Claim Missing Document
Check
Articles

Found 28 Documents
Search

Sistem Informasi Geografis Pemetaan Sebaran Data Covid-19 Pada Puskesmas Kerongkong Kabupaten Lombok Timur Berbasis Web Imam Fathurrahman; Moh Farid Wajdi; Hadian Mandala Putra; Baiq Vinaru Widarina
Infotek: Jurnal Informatika dan Teknologi Vol 5, No 1 (2022): Infotek : Jurnal Informatika dan Teknologi
Publisher : Fakultas Teknik Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (498.624 KB) | DOI: 10.29408/jit.v5i1.4392

Abstract

An information system is a collection of data or facts that are processed and processed in such a way as to produce something that can be understood and can be useful for the recipient. Among the general public, the need for accurate and fast information is urgently needed at this time, especially information regarding the spread of the Covid-19 disease that is hitting the world today. Covid-19 (Coronavirus) is a virus that can attack the respiratory tract and can be transmitted to anyone through droplets of phlegm. However, in conveying information by the Kerongkong Health Center officers regarding the Covid-19 distribution area in the Suralaga sub-district, they still use the socialization method. This method is considered right on target, but it is considered less effective for villages that have a fairly high distribution rate in the Suralaga sub-district. Therefore, an information system for Mapping the Covid-19 Spread Area is needed that is fast and accurate in conveying information to the public, the goal is to make it easier for the puskesmas to take preventive actions against areas that have a fairly high spread rate by looking at the location of the distribution area in the sub-district. suralaga. WebGIS is a web-based geographic information system consisting of several components, namely mapping graphic design, digital maps with geographic analysis, computer programs, and a database that are interconnected into one part. In the preparation of the stages of this research carried out by means of data collection, system design, system creation stage, testing and evaluation. The existence of WebGIS mapping the patient's location can help the throat health center in collecting data on Covid-19 patients and can quickly provide information to the public.
Analisa Performa Klastering Data Besar pada Hadoop Hadian Mandala Putra; Taufik Akbar; Ahwan Ahmadi; Muhammad Iman Darmawan
Infotek: Jurnal Informatika dan Teknologi Vol 4, No 2 (2021): Infotek : Jurnal Informatika dan Teknologi
Publisher : Fakultas Teknik Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (386.986 KB) | DOI: 10.29408/jit.v4i2.3565

Abstract

Big Data is a collection of data with a large and complex size, consisting of various data types and obtained from various sources, overgrowing quickly. Some of the problems that will arise when processing big data, among others, are related to the storage and access of big data, which consists of various types of data with high complexity that are not able to be handled by the relational model. One technology that can solve the problem of storing and accessing big data is Hadoop. Hadoop is a technology that can store and process big data by distributing big data into several data partitions (data blocks). Problems arise when an analysis process requires all data spread out into one data entity, for example, in the data clustering process. One alternative solution is to do a parallel and scattered analysis, then perform a centralized analysis of the results of the scattered analysis. This study examines and analyzes two methods, namely K-Medoids Mapreduce and K-Modes without Mapreduce. The dataset used is a dataset about cars consisting of 3.5 million rows of data with 400MB distributed in a Hadoop Cluster (consisting of more than one engine). Hadoop has a MapReduce feature, consisting of 2 functions, namely map and reduce. The map function performs a selection to retrieve a key, value pairs, and returns a value in the form of a collection of key value pairs, and then the reduce function combines all key value pairs from several map functions. The results of the cluster quality evaluation are tested using the Silhouette Coefficient testing metric. The K-Medoids MapReduce algorithm for the car dataset gives a silhouette value of 0.99 with a total of 2 clusters.
PERBANDINGAN HASIL TOOL FORENSIK PADA FILE IMAGE SMARTPHONE ANDROID MENGGUNAKAN METODE NIST ahwan ahmadi; Taufik Akbar; Hadian Mandala Putra
JIKO (Jurnal Informatika dan Komputer) Vol 4, No 2 (2021)
Publisher : Journal Of Informatics and Computer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33387/jiko.v4i2.2812

Abstract

Salah satu cara mengamankan suatu file agar tidak berubah-ubah pada sebuah teknik forensik digital adalah dengan cara membuat cloning suatu devices atau menyalin keseluruhan file pada suatu devices (smartphone) kedalam bentuk suatu file yaitu dalam bentuk file Image yang bisa dibuka dimanapun dan dengan tools apapun yang mendukung terbukanya file Image hasil cloningan suatu devices. Penggunaan tools forensik digital khususnya forensics mobile tergantung dari pilihan examiner dalam melakukan ekstraksi data dari file Image tersebut. Metode National Institute of Standard and Technology (NIST) digunakan dalam penelitian ini dengan tahapan seperti Coolection/Preservation, Examination, Analysis dan Reporting. Hasil ekstraksi yang kemudian dianalisa dengan menggunakan metode NIST didapatkan hasil dari penggunaan tool forensik seperti Belkasoft Evidence Center berhasil melakukan ekstraksi data dari sebuah file Image smartphone android Samsung GT-S5282 dengan tingkat akurasi ekstraksi data sebesar 66,66% dari variabel yang sudah ditentukan dan juga ditemukan file panggilan dan pesan yang sudah terhapus didevices pengguna. Tool Magnet AXIOM mendapatkan tingkat akurasi dari smartphone yang sama sebesar 55,55% dari variabel yang sudah ditentukan dan dalam proses analisis ditemukan banyak sekali file carving dalam devices pengguna. Hasil penelitian ini dapat disimpulkan bahwa tool Belkasoft Evidence Center lebih memiliki kinerja yang baik daripada tool Magnet AXIOM dalam proses exstraksi data dari sebuah file Image smartphone android. Hasil penelitian ini bisa dijadikan sebagai rujukan bagi para examiner dalam menentukan tool forensic digital yang mumpuni dalam menangani sebuah kasus kejahatan digital.
Pelatihan penggunaan aplikasi Inventaris Gudang Puskesmas Sakra Hamzan Ahmadi; Aris Sudianto; Hadian Mandala Putra; Muhammad Iman Darmawan
ABSYARA: Jurnal Pengabdian Pada Masayarakat Vol 2 No 2 (2021): ABSYARA: Jurnal Pengabdian Pada Masyarakat
Publisher : Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29408/ab.v2i2.4204

Abstract

An inventory system is a system that manages data on items owned by an office. A good inventory system will help a company manage data on goods owned by the company. Not only do big companies need an inventory system, but small offices also need an inventory system. Likewise, with the Health Center, managing data such as drugs, medical equipment, stationery, etc., requires a good warehouse inventory system. Therefore, this service activity aims to develop and train the Health Center Warehouse Inventory application. The partner of this activity is the Sakra Community Health Center (administrative staff). The methods used are lectures, mentoring, and direct practice using applications. The result of this activity is the production of warehouse inventory system software for the Sakra Health Center. In addition, the Sakra Health Center's administrative staff can also run the software
Sistem Informasi Berbasis Web Untuk Pemetaan Geografis Lahan Pertanian (Studi Kasus : Desa Darmasari Kecamatan Sikur Lombok Timur) Suhartini Suhartini; Hadian Mandala Putra; Muhammad Saipul; Lalu Kerta Wijaya
Infotek: Jurnal Informatika dan Teknologi Vol. 6 No. 1 (2023): Infotek : Jurnal Informatika dan Teknologi
Publisher : Fakultas Teknik Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29408/jit.v6i1.7521

Abstract

The potential of agricultural land in Indonesia is still extensive, so the agricultural sector is still one of the incomes for most Indonesians. The agricultural land sector is widespread in various regions in Indonesia, one of which is in Darmasari Village, Sikur District. As an agricultural area, most of the population in Darmasari Village chooses livelihood as farmers. However, the distribution of agricultural land has not been mapped, which can provide information about the location of agricultural land, especially those in Darmasari Village. In this study, a web-based Agricultural Land Geographic Information System was constructed in Darmasari village. The geographic information system that is built can display information in the form of spatial and non-spatial data that describes an object based on the state of the earth. The method used in creating this system is to use the object-oriented method. With the construction of this Geographic Information System, it is hoped that it will be able to provide information for the community about the distribution of the location and area of agricultural land, especially in the Darmasari Village area
Penerapan Sistem Informasi untuk Media Absensi Menggunakan QR Code Suhartini Suhartini; Hadian Mandala Putra; Nurhidayati Nurhidayati
Infotek: Jurnal Informatika dan Teknologi Vol. 6 No. 2 (2023): Infotek : Jurnal Informatika dan Teknologi
Publisher : Fakultas Teknik Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29408/jit.v6i2.17479

Abstract

Attendance is something that must be done by students. In the attendance process, SMPN 3 Terara still uses the manual method. Therefore, we need a student attendance system that can collect and store the data so that it can be processed quickly, efficiently and accurately. One of the technologies currently developing is QR Code, QR Code is very much needed because of its ability to store larger data so that it can provide fast and accurate services. One of the things that can be done to support the author in designing a QR Code Application for Media Student Attendance services for SMPN 3 Terara is using the Extreme Programming research method. The purpose of this research is to establish an attendance system so that the process will be more efficient and can be monitored easily by the teacher and by the academic department. The results of this study are a student attendance application that uses a QR code as a medium for student attendance input based on a local network which is implemented in order to create an attendance information system that provides convenience for students in the attendance process, reduces acts of cheating committed by students, and facilitates reports when making recaps report.
Sistem Keamanan Server Linux CentOS Dengan Metode Port Knock dan RST Cookies Muh. Adrian Juniarta Hidayat; Hadian Mandala Putra
Infotek: Jurnal Informatika dan Teknologi Vol. 6 No. 2 (2023): Infotek : Jurnal Informatika dan Teknologi
Publisher : Fakultas Teknik Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29408/jit.v6i2.17500

Abstract

The increase in online-based services makes a security system for server computers increasingly needed. A server computer is a device that must always be available to be accessed anytime and anywhere. Some of the security systems needed for server computers include security for ssh port access for remote server access needs and a security system to protect servers from Denial of Service (DoS) attacks which can make the server down and completely inaccessible. In this study, a security system is proposed for a server computer with the Linux CentOS operating system on a port 22 secure shell(ssh) access system using the port knock method and a security system to prevent Denial of Service (DoS) attacks on server computers using the RST Cookies method. The simulation results from the port 22 Secure Shell (SSH) access experiment for the server computer can work well where port 22 Secure Shell(SSH) will remain closed and cannot be accessed carelessly except by accessing several ports first according to predefined port knocking rules. Likewise, the implementation of a security system with the RST Cookies method works very well to prevent Denial of Service (DoS) attacks and can still keep the server accessible with a good response time of under 1 ms
Pelatihan aplikasi komputer santri MDQH (Ma’had Darul Qur’an wal-Hadits) Almajidiah Asy-Syafi’ah NWDI-Pancor Taufik Akbar; Ahwan Ahmadi; Hadian Mandala Putra; M Nuzuluddin; Intan Komala Dewi Patwari; Alimudin Alimudin
ABSYARA: Jurnal Pengabdian Pada Masayarakat Vol 4 No 1 (2023): ABSYARA: Jurnal Pengabdian Pada Masyarakat
Publisher : Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29408/ab.v4i1.18926

Abstract

In public perception, religious scholars (Ulama) serve as highly trusted sources of information, particularly within Indonesian society. Therefore, it is imperative to ensure that Ulama possesses adequate digital literacy to convey accurate and reliable information. This study aims to provide computer training to the students (santri) of Ma'had MQDH NW Pancor, enabling them to master relevant computer technologies and applications. The training primarily focuses on internet literacy and Microsoft Office applications, employing a combination of lectures and hands-on practice. Ten participants from various levels of study were involved in the program, which took place at Laboratory 1, Faculty of Engineering, Hamzanwadi University. The results of the training revealed that 57.1% of the participants expressed high satisfaction levels, while 71.4% reported an increase in their understanding after completing the training. In conclusion, this computer training program has demonstrated positive benefits in enhancing the digital comprehension and skills of the students, preparing them to tackle digital challenges in the future.
Eksplorasi Pemetaan Pelanggan dan Prioritas Pengembangan Jaringan Internet : Pendekatan Sistem Informasi Geografis Berbasis Web dan AHP Suhartini, Suhartini; Ahmadi, Hamzan; Mandala Putra, Hadian; Haeruzzikri, Haeruzzikri; Muhammad Djamaluddin
Infotek: Jurnal Informatika dan Teknologi Vol. 7 No. 2 (2024): Infotek : Jurnal Informatika dan Teknologi
Publisher : Fakultas Teknik Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29408/jit.v7i2.26062

Abstract

ArsyaNet, a local internet service provider, strives to deliver fast and reliable internet access to its customers. This study aims to implement a web-based Geographic Information System (GIS) for customer mapping and network development prioritization using the Analytic Hierarchy Process (AHP) method at ArsyaNet. Leaflet is employed to map the distribution of ArsyaNet customers within the RT/RW network in the Pringgasela District. The main objective of this research is to accurately and efficiently map the distribution of internet customers to support optimal network development. By integrating AHP into the GIS, customer preferences and other relevant factors such as access speed, service quality, and infrastructure needs in specific areas will be considered in determining the priority locations for network development. The AHP method allows for the grouping of customers based on their preferences and determining locations by considering weights on each relevant aspect. Integrating Leaflet into the GIS enables accurate and interactive mapping results using a lighter map compared to the Google Maps API. This research is conducted to enhance the quality of internet services provided by ArsyaNet by better understanding the needs and preferences of customers in selecting internet service providers and their customer distribution.
Revolusi Keamanan Berkendara : Sistem Keselamatan Berbasis Mikrokontroller Hadian Mandala Putra; Akbar, Taufik; Hafifan Triadi Putra, Ahmad; Ida Wahidah; Suhartini
Infotek: Jurnal Informatika dan Teknologi Vol. 7 No. 2 (2024): Infotek : Jurnal Informatika dan Teknologi
Publisher : Fakultas Teknik Universitas Hamzanwadi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29408/jit.v7i2.26119

Abstract

The increasing need for transportation, especially motorcycles, has led to many illegal methods and criminal actions by individuals committing motorcycle theft. Fundamentally, security and safety are the primary concerns motorcycle users must pay attention to on the road. Many vehicle users neglect safety while riding, such as inappropriate driving. Some actions endanger themselves and other drivers, like using a cell phone while riding, causing the rider to lose focus. Therefore, this research offers a solution as a microcontroller-based security and safety system aimed at minimizing motorcycle theft and improving riding safety. The solution from this research is to produce a microcontroller-based technology utilizing RFID for security, touch sensors, and push buttons for safety when the rider does not follow proper riding procedures. The Research & Development method is used in this research, with five stages: analysis, design, development, implementation, and evaluation. The results of this study are a prototype of a security and safety system based on an Arduino Uno microcontroller as the control center. Regarding security, the vehicle starts only with registered access in the control center, which is then placed on the RF reader installed on the car. From the test results, using an e-KTP as the vehicle access medium successfully started the motorcycle with a 0% error rate from 10 trials. Regarding rider safety, using a touch sensor to test the number of passengers was successful, with an 80% success rate from 10 trials. The push button succeeded with a 100% success rate from 10 trials when users did not position their hands on both motorcycle handles (bars) and successfully triggered the alarm when the rider was not riding correctly.