Claim Missing Document
Check
Articles

Found 6 Documents
Search

PERANCANGAN DAN IMPLEMENTASI APLIKASI KEAMANAN UJIAN ONLINE MENGGUNAKAN ALGORITMA RIJNDAEL DAN REMOTE DESKTOP PROTOCOL Alamsyah, Zaenal; Insany, Gina Purnama; Taqwana, Friendly Jihad
SKANIKA: Sistem Komputer dan Teknik Informatika Vol 7 No 2 (2024): Jurnal SKANIKA Juli 2024
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/skanika.v7i2.3185

Abstract

Hanna Hersop Course and Training Institute (LKP) is a non-formal educational institution that offers learning materials both offline and online. The obstacles faced by the institution during the implementation of the exam are still not optimal because they are still carried out using conventional methods, such as the use of paper and pencils, which causes the risk of cheating and security during the exam. So this study aims to implement an exam system on a virtual machine with an integrated security application using the Remote Desktop Protocol (RDP) with the Windows Server 2019 operating system as a server and client for the implementation of the exam test. The main objectives include security settings on the Windows Server OS in the virtual machine, login key encryption with the Rijndael algorithm, and creating an application to generate login keys. The development technique chosen is Rapid Application Development (RAD). The online exam application was developed using Microsoft ASP.NET Core for the time server, while the exam website uses PHP and JavaScript. The desktop application of the security system with RDP was created using the C# programming language. This system includes setting the exam time synchronized with the time server via the HTTP protocol, as well as restricting access to the exam website only in the virtual machine and limiting keyboard functionality during the exam. The results of the study show that the implementation of online exams on a virtual machine with an RDP security system can create a safe exam environment. This includes preventing cheating through restricting access to applications and the web, encrypting login keys to maintain confidentiality of information, and limiting keyboard functionality. This implementation also creates a better exam implementation structure with exam time synchronization, and a high level of user satisfaction. Respondents on the Likert scale showed satisfaction with the ease of use of the online exam security application implemented at LKP Hanna Hersop.
Rancang Bangun Sistem Informasi Tracer Study Pada Teknik Informatika Universitas Nusa Putra Nugraha, Nugraha; Anggun Fergina; Alamsyah, Zaenal; Parwati, Lusiana Sani; Iskandar, Alyanissa Putri
Computer Science and Information Technology Vol 5 No 1 (2024): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v5i1.6691

Abstract

This research aims to implement the Tracer Study information system in the Department of Information Engineering, Nusa Putra University, with a focus on needs analysis, system design, application development, and testing. This system is designed to manage alumni data, monitor career development, and collect relevant information for study program evaluation. The successful implementation of the system is expected to increase the efficiency and effectiveness of Tracer Study, make a positive contribution to curriculum development, and improve the quality of education at universities.
Penggunaan Snort Sebagai Sistem Pendeteksi Serangan Pada Jaringan Menggunakan Notifikasi Telegram (Kasus Dinas Komunikasi Informatika Dan Persandian Kabupaten Sukabumi) Fergina, Anggun; Ikhsan, Sultan Alif Nur; Alamsyah, Zaenal
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 3 (2024): Edisi Juli
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i3.416

Abstract

Network security has become very important to protect individuals, companies, and agencies from threats such as cyberattacks, and data theft. Therefore, understanding the importance of network security is essential. Based on the interview results, there is a server in the Sukabumi District Command Center managed by DISKOMINFOSAN Sukabumi District, the server is used as an application server. The server does not have a network security monitoring system that provides alerts when there is an attempted attack on the server in real time. One way to improve security on the server is to use an Intrusion Detection System (IDS). IDS is a system intended to detect suspicious activity or attacks on the network. One of the main goals of IDS is to provide warnings against security threats that may occur. Snort is one of the open-source IDS tools. Snort was created to identify network attacks and provide realtime alerts to administrators when identifying certain behaviors or attack patterns. In this study the authors used the SPDLC development method. Security Policy Development Life Cycle (SPDLC) is a system development method that focuses on network security. After testing, it can be concluded that snort can be used as an IDS installed on ubuntu server 22.04, with the rules that have been made snort can detect when someone tries port scanning to the server using masscan and can detect ping attacks aimed at the server in real time. With the script that has been created, snort can send alerts to network administrators using telegram in realtime so that these alerts can be followed up immediately.
PERANCANGAN IDENTITAS VISUAL PRODUK TEH HERBAL BUNGA TELANG UNTUK MENINGKATKAN DAYA TARIK KONSUMEN DI DESA CIKELAT Novia, Irsa; Hidayat, Alfiansyah; Ahmad Gozali, Rizqi; Alamsyah, Zaenal
Jurnal Abdi Nusa Vol. 5 No. 1 (2025): Februari 2025
Publisher : LPPM Universitas Nusa Putra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52005/abdinusa.v5i1.171

Abstract

Telang Flower Herbal Tea is a herbal drink produced from butterfly pea flowers (Clitoria ternatea), a plant that grows abundantly in tropical areas, including Indonesia. Butterfly pea flower, also known as butterfly pea flower or blue flower, has a distinctive blue color that gives this herbal tea its color and natural properties. This research is the result of collaboration between Nusa Putra Sukabumi University and Cikelat Village, in an effort to increase the attractiveness of telang flower herbal tea products. The product's visual identity is the main focus of this research, with the aim of creating a strong and attractive visual identity to increase consumer appeal. A strong visual identity can help these products be more easily recognized by consumers, create a positive image, and increase confidence in the product's quality. Visual identity design involves color selection, logo design, packaging design, and branding strategy, as well as active participation from the Cikelat Village community to ensure conformity with local values and culture. It is hoped that this research will provide benefits to the people of Cikelat Village, enrich students' educational experiences, and become a reference for other rural communities who are trying to increase the competitiveness of local products through designing effective visual identities.Keywords: Telang Flower, Visual Identity, Cikelat Village
PENGEMBANGAN IDENTITAS VISUAL SEBAGAI UPAYA PENGUATAN BRANDING UMKM DESA CIKELAT Novia, Irsa; Hidayat, Alfiansyah; Ahmad Gozali, Rizqi; Alamsyah, Zaenal
Jurnal Abdi Nusa Vol. 5 No. 1 (2025): Februari 2025
Publisher : LPPM Universitas Nusa Putra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52005/abdinusa.v5i1.172

Abstract

This research aims to develop a strong visual identity as part of a brand strengthening strategy for Micro, Small and Medium Enterprises (MSMEs) in Cikelat Village. Cikelat Village is one of the rural MSME locations that faces challenges in terms of marketing and brand differentiation in the era of globalization and increasingly fierce competition. This research uses a qualitative approach with case studies as a methodology, involving MSME owners in the participatory visual identity design process. The research results showed that the measuring instrument used in this research was proven to be valid and reliable, with a calculated r value that was greater than the table r value, and a very high level of reliability based on the Cronbach's Alpha reliability coefficient. This shows that the measuring instrument is reliable in measuring the variables studied. The development of a visual identity is expected to provide significant benefits for Cikelat Village MSMEs, increasing brand impressions, building trust, and increasing sales and sustainable growth. This service also integrates a community empowerment approach with the aim of increasing the knowledge and skills of MSME owners, supporting the development of their businesses. The results of this research provide an important contribution in understanding the importance of developing visual identity in the context of empowering rural MSMEs and provide a basis for further action in supporting the growth of MSMEs in Cikelat Village.
Jurnal Pemanfaatan Tongkat Berbasis IoT dan Yolo V3 Untuk Meningkatkan Mobilitas dan Keamanan Penyandang Tunanetra Dava, Dava Febrian; Kamdan; Alamsyah, Zaenal
Computer Science and Information Technology Vol 6 No 2 (2025): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v6i2.9793

Abstract

Visually impaired individuals face significant challenges in mobility and safety during daily activities, especially in public spaces that are not disability-friendly. Conventional white canes are limited in their ability to detect obstacles. This study aims to design and implement a smart cane based on the Internet of Things (IoT) and the real-time object detection algorithm YOLO V3 to enhance the mobility and safety of visually impaired users. The developed system utilizes ultrasonic sensors to detect obstacles on the left and right sides of the user, a GPS module for real-time location tracking via a web server, and an ESP32-CAM integrated with YOLO V3 to detect objects such as vehicles, holes, and people. Information is conveyed to the user through voice alerts using a DFPlayer Mini and is also displayed on an LCD and a web interface. Test results show that the system operates accurately, with an average sensor error rate of only 0.12%, and all components function properly. Usability testing involving 50 respondents indicates a very high level of user satisfaction, with average agreement rates exceeding 85%. This research demonstrates that the integration of IoT and computer vision can produce a smart, responsive, and user-friendly assistive device for the visually impaired.