Articles
Pengembangan Sistem Informasi Manajemen Aset Laboratorium Berbasis Web di Jurusan Teknik Informatika dan Komputer FT UNM
Fachrul, Achmad;
Hasrul Bakri;
Jumadi M Parenreng
TEKNOVOKASI : Jurnal Pengabdian Masyarakat Volume 1: Issue 1 (January 2023)
Publisher : Jurusan Teknik Informatika dan Komputer
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (856.685 KB)
|
DOI: 10.59562/teknovokasi.v1i1.13
This research is a type of Research & Development (R&D) research which aims to develop a Web-Based Laboratory Asset Management Information System in the Department of Informatics and Computer Engineering, test the quality and feasibility of the system based on ISO/IEC 25010 quality standards. This research uses a prototype development model. ISO/IEC 25010 quality standard testing is carried out using 6 aspects of testing, namely Functionality Suitability, Reliability, Performance Efficiency, Usability, Portability and Security. The results of the research resulted in a Web-Based Laboratory Asset Management Information System in the Informatics Engineering Department. The test results include a) testing the functionality suitability of the system can be used properly and functions as a whole; b) reliability testing with a success percentage of 100%; c) performance efficiency testing with grade A values, performance 94%, structure 82% and response time 2.4 seconds; d) usability test obtains very good category; e) portability testing shows the system can run properly; f) security testing results in a level of security at level B.
Pengembangan Fitur Bebas Bengkalai Yang Terintegrasi Dengan Tanda Tangan Digital Pada Aplikasi SIM-LAB Di Jurusan Teknik Informatika dan Komputer
Parenreng, Jumadi M;
Wahyu Hidayat M;
B, Muhammad Fajar
TEKNOVOKASI : Jurnal Pengabdian Masyarakat Volume 1: Issue 3 (September 2023)
Publisher : Jurusan Teknik Informatika dan Komputer
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.59562/teknovokasi.v1i3.825
Digital transformation in all areas of life has reached the Metaverse era, especially in the field of education which has an impact on changing the education paradigm. This transformation is a driving force to improve the quality of education in Indonesia, Universities which are the mecca of civilization should adopt the progress of digital transformation, the Department of Informatics and Computer Engineering in this case in laboratory management requires an integrated and well-documented information system to manage inventory and facilitate the process of borrowing and returning goods in the laboratory. The lack of such an information system can cause problems in inventory management and laboratory use. Therefore, a community service program was carried out to develop a free inventory feature integrated with digital signatures in the SIM-LAB application at the Department of Informatics and Computer Engineering, FT UNM. This program aims to improve the quality of inventory management in the laboratory. In order to solve the problems faced by partners, the solutions offered through this PKM program are 1) Implementing a free inventory feature integrated with digital signatures in the SIM-LAB JTIK application, 2) Provide training related to the application, use, and maintenance of free swollen features integrated with digital signatures to JTIK Laboratory operators. After being given training, they are then guided to apply the results of the training in order to improve the quality of inventory management in the laboratory.
MEMBANGUN JIWA KEWIRAUSAHAAN DAN KEMANDIRIAN PEMUDA MELALUI KERAJINAN LIMBAH BAN BEKAS DAN WORKSHOP KONTENT DIGITAL
Parenreng, Jumadi Mabe;
Agung, Muhammad;
Kaswar, Andi Baso
Reswara: Jurnal Pengabdian Kepada Masyarakat Vol 2, No 1 (2021)
Publisher : Universitas Dharmawangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.46576/rjpkm.v2i1.908
Kawasan Antang dan sekitarnya berlokasi di wilayah pinggiran kota Makassar dan cukup terkenal karena merupakan Tempat Pemrosesan Akhir (TPA Antang) se-kota Makassar. Terdapat beberapa kategori sampah di TPA ini yaitu : sampah basah, sampah kering, sampah yang bisa didaur ulang, yang tidak bisa didaur ulang. Secara garis besar ada dua permasalahan yang bisa diselesaikan dengan implementasi PKM ini, yakni masalah sampah dan pengangguran. Keterbatasan pengetahuan penduduk sekitar mengakibatkan sampah yang sebenarnya masih dapat diolah ini terbuang begitu saja. Disisi lain pengangguran pada usia produktif merupakan permasalahan yang sampai saat ini masih menjadi persoalan hidup yang belum dapat diatasi sepenuhnya oleh pemerintah pusat maupun pemerintah di kota Makassar khususnya di daerah TPA Antang. Jumlah penduduk usia kerja terus bertambah sedangkan lapangan kerja belum cukup tersedia bagi para pencari kerja. Terlebih tidak adanya skill dan kompetensi yang dimiliki semakin mempersulit mereka untuk mendapatkan pekerjaan. Oleh karena itu, kami mengusulkan program pelatihan kemandirian pemuda antang Makassar untuk mengatasi permasalahan di atas. Program ini muncul dari ide untuk memberikan keterampilan kepada pemuda Antang dengan memanfaatkan salah satu jenis limbah yakni ban sepeda motor bekas dan ban mobil bekas untuk diolah menjadi produk layak pakai untuk mainan dan hiasan rumah dan pekarangan. Selain berbentuk mainan, olahan ban bekas bisa juga berupa aksesoris berupa pot bunga bermotif dan lain-lain. Kegiatan pelatihan kemandirian terbagi menjadi tiga tahapan, yakni tahap persipan, tahap pelatihan mengolah ban bekas dan tahap pelatihan promosi dan pemasaran hasil olahan melalui media digital. Pihak RT setempat sangat berterima kasih dengan pelaksanaan kegiatan ini karena akan membangun kepercayaan diri pemuda sekitar lokasi TPA Antang dan membangkitkan jiwa entrepreneurship yang mandiri, kreatif, inovatif dan berdaya saing. Selain itu, menumbuhkan minat kreativitas lainnya untuk memanfaatkan jenis sampah lain yang memungkinkan untuk didaur ulang
The Implementation of Wireshark and IPtables Firewall Collaboration to Improve Traffic Security on Network Systems
Wahid, Abdul;
Firdaus, Muhammad Eka;
Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 1 No. 4 (2021): Volume 1 Issue 4, 2021 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1129.116 KB)
|
DOI: 10.31763/iota.v1i4.509
Along with the development of the internet era which is very fast today, the network security system becomes a very urgent matter and needs attention. The number of criminal activities and cyber attacks that attack servers through the network makes a server administrator need to make extra efforts in maintaining and monitoring data traffic that enters or leaves the server system. One of the efforts often made by server admins is to monitor server activity and then immediately secure the server from attacks that they identify from the monitoring results. data packets. Here an algorithm is built where the output of the Wireshark application is an analysis result that will distinguish the presence of a malicious accessing IP and then notify the server admin to set the firewall and block the IP that is considered dangerous, or analyze the port that is temporarily under attack and then notify the admin to close the port. . From the results of this algorithm research by simulating attacks using Synflood Attack on the server, it can be seen that the level of effectiveness of the algorithm in dealing with attacks can make RAM and CPU lighter so that it does not burden the hardware when compared to without using the algorithm and also makes system network traffic more efficient.
Secure Wireless Sensor Network using Cryptography for Smart Farming Systems
Wahid, Abdul;
Juliady, Ilham;
Zain, Satria Gunawan;
Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 2 No. 4 (2022): Vol. 2 No. 4 (2022): Volume 2 Issue 4, 2022 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1555.547 KB)
|
DOI: 10.31763/iota.v2i4.554
Internet of Things (IoT) technology has become part of human life. Agriculture in many parts is one of IoT implementation segment including the Cultivation of mold oysters. Internet of Things (IoT) is applied to collect data from combined sensors in the Wireless Sensor Network (WSN) will make it easy for farmers to monitor and control garden they remotely. Regardless of the application system control distance far based WSN that will make it easy for a farmer, the system has gap security, and one of them that is hacking and tapping of communication data The IoT . is really dangerous on effort if condition room mold oyster the known by someone hacker who can just is rival effort. It is a needed something method for secure communication when the data transfer process is over-guaranteed. The method used is application Base64 -based data encryption/decryption on WSN node devices and controlling and monitoring mobile devices. Based on results trials carried out after the implementation of Secure WSN with scenario tapping using the Wireshark tool show no data can be read. Analysis results show that this model could be applied as Secure WSN for Smart Farming System.
Development of a Parking System Using the High Sensitive R503 Fingerprint Sensor for Sequential Search Algorithm Based Customer Detection
Suhartono, Suhartono;
Parenreng, Jumadi M;
Syafriandi K, Fahri;
Zain, Satria Gunawan;
Suhardi, Iwan
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 2 (2023): Volume 3 Issue 2, 2023 [May]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31763/iota.v3i2.586
Today's technological developments are very sophisticated. It can be seen with various innovations in this era, from simple innovations to innovations that are trending in the world. Parking is a condition where the driver places his vehicle in a parking lot. The parking system using the Radio Frequency Identification (RFID) system has become a technology applied to parking systems, by facilitating and providing security to customers when parking, even though they have used an RFID card, the drawbacks of the system are that anyone who has an RFID card can issue the owner's vehicle another by using the same RFID card. The solution to the lack of an RFID-based parking system is by using the High Sensitive R503 Fingerprint Sensor which will make security much better than using an RFID card, by applying the Sequential Search Algorithm to detect customers in fingerprint registration applications and using the Fingerprint R503 sensor with data verification speed. average 0.78 Second to open the parking portal.
Integrated Smart Rescue Box Design With Information Systems as a Solution to Indonesian Disaster Emergency Response
Supriadi, Dewi Sri Mulyana;
Jaya, Hendra;
Djawat, Yasser Abd;
Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 1 (2023): Vol. 3 No.1 (2023): Volume 3 Issue 1, 2023 [February]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31763/iota.v3i1.600
This study uses the design method with a prototype research model. This is motivated by the fact that Indonesia is prone to natural disasters, so preparing for an effective and efficient disaster emergency response process is necessary. The resulting innovation is an intelligent rescue box prototype product integrated with an information system as a disaster emergency response solution, especially in meeting the basic emergency needs of post-disaster refugees. The effect will consist of two, and the first is the Smart rescue box (SRB), which provides the emergency needs of evacuees in one package to meet the electricity needs of refugees. There is a solar tracker system with real-time clock (RTC) data that is set as if it can follow the direction of the sun's movement for maximum absorption of sunlight. The second product is the SRB information system which is a disaster information system consisting of several useful features and a disaster education menu that can provide insights regarding disasters and disaster information that can be accessed easily. The measurement and observation test results show that the product has worked as expected, so it is feasible. The resulting product is still in the form of a prototype so that suggestions for further research can be further developed in terms of features and technology to become a complete product to facilitate the disaster emergency response process.
Security System Analysis Using the HTTP Protocol Against Packet Sniffing Attacks
Manguling, Inez sri wahyuningsi;
Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 4 (2023): Vol. 3 No. 4 (2023): Volume 3 Issue 4, 2023 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31763/iota.v3i4.612
The security level of the SIM MBKM website information system needs to be analyzed because it is accessed by many students who provide essential data. The security testing process for the SIM MBKM system uses the software Ettercap and Wireshark to test the system's security level and network data against cybercrime attacks. The results of these experiments showed the same essential data, but Wireshark displayed more personal information. The difference lies in the system architecture using different methods or stages, namely ARP Poisoning and Filtering HTTP. The third difference is the estimated time taken during the experiment. Ettercap and Wireshark applications enable eavesdropping on confidential and essential data and information. Through security testing using Ettercap and Wireshark, more critical data is displayed. solutions and preventive actions can be implemented by encrypting confidential data and improving website security using the HTTPS (Hypertext Transfer Protocol Secure) protocol.
Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN)
rosyidah, aliyyah;
Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 3 (2023): Vol. 3 No. 3 (2023): Volume 3 Issue 3, 2023 [August]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31763/iota.v3i3.613
The network security system is continuously advancing alongside technological developments. VPNs, which utilize open networks, aim to provide security by leveraging IPSec to transmit private data through L2TP tunneling strategy from the server to the branch computer/client and vice versa. Conversely, it can also lead to poor security practices. VPNs are implemented using the layer 2 IPSec tunneling protocol with two MikroTik devices. Testing is conducted to assess the security and speed of the network using the command line and MikroTik Winbox, where the server monitors packet delays to determine the improvement in network security quality. This research has identified several weaknesses in implementing this VPN protocol, namely the need for caution regarding the security of transmitted data to prevent misuse by the VPN provider
Network Security Analysis Using Switch Port Security CPT
Istiqamah, Nurfadilah;
Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 4 (2023): Vol. 3 No. 4 (2023): Volume 3 Issue 4, 2023 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31763/iota.v3i4.614
The gradual advancement of information network technology has rapidly increased due to the growing demand for efficient, stable, and fast network connectivity, as well as reliable information security. One factor that influences network quality is network security, which encompasses various techniques to enhance network security, such as building firewalls, layer seven protocols, and port security. Port security utilizes existing ports to enable secure switching access. The switch can protect the local area network (LAN). Several types of switch port security are commonly used, including default/static port security, dynamic learning port security, and sticky port security.