Claim Missing Document
Check
Articles

Found 20 Documents
Search

PEMODELAN SISTEM UNTUK APLIKASI PENGELOLAAN PEMBERIAN DANA BANTUAN WARGA MISKIN DI JAKARTA Ita Novita; M. Anif
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 9, No 1 (2012): APRIL 2012
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (497.143 KB) | DOI: 10.36080/bit.v9i1.493

Abstract

There is a problem with the unavailability of information on grant management for supporting poor people in Jakarta. This information on grant should be in terms of information on location area, where the poor people will receive assistance, how much they need and the form of grant the poor people expected. Therefore, application of this information should be developed in order to support all application of the grant. The first important step is to develop a good modeling system which produces integrated application in order to avoid error in applying the system. The modeling system is using object oriented approach by using Unified Modeling Language (UML). This technique modeling system will be realized in the form of case study which is a system modeling for application of grant management for poor people in Jakarta. The result of this modeling system is only to get the database which further can be used for developing application software. The software used for this system modeling is Rational Rose Enterprise 2000.Keywords : Poor People, Systems Modeling, Giving Fund, Unified Modeling Language (UML)
Pengamanan Data User Login dengan Algoritma Kriptografi Tea dan Notifikasi SMS Siswanto Siswanto; M. Anif; Ulil Abshor
Prosiding SISFOTEK Vol 2 No 1 (2018): SISFOTEK 2018
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (573.276 KB)

Abstract

Application of user login data security is designed to secure user login user data at PT. TELKOM Indonesia TBK, HSI Division in Minitools application containing data from customer's internet number. The security of user logni data is very vulnerable to the theft of various irresponsible parties that will impact on the manipulation of customer data in the Minitools application. These problems can be encountered by adding applications to prevent irresponsible parties from being able to read passwords from user login data in the database. In addition, by adding SMS notification feature to prevent irresponsible parties are free to use user login data to access and change customer data on Minitools application. In this paper the algorithm used in cryptography, the cryptography algorithm Tiny Encryption Algorithm (TEA). For SMS notification itself, built using Gammu module as a special software aids SMS Gateway, PHP, and also Wavecom GSM M1306B modem. The result of this cryptographic testing, password data can be secured in the form of text encrypted (ciphertext). With the application of data security user cryptographic login and SMS notification for this login system will make the information system more secure because the password will be encrypted and the authentication code to login to the application Minitools sent to the user's mobile number. From the experimental results, the average duration of the encrypt process is 0.08361488 ms and the duration of the descrypt process is 0.166120556 ms. For the average sms the duration is not more than 10 second.
Kendali dan Monitoring Ruang Server dengan Sensor Suhu DHT-11, Gas MQ-2 serta Notifikasi SMS Firdiansyah Firdiansyah; Siswanto Siswanto; Muhammad Anif; Basuki Hari Prasetyo
Prosiding SISFOTEK Vol 3 No 1 (2019): SISFOTEK 2019
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1201.222 KB)

Abstract

If the server room temperature is too hot it will cause damage to the existing hardware in the server room, whereas if the gas threshold is too high it will be able to indicate that a fire has occurred in the server room. One way to maintain the temperature level of 20-21ºC / (68-71ºF) and 350 ppm - 1000 ppm gas levels in the server room is to periodically monitor the temperature and gas content whether it is within the threshold that we specify ... So that if one day there is a deviation temperatures outside the tolerance range can be immediately taken responsive measures. Currently the server administrator must continue to monitor changes in temperature in the server room in stable condition and still manually. Temperature and gas monitoring systems and web-based control using DHT11 sensors and MQ-2 sensors can be one solution to monitor the temperature of the server room so that it is always in a conducive state, so as to minimize the occurrence of excess heat in devices in the server room . If there is a situation where changes in temperature and gas in the server room are detected, the system will send a notification to the user via SMS and automation of the additional air conditioning so that it can stabilize the room temperature again. Thus the temperature and gas of the server room will continue to be maintained and stable in full control by the server administrator without having to continue to be in the server room. The programming language used to create this system is the Arduino programming language whose syntax resembles the C language and for its visual appearance using the PHP programming language and MySQL database. From the observation of 23 days the application trial was able to run and give notification as much as 98% and system failure as much as 2%.
Implementasi Algoritme Profile Matching dan Pengujian UAT Untuk Memilih Karyawan Terbaik Siswanto Siswanto; Recky Juniansyah Asad; Gunawan Pria Utama; Wahyu Pramusinto; M Anif
Prosiding SISFOTEK Vol 4 No 1 (2020): Vol 4 No 1 (2020): SISFOTEK 2020
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (638.725 KB)

Abstract

In supporting the performance or enthusiasm of employees in the regulation department, the company gives rewards or awards to employees who get the title as the best employees in the form of money with a certain nominal value. It is expected that this reward can stimulate the enthusiasm of employees at work. But when assessing employees there are obstacles, including subjective judgments and calculation errors often occur in determining who the employee gets the title of the best employee. The application for selecting the best employees has been made using the profile matching algorithm. In this study using two aspects, namely aspects of performance consisting of speed of work, quality of work, work responsibilities and problem solving and personality aspects consisting of absenteeism, work knowledge, attitude, team work and loyalty. So that the final results of this study in the form of the results of the testing process with the UAT, the respondents agreed (above 91.2%) that overall the application for selecting employees helps the decision maker management in providing the best employee recommendations based on ranking correctly.
Pengamanan File Audio Menggunakan Algoritma Kriptografi Blowfish Dan Pengujian UAT Siswanto; Farizal Dias Amsari; Basuki Hari Prasetyo; Wahyu Pramusinto; Gunawan Pria Utama; M. Anif
Prosiding SISFOTEK Vol 5 No 1 (2021): SISFOTEK V 2021
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (506.2 KB)

Abstract

The current problem at PT. Central Asia Insurance is data or information from meeting recordings that have been made without security so that the resulting data is leaked and can be published by unauthorized persons. This study aims to secure the results of the meeting in the form of audio that will be sent to the branch of PT. Central Asia Insurance using blowfish cryptographic algorithm and UAT testing. Therefore, I created an encryption application to secure the audio from the meeting at PT. Central Asia Insurance. The goal is to prevent irresponsible people from being able to know the results of the meeting directly because the Audio file has been encrypted. By making this application, it can guarantee the audio file of the meeting at PT. Central Asia insurance can be accepted by people who are entitled and have keys. The final result of this research is that this application is able to encrypt audio files with a maximum data size of 120 Mb. Based on trials carried out as many as 15 encrypted files, the encrypted file size becomes large with an average value of 12,009,507 bytes and an average encryption process time of 37.0 seconds while the decryption time is 52.2 seconds. So that the files obtained can be protected and can only be accessed by users who have a password lock. In the UAT test, a questionnaire with a Likert scale scale of 5. has been used. As a result, the respondents agree (above 91.23%) that the overall application of the blowfish algorithm to secure data files can be kept confidential.
Identify the Color and Shape of Eggplant Using Back Propagation Method Siswanto; Yuhefizar; M. Anif; Basuki Hari Prasetyo; Ari Saputro
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 6 No 5 (2022): Oktober 2022
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v6i5.4453

Abstract

Currently, artificial neural networks are being developed as a tool that can help with human tasks. The main purpose of this study is to identify the structure of an eggplant, and to distinguish the type of eggplant. This study empirically tested the shape and color of several eggplants using the back propagation neural network learning method. The data is obtained from an image that will be entered into the program. The data used in the identification process are two photos containing two types of eggplant, the first eggplant is green and round and the next eggplant is purple and oval. The results of the identification process using this backpropagation from the tests that have been carried out previously, the highest calculation results obtained with the best results using a learning rate of 0.7 and epoch iterations of 500 and producing an accuracy of 73.33%.
Identification of Color and Texture of Ripe Passion Fruit with Perceptron Neural Network Method Siswanto; Riefky N. Sungkar; M. Anif; Basuki Hari Prasetyo; Subandi; Ari Saputro; Buana Suhurdin Putra
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 7 No 1 (2023): February 2023
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v7i1.4612

Abstract

Research using artificial neural network methods has been developed as a tool that can help human tasks, one of which is for passion fruit UMKM entrepreneurs. The problem so far that has been faced by UMKM entrepreneurs of passion fruit is that it is difficult to identify ripe passion fruit with sweet and sour taste, because there are 6 colors of passion fruit and the color of passion fruit skin is visually slightly different, as well as the texture of maturity. The main purpose of this study was to identify the color structure and texture of the ripeness of passion fruit, in order to recognize the color and texture of the ripeness of passion fruit which is good for processing into syrup, jam, jelly, juice, passion fruit juice powder by entrepreneurs of UMKM of passion fruit. This study empirically tested the color and texture of the ripeness of 10 passion fruit using the perceptron artificial neural network learning method. The data is obtained from an image that will be entered into the program. The results of the identification process using the perceptron artificial neural network from the tests that have been carried out previously, the highest calculation results obtained with the best results using a learning rate of 0.8 and 500 epoch iterations and producing an accuracy of 80%.
SISTEM PENUNJANG KEPUTUSAN UNTUK MENENTUKAN KAUM DUAFA DENGAN FUZZY INFERENCE SYSTEM (FIS) METODE TSUKAMOTO Nur Ajianto Pratomo; Mufti Mufti; Muhammad Anif
Telematika MKOM Vol 9, No 1 (2017): Jurnal Telematika MKOM Vol. 9 No. 1 Maret 2017
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (6826.151 KB)

Abstract

Pengambilan keputusan dalam pemilihan anggota duafa membutuhkan waktu yang tidak sedikit. Dalam pengolahan data calon anggota duafa yang dimiliki oleh Yayasan Masjid Imam Bonjol harus benar-benar sesuai dengan ketentuan yang ditetapkan. Proses untuk pemilihan anggota duafa harus tepat, akurat dan berkualitas.Untuk dapat mencapai hasil yang diharapkan adalah untuk mendapatkan anggota duafa yang sesuai dengan kriteria atau standar yang ditetapkan. Tetapi proses pemilihan dan pengolahan data calon anggota duafa terkadang masih menggunakan teknik manual yang akan membutuhkan waktu yang lebih lama. Seiring dengan perkembangan teknologi saat ini yang dapat diatasi dengan pembentukan sistem yang dapat membantu masjid dalam pengambilan keputusan dengan menggunakan Sistem Penunjang Keputusan atau Decision Support System (DSS) dimana sistem ini menyediakan fasilitas untuk melakukan proses analisis sehingga setiap keputusan yang dibuat berdasarkan kriteria yang ada. Metode yang digunakan dalam penelitian ini adalah dengan menggunakan Fuzzy Inference System (FIS) Metode Tsukamoto. Penelitian ini diharapkan dapat memberikan kemudahan dan efisiensi pengolahan data dalam pemilihan anggota duafa. Berdasarkan penelitian yang telah dilakukan, dapat disimpulkan bahwa FIS Metode Tsukamoto dapat digunakan dalam proses penyeleksian terhadap calon anggota duafa, dan hasil keputusan yang dihasilkan bersifat objektif.
Pemberdayaan Guru SMP Pelita Bangsa Pamulang Penggunaan dan Pengelolaan Learning Management System Siswanto; Gunawan Pria Utama; Wahyu Pramusinto; M. Anif; Ari Saputro; Yuliazmi; Basuki Hari Prasetyo
Jurnal Pengabdian kepada Masyarakat TEKNO (JAM-TEKNO) Vol 2 No 2 (2021): Desember 2021
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Pelita Bangsa Education Foundation carries out activities in the religious, social and humanitarian fields. In the social sector established formal and non-formal educational institutions from early childhood education to higher education, including Junior High School. So far the problems with PKM partners are: Pelita Bangsa Pamulang Junior High School teachers do not have trainers to provide Learning Management System knowledge (LMS), and does not have LMS facilities to manage and upload e-learning teaching modules, and does not have the knowledge of LMS in managing and uploading fun teaching modules. The purpose of this training is to empower the Junior High School teachers to use and manage the LMS, so that teachers can deliver teaching modules that are fun, interesting, more interactive and not boring for students who are educated. With multimedia devices, manage and upload e-learning teaching modules with computers based on the LMS. The culmination of this community service activity is the development of the LMS in the form of information technology resource persons and computer training instructors for the preparation of LMS content, and the LMS training which has been carried out from January 8, 2021 to June 19, 2021, which was conducted offline taking into account the security and health conditions due to the Covid-19 pandemic. In the UAT test, a questionnaire with a Likert scale scale of 5. was used. As a result, the respondents agreed (above 86.1%) that the overall teacher empowerment training to use and management of the LMS is interesting and understanding.
Pemberdayaan Guru SD Pelita Bangsa Pamulang Penggunaan dan Pengelolaan Learning Management System Siswanto; Gunawan Pria Utama; M. Anif; Ari Saputro; Basuki Hari Prasetyo
Jurnal Pengabdian kepada Masyarakat TEKNO (JAM-TEKNO) Vol 3 No 1 (2022): Juni 2022
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Yayasan Pendidikan Pelita Bangsa (YPPB) menjalankan kegiatan di bidang keagamaan, bidang sosial, bidang kemanusiaan. YPPB di bidang sosial mendirikan lembaga pendidikan formal dan non formal dari pendidikan anak usia dini hingga perguruan Tinggi termasuk Sekolah Dasar (SD). Selama ini permasalahan mitra PKM adalah: guru-guru SD Pelita Bangsa Pamulang tidak memiliki tenaga pelatih untuk memberikan pengetahuan Learning Management System (LMS), SD Pelita Bangsa Pamulang tidak memiliki fasilitas LMS untuk mengelola dan mengupload modul mengajar secara e-learning dan guru-guru SD Pelita Bangsa Pamulang tidak memiliki pengetahuan LMS dalam mengelola dan mengupload modul mengajar yang menyenangkan. Tujuan dari pelatihan ini adalah memberikan pemberdayaan guru SD Pelita Bangsa Pamulang penggunaan dan pengelolaan LMS pada YPPB di Kota Tangerang Selatan, sehingga guru-guru dapat menyampaikan modul mengajar yang menyenangkan, menarik, lebih interaktif dan tidak membosankan. Dengan perangkat multimedia, mengelola dan mengupload modul mengajar secara e-learning dengan komputer yang berbasis LMS. Kegiatan ini untuk guru-guru SD, adapun puncak dari kegiatan pengabdian kepada masyarakat ini adalah pengembangan LMS berupa nara sumber teknologi informasi dan instruktur pelatihan komputer penyusunan konten LMS, dan pelatihan pengelolaan LMS yang telah dilaksanakan dari tanggal 21 Agustus 2021 sampai 18 Desember 2021, yang dilakukan secara offline dengan mempertimbangkan kondisi keamanan dan kesehatan akibat pandemi Covid-19. Pada pengujian UAT, telah digunakan kuesioner dengan likert scale skala 5. Hasilnya, para responden setuju (di atas 70.9%) bahwa secara keseluruhan pelatihan pemberdayaan guru SD Pelita Bangsa Pamulang penggunaan dan pengelolaan LMS yang diberikan kepada Ketua Yayasan dan guru-guru SD Pelita Bangsa Pamulang Kota Tangerang Selatan menarik dan paham.