Claim Missing Document
Check
Articles

ANALISIS DAN PERANCANGAN PRIVATE CLOUD STORAGE MENGGUNAKAN METODE IDS(INTRUSION DETECTION SYSTEM) DAN IPS(INTRUSION PREVENTION SYSTEM) STUDI KASUS DINAS KOMUNIKASI DAN INFORMATIKA KOTA PADANG PANJANG Meiditra, Irzon; Yuhandri; Sumijan
RJOCS (Riau Journal of Computer Science) Vol. 9 No. 2 (2023): RJOCS (Riau Journal of Computer Science)
Publisher : Fakultas Ilmu Komputer, Universitas Pasir Pengaraian

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30606/rjocs.v9i2.1781

Abstract

The Office of Communication and Informatics of the City of Padang Panjang is an executive element of government affairs in the field of communication, informatics, coding and statistics and has the task of carrying out government affairs in the field of communication and informatics. And the Communication and Informatics Office has a server storage service with lots of data. The development of a cloud computing server will be a solution. Cloud computing is a form of technological progress that has developed along with the times, this has spurred the increasing use of the internet. Using internet technology that is capable of implementing virtual/online servers, which has the goal of building a cloud computing server at the Padang Panjang City Communication and Information Service Operating System (OS) Proxmox VE (Virtual Environment). Cloud computing is a form of technological progress that has developed along with progress of the times, this spurred the use of the internet which is increasing. By using internet technology that is capable of implementing virtual/online servers, the aim is to build a cloud computing server at the Padang Panjang City Communication and Information Service Operating System (OS) Proxmox VE (Virtual Environment) 6.4. Cloud computing is able to provide storage services that can be used simultaneously. The results of this study produce a cloud Storage server that implements a security system using the ids (intrusion detection system) and ips (intrusion prevention system) methods that is capable of carrying out data storage processes (storage), using software simultaneously in the network, and using infrastructure within the scope of cloud computing network at the Padang Panjang City Communication and Information Service using the private cloud Storage service model.
METODE MULTIFACTOR EVALUATION PROCESS UNTUK MENENTUKAN STRATEGI PROMOSI KAMPUS (STUDI KASUS DI UNIVERSITAS MUHAMMADIYAH MUARA BUNGO) Aal, Defrizal; Yuhandri; Sumijan
RJOCS (Riau Journal of Computer Science) Vol. 9 No. 2 (2023): RJOCS (Riau Journal of Computer Science)
Publisher : Fakultas Ilmu Komputer, Universitas Pasir Pengaraian

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30606/rjocs.v9i2.1784

Abstract

Setiap tahun ajaran baru kampus selalu saling bersaing untuk mendapatkan daya tarik calon mahasiswa baru dalam memilih Perguruan Tinggi tertentu, dan keunikan tersebut sekaligus dapat dijadikan sebagai keunggulan kompetitif. Oleh karena itu perlu adanya strategi promosi dari masing-masing kampus, khususnya di Universitas Muhammadiyah Muara Bungo (UMMUBA). Dalam penelitian ini strategi promosi kampusnya di analisa dengan menggunakan Metode Multifactor Evaluation Process (MFEP) dimana Nilai faktor atau kriteria didapatkan dari kuesioner yang dibuat secara sistem dan selanjutnya dibuatkan sub kriteria yang diidentifikasi dari nilai bobot sub kriteria tersebut. Berdasarkan kriteria promosi kampus itu, maka akan diimplementasikan beberapa alternatif alat atau media promosi kampus yang akan diterapkan dari setiap kriteria nilai bobot faktor tersebut menjadi nilai evaluasi bobot faktor dan akan dilakukan perhitungan nilai bobot evaluasi dari masing-masing alternatif alat atau media strategi promosi kampus tersebut. Berdasarkan bobot evaluasi tiap faktor dari alternatif alat atau media promosi kampus didapatkan maka dapat dicari nilai Total Weight Evaluation per Alternatif alat atau media promosi yang akan diuji, selanjutnya dilakukan perangkingan dan dibuat keputusan, mana yang terbaik dan baik. Dalam penelitian ini, didapatkan kesimpulan apabila nilai total weight evaluation dari alternatif alat atau media promosi itu nilainya besar atau sama dengan 10 (≥10) maka alternatif atau alat media promosi tersebut dikatakan sebagai prediket TERBAIK dan sebaliknya jika total weight evaluation itu lebih kecil dari 10 (≤10) maka nilai total weight evaluation seperti ini dikatakan sebagai prediket BAIK.
PENERAPAN METODE MOORA UNTUK REKOMENDASI PENGHARGAAN DOSEN BERDASARKAN KINERJA PENELITIAN DAN PENGABDIAN MASYARAKAT (STUDI KASUS DI STMIK ROYAL KISARAN) Eriyanto, Joko; Sumijan; Yuhandri
RJOCS (Riau Journal of Computer Science) Vol. 9 No. 2 (2023): RJOCS (Riau Journal of Computer Science)
Publisher : Fakultas Ilmu Komputer, Universitas Pasir Pengaraian

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30606/rjocs.v9i2.2053

Abstract

Pemberian penghargaan merupakan salah satu bentuk pengakuan dan motivasi bagi seseorang yang telah melakukan prestasi atau kinerja yang luar biasa. Di dalam dunia akademik, penghargaan diberikan kepada dosen yang memiliki kinerja yang baik dalam bidang penelitian dan pengabdian masyarakat. Namun, dalam pengambilan keputusan pemberian penghargaan tersebut, seringkali terjadi ketidakjelasan dalam kriteria penilaian dan pengambilan keputusan yang subjektif. Oleh karena itu, perlu dilakukan sebuah penelitian untuk mengembangkan sistem rekomendasi dalam pengambilan keputusan pemberian penghargaan dosen yang objektif dan efisien. Metode Moora (Multi-Objective Optimization by Ratio Analysis) merupakan salah satu metode yang dapat digunakan untuk menghasilkan rekomendasi pemberian penghargaan yang akurat dan konsisten. Penelitian ini bertujuan untuk mengembangkan sebuah sistem rekomendasi pemberian penghargaan dosen berdasarkan kinerja penelitian dan pengabdian masyarakat menggunakan Metode Moora. Dalam penelitian ini, data kinerja penelitian dan pengabdian masyarakat dari dosen-dosen yang bersangkutan dikumpulkan dan diolah menggunakan Metode Moora. Selanjutnya, sistem rekomendasi tersebut diuji coba dengan menggunakan data aktual dari LPPM STMIK Royal Kisaran. Kemudian didapatkan hasil akhir dimana alternatif A1 sebagai nilai tertinggi 0.33983832
Sistem Pendukung Keputusan Kelayakan Penerima Kartu Indonesia Pintar Kuliah Menggunakan Metode SAW Habdi, Habdi; Defit , Sarjon; Sumijan
JURNAL PERANGKAT LUNAK Vol 5 No 3 (2023): Jurnal Perangkat Lunak
Publisher : Indragiri Islamic University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/jupel.v5i3.2791

Abstract

Sistem Informasi Manajemen (SIM) sendiri adalah sebuah sistem formal dan informal yang menyajikan informasi mengenai sejarah, situasi saat ini, dan proyeksi masa depan melalui komunikasi lisan dan tulisan, terkait dengan berbagai operasi perusahaan dan lingkungan di sekitarnya. Selain itu, Sistem Penunjang Keputusan (Decision Support System) menjadi komponen penting dalam mendukung pengambilan keputusan untuk menyeleksi penerima beasiswa Kip Kuliah pengelola yayasan Universitas Dehasen Bengkulu memerlukan pendekatan yang lebih sistematis. tujuan penelitian untuk mengembangkan sistem pendukung keputusan membantu yayasan dalam proses seleksi penerima beasiswa. mempertimbangkan kriteria-kriteria tertentu, sistem diharapkan memberikan rekomendasi yang lebih akurat, sehingga proses seleksi dapat berjalan. Manfaat dari penelitian ini membantu pengelola mengambil keputusan lebih tepat. Metode SAW terdiri dari penilaian atribut setiap alternatif dan direpresentasikan dalam matriks penilaian keputusan. Matriks digunakan untuk menentukan seluruh kriteria dan skor dari setiap alternatif. Metode SAW memerlukan normalisasi matriks keputusan (X) untuk dibandingkan dengan peringkat alternatif yang ada. Metode SAW atribut kriteria ke-untungan (benefit) dan kriteria biaya (cost), Perbedaan dari kedua kriteria ini adalah dalam pemilihan kriteria mengambil keputusan.Kesimpulannya, dengan adanya sistem pendukung keputusan ini diharapkan proses seleksi penerima beasiswa KIP-Kuliah di Universitas Dehasen Bengkulu dapat berjalan dengan lebih efisien dan menghasilkan keputusan yang lebih akurat.
Audit Keamanan Website Menggunakan Acunetix Web Vulnerability (Studi Kasus Di SMK Muhammadiyah 3 Terpadu Pekanbaru) Supriyanto, Boby; Sumijan; Yuhandri
Computer Science and Information Technology Vol 5 No 1 (2024): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v5i1.6705

Abstract

Perkembangan teknologi informasi berkembang pesat seiring dengan pertumbuhan penggunanya. Contoh dari perkembangan teknologi adalah penggunaan website untuk mendukung kegiatan pembelajaran. Website merupakan kumpulan halaman web yang dapat diakses secara publik. Website dapat terdiri dari teks, gambar, video, dan media suara lainnya. Namun dengan berkembangnya suatu teknologi, maka perkembangan kerentanan atau serangan terhadap teknologi tersebut juga bertambah. Berdasarkan laporan tahunan monitoring keamanan siber tahun 2021 oleh Badan Siber dan Sandi Negara (BSSN), terdapat lebih dari 1,6 miliar serangan siber yang telah terjadi di Indonesia. Penelitian ini akan menggunakan Acunetix Web Vulnerability Scanner (WVS) untuk mengaudit keamanan website SMK Muhammadiyah 2 Terpadu Pekanbaru (SMK MUTI). Penelitian ini akan mengkaji kelemahan keamanan website SMK MUTI dan membahas bagaimana Acunetix Web Vulnerability dapat membantu dalam meningkatkan tingkat keamanan website tersebut. Metode Vulnerability Assessment (VA) yang digunakan adalah analisis deskriptif, yaitu data yang diperoleh disajikan dalam bentuk tabel, sehingga memungkinkan untuk memperjelas hasil analisis yang dilakukan dalam meng-audit. Berdasarkan data yang diperoleh dari hasil scanning iterasi 1 yang dilakukan, website SMK MUTI berada pada level ancaman 3 tergolong tinggi dengan ditemukan 192 peringatan atau kerentanan, dimana 2 diantaranya berada pada level tinggi dan 11 berada pada level sedang. Berdasarkan audit, dilakukan perbaikan dan pengujian pada penelitian di situs SMK MUTI ini, hasil yang telah dilakukan tingkat ancaman yang dicapai berada pada level 1, dimana pada level tinggi, jumlah kerentanan menjadi 0 dan tingkat dukungan juga menjadi 0, sehingga dapat disimpulkan bahwa situs SMK MUTI saat ini dengan status level 1 dapat bebas dari kerentanan keamanan.
Implementasi Convolutional Neural Netowork Untuk Klasifikasi Citra KTP-El SATRIA, SATRIA; Sumijan; Billy Hendrik
Computer Science and Information Technology Vol 5 No 1 (2024): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v5i1.6708

Abstract

The Electronic Identity Card (e-KTP) serves as the official proof of identity for residents, issued by the relevant implementing agency across the entire territory of the Unitary State of the Republic of Indonesia. Mandatory for both Indonesian citizens (WNI) and foreigners (WNA) holding a Permanent Stay Permit (ITAP) and aged 17 or married, the e-KTP is susceptible to potential damage, often arising from factors such as prolonged usage or improper handling. Physical damage to the e-KTP can impede the document's ability to accurately verify identity, potentially impacting public services and government administration. This research aims to assess the condition of e-KTPs, determining whether they are in good or damaged condition. The study employs the Convolutional Neural Network (CNN) method, known for its significant results in image recognition by attempting to emulate the image recognition system in the human visual cortex, facilitating the processing of image information. This method comprises two architectural layers: Feature Learning and Classification. The dataset utilized in this research comprises images of e-KTPs sourced from the Population and Civil Registration Office of Bengkalis Regency, totaling 400 images categorized into two classes: 200 for good condition and 200 for damaged condition. The research findings enable the determination of the e-KTP image's condition, achieving a 90% accuracy rate.
Implementasi Data Mining untuk Pemetaan Persebaran Infeksi Human Imunodeficiency Virus di Provinsi Riau Fadillah, Riszki; Sarjon Defit; Sumijan
Computer Science and Information Technology Vol 5 No 1 (2024): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v5i1.6712

Abstract

Based on data released by the Riau Provincial Health Service until October 2022, there were 8034 people living with HIV/AIDS (PLWHA), of which 3,711 were in the AIDS stage. Human Immunodeficiency Virus is a virus that attacks the body's immune system, while Acquired ImmunoDeficiency Syndrome (AIDS) is a collection of diseases caused by the HIV virus due to damage to the immune system in humans, resulting in the body being susceptible to potential diseases. This research aims to map the spread of HIV/AIDS in Riau Province to prevent and control the spread of the HIV/AIDS virus by the relevant agencies. The method used in this research is Fuzzy C-Means to carry out clustering in districts/cities which will then be visualized using a map or with a Geography Informatics System (GIS). The Fuzzy C-Means method is a data grouping technique that uses the existence of each data point in A cluster as determined by the degree of membership. The output from Fuzzy C-Means is a series of cluster centers and several degrees of membership for each data point. The data used in this research is HIV/AIDS data in Riau Province from 1997 to 2023. Based on the results of the tests that have been carried out, the results obtained are 3 clusters, namely the safe zone has 5 districts/cities, the alert zone has 5 districts/cities, and There are 2 districts/cities in the dangerous zone. There needs to be treatment through the Health Service, the AIDS Control Commission, and related Non-Governmental Organizations (NGOs) to prevent and control HIV/AIDS in Riau Province for areas that have a high potential for the spread of HIV/AIDS. The tests that have been carried out obtain a minimum error value of 0.008251 in the 8th iteration with the performance of Fuzzy C-Means being 13.271 in the distance between clusters.
Penerapan jst perceptron untuk mengenali huruf hijaiyah sebagai media pembelajaran anak usia dini Dwiprihatmo, Mohammad Reza; Sarjon Defit; Sumijan
Computer Science and Information Technology Vol 5 No 1 (2024): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v5i1.6718

Abstract

Computer vision is the transformation of data obtained or taken from a webcam into another form to determine the decisions to be taken. All forms of transformation are carried out to achieve certain goals. One of the techniques that supports the application of computer vision to a system is digital image processing, because the aim of digital image processing techniques is to transform images into digital format so that they can be processed by a computer. Computer vision and digital image processing can be implemented into a hijaiyah letter pattern recognition system on cards that have been prepared and placed on a white board which is supported by the perceptron algorithm artificial neural network method which is used as a learning technique for the system to be able to learn and recognize hijaiyah letter patterns. This research aims to enable computers to read hijaiyah letters using a camera. The methods used in this research are image processing and the perceptron algorithm. The data set processed in this research comes from 783 hijaiyah letters consisting of 29 hijaiyah letters and 30 samples per each hijaiyah letter. How it works is that each hijaiyah letter is captured using a webcam and produces a continuous image which is transformed into a digital image and processed using several techniques including grayscale images, binary images and cropping images. The results of this research are that the system is able to identify and classify hijaiyah letters with a testing rate of 99,746%. Therefore, this research can be a reference in the modern teaching and learning process and is expected to help children's interest in learning hijaiyah letters.
Model Antrian Multi Channel Single Phase Berdasarkan Pola Kedatangan Pasien untuk Pengambilan Obat di Apotik Yuliana, Devi; Santony, Julius; Sumijan
Jurnal Informasi dan Teknologi 2019, Vol. 1, No. 4
Publisher : SEULANGA SYSTEM PUBLISHER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37034/jidt.v1i4.12

Abstract

The accumulation of queues of prospective patients also results in an inadequate waiting room, which occurs because there is no disciplinary pathway that can provide a form of registration service that is efficient and flexible with time to many entry points and many services so that patients do not have to queue long only to take medicine. The solution to handling the problem of the accumulation of prospective patients in RSI Ibnu Sina Padang is to implement a multi-channel queuing system - Single phase, where there will be more than one entry point to register to RSI Ibnu Sina Padang so that the patient arrival pattern is divided into several times and the path is adjusted with the needs of the patient's desired time and there is more than one stage of service at Ibnu Sina Hospital in Padang. The purpose of this study was to design a php application at the Ibnu Sina Hospital in Padang with the Multi Single Phase Method and find out the time spent by patients in the queue, then it is expected to be useful for the RSI Ibu Sina Padang.
Implementasi Metode Backpropagation untuk Memprediksi Tingkat Kelulusan Uji Kopetensi Siswa Syofneri, Nandel; Defit, Sarjon; Sumijan
Jurnal Informasi dan Teknologi 2019, Vol. 1, No. 4
Publisher : SEULANGA SYSTEM PUBLISHER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37034/jidt.v1i4.13

Abstract

Vocational High School (SMK) 2 Pekanbaru is a Vocational School in Industrial Technology. At present there are 2400 students with 14 majors. In students the level of will in students is still low. Resulting in a low graduation rate for students. This happened because of the difficulty in predicting the level of competency examination passing at SMK Negeri 2 Pekanbaru. The purpose of this study is to assist in predicting the passing level of competency exams so as to produce predictions of student graduation. The method used is the Backpropagation method. With this method data processing can be done using input values and targets that you want to produce. So that it can predict the graduation of students in the expertise competency test. Furthermore, the data to be managed is a recapitulation of the average vocational values majoring in computer network engineering from semester 1 to semester 5 with aspects of knowledge on the target students of 2017 Academic Year and 2018 Academic Year obtained from the sum of all subjects in each semester. The results of calculations using the Backpropagation method with the Matlab application will be predictive in producing grades for students' graduation rates in the future. So that the accuracy value will be obtained in the prediction. With the results of testing the accuracy of prediction student competency tests with patterns 5-4-1 reaching 85%, with patterns 5-6-1 reaching 95%, patterns 5-8-1 reaching 70%, patterns 5-10-1 reaching 85% % and with 5-12-1 patterns it reaches 85%. Of the five patterns, the best accuracy rate of 5-6-1 is 95%. The prediction results using the Bacpropagation method can become knowledge in the next year. So that the system parameters used in testing can be recognized properly.