p-Index From 2021 - 2026
6.381
P-Index
Claim Missing Document
Check
Articles

Sistem Kontroling Dan Monitoring Hama Padi Berbasis Internet of Thing Di Kelompok Tani Bina Karya Pringsewu, Lampungb Untoro, Meida Cahyo; Praseptiawan, Mugi; Ashari, Ilham Firman; Yunira, Eka Nur'azmi; Hanifah, Raidah
Jurnal Karya Abdi Masyarakat Vol. 5 No. 3 (2021): Jurnal Karya Abdi Masyarakat
Publisher : LPPM Universitas Jambi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (824.176 KB) | DOI: 10.22437/jkam.v5i3.17298

Abstract

Indonesia salah satu negara agraris dengan penghasil produk pertanian untuk keperluan pangan. Komoditas utama yang paling banyak dikembangkan dan ditanam pada sektor pertanian di Indonesia adalah padi. Lahan pertanian yang luas dan produksi padi yang melimpah menjadi unggulan. Lampung sendiri memiliki kabupaten penghasil taman pangan utama padi yang terdapat di kabupaten pringsewu dan sekaligus lumbung padi salah satunya Kelompok Tani Bina Karya. Kebutuhan pangan yang terus meningkat harus diimbangi dengan jumlah produksi padi yang cukup setiap tahunnya. Terlepas dari lahan dan produksi petani memiliki kendala pada masa tanam padi. Kendala yang terjadi mengakibatkan menurunnya hasil panen secara menyuruh atau malah gagal panen dikarenakan hama. Wereng coklat, belalang, burung bagian dari hama yang menyerang padi. Kelompok Tani Bina Karya melakukan pembasmian hama secara manual dengan menggunakan pestisida dan bertahan sementara. Penggunaan pestisida sebagai pembasmian hama secara kimiawi menimbulkan dampak pencemaran lingkungan, misalnya pencemaran air tanah, petani mengalami keracunan ketika melakukan penyemprotan pestisida. Untuk menyelesaikan permasalahan hama padi tim pengusul membuat teknologi tepat guna sebagai salah satu solusi alternatif dalam pengurangan serta kontroling dan monitoring lahan pertanian dari hama pengganggu dan kondisi lahan. Sistem Kontroling dan Monitoring Hama Padi Berbasis Internet of Thing di Kelompok Tani Bina Karya Pringsewu, Lampung.
Analysis of Elbow, Silhouette, Davies-Bouldin, Calinski-Harabasz, and Rand-Index Evaluation on K-Means Algorithm for Classifying Flood-Affected Areas in Jakarta Ashari, Ilham Firman; Dwi Nugroho, Eko; Baraku, Randi; Novri Yanda, Ilham; Liwardana, Ridho
Journal of Applied Informatics and Computing Vol. 7 No. 1 (2023): July 2023
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v7i1.4947

Abstract

Jakarta is the capital city of Indonesia, which has a high population density, and is an area that is frequently hit by floods. This study aims to determine the classification of flood-affected areas in Jakarta between severe, moderate, and low. Design/method/approach: The study was conducted using the elbow, Silhouette, Davidson-Bouldin, and Calinski-Harabasz methods on the K-means algorithm, as well as the Rand method. index for evaluation. Grouping with 3 and 6 groups is the best grouping value based on Calinski-Harabasz. By using the davies bouldin index from the observations, the K value with a value of 6 has the smallest Davies-Bouldin value with a value of 0.2737. By using sillhoute, the experimental results obtained the best values sequentially, namely K=2, K=3, and K=6 with silhouette values of 0.866, 0.854, and 0.803. In this experiment, based on the elbow method, it was found that the best K value was K=3. This was obtained because it was based on observations on the appearance of the SSE data compared to the value of K. In the graph above, it can be seen that the largest decrease in data occurred at K=3 and after this decrease, the decline began to slope. The rand index is a method used to compare several cluster methods. If the value is >= 90 it is a very good result, if the value is in the range 80 to 90 it identifies a good index, whereas if it is below 80 it indicates a bad index. The results show that cluster three is verified as the best cluster with a value of 1, followed by a second alternative with cluster 2 of 0.9182. From several validation and evaluation methods it can be concluded that the best grouping can be done using 3 clusters. The results of the study yielded a value of 75.4% in low areas, 21.1% in moderate areas, and 3.5% in severe areas.
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key Ashari, Ilham Firman; Nugroho, Eko Dwi; Andrianto, Dodi Devrian; Yusuf, M. Asyroful Nur Maulana; Alkarkhi, Makruf
JITCE (Journal of Information Technology and Computer Engineering) Vol. 8 No. 1 (2024)
Publisher : Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jitce.8.1.8-18.2024

Abstract

Information security is paramount for individuals, companies, and governments. Threats to data confidentiality are increasingly complex, demanding strong protection. Therefore, cryptography and steganography play pivotal roles. This study proposes the utilization of LSB (Least Significant Bit) steganography on image files employing the 3DES (Triple Data Encryption Standard) algorithm. The aim is to facilitate secure transmission and reception of data, including confidential messages, within digital information media. The research methodology involves implementing 3DES + LSB using Image Citra and innovating 3DES + MD5 Hash in .txt files. The results and discussions described include, among others, Pseudocode, Cryptographic Testing, and Steganography Testing. Based on the results of program analysis and testing, it can be concluded that the more messages that are inserted in the image, the more pixel differences there are in the stego image. The more colors in the image to which the message will be inserted, the more pixel differences in the stego image will be. The images that stego objects can present are only images with .png and .jpeg extensions. Testing from the fidelity aspect, the average PSNR obtained is 66,365, meaning that the stego image quality is very good. Testing from the recovery aspect, from 4 tested stego images, showed that messages can be extracted again. Testing of the robustness spec using two attack techniques, namely rotation, and robustness, shows that the message cannot be extracted from the image. Testers of the computation time, from testing 1-1000 characters, show the average time required for computation is about 0.798 seconds.
The Development and Implementation of M-Edupayment: A Multi-Payment Platform for SMK Negeri 7 Bandar Lampung Praseptiawan, Mugi; Utoro, Meida Cahyo; Ashari, Ilham Firman; Algifari, Muhammad Habib; Afriansyah, Aidil
Jurnal Pengabdian kepada Masyarakat (Indonesian Journal of Community Engagement) Vol 11, No 1 (2025): March
Publisher : Direktorat Pengabdian kepada Masyarakat Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jpkm.100850

Abstract

This community engagement activity aimed to develop a mini bank website, m-EduPayment, integrated with the iPaymu payment gateway as an Application Programming Interface (API). The project was implemented at SMK Negeri 7 Bandar Lampung. System development followed the Personal Extreme Programming (PXP) method, which included the stages of Requirements, Planning, Iteration Initialization, Design, Implementation, and System Testing. PXP, a variant of Extreme Programming, was specifically adapted for individual developers. The activity involved 31 respondents, consisting of 10th and 11th-grade students, who evaluated the system using the System Usability Scale (SUS) to measure its usability. Interviews with teachers (superadmins) and student administrators were also conducted to identify initial requirements and gather feedback on the system design. Data analysis utilized a Likert scale, where respondents rated various system aspects on a scale from 1 (strongly disagree) to 5 (strongly agree). SUS scores were calculated using standard formulas to determine a final score, which was then classified into usability categories. The average SUS score was 91, falling under the "Excellent" category (Grade A). The development of the mini bank website introduced new features, including online payment services for tuition fees (SPP), waste banks, and savings. System testing achieved a 99% functional success rate, demonstrating the platform’s high usability in the school environment. Respondents provided overwhelmingly positive feedback, affirming the successful implementation and functionality of the website.
Vulnerability Analysis And Proven On The neonime.co Website using OWASP Zap 4 and XSpear Muhammad Alfarizi; Muhammad Najie K; Muhammad Afif H; Ilham Firman Ashari
JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi) Vol 5, No 2 (2022): JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi)
Publisher : Institut Bakti Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56327/jtksi.v5i2.1130

Abstract

Website or what is often also called Web, can be interpreted as a collection of a page that displays a type of text information, data, images. Computer network security is one of the most important and fundamental to the system. In using the web which is very easy to do, especially in reading such as comics and so on, it is necessary to anticipate security so that web applications can be protected from harassment or hacker attacks such as Cross-Site Scripting (XSS). This experiment was conducted to determine the vulnerability of the comic web application by means of a self-test using the ZAP and XSpear tools. This test is carried out to secure the application that is used as a follow-up recommendation in securing the Smart Payment application. The results of this experiment found a vulnerability in the comic reading web, namely neonime.co. The vulnerabilities found were Cross-Domain Misconfiguration, X-Frame-Options Header Not Set, Absence of Anti-CSRF Tokens, Cookie No HTTP Only Flag, Cookie without Same Site Attribute, Cross-Domain JavaScript Source File Inclusion, Incomplete or No Cache-control Header Set, Server Leaks Information via "X-Powered-By" HTTP ResponseHeader Field(s) and Timestamp Disclosure - Unix. In addition to obtaining vulnerabilities from the comic web application, solutions are also provided to overcome vulnerabilities in the Smart Payment application.
COMPARATIVE OF LSTM AND GRU FOR TRAFFIC PREDICTION AT ADIPURA INTERSECTION, BANDAR LAMPUNG Ilham Firman Ashari; Verlina Agustine; Aidil Afriansyah; Nela Agustin Kurnianingsih; Andre Febrianto; Eko Dwi Nugroho
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol. 10 No. 4 (2025): JITK Issue May 2025
Publisher : LPPM Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/jitk.v10i4.6569

Abstract

The Tugu Adipura intersection in Bandar Lampung is a vital traffic hub connecting four major roads. Rapid population growth and increasing vehicle numbers challenge traffic flow and urban quality of life. Despite its importance, there is limited research using predictive models to analyze traffic patterns at complex intersections in mid-sized Indonesian cities. This study addresses that gap by examining traffic growth on four connected roads using deep learning models. Traffic data were collected hourly from June 1, 2021, to July 31, 2023. A comparative analysis of Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) models was conducted, with SGD and Adam as optimizers. Results show the GRU model with Adam achieved the lowest RMSE (0.23) on road section 1, indicating its superior ability to model short-term fluctuations and non-linear growth in traffic volume. The study offers practical implications for traffic management by highlighting GRU’s capacity to capture seasonal trends and rapid growth, supporting proactive infrastructure planning and congestion mitigation strategies. These findings demonstrate the value of data-driven approaches in enhancing transportation systems in growing urban areas.
Parking System Optimization Based on IoT using Face and Vehicle Plat Recognition via Amazon Web Service and ESP-32 CAM (Case Study: Institut Teknologi Sumatera) Ashari, Ilham Firman; Satria, Mahesa Darma; Idris, Mohamad
Computer Engineering and Applications Journal (ComEngApp) Vol. 11 No. 2 (2022)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Today's technology has developed rapidly. One application of technology is in the parking lot. Most parking lots in Indonesia can already recognize the vehicle plate image, but it is hoped that it can be even better by applying Internet of Things (IoT) technology that is integrated with facial recognition images. One of the parking problems is in the parking lot at the Sumatran Institute of Technology, where checking is still done manually by security officers. This of course will take time and the level of security is also not good, because when you enter there is no checking. Checks are only carried out at the time of exit and the officer who checks is not necessarily the same and memorized as the owner of the vehicle. The addition of this facial image recognition feature is expected to increase the security of the parking system. Facial image recognition can be assisted by Cloud services from Amazon Image Recognition. With this service, no training data is required. The system developed is only a prototype. The developed parking system can recognize facial images and vehicle license plates with 2 cameras using the ESP32-Cam when entering and exiting the parking lot. The use of the ESP32-cam can recognize facial images both during the day and at night. The results obtained by the system can work effectively with an increase of 21%.
Analysis and Implementation of Augmented Reality Using Markerless and A-Star Algorithm (Case Study: Gedung Kuliah Umum ITERA) Ashari, Ilham Firman; Majesty, Achmad Bany
Computer Engineering and Applications Journal (ComEngApp) Vol. 11 No. 3 (2022)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Institut Teknologi Sumatera is a public university in the province of Lampung. Institut Teknologi Sumatera (ITERA) has many buildings, including Gedung Kuliah Umum (GKU). GKU is the largest and widest lecture building in ITERA. GKU has four floors, where each floor has many rooms in it with different functions in each room. As the largest building in ITERA, GKU is often used for various events, including CPNS exams, new student admissions, or for visits from other campuses. Due to the size of this building, this allows visitors from outside ITERA to GKU to experience problems in terms of time to ask questions and difficulty finding various spaces in the GKU Building. This research uses Augmented Reality technology to help make it easier for visitors from outside ITERA to find space quickly and precisely. In its development using several tools, including the ARWaKit SDK. This framework is used on devices with the IoS operating system. In its implementation, it requires a camera on a smartphone to capture existing images and convert them into cyberspace. In the ARWayKit framework, Azure Spatial Anchors have been used which can be used to carry out the mapping process as a markerless method and to optimize the distance from the user's position to the destination location, the a-star algorithm is used. The results obtained from the Variation-2 test were 91.6%.
Analysis and Implementation of Blowfish and LSB Algorithm on RGB Images using SHA-512 Ashari, Ilham Firman; Praseptiawan, Mugi; Baraku, Randi; Filiana, Edinia Rosa
Computer Engineering and Applications Journal (ComEngApp) Vol. 13 No. 1 (2024)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The growth of the internet globally keeps increasing as time goes. There's a big amount of data type saved there too. Those data need to be secured so anyone who doesn't have the right to access them can access it. The purpose of this article is to secure text information into image media using the Blowfish method for encrypting text information and securing it using the Hash function SHA-512 and then embedded it in image media using the Least Significant Bit (LSB) method. The result of implementing those methods using image media sized 138Kb and 39.85Kb with plaintext measuring 27 and 85 characters shows that integrity data is secured with SHA-512 method. The test result using PSNR method to get the score of image quality after embedding information to the image shows that the average number of PSNR’s score is 70,74 dB which means the quality is good and has less difference from the original image.
Pengembangan Lampu Jalan Otomatis Berbasis Sensor Cahaya Sebagai Infrastruktur Cerdas di Desa Sukajadi Lampung Bindar, Muhammad Abdul Mubdi; Nurhayati, Misfallah; Ashari, Ilham Firman; Tanjung, Adinda Sekar; Agustine, Verlina
Jurnal Ilmiah Pangabdhi Vol 11, No 1: April, 2025
Publisher : LPPM Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/pangabdhi.v11i1.29471

Abstract

Insufficient street lighting in Sukajadi Village, Central Lampung, increases accident risks and hinders economic activity. This research developed an automatic solar-powered Public Street Lighting (PJU) system using a Light Dependent Resistor (LDR) sensor. Stages included survey, design, assembly, testing, installation, socialization, and monitoring. Consequently, an automatic street light was successfully installed at the Sukajadi-Wates Village border, operating automatically with an LDR sensor and solar power. Success was marked by improved lighting, renewable energy use, proper technology function, and community satisfaction. Further development and routine maintenance are recommended for this smart infrastructure's sustainability.
Co-Authors Achmad Syafriyal Adinda Sekar Tanjung Adrian Putradinata, Gusti Made Afriansyah, Aidil Agustine, Verlina Ahmad Auzan Varian Syahputra Aidil Afriansya Aidil Afriasnyah Ajrina, Fadiah Izzah Akbar, Alvijar Algifari, Muhammad Habib Alkarkhi, Makruf Anastasia Puteri Dewi Andhika Wibawa Bhagaskara Andika Setiawa Andika Setiawan Andre Febrianto Andrianto, Dodi Devrian Ardhi, Alief Moehamad Ardi Gaya Manalu Arimbi Ayuningtyas Arre Pangestu Aryani, Annisa Jufe Azwarman Azwarman Baraku, Randi Clinton, Martin Daniel Rinald Dede Rodhatul Farida Dita Alviuni P Dwi Nugroho, Eko Eka Nur'azmi Yunira Eko Dwi Nugroho Eko Dwi Nugroho Eko Dwi Nugroho Fadhillah A Fikri Halim Ch Filiana, Edinia Rosa Fil’aini, Raizummi Gunawan, Rayhan Fatih Hendri Tri Putra Idris, Mohamad Jaya Megelar Cakrawarty Laisya, Nashwa Putri Leonard Rizta Anugrah P Liwardana, Ridho Londata, Hafizh M. Daffa M. Fazar Zuhdi Majesty, Achmad Bany Marbun, Rustian Afencius Mastuti Widianingsih, Mastuti Muhammad Abdul Mubdi Bindar Muhammad Affandi Muhammad Afif H Muhammad Alfarizi Muhammad Najie K Muhammad Rizky Hikmatullah Muhammad Telaga Nur Muhammad Tyaz Gagaman Muhammad Yusuf Nashrullah, Muhammad Nazla Andintya W Nela Agustin Kurnianingsih Novri Yanda, Ilham Nur'azmi, Eka Nurhayati, Misfallah Nuril Humaya Perdana Raga Winata Praseptiawan, Mugi Prasetyawan, Purwono Radhinka Bagaskara Rahmat Setiawan Raidah Hanifah Raidah Hanifah Revangga, Dwi Arthur Ringgo Galih Sadewo Romantika Banjarnahor Salman Damanhuri Samsu Bahri Satria, Mahesa Darma Sekar A Sianturi, Elsa Elisa Yohana Sicilia Putri Aisyah Sinaga, Nydia Renli Sinaga, Rutlima Siraz Tri Denira Siregar, Abu Bakar Siddiq Sisilia Juli A Siwi, lkhsanudin Raka soleha, Ayu Sophia Nouriska Syamsyarief Baqaruzi Untoro, Meida Cahyo Utoro, Meida Cahyo Vanesa Adhelia Vebriyanto, Mario Verdiana, Miranti Verlina Agustine Vina Oktarina Wicaksono, Ihtiandiko Winda Yulita Yulita, Winda Yunira, Eka Nur'azmi Yusuf, M. Asyroful Nur Maulana