Claim Missing Document
Check
Articles

Found 32 Documents
Search

AUDIT TATA KELOLA TEKNOLOGI INFORMASI PADA PERGURUAN TINGGI SWASTA DI SURAKARTA (Studi Kasus: Politeknik Indonusa Surakarta) Dwi Iskandar; Kusrini .; M Rudyanto Arief
Jurnal Informa : Jurnal Penelitian dan Pengabdian Masyarakat Vol 3 No 1 (2017): Juni
Publisher : Politeknik Indonusa Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (117.181 KB) | DOI: 10.46808/informa.v3i1.5

Abstract

Their IT governance in higher education can provide one support to determine the benefits and risks that would be obtained. Audit of information technology governance in Politeknik Indonusa Surakarta conducted to assess, ascertain, find out what the cause and provide recommendations on the application of information technology in polytechnics indonusa Surakarta. To evaluate an information technology must use a tool such as the framework and framework used is COBIT 5, because the problem is also related to the management area contained in the framework.In this research for problem resolution will refer to the Standard Framework COBIT 5 with Of Enterprise IT Management of area and more focused on domain MEA (Monitor, Evaluate and Assess) on the control objective is MEA01 - Monitor, Evaluate, and Assess Performance and Conformance. Scope of IT governance is SIAKAD (Sistem Informasi Akademik), SIMANTA (Sistem Informasi Manajemen Tugas Akhir).The study provides, among others, the level of ability (Capability Level) the application of information technology today, obstacles in the implementation of IT, as well as provide recommendations can be given with regard to the use of IT.
EVALUASI PENGUKURAN TINGKAT KEMAMPUAN DALAM PENERAPAN TEKNOLOGI INFORMASI (Studi Kasus: Politeknik Indonusa Surakarta) Dwi Iskandar
Jurnal Informa : Jurnal Penelitian dan Pengabdian Masyarakat Vol 3 No 2 (2017): Desember
Publisher : Politeknik Indonusa Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (74.648 KB) | DOI: 10.46808/informa.v3i2.15

Abstract

Politeknik Indonusa Surakarta telah mengimplementasikan TI pada SIM Penjaminan Mutu. SIM Penjaminan Mutu bisa membantu dalam proses membantu memberikan penilaian terhadap borang akreditasi program studi maupun borang akreditasi perguruan tinggi. Salah satu tujuan dari penelitian ini adalah memberikan penilaian terhadap tingkat kemampuan dalam penerapan teknologi informasi. Metode yang digunakan dalam penelitian ini adalah survey research, pengumpulan data berdasarkan data primer dan sekunder. Framewok yang digunakan adalah COBIT 5 pada domain MEA01.01 Establish a monitoring approach, MEA01.02 Set performance and coformance targets, MEA01.03 Collect and process performance and conformance data. Hasil pengolahan data dari responden menunjukan proses MEA01.01, MEA01.02 dan MEA01.03 dengan nilai rata-rata 2.55,tingkat kematangan pada proses MEA01.01 berada pada level 2 dengan nilai 2.40, tingkat kematangan pada proses MEA01.02 berada pada level 3 dengan nilai 2.74, tingkat kematangan pada proses MEA01.01 berada pada level 3 dengan nilai 2.51.
DAMPAK PERMAINAN GAME EDUKASI KOMPUTER UNTUK MENGETAHUI PENINGKATKAN MUTU PENDIDIKAN ANAK Dwi Iskandar
Jurnal Informa : Jurnal Penelitian dan Pengabdian Masyarakat Vol 1 No 1 (2015): Juni
Publisher : Politeknik Indonusa Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (59.436 KB) | DOI: 10.46808/informa.v1i1.90

Abstract

Saat ini banyak orang yang sudah mengenal komputer mulai dari balita, anak-anak, remajabahkan dewasa. Dan sekarang juga sangat banyak bentuk dari komputer, orang menggunakankomputer yang pastinya dengan berbagai alasan, mulai dari alasan sebagai alat bantu pekerjaan,media belajar bahkan bisa digunakan sebagai alat bantu untuk bermain game.Dari gagasan tersebut disini penulis ingin melakukan sebuah penelitian yang memilikitujuan untuk mengetahui seberapa besar dampak yang didapat ketika anak-anak yang banyakmenghabiskan waktu bermain (bisa bermain-main dengan teman-teman sebaya di sekolahataupun rumah dengan tidak memanfaatkan waktu yang bisa meningkatkan kemampuan anak)dengan anak yang bisa memanfaatkan sedikit waktu untuk bermain komputer, komputer tablet,smartphone yang didukung dengan Game edukasi maupun game selain edukasi.Penelitian ini dilakukan di TK Khalifah 29 dengan alamat Jl. Ceplok no 2, Mangkuyudan,Solo (0271-713387) dan alamat website www.tkkhalifah-solo.com. Beberapa kesimpulan yangdiperoleh antara lain Sebagian besar peserta didik baik TK A dan TK B sudah mengenal danbisa menggunakan Handphone / Komputer / Komputer Tablet, Anak lebih cenderungberkomunikasi dengan teman dari pada bermain games, Untuk unsur penentu peningkatan mutupendidikan berkaitan games edukasi belum tercantumkan dalam raport siswa, sehingga tidakbisa sebagai pembanding jika anak yang suka bermain games cenderung memiliki nilai yangbaik maupun tidak.
Design and Build Internet of Things Smart Home For Android Based Electronic Equipment Management System Dwi Iskandar; Canggih Ajika Pamungkas; Norma Puspitasari; Muh Alif Fathoni
Jurnal Sisfokom (Sistem Informasi dan Komputer) Vol 11, No 1 (2022): MARET
Publisher : ISB Atma Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32736/sisfokom.v11i1.1231

Abstract

Energy consumption apart from the use of low-power consumption devices, it is also necessary to use energy-saving behavior that supports sustainable energy. Unwise use of electricity will of course have an impact on the high use of electricity, this also affects the depletion of electrical energy supplies because the need for electrical energy is greater than the supply of electrical energy, for that it is hoped that every community understands the efforts to use electricity wisely. Problems faced by households in managing the use of electrical energy include: Not using LED lights (Light Emitting Diodes); Using unnecessary electronic equipment; It is not wise to use equipment that requires electrical energy. The purpose of this research, among others, is how to monitor the use of electrical energy in the household by utilizing IoT and connected to the Android application to make monitoring easier. The contribution given by the researcher is how to combine microcontroller hardware, internet and android applications so that they can support the use of smart homes at home. Research Methodology includes data collection, needs analysis, program development, tool design, testing. Conclusions that can be drawn based on research that has been done include: Smart home that has been made can help turn on and turn off electronic equipment at home, Smart home applications that are made can be connected to the internet network, Smart Home applications can be installed on Smartphones with operating systems Android versions Android 7.0 – 7.1 (Nougat), Android 8.0 – 8.1 (Oreo), Android 9 (Pie), Android 10 (Android Q). For the implementation of using the application, the user must prepare the IoT Smarthome Hardware that has been designed and then connected to the internet. If so, household electronic equipment can be accessed via Android Mobile. In working on the Internet of Things Smart Home For Android, the author follows the path of the Research Methodology.
E-ABSENSI BERBASIS FACE RECOGNITION DI KODEKIDDO SOLO Dwi Iskandar; Norma Puspitasari; Muh Alif Fathoni
I N F O R M A T I K A Vol 14, No 1 (2022): MEI 2022
Publisher : STMIK DUMAI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36723/juri.v14i1.330

Abstract

Absensi memiliki fungsi yang sangat penting dalam dunia pekerjaan. Proses absensi yang dilakukan secara manual dinilai kurang efektif karena terbukanya kesempatan melakukan kecurangan. Selain itu, proses rekapitulasi manual membutuhkan waktu yang lama. Pengenalan wajah manusia (human face recognition) adalah cabang utama dalam bidang verifikasi biometrik selain pengenalan retina mata, sidik jari dan pola tanda tangan. KodeKiddo Solo merupakan perusahaan yang bergerak dibidang jasa belajar coding yang interaktif dan seru untuk anak-anak. Absensi guru dalam KodeKiddo menggunakan google form dan tanda tangan langsung di kantor. Beberapa permasalahan dalam proses absensi diantaranya: kurangnya efisiensi waktu melakukan absen, ketidaksesuaian google form dengan form lembar tanda tangan, belum ada rekap absensi berkaitan dengan penggajian. Tujuan dari sistem ini adalah membuat sistem ini. memudahkan bagi guru untuk melakukan absensi, memantau absensi dan memantau jadwal mengajar, sedangkan bagi admin memudahkan untuk merekap absensi, menghitung gaji dan membuat jadwal mengajar. Metode penelitian yang dilakukan antara lain pengumpulan data meliputi observasi, wawancara, studi pustaka, dan metode pengembangan sistem menggunakan model waterfall yang meliputi analisis kebutuhan, desain, pengkodean, pengujian, pemeliharaan. Hasil yang diperoleh adalah sistem E-Absensi berbasis face recognition yang dapat diakses oleh admin dan guru. Aplikasi website dalam sistem ini diakses oleh admin dan aplikasi android diakses oleh user. Halaman aplikasi face recognition diakses oleh admin dan digunakan guru untuk absensi.
Inventory Information System Integration at CV. XYZ Web-Based Dwi Iskandar; Andre Tantri Yanuar
International Journal of Computer and Information System (IJCIS) Vol 4, No 1 (2023): IJCIS : Vol 4 - Issue 1 - 2023
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v4i1.108

Abstract

A company that utilizes information technology optimally can survive in this global era, because by utilizing information technology companies can access information quickly, precisely and accurately and can provide effective and efficient services. Companies need technological assistance such as an application that can increase customer satisfaction. Service quality needs to get great attention from the company, because service quality has a direct relationship with the company's competitive ability and profit level. The research method used is a descriptive method that collects data systematically. This descriptive research method is supported by the Waterfall model software development method. The conclusions from this study include (1). Implementation of Inventory Information System Integration in CV. XYZ Web-based, (2). Information systems can carry out data input activities, data processing and data reports properly, (3). The information system provides database backup and database restore utilities
Application of Emergency Unit Information Systems to Support Hospital Management Systems Rohmadi Rohmadi; Dwi Iskandar
International Journal of Computer and Information System (IJCIS) Vol 4, No 1 (2023): IJCIS : Vol 4 - Issue 1 - 2023
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v4i1.110

Abstract

The development of technology, especially information technology has penetrated into all fields, one of which is the field of health services. By using information technology, data can be processed more quickly, easily and safely so that services can be provided to the community better and more efficiently. Hospitals as one of the providers of health services for the community, have an obligation to provide quality and affordable health services. The methodology in this study starts from analysis, design, coding, support and test. In the analysis stage an analysis is carried out around non-functional requirements and functional requirements, the design stage includes interface design, table design. The next stage is coding, support and test. The conclusions that can be drawn include that the information system can be implemented properly, before being implemented the system has been tested, the information system can provide good data services to patients, the information system can provide good information regarding action reports and visit reports.
Perancangan Absensi Siswa Berbasis IoT Menggunakan RFID di SMK Muhammadiyah 04 Boyolali Saputro, Rizal Tommy; Iskandar, Dwi
Jurnal Informa : Jurnal Penelitian dan Pengabdian Masyarakat Vol 10 No 1 (2024): Juni
Publisher : Politeknik Indonusa Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46808/informa.v10i1.269

Abstract

Pengelolaan kehadiran siswa merupakan aspek penting dalam administrasi sekolah. Di era digital ini, teknologi Internet of Things (IoT) telah membawa inovasi yang signifikan dalam pengelolaan absensi siswa. RFID (Radio Frequency Identification) merupakan salah satu teknologi yang dapat diimplementasikan untuk mencatat kehadiran siswa secara otomatis, mengurangi risiko kehilangan data, dan meningkatkan efisiensi administrasi. Tujuan dari penelitian ini adalah untuk merancang sistem absensi berbasis IoT menggunakan RFID di SMK Muhammadiyah 04 Boyolali. Metode penelitian yang digunakan adalah metode Agile yang meliputi perencanaan, implementasi, pengujian, dokumentasi, deployment, dan pemeliharaan. Hasil penelitian menunjukkan bahwa sistem ini dapat merekam kehadiran siswa secara otomatis dan menyimpan data ke dalam database dengan baik.
Artificial Intelligence System Integrated With Smartphone Application For Early Detection Of Stunting Based On Toddler Growth Index Iskandar, Dwi; Putri, Frestiany Regina; Kusuma, Junianto Chandra; Saputro, Rizal Tommy
International Journal of Computer and Information System (IJCIS) Vol 5, No 3 (2024): IJCIS : Vol 5 - Issue 3 - 2024
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v5i3.185

Abstract

Toddlers have certain characteristics and needs that require growth monitoring. Toddlers will experience a period called the "Golden age" which is a period of experiencing a golden period in early life. What needs to be considered during the Golden Age of Toddlers is the record of weight, height, and head circumference of the child at each visit, then the results are recorded using the Healthy Menu Card. Collaboration between Artificial Intelligence and IoT can provide innovative and effective solutions, these two fields of science can be collaborated with IoT Sensors for measuring weight and height, data collection and storage, AI systems for data analysis, providing recommendations, notification systems and monitoring. The method used to complete this research is a literature study and data collection to find reference materials, design technology concepts, development preparation, hardware assembly, Arduino IDE coding, uploading coding to hardware, PHP (Hypertext Preprocessor) coding, uploading PHP (Hypertext Preprocessor) Code to hosting, coding .Apk (Android Package), technology trials. This application is available on two platforms, namely web-based and Android. Everyone can weigh, but to record data to the system, users must register to get an account and QR code. QR code is used to transfer weight and height data into the system, and the account allows the user to view all weighing data and history. The system also displays a graph containing height, weight, and upper and lower limits of ideal weight.
Implementation of Base64 and Rot47 Algorithm Combination For Hospital Patient Database Encryption Iskandar, Dwi; Ismail, Suriana; Pamungkas, Canggih Ajika; Susena, Edy
International Journal of Computer and Information System (IJCIS) Vol 3, No 4 (2022): IJCIS : Vol 3 - Issue 4 - 2022
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v3i4.115

Abstract

Abstract—All agency agreed bring data is matter Which very important For protected so that problem security data is matter Which need noticed. Matter Which can done to protect data so that it cannot be misused by others is by use technique cryptography. Cryptography consists of a set of algorithms and techniques For change data become form other so that contents No read and can't explained by Who course that No own authority For read or write data which has been changed. In this study the encryption method used is an algorithm ROT47 to encrypt data where the existing data position will be changed in accordance with amount rotation Which There is, Then data return encrypted use Base64 algorithm which is a scheme of encoding binary data into ASCII code strings in accordance index on Base64. Research results This is Combination ROT47 and Base64 algorithms can be implemented to in system patient database encryption with okAll agency agreed bring data is matter Which very important For protected so that problem security data is matter Which need noticed. Matter Which can done to protect data so that it cannot be misused by others is by use technique cryptography. Cryptography consists of a set of algorithms and techniques For change data become form other so that contents No read and can't explained by Who course that No own authority For read or write data which has been changed. In this study the encryption method used is an algorithm ROT47 to encrypt data where the existing data position will be changed in accordance with amount rotation Which There is, Then data return encrypted use Base64 algorithm which is a scheme of encoding binary data into ASCII code strings in accordance index on Base64. Research results This is Combination ROT47 and Base64 algorithms can be implemented to in system patient database encryption with ok.