Articles
ANALISIS KUALITAS WEBSITE BERDASAR PERSEPSI PENGGUNA MENGGUNAKAN METODE WEBQUAL 4.0 (STUDI KASUS PADA APLIKASI ITOS DI AREA TANJUNG PRIOK II DOMESTIK PT IPC TPK)
Maydhi Wiratamara Nursholehah;
Sunny Arief Sudiro
Jurnal Mitra Manajemen Vol 4 No 9 (2020): Jurnal Mitra Manajemen Edisi September
Publisher : Kresna Bina Insan Prima
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52160/ejmm.v4i9.454
Di era globalisasi teknologi internet semakin besar karena hampir semua kegiatan bisnis dilakukan melalui dunia maya. Fungsi dari teknologi informasi adalah dapat mempermudah masyarakat dalam menyebarkan informasi melalui internet. Salah satu teknologi informai yang digunakan dalam era digital ini adalah website. Website sering digunakan dalam perusahaan salah satunya untuk membantu fungsi perencanaan dan pengendalian proses pelayanan dan penanganan barang. Proses tersebut juga dilakukan di PT IPC TPK dengan menggunakan website iTOS. iTOS adalah aplikasi berbasis web pada terminal yang dibangun untuk mendukung kegiatan pelayanan petikemas. Aplikasi website iTOS perlu dikaji untuk mengetahui kualitas website menurut pengguna operasional di wilayah Tanjung Priok II. Penelitian ini menggunakan metode WebQual 4.0. Data kuesioner yang didapat tersebut diolah dengan menggunakan SPSS. Kualitas website iTOS dan kepuasan pengguna berdasarkan perhitungan dimensi Information Quality (X1) 80,3% dan User Satisfaction (Y) memiliki penilaian “Layak” 73,8%, sedangkan untuk dimensi Usability Quality (X2) 88,4% dan Interaction Quality (X3) 78,68% memiliki penilaian “Sangat Layak”.
Fingerprint Authenticity Classification Algorithm based-on Distance of Minutiae using Convolutional Neural Network
Hariyanto Hariyanto;
Sarifuddin Madenda;
Sunny Arief Sudiro;
Tubagus Maulana Kusuma
InComTech : Jurnal Telekomunikasi dan Komputer Vol 11, No 3 (2021)
Publisher : Department of Electrical Engineering
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.22441/incomtech.v11i3.13770
Fingerprint identification systems are vulnerable to attempted authentication fraud by creating fake fingerprints that mimic the live. This paper proposes method to detect whether a fingerprint is live fingerprint or fake fingerprint using Convolutional Neural Network (CNN). We construct a features database of distances among minutiaes of fingerprints, where the distance calculation is based-on Euclidean Distance. Furthermore, the distance features database that has been constructed is classified using the CNN. CNN is a deep learning method designed for machine learning processes so that computers recognize objects in an image and this method has capability classifying an object. The numerical results have shown that the best accuracy achieves 99.38% when the learning rate is 0.001 with the epoch of 100.
Generation of Teeth Caries Features for Human Dental Caries Classification
Linda Wahyu Widianti;
Sarifuddin Madenda;
Johan Harlan;
Sunny Sudiro;
Farina Pramanik
InComTech : Jurnal Telekomunikasi dan Komputer Vol 11, No 3 (2021)
Publisher : Department of Electrical Engineering
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.22441/incomtech.v11i3.13804
Many dental diseases are experienced by humans, one of which is dental caries, there are three types of human dental caries, namely enamel caries, dentin caries and pulp caries. This study contains the detection of caries disease in human teeth using two-dimensional images and radiological results of x-ray periapical radiographs from a test image dataset that has a number of pixels between 374x288 to 672x514 pixels with an image resolution of 96 DPI. The original data of existing dental images was processed using Matlab language to obtain caries features through three stages of the processes: pre-processing stage which are stages of the preprocessing process that converts data from a two-dimensional color image (row/height, column/width) that is stored using three channels Red, Green and Blue (RGB), into a grayscale image with one channel, the process of extracting dental caries features by performing calculations caries area and calculate the distance of the caries area to the nerve canal (pulp), and the process of building learning or reference data from dental caries using 24 radiograph periapical data on molar tooth images processed using Matlab. Dental caries features extraction process and the features learning process to generate references features from dental caries is the main objective of this research. This study result was references features for human dental caries classification.
Smart Trolley : Array
Delta Agus Wardiananto;
Sunny Arief Sudiro
Jurnal Ilmiah Komputasi Vol. 19 No. 2 (2020): Jurnal Ilmiah Komputasi Volume: 19 No. 2, Juni 2020
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.32409/jikstik.19.2.94
Dalam perkembangan dunia teknologi saat ini banyak sekali memberikan dampak positif pada ilmu Interaksi Manusia dan Komputer (Human Computer Interaction). Pada saat ini manusia dimungkinkan dapat berinteraksi dengan komputer malalui perintah layer sentuh (touchscreen), perintah suara (voice command), gerakan tangan (motion gesture), gerakan mata (eyes motion) dan sebagainya. Interaksi Manusia dan Komputer (Human Computer Interaction) merupakan suatu disiplin ilmu yang mengajarkan dan mengkaji komunikasi atau interaksi antara pengguna dengan sistem. Tujuan dari Interaksi Manusia dan Komputer (Human Computer Interaction) adalah menghasilkan sebuah sistem yang berguna, aman, produktif, efektif, efisien dan fungsional Maksud dari paper ini yaitu membahas mengenai perkembangan dan inovasi teknologi interaksi manusia dan komputer (Human Computer Interaction), khususnya mengenai Smart Trolley, serta beberapa kemungkinan penelitan masa depannya di era Society 5.0
Sistem Pembayaran Elektronis Menggunakan Mesin ATM Pada Jaringan Komputer Berbasis TCP/IP: Array
Fivtatianti Hendajani;
Sunny Arief Sudiro
Jurnal Ilmiah Komputasi Vol. 12 No. 1 (2013): Jurnal Ilmiah Komputasi Volume: 12 No. 1, Juni 2013
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Teknologi ATM ( Automated Teller Machine) atau dikenal dengan Anjungan Tunai Mandiri banyak digunakan pada dunia perbankan sebagai pengganti sebagian tugas/fungsi teller untuk meningkatkan daya saing dan pelayanan terhadap nasabah. Pengoperasian ATM itu sendiri dapat dilakukan dengan berbagai cara : seluruh ATM dihubungkan dengan komputer pengendali utama (ATM Center) melalui saluran komunikasi, satu mesin ATM dikendalikan oleh satu komputer PC dan dapat pula beberapa ATM dikendalikan oleh komputer PC yang terhubung pada suatu jaringan komputer. Masing-masing metode baik diselenggarakan secara bersama ( ATM Bersama) ataupun sendiri, memiliki kelebihan dan kekurangan, namun dilihat dari biaya investasi yang diperlukan cara terakhir memerlukan biaya lebih sedikit dibanding cara pertama. Hal ini merupakan pilihan bagi bank-bank dengan dana TSI yang terbatas.
Implementation of Steganographic Algorithm Pixel Value Difference (PVD) Method Using Matlab
Bayu Kumoro Yakti;
Ragiel Hadi Prayitno;
Sunny Arief Sudiro
Jurnal Ilmiah Komputasi Vol. 19 No. 4 (2020): Jurnal Ilmiah Komputasi Volume: 19 No. 4, Desember 2020
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.32409/jikstik.19.4.357
Gambar digital adalah gambar dalam bentuk format digital atau media digital seperti hard drive. Gambar digital yang terdiri dari bit (0 atau 1) disebut piksel dan memiliki kapasitas yang tinggi untuk menyimpan data dan informasi. Keamanan itu penting, terutama saat mengirim data dari satu tempat ke tempat lain. Salah satu cara untuk mengamankan data adalah melalui steganografi. Steganografi adalah teknik yang digunakan untuk menyembunyikan keberadaan informasi rahasia di dalam suatu objek. Teknik Steganografi dengan sempurna menutup pesan rahasia dalam gambar pembawa keamanan tinggi. Informasi dan data akan dimanipulasi sehingga tidak dapat dideteksi oleh mata manusia. Teknik Pixel Value Differences (PVD) merupakan salah satu metode steganografi. Metode ini menyisipkan pesan rahasia berdasarkan perbedaan bit antara dua piksel yang bertetangga. Pesan rahasia dalam bentuk teks akan disemprotkan ke gambar sampul grayscale. Hasil penelitian menunjukkan bahwa pesan yang berjumlah 6 karakter dan 37 karakter memiliki hasil: 0,0459 untuk MSE dan 61,5113 untuk PSNR (6 karakter) dan 0,4099 untuk MSE dan 52.004 untuk PSNR (37 karakter). Abstract Digital images are images in the form of digital formats or digital media such as hard drives. Digital images consisting of bits (0 or 1) are called pixels and have a high capacity to store data and information. Security is important, especially when sending data from one place to another. One way to secure data is through steganography. Steganography is a technique used to hide the existence of confidential information inside an object. The Steganography Technique perfectly closes the secret message in a high-security carrier image. Information and data will be manipulated so that it cannot be detected by the human eye. Pixel Value Differences (PVD) technique is a method of steganography. The method inserts a secret message based on bit differences between two neighboring pixels. Secret messages in the form of text will be sprayed onto the grayscale cover image. The results showed that the messages amounted to 6 characters and 37 characters had results: 0.0459 for MSE and 61.5113 for PSNR (6 characters) and 0.4099 for MSE and 52.004 for PSNR (37 characters).
Concurrently wireless sensor network using microcontroller for home monitoring against fire
Putu Wiweka Prasetyananda;
Sunny Arief Sudiro;
Bheta Agus Wardijono
JURNAL INFOTEL Vol 14 No 4 (2022): November 2022
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20895/infotel.v14i4.836
This paper proposes a prototype fire monitoring system with Wireless Sensor Network (WSN) in order to detect fires in several places at once and facilitate the placement of the detection. WSN is a technology where several sensors work together to establish communication over a wireless network. This prototype fire monitoring system can be monitored through the website in real time and the detection data is stored on the cloud server. This prototype fire monitoring system uses 4 sensor nodes, each of which is placed in several places to detect fires and sends the detection results to the master node. The master node receives and processes the data sent by the sensor node to generate 16 different conditions concurrently, in the event of a fire it will send a telegram message and the condition data to the cloud server. Several attempts to send data from the sensor node to the master node were completely successful and sending data from the master node to the cloud server as well as sending notification messages have been sent properly.
Sistem Pembayaran Elektronis Menggunakan Mesin ATM Pada Jaringan Komputer Berbasis TCP/IP: Array
Fivtatianti Hendajani;
Sunny Arief Sudiro
Jurnal Ilmiah Komputasi Vol. 12 No. 1 (2013): Jurnal Ilmiah Komputasi Volume: 12 No. 1, Juni 2013
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.32409/jikstik.12.1.337
Teknologi ATM ( Automated Teller Machine) atau dikenal dengan Anjungan Tunai Mandiri banyak digunakan pada dunia perbankan sebagai pengganti sebagian tugas/fungsi teller untuk meningkatkan daya saing dan pelayanan terhadap nasabah. Pengoperasian ATM itu sendiri dapat dilakukan dengan berbagai cara : seluruh ATM dihubungkan dengan komputer pengendali utama (ATM Center) melalui saluran komunikasi, satu mesin ATM dikendalikan oleh satu komputer PC dan dapat pula beberapa ATM dikendalikan oleh komputer PC yang terhubung pada suatu jaringan komputer. Masing-masing metode baik diselenggarakan secara bersama ( ATM Bersama) ataupun sendiri, memiliki kelebihan dan kekurangan, namun dilihat dari biaya investasi yang diperlukan cara terakhir memerlukan biaya lebih sedikit dibanding cara pertama. Hal ini merupakan pilihan bagi bank-bank dengan dana TSI yang terbatas.
Creation a Blockchain-based Product Qualification System for E-Marketplace using Practical Byzantine Fault Tolerance Algorithm
Nizuar, Irvan;
Handayani, Linda;
Sudiro, Sunny Arief
JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) Vol 8, No 4 (2023)
Publisher : STKIP PGRI Tulungagung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.29100/jipi.v8i4.4001
An indicator of e-marketplace effectiveness is to facilitate transparent transactions between sellers and buyers by offering good products and adequate infrastructure to handle system requirements. A good product must be in accordance with the product qualification which consists of the classification of feasibility or not, and the benefits of the product. However, this often has problems including those caused by frequent problematic system conditions, non-transparent product qualifications, undistributed data, human error until data security. The researcher proposes the creation of a product qualification system for e-marketplace using blockchain technology. The product qualification system consists of data verification and validation carried out by stakeholders involved in the decentralized network. Transactions that have been executed and validated will be stored in the distributed ledger. The focus of this research is the implementation of blockchain that is allowed to use the PBFT algorithm on product qualification records in the e-marketplace. The purpose of this research is to create a blockchain-based product qualification system for e-marketplace that is transparent and immutable and the successful performance of the system in information storage and management security. The results show the creation of a web-based apps product qualification system that implements a blockchain using Hyperledger Fabric and the performance obtained through system testing and data validation testing.
A modified MixColumn-InversMixColumn in AES algorithm suitable for hardware implementation using FPGA device
Prayitno, Ragiel Hadi;
Latifah;
Sudiro, Sunny Arief;
Madenda, Sarifuddin;
Harmanto, Suryadi
Communications in Science and Technology Vol 8 No 2 (2023)
Publisher : Komunitas Ilmuwan dan Profesional Muslim Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21924/cst.8.2.2023.1257
This article described the Advanced Encryption Standard (AES) encryption and decryption process without using lookup tables in the MixColumns transformation and parallelizing the transformation process implemented in the Field Programmable Gate Array (FPGA) hardware. Parallelism of the hardware process conducted to the transformation of key schedule, addroundkey, subbyte and shiftrows (subshift) and mixcolumns in the first 5 rounds of the encryption process. The decryption process was parallelized in subshift transformations, both transformations were implemented at the same time. This research produced a modified AES encryption and decryption method and algorithm with the aim of minimizing the resources required for hardware implementation. The method in this article was applied to Xilinx ISE 14.7 software. The experimental results showed that the encryption process required 2,357 slice LUT's, 845 occupied slices and 26 IOB's, while the decryption process required 2,896 LUT's, 1,323 occupied slices and 26 IOB's resources. The encryption and decryption processes each took an average of 2.891 nanoseconds and 3.467 nanoseconds for every 128 bits of data. This approach leads us to obtain a component with minimum resources and enough computational speed.