Claim Missing Document
Check
Articles

Found 24 Documents
Search

Sistem Pendukung Keputusan Penentuan Kombinasi Paket Produk Pertanian Menggunakan Algoritma Apriori Nur Fitrianingsih Hasan; Rifqi Hammad; Dwinda Etika Profesi; Kusrini Kusrini
Jurnal Eksplora Informatika Vol 9 No 1 (2019): Jurnal Eksplora Informatika
Publisher : Bagian Perpustakaan dan Publikasi Ilmiah - Institut Teknologi dan Bisnis STIKOM Bali

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (547.582 KB) | DOI: 10.30864/eksplora.v9i1.261

Abstract

Sektor pertanian di Indonesia yang memiliki potensi hasil tani tinggi ternyata memiliki kendala yaitu kurangnya pemanfaatan teknologi informasi. Data transaksi yang mengendap tidak dimanfaatkan, jika data ini diolah maka akan memberikan manfaat khususnya dalam memaksimalkan keuntungan penjualan produk pertanian. Penelitian ini bertujuan untuk merancang sebuah Sistem Pendukung Keputusan (SPK) kombinasi paket produk pertanian dengan memanfaatkan data transaksi yang sudah ada menggunakan algoritma apriori. Penelitian ini mengembangkan beberapa fitur inovasi agar pembangkitan item set lebih cepat dan menghasilkan aturan asosiasi yang mudah dipahami oleh pengguna. Hasil dari penelitian ini didapatkan rekomendasi paket produk pertanian dengan jumlah kemunculan transaksi 3, nilai support 25 dan nilai confidence 100, dan uji lift ratio 2,40. Jumlah data set dari fitur inovasi periode tanggal transaksi di mana semakin banyak data transaksi yang ada dan parameternya semakin tinggi maka akan semakin baik hasilnya. Presentasi dari penerimaan pengguna sebesar 73% artinya SPK ini diterima dan berjalan dengan baik.
Forensic Whatsapp Investigation Analysis on Bluestack Simulator Device Using Live Forensic Method With ACPO Standard Kurniadin Abd. Latif; Rifqi Hammad; Tomi Tri Sujaka; Khairan Marzuki; Andi Sofyan Anas
IJISTECH (International Journal of Information System and Technology) Vol 5, No 3 (2021): October
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (751.201 KB) | DOI: 10.30645/ijistech.v5i3.148

Abstract

This study aims to conduct a forensic analysis of the WhatsApp application on the Bluestacks android simulator device. BlueStacks App Player is designed to allow Android apps to run on PCs running Microsoft Windows and Apple's macOS. In this study, the scenario was carried out using two devices as Whatsapp communication media. The first device is a laptop device that uses the Bluestacks android simulator with the SM-G955F device type, and the second is a smartphone device as opposed to communication. This study uses the ACPO standard which consists of several stages such as Plan, Capture, Analysis, Present. Pada tahap Capture, teknik yang digunakan dalam melakukan  pencarian bukti pada aplikasi BlueStacks adalah live forensik. Hasil penelitian ini menunjukan bahwa analisis forensik pada perangkat android simulator Bluestacks dapat dilakukan sesuai prosedur ACPO. From the procedure carried out, information related to communication on the WhatsApp application was obtained. The source of this information is obtained from the WhatsApp database file msgstore.db.crypt12 which has been decrypted using the SQLite Browser application with a combination of the WhatsApp Key file contained in the cloned digital evidence. From the results of the decryption that has been carried out, then an explanation is carried out through the WhatsApp viewer application to make it easier to understand from the display side.
Optimization of data integration using schema matching of linguistic-based and constraint-based in the university database Rifqi Hammad; Azriel Christian Nurcahyo; Ahmad Zuli Amrullah; Pahrul Irfan; Kurniadin Abd. Latif
Matrix : Jurnal Manajemen Teknologi dan Informatika Vol. 11 No. 3 (2021): Jurnal Manajemen Teknologi dan Informatika
Publisher : Unit Publikasi Ilmiah, P3M, Politeknik Negeri Bali

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (388.329 KB) | DOI: 10.31940/matrix.v11i3.119-129

Abstract

University requires the integration of data from one system with other systems as needed. This is because there are still many processes to input the same data but with different information systems. The application of data integration generally has several obstacles, one of which is due to the diversity of databases used by each information system. Schema matching is one method that can be used to overcome data integration problems caused by database diversity. The schema matching method used in this research is linguistic and constraint. The results of the matching scheme are used as material for optimizing data integration at the database level. The optimization process shows a change in the number of tables and attributes in the database that is a decrease in the number of tables by 13 tables and 492 attributes. The changes were caused by some tables and attributes were omitted and normalized. This research shows that after optimization, data integration becomes better because the data was connected and used by other systems has increased by 46.67% from the previous amount. This causes the same data entry on different systems can be reduced and also data inconsistencies caused by duplication of data on different systems can be minimized.
Application of the Blowfish Algorithm in securing patient data in the database Pahrul Irfan; Rifqi Hammad; Andi Sofyan Anas; Fatimatuzzahra; Nanang Samudra
Matrix : Jurnal Manajemen Teknologi dan Informatika Vol. 12 No. 2 (2022): Jurnal Manajemen Teknologi dan Informatika
Publisher : Unit Publikasi Ilmiah, P3M, Politeknik Negeri Bali

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (350.146 KB) | DOI: 10.31940/matrix.v12i2.102-108

Abstract

Patient data is one of the datasets managed by the hospital. Patient data in the form of examination results and other data is important data that is private and confidential. Therefore, patient data needs to be secured so that there is no misuse of data by parties who are not responsible for things that can harm the data owner. One of the several methods that can be used to secure data is cryptography. Cryptography itself has several algorithms, one of which is blowfish. This study applies the blowfish algorithm to secure patient data in the database to reduce the possibility of data misuse by irresponsible parties. This study succeeded in implementing the blowfish algorithm for securing patient data. The data stored in the database is the result of encryption using the blowfish algorithm, the results of which are difficult to understand because there is a combination of symbols and text. The application of the algorithm affects the data storage time in the database, which originally took 0.12 seconds to save data and now takes 0.28 seconds to store data.
Topic modeling and sentiment analysis about Mandalika on social media using the latent Dirichlet allocation method Rifqi Hammad; Veny Cahya Hardita; Ahmad Zuli Amrullah
Matrix : Jurnal Manajemen Teknologi dan Informatika Vol. 12 No. 3 (2022): Jurnal Manajemen Teknologi dan Informatika
Publisher : Unit Publikasi Ilmiah, P3M, Politeknik Negeri Bali

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31940/matrix.v12i3.109-116

Abstract

The rapid and widespread dissemination of information currently affects the tourism sector. One tourist area that is quite widely discussed is the Mandalika Circuit. Twitter is one platform that provides comments related to the Mandalika Circuit. The amount of information related to the Mandalika Circuit is currently not being utilized properly by managers (government or private). It causes many topics related to the Mandalika Circuit that are currently trending, and public sentiment regarding the Mandalika Circuit is unknown to the government or private sector. Ignorance can result in delays in decision making which can harm the manager. To overcome this problem, research on sentiment analysis and topic modeling related to the Mandalika Circuit was carried out. The sentiment analysis method used is SVM and for modeling using LDA. Based on the results of the sentiment analysis, 1500 tweets were obtained before doing the pre-processing process, thus getting a dataset of 500 tweets divided into 398 positive and 102 negative tweets. So it can be concluded that more Twitter users give positive than negative responses to the Mandalika Circuit. The test results show that the SVM algorithm can classify sentiment toward the Mandalika Circuit well, as indicated by the measurement of the performance of the SVM algorithm, namely 87% accuracy, 77% precision, 84.81% recall, and 98.52% specificity. These results also show that the F1 Score compares the average precision and recall, which is weighted at 80.72%.
Model Pengendalian Internal Implementasi Tanda Tangan Elektronik pada Sistem Pemerintahan Daerah Muhammad Tajuddin; Andi Sofyan Anas; Rifqi Hammad; Ahmad Zuli Amrullah
Prosiding Seminar Sains Nasional dan Teknologi Vol 12, No 1 (2022): VOL 12, NO 1 (2022): PROSIDING SEMINAR NASIONAL SAINS DAN TEKNOLOGI
Publisher : Fakultas Teknik Universitas Wahid Hasyim

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36499/psnst.v12i1.7010

Abstract

Layanan tanda tangan elektronik telah menimbulkan berbagai masalah dalam lingkup pemerintahan daerah. Teknologi otentikasi keamanan perlu dimanfaatkan untuk menciptakan layanan yang sesuai dengan era Revolusi Industri. Untuk menjaga kerahasiaan dan keamanan penggunaan tanda tangan elektronik, perlu memperhatikan syarat dan ketentuan sehingga otentikasi dokumen-dokumen ini dijamin. Untuk itu, penggunaan tanda tangan elektronik harus dilakukan dengan menggunakan tanda tangan dalam sistem yang tersertifikasi. Penelitian ini memberikan gambaran tentang pentingnya menjaga kerahasiaan dan keamanan dalam penggunaan tanda tangan elektronik. Tanda tangan elektronik membantu menciptakan kepercayaan dan keyakinan dalam lingkungan tanpa kertas. Penelitian ini membahas implikasi hukum dan perbedaan antara berbagai jenis tanda tangan elektronik, teknologi pendukung, aplikasinya dalam proses bisnis, dan implikasinya terhadap sistem pengendalian internal. Kerangka Manajemen Risiko diusulkan untuk mengelola keamanan dan kontrol menggunakan tanda tangan elektronik. Tidak semua tanda tangan elektronik dibuat sama. Beberapa lebih aman daripada yang lain tetapi biaya lebih dan kompleks untuk diterapkan. Penelitian ini juga mengkaji biaya dalam penerapan tanda tangan elektronik dan risiko yang terlibat. Tidak dapat dihindari bahwa hal-hal akan tetap salah bahkan dengan tanda tangan elektronik yang paling aman, penting untuk memiliki sistem pengendalian internal yang efektif untuk melengkapi keamanan dan kontrol yang difasilitasi oleh tanda tangan elektronik.
Pendampingan Manajemen Bandwidth Jaringan Komputer menggunakan Mikbotam pada SMKN 1 Lingsar Andi Sofyan Anas; Hasbullah Hasbullah; Ahmad Zuli Amrullah; Ria Rismayati; Muhammad Innuddin; Rifqi Hammad
Bakti Sekawan : Jurnal Pengabdian Masyarakat Vol 1 No 2 (2021): Desember
Publisher : Puslitbang Sekawan Institute Nusa Tenggara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (180.31 KB) | DOI: 10.35746/bakwan.v1i2.174

Abstract

Internet is one of the most important needs in human life. The need for the internet is increasingly crowded, making the world of education in Indonesia very enthusiastic about using it as a means of learning and learning. The use of the internet as a learning and learning tool makes it easier for educators (teachers) to interact with students (students) regardless of their position or distance. However, in meeting the need for a stable and fast internet, it is necessary to provide assistance on bandwidth management. In this assistance, one must be able to understand how much bandwidth is capable of optimizing internet connections for the learning and learning process at SMKN 1 Lingsar. In addition to these needs, it is important to know that bandwidth utilization is shared everywhere so that internet optimization for learning goes well. Therefore, optimal assistance aims to enable users to perform bandwidth management according to the stages of using mikbotam, so that monitoring of bandwidth usage can be carried out more optimally by SMKN 1 Lingsar. The mentoring method is carried out in 5 stages, namely planning, preparation, implementation, evaluation, and reporting. The results obtained from this service program are participants are able to perform bandwidth management according to the stages that have been given.
Pembuatan Website Sekolah Sebagai Media Informasi dan Promosi Rifqi Hammad; Andi Sofyan Anas; Pahrul Irfan; Ahmad Zuli Amrullah; Muhammad Zulfikri; Gilang Primajati; Rukmin Ulfa Ayu Lestari
Bakti Sekawan : Jurnal Pengabdian Masyarakat Vol 2 No 1 (2022): Juni
Publisher : Puslitbang Sekawan Institute Nusa Tenggara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (651.605 KB) | DOI: 10.35746/bakwan.v2i1.216

Abstract

Website is an information technology that can be used to exchange information between users quickly by using the internet network. The website has been used by various institutions as a medium of information and promotion. One of them is school. Currently, SMKN 1 Jonggat does not have a website that is used as a medium of information and promotion. This causes problems for both the community and the school. People to get the information they need from schools, they have to come to school. The school also does not have a media that can be used to provide information and school promotion. Therefore, the service team held service activities that aimed to assist the school in creating a website that can be used as a medium of information and promotion. This activity is divided into three stages, namely planning, implementation and evaluation. The result of the planning stage is cooperation related to activities and data collection needed in making the website. At the implementation stage, the service team created a school website according to the results of the planning stage. The evaluation stage is the inspection stage related to the school website that has been created. The service team succeeded in creating a school website according to the needs of the school that can be used as a medium of information and promotion. With the school website, the problems of SMKN 1 Jonggat related to the distribution and delivery of information and promotions can be minimized
PELATIHAN MICROSOFT OFFICE UNTUK MENINGKATKAN KEMAMPUAN MASYARAKAT DI PUSDA LOBAR Ahmad Ahmad; Habib Ratu Perwira Negara; Pahrul Irfan; Rifqi Hammad; Kurniadin Abd. Latif; Suriyati Suriyati; Gilang Primajati
Jurnal Interaktif: Warta Pengabdian Pendidikan Vol 3 No 1 (2023): Edisi Juni 2023
Publisher : Jurusan Ilmu Pendidikan, FKIP, Universitas Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29303/interaktif.v3i1.73

Abstract

Adapun tujuan dari pengabdian ini adalah untuk meningkatkan kemampuan masyakat dalam menggunakan computer dalam dunia kerja baik disekolah mapun perkantoran. Langkah-langkah atau metode pengabdian yang dilakukan adalah: Menentukan tentukan tujuan pelatihan, Menentukan jenis pelatihan, Menentukan konten pelatihan: Microsoft Office (Word, excel dan powerpoint), Merencanakan jadwal pelatihan, Menyiapkan materi pelatihan, Melakukan kegaitan pelataihan dan evaluasi. Adapun hasil dari pengabdian ini menunjukkan bahwa pelatihan ini dapat memberikan manfaat besar bagi individu dan organisasi, seperti meningkatkan efisiensi, produktivitas, dan kinerja, serta mengurangi kesalahan dan meningkatkan kualitas pekerjaan. Selain itu, pelatihan Microsoft Office juga dapat membantu peserta untuk meningkatkan peluang karir mereka dan menjadi lebih kompetitif di pasar kerja. Dari pelatihan yang dilakukan terlihat bahwa peserta sudah memahami dan mampu menggunakan Microsoft office dengan baik
Peran Mendeley dalam Meningkatkan Kemampuan Menulis Karya Ilmiah Guru-guru di Kabupaten Lombok Barat Pahrul Irfan; Rifqi Hammad; Kurniadin Abd Latif; Ahmad; Muhammad Zulfikri; Habib Ratu Perwira Negara
Bakti Sekawan : Jurnal Pengabdian Masyarakat Vol 3 No 1 (2023): Juni
Publisher : Puslitbang Sekawan Institute Nusa Tenggara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/bakwan.v3i1.356

Abstract

Publication of scientific work is mandatory for teachers seeking promotion as a requirement to enhance their professionalism. Citing scientific works is crucial in every publication. However, many teachers often encounter difficulties in finding and managing references to be used in research publications. The objective of the Community Engagement Activity is to assist teachers in effectively and efficiently searching for references and organizing the sources to be used as references in their publications. Mendeley, as a reference management application, plays a significant role in improving the ability to write academic papers by providing features that facilitate reference searching and publication writing. The training is conducted through lectures, discussions, and practical exercises. The initial stage involves introducing the Mendeley application and installing it on participants' laptops. Participants are also taught how to collect references in Mendeley for later use in academic writing and how to apply Mendeley in the writing process. The outcome of this engagement is that teachers in West Lombok Regency can effectively master the use of the Mendeley application, thereby supporting their academic writing activities. With these skills, teachers will find it easier to search for references and streamline the process of creating automatic bibliographies