Claim Missing Document
Check
Articles

Pelatihan Pembuatan Mie Sehat Sebagai Pangan Alternatif untuk Mencegah Stunting di Desa Sambik Bangkol Syamsurrijal, Syamsurrijal; Ardian, Junendri; Naufali, M. Nizhar; Latif, Kurniadin Abdul; Saloko, Satrijo; Putra, Guyup Mahardhian Dwi; Hadi, Agus Purbathin
Alamtana: Jurnal Pengabdian Masyarakat UNW Mataram Vol 5 No 3 (2024): Edisi Desember 2024
Publisher : LPPM UNIVERSITAS NAHDLATUL WATHAN MATARAM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51673/jaltn.v5i3.2301

Abstract

Pengetahuan merupakan suatu ilmu dari manusia yang telah melakukan pengidahan terhadap suatu objek tertentu. Metode pelaksanaan dilakukan dengan dua tahap yaitu persiapan dan pelaksanaan. Pada tahap persiapan kegiatan dilakukan dengan 1) Menyampaikan pada pihak kepala desa, terkait kegiatan yang akan dilaksanakan. Pada kegiatan ini bertujuan untuk memperkenalkan kegiatan yang akan dilakukan di Desa Sambik Bangkol. 2) merancang jadwal kegiatan sosialisasi dan pelatihan. Metode Pengumpulan data dilakukan dengan observasi pengetahuan Kelompok Wanita Tani Melati Putih Dari hasil observasi yang dilakukan saat pelatihan , menunjukkan bahwa distribusi frekuensi responden berdasarkan pengetahuan Kelompok Wanita Tani Melati Putih diperoleh data, mayoritas pengetahuan Kelompok Wanita Tani Melati Putih di Desa Sambik Bangkol yaitu berada pada kategori pengetahuan cukup sebanyak 38 responden (35,5%).
Face Recognition for Personal Data Collection using Eigenface, Support Vector Machine, and Viola Jones Method Mardedi, Lalu Zazuli Azhar; Zulfikri, Muhammad; Syahrir, Moch.; Latif, Kurniadin Abd.; Apriani, Apriani
Sistemasi: Jurnal Sistem Informasi Vol 14, No 1 (2025): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v14i1.4728

Abstract

Personal data recording through facial recognition is a modern solution for individual identification; however, the main challenge lies in the accuracy and reliability of the system under various conditions. This study examines the implementation of machine learning as a solution, utilizing video and photo data for face detection and recognition. The study’s goal is to evaluate the effectiveness of facial image recognition by combining several methods, aiming for practical application across diverse settings, such as offices and schools. The methodology includes segmentation testing for edge detection, feature extraction, and real-time recognition. The system was developed using Eigenface, Support Vector Machine, and Viola-Jones methods, trained over 20 sessions. The results indicate that the system can recognize faces under both daytime and nighttime conditions, achieving 87% accuracy during the day and 81% at night. These findings make a significant contribution to the development of security systems based on facial recognition and emphasize the potential of this technology to enhance personal data security across various contexts
Penerapan Sistem Informasi UMKM (SI-UM) berbasis web untuk meningkatkan pemasaran dan pengelolaan keuangan sahabat UMKM NTB Latif, Kurniadin Abd; Auliana, Rini Adriani; Hammad, Rifqi
SELAPARANG: Jurnal Pengabdian Masyarakat Berkemajuan Vol 8, No 4 (2024): December
Publisher : Universitas Muhammadiyah Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31764/jpmb.v8i4.26783

Abstract

Abstrak Sahabat UMKM NTB merupakan salah satu komunitas UMKM yang ada di provinsi Nusa Tenggara Barat. Sahabat UMKM NTB sebagai mitra dalam kegiatan pengabdian ini memiliki anggota lebih dari 50 yang terlibat pada kegiatan tersebut. Permasalahan yang diahadapi oleh mitra adalah permasalahan dalam bidang pemasaran dan pengelolaan keuangan. Solusi yang ditawarkan oleh tim pengabdi adalah penerapan sistem informasi UMKM yang dapat membantu dalam pemasaran dan pengelolaan keuangan. Sehingga tujuan dari kegiatan pengabdian ini adalah membantu mitra dalam menerapkan sistem informasi UMKM yang dapat membantu mitra dalam pemasaran produk UMKM dan juga pengelolaan keuangannya. Metode yang dilakukan dalam kegiatan ini terdiri dari 6 tahapan yaitu sosialisasi, pengembangan sistem infromasi, pelatihan pendapingan, evaluasi dan keberlanjutan program. Hasil dari kegiatan ini adalah berupa penerapan sistem informasi UMKM yang dapat digunakan oleh mitra dalam memabntu mengatasi permasalahan di bidang pemasaran dan pengelolaan keuangan. Kata kunci: sahabat UMKM; pengabdian; sistem informasi umkm; pemasaran; pengelolaan keuangan Abstract Sahabat UMKM NTB is one of the MSME communities in West Nusa Tenggara province. Sahabat UMKM NTB as a partner in this service activity has more than 50 members involved in the activity. The problems faced by partners are problems in marketing and financial management. The solution offered by the service team is the implementation of an MSME information system that can assist in marketing and financial management. So that the purpose of this service activity is to assist partners in implementing MSME information systems that can help partners in marketing MSME products and also managing their finances. The method carried out in this activity consists of six stages, namely socialization, information system development, mentoring training, evaluation and program sustainability. The result of this activity is the implementation of an MSME information system that can be used by partners in overcoming problems in marketing and financial management. Keywords: sahabat UMKM; devotion; MSME information system; marketing; financial management
Optimization of data integration using schema matching of linguistic-based and constraint-based in the university database Rifqi Hammad; Azriel Christian Nurcahyo; Ahmad Zuli Amrullah; Pahrul Irfan; Kurniadin Abd. Latif
Matrix : Jurnal Manajemen Teknologi dan Informatika Vol. 11 No. 3 (2021): Matrix: Jurnal Manajemen Teknologi dan Informatika
Publisher : Unit Publikasi Ilmiah, P3M, Politeknik Negeri Bali

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31940/matrix.v11i3.119-129

Abstract

University requires the integration of data from one system with other systems as needed. This is because there are still many processes to input the same data but with different information systems. The application of data integration generally has several obstacles, one of which is due to the diversity of databases used by each information system. Schema matching is one method that can be used to overcome data integration problems caused by database diversity. The schema matching method used in this research is linguistic and constraint. The results of the matching scheme are used as material for optimizing data integration at the database level. The optimization process shows a change in the number of tables and attributes in the database that is a decrease in the number of tables by 13 tables and 492 attributes. The changes were caused by some tables and attributes were omitted and normalized. This research shows that after optimization, data integration becomes better because the data was connected and used by other systems has increased by 46.67% from the previous amount. This causes the same data entry on different systems can be reduced and also data inconsistencies caused by duplication of data on different systems can be minimized.
Analisis Dan Implementasi Algoritma Bcrypt Dengan Affine Cipher Untuk Pengamanan Password Pada Aplikasi Web: Analysis And Implementation Of Bcrypt Algorithm With Affine Cipher For Password Security In Web Applications Nugroho Dwi Aji; Tomi Tri Sujaka; Husain; Ondi Asroni; Kurniadin Abd. Latif
Cyber Security dan Forensik Digital Vol. 8 No. 1 (2025): Edisi Mei 2025
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2025.8.1.5076

Abstract

Teknologi informasi saat ini semakin berkembang dengan berkembangnya teknologi tersebut membuat segala kalangan dapat mengakses aplikasi web, hal tersebut menjadikan keamanan pada aplikasi web harus di perhatikan. Salah satu teknik yang dapat digunakan sebagai pengamanan pada aplikasi web yaitu menerapkan algoritma kriptografi pada password. Penelitian ini bertujuan untuk menganalisis dan mengimplementasi algoritma kriptografi bcrypt dengan affine cipher yang akan di modifikasi dengan menggunakan algoritma ROT13 untuk pengamanan password pada aplikasi web. Penelitian dilakukan dengan menggunakan metode pengembangan sistem yaitu Secure Sistem Development Life Cycle (SSDLC) yang meliputi Reqirements analysis, Desain, Development, dan Testing menggunakan bruteforce dan sniffing. Hasil penelitian ini menunjukkan bahwa analisis dan implementasi algoritma bcrypt dengan affine cipher untuk pengamanan password pada aplikasi web sesuai rancangan. Uji coba menunjukkan bahwa dengan menerapkan algoritma bcrypt dan affine cipher yang telah dimodifikasi menggunakan algoritma ROT13 akan memperlambat dari serangan bruteforce. Sedangkan implementasi pada pengiriman kredensial dari frontend menuju backend menunjukkan kredensial tidak dapat dilakukan serangan sniffing menggunakan wireshark. Kesimpulan dari penelitian ini bahwa menerapkan algoritma kriptografi bcrypt dan affine cipher yang telah dimodifikasi menggunakan algoritma ROT13 akan menambahkan lapisan keamanan pada sistem yang dapat menghambat serangan bruteforce dan menghentikan serangan sniffing. Penelitian ini juga menyarankan penggunaan kriptografi bcrypt dan affine cipher yang telah dimodifikasi menggunakan algoritma ROT13 sebagai lapisan pengamanan pada sistem. Kata kunci: Affine cipher, Bcrypt,  Kriptografi, Password, Pengamanan, ROT13. ------------------ Information technology is currently growing with the development of this technology making all circles able to access web applications, this makes security in web applications must be considered. One technique that can be used as security in web applications is applying cryptographic algorithms to passwords. This research aims to analyze and implement the bcrypt cryptographic algorithm with affine cipher which will be modified using the ROT13 algorithm for password security in web applications. The research was conducted using the system development method, namely Secure System Development Life Cycle (SSDLC) which includes Reqirements analysis, Design, Development, and Testing using brute-force and sniffing. The results of this research show that the analysis and implementation of the bcrypt algorithm with affine cipher for password security in web applications are as designed. The test shows that by applying bcrypt and affine cipher algorithms that have been modified using the ROT13 algorithm will slow down brute-force attacks. While the implementation on sending credentials from the front-end to the back-end shows that credentials cannot be sniffed using wireshark. The conclusion of this research is that applying bcrypt and affine cipher cryptographic algorithms that have been modified using the ROT13 algorithm will add a layer of security to the system that can inhibit brute-force attacks and stop sniffing attacks. This research also suggests the use of bcrypt and affine cipher cryptography that has been modified using the ROT13 algorithm as a security layer on the system. Keywords: Affine cipher, Bcrypt, Cryptography, Password, Security, ROT13.
SISTEM INFORMASI INVENTARIS BERBASIS WEB BIDANG PRODUKSI CV. TRI UTAMI JAYA : indonesia Muhammad Tahir; I Wayan Mustika Nayottama Adi Wijaya; Muhammad Wisnu Alfiansyah; Kurniadin Abd. Latif; I Nyoman Switrayana
Jurnal Manajemen Informatika dan Sistem Informasi Vol. 8 No. 2 (2025): MISI Juni 2025
Publisher : LPPM STMIK Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36595/misi.v8i2.1625

Abstract

Sistem informasi inventaris berbasis web ini dibuat untuk mempermudah dan mempercepat proses manajemen inventaris produksi pada CV. Tri Utami Jaya, sebuah perusahaan pengolah produk berbahan dasar kelor. Sistem manual sebelumnya menimbulkan berbagai kendala, seperti human error dan keterlambatan pencatatan. Solusi ini mengintegrasikan teknologi QR Code dan basis data MySQL untuk pencatatan barang masuk dan keluar secara real-time. Fitur utama meliputi pemindaian QR Code, manajemen data barang dan supplier, serta pelaporan inventaris. Hasil Implementasi sistem menunjukkan efisiensi operasional yang lebih tinggi, kesalahan yang lebih rendah, dan pelacakan stok yang lebih akurat, menjadikannya solusi efektif untuk pengelolaan inventaris yang modern dan terstruktur.
Prototype Sistem Pengunci Pintu Melalui Internet Menggunakan Arduino Uno Berbasis Android Latif, Kurniadin Abdul; Wahyudi, Wahyudi; Nurcahyo, Azriel Christian
Jurnal Bumigora Information Technology (BITe) Vol. 3 No. 1 (2021)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v3i1.1327

Abstract

Internet of Think (IoT) is emerging as a big issue on the internet, it is expected that billions of objects will be equipped with various types of sensors connected to the internet through networks as well as technology support such as embedded sensors and actualization. This study aims to design and analyze the application of a prototype door locking system via the internet using Arduino Uno based on Android. This research uses the SDLC method in designing and developing a prototype door lock system over the internet using Arduino Uno based on Android. There are 3 stages of the SDLC method used in this research, namely Requirements Analysis, System Design, and System Implementation. The input from this system is in the form of on and off commands from smartphones that are sent to thingspeak as a server service and will be continued to Arduino devices that have been connected to a solenoid doorlock. If the door is opened, the magnetic sensor switch will send the information back to Thingspeak and continue to the smartphone as feedback. The results of the tests that have been carried out are that the average time required for lock = 4.36 seconds and unlock = 5.30 seconds, while the average sensor test time required to send sensor data with conditions Open = 12.33 seconds and Closed = 12.43 seconds. The delay time depends on the condition of the network connected to the system.
Feasibility and Performance Evaluation of Microprocessor and Fuzzy Logic-Based Overcurrent Relay in Electrical Protection Systems Parada D.P, Bima Romadhon; Megawati, Citra Dewi; Nurcahyo, Eko; Hidayat, Taufik; Setiawan, Rachmadi; Latif, Kurniadin Abd
Jurnal Bumigora Information Technology (BITe) Vol. 6 No. 1 (2024)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v6i1.4101

Abstract

This research focuses on the development and testing of a microprocessor-based Overcurrent Relay (OCR) with the implementation of fuzzy logic control for adaptive setting of TMS values. OCR is a crucial component in the electricity protection system which aims to detect and respond to disturbances due to excessive current, preventing damage to electrical equipment. The aim of this research is to test the feasibility and performance of microprocessor-based OCR with fuzzy logic control in setting TMS values, and compare it with the international standard IEC 60255. The method used in this research is the implementation of the Sugeno type fuzzy logic algorithm on the Atmega 328P microcontroller. This algorithm is used to control the TMS value based on the rotating frequency of the detected overcurrent. The results of this research are a characterization of the OCR response to variations in streaming current and different PS settings. The lowest TOp deviation was observed at higher PS settings, with the best performance in the IDMT OCR type. The use of fuzzy logic control is able to increase the OCR response to overcurrent disturbances, although under normal conditions it sometimes results in a longer TOp. The conclusion of this research is that microprocessor-based OCR with fuzzy logic control can provide protection performance that is adaptive and responsive to dynamic operational environmental conditions. This implementation has the potential to increase the efficiency and leakage of the electricity protection system
Smart Farming System on Red Onion Plants Based on the Internet of Things Hadi, Sirojul; Cahyati, Anzali Ika; Latif, Kurniadin Abd; Sujaka, Tomi Tri; Zulfikri, Muhammad
Sistemasi: Jurnal Sistem Informasi Vol 12, No 3 (2023): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v12i3.2860

Abstract

Red Onions are agricultural commodities that are a source of income for farmers and can make a major contribution to Indonesia's economic development. The characteristic of the onion plant is that it requires a lot of sunlight. The sunlight needed for photosynthesis is 70% with an ambient temperature range of 25oC-32oC and soil moisture in the range of 50%-70%. Although red onions require a lot of water, these plants are sensitive to high-intensity rainfall. The critical period of the red onion plants is in the tuber formation phase so it is necessary to control it to get maximum production results. The method of making the smart farming system uses the Research and Development (R&D) method while sending data online to the web uses the Internet of Things (IoT) method. The result of this research is that a monitoring and control system for temperature and humidity has been successfully built on red onion plants. The system built is capable of measuring temperature with an accuracy rate of 95.33% and environmental humidity in plants reaching 92.07% while the accuracy of testing the entire system reaches 93.33%. The smart farming system has been able to automatically irrigate and apply fertilizer. Control of irrigation and application of fertilizers by the system has implications for better shallot growth and creates modern agriculture.
Using a Partition System to Improve the Performance of the Apriori Algorithm in Speeding Up Itemset Frequency Search Process Syahrir, Moch; Hammad, Rifqi; Abd. Latif, Kurniadin; Rosanensi, Melati
Sistemasi: Jurnal Sistem Informasi Vol 13, No 1 (2024): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v13i1.3610

Abstract

The apriori algorithm uses minimum support and minimum confidence to determine appropriate itemset rules for decision making. The problem faced in this research is how to improve the performance of the a priori algorithm in the process of searching for itemset frequencies using data partition techniques, and be able to produce optimal and consistent rules. To overcome this problem, the author implemented the a priori method and partition system to improve the performance of the a priori algorithm for the itemset frequency search process by taking public data in the form of supermarket transaction data. In this research, the performance of the a priori algorithm was tested with and without a partition system. The data used in this research consists of 350 transaction data from 1784 records with a 4-itemset pattern, minimum support value of 20% and minimum confidence of 0.5 with the best standard rules for determining minimum confidence of 0.8. Based on this research carried out, the research results obtained are that for comparison of time and memory usage the apriori algorithm with a partition system is much faster than the apriori algorithm without a partition system, while memory usage is relatively less for the apriori algorithm with the system than the apriori algorithm without a partition system.
Co-Authors Abdurahman Abdurrahman Ahmad Ahmad Ahmad Ahmad Ahmad Ahmad Zuli Amrullah Ahmad Zuli Amrullah Andi Sofyan Anas Anthony Anggrawan Apriani Apriani Arfa, Muhammad ashari, Lalu Arif Trasna Astuti, Emi Azhar, Raisul Baehaqi Baehaqi Bima Romadhon Parada Dian Palevi Cahyablindar, Ayu Cahyati, Anzali Ika EKO NURCAHYO Fadila, Baiq Fatimatuzahra, Fatimatuzahra Fatimatuzzahra Fatimatuzzahra Galih Tri Aditya Gilang Primajati Guyup Mahardhian Dwi Putra Habib Ratu Perwira Negara Hadi, Agus Purbathin Hairani Hairani Hakim, Muh.Farid Hammad, Rifqi Hany Pebrianti Hariyadi , I Putu Hasbullah Hasbullah Herman, Lalu Edy Husain Husain Husain I Nyoman Switrayana I Putu Hariyadi I Wayan Mustika Nayottama Adi Wijaya Innudin, Muhammad Kartarina, Kartarina Khairan marzuki Kurniawan Kurniawan Lestari, I Desak Ayu Adhia Lilik Widyawati M Najmul Fadli M. Hidayatullah M. Rasyid Ridho Mardedi, Lalu Zazuli Azhar Megawati, Citra Dewi Melati Rosanensi Miftahul Madani Muhamad Azwar, Muhamad Muhamad Wisnu Alfiansyah Muhammad Eka Putra Ramandha Muhammad Innuddin Muhammad Mujahid Dakwah Muhammad Tahir Muhammad Tahir Muhammad Zulfikri Muhammad Zulfikri Naufali, M. Nizhar Nugroho Dwi Aji Nurcahyo, Azriel Christian Ondi Asroni Pahrul Irfan Pahrul Irfan Puspita Dewi, Puspita Putra, I Gede Bagus Resa Pratama Putrawan, Yogi Eka Rachmadi Setiawan Rifqi Hammad Rifqy Hammad Rini Adriani Auliana Rini Anggriani Riyana Rizki Yuliatin Rizqullah, M. rodhi, mohammad najib Satrijo Saloko Sirojul Hadi Sujaka, Tomi Tri Sujaka, Tomy Tri Sukma, I Gusti Ayu Yunita Suriyati Suriyati Suryadin, Adi Syahrir, Moch. Syamsurrijal, Syamsurrijal Syarifah Taufik Hidayat Tomi Tri Sujaka Tomi Tri Sujaka Wahyu Kamil Syarifaturrahman, Wahyu Kamil Wahyudi Wahyudi Wardhana, M.Alifya Widyawati , Lilik Wiguna, I Putu Krisna Dharma Wijaya, Frederico Indra Zamroni Alpian Muhtarom Zefanya Andryan Girsang Zulfikri, Muhammad