Claim Missing Document
Check
Articles

Found 10 Documents
Search

SISTEM PENERJEMAH KATA BAHASA INGGRIS KE BAHASA INDONESIA MEDIA HANDPHONE BERBASIS MOBILE APLICATION Ibrahim, Rohmat Nur
JURNAL COMPUTECH & BISNIS Vol 2, No 1 (2008): Vol. 2 No 1 Juni 2008
Publisher : STMIK Mardira Indonesia, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (31.445 KB)

Abstract

Mobile phones (cell phones) are now used not only for conversation but also to play games and so on. The presence Java2 Micro Edition (J2ME) is expected to answer those needs while making more multifunctional mobile phones. Currently the latest generation of mobile phones has the ability to apply the J2ME program, which is a Java program that is specifically designed for mobile devices. Java enabled mobile applications meet the needs of its users through a variety of exciting programs. Because it can be done offline phones not only can be used as a communication tool but it can also be used as tool translator English words into Indonesian. Keywords: Phones, J2ME, Java Program, Translator Abstrak Telepon seluler (ponsel) sekarang digunakan tidak hanya untuk percakapan tapi juga untuk bermain games dan sebagainya. Hadirnya Java2 Micro Edition (J2ME) diharapkan dapat menjawab kebutuhan tersebut sekaligus membuat ponsel lebih multifungsi.Saat ini ponsel generasi terbaru memiliki kemampuan mengaplikasikan program J2ME, yaitu program Java yang khusus dirancang untuk peranti bergerak. Aplikasi Java memungkinkan ponsel memenuhi kebutuhan penggunanya melalui berbagai program menarik.Karena dapat dilakukan secara offline ponsel tidak hanya dapat digunakan sebagai alat komunikasi tapi dapat juga digunakan sebagai alat penerjemah kata bahasa Inggris ke bahasa Indonesia. Kata Kunci: Ponsel, J2ME, Program Java, Penerjemah 
PROTEKSI FILE DAN FOLDER MENGGUNAKAN METODA STEGANOGRAFI Rohmat Nur Ibrahim
Jurnal Computech & Bisnis (e-Journal) Vol 2, No 2 (2008): Jurnal Computech & Bisnis
Publisher : STMIK Mardira Indonesia, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (616.172 KB) | DOI: 10.55281/jcb.v2i2.26

Abstract

Data security is now an issue of vital importance to the world today, especially information concerning the company confidential or secret state that its presence should not be known by others. Since ancient times the security or confidentiality of information is the key to success for the authorities or the king in winning the war, so that information about the war should not be known or leaked to the enemy. In the world of informatics data security has become an object that has been developed over the years. Even emerging data security techniques such as steganography and kriftografi. At this time many emerging methods or data security techniques are quite diverse as disguises the data in a particular image or icon, encryption, passwords, or even the installation of hidden data is that it can not be known by others in this study, the authors tried to make the data contained in a folder can not be known by others with a shape like recyle bin. This is called the security system security through the system registry window, where the registry is the heart rather than the system window. By doing registry to a folder, then the folder will be registered into a recycle bin, and the folder will change the function into a recyle bin. With this kind of expected menggunakanmetode data contained in a folder can be maintained in the data security, thus the continuity of data will be maintained and safe. Keywords: recyle bin, system registry window, kriftografi, steganografi Abstrak Keamanan data sekarang ini merupakan masalah yang vital bagi dunia informasi saat ini terutama yang menyangkut rahasia perusahaan atau rahasia negara sehingga keberadaannya tidak boleh diketahui oleh pihak lain. Sejak jaman dahulu keamanan atau kerahasiaan informasi menjadi kunci sukses bagi para pemegang kekuasaan atau raja dalam memenangkan perang, sehingga informasi tentang perang tidak boleh diketahui atau bocor kepada pihak musuh. Di dalam dunia informatika keamanan data telah menjadi suatu objek yang telah dikembangkan selama bertahun-tahun. Bahkan bermunculan teknik-teknik pengamanan data seperti steganografi. dan kriftografi. Pada saat ini banyak bermunculan cara-cara atau teknik pengamanan data yang cukup beragam seperti penyamaran data di dalam gambar atau icon tertentu, enkripsi, pemasangan password atau bahkan data disembunyikan sehingga tidak dapat diketahui oleh orang lain pada penelitian ini, penulis mencoba untuk membuat data yang terdapat dalam suatu folder tidak dapat diketahui oleh orang lain dengan bentuk menyerupai recyle bin. System pengamanan seperti ini dinamakan pengamanan melalui system registry window,  dimana registry  merupakan jantung daripada system window. Dengan melakukan registry terhadap folder, maka folder tersebut akan diregistrasikan menjadi sebuah recycle bin,  dan folder tersebut akan berubah fungsinya menjadi sebuah recyle bin. Dengan menggunakanmetode seperti ini diharapkan data yang terdapat dalam suatu folder dapat terjaga keamanan data tersebut, dengan demikian kelangsungan data akan terjaga dan aman. Kata Kunci : recyle bin, system registry window, kriftografi, steganografi
PERBANDINGAN KOMPRESI FILE MENGGUNAKAN ALGORITMA RUN LENGTH DENGAN TWO LEVEL HOSHING Rohmat Nur Ibrahim
Jurnal Computech & Bisnis (e-Journal) Vol 1, No 2 (2007): Jurnal Computech & Bisnis
Publisher : STMIK Mardira Indonesia, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (646.143 KB) | DOI: 10.55281/jcb.v1i2.12

Abstract

Problems faced by users of information technology one of which is the size of large files that need a large storage media, and required a long time to save it. By compressing a large file is a solution to save time and storage media. Compression system was extensive but because of the limitations, the theme of which will be described on this occasion only covers problems in the system comparison of the results of the compression of a file into the software by using algorithms Run Length and Two Level Hoshing. With the aim to build software that can support the compression system, does not always have to provide large storage media and time efficiency. Keywords: algoritma Run-Length, Two-Level-Hoshing, Compression, Decompression  Abstrak Permasalahan yang dihadapi oleh pengguna teknologi informasi salah satunya adalah ukuran file yang besar sehingga diperlukan suatu media penyimpanan yang besar serta diperlukan waktu yang cukup lama untuk menyimpannya. Dengan mengkompres suatu file yang berukuran besar merupakan solusi untuk menghemat media penyimpanan dan waktu. Sistem kompresi sangatlah luas tetapi karena keterbatasan, maka tema yang akan diuraikan pada kesempatan ini hanya meliputi permasalahan dalam sistem perbandingan hasil kompresi suatu file ke dalam perangkat lunak dengan menggunakan Algortima Run Length dan Two Level Hoshing. Dengan tujuan dapat membangun perangkat lunak yang dapat menunjang sistem kompresi tersebut, tidak selalu harus menyediakan media penyimpanan yang berukuran besar dan efesiensi waktu. Kata Kunci: algoritma Run-Length, Two-Level-Hoshing, Compression, Decompression
KERANGKA KERJA MANAJEMEN KEAMANAN BERDASAR ISO 27000 BESERTA TURUNANNYA UNTUK SISTEM PADA E - GOVERMENT Rohmat Nur Ibrahim; Hadi Koswara
Jurnal Computech & Bisnis (e-Journal) Vol 4, No 1 (2010): Jurnal Computech & Bisnis
Publisher : STMIK Mardira Indonesia, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (415.277 KB) | DOI: 10.55281/jcb.v4i1.45

Abstract

One key to the success of information system security is the vision and commitment of top management leadership. Efforts or security initiatives will be useless without it. In the absence of commitment from top management, have an impact on data security investment. In addition, the success is also determined as process design, implementation, configuration, and usage. It required standards and adequate management that security can adequately perform anyway. Competency standards can be carried out in accordance with national standards TKTI if using. Standards of competence does not mean only the ability to complete a task, but also based on how and why the task was done . In addition, the ISO standard which is an international standard such as ISO 27000 can be applied as well as derivatives. Management of security operations must meet several important things: control and protection, monitoring and auditing, as well as an understanding of the threat and vulnerability. Keywords: security, management, ISO standards, control  Abstrak Salah satu kunci keberhasilan pengaman sistem informasi adalah adanya visi dan komitmen dari pimpinan top manajemen. Upaya atau inisiatif pengamanan akan percuma tanpa hal ini. Dengan tidak adanya komitmen dari top manajemen, berdampak kepada investasi pengamanan data. Selain itu keberhasilan juga ditentukan seperti proses desain, implementasi, konfigurasi, dan pemakaian. Untuk itu diperlukan standar dan manajemen yang memadai agar kemanan dapat dilakukan secara memadai pula. Standar kompetensi dapat dilakukan sesuai dengan TKTI jika menggunakan standar Nasional. Standar kompetensi tidak berarti hanya kemampuan menyelesaikan suatu tugas, tetapi dilandasi pula bagaimana serta mengapa tugas itu dikerjakan. Selain itu standar ISO yang merupakan standar internasional dapat diterapkan yaitu ISO 27000 serta turunannya. Manajemen operasi keamanan harus memenuhi beberapa hal penting yaitu kontrol dan proteksi, monitoring dan auditing, serta pemahaman tentang threat dan vulnerabilitas. Kata Kunci: keamanan, manajemen, standar ISO, kontrol
Design of a Collaboration Document Management Information System for Internal Parties: Study of a Company Operating in the Field of Information and Communication Technology (ICT) Services and Telecommunication Networks in Indonesia Annisa, Gizkha Qotrunnada; Ibrahim, Rohmat Nur
Electronic, Business, Management and Technology Journal Vol. 1 No. 2 (2023): Electronic, Business, Management and Technology Journal
Publisher : P3M, STIE Pasundan, Bandung, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55208/ebmtj.v1i2.110

Abstract

Collaboration documents are necessary for various enterprises, diverse economic sectors, and academic institutions. Cooperation documents are essential in facilitating the collaboration between a company and its partners, making effective administration of these documents crucial. Companies benefit from collaboration with other companies since it allows them to mutually assist and support one another in achieving shared objectives, enhancing work efficiency and production. Companies and partners can expand their size by leveraging industrial connections, entering new markets, establishing new facilities, or introducing supplementary products. The management of collaboration document data collecting in the Digital Business and Technology division of an Indonesian company operating in information and communication technology (ICT) services and telecommunications networks is only partially automated. Computers are restricted to archiving records, resulting in frequently disorganized, damaged, or misplaced documents. This condition hinders employees' ability to locate the necessary papers for review, leading to delays in distributing documents to relevant parties and impeding the productivity and efficiency of the collaborative document management process. Hence, it is imperative to construct a proficient system that can facilitate the collaborative document management procedure, encompassing data administration, input, and storage. This study develops an information system that allows internal stakeholders to access documents as data housed in a web-based application conveniently. The collaborative document management information system uses the System Development Life Cycle (SDLC) method, specifically employing the waterfall model as the system development approach. The author employs the Unified Modeling Language (UML) model to analyze the system by generating the necessary diagrams, a programming language that utilizes PHP and MySQL databases. The system was tested using the white box method.
Company Profile Application Design as Promotional Media Using Laravel: Case Study in Creative Design Field Nurhanifah, Hanny; Ibrahim, Rohmat Nur; Kusnandar, Toni; Utami, Alia Tri
Journal of Economics, Management, and Entrepreneurship Vol. 2 No. 1 (2024): Journal of Economics, Management, and Entrepreneurship
Publisher : P3M, STIE Pasundan, Bandung, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55208/jeme.v2i1.135

Abstract

Keratip Design, a design agency specializing in creative services such as graphic design, encounters intense competition in the expanding design market. Presently, corporations depend on social media as a means of promotion. However, the outcomes could be more optimal. Moreover, Keratip Design encounters challenges in engaging with prospective customers, impeding the company's capacity to establish robust connections with potential clients. In order to address these problems, it is imperative to create and construct a contemporary, engaging, and appealing company profile application utilizing Laravel as the development framework. By utilizing Laravel as the underlying framework for constructing the company profile application, Kereatif Design can enhance the program's performance, bolster its security measures, and facilitate future expansion of its functionality. The app will allow Keratip Design to effectively showcase its portfolio, outline its design services, and furnish clients with the company's contact information in an immersive and dynamic manner. This project aims to develop a corporate profile application utilizing Laravel as a promotional instrument for Keratip Design. By utilizing this program, Keratip Design aims to enhance its online presence, attract prospective consumers, and improve user experience. This study's results can significantly enhance a company's visibility, enhance company reporting, foster more substantial engagement with potential consumers, and enhance presentations.
Development Of A Web-Based E-Presence Application For Tracking Maps And Selfies Using Laravel Suherman, Asep; Ibrahim, Rohmat Nur; Seftiansyah, Rifan; Idzharulhaq, Zaidan
Brilliance: Research of Artificial Intelligence Vol. 4 No. 2 (2024): Brilliance: Research of Artificial Intelligence, Article Research November 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i2.4723

Abstract

Attendance is an activity aimed at assessing the level of employee presence and discipline within an organization or company. The E-Presence application is developed as a tool to enhance efficiency, accountability, and transparency in employee attendance, as well as to facilitate the processing of attendance data The E-Presence application aims to reduce errors and improve the accuracy of employee attendance records, which are crucial for the decision-making process. The development of the E-Presence application uses the Laravel framework, MySQL database, and UML (Unified Modeling Language) tools to design Use Case Diagrams, Activity Diagrams, and Class Diagrams. The system development method follows the waterfall model, and Black Box Testing is employed as the testing method. The urgency of this research lies in the system's ability to perform real-time attendance tracking that can be conducted outside the office within a maximum distance of 20 meters. With the implementation of tracking maps, employees do not need to queue, thereby increasing work efficiency. Attendance recording can be done in real time, is flexible, easily accessible, improves efficiency in attendance recording, reduces the potential for errors, enhances human resource management, and provides attendance reports in Excel format. The novelty of this research is the development of a web-based application that incorporates Tracking Maps and Selfie features, ensuring that employees must be in a designated area to check in. Thus, the company/organization can easily analyze and evaluate employee discipline. The testing results indicate that the application functions well and meets user needs.
Development Of A Web-Based E-Presence Application For Tracking Maps And Selfies Using Laravel Suherman, Asep; Ibrahim, Rohmat Nur; Seftiansyah, Rifan; Idzharulhaq, Zaidan
Brilliance: Research of Artificial Intelligence Vol. 4 No. 2 (2024): Brilliance: Research of Artificial Intelligence, Article Research November 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i2.4723

Abstract

Attendance is an activity aimed at assessing the level of employee presence and discipline within an organization or company. The E-Presence application is developed as a tool to enhance efficiency, accountability, and transparency in employee attendance, as well as to facilitate the processing of attendance data The E-Presence application aims to reduce errors and improve the accuracy of employee attendance records, which are crucial for the decision-making process. The development of the E-Presence application uses the Laravel framework, MySQL database, and UML (Unified Modeling Language) tools to design Use Case Diagrams, Activity Diagrams, and Class Diagrams. The system development method follows the waterfall model, and Black Box Testing is employed as the testing method. The urgency of this research lies in the system's ability to perform real-time attendance tracking that can be conducted outside the office within a maximum distance of 20 meters. With the implementation of tracking maps, employees do not need to queue, thereby increasing work efficiency. Attendance recording can be done in real time, is flexible, easily accessible, improves efficiency in attendance recording, reduces the potential for errors, enhances human resource management, and provides attendance reports in Excel format. The novelty of this research is the development of a web-based application that incorporates Tracking Maps and Selfie features, ensuring that employees must be in a designated area to check in. Thus, the company/organization can easily analyze and evaluate employee discipline. The testing results indicate that the application functions well and meets user needs.
Implementation of Temperature and Humidity Control in Tiramite Mushroom Cultivation Based on IoT Saprudin, Raihan Muhammad; Ibrahim, Rohmat Nur; Risanti, Rini; Suherman, Asep
Informatics Management, Engineering and Information System Journal Vol. 3 No. 1 (2025): Informatics Management, Engineering and Information System Journal
Publisher : LPPM STMIK Mardira Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56447/imeisj.v3i1.386

Abstract

The development of tiramite mushrooms in Indonesia encounters difficulties in sustaining ideal temperature and humidity levels, particularly due to erratic climate variations.  This study utilizes Internet of Things (IoT) technology to resolve these challenges by creating an automated, real-time system for monitoring and controlling temperature and humidity at JJ Srister Mushroom.  The Research & Development (R&D) methodology employing a prototyping approach facilitates ongoing testing and enhancement of the system.  This system employs DHT22 sensors and interfaces with a web page and control box for real-time monitoring.  Test results indicate that the system effectively regulates temperature and humidity within suitable parameters for the growth phases of mycelium and mushroom fruit bodies, maintaining temperatures of 22-28°C and humidity levels of 80-90% during the mycelium phase, and temperatures of 16-25°C with humidity levels of 90-95% during the fruit body phase.  The authors assert that this IoT system offers significant advantages and advocate for further investigation to enhance sensor precision and develop a mobile application as a supplementary monitoring tool.
Company Profile Application Design as Promotional Media Using Laravel: Case Study in Creative Design Field Nurhanifah, Hanny; Ibrahim, Rohmat Nur; Kusnandar, Toni; Utami, Alia Tri
Journal of Economics, Management, and Entrepreneurship Vol. 2 No. 1 (2024): Journal of Economics, Management, and Entrepreneurship
Publisher : P3M, STIE Pasundan, Bandung, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55208/jeme.v2i1.135

Abstract

Keratip Design, a design agency specializing in creative services such as graphic design, encounters intense competition in the expanding design market. Presently, corporations depend on social media as a means of promotion. However, the outcomes could be more optimal. Moreover, Keratip Design encounters challenges in engaging with prospective customers, impeding the company's capacity to establish robust connections with potential clients. In order to address these problems, it is imperative to create and construct a contemporary, engaging, and appealing company profile application utilizing Laravel as the development framework. By utilizing Laravel as the underlying framework for constructing the company profile application, Kereatif Design can enhance the program's performance, bolster its security measures, and facilitate future expansion of its functionality. The app will allow Keratip Design to effectively showcase its portfolio, outline its design services, and furnish clients with the company's contact information in an immersive and dynamic manner. This project aims to develop a corporate profile application utilizing Laravel as a promotional instrument for Keratip Design. By utilizing this program, Keratip Design aims to enhance its online presence, attract prospective consumers, and improve user experience. This study's results can significantly enhance a company's visibility, enhance company reporting, foster more substantial engagement with potential consumers, and enhance presentations.