Claim Missing Document
Check
Articles

Found 15 Documents
Search

Analysis and Design of Production Monitoring Information Systems on Label Shoe Manufacturing Companies Jansen Wiratama; Rudi Sutomo; Victor Ilyas Sugara
Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika Vol 20, No 1 (2023): Komputasi: Jurnal Ilmiah Ilmu Komputer dan Matematika
Publisher : Ilmu Komputer, FMIPA, Universitas Pakuan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33751/komputasi.v20i1.6075

Abstract

Digital technology can be used to solve problems that arise from business activity. One company that has not optimally used digital technology is PT Tiga Tapak Mutiara, which is engaged in manufacturing shoe labels. In its business process, each related division collects data, and the data collection results will be reported to the manager to unify work activities. The production data collection process has not been carried out optimally by the relevant divisions because the conventional recording is still carried out using a spreadsheet application which can slow down the reporting process to be monitored by the leadership. As a result, a slow process can impact not completing production on time. In addition to the problem of data collection, another problem is that the completion of orders received earlier is not compared to the orders received last. The aim and contribution of this research are to integrate business processes to overcome these problems in data collection, monitoring, and order completion activities. It is necessary to design a web-based monitoring information system with the Rapid Application Development (RAD) method and the application of the First In, First Out (FIFO) method so that the ordering process can run according to the time of order. The result of this research is a web-based information system that is useful for integrating business processes to monitor and optimize production activities to be completed on time. This web-based information system has also passed the functionality test using black box testing and is following the company's needs.
Alert Control Model for Exposure of COVID-19 in Industrial Closed Work Space Hermawan Hermawan; Kotim Subandi; Adriana Sari Aryani; Syarif Hidayatullah; Dinar Munggaran Akhmad; Victor Ilyas Sugara
Journal of Applied Sciences and Advanced Technology Vol 5, No 3 (2023): Journal of Applied Sciences and Advanced Technology
Publisher : Faculty of Engineering Universitas Muhammadiyah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24853/jasat.5.3.105-112

Abstract

The Covid-19 pandemic has changed the industrial management system, including the regulation of labor. Most of the work in the industry cannot be done through work from home, but must still be in production units. In a number of cases, clusters of COVD 19 were found in the industry, forcing the industry to have to lock down. The problem of the lack of a model for controlling the spread of COVID 19 in the manufacturing industry is the basis for this research. The model designed in this study is also expected to be relevant in the new normal era for the manufacturing industry. The modeling and application of COVID-19 control research in the manufacturing industry is carried out through four stages, namely identification and characterization of work patterns, model design and validation, model implementation and verification, and model comparison testing. At the stage of identification and characterization of work patterns using the methods as guided by the International Labor Organization. The design phase and model validation used the Epidemic Mathematics approach and the Shewhart Control Chart. The application of the model in the industry is in accordance with the guidelines for working in a factory during the COVID-19 Pandemic according to the World Health Organization. The comparative test of the model will be processed using the diversity test. The data used is collected from the company in the form of simple tracing monitoring data for workers before entering the work area and shortly before leaving the work area, COVID 19 test data if any, employee health data, and other data if relevant to support this research. The data obtained is used for model design, both the employee health control model and the COVID-19 distribution model in the work area. The model is made with a scope that is limited only to the industrial work environment, not including outside facilities. Contamination to employees may occur when employees return home or are outside the factory. The model also does not adopt the presence of employees who are being treated for COVID-19 healing in a healing facility. In the Shewhart Control Chart model, it is hoped that a control limit can be obtained that can be used to monitor fluctuations in employee health, the diagram will be designed for daily monitoring of workers. Out-of-control data becomes a warning to carry out a reliability test (Capability) and to trace sources of contamination obtained by employees.
Analisis Serangan Vulnerabilities Terhadap Server Selama Work from Home saat Pandemi Covid-19 sebagai Prosedur Mitigasi Kotim Subandi; Victor Ilyas Sugara
Jurnal Asiimetrik: Jurnal Ilmiah Rekayasa Dan Inovasi Volume 4 Nomor 2 Tahun 2022
Publisher : Fakultas Teknik Universitas Pancasila

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35814/asiimetrik.v4i1.3127

Abstract

Since the COVID-19 Pandemic occurred, companies engaged in the retail sector have experienced a decline in the impact of government regulations such as PSBB (Large-Scale Social Restrictions) so that all activities were carried out from home or Work from Home (WFH). to assist companies or agencies with various types of information systems in carrying out their business activities and operations This server is one of the most important in the retail company. The opening of several accesses from the public network (internet) to the local area network (LAN) The security of a LAN network that is accessed from a public network is usually an administrator's problem. Often, the security problems of both the network and the entire application system, as well as the web server, are neglected just to ensure that operational activities run smoothly, and security is only realised after a disaster occurs. Without a good network security and application system, the application of any sophisticated technology will be very dangerous for the company, institution, or organisation itself. So, it takes a security analysis of all activities on the LAN, servers, and other devices to prevent mitigation and to be more aware of server security vulnerabilities. Based on the context of the existing issues, a penetration testing analysis is required. As supporting material, this research also uses guidelines from the CEH (Certified Ethical Hacker) module and the official Acunetix website. The test of this research is aimed at finding the weaknesses of the existing company/institution servers. Among others, quite a lot of weaknesses were found, where each of these weaknesses has a different handling, ports that should be blocked but are opened freely, and access to public IPs that are less important should be closed. The solutions proposed to overcome these problems include: the use of this Acunetix standard can be maintained and continued; testing is much better if carried out more than two times; periodically upgrading SNMP (Simple Network Management Protocol) vulnerable; increasing the level of server security; migration of quality antivirus; and upgrade of expired operating systems.
Peningkatan Keamanan pada Simple Network Time Protocol (SNTP) untuk Mendeteksi Cybercrime di dalam Aktivitas Jaringan: Improved Security on Simple Network Time Protocol (NTP) to Detect Cybercrime in Network Activity Kotim Subandi; Victor Ilyas Sugara; Adriana Sari Aryani
Jurnal Asiimetrik: Jurnal Ilmiah Rekayasa Dan Inovasi Volume 5 Nomor 1 Tahun 2023
Publisher : Fakultas Teknik Universitas Pancasila

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35814/asiimetrik.v5i1.4113

Abstract

Today's cybercrime methods are extremely diverse. The methods employed by attackers are becoming more diverse and intricate. Malicious software, commonly referred to as malware, is utilized in these various attacks. Malware threats and their propagation can be accomplished in several different ways. Good governance facilitates prevention via migration, assisting the security team and network infrastructure IT. This paper discusses efforts to enhance the security of the Simple Network Time Protocol (SNTP) to detect cybercrime on the network. Based on the results of the conducted experiments, we determined that by updating the Simple Network Time Protocol, implementing the client-server antivirus, and scanning every client connected to the local network or centrally, we could detect the types of attacks that frequently occur on the network system, thereby protecting all client computers from malware, viruses, worms, and Trojan horses. Based on the antivirus migration data, the employed research method can find information on cybercrimes that involve malware that enters the network and is successfully cleaned or quarantined before being automatically blocked.
Modeling Queue Length at The Toll Gate Using Promodel Before and After Ramp-Off Construction Muhamad Hafizi; Syauqi Abyan Hafiz; Bambang Sugiharto; Eneng Tita Tosida; Abdul Thalib Bin Bon; Victor Ilyas Sugara; Kotim Subandi; Yasir Salih
International Journal of Quantitative Research and Modeling Vol. 6 No. 1 (2025): International Journal of Quantitative Research and Modeling
Publisher : Research Collaboration Community (RCC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46336/ijqrm.v6i1.905

Abstract

In everyday life, queues often occur. Waiting at the counter to get train or movie tickets, at the toll gate, at the bank, at the supermarket, and in other situations that we often encounter Queues occur when the need for services exceeds the capacity or capacity of the service facility. As a result, users of the facility cannot get immediate service due to the busyness of the service. The Amplas Toll Gate queue is the object of this research. The Amplas Toll Gate is one of the densest toll gates that is heavily traveled by vehicles both entering and exiting. This makes it often seen a fairly long queue, especially during peak hours in the late afternoon to evening. The Medan City Government built an off ramp at the Amplas flyover in 2016. This off ramp leads directly to the Amplas toll gate. The vehicle arrival rate increases along with the queue length because vehicles can arrive faster to the toll gate. This study aims to calculate the queue length at the Amplas toll gate before and after the construction of the ramp off. Data is obtained by recording the volume of vehicles at the research location. With an average service time of 7 seconds, the queuing method produces a queue length of 11.98 meters, while the results using Pro Model software are 11.98 meters. In addition, the queue length after the construction of the ramp off decreased to 6.67 meters from before the construction of the ramp off. Promodel is a windows-based simulation software used to simulate and analyze a system.