Claim Missing Document
Check
Articles

Monitoring Sistem Keamanan Laci Kasir Dengan Fingerprint Berbasis Android Ahmad Muslih Mardia; Iskandar Fitri; Sari Ningsih
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6 No 3 (2022): JULY-SEPTEMBER 2022
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.426

Abstract

Internet of Things is becoming one of the trends in the world of technology. One of the uses of technology like this can be found in maintaining the security of a store. In this study, the mechanical cash register drawer lock will be replaced with fingerprint biometric recognition technology that exists in smart phones. Use of Solenoid doorlock as a substitute for cashier drawer locks. The fingerprint will be verified by the application to be matched with the database, then send data to the NodeMCU microcontroller which is integrated with smart phone devices as monitoring. The data will be sent to the database and read by the application system on the smart phone device to be accessed anywhere. Solenoid doorlock instead of drawer lock. If the fingerprint successfully verifies the fingerprint and matches the data in the system, the cashier drawer lock will open.
Aplikasi Monitoring Peralatan, Bahan Laboratorium Menggunakan Metode Sequential Search di Laboratorium Mikrobiologi dan Genetika UNAS Chairil Rohadi; Iskandar Fitri; Nurhayati Nurhayati
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6 No 3 (2022): JULY-SEPTEMBER 2022
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.428

Abstract

The Faculty of Biology at the National University has a Microbiology and Genetics laboratory which is used for practicum activities, research, and fieldwork lectures. At the analysis stage, problems were found, namely in recording the use of equipment and materials used by students for research activities still using conventional methods, this resulted in delays in managing and conveying information. Adequate lecture facilities are an important aspect in helping the teaching and learning process. Based on the background of the problem, the author aims to make the equipment monitoring process more efficient, using Android-based devices. The author uses the Sequential search method in the process of monitoring equipment in the laboratory. This research was tested using black-box testing and white box testing by distributing questionnaires conducted using a Likert scale with a value range of 5 to 25 student correspondents with an average value for software testing = 4.6; Interface = 4.44; Software features = 4.32; item search feature = 4.08; with the final mean = 4.09.
Pengelolaan Penyewaan Auditorium Universitas Nasional dengan Metode Rational Unified Process Muklis Haryono; Iskandar Fitri; Nurhayati Nurhayati
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6 No 3 (2022): JULY-SEPTEMBER 2022
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.429

Abstract

The Auditorium of the National University is one of the assets and facilities at the National University which is managed by the Public Administration Unit (BAU). Usually, the public rents the auditorium for various purposes such as for seminars, weddings, training, and so on. However, currently, the auditorium rental process is still manual, where tenants must come directly to the BAU unit of the National University to obtain building information and schedule certainty. This makes tenants need more time if they want to rent. This study develops a web-based application for the Management of the National University Auditorium Rental with the Rational Unified Process (RUP) method as a solution to these problems. The development will highlight the RUP model and utilizing the Unified Modeling Language (UML) tool for modeling and using the PHP language for construction. The result of this research is the availability of a rental management application that makes tenants easier to rent the auditorium and makes the BAU unit easier to manage the auditorium rental. The results of application testing using the black box method show that all application functions are running well. In addition, testing using the User Acceleration Test (UAT) application easy to use 92%, asy menu display 88,8% and software features 86,4%.
Rancang Bangun Aplikasi Peminjaman Ruangan Pertemuan di Universitas Nasional Berbasis Web Suryadi Suryadi; Iskandar Fitri; Nurhayati Nurhayati
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6 No 3 (2022): JULY-SEPTEMBER 2022
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.430

Abstract

The National University has a number of rooms that can be used by the entire academic community to support their activities. Currently, the use of the room is managed by the General Administration Unit (BAU) of the National University. Anyone who will use the room must apply for a permit to the BAU unit. The problem is, currently the existing process is still manual where the borrower must come directly to the unit. If the room has been borrowed by someone else or the BAU unit admin is not in place, then the borrower's efforts will be in vain. This is certainly not effective and efficient. This research designs and develops a Web-based application for borrowing meeting rooms at the National University. The application was designed using the Unified Modeling Language (UML) tool and developed with the PHP and MySQL languages. The result of this research is the availability of room loan applications at the National University. The results of testing the logic path with the white box testing method, testing is carried out on the admin and borrower flowcharts resulting in cyclomatic complicity 8, region 8, and independent path 8 logic paths that are good and have good functionality based on the black box method testing.
Sistem Monitoring Penyewaan Alat-Alat Outdoor Berbasis Web Aditya Nuryudha Iriandi; Iskandar Fitri; Sari Ningsih
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6 No 3 (2022): JULY-SEPTEMBER 2022
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.445

Abstract

The purpose of this research is to make it easier to collect data to make it easier for business actors to monitor the rental of outdoor equipment. Applications built using HTML, CSS, and Java Script programming language systems then use the CodeIgniter framework and materialize components and use MySQL and XAMPP as databases and tools in running server-side. The waterfall method was chosen as a method in developing the system that was built. The results of the study found that; 1) The role of technology in the current digital era, can facilitate the handling of business management, especially in the field of equipment rental so that it helps problems and handling in processing and processing rental reports, 2) Hiking, Trekking, Mountaineering and so on customers will have a place to borrowing tools and climbing needs, and 3) By using the application that was built, it can make it easier to monitor the rental of outdoor equipment.
Penerapan Message Diggest Algorithm MD5 untuk Pengamanan Data Karyawan PT. Swifect Berbasis Desktop Muhammad Rafiq Zayana; Iskandar Fitri; Fauziah Fauziah; Aris Gunaryarti
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6 No 3 (2022): JULY-SEPTEMBER 2022
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.446

Abstract

In the era of Society 5.0, technological progress is unstoppable. Technological advances in the era of society 5.0 have become the main needs of humans in helping daily work. Technology is used as a medium for finding information to transportation tools that are integrated with the intervention of digital technology. Almost every company has technology to support their business development needs. And especially in agencies in this era, employee data is also processed using technology, but with the integration of employee data into technology, a lot of sensitive data must be protected in order to avoid misuse by irresponsible people. Therefore, the main objective of this research is to develop the application of the Message Diggest Algorithm (MD5) Cryptography Algorithm in employee data applications. This application is very appropriate to make it easier for companies to manage their employee data and ensure data security. To secure sensitive data from each employee, the process carried out is by encrypting each sensitive data so that it is not easy to read by others who have no interest or authority over the data. And the desktop-based application was made using Visual Basic. The research was carried out with two methods, namely the method to test the compilation speed of MD5 and to test the validation of the decrypted data from the MD5. And from the results of the study, the average speed of 500-515 milliseconds and data consistency obtained valid results from all tests.
Algoritma RSA (Rivest–Shamir–Adleman) pada Sistem Informasi Pemilihan Ketua Organisasi Ikatan Pondok Pesantren Smart-SIPKOTREN Hasbulloh Hasbulloh; Iskandar Fitri; Sari Ningsih
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6 No 3 (2022): JULY-SEPTEMBER 2022
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.453

Abstract

The objectives of this research are; 1) Help simplify the process of selecting the chairman who previously used the manual method or did not have a web-based evaluation application, 2) This application can secure the details of the names that have chosen the chairman through the admin, only the admin knows, and 3) Improve speed and accuracy the results of the e-voting data that replaced the previous conventional voting system were carried out manually. In making the application, implementing RSA (Rivest–Shamir–Adleman) on the e-voting system that was built, for designing the application using web-based programming languages such as HTML, PHP, and MySQL used as e-voting database management. The results showed that the e-voting application simplifies the vote-counting process because it is done online and you can find out directly the results of the upcoming elections, without the need to count votes like a manual selection process. the participation of students in Islamic boarding schools is determined as the maximum power. The election of the head of the hut has become an inseparable part of the hut, almost all the huts hold elections. The election of the chairman is the procedure for selecting the representative of the booth in the booth based on the majority of votes.
Perbandingan Metode Interpolasi Newton dan Lagrange dengan Bahasa Pemrograman C++ Yoga Furqaansyah; Fauziah Fauziah; Agus Gunaryati; Iskandar Fitri
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6 No 3 (2022): JULY-SEPTEMBER 2022
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.457

Abstract

Interpolation is defined as an estimate of a known value. Extensive interpolation is an attempt to determine the approximate value of an analytic function that is unknown or alternatively a complex function whose analytic equation cannot be obtained. You can combine the use of math and math to analyze the price of an item. This study describes Newton's method and the polynomial method. Therefore, interpolation with Newton's method has an error value that is smaller than the error value of the Lagrange interpolation. The results in this research case study when x = 2.5 using 10 data performed using Newton's polynomial interpolation method have a result of 1.70956 where this value is lower than the value of the analysis using the Lagrange method which is 3.2163.
Teknik Steganography untuk Menyisipkan Pesan pada Sebuah Citra Menggunakan Metode Least Significant Bit (LSB) Ahmad Khuzaifi; Fauziah Fauziah; Iskandar Fitri
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6 No 3 (2022): JULY-SEPTEMBER 2022
Publisher : KITA Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.461

Abstract

Copyright is a direct right granted to the creator of a work in any form that is real and recognized in accordance with the provisions of the legislation in force in the area. Copyright infringement is very detrimental to the creators of works who have tried hard in creating a work. The steganography technique can be a solution to insert hidden messages into digital data. In writing this scientific research journal, an application was made to give a hidden message sign to an image. The goal is to protect copyrighted works from being easily recognized by irresponsible parties. Making this simple application using MATLAB R2021a software. By using the Least Significant Bit [LSB] method, what happens is that the data bits will be inserted into the digital image bit by changing the last bit. The result is that the image inserted with the message does not experience significant changes, but when the image undergoes an extraction process, the inserted message will appear. The results of the Least Significant Bit [LSB] method in this study are successful in inserting a .txt file into the hidden original image so that it does not change the visualization of the image but only changes the image size from 56.9KB to 732KB
IMPLEMENTATION OF DEMPSTER SHAFER IN EXPERT SYSTEM IN EARLY DIAGNOSIS OF DENTAL AND MOUTH DISEASES IN CHILDREN Atalya Kurnia Sari; Iskandar Fitri; Denny Hidayatullah
Jurnal Ipteks Terapan (Research Of Applied Science And Education ) Vol. 15 No. 1 (2021): Jurnal Ipteks Terapan ( Research of Applied Science and Education )
Publisher : Lembaga Layanan Pendidikan Tinggi Wilayah X

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (468.908 KB) | DOI: 10.22216/jit.v15i1.6

Abstract

Diseases of the teeth and oral cavity are one of the health problems that many people experience. This is very inversely proportional to the needs of everyone who wants to have a healthy mouth and teeth. Lack of awareness to maintain oral and dental health is still low. Many people think that brushing your teeth is enough, even though this activity is not enough to maintain healthy teeth and oral cavity. When diagnosing doctors often do X-rays. Therefore, doctors need a system to diagnose diseases of the teeth and oral cavity, where the system used uses a Dempster Shafer method where the accuracy of this method has been proven to be 93%.