Claim Missing Document
Check
Articles

Found 5 Documents
Search

Sistem Informasi Menghitung Biaya Pembangunan Perangkat Lunak dengan Menggunakan Metode Matrik Function Point Astuti, Susi Widya; Ariandi, Wahyu
Syntax Literate Jurnal Ilmiah Indonesia
Publisher : CV. Ridwan Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (560.61 KB) | DOI: 10.36418/syntax-literate.v6i10.4288

Abstract

Semakin berkembangnya kebutuhan perangkat lunak di instansi pemerintahan sebagai sistem informasi untuk mewujudkan transparansi, serta membantu mempercepat kegiatan melayani kebutuhan masyarakat, maka semakin luas kebutuhan perangkat lunak, sehingga mengakibatkan melakukan kerjasama dengan pengembang/konsultan (pihak ke tiga). Pengadaan perangkat lunak membutuhkan biaya yang tidak sedikit, namun kesulitan untuk membuktikan biaya pengadaan perangkat lunak, sesuai dengan standar harga yang telah disepakati. Selain itu, dari pihak pengembang juga mengalami kesulitan menentukan perkiraan biaya perangkat lunak, memperkirakan target waktu penyelesaian pembangunan/pembuatan perangkat lunak, dan menghitung gaji pegawai/programer berdasarkan kontribusi yang telah dilakukan dalam satu proyek. Untuk itu, maka diperlukan penelitian yang dapat mengukur kelayakan harga dari perangkat lunak. Salah satu pemecahan masalah adalah dengan menerapkan Metode Matrik Function Point, yaitu dengan menghitung parameter pengukuran perangkat lunak, menghitung factor kompleksitas, menghitung titik fungsi (Function Point), kebutuhan programer dalam proyek, serta kemampuan produktifitas programer.
Using Apriori Algorithm to Analyze Library Borrowing Patterns at SMK Negeri 1 Cirebon Susi Widyastuti; Ariandi, Wahyu; Wildan Dwi Putera; Raden Radian Baratasena
Journal of General Education and Humanities Vol. 4 No. 2 (2025): May
Publisher : MASI Mandiri Edukasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58421/gehu.v4i2.363

Abstract

This study aims to identify book borrowing patterns in the SMKN 1 Cirebon City library using the association rule method with the apriori algorithm. The apriori algorithm is a data mining method that finds association relationships between items in an extensive database. In this study, book borrowing transaction data is processed to determine the combination of books often borrowed together. The analysis begins with processing book borrowing transaction data, followed by applying the apriori algorithm to find frequent itemsets and association rules with high support and confidence values. The analysis results show that students often carry specific book borrowing patterns, such as those who borrow Python programming books borrow data science with Python books. This pattern is expected to be a recommendation for the library in managing book inventory, arranging bookshelves, and developing more effective and efficient borrowing strategies so that the library can rearrange the bookshelves by placing books that are often borrowed together in the nearest location. Also, the library can determine the types of books that need to be added based on the connected borrowing pattern. Thus, applying the association rule method using the apriori algorithm can help libraries understand students' book-borrowing habits and improve the quality of library services.
ALGORITMA AES128-CBC (ADVANCED ENCRYPTION STANDARD) UNTUK ENKRIPSI DAN DEKRIPSI BERKAS DOKUMEN PT. ADIARTA MUZIZAT Fahlevvi, Mohammad Rezza; Putra, Dhita Satria Aprilliana; Ariandi, Wahyu
Journal of Innovation And Future Technology (IFTECH) Vol. 7 No. 1 (2025): Vol 7 No 1 (Februari 2025): Journal of Innovation and Future Technology (IFTECH
Publisher : LPPM Unbaja

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47080/iftech.v7i1.3929

Abstract

The rapid advancement of digital technology has increased concerns about data security, especially in document storage and transmission. PT. Adiarta Muzizat, a logistics company, has experienced multiple data breaches, highlighting the need for a more secure encryption method. This study focuses on implementing the Advanced Encryption Standard (AES) 128-bit with Cipher Block Chaining (CBC) mode to enhance document security. The research follows the Rational Unified Process (RUP) methodology, comprising four phases: inception, elaboration, construction, and transition. The encryption and decryption processes were tested on various document formats, evaluating performance in terms of speed, file size differences, and resistance to brute-force attacks. The results indicate that AES-128-CBC successfully prevents unauthorized access, as encrypted documents remain unreadable without the correct decryption key. Additionally, security tests using Crackstation revealed that AES-128-CBC is significantly more resilient compared to MD5 and SHA-256. The study concludes that implementing AES-128-CBC enhances document confidentiality, ensuring data integrity and security. Future research could explore AES-256 or blockchain integration for improved security and efficiency.
IMPLEMENTASI ALGORITMA BLOWFISH UNTUK PENGAMANAN DATA PADA APLIKASI PENGELOLAAN KELOMPOK TANI DI KECAMATAN DAWUAN Fahlevvi, Mohammad Rezza; Septiandi Harhari, Nurfadhilah; Ariandi, Wahyu
JURNAL ILMIAH INFORMATIKA Vol 13 No 01 (2025): Jurnal Ilmiah Informatika (JIF)
Publisher : LPPM Universitas Putera Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33884/jif.v13i01.9924

Abstract

The rapid development of technology has increased the need for robust data security, especially in public administration managing sensitive information. This research aims to design a farmer group management application for Dawuan District, integrating the Blowfish algorithm to secure member data. The study employs the Rational Unified Process (RUP) methodology, comprising problem identification, system design, implementation, and evaluation stages. Blowfish, chosen for its speed and efficiency, encrypts critical information such as identification numbers, addresses, and contact details. System functionality and security tests confirm the algorithm’s effectiveness, demonstrating faster encryption times and reliable protection against data breaches compared to AES and 3DES. User feedback highlights the system’s practicality and alignment with local administrative needs. However, the study notes limitations in computational resource requirements and key management. Future research may explore performance optimization, blockchain integration for layered security, and mobile app development to enhance accessibility. This research contributes to the literature on cryptographic applications in public systems, presenting a scalable solution to secure farmer data and supporting regional efforts to comply with data protection regulations.
ALGORITMA HASH BASED UNTUK MENENTUKAN POLA PENJUALAN PAKET MENU PADA WARUNG D’KRIUK Ariani, Siti; Ariandi, Wahyu; Kosasih, Asep; Kurniawan, Dedi
INFOKOM Vol. 18 No. 2 (2025): JURNAL ILMIAH INFOKOM STIKOM POLTEK CIREBON
Publisher : STIKOM POLTEK CIREBON

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Teknologi sangat berpengaruh di dunia persaingan bisnis yang semakin ketat sehingga pebisnis harusmencari strategi untuk meningkatkan hasil penjualan di tengah persaingan bisnis. Penjual kuliner haruspintar dalam memanajemen stok maupun membuat strategi dalam menjual makanan dan minuman. Datatransaksi dapat diolah menjadi informasi yang dibutuhkan untuk meningkatkan hasil penjualan, salahsatunya dapat dijadikan sebagai Analisa aturan asosiasi transaksi pembeli dalam melakukan pembelianmakanan dan minuman sehingga dapat mendukung pengambilan sebuah keputusan terhadap persediaanmakanan minuman dan dapat membantu pemilik dalam merekomendasikan makanan dan minumanlainnya kepada pembeli dalam strategi cross selling. Mengetahui makanan dan minuman yang seringdibeli akan menjadi prioritas utama yang harus disediakan agar tidak terjadi kekosongan stok. Dalammasalah ini data mining sangatlah diperlukan untuk mengelola data transaksi penjualan makanan danminuman pada Warung D’Kriuk menggunakan Algoritma Hash Based. Algoritma Hash Based yangdapat menentukan frequent itemset dari kandidat itemset secara optimal. Dalam penerapannya dalampenentuan aturan asosiasi penjualan makanan dan minuman dengan menerapkan Algoritma Hash Basedhingga mendapatkan frequent itemset untuk 3 itemset Ayam Geprek Sambel Korek, Nasi Putih dan Aqua600ml yang merupakan kombinasi 3 itemset menu makanan yang diprioritaskan dalam penjualan dengannilai support 10% dan confidance 50%.