Claim Missing Document
Check
Articles

Found 9 Documents
Search

Implementasi Sistem Informasi Bergerak Untuk Penguatan Surveilans Gizi di Puskesmas Banguntapan II Kabupaten Bantul Harnaningrum, L.N.; Anggoro, Sigit; Prayitna, Adiyuda; Dewi, Syamsumin Kurnia
Jurnal Buana Informatika Vol 5, No 2 (2014): Jurnal Buana Informatika Volume 5 Nomor 2 Juli 2014
Publisher : Universitas Atma Jaya Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1411.937 KB) | DOI: 10.24002/jbi.v5i2.355

Abstract

Abstract. Severe malnutrition still exists as a health problem in District of Bantul. A preliminary study at Puskesmas Banguntapan II shows that severe malnutrition rate is still high and the nutrition surveillance is not done optimally. Surveillance activities, like: data collection, data compilation, data analysis and interpretation, and data report are carried out manually. This study is geared to build an application based on short message service to strengthen the nutrition surveillance. This study was conducted on March-November 2013 at Puskesmas Banguntapan II. Subjects were midwives and village health promoters in this area. The application that was built consist of interface set in the user’s cellular phone and server. Data were saved in the puskesmas’s database for the report need. This application is expected to increase the speed, accuracy, completeness and sustainability of data on nutrition surveillance, especially for child severe malnutrition detection, so an adequate treatment can be carried out promptly.Keywords: mobile information system, nutrition surveillance, severe malnutrition.Abstrak. Gizi buruk saat ini masih menjadi masalah kesehatan di Kabupaten Bantul. Studi pendahuluan di Puskesmas Banguntapan II menunjukkan bahwa selain angka gizi buruk yang masih tinggi, surveilans gizi juga belum berjalan optimal. Sebagian kegiatan surveilans berupa: pengumpulan data, pengolahan dan penyajian data, analisis dan interpretasi data, serta pelaporan, masih dilakukan secara manual. Oleh karena itu penelitian ini bertujuan untuk menghasilkan suatu aplikasi berbasis short message service untuk membantu penguatan surveilans gizi di lapangan. Penelitian dilakukan pada bulan Maret-November 2013 di Puskesmas Banguntapan II. Subjek penelitian adalah bidan dan kader posyandu di wilayah ini. Aplikasi yang dibangun meliputi: bagian antar muka yang ditanam di handphone pengguna dan bagian server. Data  selanjutnya disimpan ke dalam database di puskesmas untuk bahan laporan lebih lanjut. Dengan implementasi aplikasi ini diharapkan surveilans gizi, khususnya deteksi kasus balita gizi buruk, berjalan lebih cepat, akurat, lengkap, dan berkesinambungan sehingga dapat dilakukan penanganan yang segera dan adekuat.Kata Kunci: sistem informasi bergerak, surveilans gizi, gizi buruk
PELATIHAN NODEMCU UNTUK PENGENDALIAN LAMPU DAN PEMBACAAN SENSOR DI SMKN 1 TEMPEL SLEMAN Totok Budioko; Lucia Nugraheni Harnaningrum
Jurnal Pengabdian Masyarakat - Teknologi Digital Indonesia. Vol 1, No 1 (2022): Maret 2022
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat - Universitas Teknologi Digital Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2890.004 KB) | DOI: 10.26798/jpm.v1i1.567

Abstract

Pengetahuan dan ketrampilan siswa SMK khususnya keminatan Teknik Komputer dan Jaringan padabidang pengendalian dan monitoring jarak jauh berbasisInternet of Thingssangat kurang. Untuk mengu-rangi kondisi seperti ini perlu dilakukan kegiatan yang dapat meningkatkan pengetahuan dan ketrampilandi bidang tersebut. Kegiatan pengabdian untuk siswa SMKN 1 Tempel Sleman Yogyakarta merupakansalah satu kegiatan yang akan ditujukan untuk peningkatan pengetahuan dan ketrampilan bidang tersebut.Kegiatan ini diselenggarakan di laboratorium komputer SMKN 1 Tempel Sleman selama satu hari denganmateri pengenalanInternet of Things, pembuatan alat pembaca sensor dan pengendali sensor berbasisnodeMCU dan aplikasiAndroid Blynk. Kegiatan ini terselenggara dengan baik, siswa dapat membuatalat pengendali lampu dan pembacaan sensor yang dikendalikan dan dimonitor melalui aplikasiAndroidBlynk 
Analisa Quality of Service (QoS) Pada Jaringan L2TP IPSec Dan Wireguard VPN untuk mengamankan VoIP Rahman, Ikhwanul Kurnia; Harnaningrum, L.N.
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol. 7 No. 1 (2024): Jurnal RESISTOR Edisi April 2024
Publisher : Prahasta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31598/jurnalresistor.v7i1.1553

Abstract

Voice Over Internet Protocol (VOIP) merupakan teknologi yang memanfaatkan Internet Protocol untuk menyediakan komunikasi voice secara elektronis dan real-time. Keamanan data dalam penggunaan layanan VoIP sangat penting untuk mencegah kebocoran informasi yang sensitive. sehingga dibutuhkan teknologi VPN yang dapat mengamankan agar terhindar dari penyadapan. Pada penelitian ini membuktikan bahwa penggunaan VPN L2TP IPSec dan Wireguard berhasil mengamankan komunikasi data VoIP dari penyadapan. Adapun hasil pengujian delay didapati bahwa L2TP IPSec memiliki rata-rata delay 19,9997ms sedangkan wireguard memiliki delay lebih baik sebesar 19,9994ms. Selanjutnya, jitter yang diamati pada L2TP IPSEC adalah sekitar 0.122839 ms, sementara Wireguard menunjukkan jitter yang lebih bagus yaitu 0.117597ms. Pada pengujian packet loss keduanya memiliki 0% packet loss, dan pada pengujian troughput IPSec memiliki troughput lebih tinggi sebesar 31kbps sedangkan wireguard memiliki troughput 30.975kbps. Sehingga dapat disimpulkan bahwa Wireguard memiliki delay dan jitter lebih baik daripada L2TP IPSec, namun L2TP IPSec memiliki troughput yang lebih baik dibandingkan wireguard.
Implementasi L2TP Mikrotik dalam Interkoneksi Site to Site Harnaningrum, Lucia Nugraheni
JATISI Vol 11 No 1 (2024): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Universitas Multi Data Palembang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v11i1.6285

Abstract

Implementation of L2TP (Layer 2 Tunneling Protocol) in site to site interconnection is a critical effort in maintaining security and reliable connections between two geographically separated networks. It needs to be ensured to transmit data securely. Tests in various conditions are carried out to get maximum results, especially from a security perspective. Variations are made to security configurations and policies. Test results show that L2TP can improve connection security between the two networks. Data sent between networks can be strongly encrypted, reducing the risk of unauthorized access or hacking. The configuration of this protocol is quite complex. In addition, this research also identified important factors that influence the effectiveness of L2TP implementation, such as existing network infrastructure, implemented security policies, and staff understanding of the technology. The results of this research provide recommendations for how organizations can implement L2TP to improve security. This research highlights the importance of considering network security in the context of site to site interconnections and the key role played by L2TP in protecting network connections. This research can provide practical guidance for organizations in strengthening the security of their connections in increasingly complex site-to-site interconnection scenarios
IMPLEMENTASI TRAFFIC ENGINEERING UNTUK OPTIMALISASI JARINGAN MPLS INTERCITY Syabani, Dwi Nur; HARNANINGRUM, LUCIA NUGRAHENI; Kartadie, Rikie
JURNAL INFORMATIKA DAN KOMPUTER Vol 8, No 2 (2024): September 2024
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat - Universitas Teknologi Digital Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26798/jiko.v8i2.1306

Abstract

Dengan berkembangnya teknologi informasi yang pesat mengharuskan kebutuhan akses internet yang lebih cepat dan memadai baik secara kualitas jalur maupun besarnya ketersediaan bandwidth internet. Dalam upaya meningkatkan kualitas akses internet tersebut, seringkali terdapat masalah yaitu salah satunya terjadi bottleneck pada satu atau lebih jaringan backbone milik provider internet. Contohnya kasus pada jaringan metro intercity dimana salah satu jalur mengalami bottleneck sedangkan jalur lainnya masih memiliki utilisasi bandwidth yang rendah. Hal tersebut disebabkan karena protokol routing akan memilih jalur terpendek yang dapat dilalui oleh trafik data. Untuk mengatasi hal tersebut, dilakukan implementasi TE (traffic engineering) pada jaringan MPLS backbone pada segmen metro intercity dengan tujuan untuk menentukan jalur yang ingin digunakan oleh suatu trafik data sehingga utilisasi bandwidth pada setiap segmen jalur metro intercity dapat terbagi secara merata. Pada penelitian ini dilakukan secara simulasi dengan menggunakan perangkat Router Mikrotik dan berdasarkan studi kasus dari tempat bekerja. Hasil dari penelitian ini diperoleh bahwa performa jaringan setelah dilakukan implementasi TE (traffic engineering) menjadi lebih optimal dengan indeks sangat bagus berdasarkan analisa dan parameter latency dibandingkan performa sebelum implementasi TE yang memiliki indeks buruk.
Perbandingan Keamanan Transaksi Seluler Menggunakan NFC dan Kode QR Lucia Nugraheni Harnaningrum; Kristoforus Nanda Mahardhian
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 13 No 4: November 2024
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/jnteti.v13i4.12867

Abstract

Mobile device transactions have become commonplace today. Quick-response (QR) codes and near-field communication (NFC) are popular cashless and contactless payment methods. These two payments have their characteristics. NFC payments use secure elements that encrypt credential data to ensure safe transactions. In contrast, QR code payments transmit data in its original form without encryption. Existing data are sent between devices in the form of original data. Given the extensive adoption of these methods, it is imperative to secure transaction data to prevent theft and misuse. It is necessary to know and compare the security level of each transaction and provide the best recommendations. This study undertook a comparative analysis of the security and performance of NFC and QR code-based mobile payment models. The study found that NFC transactions required 1,074 ms for encryption, while QR code transactions took 5.9359 ms. The entropy value, indicating data randomness, was 3.96 for NFC and 3.23 for QR codes. The P value, representing statistical significance, was 0.45 for NFC and 0.069 for QR codes. Both payment methods demonstrated acceptable levels of safety, with processing times and data randomness within satisfactory ranges. However, the analysis concludes that NFC transactions offer superior performance in terms of processing time and data security compared to QR code transactions.
Optimizing Insurance Customer Segmentation with C4.5 Decision Tree Algorithm Setya, Sigit Candra; Perangin-angin, Moch. Iswan; Marsono, Marsono; Nasyuha, Asyahri Hadi; Harnaningrum, Lucia Nugraheni
Journal of Information System Research (JOSH) Vol 6 No 4 (2025): Juli 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josh.v6i4.7358

Abstract

Insurance companies rely on premium payments as their primary source of revenue. However, economic instability often causes delays in premium payments, impacting revenue recording. This study applies the C4.5 Decision Tree algorithm to classify insurance customers based on premium amount, age, income, and claim history, thereby improving product recommendations. The research utilizes data mining techniques to analyze customer attributes and generate decision rules for optimal insurance product selection. The findings indicate that customers with a premium of IDR 500,000 are best suited for PRUMed Cover (PMC), while those with IDR 1,000,000 are recommended PRUCritical Benefit 88 (PCB88). For customers with IDR 750,000, additional factors such as age and income level influence the recommended insurance type. The entropy and information gain calculations identify premium amount as the most significant attribute for decision-making, followed by age, income, and claim history. By implementing this method, insurance companies can enhance customer segmentation, streamline product selection, and optimize marketing strategies. The transparent and interpretable decision tree structure ensures regulatory compliance while improving customer satisfaction. Future research should explore additional variables, such as behavioral data and regional trends, and compare C4.5 with other classification algorithms like Random Forest or Support Vector Machines (SVM) to enhance accuracy and scalability.
Improving Memory Efficiency on Android: Leveraging Data Structures for Optimal Performance Mafmudin, Muchamad; Harnaningrum, Lucia Nugraheni
JURNAL INFORMATIKA DAN KOMPUTER Vol 9, No 3 (2025): Oktober 2025
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat - Universitas Teknologi Digital Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26798/jiko.v9i3.2131

Abstract

This study discusses strategies for increasing memory efficiency in Android application development using optimal data structures. In the era of growing mobile device usage, especially in Indonesia, where the number of users exceeds the total population, memory management has become a major challenge for Android developers. This study analyzes various data structures such as List, ArrayList, MutableList, and LinkedList, as well as comparisons between object and primitive data types in Kotlin. The results show that primitive data structures offer better memory efficiency and execution time than object-based data structures due to their simpler structure and lower complexity. Meanwhile, object data types like MutableList and ArrayList are more efficient for applications that require a balance between flexibility and performance, as they provide both primitive-like characteristics and useful built-in functions. This study also emphasizes the importance of understanding memory management and time complexity in optimizing Android application performance. Testing was conducted using both automated and manual methods. The findings show that Kotlin reduces memory usage by up to 2× and execution time by 28.6\% compared to Java. Among the evaluated structures, primitive arrays and LinkedLists showed the most stable memory performance, while MutableLists offered the best balance for object types.
Optimizing LSTM-CNN for Lightweight and Accurate DDoS Detection in SDN Environments Kartadie, Rikie; Kusjani, Adi; Kusnanto, Yudhi; Harnaningrum, Lucia Nugraheni
Scientific Journal of Informatics Vol. 12 No. 2: May 2025
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v12i2.24531

Abstract

Purpose: This study optimizes the LSTM-CNN model to detect Distributed Denial of Service (DDoS) attacks in Software-Defined Networking (SDN)-based networks and improves accuracy, computational efficiency, and class imbalance handling. Methods: We developed an Improved LSTM-CNN by removing the Conv1D layer, reducing LSTM units to 64, and using 21 features with a 5-timestep approach. The InSDN dataset (50,000 samples) was preprocessed with one-hot encoding, MinMaxScaler normalization, and sequence formation. Class imbalance was managed using class weights (0:2.0, 1:0.5) instead of SMOTE, with performance compared against Baseline LSTM-CNN and Dense-only models optimized with the Sine Cosine Algorithm (SCA). Result: The Improved LSTM-CNN achieved 0.99 accuracy, 0.93 F1-score for Benign traffic, and 1.00 for Malicious traffic, with ~25,000 parameters and 125 ms inference time on Google Colab. It outperformed Baseline LSTM-CNN (0.08 accuracy) and was more efficient than Dense-only (46,000 parameters), with a false positive rate of ~1%. Novelty: This research presents a lightweight, efficient DDoS detection solution for SDN, leveraging temporal modeling and class weights, suitable for resource-constrained controllers like OpenDaylight or ONOS. However, its generalization is limited by dataset diversity, necessitating broader validation.