Claim Missing Document
Check
Articles

Found 32 Documents
Search

ANALISA PENERAPAN SERVER DEPLOYMENT MENGGUNAKAN KUBERNETES UNTUK MENGHINDARI SINGLE OF FAILURE lilik Widyawati; Heroe Santoso; Hamdika Budiman
Jurnal Informatika Teknologi dan Sains Vol 3 No 1 (2021): EDISI 7
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (190.827 KB) | DOI: 10.51401/jinteks.v3i1.944

Abstract

Distributed computing systems are one of the requirements in implementing server-based applications such as database servers and web servers in order to achieve high levels of performance. The problem that often occurs is failure on the server so that the performance of a server is disrupted, so it takes a deployment technique that can be used to provide a distributed system with high performance. Container-based virtualization is the choice for running distributed systems because of its lightweight architecture, fast performance and resource efficiency. One of the container-based virtualisations is the introduction of a distributed systems development tool called Kubernetes, which allows managing server deployments to provide high availability systems. The system development methodology used is the Network Development Life Cycle (NDLC). Of the 6 stages, only 3 stages are used, namely Analysis, Design, and Simulation Prototyping. The test or test scenario carried out is Ftp Deploy and Nginx Web Server so that it can maintain availability and the system is able to failover when a server failure occurs
Penerapan E-Commerce dalam memasarkan produk UMKM Fitri Mutiara Lombok Husain; Sirojul Hadi; Muhammad Haris Nasri; Tomi Tri Sujaka; Lilik Widyawati; Bambang Krismono Triwijoyo; Christopher Michael Lauw
TRIDARMA: Pengabdian Kepada Masyarakat (PkM) Vol. 5 No. 2 (2022): Nopember: Pengabdian Kepada Masyarakat (PkM)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/abdimas.v5i2.3350

Abstract

Perkembangan teknolgi infromasi saat ini yang serba digitalisasi mendorong UMKM Fitri Mutiara Lombok dalam memasarkan produk UMKM nya secara online. Menurunnya penjualan secara langsung yang salah satu disebabkan terjadinya pandemic covid 19 mendorong pengabdi dalam membantu UMKM untuk memasarkan secara online. Kegiatan ini dilakukan bertujuan untuk membantu UMKM Fitri Lombok dalam memasarkan penjualan mutiaranya secara online atau e-Comers agar dapat meningkatkan penjualan. PKM ini menghasilkan sebuah aplikasi pengjuan online atau disebut juga dengan e-comers. Dengan e-comers yang telah di bangun dapat membantu UMKM Fitri Mutiara Lombok dalam meningkatkan produktifitas dalam hal penjualan yang biasanya dilakukan secara ofline tetapi juga bias secara online
Home Security Voice Notification System With Arduino Sensor, PIR based SMS Gateway Muh Thariq Ali Mujitomo; Heroe Santoso; Lilik Widyawati; Dadang Priyanto
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 1 (2022): March 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (439.189 KB) | DOI: 10.30812/ijecsa.v1i1.1793

Abstract

The level of crime that afflicts households such as theft and robbery is still common. Many thefts occur when the homeowner is away and the house is staying for a long time. Although some residential neighborhoods already have security officers, human limitations can be a gap for perpetrators of theft. To overcome this, we need a guard who is always there to monitor the house to avoid theft. In this case the risk of guards on duty to guard the house is very large, such as acts of theft accompanied by violence. The design and manufacture of this system uses the Network Development Life Cycle (NDLC) method. NDLC is a method that relies on previous development processes such as business strategy planning, application development lifecycle, and data distribution analysis. There are 6 stages in the Network Development Life Cycle (NDLC) namely Analysis, Design, Simulation Prototyping, Implementation, Monitoring, Management. The purpose of this research is Designing a home security system that can guard the house in real time and can be accessed remotely. The conclusion of this research is that the entire system is proven to be able to work in detecting, giving warnings, and making calls to the user.Network Development Life Cycle (NDLC) namely Analysis, Design, Simulation Prototyping, Implementation, Monitoring, Management. The purpose of this research is Designing a home security system that can guard the house in real time and can be accessed remotely. The conclusion of this research is that the entire system is proven to be able to work in detecting, giving warnings, and making calls to the user.
ANALISA PERBANDINGAN HYBRID CRYPTOGRAPHY RSA-AES DAN ECDH-AES UNTUK KEAMANAN PESAN Lilik Widyawati; Husain Husain; Muhamad Azwar; Mikha Christian Satria Girsang
Jurnal Teknologi Informasi dan Komputer Vol 9, No 2 (2023): Jurnal Teknologi Informasi dan Komputer
Publisher : LPPM Universitas Dhyana Pura

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTInformation exchange becomes easier, information exchange can easily be known by unauthorized parties if it is not accompanied by a security system, this can be overcome by combining symmetric algorithms with asymmetric algorithms or commonly called Hybrid cryptography. This research was conducted with the aim of knowing the results of the Comparative Analysis of Hybrid cryptography RSA-AES and ECDH-AES in message security by measuring processing time, memory and security when the algorithm is run on measuring applications. The methodology used in making the measurement application to be built is Rapid Application Development. (RAD) and the stages used are requirements planning, application design, and implementation. The results of the RSA-AES experiment found that the lowest and highest RSA-AES processing times were 0.03 seconds and 7 seconds, the lowest and highest RSA-AES memory were 2.9 KB and 8.9 KB, while in the ECDH -AES experiment, the results shows that the lowest and highest processing time is 0.003 seconds and 0.01 seconds, the lowest and highest ECDH-AES memory is 2.6 KB and 4.2 KB. The safety test shows that it takes 4.6 seconds on the secp192r1 curve with 4 digit numbers in the discrete logarithm of the elliptic curve while on prime factors, it takes 0.003 seconds to solve the problem with 4 digit numbers. Based on the experiments that have been carried out, it is known that ECDH-AES has faster time performance and lower memory requirements and higher security.Keywords : Hybrid Cryptography, RSA-AES, ECDH-AES, Prime Factorization, Elliptic Curve Discrete LogarithmsABSTRAKPertukaran informasi sudah semakin mudah dilakukan, pertukan informasi tersebut bisa dengan mudah untuk diketahui oleh pihak yang tidak berwenang jika tidak dibarengi dengan system keamanan, hal ini dapat diatasi dengan menggabungkan algoritma simetris dengan algoritma asimetris atau biasa disebut Hybridcryptography. Penelitian ini dilakukan dengan tujuan untuk mengetahui hasil Analisa Perbandingan Hybridcryptography RSA-AES dan ECDH-AES dalam keamanan pesan dengan mengukur waktu proses, memori dan keamanan saat algoritma dijalankan di aplikasi pengukur .Metodologi yang digunakan dalam pembuatan aplikasi pengukur yang akan dibangun adalah Rapid Application Development (RAD) dan tahapan yang digunakan yaitu perencanaan kebutuhan, perancangan aplikasi, dan implementasi. Hasil percobaan RSA-AES, diperoleh bahwa waktu proses terendah dan tertinggi RSA-AES adalah 0.03 detik dan 7 detik, memori terendah dan tertinggi RSA-AES adalah 2.9 KB dan 8.9 KB, sedangkan pada percobaan ECDH-AES, diperoleh hasil bahwa waktu proses terendah dan tertinggi adalah 0.003 detik dan 0.01 detik, memori terendah dan tertinggi ECDH-AES adalah 2.6 KB dan 4.2 KB. Percobaan keamanan menunjukan bahwa dibutuhkan waktu selama 4.6 detik di kurva secp192r1 dengan 4 digit angka di logaritma diskrit kurva eliptik sedangkan pada pemfaktoran prima, dibutuhkan waktu selama 0.003 detik untuk memecahkan masalah dengan 4 digit angka. Berdasarkan percobaan yang telah dilakukan diketahui bahwa ECDH-AES memiliki performa waktu yang lebih cepat dan kebutuhan memori yang lebih rendah serta kemanan yang lebih tinggi.Kata Kunci : Hybridcryptography, RSA-AES, ECDH-AES, Faktorisasi Prima, Logaritma Diskrit Kurva Eliptik
Distribution Network Expansion Analysis Using Branching Optical Distribution Point (ODP) and Fiber Optic Attenuation (FO) Methods Husain Husain; Engelbertus Mite; Raisul Azhar; Lilik Widyawati; Apriani Apriani
Jurnal Bumigora Information Technology (BITe) Vol 5 No 1 (2023)
Publisher : Prodi Ilmu Komputer Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v5i1.2959

Abstract

Background : Data access using copper is considered slower than Fiber Optic access networks, which encourages many customers who switch to Fiber Optic. Objective : This study aims to analyze the installation of Fiber Optic networks using Optic System Software in new areas and analyze attenuation in Fiber Optic networks using Link power budget. Method : The method used in this study is PPDIOO : Prepare, Plan, Design, Implement, Operate, and Optimize. Results : The Optical Power Meter (OPM) simulation on the new ODP using Opti System produces a value of receiving power (Pr) -19.48 dBm (as a sample) and for the calculation results using the Power Link Budget (PLB) the total value of receiving Power (Pr) -20.40 dBm while Measurement results using Optical Power Meter (OPM) (Pr) -19.89 dBm (as a sample). Conclusion : The results of measurements and measurements have similarities, namely if the distance between the Optical Distribution Cabinet (ODC) and Optical Distribution Point (ODP) is greater, the greater the value of the receiving power or attenuation.
Analysis of Rclone Implementation for File Sharing Security on OneDrive Cloud Storage Widyawati, Lilik; Azwar, Muhammad; Alafi, Hairudin; Asif, Iqra
Jurnal Bumigora Information Technology (BITe) Vol 6 No 1 (2024)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v6i1.4082

Abstract

Background: OneDrive provides a reliable infrastructure for storing and managing user data. However, along with the benefits, the security challenges associated with storing and sharing files in the cloud are also increasing. One of the main aspects of cloud storage security management is the file-sharing process. While OneDrive offers a few security features, such as access control and two-factor authentication, there remains a need to strengthen additional layers of security, especially when sharing files with external parties.Objective: This research aims to analyze the effectiveness of Rclone in improving file-sharing security on OneDrive, especially File Backup and File Encryption.Methods: This research uses the Network Development Life Cycle (NDLC) method, which includes six stages. This research focuses on three stages: analysis, design, and simulation prototyping.Result: The application of Rclone for file sharing security on OneDrive can increase data security in cloud storage, as evidenced by three backup attempts on .doc files with an average time of 2.033 seconds and successful encryption of 4 files with an average time of 37 seconds.Conclusion: Using Rclone as a tool to manage data security on OneDrive improves data protection and provides flexibility and efficiency in file management, making it an effective solution for file sharing security needs in cloud storage
Implementasi Perangkat Lunak Deteksi Penyakit Retinopati Hipertensi Di Polimata Rumah sakit Umum Provinsi Nusa Tenggara Barat Triwijoyo, Bambang Krismono; Adil, Ahmat; Zulfikri, Muhammad; Widyawati, Lilik; Titik Ceriyani Miswaty; Elyakim Nova Supriyedi Patty
Jurnal Pengabdian kepada Masyarakat IPTEKS Vol. 2 No. 1 (2024)
Publisher : Rajawali Media Utama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Hypertensive retinopathy is a type of eye disease where microvascular changes occur in the retina experienced by high blood pressure sufferers. The arterial and venous ratio (AVR) in the retina of the eye is an indicator used to determine the presence of high blood pressure, which is measured by the ratio of the width of the retinal arteries and veins. Traditionally, ophthalmologists use fundus images or retinal images of the eye to diagnose hypertensive retinopathy's physical symptoms and determine the phase of evolution. Still, traditional methods have limitations because, in the case of borderline stages, the early symptoms of hypertensive retinopathy will be difficult to identify manually, so they are often ignored. Referring to these problems, early diagnosis is needed for accurate prevention and treatment of hypertensive retinopathy. Based on the abovementioned issues, this service activity aims to implement a hypertensive retinopathy disease detection model using a local dataset from a regional general hospital in West Nusa Tenggara (NTB). It will compare the model detection results with those of three eye disease experts. Classification model testing results using the Messidor training and NTB Regional Hospital datasets. In models using the Messidor training dataset, the highest accuracy is a comparison with the results of the most senior expert's observations. The results of the classification model are only a tool to assist ophthalmologists in diagnosing hypertensive retinopathy, while the final decision remains with the expert or ophthalmologist.
Manajemen Operasional Implementasi Manajemen Operasional Sederhana untuk Meningkatkan Efisiensi Produksi pada Pelaku UMKM di Desa Beleka kecamatan Praya Timur kabupaten Lombok Tengah: Implementasi Manajemen Operasional Sederhana Widia Febriana; Rini Anggriani; I Nyoman Yoga Sumadewa; Lilik Widyawati; Noviansyah; Lady Faerrosa
Jurnal Pengabdian kepada Masyarakat IPTEKS Vol. 2 No. 2 (2025)
Publisher : Rajawali Media Utama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Kegiatan pengabdian kepada masyarakat ini dilaksanakan dengan tujuan untuk meningkatkan efisiensi produksi pada pelaku Usaha Mikro, Kecil, dan Menengah (UMKM) di Desa Beleka, Kecamatan Praya Timur, Kabupaten Lombok Tengah, melalui penerapan manajemen operasional sederhana. Berdasarkan observasi awal, sebagian besar pelaku UMKM di desa ini menghadapi tantangan dalam mengelola proses produksi secara efektif, mulai dari pengaturan alur kerja, penggunaan waktu, hingga manajemen bahan baku. Kegiatan pengabdian ini dilakukan dalam bentuk pelatihan partisipatif, pendampingan teknis, serta penerapan alat bantu operasional seperti standar operasional prosedur (SOP) produksi, pencatatan waktu kerja, dan sistem kontrol persediaan sederhana. Hasil dari kegiatan menunjukkan adanya perbaikan signifikan dalam efisiensi produksi, di antaranya penurunan waktu proses hingga 25%, pengurangan limbah bahan baku, serta peningkatan kapasitas produksi harian. Kegiatan ini membuktikan bahwa pendekatan manajemen operasional yang sederhana namun kontekstual dapat memberikan dampak nyata terhadap peningkatan produktivitas dan daya saing UMKM desa. Model ini diharapkan dapat direplikasi pada desa lain dengan kondisi serupa di wilayah Lombok dan sekitarnya.
Pengembangan Pasar Digital pada UMKM Desa Batu Kumbang Widyawati, Lilik; Melati Rosanensi; Hasbullah; Tomi Tri Sujaka; Christofer Satria
Jurnal Ilmiah Pengabdian dan Inovasi Vol. 1 No. 4 (2023): Jurnal Ilmiah Pengabdian dan Inovasi (Juni)
Publisher : Insan Kreasi Media

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.57248/jilpi.v1i4.232

Abstract

This time the community service for Bumigora University lecturers was carried out in Batu Kumbung village, Lingsar sub-district, West Lombok Regency, in Batu Kumbung village there are several MSMEs engaged in the culinary field such as Clarias Food, Mangosteen Coffee, Ant Sugar, Dodol, Klepon and Fresh Fruit businesses. However, these MSMEs have not been maximal in marketing the results of products made, especially digital marketing, currently product marketing is still carried out traditionally, so efforts are needed to increase the marketing of products that have been produced, to assist in digital marketing, a digital market application is needed that can be used to promote a brand using digital media that can reach consumers in a timely, personal, and relevant manner. The output achieved is the creation of a digital market application (E-Commarce Website) so that it can assist MSMEs in marketing their respective products. With this digital market application, it makes it easier for MSMEs, starting from the promotion process to the sales transaction process for MSME results in the culinary field in Batu Kumbung village.
Development of an AI-Based Self-Diagnosis System for Tropical Diseases Nasri, Muhammad Haris; Wibisanaa, Bayu; Widyawati, Lilik
Sistemasi: Jurnal Sistem Informasi Vol 14, No 3 (2025): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v14i3.4650

Abstract

Tropical diseases are common in tropical and subtropical regions and are often difficult to diagnose due to symptoms that resemble other conditions and limited access to healthcare facilities. This study aims to develop a self-diagnosis application that integrates the Certainty Factor and Dempster-Shafer methods to improve the accuracy and reliability of tropical disease diagnosis. The application is expected to assist the public in conducting preliminary diagnoses independently, enabling timely treatment and reducing mortality and morbidity rates. The novelty of this research lies in the integration of these two artificial intelligence methods, offering an innovative solution to enhance diagnostic capabilities. The system achieved an accuracy rate of 83% based on testing, with the Certainty Factor method addressing uncertainty in symptom inputs, while the Dempster-Shafer method complements its limitations by managing uncertainty more adaptively. This combination enables more comprehensive diagnostic recommendations. However, challenges remain in cases with limited symptom data, indicating the need for further development to enhance algorithm performance and expand the clinical database