Claim Missing Document
Check
Articles

Analisis dan Perancangan Simulasi Enkripsi dan Dekripsi pada Algoritma Steganografi untuk Penyisipan Pesan Text pada Image menggunakan Metode Least Significant Bit (LSB) Berbasis Cryptool2 Nofita Rismawati; Muhamad Femy Mulya
Faktor Exacta Vol 12, No 2 (2019)
Publisher : LPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30998/faktorexacta.v12i2.3527

Abstract

Security and confidentiality of data is the central aspect of an information system so that it can only be accessed by the owner of the information or interested user. In sending data, without the existence of a technique of concealing important information, it will be very easy for people who do not have access rights/interests to know the contents of the information. Steganography is the art and science of hiding secret messages in other messages so that the contents of the secret message cannot be traced. In this study, steganography technic is implemented by using the Least Significant Bit (LSB) method, modifying less significant bits or the last bit in one byte of data by using text messages as a storage medium. The purpose of this study was to analyze and design an encryption and decryption simulation for the insertion of text messages in an image by using the steganography algorithm using the Least Significant Bit (LSB) method, so that it would secure the text messages sent by the sender to the receiver by inserting the text message into an image both in the format * .jpg, * .bmp and * .png. The software will be used to simulate steganography using free program (Open Source) Cryptool2  in order to describe the concepts of cryptography and cryptanalysis. Keywords: Steganography, Least Significant Bit (LSB), Cryptool2
Analisis dan Perancangan Sistem Personalisasi dan Monitoring SLA (Service Level Agreement) Berbasiskan NFC (Near Field Communication) Studi Kasus Akses Kontrol Vendor ke Perangkat Bts (Base Transceiver Station) Nofita Rismawati; muhamad femy mulya
Faktor Exacta Vol 11, No 4 (2018)
Publisher : LPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1315.364 KB) | DOI: 10.30998/faktorexacta.v11i4.2910

Abstract

NFC (Near Field Communication) is one of the communication technologies between the latest gadgets that use RFID (Radio Frequency Identification) systems to exchange data at close range, about 4 inches. NFC (Near Field Communication) technology, is the principle of standard wireless communication that allows two devices to exchange data when in a position close to one another. The purpose of this research is to analyze and design a personalization system for vendors by utilizing NFC (Near Field Communication) technology that can facilitate vendors to access the doors of BTS (Base Tranceiver Station) devices and at the same time help telecommunications operators in monitoring SLAs (Service Level Agreement) for every vendor who does troubleshooting directly to a BTS (Base Tranceiver Station) device, so that vendor performance can be monitored. In addition, it also helps interested parties (in this case, the telecommunications operator management) in evaluating the performance of a vendor. Key words: NFC, BTS, SLA
SISTEM ABSENSI DOSEN MENGGUNAKAN NEAR FIELD COMMUNICATION (NFC) TECHNOLOGY NOFITA RISMAWATI
Faktor Exacta Vol 9, No 2 (2016)
Publisher : LPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (504.155 KB) | DOI: 10.30998/faktorexacta.v9i2.791

Abstract

NFC is a wireless technology that has a high frequency (13.56MHz), which has a data transfer rate of 424 Kbits / second with a short distance or close range. This tool can be used to exchange data with a distance of about 10 cm. NFC technology is a combination of smartcard and smartcard reader embedded in the device, the device is generally a mobile device like a cell phone. The purpose of the design of this system is to build attendance system attendance following absence management faculty lecturer, as well as introducing alternative wireless technologies such as Near Field Communication (NFC), contactless transactions that are made. Software development methods used include three main parts, namely the method of analysis, design and literature. The method of analysis involves collecting data using samples, learning in the existing system, and analysis of the results of the interview devoted to the parties concerned. The design method using the approach of the Unified Modelling Language (UML). The result is a design lecturer attendance system used at the time lecturer teaching (check-in) and after teaching (check-out). And lecturer attendance management application used to manage attendance data lecturers and printing reports on a daily, weekly, monthly and yearly. Keywords: Wireless, Smartcard, NFC 
Analisis Dan Perancangan Simulasi Algoritma Paillier Cryptosystem Pada Pesan Text Dengan Presentation Format Binary, Octal, Hexadecimal dan Base64 Muhamad Femy Mulya; Nofita Rismawati; Dedy Trisanto
Faktor Exacta Vol 13, No 4 (2020)
Publisher : LPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30998/faktorexacta.v13i4.7429

Abstract

Abstrak. Setiap hari ratusan ribu orang yang berinteraksi secara elektronik, melalui media e-mail, e-commerce, mesin ATM ataupun telepon seluler. Peningkatan penyebaran informasi secara elektronik telah mengakibatkan ketergantungan yang meningkat terhadap kriptografi. Salah satu peranan dari kriptografi adalah untuk melakukan pengamanan data yaitu dengan menggunakan algoritma kriptografi. Algoritma paillier cryptosystem merupakan sebuah algoritma asimetris probabilistic untuk kriptografi kunci publik, algoritma paillier cryptosystem digunakan karena komputasi enkripsi dan dekripsi pada algoritma paillier cryptosystem cukup rumit, karena diperlukan dua kali operasi perpangkatan, satu kali operasi perkalian, dan satu kali operasi modulo. Dengan demikian tingkat keamanan algoritma paillier cryptosystem cukup baik. Tujuan dari penelitian ini adalah untuk menganalisa, merancang serta mengimplementasikan simulasi enkripsi dan dekripsi dari pesan text (berupa text writing maupun text file) menggunakan algoritma paillier cryptosystem dengan presentation format sebanyak 4 (empat) format yaitu, binary, octal, hexadecimal dan base64. Dengan demikian pesan text (berupa text writing maupun text file) akan lebih aman pada saat dikirimkan melalui email, sms maupun chatting dari pengirim ke penerima pesan. Adapun perangkat lunak (software) yang akan digunakan untuk membuat simulasi algoritma paillier cryptosystem ini menggunakan Cryptool2. Hasil penelitian menunjukkan bahwa presentation format binary menjadi yang tercepat untuk waktu (ms) proses enkripsi dan dekripsi, sedangkan Presentation format base64 menjadi yang terlama untuk waktu (ms) untuk proses enkripsi dan dekripsi. Kata Kunci: Kriptografi, Paillier Cryptosystem, Cryptool2  Abstract. Every day hundreds of thousands of people interact electronically, through e-mail, e-commerce, ATM machines or cell phones. The increase in the dissemination of information electronically has resulted in an increasing dependence on cryptography. One of the roles of cryptography is to secure data by using cryptographic algorithms. The paillier cryptosystem algorithm is an asymmetric probabilistic algorithm for public key cryptography, the paillier cryptosystem algorithm is used because the computation of encryption and decryption in the paillier cryptosystem algorithm is quite complicated, because it requires two power operations, one multiplication operation, and one modulo operation. Thus, the security level of the paillier cryptosystem algorithm is quite good. The purpose of this research is to analyze, design and implement simulation of encryption and decryption of text messages (in the form of text writing or text files) using the paillier cryptosystem algorithm with 4 (four) presentation formats, namely, binary, octal, hexadecimal and base64. Thus text messages (in the form of text writing or text files) will be safer when sent via email, sms or chat from sender to message recipient. The software that will be used to simulate the paillier cryptosystem algorithm uses Cryptool2. The results showed that the binary presentation format is the fastest for the encryption and decryption process time (ms), while the base64 presentation format is the longest for the time (ms) for the encryption and decryption process. Key words: Cryptography, Paillier Cryptosystem, Cryptool2
Perancangan Sistem Aplikasi Penjualan Paket Wisata Pulau Seribu Berbasis Java Dengan Metode Scrum (Studi Kasus PT. Abarter Global Indonesia) Irfan Fakhruddin; Nofita Rismawati; Rini Sriyanti
Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) Vol 5, No 1 (2022): Februari 2022
Publisher : Program Studi Teknik Informatika, Fakultas Teknik. Universitas Serambi Mekkah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32672/jnkti.v5i1.3989

Abstract

Abstrak - Tujuan penelitian ini untuk mempermudah customer dalam melakukan pemesanan paket wisata pulau seribu, mempermudah customer dalam mendapatkan informasi tiket dan jadwal keberangkatan dan mempermudah travel agent dan customer dalam mengelola data penumpang dan data pemesanan tiket. Sebelumnya PT Abarter Global Indonesia masih menggunakan metode manual untuk pelayanan penjualan paket wisata. Hal tersebut membuat pelayanan menjadi tidak efektif dan tidak efisien seperti pendataan customer yang masih ditulis dibuku dan antrean customer yang memakan waktu lama. Dalam menyelesaikan masalah tersebut penulis menggunakan Metode Scrum pada sistem terkomputerisasi menggunakan Java Netbeans. Hasil dari penelitian yang dilakukan di PT Abarter Global Indonesia, aplikasi yang dikerjakan dapat mempermudah admin dalam proses pemesanan paket wisata pada PT Abarter Global Indonesia dan membuat transaksi menjadi lebih mudah, cepat dan efisien.Kata kunci: Perancangan, Penjualan Paket Wisata, Metode Scrum, Java, UML Abstract - The purpose of this research is to make it easier for customers to order pulau seribu tour packages, make it easier for customers to get ticket information and departure schedules and make it easier for travel agents and customers to manage passanger data and ticket booking data. Previously PT Abarter Global Indonesia still users the manual method for selling their tour package. This makes services ineffective and inefficient, such as customer data collection that is still written in books and customer queques that take a long time. In solving this problem the author uses the scrum method on a computerized system using Java Netbeans. The results of research conducted at PT Abarter Global Indonesia, the application that is done can make it easier for admins in the process of ordering tour packages at PT Abarter Global Indonesia and make transactions easier, faster and more efficent.Keywords : Designing, Tourist Package Sales, Scrum Method, Java, UML
Expert System For Diagnosing Helminthic Disease In Children Using The Bayes Probability Technique Dedy Trisanto; Nofita Rismawati; Millati Izzatillah; Muhamad Femy Mulya
Journal of Information System, Informatics and Computing Vol 6 No 1 (2022): JISICOM: June 2022
Publisher : Sekolah Tinggi Manajemen Informatika dan Komputer Jayakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52362/jisicom.v6i1.817

Abstract

Worm disease or Ascariasis is an infection caused by the Ascaris lumbricoides worm that lives in the human body. Everyone is susceptible to this disease, but it is most common in children. Children who experience intestinal worms can be shown from a variety of symptoms from mild to those that interfere with the child's growth. This study aims to create a system that can adopt the knowledge of an expert who can provide users with diagnostic information such as from an expert regarding intestinal worms. The research uses the Bayesian Probability method. Bayes theorem is a method for generating parameter estimates by combining information from samples and other information that has been previously available. The expert system for diagnosing intestinal worms has been successfully implemented with a desktop-based application. The expert system can help the user get a diagnosis of the type of intestinal worms suffered according to the symptoms experienced.
Sistem Administrasi Kependudukan di Desa Mekarsari Berbasis Java Desktop Wildan Wildan; Rendi Prasetya; Nofita Rismawati
Jurnal Repositor Vol 3 No 1 (2021): Januari 2021
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/repositor.v3i1.1212

Abstract

Pada saat ini sistem berbasis komputer banyak diterapkan pada kegiatan pelayanan, dengan diterapkannya sistem ini diharapkan dapat menambah kualitas dari pelayanan. Setiap warga negara juga berhak atas pelayanan publik yang baik, penjelasan tersebut terdapat dalam Undang-Undang Nomor 25 Tahun 2009 tentang pelayanan publik dimana negara berkewajiban melayani setiap warga negaranya dan Undang-Undang Nomor 2 Tahun 2017 tentang standar pelayanan minimum Desa. Pada sistem yang berjalan saat ini Desa Mekarsari membutuhkan waktu lama dalam melayani penduduk dan menghambat kinerja staf, karena pengolahan data yang tidak efisien. Berpikir bahwasannya sistem masih kurang efisien, maka dibangunlah sebuah sistem administrasi kependudukan di Desa Mekarsari berbasis desktop. Dengan dibangunnya sistem ini diharapkan dapat membuat sistem yang sesuai dengan kebutuhan, mudah digunakan, dan pembuatan laporan yang cepat, tepat dan akurat, sehingga tujuan mempermudah dalam pelayanan administrasi akan tercapai. Metode dalam membangun sistem yang digunakan adalah waterfall, dengan tahapan-tahapan pada metode waterfall ini sistem administrasi yang dibangun akan sesuai dengan kebutuhan Desa Mekarsari.
Perancangan Sistem Informasi Simpan Pinjam di Koperasi Karyawan Indomobil MT Haryono Meli Agustina; Nofita Rismawati; Acep Acep
Jurnal Riset dan Aplikasi Mahasiswa Informatika (JRAMI) Vol 1, No 01 (2020): Jurnal Riset dan Aplikasi Mahasiswa Informatika (JRAMI)
Publisher : Universitas Indraprasta PGRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (287.936 KB) | DOI: 10.30998/jrami.v1i01.257

Abstract

Penelitian ini bertujuan untuk membuat suatu aplikasi simpan pinjam koperasi karyawan, serta mendeskripsikan hasil uji coba sistem aplikasi. Metode penelitian yang digunakan adalah metode Grounded Research. Peneliti mengumpulkan data dan observasi di koperasi karyawan Indomobil dengan metode wawancara langsung kepada penanggung jawab dan petugas koperasi. Peneliti menemukan berbagai masalah yang dihadapi di koperasi tersebut yaitu kendala sistem yang masih sangat manual sehingga pekerjaan tidak efekti dan efisien. Hasil penelitian dapat disimpulkan dengan adanya aplikasi yang sudah terkomputerisasi, transaksi di koperasi semakin mudah dan cepat.
Analisis dan Perancangan Sistem Personalisasi dan Identifikasi Absensi Dosen Berbasis Smartcard Mifare Menggunakan Java Card Applet Nofita Rismawati; Muhamad Femy Mulya
Jurnal SISKOM-KB (Sistem Komputer dan Kecerdasan Buatan) Vol. 2 No. 2 (2019): Volume II - Nomor 2 - Maret 2019
Publisher : Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Smartcard is an invention in the field of IT that has simplified human life because it has many functions and capabilities to store data. The advantages of a smartcard are rewritable data, extensive data capacity, support for reading multiple data carriers (support for multiple tag reads), robust physicality and smart task. The purpose of this study is to analyze and design a system of personalization and identification for the attendance of lecturers by utilizing Mifare's smartcard technology using a java card applet that can facilitate the lecture attendance process on a campus. Besides that, it also helps interested parties (in this case, campus management) in evaluating the performance of a lecturer. This study uses the Prototype / Prototyping model research method with the Unified Modeling Language (UML) approach. The results of this study are a prototype design personalization system and identification of lecturer attendance based on Mifare smartcard technology using java card applets, as well as the results of testing the accuracy of prototype readings from the Mifare smartcard personalization and identification system with smartcard readers using Java card applets.
Analisi dan Simulasi Algoritma TEA (Tiny Encryption Algorithm) untuk Enkripsi dan Dekripsi Pesan Text menggunakan Cryptool2 Muhammad Femy Mulya; Nofita Rismawati
Jurnal SISKOM-KB (Sistem Komputer dan Kecerdasan Buatan) Vol. 3 No. 1 (2019): Volume III - Nomor 1 - September 2019
Publisher : Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (190.101 KB) | DOI: 10.47970/siskom-kb.v3i1.79

Abstract

The development of data and information technology and communication at this time is an important part of everyday human life. Along with the times, the human need for information is increasing. as the development of data and information technology that is increasingly advanced and developing, the internet can no longer guarantee to provide data that is safe enough for its users. Data is very important, so the accuracy of the data is needed in the decision making process. The importance of data values causes the availability of data security, so that data falls precisely and accurately on the right party. In this research a data security simulation will be designed using encryption and decryption methods using the TEA (Tiny Encryption Algorithm) algorithm. In the TEA (Tiny Encryption Algorithm) encryption process, this study uses 64 rounds, where each round consists of, addition, key & data substitution, and XOR. The purpose of this study is to analyze, design and implement TEA (Tiny Encryption Algorithm) algorithm in the form of encryption and decryption simulation of text messages (both text and text files), so that text messages (both text and text files) will be safer when sent via email from the sender to the recipient. Thesoftware that will be used to create a simulation of the TEA (Tiny Encryption Algorithm) algorithm uses Cryptool2, which is an Open Source program used to describe the concepts of cryptography and cryptanalysis. The test results prove that this simulation can secure text messages (both text writing or text files) with different character lengths and keys. The longer and larger the size of the text message (either text or text file) and the key, the longer it will take for the encryption process.