器上轻松地提供服务。通过这项研究产生的系统,研究人员可以方便地访问学生的学术数据,然后用户可以将这些数据回收为有用的信息。本研究使用的研究方法是系统开发。这些步骤从初步研究、数据收集、设计模型、确定系统需求和系统开发方法开始。最后,本研究在男性学校服务器和女性学校服务器之间产生了一个集成的学术系统信息,其中使用具象状态转移架构实现。这样,学生的学术数据既可以呈现给用户,也可以回收为有用的信息。
{"title":"The Implementation of Representation State Transfer (REST) Architecture Academic Information System Integrated in Pandanaran Islamic Senior High School","authors":"Muh. Hambali, B. Sugiantoro","doi":"10.14421/ijid.2018.07101","DOIUrl":"https://doi.org/10.14421/ijid.2018.07101","url":null,"abstract":"In the rapid development of technology and the increasing speed of information flow due to globalization, making the role of information is vital and crucial to an educational institution. Institutions of Sunan Pandanaran implement policies of separate education system among male students with female students. This triggered a few problems, especially in the Senior high school of Sunan Pandanaran where researched by the author. The focus of the research is how to implement thearchitecture of Representational State Transfer (REST) on the integrated system academic information between two separate data server so that student academic data can be served easily from two different servers. Through the system resulting from this research, researchers offered easy access to student academic data that can then be recycled by the user into a useful information.  The research methodology where used in this research is system development. The steps begin with a preliminary study research,data collection, design models, identifying system requirements and system development methods.At the end, this research produced a integrated academic system information between male school servers with a female school server where implemented using Representational State Transfer architecture. So that student academic data can be presented either to the user in order to be recycled into useful information.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45379013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Availability Analysis with Failover Computer Cluster Method Case Study in Academic Information System of UIN Sunan Kalijaga 基于故障转移计算机集群方法的可用性分析——以苏南大学学术信息系统为例
Pub Date : 2018-11-28 DOI: 10.14421/IJID.2017.06205
R. Dewantara, S. Iskandar, A. Fatwanto
High-performance academic information systems and high availability services are requirement in every university. One of many reasons is for anticipation damage and fail server disrupting server network performance. Failover computer cluster method is applied to two servers: primary server as main server and secondary server as backup server. Four stages will be carried out: First: Installation and support software configuration. Second: installation and failover cluster configuration. Third: installation and Distributed Replicated Block Devices (DRBD) configuration. Forth: server testing with siege and nettool.This research conducted by doing server test before and after high availability. As if the main server has a system failure, it will automatically backup the main server to backup server to minimize user accessed data failures. System uses Ubuntu 16.04 LTS operating system. Based on the test data, it is acquired two data: packet data and data response time (ms). Data packets acquired from this research are: 233.3 average data sent; 228.3 average data received; 2.3 average data lost; while 59.7 average response time (ms) is showed; 2.7 minimum average; 633.8 maximum average. Data sent is 120B per data.
每个大学都需要高性能的学术信息系统和高可用性服务。其中一个原因是预期损坏和故障服务器扰乱服务器网络性能。故障转移计算机集群方法应用于两个服务器:主服务器作为主服务器,辅助服务器作为备份服务器。将分四个阶段进行:第一:安装和支持软件配置。第二:安装和故障转移群集配置。第三:安装和分布式复制块设备(DRBD)配置。第四:服务器测试与围攻和nettool。这项研究是通过在高可用性前后进行服务器测试来进行的。就像主服务器出现系统故障一样,它会自动将主服务器备份到备份服务器,以最大限度地减少用户访问数据的故障。系统使用Ubuntu 16.04 LTS操作系统。基于测试数据,获取两个数据:数据包数据和数据响应时间(ms)。从本研究中获得的数据包为:平均发送233.3个数据;228.3接收到的平均数据;2.3平均数据丢失;平均响应时间(ms)为59.7;2.7最小平均值;633.8最大平均值。发送的数据是每个数据120B。
{"title":"Availability Analysis with Failover Computer Cluster Method Case Study in Academic Information System of UIN Sunan Kalijaga","authors":"R. Dewantara, S. Iskandar, A. Fatwanto","doi":"10.14421/IJID.2017.06205","DOIUrl":"https://doi.org/10.14421/IJID.2017.06205","url":null,"abstract":"High-performance academic information systems and high availability services are requirement in every university. One of many reasons is for anticipation damage and fail server disrupting server network performance. Failover computer cluster method is applied to two servers: primary server as main server and secondary server as backup server. Four stages will be carried out: First: Installation and support software configuration. Second: installation and failover cluster configuration. Third: installation and Distributed Replicated Block Devices (DRBD) configuration. Forth: server testing with siege and nettool.This research conducted by doing server test before and after high availability. As if the main server has a system failure, it will automatically backup the main server to backup server to minimize user accessed data failures. System uses Ubuntu 16.04 LTS operating system. Based on the test data, it is acquired two data: packet data and data response time (ms). Data packets acquired from this research are: 233.3 average data sent; 228.3 average data received; 2.3 average data lost; while 59.7 average response time (ms) is showed; 2.7 minimum average; 633.8 maximum average. Data sent is 120B per data.","PeriodicalId":33558,"journal":{"name":"IJID International Journal on Informatics for Development","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49165194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
IJID International Journal on Informatics for Development
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1