Claim Missing Document
Check
Articles

Found 10 Documents
Search

PERBANDINGAN OPENVZ DENGAN KERNEL BASED VIRTUAL MACHINE (KVM) Mukmin, Chairul ; Cholil, Widya
JURNAL ILMIAH MATRIK MATRIK Vol.20 No.2 Agustus 2018
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Server virtualization is one system that uses energy and can work simultaneously. In this study the comparison of OpenVZ based hypervisors with kernel virtual machine (KVM) hypervisors will be compared on a virtual private server (VPS) machine. The research method uses PPDIOO developed by Cisco in network system design. The phases in the PPDIOO method are Prepare, Plan, Design, Implement, Operate and Optimize. The results of this study are OpenVZ-based virtual machines are more stable than KVM because the level of efficiency of existing resources is more efficient use of OpenVZ-based virtual machines with data using 0.8% CPU performance and 589mb of memory, the level of use of KVM-based virtual machine resources is greater with 65.4% CPU performance and 2824 mb memory, OpenVZ-based virtual machines that are able to run without large resources, while KVM-based virtual machines while working together require very large resources. Keywords: Virtualisasi Server, OpenVZ, Kernel-based Virtual Machine (KVM), Virtual Private Server (VPS)
PEMODELAN ENTERPRISE RESOURCE PLANNING MENGGUNAKAN ODOO PADA Z-TECH KOMPUTER Fitri Purwaningtias; Chairul Mukmin
KLIK- KUMPULAN JURNAL ILMU KOMPUTER Vol 6, No 3 (2019)
Publisher : Lambung Mangkurat University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/klik.v6i3.259

Abstract

Z-Tech Computers is a company engaged in the sale of computers and accessories. At present the Z-Tech Computer system runs on a buying and selling process carried out conventionally (manually). This condition occurs in the stock control process. The condition that occurs in Z-Tech Computers is information on the placement of goods that are not organized. This information causes problems that arise inaccurately information on stock data and the position of the finished goods attracts losses for the company. For this reason, in this research information modeling is carried out using an integrated modeling language to describe the needs of buying and selling. The results of modeling carried out are implemented in the form of enterprise resource planning (ERP) using the Odoo Application. UML and implementation using Odoo can be run as needed. Because Odoo has a variety of integrated modules, both customer management, accounting, sales, and even purchasing modules.Keywords: Enterprise Resource Planning, Odoo, Unified Modeling Language Z-Tech Komputer merupakan perusahaan yang bergerak dalam penjualan komputer dan aksesorisnya. Saat ini pada Z-Tech Komputer sistem berjalan pada proses pembelian dan penjualan dilakukan secara konvensional (manual). Kondisi tersebut terjadi terutama pada proses pengekan stok. Kondisi lain yang terjadi yaitu pada Z-Tech Komputer yaitu informasi penempatan barang yang ada tidak teroganisir. Kondisi tersebut menimbulkan permasalahan berupa tidak akuratnya informasi data stok dan posisi barang sehingga menimbulkan kerugian bagi perusahaan. Untuk itu dalam penelitian ini dilakukan pemodelan informasi menggunakan unified modeling language unutk menjabarkan kebutuhan pada pembelian dan penjualan. Hasil pemodelan yang dilakukan diimplementasikan dalam bentuk enterprise resource planning (ERP) menggunakan Aplikasi Odoo. Dari hasil implementasi menunjukkan bawah pemodelan UML dan implementasi menggunakan Odoo dapat berjalan sesuai kebutuhan. Karena Odoo memiliki beragam modul yang saling terintegrasi, baik modul manajemen pelanggan, akuntansi, penjualan, dan bahkan pembelian.Kata kunci: Enterprise Resource Planning, Odoo, Unified Modeling Language
ANALISIS PERBANDINGAN KINERJA LAYANAN CONTAINER AS A SERVICE (CAAS) STUDI KASUS : DOCKER DAN PODMAN Chairul Mukmin; Therezia Naraloka; Qodri Harun Andriyanto
KLIK- KUMPULAN JURNAL ILMU KOMPUTER Vol 8, No 2 (2021)
Publisher : Lambung Mangkurat University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/klik.v8i2.381

Abstract

The development of cloud computing is growing and becoming a trend that is widely used in the telecommunications world today, one of the models is Container As A Service or often abbreviated as CAAS. This technique aims to reduce resource usage and facilitate the server management process. To run Container As A Service, it is necessary to have a platform, in this study using the Docker and Podman platforms. One of the factors that affect the performance of this service is in terms of resource use and security. There are many types of attacks on computer systems that can consume existing resources such as Denial of service (DOS) attacks, this type of attack is constantly evolving in various forms. Recall the role of Docker and Podman in terms of reducing resource usage and simplifying the server management process. So the problems that will arise when Docker and Podman were used as service centers, will be disrupted when getting a DOS attack. This study aims to measure the performance of a Container service in terms of CPU, RAM and Response Time performance of web server services under normal conditions, when running many applications, when getting DOS attacks and when implementing DOS attack prevention, by adopting the PPDIOO method. in achieving the results of the research. The results show that containers consume large resources in terms of CPU usage, these results are described in Figures 3.1 and 3.2, namely for the Docker container service 84.45% of CPU usage and 675 Mb of RAM usage, while for the Podman service it is 94.05% of usage CPU and RAM usage of 658 Mb.Keywords: Container As A Service, Denial of Service , Docker, Podman.Perkembangan komputasi awan semakin berkembang dan menjadi suatu trend yang banyak digunakan di dunia telekomunikasi saat ini, salah satu modelnya yaitu Container As A Service atau yang sering disingkat CAAS. Teknik ini bertujuan untuk mengurangi penggunaan resource dan memudahkan dalam proses manajemen server. Untuk menjalankan Container As A Service ini perlu adanya sebuah platform, pada penelitian ini menggunakan platform Docker dan Podman. Salah satu faktor yang mempengaruhi kinerja dari layanan ini yaitu dari sisi penggunaan resource dan keamanannya. Terdapat banyak jenis serangan terhadap sistem komputer yang dapat menghabiskan resource yang ada seperti serangan Denial of service (DOS), jenis serangan ini senantiasa berkembang dalam berbagai bentuk. Mengingat kembali peran dari Docker dan Podman dalam hal mengurangi penggunaan resource dan memudahkan dalam proses manajemen server. Maka permasalahan yang akan timbul disaat Docker dan Podman tadi yang dijadikan sebagai sentral layanan, akan terganggu disaat mendapatkan serangan DOS. Penelitian ini bertujuan untuk mengukur kinerja sebuah layanan Container dari sisi kinerja CPU, RAM dan Respone Time dari layanan web server pada saat kondisi normal, pada saat menjalankan banyak aplikasi, pada saat mendapatkan serangan DOS dan pada saat menerapkan pencegahan serangan DOS, dengan mengadopsi metode PPDIOO dalam mencapai hasil dari penelitian. Hasil penelitian menunjukan bahwa container memakan resource yang besar dari segi penggunaan CPU, hasil ini dijelaskan pada gambar 3.1 dan 3.2 yaitu untuk layanan container docker sebesar 84.45% dari penggunaan CPU dan untuk penggunaan RAM sebesar 675 Mb, sedangkan untuk layanan podman sebesar 94.05 % dari penggunaan CPU dan untuk penggunaan RAM sebesar 658 Mb.Kata kunci: Container As A Service, Denial of Service, Docker, Podman
ANALISIS KINERJA REDISTRIBUSI ROUTING PROTOKOL DINAMIK (Studi Kasus : RIP, EIGRP, IS-IS) Chairul Mukmin; Edi Surya Negara
KLIK- KUMPULAN JURNAL ILMU KOMPUTER Vol 6, No 3 (2019)
Publisher : Lambung Mangkurat University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/klik.v6i3.262

Abstract

Each routing protocol has different algorithms and metrics in determining the best path on a network. Differences 1) Applications that only run on routing protocols 2) hardware from various vendors 3) Networks with different routing areas or domains. Some aspects that become a reference for some routing protocols that are issued from data sent and lost in the process of sending data (packet loss), speed in sending data (delay), as well as the ability of some routing protocols in choosing the closest distance when sending data transmission packets. Routing protocol characteristics. This study studies analyzing routing redistribution in dynamic routing protocols, in order to find out which routing protocols perform better in networks that are different from autonomous systems (AS) with measurement parameters of Throughput, Delay and Packet Loss.Keywords :  EIGRP, IS-IS, Redistribution Routing, RIP, Routing ProtocolSetiap protokol routing memiliki algoritma dan metrik yang berbeda-beda dalam menentukan jalur terbaik pada sebuah jaringan. Perbedaan karakteristik tersebut menimbulkan beberapa masalah 1)aplikasi yang hanya  berjalan pada protokol routing tertentu 2)hardware dari berbagai vendor 3)Jaringan dengan area atau domain routing berbeda. Beberapa aspek yang menjadi acuan suatu protokol routing diantaranya dari segi data yang terkirim dan hilang dalam proses pengiriman data (packet loss), kecepatan dalam pengiriman data (delay), juga kemampuan suatu protokol routing dalam memilih jarak terdekat bahkan jalur terbaik dalam pengiriman paket data. Perbedaan karakteristik protokol routing tersebut tersebut dapat diselesaikan dengan cara menggunakan redistribusi routing. Penelitian ini bertujuan menganalisis perbandingan redistribusi routing pada protokol routing dinamik, guna mencari tahu protokol routing mana yang lebih baik kinerjanya dalam jaringan yang berbeda autonomous system (AS) dengan parameter pengukuran Throughput, Delay dan Packet Loss.Kata Kunci : EIGRP, IS-IS, Redistribusi Routing, RIP, Protokol Routing
Tracer Study Berbasis Teknologi Informasi dan Psikologi Edi Supratman; Leon Abdillah; Dwi Hurriyati; Chairul Mukmin
Jurnal Pengabdian kepada Masyarakat Bina Darma Vol 2 No 1 (2022): Jurnal Pengabdian kepada Masyarakat Universitas Bina Darma
Publisher : DRPM-UBD

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33557/pengabdian.v2i1.1686

Abstract

Advances in Information Technology (IT) have provided many conveniences in various fields, such as government, business, and education. The global COVID-19 pandemic that has hit the world since 2019 has made many human activities limited due to a number of rules from health protocols. The tracer study process that was previously carried out conventionally has shifted to the digital mode by utilizing various information technology applications. The tracer study implementation process involves 3 (three) main stages, namely (1) the concept and instrument development stage; (2) Stages of collecting questionnaire data, and (3) Stages of data analysis and writing of tracer study reports. The Community Service Team (PKM) provides counseling to schools to empower a number of IT-based applications and psychological approaches for tracer studies. By using Google Forms, Facebook Groups, and WhatsApp Groups, tracer studies can still be carried out even though there are social limitations due to the pandemic. The results of the tracer study are very useful for the school to find out the distribution of alumni, and input from alumni regarding the various obstacles experienced by alumni.
Pengembangan Sistem Informasi Tracer Study Pada SMK Muhammadiyah 1 Palembang Yuni Novita Sari; Chairul Mukmin
Journal of Information Technology Ampera Vol. 3 No. 2 (2022): Journal of Information Technology Ampera
Publisher : APTIKOM SUMSEL

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51519/journalita.volume3.isssue2.year2022.page74-107

Abstract

Tracer Study merupakan salah satu program tentang lulusan dari lembaga yang menyelenggarakan pendidikan. Informasi – informasi penting yang disediakan untuk menilai pendidikan , menyempurnakan kurikulum sampai dapat digunakan sebagai tolak ukur dalam penjamin mutu lulusan. Peran lain dari tracer study sebagai evaluasi kinerja untuk meningkatkan mutu lulusan dan salah satu syarat kelengkapan akreditasi. Mengingat pentingnya peran tracer study harus menjadi perhatian khusus dalam pengembangan sistem tracer study . SMK Muhammadiyah 1 Palembang masih memanfaatkan fasilitas media sosial seperti Whatsapp Group sebagai sarana dalam melakukanstudi pelacak. Mengingat pentingnya peran dari tracer study sudah selayaknya sistem informasi tracer study ada di SMK Muhammadiyah 1 Palembang, dimana sistem ini nanti dapat menjadi salah satu sarana yang dapat memberikan kemudahan bagi para alumni untuk memberikan informasi kepada pihak sekolah dan memberikan kemudahan kepada pihak sekolah dalam mentracer alumni . Penelitian ini menggunakan metode Rapid Application Development (RAD), pengujian sistem dengan menggunakan pengujian black-box. Penelitian menghasilkan sistem informasi tracer study, sistem ini dapat membantu pihak SMK Muhammadiyah 1 palembang dalam mengelola informasi - informasi lulusan hingga memberikan kemudahan serta mengefektifkan saat pelaksanaannya data pencarian serta alumni untuk keperluan akreditasi sekolah.
Perancangan Perbandingan Energi Hypervisors (Studi Kasus : Vmwhere Vsphere dan Proxmox) Sholeha Deka; Chairul Mukmin
JUPITER (Jurnal Penelitian Ilmu dan Teknologi Komputer) Vol 15 No 1b (2023): Jupiter Edisi April 2023
Publisher : Teknik Komputer Politeknik Negeri Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5281./5319/15.jupiter.2023.04

Abstract

Server virtualization is a virtualization technique that provides hardware that can run software like physical hardware. There are many applications in using the Virtual Machine application. The benefit of this research is knowing which Virtual Machine application has the best energy. The system research method will be carried out by following the path of the PPDIOO method which has phases starting from preparing, planning, designing, implementing, operating and optimizing. The results of this study are expected to know the level of energy use and workload incurred when running the Virtual Machine application
The Automatic Classification System for Academic Performance Evaluation at the Faculty of Information Technology Atma Jaya University of Makassar Erick Alfons Lisangan; Dwi Marisa Midyanti; Chairul Mukmin; Astrid Lestari Tungadi
JUITA: Jurnal Informatika JUITA Vol. 11 No. 1, May 2023
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30595/juita.v11i1.14116

Abstract

Abstract - The Faculty of Information Technology currently carries out performance evaluations at the end of each semester and involves students as sources of data evaluation. The evaluation activity took place online on the website ss.fti.uajm.ac.id. With the number of active students, the number of evaluations that need to be read and the number read by faculty stakeholders also increases. This is inversely proportional to the time that stakeholders need time to read, evaluate, and categorize comments entered by students as part of the performance evaluation. In this study, a multi-classification of student comments related to evaluations at the Faculty of Information Technology UAJM will be carried out. Text pre-processing will use the Sastrawi library which includes stopword removal, stemming, and transformation of text into TFIDF form. The results of the pre-processing text will be used as input on Naive Bayes and using three scenarios to evaluate the classifier model. The average accuracy values of the Naive Bayes algorithm for category and sentiment labels are 79% and 81%, respectively. Furthermore, the expected result of this research is to reduce the time for FTI UAJM stakeholders to read and comment/suggest faster because the evaluation results are obtained in real-time.
PERBANDINGAN OPENVZ DENGAN KERNEL BASED VIRTUAL MACHINE (KVM) Chairul Mukmin; Widya Cholil
Jurnal Ilmiah Matrik Vol 20 No 2 (2018): Jurnal Ilmiah Matrik
Publisher : Direktorat Riset dan Pengabdian Pada Masyarakat (DRPM) Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (971.659 KB) | DOI: 10.33557/jurnalmatrik.v20i2.115

Abstract

Server virtualization is one system that uses energy and can work simultaneously. In this study the comparison of OpenVZ based hypervisors with kernel virtual machine (KVM) hypervisors will be compared on a virtual private server (VPS) machine. The research method uses PPDIOO developed by Cisco in network system design. The phases in the PPDIOO method are Prepare, Plan, Design, Implement, Operate and Optimize. The results of this study are OpenVZ-based virtual machines are more stable than KVM because the level of efficiency of existing resources is more efficient use of OpenVZ-based virtual machines with data using 0.8% CPU performance and 589mb of memory, the level of use of KVM-based virtual machine resources is greater with 65.4% CPU performance and 2824 mb memory, OpenVZ-based virtual machines that are able to run without large resources, while KVM-based virtual machines while working together require very large resources. Keywords: ,, ,, Kernel-based Virtual Machine (KVM), Virtual Private Server (VPS)
Sistem Smart Lock Door Berbasis Internet of Things (IoT) Menggunakan ESP32 Rizky Hardiyan Firmansyah; Chairul Mukmin
INTECOMS: Journal of Information Technology and Computer Science Vol 6 No 2 (2023): INTECOMS: Journal of Information Technology and Computer Science
Publisher : Institut Penelitian Matematika, Komputer, Keperawatan, Pendidikan dan Ekonomi (IPM2KPE)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31539/intecoms.v6i2.7661

Abstract

Saat ini tingkat kriminalitas yang bermacam-macam semakin bertambah, khususnya pembobolan rumah. Pada kenyataannya, kasus pembobolan rumah pada zaman sekarang dengan mudahnya dilakukan oleh para pencuri dengan membuka pengunci pada pintu karena pengamanan pintu hanya menggunakan kunci biasa (manual). Kurangnya sistem keamanan merupakan salah satu hal yang memudahkan pelaku menjalankan aksinya. Dalam hal ini maka perlu adanya sistem keamanan yang harus ditingkatkan. Berdasarkan permasalahan tersebut, peneliti akan meningkatkan sistem keamanan pintu rumah dengan menggunakan sistem smart lockdoor berbasis Internet of Things (IoT) menggunakan ESP32 yang diharapkan dapat bermanfaat dan lebih meningkatkan tingkat keamanan pintu rumah jika dibandingkan dengan kunci pintu konvensional. Penelitian ini menggunakan metode Action Research yang merupakan metode yang meneliti mengenai suatu tindakan yang memiliki tujuan untuk memberikan solusi atau meningkatkan kemampuan, mutu, dan kualitas dari suatu objek yang di teliti. Dengan adanya penelitian ini diharapkan dapat mengurangi rasa khawatir ketika tidak berada dirumah karena peneliti melakukan perancangan sistem pengamanan pintu berbasis ESP32 yang didukung dengan fitur-fitur yang terpasang seperti sensor sidik jari, kamera pemindai, alarm dan sistem notifikasi yang terhubung ke ponsel pemilik rumah.