Claim Missing Document
Check
Articles

Found 18 Documents
Search

Implementation Aes-128 Encryption For Enhanced Data Security In Central Sulawesi Provincial Inspectorate Imam Wahyudi; Syahrullah; Dwi Shinta Anggreni; Rahmah Laila
Advance Sustainable Science Engineering and Technology Vol. 6 No. 3 (2024): May - July
Publisher : Science and Technology Research Centre Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/asset.v6i3.560

Abstract

One technique to secure data is to use the Advanced Encrypt on Standard (AES) 128 method. The Advanced Encrypt on Standard (AES) method can be applied in improving data security, especially at the Central Sulawesi Provincial Inspectorate. The data in question are audit reports of BOS funds (School Operational Assistance), reports of special investigations into violations of regional finances and reports of violations of civil servant discipline (PNS). The data must have a high level of security, so that it is not easily known by irresponsible parties and will have a negative impact and be misused. The conclusion in this study was obtained that, the AES-128 algorithm can be used as an alternative to the process of improving data security, namely by encryption and decryption. The results of encryption can be guaranteed as long as the symmetry key encryption is not leaked to irresponsible parties
Rancang Bangun Aplikasi Diagnosa Sexually Transmitted Diseases Menggunakan Algoritma Certainty Factor Mandra; Nouval Trezandy Lapatta; Syaiful Hendra; Syahrullah
The Indonesian Journal of Computer Science Vol. 13 No. 5 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i5.4293

Abstract

This research aims to design and develop an Android application that can be used to diagnose results Sexually Transmitted Diseases using algorithms Certainty Factor. Sexually Transmitted Diseases is a sexually transmitted disease that can cause serious health impacts if not immediately identified and treated appropriately. This application is designed to help users carry out initial diagnoses independently. The method used in developing this application is the Certainty Factor algorithm, which is a rule-based decision support method. This algorithm utilizes knowledge from experts in the medical field and combines it with symptom data provided by users to produce more accurate diagnoses. The app will allow users to input suggested symptoms and generate a diagnosis based on that information. It is hoped that this application will be a useful tool in a self-directed approach to diagnosis Sexually Transmitted Diseases.
Analisis Sentimen Terhadap Presiden Terpilih Dimedia Sosial Twitter (X) Menggunakan Algoritma Support Vector Machine Ono, Jumaita; Anshori , Yusuf; Yudhaswana Joefrie , Yuri; Yazdi Pusadan, Mohammad; Syahrullah
The Indonesian Journal of Computer Science Vol. 13 No. 5 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i5.4388

Abstract

The current elected presidents of Indonesia are Prabowo and Gibran, with several work programs and visions and missions that are still being discussed on various social media, especially on Twitter. Based on the problems in this research, the Support Vector Machine method was applied with the dataset used amounting to 2000 data obtained from Twitter social media using scraping techniques, and divided into five scenarios, namely positive, very positive, neutral, negative and very negative. Data were tested from 100 datasets, 500 datasets, 1000 datasets, 1500 datasets, and 2000 datasets. The accuracy results obtained from 100 data were 0.40% accuracy, 0.08% precision, and 0.20% recall. The second test used 500 data with an accuracy of 0.67%, precision of 0.33% and recall of 0.24%. The third test used 1000 data with an accuracy of 0.73%, precision of 0.52% and recall of 0.29%. The fourth test used 1500 data with an accuracy of 0.74%, precision of 0.41% and recall of 0.29%. The fifth test with the highest level of accuracy uses 2000 data, with an accuracy of 0.75%, precision of 0.47%, and recall of 0.30%
Nilai-Nilai Pendidikan Islam Dalam Al-Qur'an Surah Ali-Imran Ayat 190 -191 Abdu Rasyad Shalihuddin; Syahrullah; Maria Ulfah
Al Qodiri : Jurnal Pendidikan, Sosial dan Keagamaan Vol. 23 No. 2 (2025): Al Qodiri : Jurnal Pendidikan, Sosial dan Keagamaan
Publisher : Lembaga Penelitian, Pengabdian kepada Masyarakat dan Publikasi Ilmiah (LP3M) Institut Agama Islam (IAI) Al-Qodiri Jember, Jawa Timur Indonesia bekerjasama dengan Kopertais Wilayah 4 Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53515/qodiri.2025.23.2.530-549

Abstract

Penelitian ini dilatarbelakangi oleh pentingnya menggali nilai-nilai pendidikan dalam Al- Qur’an guna memperkuat landasan filosofis dan praktis pendidikan Islam. Tujuan dari penelitian ini adalah untuk mengidentifikasi dan menganalisis nilai-nilai pendidikan Islam yang terkandung dalam Surah Ali Imran ayat 190–191. Penelitian ini menggunakan metode kualitatif deskriptif dengan pendekatan tafsir tematik (maudhu’i). Hasil penelitian menunjukkan bahwa terdapat empat nilai utama pendidikan Islam dalam ayat tersebut. Pertama, nilai tauhid, yaitu kesadaran akan keesaan Allah melalui perenungan ciptaan-Nya. Kedua, nilai berpikir kritis dan ilmiah yang ditunjukkan melalui ajakan untuk bertafakkur terhadap fenomena alam. Ketiga, nilai spiritualitas, yakni perintah untuk selalu mengingat Allah dalam berbagai kondisi. Keempat, nilai moral dan karakter, seperti rendah hati, introspeksi diri, dan permohonan ampun. Dengan demikian, Surah Ali Imran ayat 190–191 memberikan landasan yang kuat bagi sistem pendidikan Islam yang komprehensif dan seimbang antara aspek rasional, spiritual, dan moral. Nilai-nilai tersebut relevan untuk membentuk generasi yang berilmu, beriman, dan berakhlak mulia.
Sejarah Perkembangan Perseroan Terbatas di Indonesia Syahrullah; Nasrullah
Fundamental: Jurnal Ilmiah Hukum Vol. 9 No. 1 (2020): Fundamental: Jurnal Ilmiah Hukum
Publisher : Universitas Muhammadiyah Bima

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34304/fundamental.v1i1.14

Abstract

Sejarah hukum merupakan salah satu bidang studi hukum yang mempelajari perkembangan asal usul sistem hukum dalam suatu masyarakat tertentu. Studi mengenai sejarah hukum ini akan menghasilkan keuntungan, seperti juga mempelajari sejarah pada umunya. Salah satu dari keuntungan terebut adalah pengetahuan kita mengenai suatu sistem atau lembaga atau pengaturan hukum tertentu menjadi lebih mendalam dan diperkaya. Salah satu obyek kajian sejarah hukum, yang menarik perhatian adalah Perseroan terbatas. Perseroan Terbatas (disingkat: PT) bagi Indonesia, merupakan salah satu sarana penunjang dalam pembangunan ekonomi. Perseroan terbatas (PT) adalah suatu badan hukum untuk menjalankan usaha yang memiliki modal terdiri dari saham-saham, yang pemiliknya memiliki bagian sebanyak saham yang dimilikinya. Karena modalnya terdiri dari saham-saham yang dapat diperjual belikan, perubahan kepemilikan perusahaan dapat dilakukan tanpa perlu membubarkan perusahaan. Kata perseroan dalam pengertian umum adalah perusahaan atau organisasi usaha. Sedangkan perseroan terbatas adalah salah satu bentuk organisasi usaha atau badan usaha yang ada dan dikenal dalam system dagang Indonesia
Implementation Aes-128 Encryption For Enhanced Data Security In Central Sulawesi Provincial Inspectorate Wahyudi, Imam; Syahrullah; Anggreni, Dwi Shinta; Laila, Rahmah
Advance Sustainable Science Engineering and Technology Vol. 6 No. 3 (2024): May - July
Publisher : Science and Technology Research Centre Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/asset.v6i3.560

Abstract

One technique to secure data is to use the Advanced Encrypt on Standard (AES) 128 method. The Advanced Encrypt on Standard (AES) method can be applied in improving data security, especially at the Central Sulawesi Provincial Inspectorate. The data in question are audit reports of BOS funds (School Operational Assistance), reports of special investigations into violations of regional finances and reports of violations of civil servant discipline (PNS). The data must have a high level of security, so that it is not easily known by irresponsible parties and will have a negative impact and be misused. The conclusion in this study was obtained that, the AES-128 algorithm can be used as an alternative to the process of improving data security, namely by encryption and decryption. The results of encryption can be guaranteed as long as the symmetry key encryption is not leaked to irresponsible parties
Decision Support System for the Selection of Poor Families as Recipients of Government Assistance Using the ELECTRE Method Sitti Ainul Yakin; Hajra Rasmita Ngemba; Syaiful Hendra; Syahrullah
Tadulako Science and Technology Journal Vol. 1 No. 2 (2021): Tadulako Science and Technology Journal
Publisher : LPPM Universitas Tadulako

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22487/sciencetech.v1i2.17294

Abstract

Introduction: Poverty is a global problem that is often associated with needs, difficulties, and shortages in various life circumstances. The problem that occurs in Bahodopi District, Morowali Regency where there are often problems in determining the recipients of this assistance, because it still uses subjective assessments, based on manual calculations and there is still a lot of assistance aimed at poor families and not on target. Method: Researchers conducted research with the ELECTRE method of completion based on ranking and influenced by many criteria such as Employment, Number of Dependents, Income, House Condition, and House Status. For each alternative that determines the decision by ranking the best alternative. Result and Discussion: Based on testing on this system using two tests, namely black box testing and Beta Testing. In the Blackbox testing that the author did, the results showed that each function of the components in the system had run well and correctly. In the beta testing, the author conducted a questionnaire distribution process to five respondents in the aid recipient sector who would use the application to provide an assessment of the system and 30 people in the community. Based on the questionnaire, it will be obtained how accurate or suitable it is for the system that has been created Conclusion: This system was created to facilitate decision-making in selecting poor families as recipients of government assistance so that the sub-district office can make decisions correctly with computerized data.
Architectural Analysis of the Repository Pattern in Web-Based Credit Score Conversion Assessment System Based on PermenPAN-RB No. 1 of 2023 Lapatta, Nouval Trezandy; Syahrullah
Tech-E Vol. 9 No. 2 (2026): TECH-E (Technology Electronic)
Publisher : Fakultas Sains dan Teknologi-Universitas Buddhi Dharma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31253/te.v9i2.4362

Abstract

PermenPAN-RB Regulation No. 1 of 2023 introduced a major shift in functional position assessment by emphasizing performance predicate conversion in credit score evaluation, which increases architectural demands on supporting information systems. In practice, many assessment systems remain tightly coupled and difficult to evolve when regulatory rules, integration sources, or reporting formats change. This paper presents an architecture-oriented analysis of a web-based credit score conversion assessment information system that applies the Repository Pattern as a core architectural mechanism to decouple business logic from persistence, integration, and document-generation concerns. The analysis adopts a scenario-based evaluation approach inspired by the Architecture Tradeoff Analysis Method (ATAM) and is grounded in the ISO/IEC 25010 software quality model, focusing on maintainability, modifiability, testability, scalability, and reliability. Architectural evaluation is conducted by examining layered boundaries, repository abstractions, and dependency injection mechanisms under representative regulatory-driven change scenarios, including rule adjustments, data integration extensions, and reporting modifications. The results demonstrate consistent change localization across architectural layers, where rule changes are confined to service modules, integration changes are absorbed by repository adapters, and reporting changes remain isolated within document-generation components. These findings show that repository-based architectures significantly reduce coupling, improve change isolation, and support the sustainable evolution of government information systems operating under dynamic regulatory environments.