Claim Missing Document
Check
Articles

Found 6 Documents
Search
Journal : Jurnal Informatika Global

IMPLEMENTASI SISTEM INFORMASI PEGAWAI (SIMPEG) BERBASIS WEB MENGGUNAKANFRAMEWORK CODEIGNITER DAN BOOTSTRAP Dian Novianto
Jurnal Informatika Global Vol 7, No 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (907.886 KB) | DOI: 10.36982/jiig.v7i1.153

Abstract

Development of Information Technology is currently supporting dissemination of information quickly so that it can be accessed by mobile from anywhere and at anytime, STMIK Atma Luhur Pangkalpinang As one - the only college-based Information and Communication Technology (ICT) should also follow these developments, one system is information systems employees (SIMPEG), where the system will contain detailed information such as number of employees, history rank, history position, length of service and the other - the other, so that could be a reference material led to consider a promotion, a raise or other parts that need data employees. The system is web-based for easy access from anywhere and anytime through any device that has a browser and an internet connection and is created using CodeIgniter and Bootstrap framework, and reports can be converted into the form of a spreadsheet. The method used in this research is qualitative method in which the author is a key tool in data collection, by means of observation and interviews.Keywords:ICT, SIMPEG, CodeIgniter, Bootstrap, Qualitative
Sistem Deteksi Kualitas Buah Jambu Air Berdasarkan Warna Kulit Menggunakan Algoritma Principal Component Analysis (Pca) dan K-Nearest Neigbor (K-NN) Dian Novianto; Tri Sugihartono
Jurnal Informatika Global Vol 11, No 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v11i2.1223

Abstract

One form of artificial intelligence is the automatic detection of images. so the system can determine precisely the type of image or it can be called computer vision. Water guava fruit is a fruit that is often encountered in Indonesia, but many of the water guavas in the community are of poor quality, thus detrimental to consumers. Therefore we need a system that can detect the quality of the water guava. The Principal Component Analysis (PCA) algorithm and the k-nearest neighbor (k-NN) algorithm can be combined to do this job. PCA is an algorithm that can convert to a group of data that is initially correlated into uncorrelated data (Principal Component). The number of Principal Components generated is the same as the original data, but can be reduced to a smaller amount and is still able to represent the original data well. Meanwhile, k-NN is a method for classifying objects based on learning data that is closest to the object. The research model used in this research is a prototype, and the development tools used are UML. In making the water guava quality detection system, the MATLAB programming language is used, and the test uses the blacbox method. The result of this system is that the system is able to produce output in the form of quality classification of water guava fruit automatically.Keywords: Computer vision, PCA, k-NN
Implementasi Failover dengan Metode Recursive Gateway Berbasis Router Mikrotik Pada STMIK Atma Luhur Pangkalpinang Dian Novianto; Ellya Helmud
Jurnal Informatika Global Vol 10, No 1
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (925.881 KB) | DOI: 10.36982/jiig.v10i1.732

Abstract

ABSTRACTThe flow of information that moves uninterruptedly is one of the needs of an organization, the internet makes information can flow quickly to support the activities of its users. However, the quality of the internet in Indonesia has not been so good because there is still a breakdown of internet services from ISPs to users. It is very important for the organization to maintain its activities to keep running normally when internet services are not available. One technique that can be used to overcome this problem is fail over against internet access, so that if one internet source is down it will automatically be switched to another internet source. Fail over is a technique that uses more than one internet gateway, where one link can be used as the main gateway and the other becomes a backup link. And the method that can be used is the recrusive gateway by defining check-gateways and differentiating distance values on each routing rule. And the system development method used is PPDIOO which has 6 stages, namely: prepare, plan, design, implement, operate, and optimize. The results of this research will be able to guarantee the availability of the internet in an organization, so that it can increase the productivity of an organization.Keywords : failover, recrusive gateway, mikrotikABSTRAKArus informasi yang bergerak tanpa terputus merupakan salah satu kebutuhan dari sebuah organisasi, internet membuat informasi dapat mengalir secara cepat untuk menunjang kegiatan para penggunanya. Akan tetapi kualitas internet di Indonesia belum begitu baik karena masih terjadi putusnya layanan internet dari ISP ke pengguna. Sangat penting bagi organisasi untuk menjaga kegiatan – kegiatannya untuk tetap berjalan normal ketika layanan internet sedang tidak tersedia. Salah satu teknik yang dapat digunakan untuk mengatasi masalah tersebut adalah fail over terhadap akses internet sehingga apabila salah satu sumber internet putus maka secara otomatis akan langsung di alihkan ke sumber internet lain. Fail over merupakan teknik yang menggunakan lebih dari satu gateway internet, dimana salah satu link dapat dijadikan sebagai gateway utama dan yang lain menjadi link cadangan. Dan metode yang dapat digunakan adalah recrusive gateway yaitu dengan mendefinisikan check-gateway dan membedakan nilai distance pada masing-masing rule routing. dan metode pengembangan sistem yang digunakan adalah PPDIOO yang memiliki 6 tahapan, yaitu: prepare, plan, design, implement, operate, dan optimize. Hasil dari penelitian ini nantinya dapat menjamin ketersediaan internet pada sebuah organisasi, sehingga dapat meningkatkan produktivitas kinerja sebuah organisasi.Kata kunci : failover, recrusive gateway, mikrotik
OPTIMASI WAKTU QUERY DAN FILTERING NAMA DOMAIN PADA DNS SERVER LOKAL MENGGUNAKAN BIND 9 Dian Novianto
Jurnal Informatika Global Vol 8, No 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (601.284 KB) | DOI: 10.36982/jiig.v8i2.320

Abstract

DNS is made to facilitate users in accessing a website with a domain without having to continually update the files host.txt.DNS was developed in 1983, every user accessing a website using a domain name through a browser, will be routed by the router to a public DNS serverto get a web address in the form of ip address.It takes time for DNS servers to reverse and lookup for translate domain names into ip addresses and vice versa.By creating a local DNS server as a cache,then it can be applied forwarding technique on DNS Server,so the time required to find the web server address of a destination website becomes faster. In addition to minimizing query time by implementing a local DNS server, can also be filtered against a particular domain name even though using a secure protocol like httpsby creating a zone for the web address you want to filter. So the use of the Internet becomes more useful. In this study the software used linux debian 8 as the operating system, and BIND9 as the software that runs the function of DNS Server.Keywords:Forwarding DNS,BIND 9, Debian 8                                                                                                                           
Aplikasi Pengamanan Informasi Menggunakan Metode Least Significant Bit (Lsb) dan Algoritma Kriptografi Advanced Encryption Standard (AES) Dian Novianto; Yohanes Setiawan
Jurnal Informatika Global Vol 9, No 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (655.658 KB) | DOI: 10.36982/jiig.v9i2.561

Abstract

AbstractThere are several security aspects of the data that must be maintained, such as: authentication, integrity, non repudiation, authority, confidentialty, privacy and access control. One of the vulnerable parts of data security is when sending data to the destination. At the time of delivery, tapping of data can occur, so that people who are not entitled to get that information can find out. Therefore, an information needs to be secured so that only people who have access rights can know or get that information. And to maintain the confidentiality of the information, one of the ways is to insert the data into other objects, so that other people do not realize if the object contains important data or information. This hiding method is also known as steganography, and cryptography is added to strengthen the security of the data, that is a science and art to maintain the confidentiality of the message by encoding it in a form that is incomprehensible. The method used in steganography is Least Significant Bit (LSB), the algorithm used in cryptography is the Advanced Encryption Standard (AES), and the software development method used is prototype. The results of this study are all aspects of data security can be achieved, including when passing through the process of sending data through media such as the internet.Keyword: Steganography, Criptography, Prototype.AbstrakAda beberapa aspek keamanan data yang harus dijaga, seperti: otentikasi, integritas, non repudiation, otoritas, kerahasiaan, privasi, dan kontrol akses. Salah satu bagian yang rentan dari keamanan data adalah ketika mengirim data ke tujuan. Pada saat pengiriman, penyadapan data dapat terjadi, sehingga orang yang tidak berhak mendapatkan informasi tersebut dapat mengetahuinya. Oleh karena itu, suatu informasi perlu diamankan sehingga hanya orang yang memiliki hak akses yang dapat mengetahui atau mendapatkan informasi tersebut. Dan untuk menjaga kerahasiaan informasi, salah satu caranya adalah dengan memasukkan data ke objek lain, sehingga orang lain tidak menyadari jika objek tersebut berisi data atau informasi penting. Metode persembunyian ini juga dikenal sebagai steganografi, dan kriptografi ditambahkan untuk memperkuat keamanan data, yaitu ilmu dan seni untuk menjaga kerahasiaan pesan dengan menyandikannya dalam bentuk yang tidak dapat dipahami. Metode yang digunakan dalam steganografi adalah Least Significant Bit (LSB), algoritma yang digunakan dalam kriptografi adalah Advanced Encryption Standard (AES), dan metode pengembangan perangkat lunak yang digunakan adalah prototipe. Hasil dari penelitian ini adalah semua aspek keamanan data dapat dicapai, termasuk ketika melewati proses pengiriman data melalui media seperti internet.Kata kunci: Steganografi, kriptografi, Prototipe
Implementasi Keamanan Akses Terhadap Website Menggunakan Wireguard VPN Di Routerboard Mikrotik Dian Novianto; Yohanes Setiawan Japriadi; Lukas Tommy
Jurnal Informatika Global Vol 13, No 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v13i2.2308

Abstract

The need for the availability of information is currently very high, especially in the conditions of the COVID-19 pandemic, all organizational activities are carried out online. Human dependence on the role of information technology is increasing and this has consequences for long distance communication between devices, which requires users to be authenticated for access rights granted by the system. The problem that arises is the security of data travel during the authentication process, where there is the possibility of leaking account information. This is because communication is done on a public network while accessing resources that require privacy. Therefore we need a network connection that is safe and efficient. Virtual Private Network (VPN) is a network communication technology that allows you to connect to public networks safely and quickly. The VPN used in the solution to this problem is Wireguard. Wireguard is a VPN protocol built with advanced cryptography and makes it extremely fast and secure. The method used by the author in developing this system is PPDIOO which consists of, Prepare, Plan, Design, Implement, Operate, and Optimize. And also some supporting tools for the development of the system Unified Modeling Language. By using Wireguard VPN, the expected result is the security of the data sent to be more secure and can connect two remote networks privately using the public internet.Keywords : VPN, Wireguard, Mikrotik