Articles
FRONT END LEARNING MANAGEMENT SYSTEM DEVELOPMENT USING THE NEXTJS FRAMEWORK
Ahmad Baehaqi;
Muhamad Subhi Basit;
Richardus Eko Indrajit;
Rido Dwi Kurniawan
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.4.1273
Learning media is currently widely used in the teaching and learning process. Technology and information are two things that cannot be separated from one another in the ever-evolving digital era. Likewise with the education sector which underwent a significant transformation. The Learning Management System is a software application for online learning that supports delivering material online, discussing with students, and controlling student performance. This technological advancement has made many tertiary institutions use web application-based information technology. The current problem is the lack of complete features and less interactive functions to support the Learning Management System. In addition, when the user wants to be more interactive in learning, the Learning Management System generally has a separate feature, which requires the user to switch platforms to use the feature. The development of this Learning Management System is expected to become a more interactive learning platform and have complete features compared to other systems. System analysis is done by describing a system as a whole into its component parts. This is intended to identify and evaluate problems that will later find weaknesses and strengths in the system. The method used in this study is the waterfall starting from making the design of the system to implementing the system that runs in a production environment. The results of this study have several features needed for in-person and online learning which generally do not exist in other Learning Management Systems such as video conferencing, docs & files, group chats, automatic check-ins.
USER EXPERIENCE USING PRADITA DIGITAL LMS IN BLENDED LEARNING: A CASE STUDY IN PRADITA UNIVERSITY
Arif Pratama;
Ega Wachid Radiegtya;
Richardus Eko Indrajit;
Muh. Masri Sari
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.4.1277
This research aims to evaluate user experience (UX) in using Pradita Digital Learning Management System (LMS) in Blended Learning process. In the current educational context, the use of LMS and online applications has become common, so it is important to conduct an evaluation to measure the level of satisfaction and effectiveness of using Pradita Digital LMS in the learning process. The method used in this research is A Technique for User eXperience Evaluation in e-Learning (TUXEL) Version 2.0. TUXEL method is a technique that allows researchers to evaluate usability and user experience when using a system. The research results are divided into three aspects, namely general usability, pedagogical usability, and UX. The questionnaire results show that the use of Pradita Digital LMS gets a good and agreeable response from the users in the learning process because the system is more interactive and interesting. Although Pradita Digital LMS still has shortcomings in general usability and pedagogical usability aspects, it has creative and innovative value for users in the learning process. Overall, the result of this research is that Pradita Digital LMS has creative and innovative value, although there are still shortcomings in the aspects of general usability and pedagogical usability. Even so, Pradita Digital LMS is able to provide a good user experience in the learning process. It is hoped that the results of this study can be input for the development of Pradita Digital LMS so that it can continue to be improved in terms of usability and user satisfaction, so that the online learning experience can be even better in the future.
IMPLEMENTATION OF CONTAINER ORCHESTRATOR MANAGEMENT IN LEARNING MANAGEMENT SYSTEM
Muhamad Subhi Basit;
Arif Pratama;
Januponsa Dio Firizqi;
Richardus Eko Indrajit
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.4.1289
The pandemic that started in 2019 made technology even more important. Accelerating digital adaptation and transformation in the education sector, namely the Learning Management System (LMS) is very helpful in the teaching and learning process. Various LMS platforms are widely used and developed by various agencies. Pradita University is also developing an LMS which is made with the node.js programming language and the next.js framework which can be accessed on the pradita.digital site. The choice of using the wrong technology can cause the problematic LMS that is used to become slow and heavy, to the point where it cannot be accessed. The use of technology with the hypervisior concept which was previously commonly used has various weaknesses. For this reason, the Pradita LMS was developed using container orchestrator technology and Rancher Kubernetes as container orchestrator management. By utilizing Rancher as a container orchestrator management, it can make it easier to use with a user friendly GUI. In this study aims to prove that the use of Rancher in improving the quality and performance of LMS Pradita. Among them by identifying system efficiency, providing better scalability, increasing the availability of Pradita LMS, Rancher is able to manage applications and containers used for Pradita LMS, and saving costs used in implementing physical devices. By using the experimental method applied in this study, the results of system efficiency testing and scalability testing carried out with a load of up to 200 users can run properly and efficiently, then the availability test proves that the LMS is still available even when there are workers who are not operating, and testing rancher management capabilities lead to conclusions Rancher runs optimally and uses resources efficiently in accordance with the objectives in this study.
MICROGEN IMPLEMENTATION FOR BUILDING ONLINE LEARNING MANAGEMENT SYSTEM WITH MICROSERVICES AND GRAPHQL GENERATOR APPROACH
Daniel Hasiholan Tinambunan;
Ahmad Baehaqi;
Refgiufi Patria Avrianto;
Richardus Eko Indrajit
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.4.1313
In an era of education marked by digital transformation, developing a Learning Management System (LMS) can be a challenge that requires an innovative approach. This study proposes a solution by combining the Microgen concept, Microservices approach and GraphQL generator in the development of a revolutionary LMS Pradita. Thanks to this advanced integration, this research succeeded in designing a database schema with MgSchema visualization, enabling adaptive data manipulation with Microgen functions and simplifying development, developing a responsive interface through the GraphQL generator. Thus, this research not only discusses the intricacies of LMS development, but also provides valuable guidance for developers to face the challenges of modern and cutting-edge education.
ACCELERATION OF LEARNING MANAGEMENT SYSTEM APPLICATION DEVELOPMENT IN THE EDUCATION SECTOR USING THE LOW CODE CONCEPT ON MICROGEN
Ega Wachid Radiegtya;
Daniel Hasiholan Tinambunan;
Rido Dwi Kurniawan;
Richardus Eko Indrajit
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.4.1315
The background of this research is to speed up application development which tends to take a long time. To respond this, researchers apply the concept of "Low-Code" referring to a software development approach by speeding up the manufacturing process by reducing the amount of code that needs to be written manually to be automated using the microgen platform. This research was tested on a case study of the development of a Learning Management System, making it faster and more efficient. System development used in this study is System Development Life Cycle (SDLC) method, which is a software development process model that is carried out in stages according to the existing mechanism. The backend created for this Learning Management System, uses the Microgen generator backend platform to automate the creation of the GraphQL API, and the database which is then consumed by the frontend which is the interface for the Learning Management System. This research resulted in a better understanding of how using automation tools like Microgen able to speed up the learning management system web development process. The research model with development (R&D) applied in this study uses a systematic model that requires each process to be fulfilled sequentially starting from the first stage to the final stage to produce a product and determine feasibility through product validation being developed. By adopting this automation approach, the previously time-consuming time required to generate the backend can be significantly reduced. Thus, the result is greater efficiency in Web Learning Management System development, savings in human resources, and better opportunities to respond to changing market or user needs.
ARSITEKTUR PENGEMBANGAN SISTEM ROBOTIC PROCESS AUTOMATION (RPA) PADA DEPARTEMEN IT SECURITY
Bagus Prasetyo Budiono;
Richardus Eko Indrajit;
Erick Dazki
Jurnal Pendidikan Teknologi Informasi (JUKANTI) Vol 5 No 1 (2022): Jurnal Pendidikan Teknologi Informasi (JUKANTI) Edisi April 2022
Publisher : Program Studi Pendidikan Informatika, Universitas Citra Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.37792/jukanti.v5i1.442
Seiring berkembangnya teknologi informasi akan diikuti pula dengan kebutuhan akan keamanan sebuah teknologi itu sendiri. Seperti halnya yang terjadi pada departemen IT Security, dimana pada departemen tersebut terdapat aktivitas approval ticket guna mengakses layanan server yang telah disediakan. Proses approval akses ke dalam server sendiri saat ini masih dilakukan secara manual menggunakan tenaga manusia, padahal dalam waktu 24 jam pengguna yang melakukan permintaan akses untuk masuk kedalam server dapat mencapai seribu bahkan bisa lebih ketika terjadi sebuah insiden. Hal tersebut membuat proses approval terkadang kurang optimal, karena kondisi fisik pegawai yang melakukan approval harus tetap terjaga selama 24x7 setiap minggunya. Dengan adanya teknologi robotic process automation ini nantinya proses review persetujuan akses untuk masuk kedalam server dapat diakomodir oleh robot yang seharusnya mampu bekerja secara optimal selama 24x7.
Enterprise Architecture Pemantauan Suhu Kabel Berbasis IOT Pada Gardu Induk Bertegangan 20Kv
Bagus Prasetyo Budiono;
Richardus Eko Indrajit;
Aryo Nugroho;
Muhamad Nur Arifin
Jurnal Pendidikan Teknologi Informasi (JUKANTI) Vol 5 No 2 (2022): Jurnal Pendidikan Teknologi Informasi (JUKANTI) Edisi Nopember 2022
Publisher : Program Studi Pendidikan Informatika, Universitas Citra Bangsa
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.37792/jukanti.v5i2.514
Semakin berkembangnya teknologi informasi, membuat banyak aktivitas manusia dapat dipermudah dengan penerapan teknologi tersebut salah satunya adalah internet of things. Pada sebuah sumber penyuplai aliran listrik utama kepada perusahaan listrik negara (PLN) yang memiliki tegangan tingkat menengah yaitu 20 Kv, gardu induk memiliki peranan penting yang berfungsi untuk memastikan operasional listrik khususnya bagi masyarakat dapat terpenuhi dengan baik dan tanpa mengalami gangguan. Namun terkadang pada saat-saat tertentu penggunaan listrik oleh masyarakat mengalami kenaikan, yang membuat gardu yang menyuplai listrik dapat mengalami lonjakan arus. Hal tersebut berakibat pada meningkatnya suhu dari trafo yang diakibatkan oleh peregangan antar sambungan antara kabel dengan travo. Jika hal tersebut dibiarkan maka dapat memicu kebakaran pada gardu dan meningkatnya resistensi arus listrik yang berakibat terganggunya suplai listrik kepada masyarakat. Maka dari itu perlunya suatu perancangan enterprise architecture untuk membuat sistem pemantauan suhu yang ada di gardu induk, agar nantinya ketika terjadi lonjakan suhu dapat langsung mendapatkan penanganan dari petugas. Selain itu pada penelitian ini akan dijelaskan pula arsitekturnya mulai dari teknologi, proses bisnis dan juga metode yang digunakan untuk membangun dari sistem internet of things itu sendiri.
Game Theorical Concept for Denial of Services (DoS) Attacks
Puri Ratna Larasati;
Bambang Suharjo;
Richardus Eko Indrajit;
H.A Danang Rimbawa
Journal on Education Vol 6 No 1 (2023): Journal On Education: Volume 6 Nomor 1 Tahun 2023
Publisher : Departement of Mathematics Education
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31004/joe.v6i1.4869
Information security is a crucial aspect in today's digital era, where increased connectivity and data exchange involves a high risk of denial of services attacks. Increasing cybersecurity and privacy issues require more effective defense mechanisms to counter these threats. This research was conducted through design formulation using game theory for denial of service attacks. First scheme , use Bayes' theorem to determine the probability of a DDoS attack. The probability is equal. The probability of attack and defense is 50-50. Second scheme, one of players is dominan. A game theoretic framework as an approach to find out the possibility of denial of services between pairs of attacking/defending nodes using a Bayesian formulation. Game modeling can propose for developing better mitigation and detection approaches.
Implementasi Keamanan Pesan Teks menggunakan Kombinasi Enkripsi 3Des dan Base64
Andri Purwoko;
Bambang Suharjo;
Richardus Eko Indrajit;
H.A Danang Rimbawa
Journal on Education Vol 6 No 2 (2024): Journal on Education: Volume 6 Nomor 2 Tahun 2024
Publisher : Departement of Mathematics Education
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31004/joe.v6i2.4877
Triple DES (Triple Data Encryption Standard) merupakan salah satu algoritma simetris pada kriptografi yang digunakan untuk mengamankan data berupa pesan teks dengan cara menyandikan pesan teks. Proses yang dilakukan dalam penyandian datanya, yaitu proses enkripsi dan proses dekripsi. Algoritma triple DES adalah suatu algoritma pengembangan dari algoritma DES (Data Encryption Standard). Perbedaan DES dengan triple DES terletak pada panjangnya kunci yang digunakan. Pada DES menggunakan satu kunci yang panjangnya 56- bit, sedangkan pada triple DES menggunakan tiga kunci yang panjangnya 168-bit (masing- masing panjangnya 56 bit). Pada penelitian ini penggunaan enkripsi 3Des akan dikombinasikan dengan Base64 untuk mengamankan informasi berupa teks dengan Bahasa pemograman Python
Manajemen Ketahanan Risiko Siber pada Internet of Things dan Cyber Physical System
Amalia Nurain;
Rudy A.G. Gultom;
Richardus Eko Indrajit
Journal on Education Vol 6 No 2 (2024): Journal on Education: Volume 6 Nomor 2 Tahun 2024
Publisher : Departement of Mathematics Education
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31004/joe.v6i2.5179
This research explores Cyber Risk Resilience Management on the Internet of Things (IoT) and Cyber Physical System (CPS). These two entities are closely linked to the internet, storing data about individuals or organizations. With cyberattacks on the rise, the impact can be direct, such as hardware damage, or indirect, such as reputation loss. The research aims to identify, assess, and manage cyber risks to maintain operational and system integrity. The literature study method was used to develop this approach. The results include how to identify attacks using the NIST framework with seven stages of incident recovery. This research provides a foundation for understanding and addressing cyber risks in IoT and CPS environments.