Claim Missing Document
Check
Articles

Design of Android Based on Android Based Learning and Introduction to Muslim Cendiciawan Applications Sanjaya, Dimas Ari; Darnita, Yulia
Jurnal Komputer, Informasi dan Teknologi Vol. 2 No. 1 (2022): Juni
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i1.598

Abstract

Along with the development of information technology, nowadays many devices have been created to make it easier to access information. The information system about Muslim scholars is currently still dominated by books. Therefore, a learning application will be made that utilizes information technology based on mobile android. The purpose of this research is to produce applications that are easy to understand in understanding the influence of Muslim scholars in the development of science and provide information to children about Muslim alcoholism in influencing the development of science. The research method used in this study uses the Waterfal method. The results that can be accessed from this study is an android application that contains information on intellectual biographies. Based on the results of the test data on the design of learning applications and the introduction of android-based Muslim scholars using questionnaire testing to the teacher council. It is found that this application is included in the "Good" category.
Application of Hough Transformation Method for Value Analysis Rupiah Coins Rifqo, M. Husni; Darnita, Yulia; Deslianti, Dwita; Zen, Wildo
Jurnal Komputer, Informasi dan Teknologi Vol. 2 No. 2 (2022): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i2.855

Abstract

Digital image processing is one of the uses of computer technology used to solve problems regarding image processing or imagery so that it is easy to process. The process of applying image processing in this study aims to detect the value analysis of Rupiah coins by applying the Hough Transformation method, with the hough transformation method is expected to detect the nominal of coins because this method is an image transformation technique that can be used to isolate an object in the image by finding its boundaries. From research that has been conducted 10 images of coins on nominal inputs in the form of rupiah coin coins with a nominal value of 100, 200, 500, and 1000 rupiah obtained an accuracy rate of 90%. This means that there are 8 test data that get a true positive (TP) information, meaning that the data is successful, 1 false positive test data (FP) means that the data is not expected because it only gets a nominal result of the etapi coin not being parameterized in the circle of the coin and 1 test data gets a false negative (FN) description, meaning that the test result is wrong in assessing the nominal of the coin due to the image resolution factor that is too small.
Android-Bases Menu Selection Application At Café De One In Giri Kencana Village, North Bengkulu Sonita, Anisya; Muntahanah, Muntahanah; Darnita, Yulia; Tanjung, Rahman Fadli
Jurnal Komputer, Informasi dan Teknologi Vol. 2 No. 2 (2022): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i2.868

Abstract

In the era of the rapid development of telecommunications, there are many types mobile phones whicht are smart phones on the market. One example that is being widely known in the mobile phone market, many smartphones use Android platform. There are many advantages of android. A café also possible to take advantage of android technology both for customer satisfaction and the benefit of the cafe owner. This study uses the UCD method which conducts interviews with cafe owners or research sites so that they can get results on how the needs, designs and feasibility are as well as tests on the menu selection application. From the results of the research that has been done, it can be concluded that the application is in accordance with the wishes of costumers, and by using the blackbox method it is also in accordance with the wishes of the cafe owner.
Implementation Of Mapping Temporary Landsfills In Bengkulu City Based On Android Padila, Kurnia; Marhalim, Marhalim; Khairullah, Khairullah; Darnita, Yulia
Jurnal Komputer, Informasi dan Teknologi Vol. 3 No. 1 (2023): Juni
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v3i1.1193

Abstract

Garbage is a disaster that can cause a lot of harm both in terms of the environment and health. In this incident there were many factors that affected the surrounding community, such as population density and insufficient public awareness. These factors are the main reasons for illegal waste disposal. By utilizing a Geographic Information System (GIS) implemented with Google Maps in the chaos of an Android-based temporary landfill. Data collection methods are by interview, and observation. The data obtained is to facilitate system analysis and design. The results of this study are that it can make it easier for the people of Bengkulu City to find the nearest TPS.
Human Object Counter Tracking Using Connected Component Labelling On Digital Image Processing Lestari, Fitri; Putra, Erwin Dwik; Sonita, Anisya; Darnita, Yulia
Jurnal Komputer, Informasi dan Teknologi Vol. 3 No. 2 (2023): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v3i2.1218

Abstract

Object tracking is usually used to determine the position of objects and environmental conditions around these objects. Objects that require supervision in order to run properly require a system to monitor the object. Every movement of the object will be known directly through the camera image. So in this study a system was created to detect and track objects. Implementing an object detection system based on image processing using the connected component labeling method. Then displaying the detection results on the divided image frame. Moving object detection and tracking The algorithm used to detect and track moving objects is connected component labeling. Based on the analysis of the workings of the connected component labeling algorithm for detecting and tracking moving objects using video, it can be concluded that the connected component labeling algorithm has succeeded in tracking and labeling each object based on the position and number of objects, even though they look erratic, in human movement.
Implementation Of Sequential Searching Algorithm In Car Sales E-Commerce Web Reswan, Yuza; Darnita, Yulia; Mahfuzhi, A.R. Walad Mahfuzhi; Elviani, Elviani
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 1 (2024): June
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i1.1807

Abstract

The sequential searching algorithm is an algorithm that performs a search by matching the data to be searched with all the data in a group of data in a sequential manner starting from the first data until the data can be found. The development of information and communication technology has brought significant changes in various aspects of life, including in the world of commerce. E-commerce has become a popular platform for carrying out buying and selling transactions, including car sales. Selling cars via e-commerce offers many benefits for buyers and sellers. For buyers, e-commerce provides easy access to a wide selection of cars at competitive prices. For sellers, e-commerce expands their market reach and allows them to reach more customers. However, as the number of products available on e-commerce websites increases, finding the desired product becomes increasingly difficult. This can cause frustration for buyers and result in decreased sales. This research aims to discuss the implementation of sequential search algorithms on car sales e-commerce websites. This algorithm is expected to help buyers find the car they want more easily and quickly, thereby increasing buyer satisfaction and increasing sales for sellers.
PEMBUATAN WEB PROFILE KELURAHAN KEBUN KENANGA Arif Triyandi, Muhammad; Kristian Herianto, Agib; Gilang Pamungkas, Habib; Abdurrasyid, Fakhri; Jaya Saputera, Juwanda; Muntahanah, Muntahanah; Darnita, Yulia
Jurnal Ilmiah Mahasiswa Kuliah Kerja Nyata (JIMAKUKERTA) Vol. 4 No. 1 (2024): JIMAKUKERTA
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat Universitas Muhammadiyah Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Kemajuan teknologi informasi telah mengubah cara masyarakat memperoleh informasi. Pembuatan web profile Kelurahan Kebun Kenanga diperlukan untuk memastikan akses mudah ke informasi terkini. Website ini, muncul karena kebutuhan pasar dan meningkatnya penggunaannya, berperan sebagai sumber informasi yang mudah dipelajari. Profil web kelurahan ini memberikan informasi tentang layanan, kegiatan, dan potensi wilayah dengan efisien. Dengan teknologi canggih, pembuatan sistem informasi website yang responsif dan menarik visuallah dimungkinkan. Mahasiswa berperan sebagai pewaris dan sumber daya penting, dengan kegiatan PKL sebagai program pendidikan di luar kampus. Tujuan PKL adalah memberikan pengalaman dunia nyata kepada peserta. Kelurahan Kebun Kenanga memiliki sejarah sebelum pemekaran kecamatan, dan pemerintah kelurahan sangat membutuhkan website resmi untuk memperkuat keterlibatan warga dan menyajikan informasi terkini serta potensi kelurahan.
Rancang Bangun Aplikasi Wifi-Call untuk Panggilan pada Local Area Network Berbasis Android (Studi Kasus Universitas Muhammadiyah Bengkulu) Toyib, Rozali; Darnita, Yulia; Sugianto, Melani
Jurnal Media Infotama Vol 14 No 2 (2018)
Publisher : UNIVED Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (831.403 KB) | DOI: 10.37676/jmi.v14i2.652

Abstract

The Local Area Network network at Muhammadiyah University of Bengkulu is equipped with good facilities, but there is not yet a communication system that makes it easy for lecturers and staff to exchange information, especially in the Faculty of Engineering. To use telephone services certainly requires quite a lot of money and also requires the use of quite a lot of telephone sets, especially since postpaid telephone services must be paid for every month. When planning a VoIP network, you must have a server that functions as an IP PBX. In other conditions, such as at the Faculty of Engineering, Muhammadiyah University of Bengkulu, this tool will be useful for lecturers and staff as a long-distance communication tool by utilizing LAN or WIFI networks so that they can be connected to each other so that work processes are coordinated. started implementing wireless technology or what is usually called Wireless Fidelity (WiFi0). Mobile phones which were originally used as communication tools, now have more than their basic functions, various features have been embedded, such as image and video processing, document processing and so on. , this cannot be separated from the use of the Operating System on Android Mobile. The Android Operating System has the main goal of advancing innovation in mobile telephone devices so that users are able to explore capabilities and add more experience compared to other mobile platforms. From the results, testing the Wifi-Call Application for Calls on Local Area Network Based on Android, can be concluded as follows: The Wifi-Call application created can be used over a distance of less than 10M. The trial of 3 Smartphones was successful with different OS versions, it is possible that other brands of Smartphones can also be successful. Under the circumstances The connection is off and on. This application can still be run because this system only uses the network. The voice response produced by the system that the author created experienced a delay of more than 1 second. This Wifi-Call application has been successfully tested in two different locations, namely campus and 1 and 2 Muhammadiyah Bengkulu Universities.
Penerapan Algoritma Greedy Dalam Pencarian Jalur Terpendek Pada Instansi-Instasi Penting Di Kota Argamakmur Kabupaten Bengkulu Utara Darnita, Yulia; Toyib, Rozali
Jurnal Media Infotama Vol 15 No 2 (2019)
Publisher : UNIVED Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (466.028 KB) | DOI: 10.37676/jmi.v15i2.867

Abstract

Searching for important agencies in the city of Argamakmur is an important thing for people from outside the area to do in moving either non-permanent (temporary) or permanent (permanent) in an area, thus the difficulty in accessing distance and time is one of the factors. which needs to be considered in order to obtain information on where the positions of the agencies are precisely and accurately. When searching, the Greedy Algorithm works by looking for the smallest weight point by calculating the route passed and the Greedy Algorithm calculates the weight depending on the weight of the stage that has been passed and the weight of the stage itself. Based on the results of testing the system created: Local Government travel time is 10 minutes on the shortest route to Gunung Alam, Capil travel time is 10 minutes on the shortest route to Karang Suci, Porles travel time is 8 minutes on the shortest route on a roundabout, Fire Department travel time is 10 minutes on the shortest route on the square, PLN on time The shortest route takes 10 minutes to the main square, the Regional General Hospital (RSUD) takes 6 minutes to the shortest route to Rama Agung. The shortest route may take longer because of crowds and population density. To run this system, an adequate internet network is needed
Pengamanan Data Teks Dengan Menggunakan Algoritma Zero-Knowledge Proof Toyib, Rozali; Darnita, Yulia
Jurnal Media Infotama Vol 16 No 1 (2020)
Publisher : UNIVED Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (577.723 KB) | DOI: 10.37676/jmi.v16i1.1114

Abstract

Data security is very important in maintaining the confidentiality of the information itself, especially if the information is only known to certain parties. Sending data or information without security will be at risk of eavesdropping. So that the information contained in it can easily be known by unauthorized parties, and something like that is very detrimental. Until now, cryptography is one solution to guarantee the security of information. Zero Knowledge Proof (ZKP) is a cryptographic protocol that can be used by someone to prove one's ownership (prover) of confidential information to another person (verifier), without the need to reveal the information or provide a way for other people to know the secret. The test result is that Zero Knowledge Proof divides a data stream into small blocks. Each of these blocks is encrypted separately. In a zero knowledge proof implementation, the key to encrypt will only be with the user, and with that, he will be able to encrypt and decrypt information. The zero knowledge proof algorithm is a unique method by which a user can prove to other users that he knows additional information.
Co-Authors -, Rozali Toyib Abdurrasyid, Fakhri Achmad Nurcholis, Ivan Adinda Trisista Agusdi Syafrizal, Agusdi Aldino Discrise Amandika, Rama Andi Prasetio Rozali Toyib Andika Putra Andrian Kuor Nando Apridiansyah, Yovi Ardi wijaya ARDIANSYAH ARDIANSYAH Arif Triyandi, Muhammad Arisandi, Vini Aulia, Nica Aviantoro, Kevin Beni Juanda Dandi Sunardi dany Adhi wibowo David Maria Veronika, Nuri Dedy Abdullah Dedy Prabowo della, Putri Rahma Della Deslianti, Dwita Deva, Alba Ragil Sutra Diana Diana Diana Diana Diatama, Pradika Egia Apriansyah Elviani, Elviani Fajri Sepriansyah, Muhammad Fitri Lestari, Fitri Fransisco, Nochi Erfindo Gilang Nurva Wijaya Gilang Pamungkas, Habib Gunawan Gunawan Gunawan Gunawan Handayani, Sri Hanif, Patri Harry Witriyono Harry Witriyono Witriyono Hendri Wibowo, Sastya Hendri, Sastya Hesti Lestari hidayah, agung kharisma Hidayat, Muhammad Husni Husni Mubarak Imanullah, Muhammad Jandri M.Siban Jaya Saputera, Juwanda Jestika Safitri Juanda, Beni Khairullah Khairullah, Khairullah Khairunnisyah, Khairunnisyah Khakim, Ahmad Nuril Kharisma , Agung Kristian Herianto, Agib Kristika Meza Werda Kurnia Padila M. Imanullah, M. Imanullah Mahfuzhi, A.R Walad Mahfuzhi, A.R. Walad Mahfuzhi Marga Handayani, Kurnia Marhalim marhalim, marhalim Maria Veronika, Nuri David Muhammad Rizky Tara Muntahana, Muntahana Muntahanah Muntahanah Muntahanah, Muntahanah Nadila, Syalsa Nanda Febriana Nica Aulia Novrialdi, Tito Nur'aini, Shandra Nuri David Maria Veronica Onsardi, Onsardi Padila, Kurnia Pahrizal, Pahrizal Pitriyo, Ari Pradika Diatama Putra Andika, Febby Putra, Adeyansyah Putra, Erwin Dwik Putra, Wahyu Dharma Putra, Yebri Putra, Yonaldo Rifqo, M. Husni Rinaldi Rinaldi Riri Rumbiyiani Ristontowi, Ristontowi Rizki Hidayat Rohanan Yusuf Rojali Toyib Rozali Toyib safitri, melinia Sahputry, Feby Ayu Salmidah, Tasya Rufaidah Sanjaya, Dimas Ari Sastia Hendri Wibowo Sastya H Wibowo Sastya Hendri Wibowo Sastya Wibowo Sonita, Anisa Sonita, Anisya Sugianto, Melani Sundari, Weti Surya Ade Saputera Tanjung, Rahman Fadli Tara, Muhammad Rizky Tasya Rufaidah Tito Novrialdi Toyib, Rozali Wahyu Nugroho wibowo, dany Adhi Wibowo, Sastia Hendri Wijaya, Ardi Wilio Papian Witriyono, Harry Yayang Kurniawan Yebri Putra Yogi Pranata Yonaldo Putra Yulia Darmi Yulia Rahmi Yunika, Astri Yutya Maydila Yuza Reswan Zen, Wildo