Claim Missing Document
Check
Articles

Found 9 Documents
Search

Sistem Informasi Manajemen Wisuda Berbasis Website Menggunakan Metode Waterfall Arizal; Annisa Nurul Puteri
Jurnal Sistem dan Informatika (JSI) Vol 14 No 2 (2020): Jurnal Sistem dan Informatika (JSI)
Publisher : Bagian Perpustakaan dan Publikasi Ilmiah - Institut Teknologi dan Bisnis (ITB) STIKOM Bali

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30864/jsi.v14i2.309

Abstract

Pelayanan administrasi kepada mahasiswa menjadi satu hal yang penting pada sebuah universitas. Sistem informasi dapat membantu untuk mempermudah dan mempercepat pelayanan. Salah satu jenis pelayanan administrasi yaitu pelayanan manajemen wisuda yang masih dilakukan secara manual mulai dari pengambilan formulir hingga pengumpulan pelaksanaan wisuda. Sistem informasi wisuda merupakan salah satu cara agar pelayanan wisuda dapat dilaksanakan dengan lebih efektif dan efisien. Penelitian ini merancang sebuah sistem informasi manajemen wisuda berbasis website yang dapat membantu calon wisudawan, staf Prodi, dan panitia wisuda dalam manajemen proses wisuda. Metode waterfall digunakan dalam mengembangkan perangkat lunak. Sistem dirancang menggunakan use case diagram dan rich picture diagram untuk menjelaskan interaksi antara pengguna dengan sistem. Hasil dari penelitian ini adalah sebuah sistem informasi manajemen wisuda berbasis website yang menjadikan proses manajemen wisuda lebih efektif, efisien, dan sistematis. Berbagai fitur dalam sistem informasi ini memudahkan calon wisudawan, staf Prodi, dan panitia wisuda dalam melakukan manajemen data dan informasi wisuda. Selain itu, sistem informasi ini membuat pelaporan data menjadi lebih terkontrol karena data diperbarui secara real time.
Metode Prototype pada Sistem Informasi Manajemen Tugas Akhir Mahasiswa Berbasis Website Arizal Arizal; Annisa Nurul Puteri; Furqan Zakiyabarsi; Dimas Febriyan Priambodo
Jurnal Teknologi Informasi dan Komunikasi (TIKomSiN) Vol 10, No 1 (2022): Jurnal TiKomSiN, Vol. 10, No. 1, April 2022
Publisher : STMIK Sinar Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30646/tikomsin.v10i1.606

Abstract

Final Project as a Research is one of the main requirements for the graduation of undergraduate students from universities. Supervisory guidance is one way to find solution for student research problems. The final project guidance process involves multiple parts: campus administration, supervisors, and students. However, this process is often difficult to carry out properly because of the busyness of each individual, both lecturers and students. As a result, the process for carrying out the final project was hindered. Another thing that makes the completion of the thesis slow is the administrative service procedure to complete the final project which is too time consuming. This research aims to simplify and speed up the process of completing the student's final project. The prototype method is used to develop the final project management information system. This information system is designed using use case diagrams, rich picture diagrams, and entity relation diagrams. Tests were carried out using the black box method. The result of the research is a final project management information system which makes the student's final project completion process more efficient and effective. This information system facilitates administrative services and monitoring of the final project because it is performed systematically and can be controlled in real time. 
Implementasi Deteksi Judul Berita Clickbait Berbahasa Indonesia dengan pre-trained model Multilingual BERT Pada Aplikasi Berbasis Chrome Extension Girinoto Girinoto; Dhana Arvina Alwan; Gusti Agung Ngurah Gde K.T. D; Olga Geby Nabila; Arizal arizal; Dimas Febriyan Priambodo
Jurnal Ilmiah SINUS Vol 20, No 2 (2022): Vol. 20 No. 2 Juli 2022
Publisher : STMIK Sinar Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30646/sinus.v20i2.624

Abstract

Clickbait news title is often used by online news portal. The purpose of clickbait is to attract reader to open and read the news. Furthermore, news containing clickbait title can give negative impact by reducing the essence of important news. Therefore, clickbait detection tool is needed to avoid the clickbait news title. Chrome extension was chosen in this study because it supports all Chrome based browsers, such as Google Chrome, Chromium, Microsoft Edge, and Opera so that many users apply this program. In this study, Chrome extension-based application was designed and integrated by using artificial intelligence model. This application also utilized the availability of pre-trained multilingual BERT model as Natural Language Processing (NLP) which will be used to predict a clickbait news title. This study used Multilingual BERT model as NLP because this model has been trained into 104 languages, including Bahasa Indonesia and it has significant performance. The result of this study can detect clickbait news along with 92% of AUC-ROC value.   
Zoea Crab Larva Counter (CLARCO) Based On Image Processing With Adaptive Gaussian Filter Algorithm And Blob Detection Technique Zakiyabarsi, Furqan; Arizal, Arizal; Nurul Puteri, Annisa; Zulfajri S, Achmad; Syafaat, Muhammad
Inspiration: Jurnal Teknologi Informasi dan Komunikasi Vol. 13 No. 1 (2023): Inspiration: Jurnal Teknologi Informasi dan Komunikasi
Publisher : Pusat Penelitian dan Pengabdian Pada Masyarakat Sekolah Tinggi Manajemen Informatika dan Komputer AKBA Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35585/inspir.v13i1.48

Abstract

The size of crab larvae is very small, so there is no accurate and easy-to-use crab larvae counting tool at an affordable price. The low larval survival rate is due to the unknown larval stocking density, which causes cannibalism, a feed-to-larvae ratio that is out of proportion to the number of larvae needed to maintain water quality, a water supply that is out of proportion to stocking density, and is economically unfavorable in terms of cultivation, feed management, maintaining water quality, and the buying and selling process. Accurately estimating the amount of crab larvae is anticipated to boost their survival rate and make them more economically successful. This research is a continuation of previous research with the addition of different methods using adaptive gaussian filter algorithms and blob detection techniques to count crab larvae in the zoea-2, zoea-3, and zoea-4 phases where an increase in accuracy was obtained with an average of 97.67 %.
Investigasi Insiden Kebocoran Data Menggunakan Integrasi Melalui Pendekatan Open Source Intelligence dan Detection Maturity Level Model arizal, arizal; Dendi Risman Saputra; Girinoto
Info Kripto Vol 17 No 3 (2023)
Publisher : Politeknik Siber dan Sandi Negara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56706/ik.v17i3.86

Abstract

Kebocoran data terjadi karena sistem mempunyai kerentanan yang dapat dieksploitasi dimana biasanya berasal dari kurangnya kesadaran keamanan informasi atau kesalahan mendasar dalam konfigurasi sistem. Ketika terjadi kebocoran data, seringkali penyebab dan pelaku kejadian tidak diketahui sehingga diperlukan investigasi untuk mendapatkan informasi mengenai pelaku dan penyerangannya. Investigasi ini dapat dilakukan dengan menggunakan teknik Open Source Intelligence (OSINT). Dimana OSINT sendiri memiliki kelemahan pada aspek tidak ada suatu parameter atau hasil standar yang diperoleh. Sehingga pada penelitian ini mengusulkan suatu pendekatan integrasi aliran OSINT dengan Model Detection Maturity Level melalui simulasi investigasi pada salah satu kasus nyata penjualan beli data pribadi. Hasil dari penelitian ini mampu menghasilkan informasi mengenai pelaku atau pelaku kebocoran data tersebut. Hasil investigasi yang dilakukan dapat digunakan sebagai rekomendasi perbaikan sistem sekaligus informasi bermanfaat sebagai bukti untuk mendukung proses hukum.
Sistem Informasi E-katalog Terintegrasi QRCode Berbasis Website untuk Pemasaran Produk Furniture Puteri, Annisa Nurul; Sulehu, Marwa; Yamansah, Yamansah; Hidayat Saputra, Febri; M. Sabir, Fitriana; Rohayati, Rohayati; Arizal, Arizal; Asrul, Asrul
Jurnal Minfo Polgan Vol. 13 No. 1 (2024): Artikel Penelitian
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/jmp.v13i1.13462

Abstract

Persaingan ketat pada industri furniture membuat pelaku bisnis harus membuat inovasi dalam proses pemasaran produk. Sulitnya pelanggan mengakses informasi produk yang tersedia pada toko furniture berdampak terhadap penjualan produk. Penelitian ini bertujuan untuk membuat sistem informasi e-katalog terintegrasi dengan QR-Code berbasis website agar dapat membantu memasarkan dan memberikan informasi detail produk furniture pada salah satu toko Furniture di Makassar. Metode Rapid Application Development (RAD) digunakan dalam pengembangan sistem informasi e-katalog terintegrasi QR-Code berbasis website. Use case diagram digunakan untuk merancang sistem dan blackbox testing untuk menguji sistem. Hasil dari penelitian ini adalah sistem informasi e-katalog yang mampu memudahkan pemilik toko dalam memasarkan produknya secara online dan membantu pelanggan dalam menemukan informasi detail produk yang tersedia di toko furniture dengan cara mengakses website dan memindai QR-Code yang tersedia di setiap katalog produk.
Feature Selection Correlation-Based pada Prediksi Nasabah Bank Telemarketing untuk Deposito Annisa Nurul Puteri; Arizal Arizal; Andini Dani Achmad
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 20 No. 2 (2021)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v20i2.1183

Abstract

Pre-processing merupakan tahap yang penting dalam melakukan klasifikasi data. Pre-processing berguna untuk mempersiapkan data sehingga teknik klasifikasi yang diterapkan menghasilkan pola yang berkualitas dan akurat. Salah satu teknik data pre-processing yang sering digunakan untuk mengetahui atribut yang paling berpengaruh pada sebuah dataset adalah feature selection. Data yang digunakan dalam penelitian ini adalah customer data collection dari a Portuguese banking institution in UCI Machine Learning Repository. Penelitian ini menggunakan metode feature selection correlation-based yang dikombinasikan dengan metode klasifikasi Multilayer Perceptron Neural Networks. Tujuan penelitian ini untuk mengidentifikasi atribut yang paling relevan dan berpengaruh dari dataset dalam memprediksi nasabah yang potensial untuk penawaran deposito berjangka. Penelitian ini menghasilkan 10 atribut yang memiliki ranking teratas. Atribut-atribut tersebut adalah duration, previous, contact, cons.price.idx, month, cons.cof.idx, age, job, marital, dan housing. Hasil klasifikasi dari atribut yang terpilih memiliki tingkat akurasi tertinggi sebesar 80.5% dan tingkat akurasi terendah 79.1%.
Implementation Cryptography and Access Control on IoT-Based Warehouse Inventory Management System Muhammad Yusuf; Arizal Arizal; Ira Rosianal Hikmah
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 22 No. 1 (2022)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v22i1.1849

Abstract

Warehousing is a product storage management activity to ensure product availability, so inventory management is needed to oversee the movement of logistics and equipment. Some things need to be considered in the storage process, such as the suitability of the storage location, safe from theft, and safe from physical disturbances. Vulnerabilities can occur when unauthorized users find out information from the database regarding stored goods, so a security mechanism for the warehouse database is needed. In addition, proper identification needs to be made of someone trying to access the database. In this research, a Warehouse Inventory Management System (WIMS) was created by implementing the AES-128 cryptographic algorithm, which was built using ESP32 and Raspberry Pi 3 devices. Time Password (T-OTP). The results show that the built system can overcome inventory problems in conventional warehousing management systems and implement data security using the AES-128 algorithm. The application of two-factor authentication in the form of smartcards and T-OTP shows very good results in testing its accuracy to overcome the vulnerability of unauthorized access to the system database
Security Analysis of Indonesian Region Government Web Applications Based on NIST SP 800-115 and WSTG v4.2 Arizal; Muhammad Hilal; Dimas Febriyan Priambodo
Journal of Information System and Informatics Vol 8 No 2 (2026): April
Publisher : Asosiasi Doktor Sistem Informasi Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63158/journalisi.v8i2.1558

Abstract

The rapid adoption of e-government systems has increased the exposure of government web applications to cybersecurity threats with the lack of security-focused implementation. Previous studies on web application security assessment commonly using automated vulnerability scanners or validated with another tools, which may produce false positives and fail to provide comprehensive insights. This research addresses this limitation by conducting a structured and multi-target security assessment of regional government web applications. The assessment integrates a systematic penetration testing process with comprehensive web application security testing guidelines. Automated scanning using OWASP ZAP and Arachni was combined with manual validation to ensure the accuracy of findings. The results identified nine validated vulnerabilities in the government portal and public service applications, and ten vulnerabilities in the legal documentation system. A significant portion of initial findings were confirmed as false positives after manual verification, highlighting the limitations of automated tools. The most common vulnerabilities were related to security misconfigurations, including missing security headers, outdated JavaScript libraries, and insecure cookie settings that highlight on weak in configuration hygiene and dependency management in this regional goverment. This study also demonstrates that combining structured penetration testing with detailed validation provides a more accurate and reliable assessment of government web application security.