Claim Missing Document
Check
Articles

Found 26 Documents
Search

OPTIMALISASI JARINGAN WIRELESS DENGAN METODE WIRELESS DISTRIBUTION SYSTEM (WDS) Arafat, Fadhilah; Sani, Asrul; Wiliani, Ninuk; Budiyantara, Agus
BRITech, Jurnal Ilmiah Ilmu Komputer, Sains dan Teknologi Terapan Vol 1 No 2 (2020): Periode Januari
Publisher : Institute Teknologi dan Bisnis Bank Rakyat Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Jaringan wireless merupakan sekumpulan komputer yang saling terhubung antara satu dengan lainnya sehingga terbentuk sebuah jaringan computer menggunakan media sinyal radio. Teknologi ini merupakan perkembangan yang memungkinkan efisiensi dalam implementasi dan pengembangan jaringan komputer karena dapat meningkatkan mobilitas user dan mengingat keterbatasan dari teknologi jaringan komputer menggunakan media kabel apabila terdapat tempat ? tempat yang sulit dijangkau. WDS merupakan sistem untuk mengembangkan jaringan internet wireless tanpa harus menggunakan kabel sebagai backbone untuk access point melainkan memanfaatkan jalur wireless dari access point tersebut. Dengan Wireless Distribution System (WDS) maka user ketika sudah terkoneksi ke jaringan ketika berpindah dari tempat satu ke tempat lannya tidak perlu melakukan koneksi berulang-ulang karena masih dalam cakupan sinyal wireless yang sama. Tujuan dari kegiatan penelitian ini adalah untuk mengimplementasikan jaringan Wireless Distribution System (WDS) dan untuk melakukan analisis performa jaringan Wireless Distribution System (WDS) dengan metode Quality Of Service (QoS) pada proses koneksi wireless hotspot ketika pengguna melakukan pindah lokasi dari satu tempat ke tempat lainnya maka tidak mengalami putus koneksi.
Profiling Calon Mahasiswa Program Studi Informatika Menggunakan Decision Tree Rizki Hesananda; Ninuk Wiliani; Latifah
BRITech, Jurnal Ilmiah Ilmu Komputer, Sains dan Teknologi Terapan Vol 2 No 1 (2020): Periode Juli
Publisher : Institute Teknologi dan Bisnis Bank Rakyat Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Prospective student data can be used as important information for academic community, therefore proper data management needed to process it. This research uses the prospective student throught the 2020 APERTI scholarship path as the basis for the classification of prospective students which wasa previously done manually using Microsoft Excel so that the classification process is not optimal. The process of identifying profiles uses data mining to determine marketing plans and pattern of prospective students with a profile classification process as well as offering recommendations for them. This research used decision tree (C4.5). The attributes used for the classification process are father’s job, mother’s job, gender, school type, major and the choice of the chosen study program. The result of this research can be used to help sort out prospective students according to the informatics study program.
Implementasi Metode Algoritma KVC Untuk Pengamanan Pesan Yunita Achsanty; Heru Abrianto; Ninuk Wiliani
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 3 (2018): Edisi Juli
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v3i0.62

Abstract

Communication through message media or sms, Sort Message Service is not a point to point message but that communication by sent through sms network and stored in database operator. Message security on the network is threatened be read by people who are not responsible or called intercept. Therefore it will be develop some application on the mobile phone to modify the message be come a ciphertext and the information content of the messageis not known by others. In this application, the system encrypts the message into ciphertext using the key entered by the sender and then it will be sends to the destination number. For accepting the message, system will decrypt chipertext become plaintext using key by sender, then the message can be read by receiver. This application can be used by some one who wants to sending the secret message and very important without fear if the information can read by others. This application uses vigenere cipher method. The main parameter is the key and the message itself.
APPLICATION OF MACHINE LEARNING FOR BITCOIN EXCHANGE RATE PREDICTION AGAINST US DOLLAR Wiliani, Ninuk; Hesananda, Rizki; Rahmawati, Nidya Sari; Prianggara, Erdham Hestiadhi
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol 7 No 2 (2022): JITK Issue February 2022
Publisher : LPPM Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1590.378 KB) | DOI: 10.33480/jitk.v7i2.2880

Abstract

Predicting a currency Exchange rate and performing analysis is an action to try to determine the price valuation of a currency or other financial instrument traded on an exchange platform. Bitcoin is a consensus network that enables new payment systems and fully digital money. Bitcoin is the first decentralized peer to peer payment network that is fully controlled by its users without any central authority or intermediary. From the user's point of view, Bitcoin is like cash in the internet world. Bitcoin can also be viewed as the most prominent triple bookkeeping system in existence today. The change in Bitcoin's behavior against the US dollar is influenced by many factors. Basic or economic factors that may be affected include inflation rates and money supply. In this study, data was collected by obtaining all data through the API provided by binance.com and labeled with the specified attribute. The modeling is done by using the rapidminer application. The process begins by taking training data that has been provided previously. The next stage is the data testing process, all operators that have been previously determined are connected and tested using the Linear Regression operator. The purpose of testing this data is to predict stock prices from the testing data that has been made by the Split Data operator, which is 19% of the total data that has been prepared.
Ultra-Micro Lending Eligibility Support System With Exponential Comparison Method (MPE) Ninuk Wiliani; Mulyana Adi Supatra; Herry Wahyono
Jurnal Riset Informatika Vol. 5 No. 3 (2023): June 2023
Publisher : Kresnamedia Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34288/jri.v5i3.240

Abstract

The process of providing credit can now be done quickly and closely through the presence of BRILink agents with additional facilities in addition to payment points, namely as partners of ultra-micro loans, which are now popularly called UMi Partners, where BRILink agents can distribute microloans with a loan range of 1 to 5 million. This is done by management as a financial inclusion program and as a revitalization of work in all operational work units (UKO). This research uses the Exponential Comparison Method (MPE) to determine credit granting decisions to optimize all existing information systems by implementing a system that can be used and run by UMi partners to improve the process of providing creditworthiness to their partners. The results of the calculations carried out by the system are manual calculations that have been carried out so that the results of this study can be applied correctly to produce creditworthiness that helps the credit-granting process.
Identifying Skin Cancer Disease Types With You Only Look Once (YOLO) Algorithm Ninuk Wiliani; Anita Putri Valeria Dhiu Lusi; Nur Hikmah
Jurnal Riset Informatika Vol. 5 No. 3 (2023): June 2023
Publisher : Kresnamedia Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1013.677 KB) | DOI: 10.34288/jri.v5i3.241

Abstract

The skin is the outermost vital organ and is susceptible to various diseases, including skin cancer. The number of cases of skin cancer around the world continues to increase every year, including in Indonesia. Proper handling is critical to cure skin cancer, and one of the solutions that can be used is the Deep Learning method. This study aims to apply the Deep Learning method, specifically an object detection algorithm called You Only Look Once (YOLO), for early skin cancer detection. The YOLOv5s algorithm is the model for this study because it is accurate and can detect objects in real-time. The research method involved collecting data on skin cancer cases and training the YOLOv5s model. After training, model testing is used to evaluate the ability to detect skin cancer. The test results show that the YOLOv5s model has an accuracy of 89.1% in detecting skin cancer types. This research has important implications in the health sector, especially in early skin cancer detection.
RANCANG BANGUN APLIKASI KASIR TIKET NONTON BOLA BARENG PADA X KASIR DI SUATU LOKASI X DENGAN VISUAL BASIC 2010 DAN MYSQL Ninuk Wiliani
JURNAL REKAYASA INFORMASI Vol 6 No 2 (2017): JURNAL REKAYASA INFORMASI
Publisher : PROGRAM STUDI SISTEM INFORMASI INSTITUT SAINS DAN TEKNOLOGI NASIONAL (ISTN)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Aplikasi kasir tiket nonton bola bareng merupakan salah satu organisasi bisnis yang menggunakan sistem informasi secara optimal, terkomputerisasi, dan tertata dalam peyimpanan databasenya. Aplikasi kasir tiket nonton bola bareng tercipta karena sistem input yang berjalan di suatu lokasi xmasih manual.Dengan metode tersebut dirasa belum terkomputerisasi sehingga menguragi kinerja pembayaran dalam bertransaksi. Sistem ini bertujuan untuk memudahkan pihak penyelenggara dalam menyelenggarakan nonton bareng bola disuatu lokasi x dapat berjalan sesuai dengan fungsinya. Manfaat dari sistem ini mudah dalam melakukan transaksi pembayaran di suatu lokasi x. Perancangan program aplikasi akan dilakukan dengan menggunakan bahasa pemrograman visual basic yang diuji cobakan pada Microsoft Visual Basic 2010 dan MySQL.
DIGITAL MENU PADA X CAFE BERBASIS DESKTOP GRAPHICAL USER INTERFACE DENGAN VISUAL BASIC 2010 DAN MICROSOFT ACCESS 2007 Ninuk Wiliani; Aulia Fahmi
JURNAL REKAYASA INFORMASI Vol 6 No 1 (2017): JURNAL REKAYASA INFORMASI
Publisher : PROGRAM STUDI SISTEM INFORMASI INSTITUT SAINS DAN TEKNOLOGI NASIONAL (ISTN)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Perkembangan teknologi akhir-akhir ini sangat pesat, terutama dalam bidang komputer. Kecanggihan teknologi saat ini dapat mensimulasikan perangkat-perangkat diluar komputer seperti pelayanan Cafe, dan disimulasikan kedalam komputer dalam bentuk digital interface yang menarik. Metode dan perancangan aplikasi ini berhubungan dengan dunia usaha. Dan paling diperlukan dalam bidang penjualan produk yang harus bertindak cepat dan tepat, sehingga diperlukan program yang dapat mempercepat dan meminimalisir kesalahan dalam pemesanan makanan dan minuman. Pada proses pengembangan sistem digunakan metodologi waterfall model. Waterfall model merupakan metode perancangan yang umumnya masih menggunakan urutan (sequential) yang bertahap dan teratur.Untuk itu dirancang sebuah aplikasi daftar menu digital di X Cafe dengan menggunakan Visual Basic 2010. Jadi kesimpulannya untuk mengatasi masalah-masalah pada sistem yang sudah berjalan, penginputan, penyimpanan dan pemrosesan data dapat dilakukan dengan efektif dan efisien juga agar meminimalisir terjadinya kesalahan dalam pemesanan makanan dan minuman serta mengurangi penggunaan kertas yang berlebihan.
MEASUREMENT OF READINESS AND INFORMATION TECHNOLOGY ADOPTION BASED ON ORGANIZATIONAL CONTEXT AMONG SMEs Sani, Asrul; Nawangtyas, Nur; Budiyantara, Agus; Wiliani, Ninuk
Jurnal Pilar Nusa Mandiri Vol 16 No 2 (2020): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v16i2.1642

Abstract

The importance of using information technology forces organizations to switch to using this technology in the daily activities of the organization in running a business and this cannot be separated from the SMEs organization. This research was conducted to measure the readiness level of a Small, and Medium Enterprise (SMEs) organization in the use and adoption of information technology based on the organizational context. This research uses quantitative methods by conducting surveys and interviews with policymakers organized by SMEs to avoid inaccurate information. Surveys and interviews were conducted in the Jabodetabek area. Data will be processed using PLS-SEM software for statistical analysis and inferential analysis, while for descriptive analysis using SPSS and spreadsheets. The results obtained indicate a significant relationship between the readiness level variable and the IT adoption variable.
CLOTH BAG OBJECT DETECTION USING THE YOLO ALGORITHM (YOU ONLY SEE ONCE) V5 Hesananda, Rizki; Natasya, Desima; Wiliani, Ninuk
Jurnal Pilar Nusa Mandiri Vol 18 No 2 (2022): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v18i2.3019

Abstract

The use of plastic in modern life is increasing rapidly, causing the number of people who use plastic to increase, one of which is when shopping. The function of plastic bags as packaging for luggage is not comparable to the impact caused by plastic waste in the years to come. Plastic bags take a long time, even hundreds to thousands of years, to completely decompose. In order to support the government's program to reduce the use of plastic bags, this study will discuss how to detect cloth bags as a substitute for plastic bags. In this research, a system will be implemented to detect the use of cloth bags with Roboflow and Yolo v5. After carrying out all stages of the research, it can be concluded that the goodie bag detection model has been successfully created. The detection model was created using the YOLOV5 algorithm. The dataset used consists of 102 goodie bag images. The process model uses 100 epochs with the training result mAP@0.5 is 89.8%. So, in other words, it can be said that YOLO v5 can detect goodie bags very well.