Claim Missing Document
Check
Articles

Found 20 Documents
Search

SISTEM ADMINISTRASI PELAYANAN PASIEN BPJS BADAN PENYELENGGARA JAMINAN SOSIALPADA PUSKESMAS SAWAH LEBAR BARU KOTA BENGKULU Reno Supardi
Jurnal Informatika Kaputama (JIK) Vol 2, No 1 (2018): Edisi Januari 2018
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/jik.v2i1.53

Abstract

BPJS kesehatan sebagai Badan Pelaksana merupakan badan hukum public yang dibentuk untuk menyelenggara program jaminan kesehatan bagi seluruh rakyat Indonesia yang tujuannya untuk memenuhi kebutuhan kesehatan masyarakat yang layak diberikan kepada setiap orang yang telah membayar iuran atau iurannya dibayar oleh Pemerintah. Adapun tujuan penelitian ini adalah membuatsistem administrasi pelayanan pasien BPJS pada Puskesmas Sawah Lebar Baru Kota Bengkulu dan memberikan kemudahan dalam penyajian informasi yang cepat dan akurat.Penelitian dilakukan di Puskesmas Sawah Lebar Baru Kota Bengkulu yang dimulai pada bulan Januari 2015 sampai dengan Maret 2015. Pada penelitian ini pengumpulan data dilakukan dengan menggunakan metode observasi, wawancara dan studi pustaka.Dari hasil penelitian ini menunjukkan bahwa dengan adanya sistem administrasi pelayanan pasien BPJS, dapat memberikan manfaat yang cukup berarti antara lain proses pengolahan data pelayanan pasien dilakukan dengan cepat serta menghasilkan laporan yang rinci, sehingga membuat pekerjaan akan lebih efektif, efisien, lengkap dan akurat. Kata Kunci    : Sistem, Administrasi, Pasien, BPJS 
Website Security Analysis Using Penetration Testing Method Tio Rahmadi; Khairil Khairil; Reno Supardi
GATOTKACA Journal (Teknik Sipil, Informatika, Mesin dan Arsitektur) Vol 2, No 2 (2021)
Publisher : Perkumpulan Dosen Muda (PDM) Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37638/gatotkaca.v2i2.428

Abstract

Penetration testing is one method to secure websites from attacks by irresponsible people or hackers. With this method, website owners can find out where the vulnerabilities are on the website. This study aims to test the level of security on a website. The penetration testing method used is the Zero Entry hacking method with 4 stages, namely: reconnaissance, scanning, exploitation, and post exploitation and maintaining access. The results obtained from this study are that High Court of Bengkulu’s website has 4 vulnerabilities that have been successfully exploited, there is 1 vulnerability that is in the High category, and 3 vulnerabilities that are categorized as medium, the results of the exploitation test that were successfully carried out were measured using the Common Vulnerability Scoring System (CVSS), therefore it can be seen that the overall level of vulnerability of High Court of Bengkulu’s website has a score of 6.0 (medium), which means that High Court of Bengkulu’s website is quite safe against cyber attacks. 
RANCANG BANGUN GAME SUITCAKE BERBASIS ANDROD DENGAN METODE ALGORITMA LINEAR CONGRUENT Reno Supardi; Tommy Dwi Putra
(JurTI) Jurnal Teknologi Informasi Vol 4, No 1 (2020): JUNI 2020
Publisher : Universitas Asahan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (993.252 KB) | DOI: 10.36294/jurti.v4i1.1152

Abstract

Abstract - Games are one type of entertainment that is played by everyone from the ages of children, young or old. Games are made with the intent and purpose so that the players become funny, happy, and can relieve stress. This research discusses the making of a game called SUITCASE that uses the Algorithm Linear Congruent Method (LCM) with Android Studio software. the Algorithm Linear Congruent (LCM) is a method of rounding random numbers that are widely used in computer programs. This game ignores traditional game suits with the same rules plus several additional features that make this game suit modern. Android-based, which means this game can run on the Android platform and can be downloaded on Playstore.Keywords: Game, Linear Congruent Method, Suit, Android.Abstrak - Game adalah salah satu jenis hiburan yang disukai oleh semua orang dari kalangan usia anak-anak, muda maupun tua. Game dibuat dengan maksud dan tujuan agar para pemain menjadi senang, bahagia dan bisa menghilangkan stress. Penelitian ini membahas tentang pembuatan sebuah game bernama SUITCAKE mengunakan Algoritma Linear Congruent Method (LCM) berbasis android dengan software Android Studio. Algoritma Linear Congruent Method (LCM) tersebut merupakan metode pembakitan bilangan acak yang banyak digunakan dalam program komputer. Game ini mengacuh pada permain suit tradional dengan aturan yang sama ditambah dengan beberapa fitur tambahan sehingga membuat permainan suit ini menjadi modern. Berbasis android yang artinya game ini dapat berjalan di plaffom Android dan bisa diunduh pada Playstore.Kata Kunci: Game, Metode Linear Congruent, Suit, Android
IMPLEMENTASI METODE BIT MATCHING UNTUK KEAMANAN PESAN TEKS MENGGUNAKAN VISUAL BASIC. NET Reno Supardi
(JurTI) Jurnal Teknologi Informasi Vol 1, No 2 (2017): DESEMBER 2017
Publisher : Universitas Asahan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (477.705 KB) | DOI: 10.36294/jurti.v1i2.293

Abstract

Abstrack - Information and communication technology has developed rapidly, giving a great influence to human life. The development of network and internet technology allows everyone to exchange data, information, or messages to others without limitation of distance and time. Security and confidentiality are important aspects needed in the process of exchanging messages / information. The author uses steganography with the Bit Matching method that will hide information in the form of text into other digital image media. After being analyzed and implemented using the Visual Basic 2010 programming language, it was found that the text that was inserted into the image still looked normal so that it did not raise suspicion for those who saw it. The size of the capacity of a digital image affects how many characters a text message can be hidden. The greater the number of text message characters that will be hidden, the greater the size of the digital image. It is expected that this application of steganography can be useful in the fields of education and science especially in concealing text messages and can be continued for future research. Keywords - Digital Image, Bit Matching, Visual Basic 2010
APLIKASI DALAM MEMPREDIKSI TINGKAT KINERJA GURU SMA NEGERI 2 KABUPATEN BENGKULU TENGAH Reno Supardi; Meiffa Herfianti
(JurTI) Jurnal Teknologi Informasi Vol 3, No 1 (2019): JUNI 2019
Publisher : Universitas Asahan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (415.581 KB) | DOI: 10.36294/jurti.v3i1.683

Abstract

Abstrak - Seolah Menengah Negeri 2. Bengkulu Tengah merupakan lembaga pendidikan yang terletak di Kabupaten Bengkulu Tengah Provinsi Bengkulu.  Di mana dalam membuat laporan kinerja atau absensi sipatnya masih manual dalam penginfut data yaitu menggunakan Excel dan Word, oleh karena itu dibutukanya aplikasi yang dapat membuat atau membantu para guru dalam penginfut data. Agar nantinya semua dokumen yang ada bisa tersimpan dan tidak mudah hilang. Dalam penilaian kinerja guru. TIM penilai tidak perlu repot-repot membawa berkas dari ruang ke ruang TIM cukup mengecek pada aplikasi yang telah diterapkan pada sekolah tersebut. Untuk meningkatkan kinerja para guru perlu adanya sebuah aplikasi yang mendukung yaitu menggunakan metode yang ditentukan oleh pihak sekolah. Aplikasi dalam meningkatkan kinerja guru ini sangat mendukung untuk penilaian kinerja guru sehingga nantinya tidak ada kesalahan dalam penilaian dan dapat membantu mengurangi kesalahan dalam penilaian kinerja guru pada sekolah SMAN 2 Bengkulu tengah kedepanya.Kata Kunci -  Aplikasi Kinerja Guru SMA N 2 Abstract -  As if Middle School 2. Middle Bengkulu is an educational institution located in Bengkulu Tengah Regency, Bengkulu Province. Where in making the performance report or the exact attendance is still manual in the data penginfut that is using Excel and Word, therefore the application is needed which can create or assist the teachers in the data penginfut. So that later all existing documents can be stored and not easily lost. In evaluating teacher performance. The assessment team does not need to bother carrying files from the room to the TEAM room just to check the application that has been applied to the school. To improve the performance of the teachers there needs to be an application that supports the use of methods determined by the school. The application in improving teacher performance is very supportive for teacher performance appraisal so that later there will be no errors in the assessment and can help reduce errors in teacher performance appraisal in high school 2 Bengkulu in the future.Keywords - Application of High School N 2 Teacher Performance
Implementasi Metode Algoritma K-Means Clustering pada Toko Eidelweis Reno Supardi; Indra Kanedi
(JurTI) Jurnal Teknologi Informasi Vol 4, No 2 (2020): DESEMBER 2020
Publisher : Universitas Asahan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36294/jurti.v4i2.1444

Abstract

Abstract - In making the application, the implementation of the K-Means Clustering Algorithm method at the Eidelweis Store will be designed for this study to design software at the Eidelweis Store. The method used in making this application is a system development method starting from problem determination, actual system analysis. , new system analysis, system design, system implementation, and system testing. In the implementation of the K-means Clustering algorithm method on the Eidelweis Store, the login menu, input menu, output menu and report menu, and main menu. In the main menu, there is a system that is connected to the next menu in the process to view reports about sales on taking Eideleweis easy to operate The results of the implementation process of the K-means Clustering algorithm method at Eidelweis Stores have been applied to the K-means Clustering method. The application of the K-means Clustering algorithm method in Eidelweis Stores is made using Visual Basic Net programming language with the SQL Server database.Keywords: K-means Clustering Algorithm Method, Visual Basic Net. Abstrak - Dalam Pembuatan Aplikasi Implementasi Metode Algoritma K-Means Clustering pada Toko Eidelweis akan dirancang  tujuan penelitian ini adalah untuk membuat perancangan perangkat lunak software pada Toko Eidelweis, Metode yang gunakan pada pembuatan aplikasi ini adalah metode pengembangan sistem yang dimulai dari penentuan masalah, analisi sistem aktual, analisis sistem baru, perancangan sistem, implementasi system dan uji coba sistem. Dalam implementasi metode algoritma K-means Clustering pada Toko Eidelweis menu login, menu input, menu output dan menu laporan, menu utama. Pada menu utama terdapat sistem yang menghubungkan ke menu – menu selanjutnya dalam proses untuk melihat laporan tentang penjualan pada took Eideleweis mudah untuk dioperasikan. Hasil  proses implementasi metode algoritma K-means Clustering pada Toko Eidelweis telah diterapkan metode K-means Clustering, Aplikasi implementasi metode algoritma K-means Clustering pada Toko Eidelweis dibuat dengan Bahasa pemrograman Visual Basic Net dengan database SQL Server.Kata Kunci : Metode Algoritma K-means Clustering, Visual Basic Net.
PELATIHAN DAUR ULANG SAMPAH PLASTIK MENJADI KERAJINAN UNIK DI DESA PEMATANG TIGA KECAMATAN PEMATANG TIGA KABUPATEN BENGKULU TENGAH Dian Mardiati Sari; Meirita Sari; Reno Supardi
Jurnal PADAMU NEGERI (Pengabdian pada Masyarakat Bidang Eksakta) Vol 1, No 1 (2020)
Publisher : Perkumpulan Dosen Muda (PDM) Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (912.916 KB) | DOI: 10.37638/padamunegeri.v1i1.119

Abstract

ABSTRAKPermasalahan sampah menjadi problema klasik yang selalu dihadapi oleh penduduk terutama di wilayah Desa Pemtang Tiga Bengkulu Tengah.  Karena kuantitas maupun tingkat bahayanya, sampah terutama sampah plastik yang tersusun dari bahan kimia sukar diuraikan sehingga berbahaya bagi lingkungan, untuk itu perlu dilakukan pengolahan sampah untuk mengubah sampah plastik menjadi kerajinan yang memiliki nilai jual dan estetika. Metode yang digunakan dalam program pemanfaatan limbah plastik sebagai kerajian adalah survey analisis situasi dan pelaksanaan penyuluhan dan pelatihan. Implemetasi hasil proses pengolahan sampah yang berasal dari kemasan plastik menjadi kerajinan tangan di Desa Pematang Tiga Bengkulu Tengah dilakukan untuk meningkatkan kreatifitas serta keterampilan warga terutama ibu-ibu rumah tangga, pemuda pengangguran dan anak-anak yang putus sekolah. Selain itu juga dapat meminimalisir pencemaran lingkungan sehingga warga Desa Pematang Bengkulu Tengah  dapat lebih peduli terhadap kebersihan lingkungan. Melalui pelatihan dan pendampingan pembuatan kreasi pemanfaatan sampah yang berasal dari kemasan plastik warga lebih punya pengetahuan mengenai peluang usaha yang dapat tercipta melalui kreatifitas dan keterampilan tersebut agar tingkat ekonomi warga Desa Pematang Bengkulu Tengah menjadi lebih tinggi. Kata Kunci: Sampah plastik, estetika, kreatifitas
Design and Build a Network Monitoring System at State Vocational High School 4 Bengkulu City Vikri Julian; Reno Supardi; Aji Sudarsono
Jurnal Media Computer Science Vol 1 No 2 (2022): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (613.786 KB) | DOI: 10.37676/jmcs.v1i2.2688

Abstract

Internet network is a primary need in the educational environment, especially in SMK Negeri 4 Bengkulu City. SMK Negeri 4 Bengkulu City already has an internet network using the Telkom Indihome provider with a bandwidth of 30 Mbps. So far, the use of the internet is still done freely, where every user can access and connect to the internet at school. The increasing needs of internet users and the need for installed network devices result in an increased risk of damage and disruption to the internet network which causes network troubleshooting to become slower due to the absence of a system that helps to monitor and provide reports to the IT section of SMK Negeri 4 Bengkulu City when problems occur on the network. The network monitoring system at SMK Negeri 4 Bengkulu City is used to assist network operators in supervising and managing computer networks in schools. The process of monitoring the computer network is carried out within the scope of SMK Negeri 4 Bengkulu City. This study uses Zabbix as a network monitoring application that runs on the Linux Ubuntu operating system and can be accessed via a web browser. Based on the tests conducted at SMK Negeri 4 Bengkulu City, it can be concluded that the process of securing the network system can be carried out properly as expected.
A Comparative Analysis Of Simple Additive Methods Weighting With Preference Selection Index In The Selection Of The Best Sales Rahmat Budianto; Dewi Suranti; Reno Supardi
Jurnal Media Computer Science Vol 1 No 2 (2022): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v1i2.2741

Abstract

PT. Tunas Dwipa Matra Branch of Putri Hijau is a company engaged in the sale of motorcycles by cash and credit which is located in North Bengkulu Regency, Bengkulu Province. PT. Tunas Dwipa Matra needs a decision support system that can correct the weaknesses of the current system, namely data collection and sales selection which is still manual, namely by using a book, as a result, selecting the best salesperson takes a very long time. In fact, for the assessment of the best sales selection, accuracy and precision are needed, so that the results can be accepted by all sales and employees at PT. Tunas Dwipa Matra. The method used is Simple Additive Weighting and Preference Selection Index Method to assist company management in assessing the best sales performance of employees in the company. Besides that, PT. Tunas Dwipa Matra strives to improve various service facilities that are friendly to consumers so that sales targets can be achieved every year. Based on the results of system testing at P.T Tunas Dwipa Matra, it can be concluded that the application made is as expected and can help the process of selecting the best salesperson. And the best sales in 2021 is Fitri with SAW value: 79 and PSI value: 0.832597
Virtual Private Network Analysis Point To Point Tunneling Protocol Adiman Adiman; Indra Kanedi; Reno Supardi
Jurnal Media Computer Science Vol 1 No 2 (2022): Juli
Publisher : Fakultas Ilmu Komputer Universitas Dehasen Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmcs.v1i2.2746

Abstract

This research aims to conduct a network analysis of the Virtual Private Network Point To Point Tunneling Protocol at the UPTD of the Bengkulu Province Cooperatives and SMEs Training Center. to carry out activities that occur on the wifi network at the UPTD Cooperatives and UKM Training Center Bengkulu Province and also as one of the requirements for obtaining a bachelor's degree in the Department of Informatics, Dehasen Bengkulu University. The research method used is the Network Development Life Cycle (NDLC) method which aims at the process of making and designing a Virtual Private Network Point To Point Tunneling Protocol using a mikrotik RB951Ui-2HnD. The process of making and designing is how to connect the proxy with a computer then by making a remote access remote from the mikrotik location using the Winbox application. Mikrotik can configure a network that is needed on the UPTD network of the Bengkulu Province Cooperatives and SMEs Education and Training Center by applying remote access remotely, the remote results and security when logging in to the Mikrotik connection can be done by applying the network login and password display so that it is secure when connecting to the mikrotik. and can make it easier for us to operate the mikrotik network remotely and safely.