Claim Missing Document
Check
Articles

Found 24 Documents
Search

Desain Canva Sebagai Media Promosi Usaha Mikro dan Media Informasi di Desa Bantarsari Gustian Rama Putra; Arie Qurania; Yusma Yanti; Puspa Citra; Syarif Hidayatullah; Hermawan Hermawan; Victor Ilyas Sugara; Asep Saepulrohman; Agung Prajuhana Putra; Kotim Subandi; Adriana Sari Aryani; I Wayan Sriyasa
Journal of Engineering and Information Technology for Community Service Vol 1, No 3 (2023): Volume 1, Issue 3, January 2023
Publisher : Universitas Teknokrat Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33365/jeit-cs.v1i3.210

Abstract

Digital information media in this era has very good potential, especially in developing micro-businesses to introduce their products, besides that information media is also needed to provide education and information to socialize, this is very necessary for the government in the district to develop village results and information that can be conveyed clearly to the community. Community service carried out by the Computer Science Study Program of Pakuan University aims to provide training to village office staff and junior and senior high school students in Bantarsari Village to be able to apply Canva as a medium for promoting micro-business and related information media, socialization, disaster prevention, appeals and other notifications in Bantarsari Village
PENINGKATAN KUALITAS DAN KEAMANAN PANGAN MELALUI BANTUAN HOT SHOWCASE UNTUK PEMAJANGAN PRODUK MAKANAN SIAP SAJI PADA USAHA KECIL PANGAN DI BOGOR Dinar Munggaran Achmad; Adriana Sari Aryani; Khotim Subandi; Hermawan Hermawan
J-ABDI: Jurnal Pengabdian kepada Masyarakat Vol. 2 No. 9: February 2023
Publisher : Bajang Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53625/jabdi.v2i9.4870

Abstract

Lasagna adalah salah satu produk tepung terigu yang merupakan makanan khas Italia, kini banyak ditawarkan usaha kecil makanan di Indonesia. Lasagna menjadi lebih nikmat saat disantap dalam keadaan hangat, sehingga diperlukan waktu yang singkat antara pemasakan dan penyajiannya. Pada sebagian usaha kecil. Lasagna baru dipanggang setelah dipesan konsumen, sehingga membutukan 10-15 menit . Di sisi lain, makanan siap saji yang dibiarkan pada temperature kamar, sebaiknya hanya baik dikonsumsi dalam rentang waktu 4 jam setelah di masak. Selain proses pembuatannya yang harus memperhatikan hygiene pangan dan cara produksi pangan olahan yang baik, fasilitas produksi yang dipergunakan juga harus dapat memberikan pencegahan terhadap kontaminasi pangan. Program pengabdian pada masyarakat yang dilakukan adalah dengan memberikan bantuan Hot Showcase untuk penyimpanan dan pemajangan produk Lasagna usaha kecil pangan di Bogor. Penggunaan Hot Showcase untuk penyimpanan dan display produk lasagna setelah di masak, ternyata mampu mempertahankan mutu dan keamanan pangan . Temperatur Hot Showcase yang dapat diatur dalam rentang 30-110oC, dapat disetting menjadi 64oC, sebagai batas aman untuk mencegah pertumbuhan mikroorganisme. Selian itu, tampilan produk langsung tampak menggiurkan konsumen dan siap untuk segera disantap. Kondisi tersebut mengurangi waktu tunggu bagi konsumen.
Peningkatan Keamanan pada Simple Network Time Protocol (SNTP) untuk Mendeteksi Cybercrime di dalam Aktivitas Jaringan Kotim Subandi; Victor Ilyas Sugara; Adriana Sari Aryani
Jurnal Asiimetrik: Jurnal Ilmiah Rekayasa dan Inovasi Volume 5 Nomor 1 Tahun 2023
Publisher : Fakultas Teknik Universitas Pancasila

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35814/asiimetrik.v5i1.4113

Abstract

Today's cybercrime methods are extremely diverse. The methods employed by attackers are becoming more diverse and intricate. Malicious software, commonly referred to as malware, is utilized in these various attacks. Malware threats and their propagation can be accomplished in several different ways. Good governance facilitates prevention via migration, assisting the security team and network infrastructure IT. This paper discusses efforts to enhance the security of the Simple Network Time Protocol (SNTP) to detect cybercrime on the network. Based on the results of the conducted experiments, we determined that by updating the Simple Network Time Protocol, implementing the client-server antivirus, and scanning every client connected to the local network or centrally, we could detect the types of attacks that frequently occur on the network system, thereby protecting all client computers from malware, viruses, worms, and Trojan horses. Based on the antivirus migration data, the employed research method can find information on cybercrimes that involve malware that enters the network and is successfully cleaned or quarantined before being automatically blocked.
MANAGEMENT SUMMARY EXECUTIVE PENJUALAN BERBASIS APLIKASI DIGITAL DIMASA PANDEMI Kotim Subandi; Dinar Munggaran Akhmad; Adriana Sari Aryani
Abdi Implementasi Pancasila:Jurnal Pengabdian kepada Masyarakat Vol 2 No 1 (2022): Mei
Publisher : Universitas Pancasila

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (173.633 KB) | DOI: 10.35814/abdi.v2i1.2934

Abstract

The development of social media and marketplaces as part of information technology has a very big contribution in developing business. Current developments have also changed the pattern and map of competitive forces in running a business to become more competitive. Therefore, reliability in the use of social media and marketplaces is an important and strategic thing that is needed by business people. But this is in stark contrast to business people who are still in the pioneering stage or just starting their business, such as Lagsana Ummy Hunny. Capitalized on knowledge and insight that is still new to social media and marketplaces, it is quite influential in developing managed businesses. Therefore, this community service activity aims to increase the insight and knowledge of the Lagsana MSME owner, Ummy Hunny, located in the Bojong Gede area, Bogor Regency, in the use of social media and marketplaces for the benefit of developing business. The method that will be used to support the implementation of community service activities such as providing training and assistance to increase knowledge and insight. Knowledge and insight applied to this activity is how to utilize an information technology. Information technology is used to develop the marketing reach of the general public through social media. This activity has been going well and has contributed to increasing sales through the Dogital Application. The use of Digital Applications is very helpful in increasing sales because of the information from the menu variants sold through social media.
DESIGN DATABASE FOR APPLICATION INTRODUCTION OF BOGOR BATIK MOTIF WEB-BASED Adriana Sari Aryani; Irma Anggraeni
Journal of Science Innovare Vol 2, No 2 (2019): Journal of Science Innovare, Volume 02 Number 02 2019
Publisher : Universitas Pakuan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33751/jsi.v2i2.1528

Abstract

Bogor batik motifs are inspired by the legacy of the kingdom of Pakuan, historical objects, phenomena, and culture. One of the famous motifs is the Kujang Kijang motif. In addition to deer motifs, Batik Bogor also has other unique motifs such as the pilsau cleaver motif and drizzling rain. Bogor Batik motifs applied in batik scratches are mostly symbols of the City of Bogor itself. The deer head motif is a mirror of the Bogor Palace, the lotus motif becomes a symbol of the Bogor Botanical Gardens, the cleaver blade as a symbol of the city of Bogor and the drizzle motif as the designation of the city of Bogor. Database Design is the process of determining the content and data settings needed to support various system designs. The purpose of Database Design is: to fulfill information that contains specific user needs and their applications. facilitate understanding of information structures, support processing needs and multiple object appearance (response time, processing time, and storage space). In the web-based Bogor batik motif introduction application using the DBS SQL Server. The advantages of Microsoft SQL Server one of which can work very well on all windows operating systems.
Alert Control Model for Exposure of COVID-19 in Industrial Closed Work Space Hermawan Hermawan; Kotim Subandi; Adriana Sari Aryani; Syarif Hidayatullah; Dinar Munggaran Akhmad; Victor Ilyas Sugara
Journal of Applied Sciences and Advanced Technology Vol 5, No 3 (2023): Journal of Applied Sciences and Advanced Technology
Publisher : Faculty of Engineering Universitas Muhammadiyah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24853/jasat.5.3.105-112

Abstract

The Covid-19 pandemic has changed the industrial management system, including the regulation of labor. Most of the work in the industry cannot be done through work from home, but must still be in production units. In a number of cases, clusters of COVD 19 were found in the industry, forcing the industry to have to lock down. The problem of the lack of a model for controlling the spread of COVID 19 in the manufacturing industry is the basis for this research. The model designed in this study is also expected to be relevant in the new normal era for the manufacturing industry. The modeling and application of COVID-19 control research in the manufacturing industry is carried out through four stages, namely identification and characterization of work patterns, model design and validation, model implementation and verification, and model comparison testing. At the stage of identification and characterization of work patterns using the methods as guided by the International Labor Organization. The design phase and model validation used the Epidemic Mathematics approach and the Shewhart Control Chart. The application of the model in the industry is in accordance with the guidelines for working in a factory during the COVID-19 Pandemic according to the World Health Organization. The comparative test of the model will be processed using the diversity test. The data used is collected from the company in the form of simple tracing monitoring data for workers before entering the work area and shortly before leaving the work area, COVID 19 test data if any, employee health data, and other data if relevant to support this research. The data obtained is used for model design, both the employee health control model and the COVID-19 distribution model in the work area. The model is made with a scope that is limited only to the industrial work environment, not including outside facilities. Contamination to employees may occur when employees return home or are outside the factory. The model also does not adopt the presence of employees who are being treated for COVID-19 healing in a healing facility. In the Shewhart Control Chart model, it is hoped that a control limit can be obtained that can be used to monitor fluctuations in employee health, the diagram will be designed for daily monitoring of workers. Out-of-control data becomes a warning to carry out a reliability test (Capability) and to trace sources of contamination obtained by employees.
PROTECTION SECOND LAYER MENGGUNAKAN MULTI FACTOR AUTHENTICATOR UNTUK MEMVERFIKASI KEABSAHAN ACCOUNT EMAIL DI DALAM ACTIVE DIRECTORY Subandi, Kotim; Ahmad, Dinar Munggaran; Sugara, Victor Ilyas; Aryani, Adriana Sari; Hermawan, Hermawan
Jurnal Teknoinfo Vol 18, No 2 (2024): Juli 2024
Publisher : Universitas Teknokrat Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33365/jti.v18i2.4035

Abstract

The problem that often occurs is that many users use unsafe devices to carry out the login process, for example using laptops, mobile phones and other devices in public spaces such as terminals, airport stations, public libraries, cafes and even internet cafes. One of the important steps in the security and authentication process. This verification ensures that the account owner has access to the email address used to register or log in to a service. Multi-Factor Authentication (MFA) is a security method that requires users to provide more than one form of authentication to access a system or application. Research focuses on evaluating the security of MFA, using appropriate metrics (such as authentication success rate, successful attack rate, or discovered vulnerabilities) to assess the effectiveness of MFA. Implementing MFA on email accounts is not only a wise security measure, but also a recommended practice to protect personal information and reduce online security risks
Awareness Cybercrime Phishing Email Menggunakan Secure Socket Layer Sebagai Interpretasi Information Security Kotim Subandi; Dinar Munggaran Ahmad; Victor Ilyas Sugara; Adriana Sari Aryani; Hermawan
Prosiding Seminar Nasional Teknoka Vol 9 (2024): Proceeding of TEKNOKA National Seminar - 9
Publisher : Fakultas Teknik, Universitas Muhammadiyah Prof. Dr. Hamka, Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22236/teknoka.v9i1.17560

Abstract

Email phishing is a fraudulent technique used by cybercriminals to obtain sensitive information through emails that appear legitimate but have malicious purposes. Information security has become a crucial aspect in the increasingly developing digital world, especially along with the increasing threat of cybercrime, such as email phishing. In this context, implementing Secure Socket Layer (SSL) is one solution to increase awareness and mitigate risks against phishing attacks. SSL, which is a security protocol for data encryption, can help protect digital communications by authenticating servers and encrypting data sent, thereby reducing the potential for misuse of personal data sent via email. This research aims to examine the role of SSL in providing protection against email phishing and increasing user awareness regarding the importance of information security in the use of digital technology. Through an information security interpretation approach, this study suggests that SSL can serve as an effective barrier in reducing the risk of phishing attacks and increasing the level of user trust in the emails received. Therefore, it is important for individuals or organizations to understand and apply information security principles such as the use of SSL to maintain the integrity and confidentiality of data exchanged online.
Implementation of VGG6 for Image Processing of Aromatic Plants Using Python Adriana Sari Aryani; Irfan Wahyudin; Kotim Subandi
International Journal of Industrial Innovation and Mechanical Engineering Vol. 1 No. 3 (2024): August: International Journal of Industrial Innovation and Mechanical Engineeri
Publisher : Asosiasi Riset Ilmu Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/ijiime.v1i3.38

Abstract

Big Data Analytics has gained significant popularity in recent years, with many companies integrating it into their information technology roadmaps to enhance business performance. However, surveys indicate that Big Data Analytics demands substantial resources, including technology, costs, and talent, which often leads to failures in the initial stages of implementation. This study proposes a VGG6 architecture approach, intended to provide a framework for the initial implementation of Big Data Analytics. The study's outcomes include the implementation of the VGG6 architecture for processing images of aromatic plants using Python. Furthermore, this approach enabled the development of a Minimum Viable Product (MVP) solution that adheres to general Big Data principles, such as the 3Vs (Volume, Velocity, and Variety), and encompasses key technological components: 1) Data Storage and Analysis, 2) Knowledge Discovery and Computational Complexity, 3) Scalability and Data Visualization, and 4) Information Security.
Desain Kapasitas Produksi Pabrik Es Optimal untuk Mendukung Aktivitas Nelayan di Selatan Sukabumi Hermawan Hermawan; Adriana Sari Aryani; Kotim Subandi
JURNAL RISET RUMPUN ILMU TEKNIK Vol. 4 No. 1 (2025): April : Jurnal Riset Rumpun Ilmu Teknik
Publisher : Pusat riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jurritek.v4i1.4506

Abstract

The sustainable management of marine ecosystems and fishery resources is a primary goal of the SDGs (Goal 14). Supporting this objective requires the availability of a cold chain network, including ice factories, to preserve the quality and freshness of fish catches. In the southern coastal area of Sukabumi, particularly Ciwaru Village within the Ciletuh National Geopark, the availability of ice factories remains insufficient. Small fishing vessels (<5 GT) in this area require approximately 6 tons of ice per month. This study aims to design the production capacity of a portable mini ice factory to meet the local ice demand. By considering seasonal patterns, fishing volumes, and fluctuating ice needs, the factory is designed to produce around 788–798 tons of ice per year, with an ice storage capacity of 2 tons. The design utilizes 12 kg ice blocks, adjusted to the vessel sizes commonly used by local fishermen employing one-day fishing methods. The planning results indicate that the establishment of this mini ice factory can address the ice supply shortage in Ciwaru, support the maintenance of fish quality, and enhance the economic value of fishermen’s catches.