Claim Missing Document
Check
Articles

Face Recognition for Personal Data Collection using Eigenface, Support Vector Machine, and Viola Jones Method Mardedi, Lalu Zazuli Azhar; Zulfikri, Muhammad; Syahrir, Moch.; Latif, Kurniadin Abd.; Apriani, Apriani
Sistemasi: Jurnal Sistem Informasi Vol 14, No 1 (2025): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v14i1.4728

Abstract

Personal data recording through facial recognition is a modern solution for individual identification; however, the main challenge lies in the accuracy and reliability of the system under various conditions. This study examines the implementation of machine learning as a solution, utilizing video and photo data for face detection and recognition. The study’s goal is to evaluate the effectiveness of facial image recognition by combining several methods, aiming for practical application across diverse settings, such as offices and schools. The methodology includes segmentation testing for edge detection, feature extraction, and real-time recognition. The system was developed using Eigenface, Support Vector Machine, and Viola-Jones methods, trained over 20 sessions. The results indicate that the system can recognize faces under both daytime and nighttime conditions, achieving 87% accuracy during the day and 81% at night. These findings make a significant contribution to the development of security systems based on facial recognition and emphasize the potential of this technology to enhance personal data security across various contexts
Optimization of data integration using schema matching of linguistic-based and constraint-based in the university database Rifqi Hammad; Azriel Christian Nurcahyo; Ahmad Zuli Amrullah; Pahrul Irfan; Kurniadin Abd. Latif
Matrix : Jurnal Manajemen Teknologi dan Informatika Vol. 11 No. 3 (2021): Matrix: Jurnal Manajemen Teknologi dan Informatika
Publisher : Unit Publikasi Ilmiah, P3M, Politeknik Negeri Bali

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31940/matrix.v11i3.119-129

Abstract

University requires the integration of data from one system with other systems as needed. This is because there are still many processes to input the same data but with different information systems. The application of data integration generally has several obstacles, one of which is due to the diversity of databases used by each information system. Schema matching is one method that can be used to overcome data integration problems caused by database diversity. The schema matching method used in this research is linguistic and constraint. The results of the matching scheme are used as material for optimizing data integration at the database level. The optimization process shows a change in the number of tables and attributes in the database that is a decrease in the number of tables by 13 tables and 492 attributes. The changes were caused by some tables and attributes were omitted and normalized. This research shows that after optimization, data integration becomes better because the data was connected and used by other systems has increased by 46.67% from the previous amount. This causes the same data entry on different systems can be reduced and also data inconsistencies caused by duplication of data on different systems can be minimized.
Analisis Dan Implementasi Algoritma Bcrypt Dengan Affine Cipher Untuk Pengamanan Password Pada Aplikasi Web: Analysis And Implementation Of Bcrypt Algorithm With Affine Cipher For Password Security In Web Applications Nugroho Dwi Aji; Tomi Tri Sujaka; Husain; Ondi Asroni; Kurniadin Abd. Latif
Cyber Security dan Forensik Digital Vol. 8 No. 1 (2025): Edisi Mei 2025
Publisher : Fakultas Sains dan Teknologi UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/csecurity.2025.8.1.5076

Abstract

Teknologi informasi saat ini semakin berkembang dengan berkembangnya teknologi tersebut membuat segala kalangan dapat mengakses aplikasi web, hal tersebut menjadikan keamanan pada aplikasi web harus di perhatikan. Salah satu teknik yang dapat digunakan sebagai pengamanan pada aplikasi web yaitu menerapkan algoritma kriptografi pada password. Penelitian ini bertujuan untuk menganalisis dan mengimplementasi algoritma kriptografi bcrypt dengan affine cipher yang akan di modifikasi dengan menggunakan algoritma ROT13 untuk pengamanan password pada aplikasi web. Penelitian dilakukan dengan menggunakan metode pengembangan sistem yaitu Secure Sistem Development Life Cycle (SSDLC) yang meliputi Reqirements analysis, Desain, Development, dan Testing menggunakan bruteforce dan sniffing. Hasil penelitian ini menunjukkan bahwa analisis dan implementasi algoritma bcrypt dengan affine cipher untuk pengamanan password pada aplikasi web sesuai rancangan. Uji coba menunjukkan bahwa dengan menerapkan algoritma bcrypt dan affine cipher yang telah dimodifikasi menggunakan algoritma ROT13 akan memperlambat dari serangan bruteforce. Sedangkan implementasi pada pengiriman kredensial dari frontend menuju backend menunjukkan kredensial tidak dapat dilakukan serangan sniffing menggunakan wireshark. Kesimpulan dari penelitian ini bahwa menerapkan algoritma kriptografi bcrypt dan affine cipher yang telah dimodifikasi menggunakan algoritma ROT13 akan menambahkan lapisan keamanan pada sistem yang dapat menghambat serangan bruteforce dan menghentikan serangan sniffing. Penelitian ini juga menyarankan penggunaan kriptografi bcrypt dan affine cipher yang telah dimodifikasi menggunakan algoritma ROT13 sebagai lapisan pengamanan pada sistem. Kata kunci: Affine cipher, Bcrypt,  Kriptografi, Password, Pengamanan, ROT13. ------------------ Information technology is currently growing with the development of this technology making all circles able to access web applications, this makes security in web applications must be considered. One technique that can be used as security in web applications is applying cryptographic algorithms to passwords. This research aims to analyze and implement the bcrypt cryptographic algorithm with affine cipher which will be modified using the ROT13 algorithm for password security in web applications. The research was conducted using the system development method, namely Secure System Development Life Cycle (SSDLC) which includes Reqirements analysis, Design, Development, and Testing using brute-force and sniffing. The results of this research show that the analysis and implementation of the bcrypt algorithm with affine cipher for password security in web applications are as designed. The test shows that by applying bcrypt and affine cipher algorithms that have been modified using the ROT13 algorithm will slow down brute-force attacks. While the implementation on sending credentials from the front-end to the back-end shows that credentials cannot be sniffed using wireshark. The conclusion of this research is that applying bcrypt and affine cipher cryptographic algorithms that have been modified using the ROT13 algorithm will add a layer of security to the system that can inhibit brute-force attacks and stop sniffing attacks. This research also suggests the use of bcrypt and affine cipher cryptography that has been modified using the ROT13 algorithm as a security layer on the system. Keywords: Affine cipher, Bcrypt, Cryptography, Password, Security, ROT13.
SISTEM INFORMASI INVENTARIS BERBASIS WEB BIDANG PRODUKSI CV. TRI UTAMI JAYA : indonesia Muhammad Tahir; I Wayan Mustika Nayottama Adi Wijaya; Muhammad Wisnu Alfiansyah; Kurniadin Abd. Latif; I Nyoman Switrayana
Jurnal Manajemen Informatika dan Sistem Informasi Vol. 8 No. 2 (2025): MISI Juni 2025
Publisher : LPPM STMIK Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36595/misi.v8i2.1625

Abstract

Sistem informasi inventaris berbasis web ini dibuat untuk mempermudah dan mempercepat proses manajemen inventaris produksi pada CV. Tri Utami Jaya, sebuah perusahaan pengolah produk berbahan dasar kelor. Sistem manual sebelumnya menimbulkan berbagai kendala, seperti human error dan keterlambatan pencatatan. Solusi ini mengintegrasikan teknologi QR Code dan basis data MySQL untuk pencatatan barang masuk dan keluar secara real-time. Fitur utama meliputi pemindaian QR Code, manajemen data barang dan supplier, serta pelaporan inventaris. Hasil Implementasi sistem menunjukkan efisiensi operasional yang lebih tinggi, kesalahan yang lebih rendah, dan pelacakan stok yang lebih akurat, menjadikannya solusi efektif untuk pengelolaan inventaris yang modern dan terstruktur.
Prototype Sistem Pengunci Pintu Melalui Internet Menggunakan Arduino Uno Berbasis Android Latif, Kurniadin Abdul; Wahyudi, Wahyudi; Nurcahyo, Azriel Christian
Jurnal Bumigora Information Technology (BITe) Vol. 3 No. 1 (2021)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v3i1.1327

Abstract

Internet of Think (IoT) is emerging as a big issue on the internet, it is expected that billions of objects will be equipped with various types of sensors connected to the internet through networks as well as technology support such as embedded sensors and actualization. This study aims to design and analyze the application of a prototype door locking system via the internet using Arduino Uno based on Android. This research uses the SDLC method in designing and developing a prototype door lock system over the internet using Arduino Uno based on Android. There are 3 stages of the SDLC method used in this research, namely Requirements Analysis, System Design, and System Implementation. The input from this system is in the form of on and off commands from smartphones that are sent to thingspeak as a server service and will be continued to Arduino devices that have been connected to a solenoid doorlock. If the door is opened, the magnetic sensor switch will send the information back to Thingspeak and continue to the smartphone as feedback. The results of the tests that have been carried out are that the average time required for lock = 4.36 seconds and unlock = 5.30 seconds, while the average sensor test time required to send sensor data with conditions Open = 12.33 seconds and Closed = 12.43 seconds. The delay time depends on the condition of the network connected to the system.
Feasibility and Performance Evaluation of Microprocessor and Fuzzy Logic-Based Overcurrent Relay in Electrical Protection Systems Parada D.P, Bima Romadhon; Megawati, Citra Dewi; Nurcahyo, Eko; Hidayat, Taufik; Setiawan, Rachmadi; Latif, Kurniadin Abd
Jurnal Bumigora Information Technology (BITe) Vol. 6 No. 1 (2024)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v6i1.4101

Abstract

This research focuses on the development and testing of a microprocessor-based Overcurrent Relay (OCR) with the implementation of fuzzy logic control for adaptive setting of TMS values. OCR is a crucial component in the electricity protection system which aims to detect and respond to disturbances due to excessive current, preventing damage to electrical equipment. The aim of this research is to test the feasibility and performance of microprocessor-based OCR with fuzzy logic control in setting TMS values, and compare it with the international standard IEC 60255. The method used in this research is the implementation of the Sugeno type fuzzy logic algorithm on the Atmega 328P microcontroller. This algorithm is used to control the TMS value based on the rotating frequency of the detected overcurrent. The results of this research are a characterization of the OCR response to variations in streaming current and different PS settings. The lowest TOp deviation was observed at higher PS settings, with the best performance in the IDMT OCR type. The use of fuzzy logic control is able to increase the OCR response to overcurrent disturbances, although under normal conditions it sometimes results in a longer TOp. The conclusion of this research is that microprocessor-based OCR with fuzzy logic control can provide protection performance that is adaptive and responsive to dynamic operational environmental conditions. This implementation has the potential to increase the efficiency and leakage of the electricity protection system
Smart Farming System on Red Onion Plants Based on the Internet of Things Hadi, Sirojul; Cahyati, Anzali Ika; Latif, Kurniadin Abd; Sujaka, Tomi Tri; Zulfikri, Muhammad
Sistemasi: Jurnal Sistem Informasi Vol 12, No 3 (2023): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v12i3.2860

Abstract

Red Onions are agricultural commodities that are a source of income for farmers and can make a major contribution to Indonesia's economic development. The characteristic of the onion plant is that it requires a lot of sunlight. The sunlight needed for photosynthesis is 70% with an ambient temperature range of 25oC-32oC and soil moisture in the range of 50%-70%. Although red onions require a lot of water, these plants are sensitive to high-intensity rainfall. The critical period of the red onion plants is in the tuber formation phase so it is necessary to control it to get maximum production results. The method of making the smart farming system uses the Research and Development (R&D) method while sending data online to the web uses the Internet of Things (IoT) method. The result of this research is that a monitoring and control system for temperature and humidity has been successfully built on red onion plants. The system built is capable of measuring temperature with an accuracy rate of 95.33% and environmental humidity in plants reaching 92.07% while the accuracy of testing the entire system reaches 93.33%. The smart farming system has been able to automatically irrigate and apply fertilizer. Control of irrigation and application of fertilizers by the system has implications for better shallot growth and creates modern agriculture.
Using a Partition System to Improve the Performance of the Apriori Algorithm in Speeding Up Itemset Frequency Search Process Syahrir, Moch; Hammad, Rifqi; Abd. Latif, Kurniadin; Rosanensi, Melati
Sistemasi: Jurnal Sistem Informasi Vol 13, No 1 (2024): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v13i1.3610

Abstract

The apriori algorithm uses minimum support and minimum confidence to determine appropriate itemset rules for decision making. The problem faced in this research is how to improve the performance of the a priori algorithm in the process of searching for itemset frequencies using data partition techniques, and be able to produce optimal and consistent rules. To overcome this problem, the author implemented the a priori method and partition system to improve the performance of the a priori algorithm for the itemset frequency search process by taking public data in the form of supermarket transaction data. In this research, the performance of the a priori algorithm was tested with and without a partition system. The data used in this research consists of 350 transaction data from 1784 records with a 4-itemset pattern, minimum support value of 20% and minimum confidence of 0.5 with the best standard rules for determining minimum confidence of 0.8. Based on this research carried out, the research results obtained are that for comparison of time and memory usage the apriori algorithm with a partition system is much faster than the apriori algorithm without a partition system, while memory usage is relatively less for the apriori algorithm with the system than the apriori algorithm without a partition system.
Introducing Children of Environmental Issue in Sekotong Timur Through Project Based Learning Dewi, Puspita; Yuliatin, Riyana Rizki; Hadi, Sirojul; Syarifaturrahman, Wahyu Kamil; Latif, Kurniadin Abd; Sujaka, Tomi Tri; Ramandha, Muhammad Eka Putra; Fatimatuzzahra, Fatimatuzzahra
Mitra Mahajana: Jurnal Pengabdian Masyarakat Vol. 3 No. 2 (2022): Volume 3 Nomor 2 Tahun 2022
Publisher : LPPM Universitas Flores

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37478/mahajana.v3i2.1834

Abstract

Nowadays, the environmental issue is one of the biggest problems worldwide. It is because the climate change deteriorates from time to time; the earth becomes warmer, and pollution polluted the environment. Humans have a pivotal role in changing the earth because they damage the ecosystem by using numerous plastics, throw many of rubbish, and cutting plenty of trees. As a result, climate change and global warming become worse. Consequently, all stakeholders need to take the responsibility to protect the earth. Some groups blame the government; however; environmental issues are the government’s responsibility and all society’s matters, including academicians. This community service activity was conducted in one of the remote areas in Bunbeleng village, East Sekotong district, East Lombok. The Project was held by Relawan Saling Jaga Indonesia (Relasi) funded by Direct Aid Program (DAP) Australian Consulate-General, Bali Indonesia coordinated by Isyatul Mardiah. This project was conducted based on Project-based Learning (PBL). There are five stages in implementing this project: planning the project, monitoring the project, presenting the project, and evaluating the project. The environment topics were elaborated in this community through the PBL. After the program, the students have more knowledge in reducing, recycling, and reusing plastics and green programs with planting trees. The students were very enthusiastic and motivated. The collection of the project was exhibited isn the classroom.
Penguatan Nilai Sadar Wisata melalui Edukasi Partisipatif bagi Masyarakat Sekitar Pantai Kerandangan dalam Mendukung Daya Tarik Wisata Berbasis Kearifan Lokal Dakwah, Muhammad Mujahid; Roodhi, Mohammad Najib; Abdurrahman, Abdurrahman; Muhtarom, Zamroni Alpian; Girsang, Zefanya Andryan; Baehaqi, Baehaqi; Mulyono, Lalu Edy Herman; Latif, Kurniadin Abd
Bakti Sekawan : Jurnal Pengabdian Masyarakat Vol. 5 No. 1 (2025): Juni
Publisher : Puslitbang Sekawan Institute Nusa Tenggara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/bakwan.v5i1.794

Abstract

Kegiatan pengabdian kepada masyarakat ini bertujuan untuk memperkuat nilai-nilai sadar wisata di kawasan Pantai Kerandangan, Senggigi, sebagai upaya mendukung pengembangan destinasi wisata berbasis kearifan lokal dan komunitas. Pantai Kerandangan memiliki potensi alam dan budaya yang tinggi, namun belum sepenuhnya dikelola dengan pendekatan yang melibatkan masyarakat secara aktif dan berkelanjutan. Latar belakang kegiatan ini didasarkan pada temuan awal bahwa sebagian besar masyarakat masih belum memahami secara utuh prinsip-prinsip dasar sadar wisata, seperti keamanan, ketertiban, kebersihan, kenyamanan, dan keramahan, yang sejatinya merupakan fondasi penting dalam membangun pengalaman wisata yang berkualitas. Kegiatan dilaksanakan pada 9 Juni 2025 dengan menggunakan pendekatan edukatif-partisipatif, yang menekankan pada keterlibatan aktif masyarakat dalam setiap proses pembelajaran. Empat tahapan utama dilalui, yakni perencanaan, persiapan kegiatan, pelaksanaan, dan evaluasi. Selama kegiatan, peserta mendapatkan materi interaktif, terlibat dalam Focus Group Discussion (FGD) untuk menggali potensi lokal, serta mengikuti simulasi pelayanan wisata berbasis budaya. Evaluasi dilakukan melalui pre-test dan post-test, yang menunjukkan peningkatan signifikan dalam pemahaman peserta, dari rata-rata skor 52,4 menjadi 85,7.Refleksi kelompok di akhir kegiatan memperlihatkan bahwa pendekatan ini efektif tidak hanya dalam meningkatkan pengetahuan, tetapi juga dalam menumbuhkan semangat kolaboratif serta komitmen untuk menjaga dan mempromosikan identitas budaya sebagai daya tarik wisata. Kegiatan ini diharapkan menjadi model yang dapat direplikasi di destinasi lain yang memiliki karakteristik serupa.
Co-Authors Abdurahman Abdurrahman Ahmad Ahmad Ahmad Ahmad Ahmad Ahmad Zuli Amrullah Ahmad Zuli Amrullah Andi Sofyan Anas Anthony Anggrawan Apriani Apriani Arfa, Muhammad ashari, Lalu Arif Trasna Astuti, Emi Augustin, Kartarina Azhar, Raisul Baehaqi Baehaqi Bagas Hadista Mulyadi Bima Romadhon Parada Dian Palevi Bukran Cahyablindar, Ayu Cahyati, Anzali Ika EKO NURCAHYO Fadila, Baiq Fatimatuzahra, Fatimatuzahra Fatimatuzzahra Fatimatuzzahra Galih Tri Aditya Gilang Primajati Guyup Mahardhian Dwi Putra Habib Ratu Perwira Negara Hadi, Agus Purbathin Hairani Hairani Hakim, Muh.Farid Hammad, Rifqi Hany Pebrianti Hariyadi , I Putu Hasbullah Hasbullah Herman, Lalu Edy Husain Husain Husain Husaini, Rahayun Amrullah I Nyoman Switrayana I Putu Hariyadi I Wayan Mustika Nayottama Adi Wijaya Innudin, Muhammad Kartarina, Kartarina Khairan marzuki Kurniawan Kurniawan Lestari, I Desak Ayu Adhia Lilik Widyawati M Najmul Fadli M. Hidayatullah M. Rasyid Ridho Mardedi, Lalu Zazuli Azhar Megawati, Citra Dewi Melati Rosanensi Miftahul Madani Muhamad Azwar Muhamad Azwar, Muhamad Muhamad Wisnu Alfiansyah Muhammad Eka Putra Ramandha Muhammad Innuddin Muhammad Mujahid Dakwah Muhammad Tahir Muhammad Tahir Muhammad Zulfikri Muhammad Zulfikri Naufali, M. Nizhar Nugroho Dwi Aji Nurcahyo, Azriel Christian Ondi Asroni Pahrul Irfan Pahrul Irfan Pratama, Gede Yogi Puspita Dewi, Puspita Putra, I Gede Bagus Resa Pratama Putrawan, Yogi Eka Rachmadi Setiawan Reza Bahtiar Saputra Rifqi Hammad Rifqy Hammad Rini Adriani Auliana Rini Anggriani Riyana Rizki Yuliatin Rizqullah, M. rodhi, mohammad najib Satrijo Saloko Sirojul Hadi Sujaka, Tomi Tri Sujaka, Tomy Tri Sukma, I Gusti Ayu Yunita Suriyati ., Suriyati Suryadin, Adi Syahrir, Moch. Syamsurrijal, Syamsurrijal Syarifah Taufik Hidayat Tomi Tri Sujaka Tomi Tri Sujaka Tri Sujaka, Tomi Wahyu Kamil Syarifaturrahman, Wahyu Kamil Wahyudi Wahyudi Wardhana, M.Alifya Widyawati , Lilik Wiguna, I Putu Krisna Dharma Wijaya, Frederico Indra Zamroni Alpian Muhtarom Zefanya Andryan Girsang Zulfikri, Muhammad