Claim Missing Document
Check
Articles

Found 15 Documents
Search

RANCANG BANGUN SISTEM INFORMASI PEMETAAN PERSEBARAN MENARA TELEKOMUNIKASI SELULER BERBASIS GIS DI LOMBOK TENGAH Arif Setiawan, M.; Tantoni, Ahmad; Fahmi, Hairul
JUTSI: Jurnal Teknologi dan Sistem Informasi Vol. 1 No. 1 (2021): February 2021
Publisher : LPPM STMIK Royal Kisaran

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33330/jutsi.v1i1.1040

Abstract

Abstract:Central Lombok Diskominfo availability of very limited information about towers that have not paid or that have already paid fees causes Central Lombok Dikominfo tends not to have accurate and relevant information so it must check the tower. The research objective is to map 320 towers spread across the Lombok Regency in the form of a Google map. The system development method in this study uses XP (Extreme Programming) and the application testing technique uses the Black-Box Testing method. The results of this study are to make it easier for employees / staff in finding the location of the tower that has not paid and who have paid fees by clicking the tower icon in the application. Keywords:Geographic Information Systems, XP (Extreme Programming), Central Lombok  Abstrak:Diskominfo Lombok Tengah ketersediaan informasi yang sangat terbatas mengenai menara yang belum membayar atau yang sudah membayar retribusi menyebabkan Dikominfo Lombok Tengah cenderung tidak memiliki informasi yang akurat dan relevan sehingga harus mengecek menara tersebut.Tujuan penelitian untuk memetakan 320 menara yang tersebar di wilayah Lombok bentuk google map. Metode pengembangan sistem dalam penelitian ini menggunakan XP (Extreme Programming) dan teknik pengujian aplikasi ini menggunakan metode Black-Box Testing.Hasil penelitian ini ialah memberikan kemudahan kepada pegawai/staff dalam mencari lokasi menara yang belum membayar dan yang sudah membayar retribusi dengan cara mengklik icon menara pada aplikasi. Kata kunci:Sistem Informasi Geografis, XP (Extreme Programming), Lombok Tengah
SISTEM PENUNJANG KEPUTUSAN EVALUASI KINERJA KARYAWAN MENGGUNAKAN METODE SIMPLE ADDITIVE WEIGHTING STUDI KASUS : PT. TRIPA MULTI MANDIRI Maulida, Nurul; Tantoni, Ahmad; Fadli, Sofiansyah
Jurnal Review Pendidikan dan Pengajaran Vol. 7 No. 4 (2024): Vol. 7 No. 4 Tahun 2024
Publisher : LPPM Universitas Pahlawan Tuanku Tambusai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/jrpp.v7i4.34250

Abstract

Tripa Multi Mandiri adalah perusahaan yang menyediakan layanan dalam pengurusan sertifikasi industri dan legalitas perusahaan. Untuk meningkatkan kualitas kerja dan memotivasi karyawan, perusahaan ini menerapkan sistem pendukung keputusan untuk menilai kinerja karyawan terbaik. Namun, evaluasi kinerja yang dilakukan secara manual sering kali kurang konsisten dan objektif. Untuk mengatasi masalah ini, penelitian ini mengusulkan penggunaan sistem pendukung keputusan dengan metode Simple Additive Weighting (SAW). Metode SAW, yang dikenal sebagai metode penjumlahan terbobot, mekan penilaian kinerja yang lebih sistematis dan objektif dengan mempertimbangkan lima kriteria utama: kedisiplinan (bobot 0,30), kehadiran (0,20), tanggung jawab (0,20), kerja sama (0,15), dan prestasi (0,15). Data kinerja karyawan dinormalisasi dengan nilai maksimum dan minimum pada setiap kriteria, lalu dihitung untuk mendapatkan skor akhir berdasarkan bobot yang ditetapkan. Hasil evaluasi menunjukkan bahwa metode SAW efektif dalam menentukan karyawan terbaik, dengan nilai total tertinggi mencapai 0,957 untuk karyawan A1 dan nilai terendah 0,787 untuk karyawan A11. Sistem ini memberikan solusi yang lebih adil dan transparan dibandingkan dengan metode manual sebelumnya. Penelitian ini merekomendasikan agar PT. Tripa Multi Mandiri secara berkala meninjau dan memperbarui bobot kriteria penilaian untuk menjaga relevansi dan efektivitas sistem evaluasi.
PENINGKATAN PRODUKSI PETANI LAHAN KERING MELALUI BUDIDAYA SEMANGKA BERBASIS TEKNOLOGI IRIGASI UNTUK MENCETAK PETANI MUDA MILENIAL DAN MEWUJUDKAN PERTANIAN BERKELANJUTAN Mardi, Mardi; Zulkarnaen, Muhammad Fauzi; Tantoni, Ahmad
Devote: Jurnal Pengabdian Masyarakat Global Vol. 4 No. 4 (2025): Devote: Jurnal Pengabdian Masyarakat Global, 2025
Publisher : LPPM Institut Pendidikan Nusantara Global

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55681/devote.v4i4.5122

Abstract

This community service program was conducted in Sambelia Village, East Lombok Regency, an area characterized by dryland agriculture and high dependency on rainfall. The main problems faced by farmers are limited water resources, low crop diversification, and declining youth interest in the agricultural sector. The program aimed to enhance farmers’ capacity and productivity through the implementation of water-efficient irrigation technology and watermelon cultivation after corn harvest. The activities were carried out in five stages: socialization, training, technology implementation, mentoring and evaluation, and program sustainability. Training sessions adopted a learning by doing approach covering dryland watermelon cultivation, drip irrigation systems, organic fertilizer management, and digital marketing. The results indicated a significant improvement in participants’ knowledge and skills, with post-test scores increasing by an average of 47.3% compared to pre-test. In terms of productivity, farmers who previously cultivated corn only once a year were able to add a second cropping cycle with watermelon, resulting in a 166–200% increase in income. This activity demonstrates that the implementation of community-based irrigation technology effectively improves land-use efficiency, farmer independence, and agricultural sustainability in dryland areas.
ANALISIS KEAMANAN JARINGAN KOMPUTER PADA PERANGKAT LAYER 2 DAN LAYER 3 Yuliadi, Yuliadi; Tantoni, Ahmad; Zaen, Mohammad Taufan Asri
Jurnal Informatika Teknologi dan Sains (Jinteks) Vol 7 No 4 (2025): EDISI 26
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51401/jinteks.v7i4.6731

Abstract

Pada Layer 2 Data Link Layer, perangkat seperti access point dan switch rentan terkena ancaman serangan dari internal seperti MAC flooding, VLAN hopping dan ARP spoofing yang dapat menyebabkan penyusupan data. Sedangkan pada Layer 3 Network Layer terdapat perangkat router rentan terhadap serangan seperti DoS/DDoS, IP spoofing, serta pemanipulasian routing table yang dapat mengganggu konektivitas antarjaringan sehingga attacker dapat mengalihkan lalu lintas ke pihak yang tidak sah. Berbagai teknik mitigasi untuk mengatasi ancaman pada layer 2 dan layer 3 ini telah dikembangkan untuk mengatasi ancaman tersebut, seperti penerapan Firewall, Dynamic ARP Inspection, Port Security, Access Control List (ACL) dan IPSec. Akan tetapi, dalam pengimplementasi keamanan ini masih ada yang kurang tepat dan belum optimal sehingga sering kali masih menyisakan celah keamanan yang dapat dimanfaatkan oleh attacker untuk melakukan serangan.Berdasarkan kondisi tersebut, diperlukan analisis mendalam mengenai keamanan infrastruktur hadware jaringan komputer pada perangkat Layer 2 dan Layer 3 untuk mengidentifikasi potensi ancaman serta penerapan mekanisme keamanan. Analisis ini diharapkan dapat menjadi referensi dalam meningkatkan keamanan jaringan serta mendukung terciptanya infrastruktur digital yang dapat di handalkan dan keamanan yang tinggi.
DDoS ATTACK MITIGATION WITH INTRUSION DETECTION SYSTEM (IDS) USING TELEGRAM BOTS Zaen, Mohammad Taufan Asri; Tantoni, Ahmad; Ashari, Maulana
JISA(Jurnal Informatika dan Sains) Vol 4, No 2 (2021): JISA(Jurnal Informatika dan Sains)
Publisher : Universitas Trilogi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31326/jisa.v4i2.1043

Abstract

 In the current IS/IT era, service to consumers is an absolute must to be prepared to survive in business competition. Physical and logical attacks with the aim of disrupting information technology services for individuals/agencies/companies or reducing the performance of IS/IT used. The development of IoT in the industrial revolution 4.0, which is all online, is a challenge in itself, from a negative point of view, all of them are able to carry out attacks on ISP servers, often carried out by hackers. DDoS (Distributed Denial of Service) attacks are the most common attacks. The development of software for DDoS attacks is very much on the internet, including UDP Unicorn software to attack very easily and can be done by anyone. Software for real-time monitoring of DDoS attacks, one of which is the Telegram bot. Telegram is a messaging system centered on security and confidentiality, while bots are computer programs that do certain jobs automatically. Telegram bot is free, lightweight and multiplatform. In the case study, this research contains 10 access points to the internet that will be mitigated from DDoS attacks. In this study, it was found that DDoS attacks caused traffic to become very high/congested by fulfilling upload traffic so that legitimate traffic users could not access the internet, connection to the internet was slow, the traffic was also unnatural, making it unable to connect to wireless devices and making Mikrotik  login page becomes unable to appear. The purpose of this study is to mitigate DDoS attacks with the help of telegram bots so as to facilitate the notification of DDoS attacks in the event of an attack so that it is fast to deal with and find the perpetrators of the attack. The conclusion of this study is that DDoS attacks using UDP unicorn software resulted in a traffic spike of 53.5 Mbps on the upload traffic side, causing traffic for legitimate/authenticated users to slow down. By using telegram bots to know DDoS attacks occur in real time with a success rate of attack detection up to 100% notifications on telegram bots. Mitigation of DDoS attacks takes steps to track users using the torch feature on the routerboard interface menu, trace internet connection lines using wired or wireless transmission media, and ensure always monitoring the proxy interface from winbox.