Claim Missing Document
Check
Articles

Found 16 Documents
Search
Journal : Computer

SISTEM PEMBUANGAN SAMPAH OTOMATIS MENGGUNAKAN AUTOMATIC GUIDED VEHICLE BERBASIS GPS ULTRASONIK Yonanta, Rhesty Dian; Maslan, Andi
Computer Science and Industrial Engineering Vol 3 No 2 (2020): comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT In a housing complex, there are many conditions that make people do not care about cleanliness in the environment because there are various factors that are mostly caused by the waste disposal site is too far away and the time of collection of garbage for TPS officers when taking garbage to housing is not timely and less disciplined due to limitations labor so that a solution will be needed to overcome these problems. In this final project an automatic waste disposal system will be designed using an ultrasonic GPS-based automatic guide vehicle. In the robot car will be programmed a timing that will set the time lag needed for this robot car to take garbage from one house to another following the route that has been set. The way this robot works if there is a blockage in front of the house automatically it will automatically stop and because there is an Ultrasonic GPS sensor that helps it. The results of the final project of an automatic garbage disposal system using an ultrasonic GPS-based automatic guide vehicle can transport as much as 5kg of garbage. To run this robot using the Arduino Uno. Keywords: Rubbish, Automatic guide vehicle, GPS ultrasonik
KEAMANAN JARINGAN DARI SERANGAN PAKET DATA SNIFFING DI PT RADEN SYAID KANTOR POS PIAYU KOTA BATAM ihsana, angga novenzo; Maslan, Andi
Computer Science and Industrial Engineering Vol 3 No 5 (2020): comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Pada era jaman moden ini hapir semua orang menggunakan internet untuk mencari data penting atau kerja, dan lain-lain. Dalam hal ini ke aman jaringan di butuhkan untuk menajaga ke stabilan dalam berinternet atau dalam berbagai transaksi yang terjadi dalam jaringan. Pada kasus ini keaaman jaringan sangat berperan penting untuk mernajaga dan menstabilkan kinerja sistem. Salah satu aplikasi yang di gunakan dalam jurnal ini adalah snort yang di mana dapat melihat paket data yang berjalan pada interface jaringan, Dan snort juga dapat memblok IP atau MAC addres yang di anggap berbahaya. Bukan cuman itu saja di penelitian ini juga menggunakan Wireshark yang di mana bisa melihat aktifitas apa saja yang berjalan pada jaringan terbut. Sehingga untuk keaman jaringan yang lebih baik. Pada peneletian kali ini untuk menguji apakah sebuah sistem telah aman atau tidak menggunakan LOIC ,NMAP, WinArpAttacker. Yang di mana aplikasi tersebut di peruntukan untuk penyerangan
IMPLEMENTASI METODE K-NEAREST NEIGHBORDALAM PERAMALAN PENJUALAN MOBIL BEKAS DI KOTA BATAM Rafsyanzani s, Firman Firmansyah; Maslan, Andi
Computer Science and Industrial Engineering Vol 4 No 2 (2021): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT The development of information technology begins to enter the most important part in a field of work, information obtained in a job is general and specific. Computers are one of the results of technological developments that can be used to help all types of work, including transactions in business work, with those in the computer software, a user can perform transaction operations quickly. The use of computers is also needed by a marketing. Car sales of PT. Auto Grace is a company engaged in the sale and purchase of used cars, an area domiciled in the city of Batam. Car sales at PT. Auto Grace is currently still unstable and many cars are not sold and are not maintained due to the lack of consumer interest in buying. So that the company does not experience sales problems, the company leadership must be able to find solutions in a way that is able to predict. So this study aims to predict car sales using the K-NN algorithm. The data set used to predict is taken from sales data from 2017 to 2020. After analysis using the K-NN algorithm, with the help of rapidminer software, the accuracy rate in predicting sales is 63.89% with a precision level of 100%. . The question of take that sale car at year 2021 will experience a decline, due to the outbreak of the Covid-19 virus which has resulted in an economic recession.
MEMBANGUN PC CLONNING BERBASIS WINCONNECT Utomo, Imam Budi; Maslan, Andi
Computer Science and Industrial Engineering Vol 4 No 2 (2021): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Operating systems have become a necessity today in various government agencies, industry, and universities and have used computers to help with daily work. As users, of course, they want the ease of operating a system, such as sharing files, sharing windows, sharing the internet, and sharing various kinds of multimedia. In connection with sharing an operating system or windows, of course the term remote desktop is known, this term is rarely known by users, even never used. Based on these problems, this study discusses Building a PC Clonning Network Using Winconnect and Remote Desktop. From this problem, the purpose of this research is to build a PC Clonning network that functions to minimize or cover the shortcomings of PC specifications that do not meet the standards accurately, effectively, and efficiently and also to be able to determine the success of the PC Cloning that it has built, so that it can walk more significantly and can be enjoyed. To achieve this goal, direct observation (observation) and descriptive statistics are used, so that the results of these methods have been obtained from observations and statistical analysis in the observation process, with PC Clonning users can access the windows display remotely, save upgrade costs, increase pc performance. The test results in this study showed the success rate of PC Clonning with remote desktop on PC 1 (one) to PC 4 (four), it was seen that before cloning the processor was 0%, memory was 19%, network was 0%, while after the cloning process the processor was still steady at 0%, memory increased to 20% and networking to 0.01%. Second, processor 0%, memory 21%, network 0%, processor 1%, memory 23% and networking to 0.04%. Third, 1% processor, 30% memory, 0% network, 4% processor, memory increased to 32% and networking to 8%. And fourth, processor 7%, memory 63%, network 0%, processor 20%, memory increased to 65% and networking to 0.01%.
PERANCANGAN PRIVATE CLOUD COMPUTING MENGGUNAKAN OWNCLOUD Wiyono, Pieter; Maslan, Andi
Computer Science and Industrial Engineering Vol 5 No 2 (2021): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cloud computing has an important role for development of technology. Cloud computing is the use of internet network technology to become a central server for managing and storing data. Cloud computing is very useful, especially for large companies, because it saves more data storage space, data is also safer than those who still store data in conventional ways such as using a flash or hard disk. In addition, by using cloud storage, users such as employees in companies can send data to each other quickly, so they can save time and be more efficient in their performance. The problems that are transported are how users can store and exchange data, the process of designing cloud storage, and also utilizing cloud storage services. The purpose of this research is to design, implement, and evaluate private cloud storage. Based on the objectives, the result of this research is the system design is done using PHP to design the web interface. From the web interface it is connected to OwnCloud using the REST API protocol. After that, the private cloud storage system is implemented in a company and evaluated so that it gets a system that can run and function properly.
APLIKASI PROMOSI PROPERTI BERBASIS WEB MENGGUNAKAN METODE WATERFALL Gunawan, Heri; Maslan, Andi
Computer Science and Industrial Engineering Vol 6 No 2 (2022): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Until now, technological advances that continue to develop rapidly have made all jobs in life switch to using complex of technology that can facilitate all types of business activities will be easier, faster, and more efficient PT Winner Nusantara Jaya is a company engaged in property sales. The problem often faced by property sales companies is that they still use print media and social media in property promotion so it is necessary to have an information system that contains complete information about the properties that exist in PT. winner archipelago jaya information on business marketing activities as well as sales. In modeling the system that will be used by researchers is UML for the research program using the PHP programming language and also for the researcher database using MYSQL the result of the design of this information system is to assist consumers in finding property products at PT. winner archipelago jaya.
PERANCANGAN APLIKASI E-GALON BERBASIS ANDROID Tampubolon, Piala; Maslan, Andi
Computer Science and Industrial Engineering Vol 6 No 5 (2022): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

abstract
IMPLEMENTASI CAESAR CIPHER PADA ALGORITMA KRIPTOGRAFI KLASIK DALAM PENYANDIAN PESAN Ziliwu, Krisma Budi; Maslan, Andi; Kremer, Hendri
Computer Science and Industrial Engineering Vol 7 No 2 (2022): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Criptography is an art of knowledge to learn of securing the information in a message. The security of the message consists of confidentiality, integrity and authentication. The key for coding the message to convert the original message into readable form has different algorithms. The difference of algorithm based of what the key used when encript and descrypt the message. Symmetric key cryptography uses same key when user do encrypt and descrypt. But when user do encrypt and descrypt with different key it’s called asymmetric key cryptography. The main topic of this paper will be concerned about how to do symmetric key algorithm with subtitution method. Caesar cipher is example of subtitution method.
GAME EDUKASI PENGENALAN BAHASA INDONESIA BERBASIS ANDROID UNTUK PENCARI SUAKA DI BATAM Nopri Hidayat; Maslan, Andi
Computer Science and Industrial Engineering Vol 7 No 5 (2022): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT An asylum seeker is a person who has applied for protection but his application is in the process of being determined. Batam is one of the cities in Indonesia that is home to asylum seekers. Asylum seekers in Batam stay at Hotel Kolekta Batam. Data for May 2022, the total number of asylum seekers staying at the Kolekta Batam hotel is 283 people. Asylum seekers from Afghanistan became the most inhabited with a total of 173 people. While living in Indonesia, the problem is communication with the surrounding community who use Indonesian, especially children. Although there are already Indonesian language learning programs, there is still a need for a more fun learning method, one of which is games. Games are more liked by children in terms of learning than using books. To overcome these problems, an Android-based Indonesian language introduction educational game was built using the MDLC method. The MDLC method is divided into several stages, namely concept, design, collecting material, assembly, testing, and distribution. This educational game has 4 sub-menus, namely: learn, play, about and exit. Educational games are accompanied by attractive designs and animations so that they are interesting to use for children to learn. Keywords: Educational Games, Asylum Seeker, Indonesian Language, Android Based.
ANALISIS KEAMANAN JARINGAN PADA FASILITAS INTERNET TERHADAP SERANGAN SYSTEM FAILURE PADA TOKO SERVICES W-ELEKTRIK BATAM Nofedrinata, Windri; Maslan, Andi
Computer Science and Industrial Engineering Vol 8 No 2 (2023): Comasie
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The research entitled Analysis of Network Security in Internet Facilities (Wifi) Against System Failure Attacks at the Batam W-Electric Service Shop is expected to help analyze network protocols and review network security. The technique used in this study is a descriptive approach, where this strategy is used to parse information by describing the information that has been collected without making changes when conducting research at the Batam W-Electric Service Store. Based on directed research, this shows how research in the W-Electric Service Store can be intercepted using ettercap and can be easily attacked in the form of a trojan, which is a wiretapping cycle by sending packets. Therefore it is suggested to the W-Elektrik Service Shop to further develop network security so that it is not easily hacked and attacked like a trojan.