Claim Missing Document
Check
Articles

Found 3 Documents
Search

Introduction of Face Image as Identifier of Using in Principal Component Analysis Method (PCA) Wawan Krisdiyanto; Ika Irwanto; Lepi Astra Yudiansyah; Suhendro Yusuf Irianto
Prosiding International conference on Information Technology and Business (ICITB) 2017: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 3
Publisher : Proceeding International Conference on Information Technology and Business

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Face recognition is a person identification system that uses a person’s facial characteristics. Facial recognition is itself a branch of biometrics, which is a science that uses physical characteristics of a person to determine or disclose his identity. The system developed in this thesis is a system that uses face recognition feature extraction based on Principal Component Analysis (PCA). This technique involves taking a major component of facial database. To determine the accuracy of human face recognition system designed in this final project, has conducted trials using the system with as many as 60 input facial image of the database. From the results of testing this system, the result is a 80% system performance in recognizing the input image correctly.Keywords : Facial Recognition, biometrik, PCA.
DESIGNING AND IMPLEMENTING CAR RENTAL SYSTEM Rosha Assyifa; Shen Jian Tao; Suhendro Yusuf Irianto
Prosiding International conference on Information Technology and Business (ICITB) 2020: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 6
Publisher : Proceeding International Conference on Information Technology and Business

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Car rental was one of the business entities in the field of four-wheeled vehicle/cars rental services. The information system for borrowing and returning cars in Lampung was considered effective because the data of borrowing and returning cars and the daily transactions were recorded and reported manually - in the written form such as books and paper – so that this system was inefficient in terms of saving time, energy, and materials. The objective of this study was to build the website-based information system for car rental businesses in Lampung. The method used in this study was a structured approach method through the prototype development. The data collecting techniques used in this study was observation and interviews. The analysis and designing tools used in this study were the case diagrams, 0- levelled data flow diagrams, and 1-levelled flow diagrams. The supporting software used in this study was PHP and MySQL database. The sublime was an idea used to expanding the web application using PHP. This tool was facilitated to use to symbol, word, or line using a keyboard shortcut in a quick way. The result of this study was that the information system for borrowing and renting the car for car rental service was expected to facilitate the employees in managing the data of customers, borrowing and returning cars, and reducing errors from the data records and reports.Keywords:Information Systems, Car Rental, Borrowing, Refund.
Design and Implementation of a Mobile-Based Export-Import Digital Document Security System Using the AES-256 Encryption Algorithm to Ensure Data Confidentiality and Integrity Bayu Adi Prasetyo; Rio Kurniawan; Suhendro Yusuf Irianto; Amnah
Jurnal Teknologi Informatika dan Komputer Vol. 12 No. 1 (2026): Jurnal Teknologi Informatika dan Komputer
Publisher : Universitas Mohammad Husni Thamrin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37012/jtik.v12i1.3420

Abstract

The increasing use of digital documents in export-import activities, especially in government agencies such as the Directorate General of Customs and Excise, has the potential to pose a threat of leaks if not supported by an adequate security system. The design of this security system aims to design and develop a web-based digital export-import document security system by implementing the Advanced Encryption Standard (AES) 256-bit encryption algorithm. The system development was carried out using the Waterfall method by utilizing PHP, HTML, CSS, JavaScript, and MySQL database technology. This system implements encryption and decryption mechanisms on export-import documents in PDF and DOCX formats. Test results indicate that encrypted documents cannot be accessed without a valid decryption process, and data integrity is maintained referring to the AES-256 validation results. This system is able to increase the level of digital document security and minimize the risk of data leaks in a web-based system environment. This research requires the addition of a multi-layer authentication mechanism, the implementation of a more comprehensive encryption key management system, and the development of applications for mobile platforms. The rapid development of information technology has changed the way individuals, organizations, and government institutions manage and distribute information. One of the main impacts is the increasing use of digital import-export documents as the primary medium for storing and exchanging critical data. These documents generally contain sensitive information, requiring security mechanisms capable of ensuring data confidentiality, integrity, and authenticity during storage and distribution.