Claim Missing Document
Check
Articles

KKN Management Center and Region Development Research Institutions and Community Devotion State University of Yogyakarta Rafika, Ageng Setiani; Faridah, Ida; Sangaji, Aziz Andrean
APTISI Transactions on Management (ATM) Vol 1 No 1 (2017): ATM (APTISI Transactions on Management)
Publisher : Pandawan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (310.567 KB) | DOI: 10.33050/atm.v1i1.658

Abstract

(KKN) is held in Kradenan Hamlet, Srimulyo Village, Piyungan Sub-district, Bantul District, Special Province of Yogyakarta, Real Working Lecture (KKN), Kradenan Hamlet consists of 4 RT. The population of approximately 173 families. The inhabitants of Kradenan are all Muslims, and the majority live as factory workers. The purpose of KKN is in Kradenan Hamlet, to explore, to develop the potential of the Kradenan Hamlet community, and to advance the thinking of the people of Kradenan Hamlet. The Real Work Lecture Program has been implemented in the Kradenan Hamlet pre-trial training and screening of Java-uploaded films. The purpose of the pre-trial training is to explore and develop the potential of Kradenan Hamlet people, and the purpose of holding Javanese uploading films is to give awareness since the early importance of paying attention and doing the uploads to anyone and anywhere. Children are able to understand the pranatacara technique properly and correctly. Children have also started to get used to being in line with the uploads to anyone and wherever they are. Programs held in the right sense are held in Kradenan Hamlet. One of the programs that are in line with the Hamur Hamada people's desires are pre-training training and targeted to adolescents, young people who aim to have the next generation and can open the insight to the community in seeking additional side work. Keywords: KKN, Bantul Regency, Kradenan Village, Srimulyo Village, Piyungan Sub-district, Pranatanacara Training.
AI-Driven Big Data Solutions for Personalized Healthcare: Analyzing Patient Data to Improve Treatment Outcomes Rafika, Ageng Setiani; Faturahman, Adam; Henry, Bintang Nandana; Yulian, Firdaus Dwi; Hassan, Mohammed
CORISINTA Vol 2 No 1 (2025): February
Publisher : Pandawan Sejahtera Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/corisinta.v2i1.61

Abstract

The advent of AI-driven big data solutions has transformed personalized healthcare by enabling the analysis of vast and complex patient datasets to optimize treatment outcomes. This study aims to evaluate the effectiveness of AI models in improving healthcare delivery through enhanced diagnostic accuracy, reduced processing times, and personalized treatment plans. The research utilizes AI models to process extensive patient data from electronic health records, wearable devices, and genetic information. The results show an impressive accuracy rate of 93%, a 25% reduction in diagnostic errors, and significant improvements in patient outcomes, including 72% of patients receiving more accurate diagnoses and 65% experiencing faster recovery. A comparison with traditional methods highlights the advantages of AI in scalability, efficiency, and reliability, offering a clear improvement over existing healthcare approaches. However, challenges such as data bias, ethical concerns, and scalability need to be addressed to en- sure the responsible application of AI in healthcare systems. In conclusion, this research provides valuable insights for healthcare organizations that aim to implement AI-driven solutions, fostering the advancement of patient care and encouraging innovation in the industry. The findings suggest that AI-powered big data solutions have the potential to revolutionize healthcare, improving diagnostic precision and treatment personalization, ultimately enhancing patient satisfaction and outcomes.
Cybersecurity Strategies for Preventing Ransomware Attacks in Cloud-Based Applications Ageng Setiani Rafika; Sora Baltasar; Adiwijaya, Alfri; Riza Chakim, Mochamad Heru; Stefano Rizky, Zhask
CORISINTA Vol 2 No 2 (2025): August
Publisher : Pandawan Sejahtera Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/corisinta.v2i2.77

Abstract

Ransomware attacks have become a significant threat to cloud-based applications, posing severe risks to organizations' data integrity, financial stability, and operational continuity. This paper explores the challenges of securing cloud environments against ransomware, focusing on vulnerabilities such as inadequate encryption, weak access controls, and multi-tenancy risks. Through an in-depth analysis, the paper identifies the most common types of ransomware targeting cloud applications, including file encryption and data exfiltration ransomware, and discusses the security weaknesses that facilitate these attacks. The paper further evaluates existing cybersecurity strategies, such as data encryption, multi-factor authentication (MFA), and continuous monitoring, highlighting their effectiveness in preventing ransomware attacks. Based on these findings, a comprehensive framework is proposed, combining technical solutions like strong encryption and AI-based threat detection with organizational practices such as regular employee training and backup solutions. The study also emphasizes the importance of collaboration between cloud service providers and organizations to enhance overall cloud security. By adopting a multi-layered approach and integrating emerging technologies, organizations can significantly improve their resilience against ransomware threats. This research contributes to the ongoing dialogue on cloud security by providing actionable recommendations for preventing ransomware attacks and safeguarding cloud-based applications from evolving cyber threats.
Optimizing the Potential of 3D Printing for Industry from Prototype to Production Setiawan, Mohamad Agus; Rafika, Ageng Setiani; Ikhsan, Ramzi Zainum; Lutfiani, Ninda; Evans, Richard
ADI Pengabdian Kepada Masyarakat Vol. 6 No. 1 (2025): ADI Pengabdian Kepada Masyarakat
Publisher : ADI Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The adoption of 3D printing technology has increased across various industrial sectors due to its ability to accelerate product development, reduce production costs, and support flexible manufacturing. However, implementation at the community and small–medium industry level remains limited due to gaps in technical skills, digital design knowledge, and structured technology transfer. This community service program aims to enhance the practical capacity of industrial partners in utilizing 3D printing, particularly in transitioning from prototyping to small-scale production. The program used the Participatory Action Research (PAR) approach through needs assessment, technology transfer training, hands-on practice, mentoring, and evaluation. Participants were guided in 3D modeling, printer setup, material selection, and print optimization. The program improved participants technical skills and confidence in producing functional prototypes according to industrial needs. Production time was reduced, design modification became more efficient, and opportunities for product innovation increased, supporting independent and adaptive manufacturing. This program successfully strengthened community-based industrial capabilities in adopting digital manufacturing, contributing to SDG 8 (Decent Work and Economic Growth) and SDG 9 (Industry, Innovation, and Infrastructure). Future activities are recommended to expand collaborative product development and sustain innovation networks between academia and industry.
Learning Effectiveness Using The Ilearning System (Computer Systems Studies Kampus Merdeka Belajar Kampus Merdeka (MBKM) University of Raharja) Ageng Setiani Rafika; Ridho Firdaus; Hendra Kusumah; Padeli; Euis Sitinur Aisyah
International Journal of Cyber ​​and IT Service Management (IJCITSM) Vol. 3 No. 1 (2023): April
Publisher : International Institute for Advanced Science & Technology (IIAST)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study aims to make the learning system more modern and can attract students' interest in learning. The learning system that is meant by computer and smartphone-based, students can learn easily and more efficiently. Of course, this research will be useful in the Computer Systems study program at Raharja University. With the iDu 2.0, the learning system in the Computer Systems study program will become even more efficient. Because there will be many more up to date features that will increase student interest in learning. This research model uses a research and development approach. Data collection techniques used are interviews, observation, questionnaires, and skills tests. To analyze the data used technical SWOT analysis. The results of this study explain that a learning system that develops and can increase students' interest in learning, Uses useful technology. Computers are very useful learning media in the present and the future, which of course computers must continue to grow. Keywords: Intelligent Learning (iLearning), Technology , Mobile Learning, Swot
Security and Privacy Enhancement in Decentralized Digital Data Sharing Environments Muhamad Yusup; Mardiana; Ageng Setiani Rafika; Putra Wahyudi, Otniel Feliks; Agung Lorenzo
APTISI Transactions on Management (ATM) Vol 10 No 1 (2026): ATM (APTISI Transactions on Management: January)
Publisher : Pandawan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33050/vp5s1m02

Abstract

This study examines the suitability of the IPFS as a decentralized architecture for secure digital data exchange. Traditional centralized protocols, such as HTTP, introduce structural vulnerabilities, including single points of failure, metadata exposure, and susceptibility to interception or unauthorized modification. As digital data exchange becomes increasingly essential in various sectors, ensuring data security and privacy has become a growing concern. The primary objective of this study is to evaluate IPFS’s ability to address these vulnerabilities and enhance the security and privacy of digital data-sharing environments. This research employs a structured literature review to synthesize findings from distributed-systems research, cryptographic studies, and peer-to-peer networking analyses. Additionally, the study benchmarks IPFS against traditional storage protocols, such as HTTP and FTP, to assess its advantages and limitations. The results demonstrate that IPFS offers significant advantages, including content-addressed storage, Merkle-DAG verification, and decentralized peer replication. These features improve fault tolerance, ensure data integrity, and reduce the risks of data tampering. However, limitations, such as content availability and reliance on node uptime, are also noted. While IPFS is not a complete security solution, it provides a strong foundational architecture for privacy-preserving, distributed data-sharing workflows when paired with complementary cryptographic and governance frameworks, making it a viable alternative for secure digital data exchange.
Co-Authors . Isdiarto Abdu Roqy Adiwijaya, Alfri Agung Lorenzo Ahmad Roihan Ahmad Roihan, Ahmad Ananda Dian Alifah Andri Ahmad Gozali Andriyansah . Anisa Pujianti Arief Saptono Aris Martono Asep Saefullah Asep Saifudin Asmawati, Ari Budi, Danang Surya Dadi Adriana Dedy Prasetya Kristiadi Dendy Jonas Managas Derry Prasetyo Deviana Ika Putri Dwi Julianingsih Eduard Hotman Purba Erick Febriyanto Euis Sitinur Aisyah Evans, Richard Faridah, Ida Faturahman, Adam Fauzan, Jimmy Ferry Firmansyah Ferry Sudarto Fikrah Syafa’ah Finnike Maysarah Fitroh Diah Widiarti Giandari Maulani, Giandari Gregory, Jesus Gulo, Nitema H. Suhada Hanifah Yunan Putri Hassan, Mohammed Henderi . Hendra Kusumah Hendra Kusumah Henry, Bintang Nandana Hidayati Hidayati Hiroshi Kenta I Gusti Wayan Murjana Yasa Ikhsan, Ramzi Zainum Ilamsyah Ilamsyah, Ilamsyah Imam Aji Santoso jawahir, Jawahir Jesus Gregory Ki Ahmad Saputro Lena Magdalena MARDIANA Mardiana Mardiana Mardiana Mardiana Marviola Hardini Mayang Septiawati Meidy Surya Hadi Putra Mochamad Heru Riza Chakim Mohamad Agus Setiawan Muhamad Yusup Mukti Budiarto Ninda Lutfiani Nugroho, Purnomo Satria Nurlaila Suci Rahayu Rais Padeli Po Abas Sunarya Pramita Retno Ayuning Tyas Purnomo Satria Nugroho Putra Wahyudi, Otniel Feliks Putri, Adisa Lahmania Raharjo, Ristian Rani Putri Merliasari Ridho Firdaus Ristian Raharjo Riyan Nova Saputra Riza Chakim, Mochamad Heru Safriyati, Evi saifudin, Asep Sangaji, Aziz Andrean Siskawati Sanusi Sora Baltasar SRI RAHAYU Sri Sulistyaningsih Stefano Rizky, Zhask Sudaryono Sudaryono Sunandar, Endang Suparman, Ade Supriyono, Ignatius Agus Tamara Dian Anggiani Tarigan, Pelinta Triyono Triyono Wahyu Budianto Warseno Winda Larasati Winda Larasati Wirawan, Mohammad Fiki Wisnu Dwi Andoyo Yasin Nur Hidayat Yulian, Firdaus Dwi Yusuf Firdaus Zakaria, Noor Azura Zebua, Selamat