Claim Missing Document
Check
Articles

Found 7 Documents
Search

Sistem Pendukung Keputusan Pemilihan Sales Terbaik Menggunakan Metode Rank Order Centroid (ROC) dan Additive Ratio Assessment (ARAS) Berbasis Web Nindian Puspa Dewi; Ubaidi; Elsi Maharani
Digital Zone: Jurnal Teknologi Informasi dan Komunikasi Vol. 12 No. 2 (2021): Digital Zone: Jurnal Teknologi Informasi dan Komunikasi
Publisher : Publisher: Fakultas Ilmu Komputer, Institution: Universitas Lancang Kuning

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31849/digitalzone.v12i2.7721

Abstract

Setiap tahun, CV. Anugerah Wangi melakukan pemilihan sales terbaik untuk memotivasi para sales dalam memberikan pelayanan dan peningkatan penjualan sepeda motor. Proses pemilihan sales terbaik masih dilakukan secara manual dengan mengumpulkan data seluruh sales dalam 1 tahun. Pekerjaan ini tentu tidak efektif dan efisien. Selain itu, perhitungan yang dilakukan juga menjadi sulit karena mencakup banyak kriteria penilaian. Karena itulah perlu dibuat suatu sistem pendukung keputusan dalam pemilihan sales terbaik pada CV. Anugerah Wangi yang dapat memudahkan pimpinan untuk melakukan proses perhitungan. Sistem Pendukung Keputusan Pemilihan Sales Terbaik dibuat dengan menggunakan metode Rank Order Centroid (ROC) dan Additive Ratio Assessment (ARAS). Penggabungan metode ROC dan ARAS dapat mengoptimalkan terhadap pembobotan dalam setiap kriteria yang digunakan. Adapun kriteria yang digunakan dalam pemilihan sales terbaik yaitu, jumlah penjualan (C1), penilaian pelayanan (C2), jumlah penjualan (C3), masa bekerja (C4) dan kedisiplinan (C5). Dari penelitian ini, dilakukan uji coba terhadap 23 data sales yang kemudian dilakukan perhitungan sehingga mendapatkan hasil rangking teratas yang menjadi sales terbaik yaitu Faizur Rohman dengan nilai 0,916. Abstract Every year, CV. Anugerah Wangi selects the best sales to motivate sales in providing services and increasing motorcycle sales. The process of selecting the best sales is still done manually by collecting data on all sales in 1 year. This work is certainly not effective and efficient. In addition, the calculations made also become difficult because it includes many assessment criteria. That why it is necessary to make a decision support system in selecting the best sales for CV. Anugerah Wangi. So, it can make it easier for leaders to carry out the calculation process. The Best Sales Selection Decision Support System was made using the Rank Order Centroid (ROC) and Additive Ratio Assessment (ARAS) methods. The combination of ROC and ARAS methods can optimize the weighting in each of the criteria used. The criteria used in the selection of the best sales are the number of sales (C1), service assessment (C2), number of sales (C3), years of service (C4), and discipline (C5). From this study, a trial was carried out on 23 sales data which was then calculated so that the top-ranking results were the best sales, namely Faizur Rohman with a value of 0.916.
Analisis dan Implementasi VPN pada VPS untuk Peningkatan Aksesibilitas Jaringan di Lingkungan Perguruan Tinggi Ubaidi; Puspa Dewi, Nindian
Jurnal Informasi dan Teknologi 2023, Vol. 5, No. 3
Publisher : SEULANGA SYSTEM PUBLISHER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60083/jidt.v5i3.409

Abstract

Perguruan Tinggi merupakan institusi pendidikan dengan lingkungan jaringan yang kompleks dan luas. Mahasiswa, dosen, dan tenaga kependidikan memerlukan akses yang aman dan terpercaya ke berbagai sumber daya dan layanan di jaringan kampus, termasuk akses ke data mahasiswa, penelitian, perpustakaan digital, dan sistem administratif. Karena itulah diperlukan infrastruktur yang aman dengan biaya yang efisien. Implementasi VPN (Virtual Private Network) merupakan salah satu teknologi yang dapat memberikan akses jaringan yang aman, mudah dan memiliki kecepatan transfer yang baik bagi para pengguna. VPN memungkinkan pengguna untuk mengenkripsi lalu lintas data mereka saat terhubung ke jaringan kampus, sehingga menjaga keamanan dan kerahasiaan informasi. Selain itu untuk efisiensi infrastruktur dapat dilakukan dengan implementasi VPS yang memungkinkan perguruan tinggi untuk menyediakan lingkungan server terisolasi yang dapat digunakan untuk berbagai tujuan dengan tetap menghemat biaya dan sumber daya, serta meningkatkan skalabilitas infrastruktur mereka.
Comparing the Performance of LoRaWAN and MQTT Protocols for IoT Sensor Networks Fauzan Prasetyo Eka Putra; Ubaidi; Holipah; Moch. Amir Mahmud; Reni Paradina
Jurnal Informasi dan Teknologi 2024, Vol. 6, No. 2
Publisher : SEULANGA SYSTEM PUBLISHER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60083/jidt.v6i2.565

Abstract

IoT (Internet of Things) Sensor Networks are an important infrastructure in facilitating data collection from various widespread sensor devices. In this context, the selection of the right communication protocol plays a key role in determining the performance and efficiency of the network. Two commonly used protocols in IoT sensor networks are LoRaWAN and MQTT. The study aims to compare the performance between LoRaWAN and MQTT protocols for IoT sensor networks in various critical aspects such as differing in terms of the number of end devices, data transmission period, gateway radius distance, and power consumption, Data collected from sensors connected to LoRaWAN and MQTT gateways. The data includes Throughput, Packet Loss, and power consumption The results show that LoRaWAN is generally superior to MQTT in terms of Throughput and Packet Loss, especially at long gateway radius distances. LoRaWAN also has lower power consumption compared to MQTT, but MQTT also excels in Data Transmission Period and Number of End Devices in terms of Throughput and Packet Loss. The selection of the right protocol should be based on the needs and characteristics of the application to be implemented.
Analysis of Cyber Attacks on Network Security Fauzan Prasetyo Eka Putra; Ubaidi; Anggreni Amba Sugi, Senah; Khafifatul Mufidah; Yayu Rahma Febriani
Jurnal Informasi dan Teknologi 2024, Vol. 6, No. 2
Publisher : SEULANGA SYSTEM PUBLISHER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60083/jidt.v6i2.569

Abstract

Network security is a crucial issue in today's digital era, with increasing cyber attacks targeting infrastructure and sensitive data. Analysis of cyber attacks on network security is an important aspect of efforts to protect information systems from ever-evolving digital threats. This research investigates various types of cyberattacks that can threaten network security, including phishing attacks, malware, denial of service (DoS), and brute force attacks. We also analyze defense methods that can be used to reduce the risk of cyberattacks, including firewalls, data encryption, real-time security monitoring, and security training for users. This research provides a deeper understanding of the current cyberattack landscape and effective strategies for reducing network vulnerabilities to such attacks. Thus, the results of this analysis can make an important contribution to improving network security in various sectors, from companies to government.
Uji Keamanan Back End Aplikasi Berbasis Website Menggunakan Metode Black Box Testing Abd. Wahab Syahroni; Nindian Puspa Dewi; Nilam Ramadhani; Ubaidi; Badar Said
Jurnal PROCESSOR Vol 19 No 2 (2024): Jurnal Processor
Publisher : LPPM Universitas Dinamika Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33998/processor.2024.19.2.1752

Abstract

Application security is often overlooked during the development phase and even after the application is deployed. However, without proper security measures, even the most advanced technologies can lead to significant losses, such as unauthorized data access and potential data loss due to deletion actions. Developing applications using the REST API architecture allows users to access backend endpoints from outside the application, so attention must be given not only to authentication but also to authorization issues. Based on the results of testing the SILAB application using the Black Box Testing method, it can be concluded that the SILAB application still needs improvements in backend security, particularly in terms of authorization. This indicates that there are still vulnerabilities and threats that could potentially compromise the data in the SILAB application.
Analysis of Phishing Attack Trends, Impacts and Prevention Methods: Literature Study Fauzan Prasetyo Eka Putra; Ubaidi; Achmad Zulfikri; Goffal Arifin; Ilhamsyah, Revi Mario
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.4357

Abstract

Phishing is a growing form of cybercrime that poses a serious threat to information security in the digital world. This article aims to analyze the latest trends in phishing attacks and evaluate effective prevention methods. Using data from cybersecurity reports, case studies, and academic literature, this research identifies the latest phishing techniques such as spear phishing, whaling, and smishing that are increasingly sophisticated and difficult to detect. The analysis showed that while anti-phishing technologies such as email filters, two-factor authentication (2FA), and encryption have undergone significant developments, user awareness and education remain key factors in preventing phishing attacks. Additionally, strict policies and procedures at the organizational level also play an important role in reducing risk. The case studies presented in this article demonstrate the successful implementation of various prevention methods in several organizations, although challenges in terms of technology adoption and user training remain. For example, spear phishing and whaling have been effectively countered by tailored training programs and advanced threat detection systems. The article concludes by providing practical recommendations to increase user awareness and strengthen organizational policies to protect against phishing attacks. It also includes foresight to illustrate the possible evolution of phishing attacks, emphasizing the need for continuous innovation in cyber defense strategies. This comprehensive approach underscores the importance of a multi-layered defense system that combines technological solutions with human vigilance to effectively combat the ever-evolving threat of phishing.
Analysis of Phishing Attack Trends, Impacts and Prevention Methods: Literature Study Fauzan Prasetyo Eka Putra; Ubaidi; Achmad Zulfikri; Goffal Arifin; Ilhamsyah, Revi Mario
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.4357

Abstract

Phishing is a growing form of cybercrime that poses a serious threat to information security in the digital world. This article aims to analyze the latest trends in phishing attacks and evaluate effective prevention methods. Using data from cybersecurity reports, case studies, and academic literature, this research identifies the latest phishing techniques such as spear phishing, whaling, and smishing that are increasingly sophisticated and difficult to detect. The analysis showed that while anti-phishing technologies such as email filters, two-factor authentication (2FA), and encryption have undergone significant developments, user awareness and education remain key factors in preventing phishing attacks. Additionally, strict policies and procedures at the organizational level also play an important role in reducing risk. The case studies presented in this article demonstrate the successful implementation of various prevention methods in several organizations, although challenges in terms of technology adoption and user training remain. For example, spear phishing and whaling have been effectively countered by tailored training programs and advanced threat detection systems. The article concludes by providing practical recommendations to increase user awareness and strengthen organizational policies to protect against phishing attacks. It also includes foresight to illustrate the possible evolution of phishing attacks, emphasizing the need for continuous innovation in cyber defense strategies. This comprehensive approach underscores the importance of a multi-layered defense system that combines technological solutions with human vigilance to effectively combat the ever-evolving threat of phishing.