Claim Missing Document
Check
Articles

Found 32 Documents
Search

Advanced Detection System Milkfish Formalin Android-Based Method Based on Image Eye Using Naive Bayes Classifier Fadhil Muhammad Hadini; Bambang Suhardjo; Budi Rahardjo; Tangang Qisthina Handayani Zatadini; Gilang Prakoso; H.A. Danang Rimbawa; I Made Wiryana; Yosef Prihanto; Ruby Alamsyah
Journal on Education Vol 6 No 2 (2024): Journal on Education: Volume 6 Nomor 2 Tahun 2024
Publisher : Departement of Mathematics Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/joe.v6i2.4862

Abstract

In this paper researcher is trying to make an android-based application that can identify fish with formalin with previous version with adding some more data training. The method used in researcher methods naïve Bayes classifier as a detector (detector) with the object input in the form of fish eye image. The steps in the study include the training and testing process. In the training process used to build the model naïve classifier and estimation parameters. While testing process, implement the results of the model and parameter estimation have been built to detect fish formalin or not formalin. The trial results demonstrate the ability-based applications using the naïve Bayes 98.3% for object dimensions 10x10 image
Game Theorical Concept for Denial of Services (DoS) Attacks Puri Ratna Larasati; Bambang Suharjo; Richardus Eko Indrajit; H.A Danang Rimbawa
Journal on Education Vol 6 No 1 (2023): Journal On Education: Volume 6 Nomor 1 Tahun 2023
Publisher : Departement of Mathematics Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/joe.v6i1.4869

Abstract

Information security is a crucial aspect in today's digital era, where increased connectivity and data exchange involves a high risk of denial of services attacks. Increasing cybersecurity and privacy issues require more effective defense mechanisms to counter these threats. This research was conducted through design formulation using game theory for denial of service attacks. First scheme , use Bayes' theorem to determine the probability of a DDoS attack. The probability is equal. The probability of attack and defense is 50-50. Second scheme, one of players is dominan. A game theoretic framework as an approach to find out the possibility of denial of services between pairs of attacking/defending nodes using a Bayesian formulation. Game modeling can propose for developing better mitigation and detection approaches.
Implementasi Keamanan Pesan Teks menggunakan Kombinasi Enkripsi 3Des dan Base64 Andri Purwoko; Bambang Suharjo; Richardus Eko Indrajit; H.A Danang Rimbawa
Journal on Education Vol 6 No 2 (2024): Journal on Education: Volume 6 Nomor 2 Tahun 2024
Publisher : Departement of Mathematics Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/joe.v6i2.4877

Abstract

Triple DES (Triple Data Encryption Standard) merupakan salah satu algoritma simetris pada kriptografi yang digunakan untuk mengamankan data berupa pesan teks dengan cara menyandikan pesan teks. Proses yang dilakukan dalam penyandian datanya, yaitu proses enkripsi dan proses dekripsi. Algoritma triple DES adalah suatu algoritma pengembangan dari algoritma DES (Data Encryption Standard). Perbedaan DES dengan triple DES terletak pada panjangnya kunci yang digunakan. Pada DES menggunakan satu kunci yang panjangnya 56- bit, sedangkan pada triple DES menggunakan tiga kunci yang panjangnya 168-bit (masing- masing panjangnya 56 bit). Pada penelitian ini penggunaan enkripsi 3Des akan dikombinasikan dengan Base64 untuk mengamankan informasi berupa teks dengan Bahasa pemograman Python
The Characteristics Surface Wind Around Soekarno-Hatta Airport Based on Analysis of Frequency Distribution Using Windrose Application Heri Azhari Noor; Aulia Khamas H; Tutun Juhana; Danang Rimbawa; M. Fachrurrozy
Journal on Education Vol 6 No 2 (2024): Journal on Education: Volume 6 Nomor 2 Tahun 2024
Publisher : Departement of Mathematics Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/joe.v6i2.4891

Abstract

The study of surface wind characteristics in the airport area is needed to support flight operations in terms of safety and economy. Surface wind data is required during the aircraft take-off and landing phases. The information on surface wind characteristics is used for flight operational planning or the construction and expansion of an airport runway. To be able to know the description of the monthly surface wind profile in the airport area, the frequency distribution method is very appropriate to use. Research on surface wind patterns with the frequency distribution method in the Soekarno-Hatta Airport area over the past ten-year period shows that January - April the surface wind direction is dominated from the west, May - September is dominated from the east. The months of October, November, and December are a transition from the east to return to the west which is dominated from the south and southwest. This is in line with the general pattern of Indonesia's climate which is influenced by the west monsoon and east monsoon phenomena.
Studi Perbandingan AES 128 dan 256 untuk Pengamanan Sistem Informasi Manajemen Rumah Sakit Dr. Mintoharjo Ni Putu Ayu Astriyani; Danang Rimbawa; Budi Raharjo
Journal on Education Vol 6 No 2 (2024): Journal on Education: Volume 6 Nomor 2 Tahun 2024
Publisher : Departement of Mathematics Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/joe.v6i2.5119

Abstract

Studi pada penelitian ini merupakan perbandingan penerapan Advanced Encryption Standard (AES) pada database Rumah Sakit Dr.Mintoharjo. Berawal dari kasus peretasan pada website Badan Penyelenggara Jaminan Sosial (BPJS) Kesehatan bpjs-kesehatan.go.id diduga diretas sekitar akhir Mei 2021 mengakibatkan, data milik 279 juta penduduk Indonesia dikatakan telah bocor dan dijual di Raid Forums, penulis menawarkan metode penyimpanan baru yang lebih aman dibandingkan dengan teknik penyimpanan biasa bagi divisi teknologi informasi. Metode Advance Encryption Standard (AES) yang diperbandingkan disini diimplementasikan pada MYSQL. Saat system informasi manajemen Rumah Sakit Dr.Mintoharjo diimplementasikan pada MYSQL dilakukan pengujian perbandingan tingkat keamanan dengan metode enkripsi Advanced Encryption Standard (AES). Hasil percobaan penelitian ini menunjukkan hasil keamanan yang meningkat dilihat dari sudut pandang efisiensi. Kesimpulan pada penelitian ini menunjukkan, metode penyimpanan yang diteliti meningkatkan system keamanan maka sangat dianjurkan mengimplementasikannya pada Rumah Sakit Dr. Mintoharjo.
Analisis Pentingnya Kecepatan Internet dengan Keamanan Siber Muhamad Zein Satria; H.A Danang Rimbawa; I Made Wiryana
Journal on Education Vol 6 No 2 (2024): Journal on Education: Volume 6 Nomor 2 Tahun 2024
Publisher : Departement of Mathematics Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/joe.v6i2.5132

Abstract

Peran internet dalam mendukung berbagai aspek kehidupan di era digital menjadi sangat krusial. Hal tersebut menjadi alasan kuat untuk memperhatikan kecepatan internet dan keamanan siber. Meski begitu, kesenjangan antara kecepatan internet dengan keamanan siber di Indonesia masih ada. Minimnya pemerataan pembangunan wilayah membuat sebagian besar wilayah Indonesia memiliki keterbatasan kecepatan internet dan persepsi kemanan siber yang rendah . Penelitian dilakukan untuk menyajikan analisis mendalam tentang urgensi peningkatan kecepatan internet seiring dengan penguatan upaya perlindungan terhadap keamanan siber, serta implikasinya terhadap masyarakat Indonesia yang semakin terhubung secara digital. Metode penelitian yang digunakan adalah regresi linear untuk menganalisis hubungan sebab-akibat antara kecepatan internet dan GCI ranking. Hasil penelitian memperlihatkan bahwa kecepatan internet (dinyatakan dalam Mbps) mempengaruhi perubahan Global Cybersecurity Index (GCI) ranking sebesar 12,7%.
Prototype smart integrated fire detection based on deep learning YOLO v8 and IoT (internet of things) to improve early fire detection Firdaus, Muhammad Azka; Dahlan, Iqbal Ahmad; Rimbawa, H A Danang; Versantariqh, Muhammad Azka; Prakosa, Setya Widyawan
International Journal of Applied Mathematics, Sciences, and Technology for National Defense Vol. 2 No. 2 (2024): International Journal of Applied Mathematics, Sciences, and Technology for Nati
Publisher : FoundAE

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58524/app.sci.def.v2i2.437

Abstract

The high incidence of fires in Indonesia in 2018-2023 is 5,336 fire incidents have caused many deaths and enormous material losses. This system is designed to identify early signs of fire through object detection and sensor technology, which is integrated with the Blynk IoT platform for real-time sensor monitoring and Telegram for instant notifications to users. The waterfall prototype method was designed through observation, system design, program code creation, tool testing, and tool implementation. This research uses Deep Learning YOLOv8 technology and IoT using ESP 32 as a microcontroller. Based on the training datasets, it produces precision=0.95872; recall=0.91; mAP50=0.97; mAP50-95 =0.66. The system uses the integration of a multisensor KY-026 flame sensor, DHT 22 temperature and humidity sensor, and MQ-2 sensors can detect CO, LPG, and smoke gas. All these multisensors can be monitored on Blynk IoT and Telegrambot in real time.
EVALUASI PENENTUAN PERSONIL IT INFRASTRUKTUR PADA TNI AL MENGGUNAKAN KOMBINASI METODE AHP DAN VIKOR Abdillah, Abdillah Imam Julianto; H.A Danang Rimbawa; Yudistira Asnar
Antivirus : Jurnal Ilmiah Teknik Informatika Vol 17 No 1 (2023): Mei 2023
Publisher : Universitas Islam Balitar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35457/antivirus.v17i2.3094

Abstract

In the current development of technology, information technology is not only used in the economic field, but is divided into various fields, including the military world of the Navy. In order to promote the capability of human resources in the field of IT infrastructure in the Navy, it is necessary to select the right personnel in the maintenance of IT infrastructure assets, so as to obtain competent personnel output in answering future challenges. To facilitate the determination of the right IT infrastructure personnel, the author implements a system by combining the AHP and Vikor methods based on Python. The AHP method is used to determine the weight of criteria in the selection of IT personnel, and the Vikor method is used to rank the appropriate IT personnel. With this system, it is hoped that it can be a supporting application to help select IT personnel according to tactical, technical, strategic criteria.
Digital Transformation Maturity Analysis of Indonesian Navy Staff and Command College Using DTMM Suharjo, Bambang; Rimbawa, H.A. Danang
Journal of Information System and Informatics Vol 6 No 3 (2024): September
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51519/journalisi.v6i3.821

Abstract

The maturity of digital transformation refers to an organization’s development level in adopting and integrating digital technology into its business processes. The level of maturity of digital transformation in the Indonesian Navy Staff and Command College as a military education institution is very essential. The problem is the information on digital transformation maturity has not been obtained. The qualitative method through in-depth interviews was conducted on the leadership elements, namely the director and departmental heads to answer the question of digital transformation maturity. Interviews were developed in the policy and strategy, technology and infrastructure dimensions, the use of IT in the business process of educational institutions, IT-based learning, lecturers and education, data, digital leadership, efficiency and IT-based performance, and IT culture. Determination of maturity level was carried out using DTMM at initial, developing, defined, managed, and optimized. The results of the study show that overall, the level of maturity of digital transformation at the Naval Staff and Command School has reached a defined (systematic) level. The strategy for increasing the maturity of digital transformation at the Naval Staff and Command School needs to be continuously developed and implemented in each dimension.
Improving Large Language Model’s Ability to Find the Words Relationship Alam, Sirojul; Abdul Jabar, Jaka; Abdurrachman, Fauzi; Suharjo, Bambang; Rimbawa, H.A Danang
Jurnal Bumigora Information Technology (BITe) Vol 6 No 2 (2024)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v6i2.4127

Abstract

Background: It is still possible to enhance the capabilities of popular and widely used large language models (LLMs) such as Generative Pre-trained Transformer (GPT). Using the Retrieval-Augmented Generation (RAG) architecture is one method of achieving enhancement. This architectural approach incorporates outside data into the model to improve LLM capabilities. Objective: The aim of this research is to prove that the RAG can help LLMs respond with greater precision and rationale. Method: The method used in this work is utilizing Huggingface Application Programming Interface (API) for word embedding, store and find the relationship of the words. Result: The results show how well RAG performs, as the attractively rendered graph makes clear. The knowledge that has been obtained is logical and understandable, such as the word Logistic Regression that related to accuracy, F1 score, and defined as a simple and the best model compared to Naïve Bayes and Support Vector Machine (SVM) model. Conclusion: The conclusion is RAG helps LLMs to improve its capability well.
Co-Authors Abdillah, Abdillah Imam Julianto Abdul Jabar, Jaka Abdurrachman, Fauzi Alam, Sirojul AlFatrah, M. Ilham Amalia, Nuke Andri Purwoko Anton Nugroho Ari Susanti Aritonang, Sovian Atika Mima Amalin Atturoybi, Abdurrosyid Aulia Khamas H Bambang Suhardjo Bambang Suharjo Bangun, Abbas Madani Bisyron Wahyudi Bisyron Wahyudi Budi Rahardjo Budi Raharjo Chadafa Zulti Noorta Dahlan, Iqbal Ahmad Dananjaya Ariateja Fadhil Muhammad Hadini Faidin, Firman Firdaus, Muhammad Azka Gilang Prakoso Hasibuan, Bayu Nuar Khadapi Heikhmakhtiar, Aulia Khamas Heri Azhari Noor Hery Sudaryanto I Made Wiryana I Made Wiryana Kencana, Lisdi Inu Luqman, Fathan M. Fachrurrozy M. Ilham AlFatrah Madramsyah, Adam Maya Ayu Riestiyowati Miptahudin, Apip Muhamad Zein Satria Ni Putu Ayu Astriyani Noorta, Chadafa Zulti Nurrahman, Muhammad Irsyaad Onky Prilianda Putra Passu Beta, Arga Husein Prakosa, Setya Widyawan Puri Ratna Larasati Puringgar Prasadha Putra, Rayasa Rais, M. Fazil Randi Agustio Ra’idah Naufaliana Dewi Refino Maulana Hansbullah Subarkah Richardus Eko Indrajit Riswantoro, Dadan Shavkat Ruby Alamsyah Rustam, Muh Zul Azhri Saputro, J.W. Saputro, Joko W. Saragih, Gabriel Winandika Sastradinata, Aria Kusumah Sembali, Tryas Putranto Setyowati, Danny Suhardiningsih, A.V. Sri Suharjo, Bambang Sunarta Sunarta Supriyadi, Devi Tangang Qisthina Handayani Zatadini Taqwa, Rangga Teddy Mantoro Tidar, R Haryo Tutun Juhana Uvi Desi Fatmawati Versantariqh, Muhammad Azka Wahyudi, Bisyron Wibisono, Nugroho Yosef Prihanto Yudistira Asnar