Claim Missing Document
Check
Articles

Found 30 Documents
Search

Finding Features of Multiple Linear Regression On Currency Exchange Pairs Raymond Sunardi Oetama; Ford Lumban Gaol; Benfano Soewito; Harco Leslie Hendric Spits Warnars
ULTIMA InfoSys Vol 13 No 1 (2022): Ultima InfoSys : Jurnal Ilmu Sistem Informasi
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/si.v13i1.2683

Abstract

Due to the prospects for financial gain, forex is always attractive to many people. However, because forex market analysis is not simple, a computer is needed to assist in creating predictions using features that are understandable to people. This study employs the Multilinear Regression technique to identify these kinds of features. The features and prediction target have a very strong correlation. With a very low RMSE and a very high R square, the prediction quality is quite outstanding. The outcome will help academics in the forex field use machine learning algorithms to make better predictions.
Smart Agriculture Water System Using Crop Water Stress Index and Weather Prediction Jason Timotius Purwoko; Taurean Orlin Wingardi; Benfano Soewito
CommIT (Communication and Information Technology) Journal Vol. 17 No. 1 (2023): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v17i1.8435

Abstract

Water is essential for crops to grow well. However, overwatered or underwatered plants hinder growth and produce less fruit than plants with sufficient watering. Using the Internet of Things (IoT), agriculture can be controlled to achieve the best condition for plants to grow. The research aims to develop a watering system based on Crop Water Stress Index (CWSI), soil moisture content, and weather prediction. By evaluating CWSI and soil moisture content, the research makes a smart watering system that efficiently monitors water concentration in a plant. However, there is a flaw in the watering system that water from the rain makes the plant overwatered. So, using weather prediction can delay irrigation to save water and produce a better stress index result. Next, the research compares the watering system using four pots: (1) weather prediction, CWSI, and soil moisture watering system; (2) CWSI and soil moisture watering syste;, (3) soil moisture watering system; (4) manual irrigation watering system to get the best watering system by water consumption and CWSI. The results show a significant difference by using CWSI. It gets a 42.7754% smaller CWSI value by using CWSI value in making watering decisions. By adding weather prediction, the research saves water consumption by 21.9% compared to CWSI and soil moisture watering systems. These results show that weather prediction and CWSI are vital for IoT plant watering systems.
Model Manajemen Risiko Sistem Informasi Untuk Sistem Informasi Manajemen Kepegawaian Eka Yulisuyanti; Benfano Soewito
Techno.Com Vol 22, No 3 (2023): Agustus 2023
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/tc.v22i3.8356

Abstract

Sistem informasi dan aplikasi manajemen kepegawaian memiliki peran penting dalam menjaga kerahasiaan data pribadi karyawan, terutama di sektor pemerintahan di mana manajemen karier sangat bergantung pada informasi dari data Aparatur Sipil Negara (ASN) dalam sistem informasi kepegawaian. Selain sebagai sumber informasi, aplikasi ini juga berfungsi sebagai perantara pengguna dan database. Namun, seringkali aplikasi ini menjadi target serangan siber yang bertujuan mengakses data pribadi ASN. Tidak ada aplikasi yang dapat menjamin keamanan mutlak atau bebas dari serangan semacam itu. Oleh karena itu, diperlukan pengembangan manajemen risiko teknologi informasi yang dapat diimplementasikan saat terjadi serangan. Penerapan framework standar untuk manajemen risiko dalam sistem informasi tidaklah mudah, sehingga diperlukan pedoman yang komprehensif. Penelitian ini bertujuan membangun model manajemen risiko khusus untuk sistem informasi kepegawaian, mengadopsi panduan NIST 800-34 Rev 1 dan NIST 800-61 Rev 2, serta mengintegrasikan teori terkait dengan pengembangan manajemen risiko dan contingency plan yang ada. Metode penelitian melibatkan tinjauan literatur sebelumnya dan analisis panduan NIST terkait manajemen risiko teknologi informasi untuk mengidentifikasi tahapan yang signifikan pada model manajemen risiko dalam sistem informasi. Penelitian ini akan menghasilkan model manajemen risiko yang mencakup analisis dampak bisnis, rencana tanggap insiden, dan rencana pemulihan bencana, dirancang khusus untuk sistem informasi kepegawaian dalam konteks pemerintahan.
Multi-Object Detection Using YOLOv7 Object Detection Algorithm on Mobile Device Patricia Citranegara Kusuma; Benfano Soewito
Journal of Applied Engineering and Technological Science (JAETS) Vol. 5 No. 1 (2023): Journal of Applied Engineering and Technological Science (JAETS)
Publisher : Yayasan Riset dan Pengembangan Intelektual (YRPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37385/jaets.v5i1.3207

Abstract

This research discusses the importance of enhancing real-time object detection on mobile devices by introducing a new multi-object detection system that uses the quantified YOLOv7 model. Focusing on the complexities of food item detection, particularly in diverse and intricate contexts, our study uses a dataset that includes five food classes. By investigating the influence of data quantity on the detection model, we demonstrate the superiority of larger datasets in both YOLOv5 and YOLOv7. In addition, our comparison shows that YOLOv7 has better precision, recall, and F1-score values compared to YOLOv5. The crucial methodological contribution lies in the successful quantification of the YOLOv7 model, reducing the model size from 28.6 KB to 14.3 KB and enabling seamless mobile application development. This high-performance mobile application displays a real-time interface response time of 235ms, with precision, recall, and F1-score values of 0.923, 0.9, and 0.911, respectively. Beyond the practical implications for informed dietary choices and improved health outcomes, our study develops object detection techniques theoretically, offering valuable insights that can be applied across various domains and emphasizing the potential impact of our approach on both theory and practice
Analisis Keamanan Infrastruktur Jaringan Berdasarkan Cyber Kill Chain Framework Panggabean, Utama Hasiolan; Soewito, Benfano
JUSIFO : Jurnal Sistem Informasi Vol 9 No 1 (2023): JUSIFO (Jurnal Sistem Informasi) | June 2023
Publisher : Program Studi Sistem Informasi, Fakultas Sains dan Teknologi, Universitas Islam Negeri Raden Fatah Palembang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19109/jusifo.v9i1.17365

Abstract

This study concentrates on examining the security of network infrastructure using the cyber kill chain framework approach. The research is conducted within a company operating in network security services. In its operations, it offers a Virtual Private Cloud (VPC) containing various crucial information such as applications, internal data, client data, and product demos. Despite the attractive features of cloud computing, there are significant threats as well. Handling attacks cannot be swiftly and efficiently executed, resulting in temporary operational unavailability until the attacks are resolved. This research delves into the security of the company's infrastructure by testing several points of vulnerability exploited by malicious parties. The cyber kill chain framework approach is employed to systematically assess the company's infrastructure. The study reveals that certain issues have been adequately detected; however, security gaps persist, as evidenced by the testing conducted and the inadequate response from the company's security systems.
Perancangan Tata Kelola TI Menggunakan Framework COBIT 2019 pada Pusat Data dan Informasi Kementerian XYZ Afdhani, Rizqi; Soewito, Benfano
Jurnal Tata Kelola dan Kerangka Kerja Teknologi Informasi Vol. 10 No. 1 (2024): Mei 2024
Publisher : Universitas Komputer Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/jtk3ti.v10i1.12365

Abstract

The Data and Information Center (Pusdatin) is one of the organizational units of a government institution responsible for managing Information and Communication Technology (ICT) in the Ministry XYZ. Many issues have been identified in the development and management of information systems by Pusdatin of the Ministry XYZ due to the absence of proper IT governance standards. Therefore, IT governance is needed to optimize the use of technology within the agency to support the goals of Pusdatin of the Ministry XYZ. This research uses the COBIT 2019 framework, which is the latest version of COBIT released by ISACA. The aim of this study is to assess the capability levels, determine gap values, and provide recommendations for an IT governance framework in Pusdatin of the Ministry XYZ based on the COBIT 2019 framework. The research method includes literature review, observations, and interviews following the COBIT 2019 Design Guide. The mapping results identify three priority domains: APO09 (Managed Service Agreements), BAI10 (Managed Configuration), and DSS01 (Managed Operations). The measurements capability levels show that all three domains are currently at level 1, while the target is level 4, indicating a significant gap. Improvement recommendations are provided for IT governance activities based on COBIT 2019 best practices for each domain. The highest priority is given to improving BAI10 to establish a strong configuration management foundation, followed by enhancing IT operational processes through DSS01 and improving user satisfaction with a focus on IT services through APO09
Analisis Perbandingan Metode Seleksi Fitur untuk Mendeteksi Anomali pada Dataset CIC-IDS-2018 Devia, Anne; Soewito, Benfano
Jurnal Teknologi Dan Sistem Informasi Bisnis Vol 5 No 4 (2023): Oktober 2023
Publisher : Prodi Sistem Informasi Universitas Dharma Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jteksis.v5i4.1069

Abstract

As internet usage continues to increase, the risk of various cyber attacks originating from suspicious activities in networks is also growing. This study focuses on designing a machine learning model for anomaly detection, with a comparative analysis of feature selection methods including filter, wrapper, and hybrid approaches. Subsequently, to evaluate the outcomes of these feature selection methods, classification is performed on the selected features using classifier algorithms such as Random Forest, XGBoost, and MLP. Metrics used for analyzing the methods and classifier algorithms include accuracy level and processing time. The research demonstrates that feature selection can alleviate computational load without compromising accuracy. The filter feature selection method using Information Gain and the XGBoost classifier algorithm exhibit the best performance in terms of accuracy and short execution time.
Measurement of Security System Performance on Websites of Personnel Information Systems in Government Using Common Vulnerability Scoring System Putra, Ferlan Gisma; Soewito, Benfano
Jurnal Pendidikan Tambusai Vol. 6 No. 1 (2022): 2022
Publisher : LPPM Universitas Pahlawan Tuanku Tambusai, Riau, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/jptam.v6i1.3336

Abstract

Perkembangan komputer semakin pesat terutama sebagai media komunikasi data. Salah satu bentuk nyata dari evolusi teknologi adalah berkembangnya media informasi online seperti website yang dapat diakses di seluruh dunia selama terhubung dengan jaringan internet tanpa dibatasi oleh ruang dan waktu. Kerentanan keamanan sistem jaringan komputer adalah kelemahan dalam sistem yang dapat dimanfaatkan oleh satu atau lebih penyerang untuk melakukan serangan yang dapat membahayakan kerahasiaan, integritas, atau ketersediaan suatu sistem. Sehingga diperlukan penerapan keamanan yang lebih baik, pada proyek ini dilakukan analisis keamanan website dengan metode scanning dan perhitungan metrik keamanan dengan pengukuran pada sistem informasi Common Vulnerability Scoring System (CVSS) pada website Sistem informasi kepegawaian di lingkungan Pemerintah , melalui metode Scanning Vulnerability Assessments untuk menganalisa keamanan pada website. Hasil yang diperoleh dalam perhitungan metrik keamanan menggunakan perhitungan skor dasar menunjukkan nilai yang tinggi untuk tingkat keparahan paling berbahaya dalam pencurian data di situs web pemerintah..
Design Of Sd-Wan On Insurance Holding Company PT. XYZ Using On-Demand Tunnel Full Mesh Connectivity Satriawan, Marchand; Soewito, Benfano
Jurnal Pendidikan Tambusai Vol. 6 No. 1 (2022): 2022
Publisher : LPPM Universitas Pahlawan Tuanku Tambusai, Riau, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/jptam.v6i1.3354

Abstract

Modernisasi infrastruktur akan menjadi kebutuhan yang mendesak dan peningkatan kualitas pelayanan membuat PT. XYZ menghadapi tantangan serius dalam mencapai tujuannya untuk meningkatkan layanan asuransi dan penjamin emisi terbesar di Indonesia. Ini termasuk tantangan yang cukup kompleks dalam mengendalikan pengelolaan fasilitas dan proses bisnis yang ada. Ruang lingkup tugas akhir ini adalah untuk membandingkan kinerja sebelum dan sesudah implementasi SD-WAN pada jaringan antar anggota PT.XYZ dalam hal manajemen, biaya operasional, kemudahan kontrol, dan juga manajemen terpusat. Berdasarkan penelitian yang dilakukan dengan membandingkan hasil sebelum dan sesudah implementasi Cisco SD-WAN untuk PT. XYZ, maka dapat disimpulkan bahwa pengujian berjalan dengan baik. Dengan diterapkannya SD-WAN akan memecahkan masalah dan tantangan dalam merger IT yang baru saja dilakukan sebagai Holding BUMN Asuransi.
Lot Based Indoor Lightning System Based On Human Activity Cahyadi, Kevin; Soewito, Benfano
Jurnal Pendidikan Tambusai Vol. 6 No. 2 (2022): Agustus 2022
Publisher : LPPM Universitas Pahlawan Tuanku Tambusai, Riau, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/jptam.v6i2.4047

Abstract

Lampu sebagai sumber penerangan masih memiliki kekurangan dalam efektifitas karena sistem ini dioperasikan secara manual dan tidak menggunakan pengaruh penerangan dari luar dan aktivitas manusia. Makalah ini bertujuan untuk merancang sistem pencahayaan dalam ruangan yang dapat mengatur pencahayaan dari luar dan aktivitas manusia sehingga sistem tersebut dapat mencegah pencahayaan yang berlebihan agar tidak terjadi pemborosan energi. Sistem ini memanfaatkan Internet of Things atau IoT sebagai pengaturan sistem pencahayaan dalam ruangan jarak jauh. Selain itu, sistem kontrol pencahayaan ini juga akan dikembangkan menggunakan metode logika fuzzy untuk menghasilkan aplikasi seperti sistem kontrol yang lebih fleksibel dan canggih dibandingkan dengan sistem konvensional. Hasil penelitian ini menunjukkan bahwa sistem pencahayaan ruangan dapat diatur secara fleksibel. baik dengan menggunakan beberapa sensor untuk menentukan aktivitas manusia maupun dengan menggunakan metode logika fuzzy, sistem dapat mengatur intensitas cahaya yang dihasilkan berdasarkan aktivitas manusia maupun dengan menggunakan IoT sebagai pengaturan jarak jauh.