Claim Missing Document
Check
Articles

Found 33 Documents
Search

IMPLEMENTASI SISTEM INFORMASI PEGAWAI (SIMPEG) BERBASIS WEB MENGGUNAKANFRAMEWORK CODEIGNITER DAN BOOTSTRAP Dian Novianto
Jurnal Informatika Global Vol 7, No 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (907.886 KB) | DOI: 10.36982/jiig.v7i1.153

Abstract

Development of Information Technology is currently supporting dissemination of information quickly so that it can be accessed by mobile from anywhere and at anytime, STMIK Atma Luhur Pangkalpinang As one - the only college-based Information and Communication Technology (ICT) should also follow these developments, one system is information systems employees (SIMPEG), where the system will contain detailed information such as number of employees, history rank, history position, length of service and the other - the other, so that could be a reference material led to consider a promotion, a raise or other parts that need data employees. The system is web-based for easy access from anywhere and anytime through any device that has a browser and an internet connection and is created using CodeIgniter and Bootstrap framework, and reports can be converted into the form of a spreadsheet. The method used in this research is qualitative method in which the author is a key tool in data collection, by means of observation and interviews.Keywords:ICT, SIMPEG, CodeIgniter, Bootstrap, Qualitative
Sistem Deteksi Kualitas Buah Jambu Air Berdasarkan Warna Kulit Menggunakan Algoritma Principal Component Analysis (Pca) dan K-Nearest Neigbor (K-NN) Dian Novianto; Tri Sugihartono
Jurnal Informatika Global Vol 11, No 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v11i2.1223

Abstract

One form of artificial intelligence is the automatic detection of images. so the system can determine precisely the type of image or it can be called computer vision. Water guava fruit is a fruit that is often encountered in Indonesia, but many of the water guavas in the community are of poor quality, thus detrimental to consumers. Therefore we need a system that can detect the quality of the water guava. The Principal Component Analysis (PCA) algorithm and the k-nearest neighbor (k-NN) algorithm can be combined to do this job. PCA is an algorithm that can convert to a group of data that is initially correlated into uncorrelated data (Principal Component). The number of Principal Components generated is the same as the original data, but can be reduced to a smaller amount and is still able to represent the original data well. Meanwhile, k-NN is a method for classifying objects based on learning data that is closest to the object. The research model used in this research is a prototype, and the development tools used are UML. In making the water guava quality detection system, the MATLAB programming language is used, and the test uses the blacbox method. The result of this system is that the system is able to produce output in the form of quality classification of water guava fruit automatically.Keywords: Computer vision, PCA, k-NN
Implementasi Failover dengan Metode Recursive Gateway Berbasis Router Mikrotik Pada STMIK Atma Luhur Pangkalpinang Dian Novianto; Ellya Helmud
Jurnal Informatika Global Vol 10, No 1
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (925.881 KB) | DOI: 10.36982/jiig.v10i1.732

Abstract

ABSTRACTThe flow of information that moves uninterruptedly is one of the needs of an organization, the internet makes information can flow quickly to support the activities of its users. However, the quality of the internet in Indonesia has not been so good because there is still a breakdown of internet services from ISPs to users. It is very important for the organization to maintain its activities to keep running normally when internet services are not available. One technique that can be used to overcome this problem is fail over against internet access, so that if one internet source is down it will automatically be switched to another internet source. Fail over is a technique that uses more than one internet gateway, where one link can be used as the main gateway and the other becomes a backup link. And the method that can be used is the recrusive gateway by defining check-gateways and differentiating distance values on each routing rule. And the system development method used is PPDIOO which has 6 stages, namely: prepare, plan, design, implement, operate, and optimize. The results of this research will be able to guarantee the availability of the internet in an organization, so that it can increase the productivity of an organization.Keywords : failover, recrusive gateway, mikrotikABSTRAKArus informasi yang bergerak tanpa terputus merupakan salah satu kebutuhan dari sebuah organisasi, internet membuat informasi dapat mengalir secara cepat untuk menunjang kegiatan para penggunanya. Akan tetapi kualitas internet di Indonesia belum begitu baik karena masih terjadi putusnya layanan internet dari ISP ke pengguna. Sangat penting bagi organisasi untuk menjaga kegiatan – kegiatannya untuk tetap berjalan normal ketika layanan internet sedang tidak tersedia. Salah satu teknik yang dapat digunakan untuk mengatasi masalah tersebut adalah fail over terhadap akses internet sehingga apabila salah satu sumber internet putus maka secara otomatis akan langsung di alihkan ke sumber internet lain. Fail over merupakan teknik yang menggunakan lebih dari satu gateway internet, dimana salah satu link dapat dijadikan sebagai gateway utama dan yang lain menjadi link cadangan. Dan metode yang dapat digunakan adalah recrusive gateway yaitu dengan mendefinisikan check-gateway dan membedakan nilai distance pada masing-masing rule routing. dan metode pengembangan sistem yang digunakan adalah PPDIOO yang memiliki 6 tahapan, yaitu: prepare, plan, design, implement, operate, dan optimize. Hasil dari penelitian ini nantinya dapat menjamin ketersediaan internet pada sebuah organisasi, sehingga dapat meningkatkan produktivitas kinerja sebuah organisasi.Kata kunci : failover, recrusive gateway, mikrotik
OPTIMASI WAKTU QUERY DAN FILTERING NAMA DOMAIN PADA DNS SERVER LOKAL MENGGUNAKAN BIND 9 Dian Novianto
Jurnal Informatika Global Vol 8, No 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (601.284 KB) | DOI: 10.36982/jiig.v8i2.320

Abstract

DNS is made to facilitate users in accessing a website with a domain without having to continually update the files host.txt.DNS was developed in 1983, every user accessing a website using a domain name through a browser, will be routed by the router to a public DNS serverto get a web address in the form of ip address.It takes time for DNS servers to reverse and lookup for translate domain names into ip addresses and vice versa.By creating a local DNS server as a cache,then it can be applied forwarding technique on DNS Server,so the time required to find the web server address of a destination website becomes faster. In addition to minimizing query time by implementing a local DNS server, can also be filtered against a particular domain name even though using a secure protocol like httpsby creating a zone for the web address you want to filter. So the use of the Internet becomes more useful. In this study the software used linux debian 8 as the operating system, and BIND9 as the software that runs the function of DNS Server.Keywords:Forwarding DNS,BIND 9, Debian 8                                                                                                                           
Aplikasi Pengamanan Informasi Menggunakan Metode Least Significant Bit (Lsb) dan Algoritma Kriptografi Advanced Encryption Standard (AES) Dian Novianto; Yohanes Setiawan
Jurnal Informatika Global Vol 9, No 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (655.658 KB) | DOI: 10.36982/jiig.v9i2.561

Abstract

AbstractThere are several security aspects of the data that must be maintained, such as: authentication, integrity, non repudiation, authority, confidentialty, privacy and access control. One of the vulnerable parts of data security is when sending data to the destination. At the time of delivery, tapping of data can occur, so that people who are not entitled to get that information can find out. Therefore, an information needs to be secured so that only people who have access rights can know or get that information. And to maintain the confidentiality of the information, one of the ways is to insert the data into other objects, so that other people do not realize if the object contains important data or information. This hiding method is also known as steganography, and cryptography is added to strengthen the security of the data, that is a science and art to maintain the confidentiality of the message by encoding it in a form that is incomprehensible. The method used in steganography is Least Significant Bit (LSB), the algorithm used in cryptography is the Advanced Encryption Standard (AES), and the software development method used is prototype. The results of this study are all aspects of data security can be achieved, including when passing through the process of sending data through media such as the internet.Keyword: Steganography, Criptography, Prototype.AbstrakAda beberapa aspek keamanan data yang harus dijaga, seperti: otentikasi, integritas, non repudiation, otoritas, kerahasiaan, privasi, dan kontrol akses. Salah satu bagian yang rentan dari keamanan data adalah ketika mengirim data ke tujuan. Pada saat pengiriman, penyadapan data dapat terjadi, sehingga orang yang tidak berhak mendapatkan informasi tersebut dapat mengetahuinya. Oleh karena itu, suatu informasi perlu diamankan sehingga hanya orang yang memiliki hak akses yang dapat mengetahui atau mendapatkan informasi tersebut. Dan untuk menjaga kerahasiaan informasi, salah satu caranya adalah dengan memasukkan data ke objek lain, sehingga orang lain tidak menyadari jika objek tersebut berisi data atau informasi penting. Metode persembunyian ini juga dikenal sebagai steganografi, dan kriptografi ditambahkan untuk memperkuat keamanan data, yaitu ilmu dan seni untuk menjaga kerahasiaan pesan dengan menyandikannya dalam bentuk yang tidak dapat dipahami. Metode yang digunakan dalam steganografi adalah Least Significant Bit (LSB), algoritma yang digunakan dalam kriptografi adalah Advanced Encryption Standard (AES), dan metode pengembangan perangkat lunak yang digunakan adalah prototipe. Hasil dari penelitian ini adalah semua aspek keamanan data dapat dicapai, termasuk ketika melewati proses pengiriman data melalui media seperti internet.Kata kunci: Steganografi, kriptografi, Prototipe
COMPARATIVE ANALYSIS OF PERFORMANCE BETWEEN ECMP AND NTH METHODS IN IMPLEMENTATION OF MICROTIC-BASED DUAL LINK LOAD BALANCING TECHNIQUES Dian Novianto; Yohanes Setiawan Japriadi
Jurnal TAM (Technology Acceptance Model) Vol 12, No 1 (2021): Jurnal TAM (Technology Acceptance Model)
Publisher : LPPM STMIK Pringsewu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/jurnaltam.v12i1.1045

Abstract

Load balancing is a technique within the network that functions to divide the network into two or more links with the aim that internet access needed by clients on the network does not experience problems. However, there are various methods that can be used in the load balancing technique, so it is necessary to test the performance of these methods in order to choose which method has better performance. In this study, the methods implemented in the load balancing technique are ECMP and NTH. The research methodology used is qualitative and comparative, and PPDIOO as a network development model. By applying the comparative method, there is a comparison of the results of testing load balancing techniques using the ECMP and NTH methods. Testing is done by downloading files in two different sizes, with criteria less than 100 MB and more than 100 MB. Performance analysis of Quality of Service (QoS) is based on four parameters. There are throughput, delay, jitter and packet loss. The results of the Quality of Service (QoS) load balancing technique are the best after being tested and compared based on predetermined parameters. It concludes that the NTH method is slightly better than ECMP because it has a slightly larger throughput value.
Sistem Rekomendasi Hybrid untuk Pemesanan Hidangan Berdasarkan Karakteristik dan Rating Hidangan Lukas Tommy; Dian Novianto; Yohanes Setiawan Japriadi
Journal of Applied Informatics and Computing Vol 4 No 2 (2020): Desember 2020
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v4i2.2687

Abstract

The method that was often applied in recommender systems was content-based filtering or collaborative filtering which had several drawbacks if applied singly so that its accuracy was not too high. This study intended to solve the drawbacks of both by combining these two methods into a hybrid method. Apriori algorithm was used to provided recommendations based on dishes’s category and price range in customer order history or wishlist. The similarity between dishes was calculated using adjusted-cosine similarity algorithm while customer’s rating for dishes prediction was calculated using weighted sum algorithm. The values generated by these two methods were then averaged for recommendation process. The proposed hybrid recommender system successfully combines content-based with collaborative filtering methods where its precision and recall values when measured by confusion matrix are 80.73% and 76.52%. By considering the characteristics of dishes that have been ordered by customer, the recommender system is able to recommend new dishes or dishes that have not been ordered as long as their characteristics are similar to the dishes the customer has ordered.
Implementation of a Network Security System Using the Simple Port Knocking Method on a Mikrotik-Based Router Dian Novianto; Lukas Tommy; Yohanes Setiawan Japriadi
Jurnal Komputer, Informasi dan Teknologi (JKOMITEK) Vol. 1 No. 2 (2021): DESEMBER
Publisher : Penerbit ADM

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (3538.89 KB) | DOI: 10.53697/jkomitek.v1i2.375

Abstract

One of the problems in remote access to the system is the act of hacking to illegally gain access rights to a system. Therefore the need for an additional mechanism in user authentication in addition to the username and password parameters. The port knocking method is an option that can be implemented in this problem. Port knocking is a security system that functions to open or close access to certain ports by using a firewall on network devices by sending certain packets or connections. The connection used can be in the form of TCP, UDP, or ICMP protocols. The network system development method used in this research is the PPDIOO method developed by CISCO, where the cycle sequence includes: . prepare (preparation), Plan (planning), Design (Design), Implement (Implementation), Operate (Operation) and Optimize (Optimization). The result of implementing the Port Knocking method on a system on a computer network is that the system will refuse if the login activity on the system does not or sends additional parameters incorrectly, besides that the network admin can find out the activity on the network system if someone from outside fails when accessing the system through the port. so that actions can be taken according to system security requirements.
Peningkatan Keahlian Siswa dalam Menggunakan Software Editing Multimedia pada SMK Bakti Pangkalpinang Lukas Tommy; Yohanes Setiawan Japriadi; Rendy Rian Chrisna Putra; Dian Novianto; Fransiskus Panca Juniawan; Dwi Yuny Sylfania
Abdiformatika: Jurnal Pengabdian Masyarakat Informatika Vol. 1 No. 1 (2021): Mei 2021 - Abdiformatika: Jurnal Pengabdian Masyarakat Informatika
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8890.219 KB) | DOI: 10.25008/abdiformatika.v1i1.133

Abstract

Pada akhir masa belajar siswa SMK umumnya dilaksanakan Uji Kompetensi Keahlian (UKK) dalam rangka mengukur pencapaian kompetensi dari siswa tersebut. Aspek keahlian yang dinilai pada UKK di SMK Bakti Pangkalpinang meliputi keterampilan siswa dalam mendesain case dan cover DVD (Digital Video Disc) serta memproduksi video sesuai dengan tema yang ditentukan. Tidak menutup kemungkinan terdapat beberapa siswa yang belum mampu mengoperasikan software editing multimedia secara baik. Untuk mengatasi masalah tersebut, akan dilakukan workshop untuk meningkatkan keterampilan siswa dalam menggunakan software editing multimedia satu minggu sebelum UKK. Berdasarkan hasil evaluasi, workshop yang telah dilaksanakan mampu meningkatkan keterampilan peserta dalam menggunakan software editing multimedia secara efektif, yaitu rata-rata sebesar 9,88%. Setelah mengikuti workshop, predikat kompetensi dari 34 peserta didominasi dengan kompeten sebanyak 52,94%, disusul sangat kompeten sebanyak 41,18%, dan cukup kompeten sebanyak 5,88%.
Implementasi Keamanan Akses Terhadap Website Menggunakan Wireguard VPN Di Routerboard Mikrotik Dian Novianto; Yohanes Setiawan Japriadi; Lukas Tommy
Jurnal Informatika Global Vol 13, No 2
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jiig.v13i2.2308

Abstract

The need for the availability of information is currently very high, especially in the conditions of the COVID-19 pandemic, all organizational activities are carried out online. Human dependence on the role of information technology is increasing and this has consequences for long distance communication between devices, which requires users to be authenticated for access rights granted by the system. The problem that arises is the security of data travel during the authentication process, where there is the possibility of leaking account information. This is because communication is done on a public network while accessing resources that require privacy. Therefore we need a network connection that is safe and efficient. Virtual Private Network (VPN) is a network communication technology that allows you to connect to public networks safely and quickly. The VPN used in the solution to this problem is Wireguard. Wireguard is a VPN protocol built with advanced cryptography and makes it extremely fast and secure. The method used by the author in developing this system is PPDIOO which consists of, Prepare, Plan, Design, Implement, Operate, and Optimize. And also some supporting tools for the development of the system Unified Modeling Language. By using Wireguard VPN, the expected result is the security of the data sent to be more secure and can connect two remote networks privately using the public internet.Keywords : VPN, Wireguard, Mikrotik