Claim Missing Document
Check
Articles

Found 19 Documents
Search

Internet Machine Prototype with a Coin Payment Using a Rock Pi Microcontroller Azhar, Raisul; Santoso, Heroe; Hariyadi, I Putu; Husain, Husain; Afriandi, Mahsus
Jurnal Bumigora Information Technology (BITe) Vol 6 No 1 (2024)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v6i1.3543

Abstract

Background: Coins are widely used in game machines to play game applications. Internet use is usually done by purchasing an internet package. This method is often used, but coins are rarely used.Objective: The aim of this research is how to make a machine that is capable of using coins as internet payment, especially hotspots.Methods: The research method was carried out using an experimental method with stages of analysis, prototype design, and testing using a descriptive approach.Result: This research produced 1 one-unit prototype machine equipped with an application for internet hotspots by inserting IDR 500 and IDR 1000 coins with connection limits according to the value of the coins entered.Conclusion: This research produces prototypes and coin internet application software.
Otomasi Manajemen dan Pengawasan Linux Container (LCX) Pada Proxmox VE Menggunakan Ansible Pratama, Muh Akromi Arya; Hariyadi, I Putu
Jurnal Bumigora Information Technology (BITe) Vol 3 No 1 (2021)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v3i1.807

Abstract

In the development of internet service technology, it has become a major requirement as a means of communication and exchanging information. Especially in the field of education such as elementary schols, internet facilities are very much needed where the users are administrative staff, teachers, students via the internet can access various knowledge needed quickly, so that it can simplify the learning process. Therefore, the bandwidth sharing system or it can be called bandwidth management must be in accordance with the conditions of the network service to be applied and bandwidth management is indispensable for multi-service networks, because the more and more varied applications that can be served by a network have an effect on link usage. In the network. The method in this research uses library research and the implementation uses the Hierarchical Token Bucket method, which is an application that function to regulate the distribution of bandwidth. The purpose of this analysis is to provide a bandwidth management system to make a fair distribution for users connected to the network. The results showed that the Hierarchicak Token Bucket method can regulate bandwidth usage for each client when downloading, uploading, streaming and browsing
Assessing Twitter User Sentiment Regarding Divorce Issues Using the Random Forest Method Muhamad Azwar; I Putu Hariyadi; Raisul Azhar
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 4 No. 2 (2025): September 2025
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v4i2.4980

Abstract

The issue of divorce remains a complex and sensitive topic within Indonesian society, influenced by various factors such as repeated disputes, domestic violence, lack of harmony, financial difficulties, and other socio-cultural aspects. With the rise of social media, particularly Twitter, public discussions regarding divorce have become more widespread, allowing individuals to express their opinions and sentiments on the subject. These diverse perspectives create a wealth of sentiment data that can be analyzed to understand public perception and societal trends related to divorce. This study aims to classify public sentiment on divorce-related discussions using the Random Forest algorithm, providing insight into how people perceive and react to divorce issues. The research adopts a quantitative approach with a case study framework. The methodology involves data collection through web scraping techniques to gather approximately 1500 tweets containing discussions on divorce. The collected data is then preprocessed, including text cleaning, tokenization, and feature extraction, before being used to train and evaluate the Random Forest model. Sentiments are classified into three categories: negative, neutral, and positive. The classification model's performance is assessed using accuracy and F1-score metrics derived from the confusion matrix to determine its effectiveness in categorizing sentiments. Experimental results indicate that the Random Forest algorithm achieves an accuracy of 70%. The relatively low accuracy is attributed to the imbalance in sentiment class distribution, where negative sentiments dominate while positive sentiments are underrepresented. This imbalance affects the model's ability to predict positive sentiments effectively. The implications of this research contribute to a better understanding of public sentiment dynamics regarding divorce, which can be beneficial for policymakers, psychologists, and social researchers in analyzing societal attitudes towards marital dissolution.
Implementasi Metode Waterfall untuk Membuat Antarmuka pada Aplikasi Koperasi Simpan Pinjam Berbasis Mobile I Made Yadi Dharma; I Putu Hariyadi; Ahmat Adil; Heroe Santoso
Jurnal Teknologi Informasi dan Multimedia Vol. 6 No. 3 (2024): November
Publisher : Sekawan Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/jtim.v6i3.586

Abstract

Current technological developments have penetrated various sectors of human daily activities, almost every human activity is supported by technology that functions to facilitate the completion of work, starting from things that seem trivial to quite complicated work. Therefore, Banjar Tri Parartha residents who have a business unit in the form of a savings and loan cooperative with funds from member contributions, run it by carrying out cooperative principles to help the economic movement of its citizens based on the principle of family. At this time the process of recording, calculating to the reporting process is still done conventionally, so that cooperative administrators are quite busy every time they make an accountability report that is carried out every year. By running the analysis and design process in the application creation stage using the waterfall method. So in the interface design it is adjusted to what is needed by the cooperative. It is hoped that this research can be a reference in making applications as the next stage. By using the application design starting from the recording stage, processing calculations and presenting reports, it is hoped that all stakeholders will find it easier to monitor and obtain cooperative financial information, so that the transparency of cooperative funds can provide certainty for its members.
ANALISIS SENTIMENT KEUANGAN MENGGUNAKAN FINE-TUNED FINBERT Heroe Santoso; Raisul Azhar; Suryati Suryati; Melati Rosanensi; I Made Yadi Dharma; Husain Husain; Ahmat Adil; Muhamad Azwar; I Putu Hariyadi
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 6 No. 2 (2025): Desember 2025
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46764/teknimedia.v6i2.316

Abstract

Financial information is a critical type of data for analysis. However, because much of it is unstructured and widely dispersed, an appropriate analytical method is required, one of which is sentiment analysis. In the financial context, sentiment analysis is employed by the industry to assess public perceptions of companies or market conditions. This study implements a fine-tuned FinBERT model to perform sentiment analysis in the financial sector. The dataset used is a combination of FiQA (Financial Question Answering) and The Financial PhraseBank, consisting of English sentences labeled with negative, neutral, and positive sentiments. The research process involved data preprocessing, tokenization, data splitting, model training, and evaluation using accuracy, precision, recall, F1-score, and confusion matrix metrics. The results show that the model achieved 82% accuracy, with its best performance in the positive class (F1-score 0.88) and the neutral class (F1-score 0.85), but weaker performance in detecting the negative class (F1-score 0.49). These findings indicate that the fine-tuned FinBERT is effective for financial sentiment analysis, particularly for positive and neutral sentiments, though improvements are needed in negative sentiment detection, potentially through expanding training data diversity or applying data augmentation techniques
Sentralisasi Manajemen Hotspot Menggunakan Transparent Bridge Tunnel EoIP over SSTP I Putu Hariyadi
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 16 No. 2 (2017)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v16i2.8

Abstract

STMIK Bumigora is the first computer college in the province of West Nusa Tenggara (NTB). There are 11 hotspots spread across the campus to provide Internet services through a wireless connection for the academic community. The increasing number of hotspots that must be managed with locations scattered in various Mikrotik routers hence make the process of management and monitoring hotspots become complex, ineffective and efficient. Centralized campus hotspot management using a transparent bridge EoIP over SSTP can help solve the problems at hand. Ethernet over IP (EoIP) Tunneling is a Mikrotik RouterOS protocol that creates an Ethernet tunnel between routers over IP connections. EoIP tunnel built on SSTP tunnel (EoIP over SSTP) with Site-to-Site type. SSTP is a new form of Virtual Private Network (VPN) tunnel that provides a mechanism for encapsulating Point-toPoint Protocol (PPP) traffic through the SSL path of the HTTPS protocol. The IP address of the SSTP interface is used as the local reference and remote address of the EoIP over SSTP tunnel. The application of bridging on EoIP interfaces and interfaces connected to Access Point devices forms a logical network so that the management and monitoring of hotspot services can be performed centrally on one router.
Analisa Penerapan Private Cloud Computing Berbasis Proxmox Virtual Environment Sebagai Media Pembelajaran Praktikum Manajemen Jaringan I Putu Hariyadi; Akbar Juliansyah
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 18 No. 1 (2018)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v18i1.329

Abstract

STMIK Bumigora Mataram strives to develop a curriculum that adopts the needs of the industrial world. In the past 2 years, Network Management lecturers have experienced problems related to practicum implementation. During this time the learning process uses virtualization installed on each laboratory computer. However, the system has various weaknesses, especially related to the freedom of access and availability. The implementation of Private Cloud Computing based on Proxmox Virtual Environment (PVE) which in the cluster can be a solution to the problems faced. PVE cluster which is made using four servers and integrated with one storage server can be used as a learning media for network management practicum and support high availability so that live migration can be done. Users can manage Virtual Private Servers using Linux Container (LXC) independently with a login and limited access permission account and the configuration can be done through the console and SSH. All practicum materials were successfully tested on LXC. An FTP-based local repository built on a storage server can minimize the bandwidth usage of an Internet connection and speed up the package installation. In addition port forwarding on the gateway router can facilitate the remote access needs on LXC from the Internet.
Implementation of Configuration Management Virtual Private Server Using Ansible I Putu Hariyadi; Khairan Marzuki
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 19 No. 2 (2020)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v19i2.724

Abstract

Virtualization technology has been applied to universities with computer study programs to support practicum in Network Management courses. Each user gets a Virtual Private Server (VPS) with container technology. VPS system that is prepared manually requires a long time, especially when the number of users is increasing. The activity repeats every semester so it becomes ineffective and inefficient. Application of automation using Ansible can help to manage VPS objects in the Promox Virtual Environment (PVE) Cluster dynamically. Network Development Life Cycle (NDLC) was used as a method in this study. The design of the VPS management automation system created supports the grouping of container, user and permission resource management for users. The design is implemented in Ansible Playbook. The test results show the average time of making VPS objects per student with an automation system 2 (two) times faster, that is 26.25 seconds compared to the old system which takes 2 minutes 15 seconds. Besides that, the Playbook that was created succeeded in automating the start and stop containers per group of students based on the practicum schedule dynamically so as to maintain the availability of services from the PVE Cluster.
Implementation of Port Knocking with Telegram Notifications to Protect Against Scanner Vulnerabilities Husain Husain; I Putu Hariyadi; Kurniadin Abd Latif; Galih Tri Aditya
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol. 23 No. 1 (2023)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v23i1.3459

Abstract

The opening of the service port on the Mikrotik router provides an opening for hackers to enter the Mikrotik service to access the router illegally. This research aimed to close certain ports that are gaps for hackers and uses port knocking and telegram bots. The Telegram bot was used as a message notification to managers in real-time to provide information that occurs when the vulnerability scanning process is carried out to find and map weaknesses in the network system. Searching for weaknesses also includes looking for open router service ports such as ports 22, 23, 80, and 8291. This research used the Network Development Life Cycle method, which started from analysis design and prototype simulation to implementation. The research results after testing were able to secure local network service ports against vulnerability scanners on routers using the port knocking method, and testing attack schemes carried out from each scheme could run well on the router’s local network and obtain notifications via telegram bots in real time to administrators. This research contributes to administrators’ ability to secure networks so irresponsible people do not easily infiltrate them.