Claim Missing Document
Check
Articles

Found 5 Documents
Search

Rancang Bangun OwnCloud Sebagai Cloud Storage di Kampus STMIK PPKIA Tarakanita Rahmawati Hadriansa, Hadriansa; Prayogi, Denis; Harianto, Kandi
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 4, No 2 (2020): April 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v4i2.2043

Abstract

Media storage based on cloud computing is now widely used as a solution for exchanging data and information in an institution to support work. At STMIK PPKIA Tarakanita Rahmawati, cloud-based storage is very necessary because many data and information exchange activities are carried out digitally, both data exchange between lecturers, academic community, education staff and students. Utilization of ownCloud as an open source software to solve the problem of cloud computing-based data exchange is very appropriate because the website-based, desktop and mobile-based applications make it easier for users to access data.  Owncloud is similar to applications like Google Drive, Dropbox, it's just that all settings and data processing and user can be done independently so that it can adjust to the needs. The results of this research, Owncloud can be used well by lecturers to store data related to lectures and research, students to store lecture data centrally, the academic community in storing data related to academic activities. The design of owncloud is also still done intranet, so to access it must be connected to the network around the campus of STMIK PPKIA Tarakanita Rahmawati
Penerapan IoT pada Keamanan Lingkungan Berbasis Android Hadriansa, Hadriansa; Prayogi, Denis
Jurnal Media Infotama Vol 21 No 1 (2025): April 2025
Publisher : UNIVED Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmi.v21i1.7142

Abstract

The development of information and communication technology (ICT), especially the Internet of Things (IoT), has changed human interaction with the surrounding environment. IoT allows physical devices to connect and communicate over the internet, improving efficiency and security in various areas, including public safety. This research focuses on the development of an IoT-based Citizen Security System, which integrates the active participation of citizens in the environmental security system through the Environmental Security and Order System (Siskamling). Prototypes developed using the ESP32 Module are connected to a database to detect potential hazards, such as theft or fire. This tool allows homeowners to send emergency signals through a panic button that is directly connected to the kamling post. In addition, the system provides information about the schedule of the kamling post to residents. This study shows that this device functions manually and provides notifications to residents and kamling post officers through an Android application. With additional features such as RTC for time counting and buzzer as an alarm, the system is expected to increase awareness and response to emergency situations in the environment. The conclusion shows the significant potential of IoT technology in strengthening community security.
Technology Adoption Segmentation of MSMEs in Border Areas using TRI and Hierarchical Clustering Fadlan, Muhammad; Muhammad, Muhammad; Suprianto, Suprianto; Hadriansa, Hadriansa; Ilyas, Arifai
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol. 14 No. 3 (2025): JULY
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v14i3.2398

Abstract

Micro, Small, and Medium Enterprises (MSMEs) in border areas such as Nunukan-Sebatik often face challenges in adopting modern technologies, which hinder their growth and competitiveness. This study employs a segmentation approach using agglomerative hierarchical clustering based on the Technology Readiness Index (TRI) to segment MSMEs in border areas and develop targeted strategies to accelerate technology adoption. A hierarchical clustering technique is applied to segment MSMEs according to their technology readiness levels. Data on technology readiness were collected through surveys, and the clustering results were analyzed to identify distinct MSME groups. The TRI score was 3.72, indicating a high level of technology readiness, which suggests that many MSMEs are open to technological innovation into their daily operations. The results also reveal that MSMEs in Nunukan-Sebatik can be grouped into two clusters based on hierarchical clustering:  Cluster 1, which consists of MSMEs that are more prepared and optimistic about technology adoption, and Cluster 2, which faces significant challenges. These findings highlight a digital readiness gap among MSMEs, where only a tiny portion (Cluster 1) is fully prepared, while the majority (Cluster 2) still encounters barriers to adoption.
Rekayasa Aplikasi Kriptografi dengan Penerapan Kombinasi Algoritma Knapsack Merkle Hellman dan Affine Cipher Fadlan, Muhammad; Hadriansa, Hadriansa
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 4 No 4: Desember 2017
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (674.044 KB) | DOI: 10.25126/jtiik.201744468

Abstract

AbstrakKerahasiaan sebuah data merupakan hal yang sangat penting untuk dijaga. Tetapi masalah yang terkadang muncul adalah adanya data rahasia yang bocor atau dicuri oleh pihak-pihak tertentu yang tidak berwewenang. Hal ini dikarenakan tidak adanya pengamanan untuk data tersebut dan diperkuat lagi dengan semakin sering dan mudahnya data untuk didistribusikan melalui sebuah pesan elektronik. Ketika pesan itu diretas, maka data rahasia yang belum diamankan dapat dengan mudah diketahui oleh pihak yang tidak berwewenang. Kriptografi mampu menjadi salah satu cara untuk mengamankan sebuah data. Pada penelitian ini akan dilakukan kombinasi Metode Affine Cipher dan Knapsack Merkle Hellman untuk melakukan enkripsi dan dekripsi data teks. Awalnya data akan dienkripsi terlebih dahulu dengan menggunakan affine cipher, hasil enkripsi dari affine cipher kemudian akan dienkripsi lagi dengan menggunakan merkle hellman. Sedangkan, untuk tahap dekripsi, data akan didekripsi terlebih dahulu menggunakan merkle hellman, kemudian dilanjutkan dengan affine cipher. Kombinasi metode dilakukan untuk lebih memperkuat pengamanan terhadap sebuah data. Hasilnya, kriptografi dengan menggunakan kombinasi metode Affine Cipher dan Knapsack Merkle Hellman dapat dilakukan untuk melakukan enkripsi dan dekripsi terhadap sebuah data. Dengan adanya pengamanan terhadap data tersebut, maka akan menyulitkan dan memperkecil kemungkinan pihak-pihak yang tidak berkepentingan untuk mengetahui suatu data rahasia.Kata kunci: affine, dekripsi, enkripsi, knapsack merkle hellman, kriptografi, kerahasiaanAbstractConfidentiality of data is very important to be maintained. But the problem that sometimes arises is the existence of secret data that is leaked or stolen by certain unauthorized parties. This is because there is no security for the data and is reinforced by the more frequent and easy data to be distributed via an electronic message. When the message is hacked, the secret data that has not been secured can easily be known by unauthorized parties. Cryptography can be one way to secure a data. In this research will be a combination of Affine Cipher Method and Knapsack Merkle Hellman to encrypt and decrypt text data. Initially the data will be encrypted first by using affine cipher, the encryption of the affine cipher will then be encrypted again using merkle hellman. Meanwhile, for the decryption stage, the data will be decrypted first using merkle hellman, then continued with affine cipher. Combination methods are done to further strengthen the security of a data. The result, cryptography by using a combination of Affine Cipher and Knapsack Merkle Hellman methods successfully done to perform encryption and decryption of a data. With the security of the data, it will complicate and minimize the possibility of parties who are not interested to know a secret data.Keywords: affine, decryption, encryption, knapsack merkle hellman, cryptography, confidentiality
Scheduling Uses the Blynk 2.0 Automations Feature for Effective Ornamental Fish Feeding Haryansyah, Haryansyah; Hadriansa, Hadriansa; Ardiansyah, Riswan
APTISI Transactions on Management (ATM) Vol 7 No 2 (2023): ATM (APTISI Transactions on Management: May)
Publisher : Pandawan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/atm.v7i2.2022

Abstract

Maintenance of ornamental fish can not be separated from the importance of regular feeding. Feeding which is still done manually will of course confiscate time and requires patience. However, the problem is when traveling that it doesn't Allows manual feeding. Matter this requires a system or tool that can provide fish feed automatically based on a schedule which is determined. One that can be used is with create Internet of Things (IoT)-based devices. There have been many developments in IoT-based devices gave birth to a variety of features that can be utilized in create automation tools in everyday life. Wrong one of which is a feature on the Blynk 2.0 application. on this application there is one feature that can be utilized in the process scheduling to perform one particular activity that very easy for users without having to be difficult to make a program commonly known as Automation feature. This feature will work continuously periodically according to a predetermined schedule. On research this will take advantage of these features in the manufacture of tools automatic fish feeding automation. scheduling feeding fish will utilize automation features at the same time can be monitored when the last feed was given. This study utilizes the NodeMCU ESP8266 as main controller and servo motor as driving tool feeder. The tool will be connected to the Blynk application via Wi-Fi network.