Claim Missing Document
Check
Articles

Pengembangan Sistem Presensi Menggunakan Quick Response Code Dinamis untuk Madrasah Aliyah Al Mukhlisin Bandung Erwin Susanto; Doan Perdana; Arif Indra Irawan; Rahmat Yasirandi
Jurnal Rekayasa Elektrika Vol 15, No 2 (2019)
Publisher : Universitas Syiah Kuala

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17529/jre.v15i2.13769

Abstract

QR Code is the development of barcode technology that is able to store various kinds of information such as URLs, telephone numbers, SMS messages or other texts. At first, this technology was used for tracking vehicle parts in automotive industry. This study aims to develop an automatic presence system by utilizing QR Code technology, so that the presence process is more effective when compared to the presence manually since it was using digital technology. The implementation of the presence system with a QR Code was carried out at the Madrasah Aliyah Al Mukhlisin Bandung, to help solving some problems in school administration. The system was built in the form of an application installed on each teacher’s smartphone. Every student tapped their QR code image to confirm their attendance before the lesson begins. The advantage of this application was that it has an advantage on generated image of QR Code changed every user login. The results of development and testing showed that the developed system can be a solution for the presence process through the application of ICT technology with a QR Code. Testing of Quality of Service (QoS) on developed system was appropriate with ITU recommendation. Survey of users was applied to check the properness of application.
Malware Detection pada Static Analysis Windows Portable Executable (PE) Menggunakan Support Vector Machine dan Decision Tree Mohammad Mirza Qusyairi; Rio Guntur Utomo; Rahmat Yasirandi
Computer Science Research and Its Development Journal Vol. 15 No. 2: June 2023
Publisher : LPPM Universitas Potensi Utama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Malware has become a major issue for computer system security today. Due to its ability to spread rapidly and negatively impact system performance, malware detection becomes crucial. One of the methods for malware detection is performing classification using Machine Learning, which learns the variable values of an application without executing it. In this study, the author evaluates the method of malware detection in the static analysis of Windows Portable Executable (PE) using Support Vector Machine (SVM) and Decision Tree. The author uses a dataset of PE files related to malware and safe applications from malware Using SVM and Decision Tree algorithms to classify the PE files as malware or not, determining the best machine learning algorithm for malware detection in PE files.
INFORMATION SECURITY POLICY AND SOP AS THE ACCESS CONTROL DOCUMENT OF PT. JUI SHIN INDONESIA USING ISO/IEC 27002:2013 Sukmaji, Muhammad; Yasirandi, Rahmat; Makky, Muhammad Al
Jurnal Pilar Nusa Mandiri Vol 17 No 2 (2021): Pilar Nusa Mandiri : Journal of Computing and Information System Publishing Peri
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v17i2.2282

Abstract

PT. Jui Shin Indonesia as the research population is a company engaged in the ceramics, granite, and cement industry. The existence of important assets owned by the company can not be denied the threat that will occur in these important assets. The importance of a company's assets, then the company must maintain the security of assets with various efforts. The security that must be maintained in this study is the security of information related to accessing control of important assets of the company. The purpose of this research is to analyze and design policy documents and SOP (Standard Operating Procedure) access control related to information security. This is done to minimize the risk that occurs in important assets of the company. The method used in this study is the OCTAVE method as a method of identification against risks that will occur in important assets of the company and the FMEA method as a method of risk analysis against the risk that has been identified through the OCTAVE method. The final result of this study is the creation of policy documents and access control SOPs related to information security which refers to the ISO/IEC 27002:2013 framework that focuses on clause 9. Access Control. Based on the results of the study, the researchers received proposals for policy document-making and SOPs as much as, namely, 17 for policy document-making and 18 for the creation of SOP documents.
The acceptance model for camera simulators as a learning media for Indonesian vocational student Suwastika, Novian Anggis; Masrom, Maslin; Qonita, Qori; Yasirandi, Rahmat; Nuha, Hilal Hudan
International Journal of Evaluation and Research in Education (IJERE) Vol 13, No 5: October 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijere.v13i5.29011

Abstract

This study investigates the acceptance of camera simulator technology as a learning media by Indonesian vocational high school (VHS) students and examines the relationships among influencing factors. It proposes an acceptance model integrating the technology acceptance model (TAM) 3 and the unified theory of acceptance and use of technology (UTAUT). Ten factors impacting technology acceptance were identified, resulting in the formulation of 15 hypotheses regarding inter-construct relationships. In this empirical study, a quantitative approach was employed, distributing questionnaires to 200 students at Public Vocational High School 10 in Bandung, specializing in broadcasting and filmmaking programs. After analyzing 145 valid responses, the study progressed in two stages: the measurement model and the structural model. The evaluation of the measurement model confirmed the validity of all indicators and constructs, ensuring compliance with the established standards. In the structural model evaluation, one construct (computer anxiety) and four inter-construct relationships were excluded. This research enhances our understanding of factors influencing camera simulator technology acceptance among VHS students in Indonesia, shedding light on the complexities of their decision-making process in adopting this educational tool.
Exploring Trust, Privacy, and Security in Cloud Storage Adoption among Generation Z: An Extended TAM Approach Utomo, Rio Guntur; Yasirandi, Rahmat
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 9, No. 4, November 2024
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v9i4.2009

Abstract

The incorporation of cloud storage technology holds the promise of significantly enhancing efficiency in various sectors, particularly from the perspective of Generation Z, a demographic known for its meticulous consideration of technology acceptance factors, especially security. This research thoroughly examines the level of acceptance of cloud storage technology among Generation Z. By augmenting the Technology Acceptance Model (TAM) with five core factors and introducing three novel factors—Perceived Security, Perceived Privacy, and Trust—this study not only adheres to traditional acceptance models but also ventures into uncharted territories, marking a significant contribution to understanding technology acceptance. This study meticulously collected data from 408 Generation Z respondents who actively use cloud storage technology, employing an innovative questionnaire disseminated via an online platform. Through sophisticated PLS-SEM data analysis, the study confirmed the positive and significant impact of all tested hypotheses, underscoring the importance of attitudes, perceived benefits, and usability in fostering the intention to use cloud storage. Notably, the added dimensions of privacy and security emerged as critical in enhancing users' trust in cloud storage solutions. Furthermore, this study paves the way for future explorations into technology acceptance across diverse populations and settings, underscoring the critical role of security and privacy in shaping technology adoption decisions among emerging generations.
Implementasi Teknologi dan Proses Produksi Biogas Sebagai Pengendalian Limbah di Area RRA Zaky Jacoeb , Yusoff; Yasirandi, Rahmat; Mirza Qusyairi, Mohammad
eProceedings of Engineering Vol. 12 No. 1 (2025): Februari 2025
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak - Tugas Akhir ini bertujuan untuk mengembangkan metode pengolahan sampah organik menjadi biogas di Area RRA (Reduce, Reuse, Recycle Area) dan menerapkan teknologi monitoring gas metana, ultrasonik, dan suhu untuk memantau proses produksi biogas secara real-time. Penelitian ini melibatkan pengembangan alat produksi biogas dan alat monitoring, implementasi, pengujian, dan analisis hasil. Hasil penelitian ini diharapkan dapat meningkatkan efisiensi operasional biodigester dan mengurangi pencemaran lingkungan dengan menggunakan teknologi biogas. Dalam upaya untuk memaksimalkan efisiensi dalam pengoperasian biodigester, diperlukan teknologi yang mampu memantau berbagai parameter penting secara real-time. Salah satu teknologi yang digunakan adalah teknologi monitoring gas metana, ultrasonik, dan suhu. Teknologi ini memiliki peran krusial dalam menghitung kadar gas metana yang dihasilkan, mengukur ketinggian air di dalam biodigester, serta memantau suhu operasional. Dengan adanya teknologi monitoring yang canggih ini, operator biodigester dapat memastikan bahwa proses fermentasi berlangsung secara optimal, serta mencegah terjadinya kondisi berbahaya akibat akumulasi gas metana atau perubahan suhu yang drastis. Kata kunci: Biogas, IoT, Teknologi Monitoring, ESP8266, MQ-4, HC-SR04, DS18B20, Blynk
Malware Detection pada Static Analysis Windows Portable Executable (PE) Menggunakan Support Vector Machine dan Decision Tree Qusyairi, Mohammad Mirza; Rio Guntur Utomo; Rahmat Yasirandi
CSRID (Computer Science Research and Its Development Journal) Vol. 15 No. 2: June 2023
Publisher : LPPM Universitas Potensi Utama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22303/csrid-.15.2.2023.93-102

Abstract

Malware has become a major issue for computer system security today. Due to its ability to spread rapidly and negatively impact system performance, malware detection becomes crucial. One of the methods for malware detection is performing classification using Machine Learning, which learns the variable values of an application without executing it. In this study, the author evaluates the method of malware detection in the static analysis of Windows Portable Executable (PE) using Support Vector Machine (SVM) and Decision Tree. The author uses a dataset of PE files related to malware and safe applications from malware Using SVM and Decision Tree algorithms to classify the PE files as malware or not, determining the best machine learning algorithm for malware detection in PE files.
The adoption of online food delivery in facing COVID-19 among the Indonesian food MSMEs Yasirandi, Rahmat; Thanasopon, Bundit
Bulletin of Electrical Engineering and Informatics Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i3.8712

Abstract

This study investigates the factors influencing the Indonesian food micro, small, and medium enterprises (MSMEs) in adopting online food delivery (OFD) during the corona virus disease-2019 (COVID-19) pandemic, by employing the technology-organization-environment (TOE) framework. Through a quantitative approach involving 378 respondents, this research explores the multi-dimensional factors affecting OFD service adoption, there are innovation compatibility, innovation complexity (IC), innovation cost, owner’s self-efficacy, owner’s commitment, customer pressure (CSP), competitive pressure (CMP), government support (GS), and health protocol guarantee. Employing covariance-based structural equation modeling (CBSEM), the study reveals interesting relationships among the proposed factors. The findings underscore the role of GS and health protocol guarantees in enhancing owner's self-efficacy and commitment towards OFD adoption. Moreover, it challenges the presumed barriers of IC, suggesting a nuanced understanding of adoption process amid a crisis. This study not only enriches the theoretical discourse on technology adoption in the context of a pandemic but also provides practical implications for stakeholders in navigating the post-pandemic business landscape. Future research directions are proposed to explore the continuous intention of food MSMEs towards OFD services postpandemic, highlighting the evolving nature of the global business environment and the enduring impact of the COVID-19 pandemic on food industries.
IT Risk Management dalam Operasional untuk Peningkatan Layanan Informasi Pesanan Yasirandi, Rahmat; Rakhmatsyah, Andrian
Krea-TIF: Jurnal Teknik Informatika Vol 9 No 2 (2021)
Publisher : Fakultas Teknik dan Sains, Universitas Ibn Khaldun Bogor

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32832/kreatif.v9i2.5982

Abstract

Seharusnya dampak risiko IT yang timbul pada operasional di sebuah organisasi yang terjadi tidak bisa diabaikan begitu saja. Tak terkecuali yang sering terjadi pada restoran atau kafe. Masalah operasional yang sering ditemui adalah masalah jaminan informasi terkait pelayanan. Karena mempengaruhi tingkat kepercayaan pelanggan terhadap setiap layanan yang diberikan pihak restoran atau kafe. Setelah dilakukan manajemen tersebut, ternyata didapat bahwa kepercayaan pelanggan terkait jaminan informasi dapat diturunkan lagi menjadi 2 problems research yaitu terkait informasi yang pasti mengenai informasi status layanan, dan yang kedua terkait informasi seberapa cepat layanan yang akan pelanggan dapatkan. Sehingga di rancanglah sebuah sistem layanan informasi pesanan yang dapat menjamin kepercayaan pelanggan akan layanan informasi untuk setiap prosesnya. sehingga restoran akhirnya dapat mengurangi risiko yang dapat terjadi pada operasionalnya. Dari hasil mitigasi telah menghasilkan evaluasi bahwa risiko R2, R3, R4, R5, R6, dan R7 telah berhasil di mitigasi dengan hasil Eliminate. Dan untuk R1 dengan hasil Reduce. Dari hasil ini disimpulkan bahwa sistem yang diusulkan sebagai sebuah mitigation action plan telah terbukti dapat memitigasi risiko operasional terkait proses pesanan.
Customer satisfaction of urban farming application services: e-Buruan Sae Sukarno, Parman; Utomo, Rio Guntur; Yasirandi, Rahmat; Suwastika, Novian Anggis
JURNAL INFOTEL Vol 14 No 4 (2022): November 2022
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v14i4.846

Abstract

This study evaluates the customer satisfaction model in adopting the Web 2.0-based e-Buruan Sae application. The e-Buruan Sae application is an interactive Web 2.0-based application used by the government and the people of Bandung City to manage urban farming activities. This research is quantitative correlational research and applies a research method based on Design Research Methodology (DRM). The stages of this research are the literature review stage with the output of research objectives, the initial empirical analysis stage with the outputs of the hypothesis and research model, the experimental stage for data collection, and the final empirical analysis stage with the output of the data analysis results. This study uses six variables to measure customer satisfaction: ease of use, service quality, interactivity, trust, customer satisfaction, and IT development. The results of empirical testing show that the ease of use and IT development variables do not affect the customer satisfaction variable. In contrast, the remaining variables have a positive effect on customer satisfaction. This research produces measurements to evaluate customer satisfaction on the Web 2.0-based urban farming application.
Co-Authors Aji Gautama Putrada Alifudin, Ridhwan Andrian Rakhmatsyah Annisa Gustien Widowati Annisa Marwa Nursantoso Anom, Rahmat Indira Pratama Anwar, Muhlis Arif Indra Irawan Ariq Musyaffa Ramadhani Armadyana, Raihan Arrauf, Moh Fawwaz Arya Mandalika, Mohamad AS, Andi Annisa Shalsa Hardiyanti Azizah, Ainun Cintya Risquna Risquna Danu Fawwaz Gimnastian Devani Adi Permana Dhiaulhaq, Afif Dita Oktaria Doan Perdana Dwi Olyvia, Asyfa Emiya Fefayosa Br Tarigan Endro Ariyanto Erlandya, Moch Rizky Gumelar Erwin Susanto Febrianti, Amalia Rizki Guntur Utomo, Rio Hamzah Misbachul Adlan Hilal Hudan Nuha Irvan Naufali Rahmanto Isa Mulia Insan Jati Hiliamsyah Husen Jati, Riyan Kuncoro Joel Andrew M. K. Ginting Kailla, Kimberly Krisna Ardhi Tama Ladkoom, Kobthong M Alvie Helmuzar M. Deta Gian Faiz Maman Abdurohman Maslin Masrom Maulidatul Aulia Zahib Mirza Qusyairi, Mohammad Mohammad Mirza Qusyairi Muhammad Aditya Tisnadinata Muhammad Al Makky Muhammad Faris Ruriawan Muhammad Johan Alibasa Muhammad Karoma Yuda Muhammad Kukuh Alif Lyano Muhammad Rizki Adiwiganda Nafisa, Falea Amira Nasruddin, Itsna Siha Arzaqi Adma Novian Anggis Suwastika Nuha, Hilal H Parman Sukarno Prabowo, Hans Pratama Anom, Rahmat Indra Putra, Revi Raka Qonita, Qori Qusyairi, Mohammad Mirza Qusyairi, Muhammad Mirza Rahmat Irianto Ramadhan, Arga Ridha Muldina Negara Ridhwan Alifudin Rio Guntur Utomo Santiago Paul Erazo Andrade Saputra, Bernadus Ricardo Seiba Shonia Setiawan, Muhammad Faridz Sidik Prabowo Sri Rezeki Stelamaris, Bonefasia Salvatore Sukmaji, Muhammad Susanto, Fauzi Fadhlurrahman Thanasopon, Bundit Thasya Nurul Wulandari Siagian Wajdi, Halim Zahri, Alfitranta Armikha Zaky Jacoeb , Yusoff