Claim Missing Document
Check
Articles

Found 26 Documents
Search

PEMANFAATAN E-LEARNING MOODLE PADA PKBM BHAKTI ASIH CILEDUG UNTUK PERSIAPAN UNBK Nuewati, Nurwati; Santoso, Yudi; Wiharto, Yudi
Proceeding SENDI_U 2019: SEMINAR NASIONAL MULTI DISIPLIN ILMU DAN CALL FOR PAPERS
Publisher : Proceeding SENDI_U

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Hasil ujian nasional memang bukan penentu segalanya namun merupakan penilaian awal dari kualitas belajar seorang siswa. Keberhasilan belajar dipengaruhi oleh banyak faktor, secara garis besar ada 2 (dua) faktor yaitu faktor internal dan faktor eksternal. Kuat lemahnya motivasi belajar seseorang turut mempengaruhi keberhasilan belajar. Pemerintah dan swadaya masyarakat secara sukarela memfasilitasi keinginan belajar bagi sebagian orang yang terkendala dengan faktor internal dan eksternal dengan didirikannya PKBM (Pusat Kegiatan Belajar Mengajar), salah satunya PKBM Bhakti Asih di Ciledug. Kegiatan rekayasa ujian online menggunakan moodle elearning tujuannya adalah agar warga belajar mampu mengerjakan soal-soal Ujian Nasional Berbasis Komputer dengan menjawab soal-soal online dan diharapkan warga belajar memiliki kemampuan memanfaatkan komputer untuk mengerjakan Ujian Nasional yang dihadapi sehingga menghasilkan nilai ujian akhir yang memuaskan. Metode pengumpulan data dengan wawancara, dokumentasi dan tinjauan pustaka. Hasil dari kegiatan yang diperoleh warga belajar mampu menggunakan komputer dengan baik dibuktikan dengan nilai hasil try out dan nilai hasil ujian online mengalami peningkatan, kondisi dan lingkungan kegiatan kondusif serta kesadaran warga belajar dalam mengikuti rekayasa ujian online ini sangat baik dan serius.
PERANCANGAN SISTEM PERPUSTAKAAN MENGGUNAKAN MODEL VIEW CONTROLLER (MVC) DENGAN METODE OBJECT MODELLING TECHNIQUE (OMT) PADA SEKOLAH MENENGAH PERTAMA NEGERI 44 PALEMBANG Yudi Wiharto
JURNAL TEKNIK INFORMATIKA Vol 10, No 2 (2017): Jurnal Teknik Informatika
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (93.067 KB) | DOI: 10.15408/jti.v10i2.6993

Abstract

RETRACTION TO: Wiharto, Y. (2017). Perancangan Sistem Perpustakaan Menggunakan Model View Controller (MVC) Dengan Metode Object Modelling Technique (OMT) pada Sekolah Menengah Pertama Negeri 44 Palembang. Jurnal Teknik Informatika, 10(2), 147-158. doi: 10.15408/jti.v10i2.6993We wish to retract this article due to double publication with article which published in Jurnal Teknologi Informasi Vol 12, No 1 (2016), titled” PERANCANGAN SISTEM PERPUSTAKAAN MENGGUNAKAN MODEL VIEW CONTROLLER (MVC) DENGAN METODE OBJECT MODELLING TECHNIQUE (OMT) PADA SEKOLAH MENENGAH PERTAMA NEGERI 44 PALEMBANG” with the same author who is Yudi Wiharto.We deeply regret any inconvenience this publication has caused for others. 
Perancangan Sistem Informasi pada Karya Agung Furnitur Yudi Wiharto; Ari Irawan
Applied Information System and Management (AISM) Vol 1, No 1 (2018): Applied Information System and Management (AISM)
Publisher : Depart. of Information Systems, FST, UIN Syarif Hidayatullah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (143.428 KB) | DOI: 10.15408/aism.v1i1.8645

Abstract

Sistem Informasi adalah sebuah kombinasi dari teknologi informasi dan aktivitas orang yang menggunakan teknologi tersebut untuk mendukung operasi dan manajemen. Dalam arti yang luas, istilah sistem informasi yang sering digunakan merujuk kepada interaksi antar manusia, proses algoritma, data, informasi dan teknologi. Dalam istilah ini, digunakan untuk merujuk tidak hanya pada penggunaan organisasi teknologi informasi dan komunikasi (TIK), tetapi juga untuk di mana orang-orang berinteraksi dengan teknologi ini dalam mendukung suatu proses bisnis.
Implementasi Enkripsi-Dekripsi dengan Algoritma RC2 Menggunakan Java Muhammad Iqbal Assegaf; Rahma Destias; Nidhea Sitaresmi; Yudi Wiharto
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 4, No 4 (2020): Oktober 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v4i4.2256

Abstract

Cryptography is a security tool used to hide a message. For that we need a security by means of encryption and decryption of data using cryptographic algorithms Rivest Code 2 (RC2). In the cryptographic algorithms Rivest Code 2 (RC2), designed in java programming netbeans which include the ability to operate directly for RC2 algorithm implemented by mode. Specifications architectures and languages into a specified algorithm implementation does not yet support 64-bit operating efficiently. Therefor, instead of using two 64-bit registers as in RC2, RC2 uses four 32-bit registers. Because it uses four registers there will be two rotation operation on each half-round there, and it will also be a lot of bits that will be used to affect the number of bits that are rotated. This multiplication operation is very effective in producing the effect of diffusion or which of course resulted in the deployment of more secure RC2. Android-based application that is generated by utilizing the latest technology
ENKRIPSI DATA MENGGUNAKAN ADVANCED ENCRYPTION STANDART 256 Yudi Wiharto; Ari Irawan
KILAT Vol 7 No 2 (2018): KILAT
Publisher : Sekolah Tinggi Teknik - PLN

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (722.874 KB) | DOI: 10.33322/kilat.v7i2.352

Abstract

Cryptography is important in securing data and information. Confidential, important information may not be publicly or otherwise protected. It is not impossible for anyone to see, damage, steal or misuse important data from an agency or company through a computer network. The solution is with cryptography or a method of data security that can maintain the confidentiality and authenticity of a data or information. This method is intended for confidential information when sent through network access, such as LAN or internet, cannot be utilized by unauthorized parties. Cryptography supports the aspect of information security, namely protection of confidentiality. Therefore the need to maintain the confidentiality of data and information is a cryptographic application. The process in the form of encryption and decryption used by the user to secure the data without changing the contents of the data. This application has a 32-character key but in its use is made into 2 keys, namely public and private key where the public key is the key filled by the user in accordance with the desire, while the private key is the default key entered by the application at random to meet the length of 32 characters. The AES algorithm used is the AES256 algorithm where this algorithm uses the principle with the number of rounds by key.
Perancangan Model Sistem Informasi Penjualan Pada Rumah Makan Joglo Yudi Wiharto; Agnes Aryasanti; Ari Irawan
JIKI (Jurnal llmu Komputer & lnformatika) Vol 1 No 1 (2020): JIKI Juli 2020
Publisher : Universitas Muhammadiyah Metro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24127/jiki.v1i1.666

Abstract

Pada era moderan ini teknologi informasi sudah berkembang sangat pesat hingga digunakan oleh semuamasyarakat didunia, tapi masih ada beberapa instansi yang masih melakukan proses bisnis yang masih manualdan belum memiliki sistem informasi pada proses bisnisnya, salah satunya Rumah Makan Joglo yang memilikipermasalahan tersebut. Metode penelitian yang digunakan adalah metode kualitatif dengan teknik penelitianmelalui wawancara, observasi dan dokumentasi. Perancangan model sistem informasi berorientasi objek denganpendekatan RAD / Rapid Application Development. Oleh karena itulah, diberikan solusi dengan perancanganmodel sistem informasi penjualan yang hasilnya akan dapat membantu dalam proses setiap kegiatan transaksisampai dengan pembuatan laporan atau proses bisnis pada Rumah Makan Joglo.
Sistem Kehadiran Menggunakan Quick Respone Code Dengan Enkripsi Algorithm Message Digest 5 dan Vigenere Cipher Pada SpeedCom IT Consulting Yudi Wiharto; Ari Irawan
Jurnal SISKOM-KB (Sistem Komputer dan Kecerdasan Buatan) Vol 2 No 1 (2018): Volume II - Nomor 1 - September 2018
Publisher : Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The attendance system is a resource that must exist and is needed both by government agencies and private agencies for the onset of an initial operational activity in it. The existence of attendance tools at this time is vital considering the function is able to support activities and implementation of work activities in it so that the tool must exist in an agency. Especially for SpeedCom IT Consulting, data collection and attendance reporting system used so far using data processing applications with web-based internet facilities. This is considered less effective by agencies, because employees can make input attendance wherever and whenever. From the problem it raises the idea of ​​adding an encrypted Quick Respone code (QR Code), in which it can perform management and attendance data collection. Supported with the availability of local internet network within the agency, this application will be used as a medium of attendance and recapitulation of employee attendance every month. With the QR Code is expected no more games or cheating by employees in the process of attendance and is expected also this application will facilitate the administrator in managing the presence of employees in the office so that the results of reporting data can be known easily, quickly and accurately.
Pengenalan Teknologi Informasi Dan Pemanfaatan Aplikasi Internet Bersama Baksos We Care Community Yudi Wiharto; Agus Umar Hamdani; Lis Suryadi; Sam sinar
KOMMAS: Jurnal Pengabdian Kepada Masyarakat Vol 2, No 2 (2021): KOMMAS: JURNAL PENGABDIAN KEPADA MASYARAKAT
Publisher : KOMMAS: Jurnal Pengabdian Kepada Masyarakat

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1486.572 KB)

Abstract

We Care Community Gandaria Utara Jakarta Selatan adalah komunitas tempat sekumpulan orang yang memiliki kesamaan wilayah, latar belakang, bakat/minat dan tujuan yang bersifat sosial kemasyarakatan dan berada di daerah Gandaria Utara Jakarta Selatan. Visinya adalah memiliki kepedulian sosial kepada masyarakat sekitar, menyatukan bakat/minat yang dimiliki setiap anggota, serta menyatukan visi dan misi bersama sebagai satu keluarga besar. Adapun permasalahan dalam kegiatan yang dihadapi oleh pengurus Baksos We Care Community Gandaria Utara Jakarta Selatan antara lain: Bagaimana cara mengenalkan teknologi informasi kepada peserta dan bagaimana cara mengenalkan serta memanfaatkan aplikasi internet guna mendukung kegiatan sehari-hari masyarakat. Karena permasalahan diataslah, kami memberikan solusi dengan pelatihan Pengenalan Teknologi Informasi Dan Pemanfaatan Aplikasi Internet dengan materi pemanfaatan aplikasi Google, mulai dari pembuatan Email, Blog dan Website untuk kebutuhan peserta. Penggunaan teknologi informasi semakin banyak digunakan dalam kehidupan, dengan perangkat yang fleksibel, fitur yang mudah digunakan dan pengolahan data yang cepat, membuat banyak orang beralih menggunakan perangkat teknologi informasi untuk kehidupan sehari-hari. Contoh teknologi yang banyak digunakan untuk berkomunikasi dengan orang lain melalui internet adalah email, blog dan website. Dari pelatihan tersebut peserta mendapatkan pengetahuan dan pengalaman dalam penggunaan teknologi informasi untuk membantu kegiatan sehari-hari.
DESAIN SISTEM PEMILIHAN KARYAWAN TERBAIK MENGGUNAKAN AHP PADA LEMBAGA PENYIARAN TVRI Yudi Wiharto
Jurnal Algoritma, Logika dan Komputasi Vol 5, No 02 (2022): Jurnal ALU, September 2022
Publisher : Universitas Bunda Mulia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30813/j-alu.v5i02.2620

Abstract

The concept of a decision support system for selecting the best employees in the Republic of Indonesia Television Public Broadcasting Institution is made based on the problems that exist in that institution that are still doing subjectively and manually and there is no system in it. Where in this selection concept is done by determining the weight value for each attribute, then the ranking process is carried out which will determine the optimal employee performance. Analytic Hierarchy Process (AHP) method was chosen because it can select the best alternative from a number of alternatives. Where by using this method the employee data which is assessed will be compared with other employees with several criteria provisions which will produce the best prospective employees. The results of the study are in the form of a Decision Support System Concept (SPK) concept, which is expected to be able to resolve the selection problem in the best employee assessment and is no longer subjective and the assessment is no longer seen from one aspect based on one perspective.
Implementansi Model Knowledge Management System Pada Pelayanan Sertifikasi Algoritma Retno Wulandari; Reva Ragam Santika; Yudi Wiharto; Ari Saputro
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 18, No 2 (2021): SEPTEMBER 2021
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2106.978 KB) | DOI: 10.36080/bit.v18i2.1618

Abstract

Algorithm certification is a mandatory activity for students of the Information Technology Faculty at Budi Luhur University before their take final assignments and is managed by the faculty secretariat as a service unit for algorithm certification. Currently, Knowledge in algorithm certification services still relies on the ability of one person, so that if there any change of manager will cause the loss of explicit and tacit knowledge because they have no knowledge management which can help the manager to collect Knowledge to continue the management of algorithm certification. The purpose of this study is to make a proposed Knowledge Management model as a knowledge management center for algorithmic certification management for facilities for documenting, discussing, utilizing knowledge according to institutional regulations, and creating applications that can manage knowledge and share related to algorithmic certification activity services. This study uses the Tiwana framework model, and the method of scoring the results of system testing using Likert scale measurements, Forum Group Discussion (FGD), as a system prototype testing using the ISO 9126 method. The results of the analysis will produce a model and knowledge management system that is can be a solution in documenting and exchanging knowledge in applications to the algorithm certification unit.