Journal Cover
Cyberspace : Jurnal Pendidikan Teknologi Informasi
Number of Followers: 0  

  This is an Open Access Journal Open Access journal
ISSN (Print) 2597-9671
Published by UIN Ar-Raniry Banda Aceh Homepage  [9 journals]
  • THE PHENOMENON OF GOOGLE EFFECT, DIGITAL AMNESIA AND NOMOPHOBIA IN
           ACADEMIC PERSPECTIVE

    • Authors: Nazaruddin Musa, Mohd Sobhi Ishak
      Pages: 1 - 15
      Abstract: This study aims to determine the behavior and perceptions of students about Google Effect, Digital Amnesia, and Nomophobia syndromes, among students. For this purpose, a quantitative approach is used through an online survey method using Google Form. The number of samples is 110 out of a total population of 636 students of Library and Information Science of UIN Ar-Raniry Banda Aceh. Samples were taken randomly for 5 days. The results are as follows; 84.5 % of students have used smartphones as a reminder, 70.9 % used as their external memory. Meanwhile, 73.6 % feel confused by information overload,78.9 % feel annoyed by hyperlinks, 51 % feel more motivated to answer questions,59 % feel more confident in discussing new things when a smartphone in hand, 78,2 % said that a smartphone can help in understanding the material being taught. In terms of perception, students stated that nomophobia, digital amnesia, and the Google effect are common phenomena in the digital age, 59.1 %, 88.1 %, and 69.1 % respectively. Based on the findings, it is recommended that longitudinal research is needed to examine the long-term effects of this phenomenon to find out whether the high dependence on smart technology will strengthen or weaken the human brain's ability to think and take action independently since it is rarely activated'.
      PubDate: 2021-03-13
      DOI: 10.22373/cj.v5i1.8219
      Issue No: Vol. 5, No. 1 (2021)
       
  • IMPLEMENTATION OF GENERIC ROUTING ENCAPSULATION USING CISCO PACKTER TRACER

    • Authors: Muhammad Kahfi Aulia, Djuniadi Djuniadi
      Pages: 16 - 21
      Abstract: Virtual Private Network (VPN) is a technology that offers low-cost remote access solutions for companies. The IPSec protocol provides cryptography services and network security for data transmission. Generic Routing Encapsulation (GRE) tunnel exists to encapsulate multicast and broadcast packets into unicast packets. This is very usable which IPSec does not support encryption of multicast and broadcast packets. The target of this simulation is that Router 1 shows that the network is protected by GRE. The first thing to do is set the network topology. Here, for example, there are two offices that want to transmit data to each other. Each of these offices has a switch, FTP server, DNS server, router, and PC. Then set the IP address of each device and connect it with cables. Router 2 and Router 3 function to connect the two offices in one WAN network. Each of these data transmissions is IPSec protected for data encryption protection then GRE coated for transmission encapsulation. From simulation results, we can conclude that both network can be connected and communicated each other with protection from GRE tunnel.
      PubDate: 2021-03-13
      DOI: 10.22373/cj.v5i1.8563
      Issue No: Vol. 5, No. 1 (2021)
       
  • COMPARISON OF SUPPORT VECTOR MACHINE AND DECISION TREE METHODS IN THE
           CLASSIFICATION OF BREAST CANCER

    • Authors: Helmi Imaduddin, Brian Aditya Hermansyah, Frischa Aura Salsabilla B
      Pages: 22 - 30
      Abstract: One of the most dangerous cancers in the world is breast cancer. This cancer occurs in many women, in some cases this cancer can also affect men, but it is very rare. The effects of this cancer are very dangerous for humans, in the worst case it can lead to death. So that serious prevention is needed against this cancer. One prevention can be done by early detection. This study aims to implement machine learning methods to detect breast cancer in women. The algorithms used are Support Vector Machine (SVM) and Decision Tree (DT). After classifying the data provided, a comparison is made to find out which machine learning method has the best performance. The data used comes from the Gynecology Department of the University Hospital Center of Coimbra (CHUC), and can be downloaded for free on the UCI repository website. The results of this study indicate that the SVM algorithm with feature selection obtains the best classification results by obtaining an accuracy of 87.5%, a sensitivity of 90%, and a specificity of 85%. Thus this research obtains good results to be able to help provide solutions to detect breast cancer.
      PubDate: 2021-03-13
      DOI: 10.22373/cj.v5i1.8805
      Issue No: Vol. 5, No. 1 (2021)
       
  • DESIGNING SCHOOL INFORMATION SYSTEM OF GUPPI GALAWATI SENIOR HIGH SCHOOL
           IN SORONG REGENCY

    • Authors: Iriene Surya Rajagukguk, Dewi Astuti
      Pages: 31 - 43
      Abstract: At present the school is trying to become an educational institution that is able to serve the community in the delivery of information, one of which is the GUPPI Salawati High School, Sorong Regency. So far, the information about school information is still done manually by using banners, brochures and the latest information is still posted on the announcement board, even having to come directly to the school to get information. The method used in the development and design of this system is the Waterfall Method. The purpose of designing this information system is to facilitate those who need information about Salawati GUPPI high school.
      PubDate: 2021-03-13
      DOI: 10.22373/cj.v5i1.7852
      Issue No: Vol. 5, No. 1 (2021)
       
  • SAFE ROUTING MODEL AND BALANCED LOAD MODEL FOR WIRELESS SENSOR NETWORK

    • Authors: Julianto Agus Prabowo, Harry Dhika
      Pages: 44 - 58
      Abstract: Wireless Sensor Networks (WSNs) play a very important role in providing realtime data access for Big Data and Internet. However, the open deployment, energy constraint, and lack of centralized administration make WSNs very vulnerable to various kinds of malicious attacks. In WSNs identifying malicious sensor devices and eliminating their sensed information plays a very important role for mission critical applications. Standard cryptography and authentication schemes cannot be directly used in WSNs because of the resource constraint nature of sensor devices. Thus, energy efficient and low latency methodology is required for minimizing the impact of malicious sensor devices. This paper presents a Secure and Load Balanced Routing (SLBR) scheme for heterogeneous clustered based WSNs. SLBR presents a better trust-based security metric that overcomes the problem when sensors keep oscillating from good to bad state and vice versa, and also SLBR balances load among CH. Thus, aids in achieving better security, packet transmission, and energy efficiency performance. Experiments are conducted to evaluate the performance of proposed SLBR model over existing trust-based routing model namely Exponential Cat Swarm Optimization (ECSO). The result attained shows SLBR model attains better performance than ECSO in terms of energy efficiency (i.e., network lifetime considering first sensor device death and total sensor device death), communication overhead, throughput, packet processing latency, malicious sensor device misclassification rate and identification.
      PubDate: 2021-03-13
      DOI: 10.22373/cj.v5i1.8420
      Issue No: Vol. 5, No. 1 (2021)
       
  • COMPUTER HARDWARE RECOGNITION APPLICATION WITH AUGMENTED REALITY
           TECHNOLOGY

    • Authors: Repiliya Repiliya, Zaid Romegar Mair
      Pages: 59 - 68
      Abstract: In the highly development of technology, thus encouraged to human activity facilitation. One of them was education that required technology in applying the learning system to be effective and flexible. Augmented Reality (AR) was a concept of combining virtual and work reality. Augmented Reality could provide advantages in the interaction between humans and computers, it could be a solution in applying teaching and learning process application in computer majors education, it would be interactive by using 3D.In the 3D object was generated into the the real image so visualization was looked like the original object. The strengthness of this application that the object could rotated so it was looked clearly from any side. This application gave many benefits for the users to know and use the hardware computer in clearly and understandable.
      PubDate: 2021-03-13
      DOI: 10.22373/cj.v5i1.7865
      Issue No: Vol. 5, No. 1 (2021)
       
  • HYPERTEXT BASED INTERACTIVE MEDIA ANALYSIS IN GROWING STUDENT READING
           INTEREST THROUGH ONLINE LEARNING

    • Authors: Aqidatul Izza, Munawir Munawir
      Pages: 69 - 80
      Abstract: This study discusses the analysis of hypertext-based interactive media in fostering student interest in reading through online learning. The purpose of this study was to determine the use and effectiveness of hypertext-based interactive media use in fostering student reading interest through online learning and the impact of hypertext-based interactive media on students' reading interest through online learning conducted at MTsN 1 Sidoarjo. This study uses a descriptive research method with a qualitative approach. Data collection using, observation, questionnaires, interviews and documentation. The results showed that: 1) The results of the observations proved that students had good enthusiasm. In this learning, Islamic education teachers use interactive media in the form of power points; 2) PAI teachers make various efforts to foster students' reading interest when learning online, one of which is trying to get used to the small things that are applied to students by utilizing the media; 3) From the results of a questionnaire which shows that students' reading interest has increased even though gradually. This can be seen from the aspects of preference, interest, attention and involvement. Keywords: Interactive Media, Hypertext, Reading Interest
      PubDate: 2021-03-13
      DOI: 10.22373/cj.v5i1.8793
      Issue No: Vol. 5, No. 1 (2021)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.236.13.53
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-