ROUTERS: Jurnal Sistem dan Teknologi Informasi https://jurnal.polinela.ac.id/routers <p>ROUTERS: Jurnal Sistem dan Teknologi Informasi includes research in the field of Computer Science, Computer Networks and Engineering, Software Engineering and Information Systems, and Information Security. Editors invite research lecturers, reviewers, practitioners, industry, and observers to contribute to this journal.</p> <p>ROUTERS is a national scientific journal that is open to seeking innovation, creativity, and novelty. Either letters, research notes, articles, supplemental articles, or review articles. ROUTERS aims to achieve state-of-the-art theory and application in this field. ROUTERS provides a platform for scientists and academics across Indonesia to promote, share, and discuss new issues and the development of systems and information technology.</p> Program Studi Teknologi Rekayasa Internet, Politeknik Negeri Lampung en-US ROUTERS: Jurnal Sistem dan Teknologi Informasi 2962-1224 User Authentication Through Windows Active Directory-Based Single Sign-On Method at PT. XYZ https://jurnal.polinela.ac.id/routers/article/view/3328 <p class="Abstract" style="margin-bottom: 6.0pt;"><em><span style="font-family: 'Book Antiqua',serif;">To connect to the company network, a WPA2-PSK-based security system is in place, requiring users to input the company Wi-Fi password. One of the issues that arises is the difficulty in identifying the status of users attempting to access the network. Apart from security concerns regarding the network, the use of this security key allows non-employees to connect to the network using personal devices. As a solution to enhance the existing authentication system, security systems like RADIUS can be utilized. This system operates to mitigate threats to the network security. The process undertaken through the implementation of this NDLC method commences with identifying and designing network security authentication, progressing through the implementation phase until the design can be regularly utilized. With the introduction of a user authentication system employing a single sign-on method based on Windows Active Directory at XYZ Inc., users will find it easier to connect to the wireless network. With WPA2-Enterprise, access to the network will be restricted.</span></em></p> Kemas Ocha Khairi Saputra Kemas Agiska Ria Supriyatna Septafiansyah Dwi Putra Copyright (c) 2024 Kemas Ocha Khairi Saputra Kemas, Agiska Ria Supriyatna, Septafiansyah Dwi Putra https://creativecommons.org/licenses/by/4.0 2024-01-17 2024-01-17 70 78 10.25181/rt.v2i2.3328 Analysis of SSL Data Encryption in MySQL: Testing In-Transit Security https://jurnal.polinela.ac.id/routers/article/view/3446 <p class="Abstract" style="margin-bottom: 6.0pt;"><em><span lang="EN-US" style="font-family: 'Book Antiqua',serif;">Data transmission security has become a pivotal point in database management, especially in response to the evolving cyber threats. This study examines a critical aspect of data security: the in-transit data encryption using Secure Sockets Layer (SSL) within MySQL. The main focus of the research is on testing data encryption by employing Wireshark, a network analysis tool capable of capturing and displaying transmitted data packets. The testing process consisted of two scenarios: first, data transmission with SSL enabled on the MySQL server; second, data transmission without the use of SSL. The results show a significant contrast between the two scenarios. With SSL, the data packets intercepted by Wireshark appeared unreadable, indicating that encryption was successful in preventing data content exposure. Conversely, without SSL, the data packets could be read as plain text, demonstrating a lack of encryption and a high security risk. This research delves only into the aspect of in-transit data encryption security in MySQL and does not explore the implications related to SSL performance or configuration further. This analysis offers a useful perspective for database administrators in efforts to enhance data security, identifying SSL as a crucial tool to ensure the security of in-transit data.</span></em></p> Antoni Haikal Septafiansyah Dwi Putra Nelmiawati Nelmiawati Copyright (c) 2024 Antoni Haikal, Septafiansyah Dwi Putra, Nelmiawati https://creativecommons.org/licenses/by/4.0 2024-01-29 2024-01-29 79 84 10.25181/rt.v2i2.3446 Implementation of Android-Based M-Library Applications https://jurnal.polinela.ac.id/routers/article/view/3251 <p>SMA Negeri 5 Madiun merupakan sekolah menengah atas yang berada di Kota Madiun. SMA ini memiliki fasilitas-fasilitas yang mendukung kegiatan belajar mengajar salah satunya adalah perpustakaan. Perpustakaan ini sudah memiliki sistem informasi berbasis web, namun masih memiliki beberapa permasalahan yaitu pengunjung baru tidak dapat melakukan pendaftaran anggota secara mandiri, minimnya informasi mengenai lokasi pasti buku pada rak bagi pengunjung baru bahkan anggota perpustakaan, dan anggota perpustakaan tidak berkesempatan meminjam buku yang diinginkan karena buku selalu didahului dipinjam oleh anggota lain. Maka, diperlukan penerapan teknologi mobile yang dapat diakses dimanapun dan kapanpun seperti M-Library (<em>Mobile</em> <em>Library</em>/<em>Libraries</em>). M-Library mempermudah proses peminjaman dengan adanya fitur <em>booking</em> peminjaman. Sehingga, berdasarkan permasalahan dan solusi yang ditemukan penulis mengembangkan aplikasi M-Library berbasis <em>Android</em> dengan menggunkan <em>Dart</em> <em>Flutter.</em></p> Murti Retnowo Prasetyo Adi Saputra Copyright (c) 2024 Murti Retnowo, Prasetyo Adi Saputra https://creativecommons.org/licenses/by/4.0 2024-01-31 2024-01-31 85 94 10.25181/rt.v2i2.3251 Performance Measurement of Web-Based SME Learning Video Application Using Load Testing Method https://jurnal.polinela.ac.id/routers/article/view/3407 <p><em>In the digital era, the use of websites has become crucial for business development, including the SMEs learning application based on video developed by Siger Innovation Hub. Before the application can be widely used, it is important to conduct comprehensive testing to ensure a fast and stable response. This article measures website loading speed through performance testing. This testing identifies issues early on, providing information for improvements and enhancements before implementing the application on a larger scale. The chosen method is load testing, with the research phases following the Software Testing Life Cycle (STLC). The results obtained from the performance testing using the load testing method indicate that the website is capable of meeting the target response time (response time &lt; 3000ms), achieving a peak throughput of 18/seconds, and having a maximum error rate of 0.50%. In conclusion, the website for the SMEs learning application with video media can operate optimally when tested with 1 to 100 users.</em></p> Sucitra Aan Sentosa Eko Subyantoro Imam Asrowardi Copyright (c) 2024 Sucitra Aan Sentosa, Eko Subyantoro, Imam Asrowardi https://creativecommons.org/licenses/by/4.0 2024-04-05 2024-04-05 95 102 10.25181/rt.v2i2.3407 Inventory Information System Project Management in Pharmacy Stores https://jurnal.polinela.ac.id/routers/article/view/3582 <p><em>This research aims to improve the efficiency of warehouse management and sales in pharmacies through transparent and accurate administration. Pharmacies often face challenges in product management and monitoring expiration dates, so complete and accurate data is needed to record purchase and sale transactions. Currently, recording in pharmacies is often done manually, which takes a lot of time and increases the risk of errors and data loss. The research methodology used is qualitative, postpositivist oriented and carried out in a natural environment. This approach aims to understand the context and meaning of the phenomenon under study. Qualitative research is used to hear whether a procedure is right or wrong, as well as to assess the halalness of the process used. With this approach, researchers hope to identify weaknesses in pharmacy administration management and provide more efficient solutions. To overcome this problem, researchers propose implementing a system development process using a waterfall model. The stages in this model include requirements, system design analysis, coding, testing, and implementation. Requirements analysis will help identify the features needed by the pharmacy, while system design will design a solution that meets those needs. Coding will develop the proposed software, which will then be tested to ensure its functionality and security. Ultimately, implementation will ensure the system is implemented well in pharmacies. By implementing this structured and technology-based system, it is hoped that pharmacy management will become more efficient and successful. This system will help pharmacies manage stock, consolidate reach dates, and record transactions automatically and accurately, thereby reducing the risk of errors and increasing productivity. It is hoped that the results of this research can make a real contribution in solving administrative problems often faced by pharmacies.</em></p> Novtra Refi Yahfizham Yahfizham Copyright (c) 2024 Novtra Refi, Yahfizham Yahfizham https://creativecommons.org/licenses/by/4.0 2024-07-04 2024-07-04 103 110 10.25181/rt.v2i2.3582 Application of Cross-Validation Techniques to Handle Overfitting in a Case Study of Decision Tree Implementation for Lung Cancer Prediction https://jurnal.polinela.ac.id/routers/article/view/3631 <p class="Abstract" style="margin-bottom: 6.0pt;">Lung cancer is a condition caused by cancer cells growing in the lungs. Lung cancer causes a weakened immune system, tumors, and other abnormalities that prevent the body from functioning properly. Lung cancer examination uses various technologies, namely CT Scan, X-ray, and others. However, the examination is relatively expensive and takes a long time. The use of machine learning makes it possible to support lung cancer diagnosis. With the large amount of medical data available today, machine learning can recognize patterns in the data so that it will help the process of diagnosing lung cancer more effectively. This study aims to correct overfitting in previous research which used the decision tree method to predict lung cancer with cross-validation techniques. In this research, we use a public dataset from <a href="https://data.world/cancerdatahp/lung-cancer-data">Data World.</a> This dataset consists of 25 data attributes and has 1000 data. The results of this research are rules obtained from decision trees which are then evaluated to produce 96.7% accuracy, 96.7% precision, 96.7% recall, and 96.7% f1-score. These results show that the decision tree method performs well in predicting lung cancer early and the cross-validation technique can overcome overfitting in decision trees with more general and stable results.</p> Faurika Faurika Ahsanun Naseh Khudori M. Syauqi Haris Copyright (c) 2024 Faurika, Ahsanun Naseh Khudori, M. Syauqi Haris https://creativecommons.org/licenses/by/4.0 2024-07-19 2024-07-19 111 120 10.25181/rt.v2i2.3631