Claim Missing Document
Check
Articles

Found 9 Documents
Search

Development of A Training Model For CT Scan Equipment To Improve The Competence of Radiographers Andhika, Adi; Soeprijanto, Soeprijanto; Sugiyanta, Lipur
SANITAS: Jurnal Teknologi dan Seni Kesehatan Vol 14 No 2 (2023): SANITAS Volume 14 Nomor 2 Tahun 2023
Publisher : Politeknik Kesehatan Kemenkes Jakarta II

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36525/sanitas.2023.478

Abstract

Results of the author’s survey in Radiology Mitra Keluarga Kelapa Gading Hospital, there is a discrepancy between the length of service of employees (Radiographers) and their career level competencies for each year, Radiographers have worked for quite a long time but their skills are still very lacking. Apart from that, the current training unorganized and undirected, giving the impression that it is just plain training. This research aims to carry out development, the development carried out is developing the current CT Scan equipment training into better training capable of increasing the competency of Radiographers at Mitra Keluarga Kelapa Gading Hospital. The development model carried out is using the Dick and Carey model, where the results of this process are a CT Scan training model product called the Kyazeka training model, with the title of the book "becoming an expert CT Scan Radiographer". The product feasibility test results from experts were 86.7% for material experts, 98.2% for education and training experts and 100% for curriculum development experts. The results of the effectiveness test were obtained 79%. The Kyazeka training model is recommended for use and effective in increasing the competency of Radiographers at Mitra Keluarga Kelapa Gading Hospita.
Design And Implementation of Freeradius as A User Manager on The Mikrotik Hotspot Network at PT Indotruck Utama using The NDLC (Network Development Life Cycle) Method Pratama, Arya Pandu; Sugiyanta, Lipur; Idrus, Ali
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.309

Abstract

PT Indotruck Utama utilizes the 802.11n network only as an internet medium, without thinking about a sufficient security system for offices or companies. By only utilizing the 802.11n network which has poor security, it affects many illegal users who can enter the wireless network and can interfere with the performance of employees who are working. The purpose of this study is to produce a RADIUS-based authentication system that is used to improve wireless network security systems, namely being able to make a user have to login authentication twice, create different usernames and passwords for each user, prevent the entry of illegal users, and facilitate administrators in user management. In designing FreeRADIUS as a user manager on this proxy hotspot network using the NDLC (Network Development Life) method through 6 stages, namely analysis, design, simulation prototype, implementation, monitoring, and management. However, its application is only carried out until the implementation stage. This authentication system can be one solution to solve some problems that exist in the wireless network at PT Indotruck Utama. The test results from the capture on the wireshark application that uses PAP authentication still see the username and password, while those who use CHAP authentication only the username is visible, while the password is not visible because it has passed the encryption process.
Design and Implementation of Sucirata-Based Instrusion Detection System as a Network Security System Cloud Computers Idrus, Ali; Sugiyanta, Lipur; Nugraheni, Murien; Subhiyanto, S
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.310

Abstract

Cloud computing is currently being developed and widely used by companies that require large and efficient computing resources. As technology evolves, security threats in cloud services continue to increase. Various threats in cloud computing technology can be avoided by maximizing the identification of security holes. Information threats associated with cloud computing require network and service security against possible attacks. Suricata is a threat detection identifier supported by existing rules. When an attack is detected, Suricata will create a log of the attack committed, Suricata can also perform automatic detection at level 7. The author collected the results of the attack in a log. Sign Suricata and the authors also evaluate whether Suricata can detect port scanning, brute force, denial of service, and backdoors for Cloud Computing. From the test results, optimal results were obtained from the results of attacks detected by the Suricata Intrusion Detection System (IDS) logs in the /var/log/suricata/fast directory.log, the author added that the Suricata configuration is not only for detection, so it can also run drops if there is suspicious activity using network filters that already exist in Suricata and manipulated configuration assumptions to optimally improve security in the cloud.
Design And Implementation of Freeradius as A User Manager on The Mikrotik Hotspot Network at PT Indotruck Utama using The NDLC (Network Development Life Cycle) Method Pratama, Arya Pandu; Sugiyanta, Lipur; Idrus, Ali
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.309

Abstract

PT Indotruck Utama utilizes the 802.11n network only as an internet medium, without thinking about a sufficient security system for offices or companies. By only utilizing the 802.11n network which has poor security, it affects many illegal users who can enter the wireless network and can interfere with the performance of employees who are working. The purpose of this study is to produce a RADIUS-based authentication system that is used to improve wireless network security systems, namely being able to make a user have to login authentication twice, create different usernames and passwords for each user, prevent the entry of illegal users, and facilitate administrators in user management. In designing FreeRADIUS as a user manager on this proxy hotspot network using the NDLC (Network Development Life) method through 6 stages, namely analysis, design, simulation prototype, implementation, monitoring, and management. However, its application is only carried out until the implementation stage. This authentication system can be one solution to solve some problems that exist in the wireless network at PT Indotruck Utama. The test results from the capture on the wireshark application that uses PAP authentication still see the username and password, while those who use CHAP authentication only the username is visible, while the password is not visible because it has passed the encryption process.
Design and Implementation of Sucirata-Based Instrusion Detection System as a Network Security System Cloud Computers Idrus, Ali; Sugiyanta, Lipur; Nugraheni, Murien; Subhiyanto, S
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.310

Abstract

Cloud computing is currently being developed and widely used by companies that require large and efficient computing resources. As technology evolves, security threats in cloud services continue to increase. Various threats in cloud computing technology can be avoided by maximizing the identification of security holes. Information threats associated with cloud computing require network and service security against possible attacks. Suricata is a threat detection identifier supported by existing rules. When an attack is detected, Suricata will create a log of the attack committed, Suricata can also perform automatic detection at level 7. The author collected the results of the attack in a log. Sign Suricata and the authors also evaluate whether Suricata can detect port scanning, brute force, denial of service, and backdoors for Cloud Computing. From the test results, optimal results were obtained from the results of attacks detected by the Suricata Intrusion Detection System (IDS) logs in the /var/log/suricata/fast directory.log, the author added that the Suricata configuration is not only for detection, so it can also run drops if there is suspicious activity using network filters that already exist in Suricata and manipulated configuration assumptions to optimally improve security in the cloud.
Analisis Perbandingan Antara Colocation Server Dengan Amazon Web Services (Cloud) Untuk Usabilitas Portal Swa.co.id Di PT. Swa Media Bisnis) Sugiyanta, Lipur; Nurahma, Witri Adinda
PINTER : Jurnal Pendidikan Teknik Informatika dan Komputer Vol. 1 No. 1 (2017): Jurnal PINTER
Publisher : PTIK Fakultas Teknik UNJ

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (904.591 KB) | DOI: 10.21009/pinter.1.1.8

Abstract

Untuk mendukung usabilitas web portal nya, SWA Media Online menggunakan layanan web hosting Colocation Server dari Wowrack. Layanan Colocation Server dari Wowrack ini memiliki lokasi server fisik atau pusat data di Surabaya, Indonesia. Seiring berjalannya waktu, penggunaan Colocation Server dirasa semakin menghambat perkembangan perusahaan, terbukti dengan melambatnya akses ke web portal swa.co.id. Untuk itu, pada bulan Mei - Juni 2015 SWA Media Online memutuskan berpaling dari Colocation Server ke teknologi cloud terbaru. Pada akhir bulan Juni 2015, SWA Media Online resmi bermigrasi dari colocation ke Amazon Web Services. Dimana server fisik nya berada di Singapura (untuk pelanggan ASEAN). Untuk fitur yang digunakan, hampir sama seperti saat menggunakan colocation yaitu yang sesuai dengan kebutuhan perusahaan. Namun, pada Amazon Web Services memberikan service atau fitur tambahan berupa adanya load balancer, auto scaling, dan bucket atau media penyimpanan. Metodologi yang peneliti terapkan dalam penelitian ini adalah metodologi analisis secara kualitatif. Berdasarkan hasil penelitian, didapatkan hasil bahwa fitur tambahan yang diberikan Amazon Web Services mampu meningkatkan usabilitas portal dalam segi kemudahan dalam kecepatan akses portal. Kecepatan akses web portal meningkat lebih baik dibandingkan saat menggunakan Colocation Server.
Kualitas Jaringan Pada Jaringan Virtual Local Area Network (VLAN) Yang Menerapkan Linux Terminal Server Project (LTSP) Sugiyanta, Lipur; Raja, Badia
PINTER : Jurnal Pendidikan Teknik Informatika dan Komputer Vol. 1 No. 2 (2017): Jurnal PINTER
Publisher : PTIK Fakultas Teknik UNJ

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1983.627 KB) | DOI: 10.21009/pinter.1.2.1

Abstract

Virtual Local Area Network (VLAN) merupakan sebuah teknik dalam jaringan komputer untuk menciptakan beberapa jaringan yang berbeda tetapi masih merupakan sebuah jaringan lokal yang tidak terbatas pada lokasi fisik seperti LAN sedangkan Linux Terminal Server Project (LTSP) merupakan sebuah teknik terminal server yang dapat memperbanyak workstation dengan hanya menggunakan sebuah Linux server. Dalam membangun sebuah jaringan komputer perlu memperhatikan beberapa hal dan salah satunya adalah kualitas jaringan dari jaringan yang dibangun. Pada penelitian ini bertujuan untuk mengetahui pengaruh jumlah client terhadap kualitas jaringan berdasarkan parameter delay dan packet loss pada jaringan VLAN yang menerapkan LTSP. Oleh karena itu, penelitian ini menggunakan jenis metode penelitian kualitatif dengan memperhatikan standar yang digunakan dalam penelitian yaitu standar International Telecommunication Union – Telecommunication (ITU-T). Penerapan penelitian ini menggunakan sistem operasi pada server adalah Ubuntu Desktop 14.04 LTS. Berdasarkan dari hasil penelitian yang ditemukan dapat disimpulkan bahwa benar terbukti bahwa makin banyak client yang dilayani oleh server maka akan menurunkan kualitas jaringan berdasarkan parameter Quality of Service (QoS) yang digunakan yaitu delay dan packet loss.
Sistem Informasi Nilai Siswa Berbasis Web di SMK Karya Guna Jakarta Niroha, Muhammad Lomo; Sugiyanta, Lipur; Djaohar, Mochammad
PINTER : Jurnal Pendidikan Teknik Informatika dan Komputer Vol. 2 No. 1 (2018): Jurnal PINTER
Publisher : PTIK Fakultas Teknik UNJ

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21009/pinter.2.1.5

Abstract

Sistem informasi nilai siswa berbasis web merupakan suatu sistem yang memberikaninformasi laporan nilai siswa secara online yang berupa laporan nilai serta informasi datasiswa yang bersangkutan dengan berbasiskan web sehingga membantu kecepatan dankualitas dalam penyampaian informasi. Permasalahan yang terjadi dalam pengolahan nilaisiswa di SMK Karya Guna Jakarta saat ini masih bersifat konvensional, dimana siswa danwali siswa hanya bisa melihat hasil dari kemampuan siswa tersebut pada akhir masapembelajaran atau yang kita kenal dengan istilah pembagian raport siswa. Penelitian inibertujuan untuk membangun suatu sistem informasi nilai yang mempermudah pengecekan,pencatatan dan laporan data nilai siswa yang terkomputerisasi. Dengan berbasiskan webmaka informasi data nilai siswa dapat diakses kapan saja. Sistem menggunakan multiuseryang terdiri dari administrator, guru, orang tua dan siswa. Metode yang digunakan adalahsalah satu metode pengembangan perangkat lunak, yaitu metode waterfall. Program yangdihasilkan dalam sistem ini adalah sistem informasi nilai siswa berbasis web denganmenggunakan bahasa pemrograman PHP dan database MySQL.
Analisis Manajemen Bandwidth Hierarchical Token Bucket (HTB) dengan Mikrotik pada Jaringan SMK Negeri 22 Iqbal Ichwan, Muhammad; Sugiyanta, Lipur; Wibowo Yunanto, Prasetyo
PINTER : Jurnal Pendidikan Teknik Informatika dan Komputer Vol. 3 No. 2 (2019): Jurnal PINTER
Publisher : PTIK Fakultas Teknik UNJ

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21009/pinter.3.2.6

Abstract

Penggunaan Bandwidth di sebuah jaringan seringkali kurang dimanfaatkan secara optimal. Salah satu solusi yang efektif untuk mengatasinya adalah dengan mengelola pemakaian bandwidth dengan melakukan manajemen bandwidth. Saat ini SMK Negeri 22 Jakarta menerapkan manajemen bandwidth dengan mikrotik RB 1100AHX2 menggunakan fitur simple queue. Pada penelitian ini dilakukan manajemen bandwidth dengan mikrotik RB 750Gr3 menggunakan fitur queue tree dengan menggunakan metode hierarchical token bucket (HTB). Setelah dilakukan manajemen bandwidth dengan metode HTB, kemudian dilakukan pengukuran Quality of Service (QoS) dengan parameter bandwidth, throughput, delay, dan packet loss. Hasil yang didapat setelah dilakukan manajemen bandwidth dengan metode HTB yaitu pada parameter throughput mengalami kenaikan 2.7746% pada perangkat pengukuran cnn.com dan 13.3415% pada facebook.com. Pada parameter packet loss mengalami penurunan 13% pada cnn.com, 17% pada facebook.com dan 16% pada mail.yahoo.com. Pada parameter delay mengalami penurunan dari yang sebelumnya 135 ms menjadi 41 ms pada facebook.com dan 108 ms menjadi 90 ms pada mail.yahoo.com. Pada indeks nilai akhir mengalami kenaikan dari 2.33 menjadi 2.89.