p-Index From 2020 - 2025
8.773
P-Index
This Author published in this journals
All Journal IAES International Journal of Artificial Intelligence (IJ-AI) Bulletin of Electrical Engineering and Informatics Jurnal Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Jurnal Edukasi dan Penelitian Informatika (JEPIN) Sistemasi: Jurnal Sistem Informasi Jurnal ELTIKOM : Jurnal Teknik Elektro, Teknologi Informasi dan Komputer Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Jurnal Pendidikan UNIGA Jurnal Ilmiah Universitas Batanghari Jambi INOVTEK Polbeng - Seri Informatika IJIS - Indonesian Journal On Information System ILKOM Jurnal Ilmiah INTECOMS: Journal of Information Technology and Computer Science Jiko (Jurnal Informatika dan komputer) IJISTECH (International Journal Of Information System & Technology) JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) METIK JURNAL Jutisi: Jurnal Ilmiah Teknik Informatika dan Sistem Informasi Jurnal Manajemen Informatika dan Sistem Informasi Journal of Information Systems and Informatics JATI (Jurnal Mahasiswa Teknik Informatika) PRAJA: Jurnal Ilmiah Pemerintahan Indonesian Journal of Electrical Engineering and Computer Science Jurnal Informa: Jurnal Penelitian dan Pengabdian Masyarakat Pilar Teknologi : Jurnal Penelitian Ilmu-ilmu Teknik Jurnal Teknimedia: Teknologi Informasi dan Multimedia JiTEKH (Jurnal Ilmiah Teknologi Harapan) Journal of Electrical Engineering and Computer (JEECOM) IJISTECH Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) Jurnal Computer Science and Information Technology (CoSciTech) Buletin Poltanesa International Research on Big-data and Computer Technology (IRobot) Bulletin of Computer Science Research Journal of Applied Sciences, Management and Engineering Technology (JASMET) Journal of Information Technology (JIfoTech) Jurnal Teknik Informatika Jurnal Informatika Teknologi dan Sains (Jinteks) JAIA - Journal of Artificial Intelligence and Applications Nusantara of Engineering (NOE) Jikom: Jurnal Informatika dan Komputer Journal of Informatics, Electrical and Electronics Engineering SmartComp Jurnal Informatika Polinema (JIP) Intechno Journal : Information Technology Journal Bridge: Jurnal Publikasi Sistem Informasi dan Telekomunikasi
Claim Missing Document
Check
Articles

An AI-integrated IoT-based Self-Service Laundry Kiosk with Mobile Application Kusrini, Kusrini; Muhammad, Alva Hendi; Fauzi, Moch Farid; Kuswanto, Jeki; Bernadhed, Bernadhed; Widayani, Wiwi; Pramono, Eko; Muktafin, Elik Hari; Ariyanto, Yossy
ILKOM Jurnal Ilmiah Vol 16, No 3 (2024)
Publisher : Prodi Teknik Informatika FIK Universitas Muslim Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33096/ilkom.v16i3.2050.382-393

Abstract

This paper proposes KILAO, an IoT-based self-service laundry kiosk connected with a mobile application that aims to improve the laundry experience by improving user convenience and operational efficiency. This study aims to streamline the washing process using autonomous payment systems, real-time monitoring, and AI-based queue management, resulting in better resource utilization and higher user satisfaction. The development technique comprises identification and requirement gathering, development of both software and hardware prototypes, and evaluation of the prototype. In the requirement-gathering phase, the design of a kiosk machine that consists of hardware and software is defined by combining regular washing machines with IoT technologies for remote control and monitoring. We also developed a mobile application to engage with the kiosk machine. The kiosk simplifies the choice of laundry bundles and accepts various payment options, including cash, cashless transactions, and card-based purchases. The evaluation procedure of the prototype was conducted by using expert evaluations. They are from academics and industry professionals who verified the system’s effectiveness and market potential. The results have shown several unique selling features for KILAO. Extensive payment options and self-service operations were highlighted from the customer’s perspective as key benefits. From the seller’s perspective, its interoperability with traditional washing machines enables a low-cost shift to intelligent, self-service operations, eliminating the need for pricey coin-operated machines. Also, the automatic monitoring system that detects cycle completion can reduce waiting times and improve energy efficiency. In summary, KILAO presents a significant advancement in laundry automation by integrating IoT and AI. Moreover, the Gradient boosting algorithm forecasts waiting times and gives real-time information on machine availability, removing the need for physical queueing. The research demonstrates that KILAO’s capability to provide self-service laundry by providing a user-friendly mobile application can enhance user experience, operational efficiency, and energy utilization.
PENERAPAN PRINSIP-PRINSIP RESTFUL API DALAM PENGEMBANGAN WEB SERVICE PADA NEO FEEDER DENGAN FRAMEWORK LARAVEL: PENERAPAN PRINSIP-PRINSIP RESTFUL API DALAM PENGEMBANGAN WEB SERVICE PADA NEO FEEDER DENGAN FRAMEWORK LARAVEL Ula, M. Izul; Kusrini, Kusrini; Muhammad, Alva Hendi
Nusantara of Engineering (NOE) Vol 7 No 1 (2024): Volume 7 No. 1 Tahun 2024
Publisher : Universitas Nusantara PGRI Kediri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29407/noe.v7i01.21417

Abstract

With advances in technology, the use of fire is very helpful in the development process of the data in the Neo Feeder which is directly integrated into the Higher Education and Higher Education. The presence of a web service in the Neo Feeder makes it easier to retrieve data as needed in the development process. This research uses the Representational State Transfer (RESTFUL) Web Service method. RESTFULL web service is a technological method that applies the concept of moving between states using a browser or also called the HTTP mechanism to connect applications with other applications. In this case the RESTFULL method is used as data access to the local database (SIAKAD) which aims to facilitate development and provide updated information. Based on the results of the tests that have been carried out, it can be concluded that functionally all processes in the system using the RESTFULL Web Service method have run as expected and can reduce actual information (Syafrial, M., & Teguh, I. 2019).
Quality Evaluation of Ticketing Management System Using ISO/IEC25010:2023 Standards and AHP Method Ariningsih, Puji; Muhammad, Alva Hendi
Intechno Journal : Information Technology Journal Vol. 6 No. 2 (2024): December
Publisher : Universitas Amikom Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24076/intechnojournal.2024v6i2.1870

Abstract

Purpose: Information Technology plays a crucial role in supporting education service systems. When system-related issues arise, a Ticket Management System (TMS) becomes essential to address various software and hardware problems. Evaluating the performance and quality of TMS applications is necessary to ensure their effectiveness. This study assesses the quality of a TMS application developed by University of Amikom Yogyakarta, using ISO/IEC 25010:2023. Methods/Study design/approach: The Analytic Hierarchy Process method is employed to prioritize three key ISO/IEC 25010 characteristics by engaging TMS application users. Following the ranking, the study conducts quality measurements using questionnaires and black box testing. The questionnaire results are assessed using a Likert scale to determine scores for the TMS application based on the sub-characteristics of the three selected ISO/IEC 25010:2023 characteristics and the AHP-derived rankings. Result/Findings: The findings indicate that the TMS application achieved a quality score of 4.354. This shows that the TMS application is in the good category. Novelty/Originality/Value: The study highlights the need for performance efficiency improvements, specifically in the Time Behavior sub-characteristic, to enhance the overall quality of the TMS application.
Machine learning methods for classification and prediction information security risk assessment Muhammad, Alva Hendi; Nasiri, Asro; Harimurti, Agung
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 14, No 1: February 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v14.i1.pp457-465

Abstract

Information is an essential company asset that must be protected. The value of information assets depends on the type and scale of the business and its role in delivering services. One of the primary programs that can help identify areas of improvement and guide the development of security awareness programs is risk assessment. Managing cybersecurity risks is critical to protecting enterprises from developing cyber threats and promoting resilience. This includes detecting, assessing, and mitigating risks to protect sensitive data, systems, and networks. While cybersecurity risk management is challenging, organizations may improve their security posture. This paper seeks to contribute to the field of information security risk assessment by leveraging the power of machine learning to provide quick, cost-effective, and individualized risk assessments for small and medium enterprises. Specifically, we extend the evaluation for security level classification by utilizing a support vector machine, random forest, and gradient boosting algorithms. The results demonstrate how well the model detects significant cases while reducing false positives. The model’s exceptional precision ensures that its identifications are dependable, while the high recall demonstrates that it accurately detects relevant data. Precision is critical in security risk assessment because a false positive result might have profound effects.
PERANCANGAN TATA KELOLA MENGGUNAKAN COBIT 2019 UNTUK MENINGKATKAN LAYANAN DAN DUKUNGAN TIK PADA PUSTIK STMIK LOMBOK Baiq Yulia Fitriyani; Alva Hendi Muhammad
Jurnal Manajemen Informatika dan Sistem Informasi Vol. 8 No. 1 (2025): MISI Januari 2025
Publisher : LPPM STMIK Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36595/misi.v8i1.1484

Abstract

 Teknologi Informasi dan Komunikasi (TIK) memainkan peran penting dalam mencapai tujuan organisasi. Penelitian ini bertujuan meningkatkan tata kelola TIK di PUSTIK STMIK Lombok dengan menerapkan kerangka kerja COBIT 2019. Data dikumpulkan melalui observasi, wawancara, dan tinjauan literatur, kemudian dianalisis menggunakan SWOT untuk mengidentifikasi kekuatan, kelemahan, peluang, dan ancaman. Enam domain utama—APO04, APO10, BAI02, DSS01, DSS05, dan EDM01—dievaluasi, menunjukkan bahwa semua domain saat ini berada pada Tingkat Kapabilitas 3. Meskipun proses terdokumentasi secara konsisten, ditemukan kesenjangan dalam perencanaan kebutuhan jangka panjang dan manajemen insiden keamanan. Rekomendasi meliputi penguatan kebijakan, peningkatan dokumentasi, pelatihan berkala, dan mekanisme tata kelola yang responsif. Penelitian ini menunjukkan relevansi COBIT 2019 di lingkungan akademik, serta menyediakan panduan untuk mengatasi kesenjangan kapabilitas dan menyelaraskan layanan TIK dengan tujuan institusi. Penelitian lanjutan disarankan untuk mengevaluasi dampak jangka panjang dan integrasi teknologi baru.
ANALISIS KINERJA ALGORITMA ADVANCED ENCRYPTION STANDARD (AES) TERMODIFIKASI DALAM ENRKIPSI DAN DEKRIPSI DATA Candra Aditya Pinuyut; Ema Utami; Alva Hendi Muhammad
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 5 No. 2 (2024): Desember 2024
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46764/teknimedia.v5i2.200

Abstract

Advanced Encryption Standard (AES) is one of the most popular algorithms used. This research aims to analyze the performance of the Advanced Encryption Standard (AES) algorithm which has been modified in the encryption and decryption process. The main focus of this research is to measure the value of the Avalanche Effect, throughput, and speed of the encryption and decryption process of modified AES by replacing the mixcolumn function with permutation bits and reducing the rotation of conventional AES algorithms, twofish, serpent, DES and 3DES. The results show that the modified AES algorithm has an Avalanche Effect of 50.20%, higher than the conventional AES algorithm which has an Avalanche Effect of 49.63%. Througput testing shows that modified AES does not experience significant changes compared to the standard AES algorithm, Serpent, Twofish, DES and 3DES during the encryption process and experiences significant changes during the decryption process of 467.37% 46 compared to DES and 1286% compared to 3DES.
ANALYSIS OF INFORMATION TECHNOLOGY INNOVATION GOVERNANCE USING COBIT: SYSTEMATIC LITERATURE REVIEW Rosady, Melinne Maldini; Muhammad, Alva Hendi; Nasiri, Asro
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 10, No 1 (2025)
Publisher : STKIP PGRI Tulungagung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29100/jipi.v10i1.5961

Abstract

Information Technology (IT) has become a critical element in all aspects of business, especially in the current digital era. To ensure continuity and operational effectiveness, companies must maintain their IT systems' security, availability and integrity. Success in managing IT innovation impacts operational efficiency and directly influences the company's overall performance and sustainability. Therefore, implementing effective IT innovation governance is crucial to reducing risks and maximizing benefits from IT investments. This research focuses on using the COBIT framework as the primary tool in managing IT innovation. COBIT, especially the COBIT 2019 version, is the dominant choice in innovation governance practices in the industrial and digital sectors. Through the Systematic Literature Review (SLR) method, this research identified and analyzed 30 related articles that provide in-depth insight into the application of COBIT in various industrial contexts. The research results highlight several challenges faced in implementing COBIT, including a need for a more in-depth understanding of this framework, a lack of proper documentation of work processes, and the need for clear operational standards to manage IT innovation effectively. Thus, this research not only provides practical guidance for practitioners in the field but also contributes a deeper understanding of the importance of integrated IT innovation governance with broader business strategy.
Analisis Dampak Karakteristik Siswa pada Masa Pandemi COVID-19 terhadap Prestasi Akademik menggunakan Analisis Diskriminan dan Regresi Multinomial Cynthia Widodo; Alva Hendi Muhammad; Kusnawi Kusnawi
Journal of Electrical Engineering and Computer (JEECOM) Vol 6, No 2 (2024)
Publisher : Universitas Nurul Jadid

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33650/jeecom.v6i2.9070

Abstract

Berdasarkan analisis karakteristik siswa di tengah pandemi COVID-19, studi ini menggunakan analisis diskriminan dan regresi multinomial untuk mengeksplorasi dampaknya terhadap prestasi akademik. Faktor-faktor seperti usia, jenis kelamin, tingkat stres, dan transisi ke lingkungan pembelajaran virtual diperiksa untuk memahami pengaruhnya terhadap hasil pendidikan. Temuan ini menyoroti peran penting manajemen stres dan tantangan yang ditimbulkan oleh lingkungan pembelajaran virtual, serta menekankan perlunya intervensi yang ditargetkan untuk mendukung kesejahteraan siswa dan keberhasilan akademik. Analisis diskriminan mengidentifikasi faktor-faktor utama yang membedakan tingkat prestasi akademik, sementara regresi multinomial memodelkan hubungan kompleks di antara variabel-variabel yang mempengaruhi pencapaian siswa. Penelitian ini berkontribusi pada strategi pendidikan yang disesuaikan dengan kebutuhan siswa yang terus berkembang di lanskap pendidikan yang ditransformasi secara digital.
Penerapan Framework COBIT 2019 Pada Infrastruktur Teknologi Informasi (Studi Kasus STIMIK Tunas Bangsa Banjarnegara) Zubaedi, Umam Faqih; Muhammad, Alva Hendi; Hanafi, Muhammad
Smart Comp :Jurnalnya Orang Pintar Komputer Vol 14, No 1 (2025): Smart Comp: Jurnalnya Orang Pintar Komputer
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/smartcomp.v14i1.7158

Abstract

Tata kelola teknologi informasi pada infrastruktur TI di kampus merupakan aspek penting untuk memastikan bahwa penggunaan teknologi informasi mendukung tujuan pendidikan dan administrasi. Pada penelitian ini,menggunakan COBIT 2019 untuk dapat mengetahui sejauh mana kampus mengelola infrastruktur TI dan memastikan pada pengelolaan perubahan TI secara cepat dan terkontrol namun tidak mengganggu layanan infrastruktur TI. Pengumpulan data dilakukan menggunakan metode observasi dan kuesioner yang dilakukan di kampus STIMIK Tunas Bangsa Banjarnegara. Dari hasil yang ditemukan terdapat pemilihan domain sebagai fokus utama yaitu domain BAI06 (Manage IT Changed) yang menghasilkan nilai capability level sebesar 2,75 sehingga dapat di simpulkan menjadi level 3. Hasil tersebut menunjukan bahwa tingkat kapabilitas sudah baik, namun terdapat beberapa aspek yang perlu ditingkatkan seperti sub domain BAI06.02, BAI06.03, dan BAI06.04. Penelitian ini merekomendasikan untuk proses perbaikan dan pengendalian sehingga mencapai target yang diharapkan yaitu level 4.
Prioritas Investasi Keamanan Informasi Menggunakan Analytic Network Process (ANP) Bagi Pemerintah Daerah Provinsi Kalimantan Tengah Haris, Ruby; Muhammad, Alva Hendi; Nasiri, Asro
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 11 No 6: Desember 2024
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.1169245

Abstract

Keamanan informasi menjadi fokus utama bagi Pemerintah Daerah Provinsi Kalimantan Tengah, terutama dalam menghadapi ancaman siber yang semakin kompleks. Walaupun telah ada inisiatif dari Pemerintah Pusat seperti Indeks Keamanan Informasi (KAMI) yang diperkenalkan oleh Badan Siber dan Sandi Negara (BSSN), implementasi di tingkat daerah masih dihadapkan dengan berbagai tantangan. Kendala utama yang dihadapi adalah terbatasnya anggaran, kekurangan sumber daya manusia yang berkualitas, serta rendahnya kesadaran tentang pentingnya keamanan informasi. Penelitian ini menghipotesiskan bahwa dengan penerapan metode Analytic Network Process (ANP), Pemerintah Daerah dapat lebih efektif menentukan prioritas dalam investasi keamanan informasi, sehingga risiko ancaman siber dapat diminimalkan secara signifikan. Solusi yang diusulkan adalah penggunaan metode ANP untuk menangani hubungan antar kriteria yang saling terkait dan memberikan panduan prioritas yang komprehensif antara aspek teknologi, sumber daya manusia, dan kebijakan. Survei dilakukan terhadap pengambil keputusan dan pengelola teknis terkait keamanan informasi. Hasil penelitian menunjukkan bahwa pengambil keputusan lebih memprioritaskan kerangka kerja manajemen keamanan informasi, sementara pengelola teknis lebih fokus pada aspek teknologi. Penelitian ini diharapkan dapat membantu Pemerintah Daerah dalam merumuskan strategi investasi yang lebih efektif untuk meningkatkan keamanan informasi dan melindungi data sensitif di wilayah Pemerintah Provinsi Kalimantan Tengah.   Abstract Information security has become a primary focus for the Regional Government of Central Kalimantan Province, especially in facing increasingly complex cyber threats. Although there have been initiatives from the Central Government, such as the Information Security Index (KAMI) introduced by the National Cyber and Crypto Agency (BSSN), implementation at the regional level still faces various challenges. The main obstacles encountered are limited budgets, a shortage of qualified human resources, and a lack of awareness about the importance of information security. This study hypothesizes that by applying the Analytic Network Process (ANP) method, the Regional Government can more effectively prioritize investments in information security, thereby significantly minimizing cyber threat risks. The proposed solution is to use the ANP method to manage interrelated criteria and provide a comprehensive priority guide between technological, human resource, and policy aspects. Surveys were conducted with decision-makers and technical managers related to information security. The results of the study show that decision-makers prioritize the information security management framework, while technical managers focus more on technological aspects. This research is expected to assist the Regional Government in formulating more effective investment strategies to improve information security and protect sensitive data within the Central Kalimantan Provincial Government's jurisdiction.
Co-Authors Abdul Latif Adhien Kenya Estetikha Aditama, Galih Agung Harimurti, Agung Agus Purwanto Ahmad Yusuf Alif Syaiful Huda Ananda Fikri Akbar Andi Sunyoto Anggit Dwi Hartanto Anggrainy, Shynta Eza Annisa Hestiningtyas Apriadi, Frans Nilwan Arief Rahman Hakim Arief Setyanto Arif Baktiar Ariningsih, Puji Arta Perdana, Bagus Gede Asro Nasiri Asro Nasiri A’yuni, Ashlih Qurota Baiq Yulia Fitriyani Bambang Soedijono Bambang Soedijono W.A Bambang Soedijono W.A Bambang Soedijono, Bambang Bernadhed, Bernadhed Budi, Ilham Setya Candra Aditya Pinuyut Chaedar Fatach, Muhamad Reza Cynthia Widodo Danu Prawira Utama DHANI ARIATMANTO Dhani Ariatmanto Eka Sakti, Putra Utama Eko Pramono Ema Utami Fauzi, Moch Farid Fitriyani, Baiq Yulia Hadiwinata, Sofian Dwi Harahap, Muhammad Sya'ban Hari Susanto Haris, Ruby Hasan, Nurul Rahmawati Hasibuan, M. Rivai Hewen, Maria Beliti Irawan, Hafizhan Irawan, Ridwan Dwi Irwan Oyong Jangkung Tri Nygroho Jeki Kuswanto Joko Dwi Santoso kurniawan, Ade Kurniawan Kusnawi Kusnawi Kusrini Kusrini Kusrini Kusrini Kusrini, K Kusrini, Kusrini Lubna Lubna Maradona, Maradona Muh Adha Muhamad Rodi Muhammad Hanafi Muhammad Imam Munandar Muhartini, Sitti Muktafin, Elik Hari Nadya Chitayae Nasiri, Asro Novel Adil Dwijaksana Nugroho, Hanantyo Sri Nur Aziz Nugroho Prasetya, Bismar Rifki wahyu Prasetya, Rendra Prima Giri Pamungkas Putra Utama Eka Sakti Raynold, Raynold Razaq, Thata Authar Rifqi Anugrah Rosady, Melinne Maldini Saputra, Mahmuda Simanjuntak, Nurcahaya Suparyati Suparyati Suseno, Hari Budhi Taryoko Taryoko TONNY HIDAYAT Ula, M. Izul Wahyunia Ningsih Syam Wiwi Widayani, Wiwi Yossy Ariyanto Zakiri, Hasani Zitnaa Dhiaaul Kusnaa Washilatul Arba'ah Zitnaa Dhiaaul KWA Zubaedi, Umam Faqih