Claim Missing Document
Check
Articles

Rancang Bangun Video Profil Sebagai Sarana Informasi dan Promosi pada Program Studi Teknik Komputer Politeknik Negeri Sriwijaya Palembang Adi Sutrisman; Slamet Widodo; M. Miftakul Amin; Ervi Cofriyanti
JUPITER (Jurnal Penelitian Ilmu dan Teknologi Komputer) Vol 11 No 1 (2019): Jupiter April 2019
Publisher : Teknik Komputer Politeknik Negeri Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5281/zenodo.3405822

Abstract

ABSTRAK Saat ini media penyampaian informasi berupa profil perguruan tinggi yang digunakan digunakan jurusan teknik komputer masih berupa brosur, spanduk dan website yang hanya berupa teks. Media seperti ini biasanya membutuhkan biaya yang besar dalam produksinya dan kurang diminati masyarakat. Pembuatan video Company Profile mengunakan metode MDLC ( Multimedia Development Life Cycle) , dimana penggabungan unsur-unsur gambar, teks dan suara akan lebih meningkatkan ketertarikan masyarakat yang dapat digunakan dalam menyampaikan informasi mengenai profil program studi di sebuah perguruan tinggi. Belum adanya media penyampaian informasi dalam bentuk video profil di prodi teknik komputer yang mendorong saya untuk melakukan penelitian ini, sehingga video profil yang dibuat dapat dimanfaatkan untuk meningkatkan layanan informasi kepada masyarakat dan dunia industri. Kata Kunci: Company Profil, MDLC ( Multimedia Development Life Cycle).
Keamanan Data User Pada Jaringan Wirelles Menggunakan Two Factor, Password Dan Mac Address Filtering Di Jurusan Teknik Komputer slamet widodo; Adi Sutrisman; M. Miftakul Amin; Muhammad fernaldo harefa; Muhammad Aulia Farhan; Muhammad Reinaldo
JUPITER (Jurnal Penelitian Ilmu dan Teknologi Komputer) Vol 14 No 1 (2022): jupiter April 2022
Publisher : Teknik Komputer Politeknik Negeri Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5281./4385/5.jupiter.2022.04

Abstract

Users of internet network facilities are needed to find references as well as add insight. One of the internet networks used is a wireless network in the form of hotspot technology. Hotspot networks are an important requirement in activities implemented in universities. Frequent attacks that disrupt the internet network such as Wireless Hacking. This study discusses user data security applications and wireless security systems using two factors, passwords and MAC address filters in the computer engineering department. Therefore, to overcome this problem, network security was built with firewall settings, namely filter rules and NAT. Based on these problems, the discussion that will be reviewed is about making user data security applications that are useful for accommodating the user's MAC address and making hotspots on Mikrotik, and testing the designed hotspot network. Based on the test results, it can be concluded that the firewall can overcome illegal hotspot users in the MikroTik hotspot. With the development of user data security applications and internet security using a firewall, setting the filter rules and NAT helps users to minimize the occurrence of illegal users. Firewalls are able to filter access to a computer using a list of permissions (permissions list) that is made based on the MAC address. By registering the MAC-Address, illegal users who are not registered in the network cannot easily access wireless networks in the Computer Engineering department. Keywords: Firewall, Hotspot, Mac-Address-Filter, Mikrotik.
Media Pembelajaran Virtual Reality Mata Kuliah Pengantar Teknologi Komputer Pada Jurusan Teknik Komputer Politeknik Negeri Sriwijaya slamet widodo; Ali Firdaus; M. Miftakul Amin; Azmirianda Muhammad Nurhasyiri; Muhammad Aulia Farhan
JUPITER (Jurnal Penelitian Ilmu dan Teknologi Komputer) Vol 14 No 1 (2022): jupiter April 2022
Publisher : Teknik Komputer Politeknik Negeri Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5281./4386/5.jupiter.2022.04

Abstract

Learning media is one of the important components for the success of learning in the world of education. Virtual reality as a learning medium allows users to be actively involved in their virtual environment and can do things that are impossible in the real world. The purpose of research with virtual reality technology is to make teaching and learning activities more interesting and flexible. The success of this virtual reality-based learning media is through 2 aspects, namely the attractiveness aspect which is assessed by experts in the multimedia field, and the information and display quality aspect which is assessed by the students of the Computer Engineering Department of the Sriwijaya State Polytechnic. The research method for multimedia development is Luther and Likert scale to calculate the questionnaire given during the socialization of learning media. Respondents in this study amounted to 3 experts and 100 students, which were obtained from the distribution of online questionnaires The test results show that the percentage index of the success rate obtained by this learning media application is 64.9% and is in the "Good" category. The results of data analysis and testing from respondent B, , the test results show that the success rate percentage index is 79.7% and is in the "Good" category. So this learning media is considered to have provided information that can be understood by students and lecturers. Keywords: Learning Media, Virtual Reality, History of Computer Development
THE EFFECT OF ADDING SEA CUCUMBER (Holothuria scabra) PROTEIN CONCENTRATE ON THE QUALITY CHARACTERISTICS OF THE BISCUITS Miftakul Amin; Desmelati Desmelati; Sumarto Sumarto
Jurnal Online Mahasiswa (JOM) Bidang Perikanan dan Ilmu Kelautan Vol 7, No 2 (2020): 2 Juli - Desember 2020
Publisher : Jurnal Online Mahasiswa (JOM) Bidang Perikanan dan Ilmu Kelautan

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT                This study aims to determine the effect of adding protein concentrate of sea cucumber (Holothuria scabra) and determine the best amount of concentration in producing biscuit quality through an organoleptic and chemical test. The research method was experimental by adding protein concentrate to sea cucumber in different concentrations. The research designed in Completely Randomized Design (CRD) consisting of 4 levels of treatment, namely without the addition of 0% (B0) sea cucumber protein concentrate, 5% (B1), 10% (B2), and 15% (B2) of sea cucumber protein concentrate 5% (B3). The best parameters were on organoleptic test and chemical analysis (moisture, ash, fat, protein, carbohydrate content). The results showed that the addition of sea cucumber protein concentrates affected the quality of the biscuits, the best quality of biscuits was obtained from the use of sea cucumber protein concentrate 5% (14 grams), with the characteristics of brownish-yellow biscuits, distinctive aroma of biscuits, dry and brittle texture, and a crunchy taste, and sweet. Sea cucumber protein concentrate biscuits have a moisture content of 3.76%, 1.75% ash, 9.26% protein, 23.47% fat, and 61.76% carbohydrates. Keywords: biscuits, protein concentrate, sea cucumber
TEKNIK MENYEMBUNYIKAN PESAN RAHASIA MENGGUNAKAN STEGANOGRAPHY DAN CRYPTOGRAPHY M. Miftakul Amin
Jurnal Informatika Vol 15, No 1 (2015): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v15i1.427

Abstract

Development of Internet technology has demonstrated the communication that occurs does not require face to face directly. Safety factor becomes an important issue in the communication using the Internet network. Various attempts were made to keep the information security and confidentiality can be maintained. Steganography and cryptography techniques present as a technique to achieve data security. This research attempts to develop an application that can be used for communication by using two techniques. In this study steganography method used is the Least Significant Bit (LSB) whereas cryptography method used is the Caesar cipher. From the research that has been done can be generated an application that has been able to perform encryption and decryption of secret messages that can be hidden in a digital image color (24 bit). Key words : steganography, cryptography, LSB
PUSTAKA SANDI KLASIK BERBASIS COMPONENT OBJECT MODEL (COM) M. Miftakul Amin
Jurnal Informatika Vol 14, No 2 (2014): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v14i2.655

Abstract

Security and confidentiality are important issues that need serious attention in the era of information technology. Cryptography is one technique for securing data and information. In cryptography, the data is disguised in such a way that even if the data can be read, it can not be understood by those who do not have the authority. Data that has not undergone encoding known as The term plaintext, and after camouflaged with an encryption method, then it will turn plaintext into ciphertext. In general, a system equipped with a password to restrict only certain parties were entitled to enter into the system. If the password can be solved or known by an unauthorized person, then the data or information that is in the system is threatened. This research aims to develop a library classical password that can be used as an attempt to realize the aspect of information security in access control, by utilizing the technology component object model (COM). From the results of tests performed can be seen that the COM libraries are packed in COM DDL can be used by a variety of programming languages fairly easily.Keywords— cryptography, component object model (COM)
PENDEKATAN ACTIVE DATABASE SYSTEM DAN BUSINESS RULE DALAM PENGEMBANGAN SISTEM INFORMASI M. Miftakul Amin
Jurnal Informatika Vol 13, No 1 (2013): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v13i1.125

Abstract

An information system is inseparable with the database as data repository and give the data service to information system. Information system basically translate the business rule from an organization into form of algorithm programming which later then planted in application. Database which used conventionally have the character of passive and there is no controlling mechanism, that happened only mechanism just enter and its exit of data. With the existence of active of database system, a database earn the reactive behavior and conduct the controlling of information system  at database level. Business rules which is as a rule planted in application can be planted directly into database and can be used concurrently by entire/all application that using database. This writing give the study about an alternative approach of  business rules and active database system in developing an information system by planting business rules in the form of programming algorithm into database management system so that more improving the performance of information system. This active database system approach  can be implemented not only in the field of information systems development, but can be used as a data base responsive to collaborate with the control system hardware. Key words : information system, active database system, business rule
SISTEM INFORMASI PRODUKSI PADA KALIANDA FARM LAMPUNG SELATAN M. Miftakul Amin
Jurnal Informatika Vol 11, No 2 (2011): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v11i2.183

Abstract

Kalianda farm is a company engaged in the cultivation of laying hens. Operational reporting daily transactions and daily, weekly and monthly are still using hand written. On the other hand, management needs to get a quick report to be presented on a periodic basis. As one effort to achieve these objectives, it is necessary to build an information system that can assist livestock operations in the data record Kalianda farm feed, egg production, administration, warehouse and generate reports. The system is built using technology that runs in a multiuser network of Local Area Network (LAN) architecture client / server applications that are expected to directly obtain information about the recapitulation in a relatively short time and has managed to periodically. Data collection instruments using library research, interviews, and documentation. While the software to build applications using MS. Visual Basic 6.0, MySQL and Crystal Reports 8.5. Of this study obtained a production information system with client / server architecture, so the application can be run by several users at the same time to assist the administration of farm production in Kalianda South Lampung. Keywords: Information Systems, Production
Implementasi Socket Programming dalam Pembuatan Sistem Antrian M. Miftakul Amin
Jurnal Informatika Vol 10, No 1 (2010): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v10i1.150

Abstract

Customer satisfaction is one aspect to be achieved by organizations that provide services to customers. One of the existing service is a queuing system which is the front guard in the process of service. Many public service organizations that have not applied the queuing system in the service. This resulted in a buildup of the queue and the calling process is still done conventionally. On the other hand queuing system that is much used in the form of hardware that if one day there is a change in the installation then the entire device must be replaced. Another alternative is a queuing system made with software that contains multimedia features. Making it easier for the installation and modification to the changes that occur. With the help of socket programming allows to send messages between computers connected in a queuing system, as well as additional multimedia features will further provide information of interest to the customer. Keyword: queuing system
PENGEMBANGAN MOBILE APPLICATION TRACER STUDY (STUDI KASUS : IBI DARMAJAYA) M. Miftakul Amin
Jurnal Informatika Vol 11, No 1 (2011): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v11i1.167

Abstract

IBI Darmajaya has several times held a tracer study. However, because the tracer study was done independently in each department, then it’s aspects vary greatly according to the interests of each department. Tracer studies also can not be used as a representing IBI Darmajaya’s graduates overall. This study presents an instrument by applying a tracer study in charging mobile application. Mobile application is built using the Wireless Application Protocol (WAP) as a content applications. The results of this study was obtained by a mobile software application that makes it easy for IBI Darmajaya’s graduates to fill out questionnaires of tracer study without experiencing barriers of distance and time.Keywords: Mobile Application, Tracer Study