Claim Missing Document
Check
Articles

Found 30 Documents
Search

Optimization of The use of Wireless Lan Devices to Minimize Operational Costs Achmad Rian Tarmizi; Ahmat Adil; Lilik Widyawati
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 19 No 2 (2020)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (551.1 KB) | DOI: 10.30812/matrik.v19i2.665

Abstract

WLAN technology has been widely developed for the needs of internet access in people's lives. Several generations of WLAN technology include IEEE 802.11b, IEEE 802.11a, IEEE 802.11g and IEEE 802.11n. At the STAHN Rectorate Building, Gde Pudja Mataram, WLAN technology in its application requires financial consideration because excessive use of Internet Service Provider services results in a waste of operational costs. The application of WLAN is still not optimal, because there are not too many users, but the operational costs of implementing the local wireless network are very large, due to less optimal application of network infrastructure. The recommended WLAN technology is IEEE 802.11n, while the technology is the latest technology that has better quality than the previous generation technology. The research methodology uses the Network Development Life Cycle (NDLC). Of the 6 stages available, only 3 stages are used, namely Analysis, Design and Simulation of Prototyping. The results obtained from this study are models that design a WLAN that suits your needs, and complements the entire Building area. Optimization has succeeded in reducing the need for ISP and client services while still being able to enjoy services as needed and cost optimization can be reduced by around 28%.
Comparative Analysis of Image Steganography using SLT, DCT and SLT-DCT Algorithm Lilik Widyawati; Imam Riadi; Yudi Prayudi
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 20 No 1 (2020)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (834.332 KB) | DOI: 10.30812/matrik.v20i1.701

Abstract

Steganography is an interesting science to be studied and researched at this time, because steganography is the science of hiding messages on other digital media so that other parties are not aware of the existence of information in the digital media. Steganography is very effective in maintaining information security, because the existence of this information is obscured so that it is difficult to know where it is. This paper discusses hiding text into images using the Slantlet Transform (SLT) method, Descreate Cosine Transform (DCT) and Hybrid of SLT and DCT. The three methods are implemented in the frequency domain where steganographic imagery is transformed from the spatial domain to the frequency domain and the message bit is inserted into the cover image frequency component. The comparison parameters of these three techniques are based on MSE, PSNR, Capacity & Robustness. From the results of the tests that have been done, it is obtained that the highest PSNR value is generated using the SLT-DCT method, the largest storage capacity is the SLT method while the resistance, SLT-DCT method and DCT method are more resistant to attack than the SLT method.
ANALISA PENERAPAN SERVER DEPLOYMENT MENGGUNAKAN KUBERNETES UNTUK MENGHINDARI SINGLE OF FAILURE lilik Widyawati; Heroe Santoso; Hamdika Budiman
Jurnal Informatika Teknologi dan Sains Vol 3 No 1 (2021): EDISI 7
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (190.827 KB) | DOI: 10.51401/jinteks.v3i1.944

Abstract

Distributed computing systems are one of the requirements in implementing server-based applications such as database servers and web servers in order to achieve high levels of performance. The problem that often occurs is failure on the server so that the performance of a server is disrupted, so it takes a deployment technique that can be used to provide a distributed system with high performance. Container-based virtualization is the choice for running distributed systems because of its lightweight architecture, fast performance and resource efficiency. One of the container-based virtualisations is the introduction of a distributed systems development tool called Kubernetes, which allows managing server deployments to provide high availability systems. The system development methodology used is the Network Development Life Cycle (NDLC). Of the 6 stages, only 3 stages are used, namely Analysis, Design, and Simulation Prototyping. The test or test scenario carried out is Ftp Deploy and Nginx Web Server so that it can maintain availability and the system is able to failover when a server failure occurs
Penerapan E-Commerce dalam memasarkan produk UMKM Fitri Mutiara Lombok Husain; Sirojul Hadi; Muhammad Haris Nasri; Tomi Tri Sujaka; Lilik Widyawati; Bambang Krismono Triwijoyo; Christopher Michael Lauw
TRIDARMA: Pengabdian Kepada Masyarakat (PkM) Vol. 5 No. 2 (2022): Nopember: Pengabdian Kepada Masyarakat (PkM)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/abdimas.v5i2.3350

Abstract

Perkembangan teknolgi infromasi saat ini yang serba digitalisasi mendorong UMKM Fitri Mutiara Lombok dalam memasarkan produk UMKM nya secara online. Menurunnya penjualan secara langsung yang salah satu disebabkan terjadinya pandemic covid 19 mendorong pengabdi dalam membantu UMKM untuk memasarkan secara online. Kegiatan ini dilakukan bertujuan untuk membantu UMKM Fitri Lombok dalam memasarkan penjualan mutiaranya secara online atau e-Comers agar dapat meningkatkan penjualan. PKM ini menghasilkan sebuah aplikasi pengjuan online atau disebut juga dengan e-comers. Dengan e-comers yang telah di bangun dapat membantu UMKM Fitri Mutiara Lombok dalam meningkatkan produktifitas dalam hal penjualan yang biasanya dilakukan secara ofline tetapi juga bias secara online
Home Security Voice Notification System With Arduino Sensor, PIR based SMS Gateway Muh Thariq Ali Mujitomo; Heroe Santoso; Lilik Widyawati; Dadang Priyanto
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 1 (2022): March 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (439.189 KB) | DOI: 10.30812/ijecsa.v1i1.1793

Abstract

The level of crime that afflicts households such as theft and robbery is still common. Many thefts occur when the homeowner is away and the house is staying for a long time. Although some residential neighborhoods already have security officers, human limitations can be a gap for perpetrators of theft. To overcome this, we need a guard who is always there to monitor the house to avoid theft. In this case the risk of guards on duty to guard the house is very large, such as acts of theft accompanied by violence. The design and manufacture of this system uses the Network Development Life Cycle (NDLC) method. NDLC is a method that relies on previous development processes such as business strategy planning, application development lifecycle, and data distribution analysis. There are 6 stages in the Network Development Life Cycle (NDLC) namely Analysis, Design, Simulation Prototyping, Implementation, Monitoring, Management. The purpose of this research is Designing a home security system that can guard the house in real time and can be accessed remotely. The conclusion of this research is that the entire system is proven to be able to work in detecting, giving warnings, and making calls to the user.Network Development Life Cycle (NDLC) namely Analysis, Design, Simulation Prototyping, Implementation, Monitoring, Management. The purpose of this research is Designing a home security system that can guard the house in real time and can be accessed remotely. The conclusion of this research is that the entire system is proven to be able to work in detecting, giving warnings, and making calls to the user.
ANALISA PERBANDINGAN HYBRID CRYPTOGRAPHY RSA-AES DAN ECDH-AES UNTUK KEAMANAN PESAN Lilik Widyawati; Husain Husain; Muhamad Azwar; Mikha Christian Satria Girsang
Jurnal Teknologi Informasi dan Komputer Vol 9, No 2 (2023): Jurnal Teknologi Informasi dan Komputer
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTInformation exchange becomes easier, information exchange can easily be known by unauthorized parties if it is not accompanied by a security system, this can be overcome by combining symmetric algorithms with asymmetric algorithms or commonly called Hybrid cryptography. This research was conducted with the aim of knowing the results of the Comparative Analysis of Hybrid cryptography RSA-AES and ECDH-AES in message security by measuring processing time, memory and security when the algorithm is run on measuring applications. The methodology used in making the measurement application to be built is Rapid Application Development. (RAD) and the stages used are requirements planning, application design, and implementation. The results of the RSA-AES experiment found that the lowest and highest RSA-AES processing times were 0.03 seconds and 7 seconds, the lowest and highest RSA-AES memory were 2.9 KB and 8.9 KB, while in the ECDH -AES experiment, the results shows that the lowest and highest processing time is 0.003 seconds and 0.01 seconds, the lowest and highest ECDH-AES memory is 2.6 KB and 4.2 KB. The safety test shows that it takes 4.6 seconds on the secp192r1 curve with 4 digit numbers in the discrete logarithm of the elliptic curve while on prime factors, it takes 0.003 seconds to solve the problem with 4 digit numbers. Based on the experiments that have been carried out, it is known that ECDH-AES has faster time performance and lower memory requirements and higher security.Keywords : Hybrid Cryptography, RSA-AES, ECDH-AES, Prime Factorization, Elliptic Curve Discrete LogarithmsABSTRAKPertukaran informasi sudah semakin mudah dilakukan, pertukan informasi tersebut bisa dengan mudah untuk diketahui oleh pihak yang tidak berwenang jika tidak dibarengi dengan system keamanan, hal ini dapat diatasi dengan menggabungkan algoritma simetris dengan algoritma asimetris atau biasa disebut Hybridcryptography. Penelitian ini dilakukan dengan tujuan untuk mengetahui hasil Analisa Perbandingan Hybridcryptography RSA-AES dan ECDH-AES dalam keamanan pesan dengan mengukur waktu proses, memori dan keamanan saat algoritma dijalankan di aplikasi pengukur .Metodologi yang digunakan dalam pembuatan aplikasi pengukur yang akan dibangun adalah Rapid Application Development (RAD) dan tahapan yang digunakan yaitu perencanaan kebutuhan, perancangan aplikasi, dan implementasi. Hasil percobaan RSA-AES, diperoleh bahwa waktu proses terendah dan tertinggi RSA-AES adalah 0.03 detik dan 7 detik, memori terendah dan tertinggi RSA-AES adalah 2.9 KB dan 8.9 KB, sedangkan pada percobaan ECDH-AES, diperoleh hasil bahwa waktu proses terendah dan tertinggi adalah 0.003 detik dan 0.01 detik, memori terendah dan tertinggi ECDH-AES adalah 2.6 KB dan 4.2 KB. Percobaan keamanan menunjukan bahwa dibutuhkan waktu selama 4.6 detik di kurva secp192r1 dengan 4 digit angka di logaritma diskrit kurva eliptik sedangkan pada pemfaktoran prima, dibutuhkan waktu selama 0.003 detik untuk memecahkan masalah dengan 4 digit angka. Berdasarkan percobaan yang telah dilakukan diketahui bahwa ECDH-AES memiliki performa waktu yang lebih cepat dan kebutuhan memori yang lebih rendah serta kemanan yang lebih tinggi.Kata Kunci : Hybridcryptography, RSA-AES, ECDH-AES, Faktorisasi Prima, Logaritma Diskrit Kurva Eliptik
Distribution Network Expansion Analysis Using Branching Optical Distribution Point (ODP) and Fiber Optic Attenuation (FO) Methods Husain Husain; Engelbertus Mite; Raisul Azhar; Lilik Widyawati; Apriani Apriani
Jurnal Bumigora Information Technology (BITe) Vol 5 No 1 (2023)
Publisher : Prodi Ilmu Komputer Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v5i1.2959

Abstract

Background : Data access using copper is considered slower than Fiber Optic access networks, which encourages many customers who switch to Fiber Optic. Objective : This study aims to analyze the installation of Fiber Optic networks using Optic System Software in new areas and analyze attenuation in Fiber Optic networks using Link power budget. Method : The method used in this study is PPDIOO : Prepare, Plan, Design, Implement, Operate, and Optimize. Results : The Optical Power Meter (OPM) simulation on the new ODP using Opti System produces a value of receiving power (Pr) -19.48 dBm (as a sample) and for the calculation results using the Power Link Budget (PLB) the total value of receiving Power (Pr) -20.40 dBm while Measurement results using Optical Power Meter (OPM) (Pr) -19.89 dBm (as a sample). Conclusion : The results of measurements and measurements have similarities, namely if the distance between the Optical Distribution Cabinet (ODC) and Optical Distribution Point (ODP) is greater, the greater the value of the receiving power or attenuation.
Analysis of Rclone Implementation for File Sharing Security on OneDrive Cloud Storage Widyawati, Lilik; Azwar, Muhammad; Alafi, Hairudin; Asif, Iqra
Jurnal Bumigora Information Technology (BITe) Vol 6 No 1 (2024)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v6i1.4082

Abstract

Background: OneDrive provides a reliable infrastructure for storing and managing user data. However, along with the benefits, the security challenges associated with storing and sharing files in the cloud are also increasing. One of the main aspects of cloud storage security management is the file-sharing process. While OneDrive offers a few security features, such as access control and two-factor authentication, there remains a need to strengthen additional layers of security, especially when sharing files with external parties.Objective: This research aims to analyze the effectiveness of Rclone in improving file-sharing security on OneDrive, especially File Backup and File Encryption.Methods: This research uses the Network Development Life Cycle (NDLC) method, which includes six stages. This research focuses on three stages: analysis, design, and simulation prototyping.Result: The application of Rclone for file sharing security on OneDrive can increase data security in cloud storage, as evidenced by three backup attempts on .doc files with an average time of 2.033 seconds and successful encryption of 4 files with an average time of 37 seconds.Conclusion: Using Rclone as a tool to manage data security on OneDrive improves data protection and provides flexibility and efficiency in file management, making it an effective solution for file sharing security needs in cloud storage
Implementasi Perangkat Lunak Deteksi Penyakit Retinopati Hipertensi Di Polimata Rumah sakit Umum Provinsi Nusa Tenggara Barat Triwijoyo, Bambang Krismono; Adil, Ahmat; Zulfikri, Muhammad; Widyawati, Lilik; Titik Ceriyani Miswaty; Elyakim Nova Supriyedi Patty
Jurnal Pengabdian kepada Masyarakat IPTEKS Vol. 2 No. 1 (2024)
Publisher : Rajawali Media Utama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Hypertensive retinopathy is a type of eye disease where microvascular changes occur in the retina experienced by high blood pressure sufferers. The arterial and venous ratio (AVR) in the retina of the eye is an indicator used to determine the presence of high blood pressure, which is measured by the ratio of the width of the retinal arteries and veins. Traditionally, ophthalmologists use fundus images or retinal images of the eye to diagnose hypertensive retinopathy's physical symptoms and determine the phase of evolution. Still, traditional methods have limitations because, in the case of borderline stages, the early symptoms of hypertensive retinopathy will be difficult to identify manually, so they are often ignored. Referring to these problems, early diagnosis is needed for accurate prevention and treatment of hypertensive retinopathy. Based on the abovementioned issues, this service activity aims to implement a hypertensive retinopathy disease detection model using a local dataset from a regional general hospital in West Nusa Tenggara (NTB). It will compare the model detection results with those of three eye disease experts. Classification model testing results using the Messidor training and NTB Regional Hospital datasets. In models using the Messidor training dataset, the highest accuracy is a comparison with the results of the most senior expert's observations. The results of the classification model are only a tool to assist ophthalmologists in diagnosing hypertensive retinopathy, while the final decision remains with the expert or ophthalmologist.
Manajemen Operasional Implementasi Manajemen Operasional Sederhana untuk Meningkatkan Efisiensi Produksi pada Pelaku UMKM di Desa Beleka kecamatan Praya Timur kabupaten Lombok Tengah: Implementasi Manajemen Operasional Sederhana Widia Febriana; Rini Anggriani; I Nyoman Yoga Sumadewa; Lilik Widyawati; Noviansyah; Lady Faerrosa
Jurnal Pengabdian kepada Masyarakat IPTEKS Vol. 2 No. 2 (2025)
Publisher : Rajawali Media Utama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Kegiatan pengabdian kepada masyarakat ini dilaksanakan dengan tujuan untuk meningkatkan efisiensi produksi pada pelaku Usaha Mikro, Kecil, dan Menengah (UMKM) di Desa Beleka, Kecamatan Praya Timur, Kabupaten Lombok Tengah, melalui penerapan manajemen operasional sederhana. Berdasarkan observasi awal, sebagian besar pelaku UMKM di desa ini menghadapi tantangan dalam mengelola proses produksi secara efektif, mulai dari pengaturan alur kerja, penggunaan waktu, hingga manajemen bahan baku. Kegiatan pengabdian ini dilakukan dalam bentuk pelatihan partisipatif, pendampingan teknis, serta penerapan alat bantu operasional seperti standar operasional prosedur (SOP) produksi, pencatatan waktu kerja, dan sistem kontrol persediaan sederhana. Hasil dari kegiatan menunjukkan adanya perbaikan signifikan dalam efisiensi produksi, di antaranya penurunan waktu proses hingga 25%, pengurangan limbah bahan baku, serta peningkatan kapasitas produksi harian. Kegiatan ini membuktikan bahwa pendekatan manajemen operasional yang sederhana namun kontekstual dapat memberikan dampak nyata terhadap peningkatan produktivitas dan daya saing UMKM desa. Model ini diharapkan dapat direplikasi pada desa lain dengan kondisi serupa di wilayah Lombok dan sekitarnya.