Claim Missing Document
Check
Articles

Pengembangan Sistem Pencarian Objek Wisata Kepulauan Selayar Yang Terintegrasi Mode Transportasi Dan Akomodasi Al Imran; Jumadi M Parenreng; Ahmad Wahyudi
Information Technology Education Journal Volume 1, Issue 2, Mei 2022
Publisher : Jurusan Teknik Informatika dan Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1103.597 KB) | DOI: 10.59562/intec.v1i2.241

Abstract

Penelitian ini bertujuan untuk mengembangkan sistem pencarian objek wisata Kepulauan Selayar yang terintegrasi moda transportasi dan akomodasi. Penelitian ini menggunakan jenis penelitian pengembangan Research and Development (R&D) yang menggunakan model pengembangan waterfall dengan menggunakan pengujian standar kualitas ISO 25010 yang berfokus pada 8 karakteristik yaitu functional suitability, performance efficiency, security, compability, realibility, portability, maintability dan usability. Hasil pengujian menunjukkan hasil yang sangat layak berdasarkan karakteristik functional suitability, berdasarkan karakteristik performance efficiency didapatkan hasil kategori B dengan performance 91% dan waktu load 1,6 detik, berdasarkan karakteristik security didapatkan hasil kategori C dengan hasil pengujian software security test tidak ditemukan masalah dan general data protection regulation test tidak ditemukan masalah, berdasarkan aspek maintability telah memenuhi subkarakteristik modularity, reusability, dan modifiability, berdasarkan karakteristik reability ditemukan 0 error dan waktu load paling lama 1.5 detik, berdasarkan karakteristik portability sistem dapat berjalan dengan baik pada perangkat dan browser yang berbeda, berdasarkan karakteristik compability fungsi-fungsi sistem dapat bertukar informasi dan berjalan dengan baik, dan karakteristik usability didapatkan hasil berdasarkan penilaian pegawai dinas pariwisata Kepulauan Selayar yaitu 90.35% dengan kategori sangat baik dan penilaian calon wisatawan yaitu 92.33% dengan kategori sangat baik.
Pengembangan Sistem Informasi Milik Desa (BUMDes) Di Desa Baru, Polewali Mandar Abd. Fattah; Massikki; Jumadi M Parenreng
Information Technology Education Journal Volume 1, Issue 3, September 2022
Publisher : Jurusan Teknik Informatika dan Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (540.138 KB) | DOI: 10.59562/intec.v1i3.246

Abstract

Pengembangan Sistem Informasi Badan Usaha Milik Desa di Desa Baru, Polewali Mandar. Skripsi, Program Studi Pendidikan Teknik Informatika dan Komputer, Jurusan Teknik Informatika dan Komputer, Fakultas Teknik, Universitas Negeri Makassar (dibimbing oleh Massikki dan Jumadi Mabe Parenreng). Penelitian ini merupakan jenis penelitian pengembangan yang bertujuan untuk (1) menghasilkan pengembangan Sistem Informasi Badan Usaha Milik Desa di Desa Baru, Polewali Mandar, (2) mengetahui hasil pengujian Sistem Informasi Badan Usaha Milik Desa di Desa Baru, Polewali Mandar menggunakan ISO/IEC 25010. Penelitian ini menggunakan metode penelitian dan pengembangan (R & D) dan model pengembangan prototype melalui tahap pengumpulan kebutuhan, membangun prototype, evaluasi prototype, pengkodean sistem, menguji sistem, evaluasi sistem dan menggunakan sistem. Sistem yang dikembangkan divalidasi oleh dua orang ahli sistem. Teknik pengumpulan data yang digunakan berupa wawancara, dokumentasi, dan angket. Selanjutnya diolah menggunakan teknik analisis statsitik deskriptif. Hasil pengembangan membuktikan bahwa sistem informasi Badan Usaha Milik Desa di Desa Baru, Polewali Mandar layak digunakan karena telah memenuhi pengujian instrumen melalui validator sistem, serta telah memenuhi standar pengujian ISO/IEC 25010 dengan hasil pengujian aspek functionality suitability bernilai 100% atau kategori “Sangat Layak”. Pengujian performance efficiency level B dengan hasil pengujian 82% berada pada kategori “Layak”. Pengujian usability dengan skor 90,13% berada pada kategori “Sangat Layak”. Pengujian security tingkat kerentanan berada pada level 1 “Low Risk Alert” berada pada kategori “Baik”. Pengujian compatibility dengan skor 62 berada pada kategori “Layak”. Pengujian Portability menggunakan 4 browser berada pada kategori “Sangat Baik”.
Prototype Smart Life Jacket Berbasis Teknologi Long Range Wireless Data Telemetry Ikram Anas; Muh. Yusuf Mappeasse; Muliadi; Satria Gunawan Zain; Jumadi M Parenreng
Information Technology Education Journal Volume 2, Issue 1, Januari 2023
Publisher : Jurusan Teknik Informatika dan Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1051.992 KB) | DOI: 10.59562/intec.v2i1.265

Abstract

Penelitian ini bertujuan untuk membuat sebuah prototype pelampung cerdas serta mengetahui hasil dari pengujiannya. Jenis penelitian yang digunakan dalam penelitian ini adalah Research dan Development (R&D) yaitu sebuah proses atau langkah-langkah untuk mengembangkan suatu produk baru atau menyempurnakan produk yang telah ada. Menggunakan prosedur pengembangan PPE (Pre Production, Production dan Post Production). Penelitian ini dilakukan untuk membuat protype pelampung yang dapat mengirimkan koordinat sekaligus untuk mengetahui hasil pengujian functionality pada prototype serta untuk mengetahi jarak jangkau pada prototype, akurasi gps serta penggunaan daya yang dibutuhkan. Hasil dari penelitian ini adalah didapatkan sebuah solusi untuk melakukan evakuasi korban kecelakaan laut. Produk yang dihasilkan adalah sebuah pelampung dengan perangkat yang dapat dideteksi titik koordinatnya apabila pelampung dikenakan oleh korban. Titik koordinat didapatkan dari GPS yang terpasang pada pelampung dan dikirim menggunakan modul LoRa. Titik koordinat pelampung dapat terdeteksi dari jarak rata-rata 1,05 kilometer dengan toleransi akurasi GPS sebesar 5,33 meter.
MEMBANGUN JIWA KEWIRAUSAHAAN DAN KEMANDIRIAN PEMUDA MELALUI KERAJINAN LIMBAH BAN BEKAS DAN WORKSHOP KONTENT DIGITAL Parenreng, Jumadi Mabe; Agung, Muhammad; Kaswar, Andi Baso
Reswara: Jurnal Pengabdian Kepada Masyarakat Vol 2, No 1 (2021)
Publisher : Universitas Dharmawangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46576/rjpkm.v2i1.908

Abstract

Kawasan Antang dan sekitarnya berlokasi di wilayah pinggiran kota Makassar dan cukup terkenal karena merupakan Tempat Pemrosesan Akhir (TPA Antang) se-kota Makassar. Terdapat beberapa kategori sampah di TPA ini yaitu : sampah basah, sampah kering, sampah yang bisa didaur ulang, yang tidak bisa didaur ulang. Secara garis besar ada dua permasalahan yang bisa diselesaikan dengan implementasi PKM ini, yakni masalah sampah dan pengangguran. Keterbatasan pengetahuan penduduk sekitar mengakibatkan sampah yang sebenarnya masih dapat diolah ini terbuang begitu saja. Disisi lain pengangguran pada usia produktif merupakan permasalahan yang sampai saat ini masih menjadi persoalan hidup yang belum dapat diatasi sepenuhnya oleh pemerintah pusat maupun pemerintah di kota Makassar khususnya di daerah TPA Antang. Jumlah penduduk usia kerja terus bertambah sedangkan lapangan kerja belum cukup tersedia bagi para pencari kerja. Terlebih tidak adanya skill dan kompetensi yang dimiliki semakin mempersulit mereka untuk mendapatkan pekerjaan. Oleh karena itu, kami mengusulkan program pelatihan kemandirian pemuda antang Makassar untuk mengatasi permasalahan di atas. Program ini muncul dari ide untuk memberikan keterampilan kepada pemuda Antang dengan memanfaatkan salah satu jenis limbah yakni ban sepeda motor bekas dan ban mobil bekas untuk diolah menjadi produk layak pakai untuk mainan dan hiasan rumah dan pekarangan. Selain berbentuk mainan, olahan ban bekas bisa juga berupa aksesoris berupa pot bunga bermotif dan lain-lain. Kegiatan pelatihan kemandirian terbagi menjadi tiga tahapan, yakni tahap persipan, tahap pelatihan mengolah ban bekas dan tahap pelatihan promosi dan pemasaran hasil olahan melalui media digital. Pihak RT setempat sangat berterima kasih dengan pelaksanaan kegiatan ini karena akan membangun kepercayaan diri pemuda sekitar lokasi TPA Antang dan membangkitkan jiwa entrepreneurship yang mandiri, kreatif, inovatif dan berdaya saing. Selain itu, menumbuhkan minat kreativitas lainnya untuk memanfaatkan jenis sampah lain yang memungkinkan untuk didaur ulang
The Implementation of Wireshark and IPtables Firewall Collaboration to Improve Traffic Security on Network Systems Wahid, Abdul; Firdaus, Muhammad Eka; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 1 No. 4 (2021): Volume 1 Issue 4, 2021 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1129.116 KB) | DOI: 10.31763/iota.v1i4.509

Abstract

Along with the development of the internet era which is very fast today, the network security system becomes a very urgent matter and needs attention. The number of criminal activities and cyber attacks that attack servers through the network makes a server administrator need to make extra efforts in maintaining and monitoring data traffic that enters or leaves the server system. One of the efforts often made by server admins is to monitor server activity and then immediately secure the server from attacks that they identify from the monitoring results. data packets. Here an algorithm is built where the output of the Wireshark application is an analysis result that will distinguish the presence of a malicious accessing IP and then notify the server admin to set the firewall and block the IP that is considered dangerous, or analyze the port that is temporarily under attack and then notify the admin to close the port. . From the results of this algorithm research by simulating attacks using Synflood Attack on the server, it can be seen that the level of effectiveness of the algorithm in dealing with attacks can make RAM and CPU lighter so that it does not burden the hardware when compared to without using the algorithm and also makes system network traffic more efficient.
Secure Wireless Sensor Network using Cryptography for Smart Farming Systems Wahid, Abdul; Juliady, Ilham; Zain, Satria Gunawan; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 2 No. 4 (2022): Vol. 2 No. 4 (2022): Volume 2 Issue 4, 2022 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1555.547 KB) | DOI: 10.31763/iota.v2i4.554

Abstract

Internet of Things (IoT) technology has become part of human life. Agriculture in many parts is one of IoT implementation segment including the Cultivation of mold oysters. Internet of Things (IoT) is applied to collect data from combined sensors in the Wireless Sensor Network (WSN) will make it easy for farmers to monitor and control garden they remotely. Regardless of the application system control distance far based WSN that will make it easy for a farmer, the system has gap security, and one of them that is hacking and tapping of communication data The IoT . is really dangerous on effort if condition room mold oyster the known by someone hacker who can just is rival effort. It is a needed something method for secure communication when the data transfer process is over-guaranteed. The method used is application Base64 -based data encryption/decryption on WSN node devices and controlling and monitoring mobile devices. Based on results trials carried out after the implementation of Secure WSN with scenario tapping using the Wireshark tool show no data can be read. Analysis results show that this model could be applied as Secure WSN for Smart Farming System.
Development of a Parking System Using the High Sensitive R503 Fingerprint Sensor for Sequential Search Algorithm Based Customer Detection Suhartono, Suhartono; Parenreng, Jumadi M; Syafriandi K, Fahri; Zain, Satria Gunawan; Suhardi, Iwan
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 2 (2023): Volume 3 Issue 2, 2023 [May]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i2.586

Abstract

Today's technological developments are very sophisticated. It can be seen with various innovations in this era, from simple innovations to innovations that are trending in the world. Parking is a condition where the driver places his vehicle in a parking lot. The parking system using the Radio Frequency Identification (RFID) system has become a technology applied to parking systems, by facilitating and providing security to customers when parking, even though they have used an RFID card, the drawbacks of the system are that anyone who has an RFID card can issue the owner's vehicle another by using the same RFID card. The solution to the lack of an RFID-based parking system is by using the High Sensitive R503 Fingerprint Sensor which will make security much better than using an RFID card, by applying the Sequential Search Algorithm to detect customers in fingerprint registration applications and using the Fingerprint R503 sensor with data verification speed. average 0.78 Second to open the parking portal.
Integrated Smart Rescue Box Design With Information Systems as a Solution to Indonesian Disaster Emergency Response Supriadi, Dewi Sri Mulyana; Jaya, Hendra; Djawat, Yasser Abd; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 1 (2023): Vol. 3 No.1 (2023): Volume 3 Issue 1, 2023 [February]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i1.600

Abstract

This study uses the design method with a prototype research model. This is motivated by the fact that Indonesia is prone to natural disasters, so preparing for an effective and efficient disaster emergency response process is necessary. The resulting innovation is an intelligent rescue box prototype product integrated with an information system as a disaster emergency response solution, especially in meeting the basic emergency needs of post-disaster refugees. The effect will consist of two, and the first is the Smart rescue box (SRB), which provides the emergency needs of evacuees in one package to meet the electricity needs of refugees. There is a solar tracker system with real-time clock (RTC) data that is set as if it can follow the direction of the sun's movement for maximum absorption of sunlight. The second product is the SRB information system which is a disaster information system consisting of several useful features and a disaster education menu that can provide insights regarding disasters and disaster information that can be accessed easily. The measurement and observation test results show that the product has worked as expected, so it is feasible. The resulting product is still in the form of a prototype so that suggestions for further research can be further developed in terms of features and technology to become a complete product to facilitate the disaster emergency response process.
Security System Analysis Using the HTTP Protocol Against Packet Sniffing Attacks Manguling, Inez sri wahyuningsi; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 4 (2023): Vol. 3 No. 4 (2023): Volume 3 Issue 4, 2023 [November]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i4.612

Abstract

The security level of the SIM MBKM website information system needs to be analyzed because it is accessed by many students who provide essential data. The security testing process for the SIM MBKM system uses the software Ettercap and Wireshark to test the system's security level and network data against cybercrime attacks. The results of these experiments showed the same essential data, but Wireshark displayed more personal information. The difference lies in the system architecture using different methods or stages, namely ARP Poisoning and Filtering HTTP. The third difference is the estimated time taken during the experiment. Ettercap and Wireshark applications enable eavesdropping on confidential and essential data and information. Through security testing using Ettercap and Wireshark, more critical data is displayed. solutions and preventive actions can be implemented by encrypting confidential data and improving website security using the HTTPS (Hypertext Transfer Protocol Secure) protocol.
Network Security Analysis Based on Internet Protocol Security Using Virtual Private Network (VPN) rosyidah, aliyyah; Parenreng, Jumadi Mabe
Internet of Things and Artificial Intelligence Journal Vol. 3 No. 3 (2023): Vol. 3 No. 3 (2023): Volume 3 Issue 3, 2023 [August]
Publisher : Association for Scientific Computing, Electronics, and Engineering (ASCEE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31763/iota.v3i3.613

Abstract

The network security system is continuously advancing alongside technological developments. VPNs, which utilize open networks, aim to provide security by leveraging IPSec to transmit private data through L2TP tunneling strategy from the server to the branch computer/client and vice versa. Conversely, it can also lead to poor security practices. VPNs are implemented using the layer 2 IPSec tunneling protocol with two MikroTik devices. Testing is conducted to assess the security and speed of the network using the command line and MikroTik Winbox, where the server monitors packet delays to determine the improvement in network security quality. This research has identified several weaknesses in implementing this VPN protocol, namely the need for caution regarding the security of transmitted data to prevent misuse by the VPN provider
Co-Authors Abd. Fattah Abd. Fattah Abd. Rahman Patta Abd. Rasyid Syamsuri Abdul Hafizh Abdul Hafizh Abdul Muis Mappalotteng Abdul Wahid Abdul Wahid Abdul Wahid Adi, Puput Dani Prasetyo Adiba, Fhatiah Ahmad Ridwan Ahmad Wahyudi Ahmad Wahyudi Akbar, Trisakti Al Imran Al Imran Alimuddin Sa’ban Miru Alimuddin Sa’ban Miru Aminuddin Bakry Anak Agung Istri Sri Wiadnyani Andani, Andi Ferry Adlian Tri Andi Baso Kaswar Andi Baso Kaswar Andi Farmadi Andi Wawan Indrawan Andi, Asirah Arifin, Afrisal Ary Masharuddin Shiddiqi Asham Bin Jamaluddin Aswa, M. Andika Atthariq, Atthariq Ayu Lestari Ayu Lestari Ayu Safitri Azhar Azhar Baso, Fadhlirrahman Budi, Tri Setyo Cyahrani Wulan Purnama Cyahrani Wulan Purnama Rasyid Dewi Fatmarani Surianto Dillah, Salsa Djawat, Yasser Abd Djuanda, Djuanda Dodon Turianto Nugrahadi Dyah Vitaloka Edi Suhardi Rahman Edy, Marwan Ramdhany Fachrul, Achmad Fachry Abda El Rahman FADIAH, NUR Fahmi, Moghfina Moghfina Fathahillah Fathahillah Fatimah Hidayahni Amin Febry Maryani Yatu Febry Maryani Yatu Fhatiah Adiba Firdaus Firdaus Firdaus Firdaus, Muhammad Eka Ganefri . Haq, Andi Muh. Sahirul Harifuddin Haripuddin Haripuddin Hartono Hartono Hasrul Bakri Hendarawaty, Hendarawaty Hendra Jaya Hentje Ponto Hidayat M, Wahyu I Nyoman Sila Ibnu Fikrie Syahputra Ikram Anas Ikram Anas Irmawati Irmawati Irmawati Irmawati Irmawati Irvanshah Irvanshah Irwan Budiman Istiqamah, Nurfadilah Iwan Suhardi Jariah, Rezki Nurul Jufri, Muhammad Fadhil Juliady, Ilham Karmila Kasim, Muh. Alwi Rizkyansyah Kurnia Prima Putra Kusnandar, Welly Chandra Kusumah Lia, Resky Amalia M. Ruhan Bachry M. Syahid Nur Wahid M. Syahid Nur Wahid Mahabror, Dendy Mahgafhira, Iin Manguling, Inez Sri Wahyuningsi Massikki, Massikki Moghina Fahmi Muh Mujahidin Muh. Irfan Nur Muh. Rifqi Fadhil Muh. Yusuf Mappeasse Muh. Yusuf Mappeasse Muhammad Agung Muhammad Agung Muhammad Agung Muhammad Agung Muhammad agung Muhammad Alkaff Muhammad Fajar B Muhammad Fajri, syamsir Muhammad Ilyas Syarif Muhammad Mahdinul Bahar Muhammad Mahdinul Bahar Muhammad Reza Faisal, Muhammad Reza Muhammad Yahya Muharram Muharram Muhira Muhira Mujahidin, Muh Muliadi Muliadi Muliadi Mustari S. Lamada Nununk Febryanti Nur Risal, Andi Akram Nur Wahid, M Syahid Nur, Muh Irfan Nurdin Nurdin Nurul Istiqamah Qalbi Nurul Izzah Dwi Nurul Izzah Dwi Nurdinah Parenreng, Syarif Mabe Prima, Delta Ardy Putra, Muh. Fardika Irwan Pratama Rais, Muh Rasyid, A. Ramli Rasyid, M. Udin Harun Al Rezky Anisar, Muh. Alief Riana T.Mangesa Ridwan Daud Mahande Risaldi, Muhammad Riska, Muhammad Rizal, Fahru rosyidah, aliyyah Sanatang Saragih, Triando Hamonangan Sariningrum, Ros Satria Gunawan Zain Seny Luhriyani Sunusi Setia Ningsih Shiraj, Muhammad Reza Sofyan, Muh Azikin Sugeng A. Karim Sugeng A. Karim Suhartono Suhartono Suhartono Suhartono, Suhartono Suhendar Aji Putra Suhendhar Aji Putra Sul Fikran Supeno Djanali Supriadi, Dewi Sri Mulyana Suyanta Suyanta Syafriandi K, Fahri Syahrul Syahrul Syahrul Syahrul Syarifuddin Kasim Syarifuddin Kasim Tenri Nadya Wenny Titin Jumriah Tri Setyo Budi Tri Setyo Budi Usman Mulbar Wahda Arfiana AR Wahid, M. Syahid Nur Wahyu Hidayat M Wahyu Hidayat M Wahyuni , Maya Sari Wahyuni, Maya Sari Winda Agustina Yasdin, Yasdin Yunus Tjandi Yunus Tjandi Yusuf, Zulfatni Zulhajji, Zulhajji Zulkiplih Zulkiplih Zulkiplih Zulkiplih Zulkiplih