Claim Missing Document
Check
Articles

Found 3 Documents
Search

Rancang Bangun Sistem Deteksi Masker Kesehatan Pada Wajah Manusia Dengan Opencv Berbasiskan Android Pada STMIK Mercusuar Soderi; Juwari; sarwo
Jurnal SIGMA Vol 14 No 3 (2023): September 2023
Publisher : Teknik Informatika, Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The research that the author conducted was driven by the increasingly widespread and widespread Covid -19 in Indonesia in 2020, and this affected almost all sectors, from health, education to the economic sector. From the health sector, the Government has actually issued regulations requiring all people to wear masks, but there are still people who do not use masks when doing activities outside the home, especially students. The purpose of this research is to help the STMIK Lighthouse campus to detect students in terms of discipline using face mask. The methodology that the author uses to prove that many students do not wear masks outside, namely by interviewing. And also the programming language that the author uses to design this application is python along with the measurement software using Precision and Recall. The expected result of this research is the creation of an application that can detect whether someone has used a mask or not. Keywords: Deteksi Masker, python, covid, aplikasi, Precision and Recall
Sistem Implementasi Untuk Membantu Uji Kompetensi TIK Bagi Guru Non-TIK Berbasis Moodle (Studi Kasus: SMA Darul Ulum 2 Jombang) sarwo; Mustfofa, arif
Jurnal Komunikasi, Sains dan Teknologi Vol. 3 No. 2 (2024): Desember 2024
Publisher : PT. BERBAGI TEKNOLOGI SEMESTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61098/jkst.v3i2.192

Abstract

Penelitian ini bertujuan untuk menerapkan evaluasi online terkait kompetensi penguasaan Teknologi Informasi dan Komunikasi bagi guru Non-TIK menggunakan E-learning berbasis Moodle di SMA Darul Ulum 2 Jombang. Kompetensi guru TIK yang diuji dalam penelitian ini adalah aplikasi Ms Word, Excel, PowerPoint, dan Canva. Penelitian ini menggunakan penelitian dan pengembangan (R&D) sebagai metodologi penelitian. Sedangkan dalam pengembangan sistem menggunakan metode SDLC (System Development Life Cycle) dengan model agile. Data penelitian yang digunakan meliputi studi literatur, pengumpulan data melalui kuesioner, dan analisis data kuantitatif serta kualitatif. Data dikumpulkan dari 83 guru yang mengikuti uji kompetensi TIK, dan analisis dilakukan untuk menguji efektivitas sistem dalam menyajikan soal teori dan praktek secara efektif, serta menerima dan mengelola hasil jawaban peserta uji kompetensi sesuai dengan batasan waktu yang ditentukan. Dari hasil survei tingkat kepuasan peserta pasca pelaksanaan tes menunjukkan bahwa pengguna sistem merasa puas dengan sistem antarmuka dan kemudahan akses, dengan persentase kepuasan mencapai rata-rata 77% dengan hasil predikat BAIK
Implementasi Dan Perancangan Sistem Kontrol Akses Terminal Access Controller Pada Perangkat Jaringan Switch Aditama, Javier; sarwo
Jurnal Komunikasi, Sains dan Teknologi Vol. 3 No. 2 (2024): Desember 2024
Publisher : PT. BERBAGI TEKNOLOGI SEMESTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61098/jkst.v3i2.193

Abstract

In large and complex networks, the implementation of centralized AAA services is becoming increasingly important. This service not only improves security but also simplifies the management of user access and ensures that security policies can be applied consistently across the network. Organizations that adopt centralized AAA services can more easily manage user access, identify and respond to security threats, and ensure that security policies and procedures are applied consistently across their network infrastructure. This study focuses on the implementation of Terminal Access Controller Access-Control System (TACACS) as a centralized service for Authentication, Authorization, and Accounting (AAA) on switch network devices at PT XYZ. The results of the study indicate that the implementation of TACACS at PT XYZ has successfully improved access security, ensured comprehensive logging, and provided better control over user activities on the network. In conclusion, TACACS is an effective solution in strengthening security and access management on connected network devices at PT XYZ.