Enhancing Performance Using New Hybrid Intrusion Detection System
(Candra Supriadi, Charli Sitinjak, Fujiama Diapoldo Silalahi, Nia Dharma Pertiwi, Sigit Umar Anggono)
DOI : 10.51903/jmi.v1i1.134
- Volume: 1,
Issue: 2,
Sitasi : 0 12-Aug-2022
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Intrusion Detection Systems (IDS) are an efficient defense against network attacks as well as host attacks as they allow network/host administrators to detect any policy violations. However, traditional IDS are vulnerable and unreliable for new malicious and genuine attacks. In other case, it is also inefficient to analyze large amount of data such as possibility logs. Furthermore, for typical OS, there are a lot of false positives and false negatives. There are some techniques to increase the quality and result of IDS where data mining is one of technique that is important to mining the information that useful from a large amount of data which noisy and random. The purpose of this study is to combine three technique of data mining to reduce overhead and to improve efficiency in intrusion detection system (IDS). The combination of clustering (Hierarchical) and two categories (C5, CHAID) is proposed in this study. The designed IDS is evaluated against the KDD'99 standard Data set (Knowledge Discovery and Data Mining), which is used to evaluate the efficacy of intrusion detection systems. The suggested system can detect intrusions and categorize them into four categories: probe, DoS, U2R (User to Root), and R2L (Remote to Local). The good performance of IDS in case of accuracy and efficiency was the result of this study.
|
0 |
2022 |
Enhancing Performance Using New Hybrid Intrusion Detection System
(Candra Supriadi, Charli Sitinjak, Fujiama Diapoldo Silalahi, Nia Dharma Pertiwi, Sigit Umar Anggono)
DOI : 10.51903/jtie.v1i1.134
- Volume: 1,
Issue: 2,
Sitasi : 0 12-Jul-2022
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Intrusion Detection Systems (IDS) are an efficient defense against network attacks as well as host attacks as they allow network/host administrators to detect any policy violations. However, traditional IDS are vulnerable and unreliable for new malicious and genuine attacks. In other case, it is also inefficient to analyze large amount of data such as possibility logs. Furthermore, for typical OS, there are a lot of false positives and false negatives. There are some techniques to increase the quality and result of IDS where data mining is one of technique that is important to mining the information that useful from a large amount of data which noisy and random. The purpose of this study is to combine three technique of data mining to reduce overhead and to improve efficiency in intrusion detection system (IDS). The combination of clustering (Hierarchical) and two categories (C5, CHAID) is proposed in this study. The designed IDS is evaluated against the KDD'99 standard Data set (Knowledge Discovery and Data Mining), which is used to evaluate the efficacy of intrusion detection systems. The suggested system can detect intrusions and categorize them into four categories: probe, DoS, U2R (User to Root), and R2L (Remote to Local). The good performance of IDS in case of accuracy and efficiency was the result of this study.
|
0 |
2022 |
PERANCANGAN MEDIA PEMBELAJARAN MATERI BILANGAN BERBASIS MULTIMEDIA DENGAN METODE MIND MAPPING PADA SISWA KELAS VII SMPN 35 SEMARANG
(Setiyo Prihatmoko, Sumaryanto Sumaryanto, Langga Jaya Herlansyah)
DOI : 10.51903/pixel.v15i1.690
- Volume: 15,
Issue: 1,
Sitasi : 0 01-Jul-2022
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Penelitian ini dilatarbelakangi oleh permasalahan kurangnya motivasi dan perhatian siswa dalam mengikuti proses belajar mengajar di kelas karena kegiatan belajar mengajar masih menggunakan metode konvensional. Hal ini membuat siswa kesulitan dalam memahami materi yang dipelajari sehingga kompetensi dasar dan KKM tidak tercapai.Penelitian ini menggunakan metode pengembangan produk Research and Development (RnD), menggunakan 6 dari 10 tahapan penelitian yaitu potensi dan masalah, pengumpulan data, desain produk, validasi desain, perbaikan desain dan pengujian produk. Dalam penelitian ini peneliti menggunakan multimedia dengan metode Mind Map sebagai media pembelajaran yang menarik dengan menggunakan komputer yang dapat menampilkan teks, gambar, video, dan audio sehingga proses pembelajaran lebih menyenangkan bagi siswa.Hasil dari penelitian ini adalah media pembelajaran berbasis multimedia dengan menggunakan metode Mind Map. Nilai validitas ahli media sebesar 3,6 yang dinyatakan layak, sedangkan nilai validitas ahli materi sebesar 3,8 yang dinyatakan layak, serta meningkatkan pemahaman dan minat siswa sebagai pengguna dari awalnya 61% meningkat menjadi 86,11%.
|
0 |
2022 |
IMPLEMENTASI METODE SELECTION SORT PADA SISTEM INFORMASI RETENSI DOKUMEN REKAM MEDIS DI KLINIK PKU MUHAMMADIYAH KARANGANOM, KLATEN
(Yunita Wisda Tumarta Arif)
DOI : 10.51903/elkom.v15i1.789
- Volume: 15,
Issue: 1,
Sitasi : 0 01-Jul-2022
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Klinik adalah fasilitas pelayanan kesehatan yang menyelenggarakan dan menyelenggarakan pelayanan kesehatan dasar dan/atau spesialistik yang diselenggarakan oleh lebih dari satu jenis tenaga kesehatan dan dipimpin oleh seorang tenaga kesehatan. Untuk dokumen rekam medis yang sudah tidak digunakan lebih dari lima tahun, dokumen rekam medis dapat dipisahkan atau disimpan. Retensi bertujuan untuk menyeleksi dokumen rekam medis yang sudah tidak aktif lagi dan mengurangi jumlah berkas rekam medis yang terus meningkat sehingga dapat menjaga mutu pelayanan dengan mempercepat penyusunan dokumen rekam medis pada saat dibutuhkan. Tujuan dari penelitian ini adalah untuk menerapkan sortir seleksi dalam menentukan dokumen rekam medis yang harus disimpan dalam sistem informasi penyimpanan dokumen rekam medis. Dengan algoritma selection sort, pengurutan dokumen dalam sistem menjadi lebih mudah. Metode Sistem dibangun berbasis Web dengan metode pengembangan sistem menggunakan System Development Live Cycle (SDLC). Klinik PKU Muhammadiyah Karanganom Klaten merupakan salah satu pelayanan kesehatan yang ada di Kabupaten Klaten. Ruang penyimpanan dokumen rekam medis masih satu dengan pendaftaran rawat jalan. Sistem informasi penyimpanan dokumen rekam medis dengan penerapan metode pengurutan seleksi yang digunakan yaitu descending dan ascending, dengan mengurutkan tahun dengan nominal besar ke tahun dengan nominal kecil atau sebaliknya. Penerapan metode seleksi pada sistem retensi dokumen rekam medis menggunakan bahasa pemrograman PHP (Hypertext) dengan database My SQL diharapkan dapat membantu proses retensi di Klinik PKU Muhammadiyah Karanganom Klaten dan pelayanan kesehatan menjadi lebih baik.
|
0 |
2022 |
The Universality of Education for Children with Special Needs in India: Current Status
(Sushma Kumari, Gita Jyoti Ojh)
DOI : 10.62951/icistech.v2i1.22
- Volume: 2,
Issue: 1,
Sitasi : 0 30-Jun-2022
| Abstrak
| PDF File
| Resource
| Last.13-Aug-2025
Abstrak:
The Right to education is one of the basic fundamental rights upheld by the constitution of India to every child. Children with special needs face massive challenges in being able to access education equitably due to various reasons viz. a rigid curriculum, non-accessibility, untrained teachers, bullying, and attitudinal issues. The new NEP (National Education Policy) 2020 seems to bring across many progressive steps which when clubbed with the RPWD (Right of Persons with Disabilities) act 2016 offers hope for children with special needs. In this article, we try to examine the various provisions outlined in the new NEP 2020 in the backdrop of RPWD 2016. An understanding of which will lead to predicting the barriers and gaps one can come across in the future during implementation at the ground level. Something which remains a challenge for a country like India with the best policies yet few actions.
|
0 |
2022 |
The Efficient Approach in Peer-to-Peer Systems to Achieve High Efficiency.
(Rakesh Kumar ER, Texila American)
DOI : 10.55606/iceb.v1i1.104
- Volume: 1,
Issue: 1,
Sitasi : 0 28-Jun-2022
| Abstrak
| PDF File
| Resource
| Last.19-Aug-2025
Abstrak:
Peer-to-peer systems nowadays are widely used because of the scalability and high reliability. File replication and consistency maintenance are widely used techniques to achieve high system performance. These techniques are connected to each other. The connection of these techniques is consistency maintenance is needed in file replication to keep the consistency between a file and the replicas. Traditional file replication and consistency maintenance methods need a high cost. The usage of IRM (Integrated file Replication and Consistency Maintenance inP2P systems) which will achieve high efficiency at a significantly lower cost can be used to solve this problem. IRM reduces redundant file replicas, consistency maintenance overhead, and unnecessary file updates.
|
0 |
2022 |
Tinjauan Yuridis Terhadap Perkawinan di Bawah Umur dalam Undang-Undang no 1 tahun 1974 dan Kaitannya dengan Hukum Islam
(Umar Faruq)
DOI : 10.55606/af.v4i1.15
- Volume: 4,
Issue: 1,
Sitasi : 0 24-Jun-2022
| Abstrak
| PDF File
| Resource
| Last.19-Aug-2025
Abstrak:
Article 1 of Law Number 1 of 1974 states that marriage is an inner and outer bond between a man and a woman as husband and wife with the aim of forming a happy and eternal family (household) based on God Almighty. Based on the provisions of Article 2 paragraph (1) which states that a marriage is valid if it is carried out according to the law of each religion and belief. And the provisions of Article 7 paragraph (1) Marriage is only permitted if the man reaches the age of 19 (nineteen) years and the woman has reached the age of 16 (sixteen) years. As for the problem in this thesis, what is the view of Law Number 1 of 1974 and Islamic law on underage marriages and the legal consequences if a marriage is still carried out according to the provisions of Law Number 1 of 1974 and the provisions of Islamic law. And what efforts must be made so that a marriage that is still underage becomes legal according to law. The research in this thesis was carried out using the Library Research method or library research by studying the legislation on a number of books, writings and scientific works related to the material discussed in this thesis. According to the provisions of Law Number 1 of 1974 that a marriage is considered valid if carried out according to their religion and belief and reach the age limit that has been determined in the Marriage Law. On the other hand, according to Islamic law, a marriage that has fulfilled the pillars and conditions of marriage is considered a valid marriage even though it does not reach the age limit specified in the law so that the legal consequences are the same as marriages in general. Therefore, the marriage is not valid according to positive law, then the marriage has no legal consequences, but there is an impact of underage marriage on the status of children and wives. That is in terms of inheritance and child recognition
|
0 |
2022 |
Perkawinan di Bawah Umur dalam Keharmonisan Rumah Tangga di Desa Sukogidri Kecamatan Ledokombo Kabupaten Jember
(Umar Faruq)
DOI : 10.55606/af.v4i1.14
- Volume: 4,
Issue: 1,
Sitasi : 0 24-Jun-2022
| Abstrak
| PDF File
| Resource
| Last.19-Aug-2025
Abstrak:
This study aims to answer the resech problem that has been formulated in the formulation of the problem, that is 1) to reveal how the process of underage marriage in the village Sukogidri Ledokombo District, 2) What is the factor of underage marriage in the village Sukogidri Ledokombo District, and 3 ) What are the implications of underage marriage on domestic harmony. Research Methods with Approach and Type of Research is a qualitative approach with Field Research Type. Methods of data collection using observation, interviews, and documentation, and data analysis using data redaction techniques, display data and conclution drawing / verivication.. The analysis shows 1) the underage marriage process in Sukogidri village by inviting the community leaders, the nearest community, the families of the two brides, the father of mudin. The marriage process is done by the marriage contract by the community leader who has happened to resign the guardian from the bride's parent, 2) The occurrence of underage marriage in Sukogidri village is external factor, that is the insistence of the parents because of economic factor, worry about violating religion, and pregnant outside of marriage . And 3) the implications of underage marriage on household welfare have a negative impact. Negative impact is on the fulfillment of rights and obligations., In connection with this, in the household to be considered is the fulfillment of rights and obligations of husband and wife. Due to lack of preparedness in the household, the burden of rights and duties of husband and wife are still assisted by their respective parents. Creating a prosperous relationship in the family is not enough to be carried out by two husband and wife, it should involve all elements of the family, the readiness of the child in the household relationship still requires guidance and direction of the families of both parties, either from the wife or husband
|
0 |
2022 |
VIRTUAL LABORATORY FOR VIRTUAL ANALYSIS IN TECHNICAL EDUCATION
(Budi Raharjo, Yuli Fitriyanto, Sumaryanto Sumaryanto)
DOI : 10.55606/jeei.v2i2.915
- Volume: 2,
Issue: 2,
Sitasi : 0 22-Jun-2022
| Abstrak
| PDF File
| Resource
| Last.19-Aug-2025
Abstrak:
Face-to-face technical instruction is subject to the existence of instrumentation and room. The fee, security, and listing can manner blockade to the administration directly in the laboratory. Virtual analysis can be adopted to increase the scholar's expertise by combining pre-laboratory for live analysis and serving approach to implementing that cannot be used securely personality. Virtual learning is applied in many areas, but questions are left over about how it should be used in engineering, this is an area that is mainly dependent on face-to-face laboratory and classroom settings.
The purpose of this research is to adapt the common virtual laboratory idea to special demands, Virtual laboratories are not intended to change face-to-face discipline but to add to class time and offer a useful reserve as required. In addition, the experimental development method in this study was carried out by 3 virtual platforms: “Lab-VIEW”, “MAT-LAB”, and “Unity”. The 1st form of the Helicopter-machine Virtual Laboratory was advanced at Lab-VIEW. Virtual laboratories offer a semi-hands-on experience in college learning that might overlook physical learning. It means a type of active learning method to be adopted in university.
The result of this research is a brief investigation of development possibilities in Unity. So that in the future, Unity exploration can be done further and in more detail. Scope This research consists of themes plated by Engineering Measurement Laboratory 1 learning. Engineering lectures might reflect these topics to carry out Virtual analysis in their laboratory and traditional classroom learning. The points that might advantage of the method consist of Mechanical Systems Laboratory, Energy Systems Laboratory, Thermodynamics, and Dynamics. It is hoped that this research will cocked the expansion of more Virtual analysis that increase engineering education in the future.
|
0 |
2022 |
Analisa Perancangan Sistem Informasi Inventory dengan Metode FIFO (First In First Out) pada Usaha Dagang Retail
(Sumaryanto, Setiyo Prihatmoko, Purwati)
DOI : 10.51903/informatika.v2i1.136
- Volume: 2,
Issue: 1,
Sitasi : 0 25-May-2022
| Abstrak
| PDF File
| Resource
| Last.23-Jul-2025
Abstrak:
Inventory Information System in a retail trading business plays a fairly important role, especially if the goods sold consist of various types and with a fairly high turnover rate. One of the problems that often arise in an inventory system is that the number and condition of goods available in the warehouse cannot be known with certainty. This can result in goods being stored in the warehouse for too long, excessive, lacking or even running out of inventory.
Besides, the use of a good inventory system is expected to reduce the risk of loss or misuse of inventory, because each type of goods has been classified regularly and allows it to be checked at any time. In short, management will be able to quickly and easily find out the existence and changes in the inventory of goods in the event of a purchase and sale of goods.
|
0 |
2022 |