Claim Missing Document
Check
Articles

Found 10 Documents
Search

Implementasi Steganografi Menggunakan Metode Least Significant Bit (LSB) Berbasis Web (Studi Kasus : PT Bank Tabungan Negara) Turmudi Zy, Ahmad; Isarianto; Susilo, Arif; Mustafanah, Alif
Jurnal SIGMA Vol 14 No 3 (2023): September 2023
Publisher : Teknik Informatika, Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dalam sebuah perusahaan pasti terdapat sebuat interaksi pertukaran informasi baik pesan, data ataupun gambar untuk pertukaran tersebut di butuhkan sebuah aplikasi yang dapat mengirim dan menerima sebuah informasi, tak jarang sebuah perusahaan menggunakan social media sebagai alat pertukaran informasi. Dalam pertukaran informasi yang berkaitan dengan rahasia perusahaan di butuhkan keamanan yang sangat extra mengingat banyak sekali peretasan terhadap social media. Oleh karena itu untuk menyiasatinya kita membutuhkan kemanan tambahan yang dapat menyembunyikan pesan tersebut tanpa di ketahui oleh orang lain. dari permasalahan peretasan diatas penulis berusaha mencari keamanan tambahan untuk pertukaran pesan antara karyawan perusahaan yang aman dan tidak diketahui orang lain, kemudian penulis menemukan Steganografi yaitu teknik menyembunyikan pesan kedalam gambar jadi selain si pengirim dan si penerima tidak akan tahu bahwa gambar tersebut berisi pesan. Untuk metodenya penulis mengambil Leas Significant Bit karena dalam penerapannya wadah untuk mengisi pesan lebih banyak. Kata kunci: Steganografi, Secret Massage with Image, Image, Steganografi LSB.
Sistem Informasi Akademik Pada Sekolah MI Miftahuddiniyah Berbasis Web Afandi, Dedi; Hadapi Akhbar, Ahmad; Isarianto; Rozikin, Zaenur
Jurnal SIGMA Vol 14 No 4 (2023): Desember 2023
Publisher : Teknik Informatika, Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The world of education is currently developing very rapidly. In this rapid development, along with the development of technology and information that occurs. This very diverse technology and information requires quality improvements and mechanisms for the service sector to be more efficient, so that the Human Resources (HR) that have been produced from the world of education can make a contribution to the process of building the outside world in accordance with their expertise. When the data processing and academic data information system is running, it is still done manually so that it is possible to cause efficiency problems with time in the data processing process. To overcome these problems MI Miftahuddiniyah requires a web-based academic information system. The goal is to minimize errors and provide convenience to the school academics in processing data. The development method used in this information system is using the waterfall method, where the steps of this method begin with an analysis of system requirements, and continue with material collection, design, manufacture, testing (redesign if not appropriate) and system application. The results of this study are in the form of a website for the MI Miftahuddiniyah Academic Information System. The development of this Academic Information System is made in a web-based application that can make it easier for admins to process report data management, minimize errors and data loss because the processed data is stored in the database, and can speed up the process of inputting student grade data. Keywords:Web-Based Academic Information System with Waterfall Method, PHP, MySQL, SS
Analisis Prediksi Data Mining Untuk Mengetahui Minat Pembeli Terhadap Produk I-Pos Pada Pt Luma Technology Indonesia Menggunakan Algoritma Klasifikasi Naive Bayes Isarianto; Andhika Sardi, Sophian
Jurnal SIGMA Vol 14 No 4 (2023): Desember 2023
Publisher : Teknik Informatika, Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

PT Luma Technology Indonesia was established in 2007 and is engaged in software distributors for SMEs, especially products for the iPos Store Program for the Jabodetabek region. Besides being a software distributor, PT Luma Technology Indonesia also provides training services, assistance services and network installation services as after-sales services that can increase the value of the products being marketed. In addition to marketing their products offline, namely by consignment to several software stores in the Jabodetabek area, to keep up with the developments of the company, they also began using online methods to market their products such as through several e-commerce websites and social media. With so many prospective customers who submit PO on PT Luma Technology Indonesia. Then there will be a test of buying interest in prospective customers. PT Luma Technology Indonesia uses one of the classification methods, namely the naive bayesian method, to find out prospective customers who are interested or not in the ipos store program on PT Luma Technology Indonesia with a fairly high level of accuracy, in order to find out prospective customers who are interested in the ipos store program on PT Luma Technology Indonesia. Keyword: Analysis, data mining, interests, prospective customers, PT Luma Technology Indonesia, classification, naive bayes
IMPLEMENTASI SISTEM ABSENSI FACE RECOGNITION BERBASIS WEB PADA BAGIAN KESEJAHTERAAN RAKYAT KABUPATEN BEKASI suprapto; Isarianto; Alhadi Saputra; Handala Simetris Harahap; Ahmad Fauzi
Jurnal SIGMA Vol 15 No 1 (2024): Juni 2024
Publisher : Teknik Informatika, Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37366/sigma.v15i1.5067

Abstract

At this time, Bagian Kesejahteraan Rakyat Kabupaten Bekasi still uses finger print attendance, the attendance process using finger print is often problematic on machines that do not detect fingers, so the attendance process is done manually by writing on the attendance form. Plus, to carry out the attendance process, employees have to queue, so it is quite a waste of time. During the Covid-19 pandemic, finger print attendance is still dangerous because of physical contact when going to the attendance process. The attendance process needs to be improved again so that its use is more flexible, safe and efficient. By utilizing face recognition technology, face recognition-based attendance is attendance that is carried out using the detection of parts of the human face. Then in the design of the face recognition-based attendance system, the researcher uses a system modeling with Undefined Modeling Language (UML) and developed with the prototype method. This research shows that with the construction of this web-based facial recognition face attendance system, Bagian Kesejahteraan Rakyat Kabupaten Bekasi can be easier and safer from the Covid-19 outbreak in carrying out attendance in every condition, then in the recapitulation of the list of employees who attend Bagian Kesejahteraan Rakyat Kabupaten Bekasi it is easier because it is already stored in the database.
Peran Teknologi Informasi dalam Industri Manufaktur Menghadapi Revolusi Industri 4.0 Isarianto; Andhika Sardi, Sophian; Zakiatul, Zulfa Hidayah; Latif, Abdul
Jurnal Pelita Pengabdian Vol. 2 No. 2 (2024): Juli 2024
Publisher : DPPM Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37366/jpp.v2i2.4625

Abstract

Revolusi Industri 4.0 telah membawa perubahan signifikan dalam berbagai sektor, termasuk industri manufaktur. Teknologi informasi memainkan peran kunci dalam transformasi ini dengan memperkenalkan konsep pabrik pintar (smart factory) yang mengintegrasikan Internet of Things (IoT), big data, kecerdasan buatan (AI), dan cloud computing. Penelitian ini bertujuan untuk menganalisis peran teknologi informasi dalam industri manufaktur dan bagaimana teknologi ini membantu perusahaan menghadapi tantangan Revolusi Industri 4.0. Metode yang digunakan adalah kualitatif deskriptif dengan analisis literatur dari berbagai sumber referensi. Hasil penelitian menunjukkan bahwa implementasi teknologi informasi dalam manufaktur meningkatkan efisiensi produksi, mengurangi biaya operasional, dan meningkatkan daya saing perusahaan. Teknologi IoT memungkinkan pengumpulan data real-time, big data dan analitik mendukung pengambilan keputusan berbasis data, AI dan machine learning membantu dalam prediksi kegagalan mesin, dan cloud computing menyediakan infrastruktur yang fleksibel. Kesimpulannya, teknologi informasi berperan penting dalam mendukung industri manufaktur dalam menghadapi tantangan dan memanfaatkan peluang yang ditawarkan oleh Revolusi Industri 4.0.
Enhancing Network Security: Evaluating SDN-Enabled Firewall Solutions and Clustering Analysis Using K-Means through Data-Driven Insights Ahmad Turmudi Zy; Isarianto; Rifa’i, Anggi Muhammad; Nugroho, Agung; Ghofir, Abdul
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 9 No 1 (2025): February 2025
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v9i1.6056

Abstract

In the face of escalating and increasingly complex cyber threats, enhancing network security has become a critical challenge. This study addresses this issue by investigating the optimization of SDN-enabled firewall solutions using a data-driven approach. The research employs K-Means clustering to analyze attack patterns, aiming to identify and understand distinct patterns for improved firewall effectiveness. Through the clustering process, attack data was classified into three clusters: Cluster 0, indicating concentrated attack sources likely tied to high-activity regions or networks; Cluster 1, representing a dispersed distribution of attacks, pointing to diverse origins; and Cluster 2, linked to specific geographic regions or unique attack behaviors. The clustering efficacy was evaluated using the Silhouette Score (0.606) and the Davies-Bouldin Index (0.614), indicating meaningful and reliable clustering outcomes. These findings provide actionable insights into network threat patterns, enabling the refinement and enhancement of SDN-enabled firewalls. The study contributes to the field by demonstrating the potential of clustering techniques in uncovering patterns overlooked by traditional methods and paving the way for further research into alternative clustering algorithms and broader applications in network security.
Peningkatan Pemahaman Pelaksanaan Pendidikan Inklusi di Sekolah Dasar Setyowati, Rini; Isarianto; Juariah, Sit; Restu Kurnia, Ira; Ruwaida, Gina Asri
Jurnal Pelita Pengabdian Vol. 3 No. 2 (2025): Juli 2025
Publisher : DPPM Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak Pengabdian ini bertujuan untuk untuk memberikan pelatihan dan pendampingan kepada guru-guru SD agar mereka memiliki kemampuan dan pengetahuan yang cukup dalam mengajar dalam rangka menyukseskan pendidikan inklusi di sekolah. Pendampingan ini menggunakan pendekatan partisipatif dan berbasis kolaborasi dengan metode observasi dan wawancara untuk mengetahui permasalahan yang ditemukan dalam pelaksanaan pembelajaran berbasis inklusi di sekolah. Temuan menunjukkan bahwa masih ditemukan kekurangan guru pendamping khusus, kurangnya kompetensi guru untuk menangani anak berkebutuhan khusus, kurangnya pelatihan yang diadakan oleh pemerintah dalam meningkatkan kompetensi guru pendamping khusus, dan kurangnya dukungan orang tua dalam belajar di rumah. Studi ini akan berkontribusi pada pengetahuan dengan memberikan wawasan terkait cara untuk mendampingi siswa belajar dengan latar belakang siswa yang beragam.
Pengujian Sistem Informasi Kontrol Stok Barang Pendukung Produksi Berbasis Web Dengan Metode User Acceptance Testing (UAT) Pada PT. Tenma Cikarang Indonesia Isarianto; Rina Patmawati
Prosiding Sains dan Teknologi Vol. 3 No. 1 (2024): Seminar Nasional Sains dan Teknologi (SAINTEK) ke 3 - Januari 2024
Publisher : DPPM Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

An information system is one of the most essential components within a company. By implementing an information system, a company can ensure the quality of the information produced and make decisions based on that information. PT. Tenma Cikarang Indonesia is a company engaged in the production of plastic injection molds and molding. One of the main weaknesses in the current stock control system at PT. Tenma Cikarang Indonesia is the lack of visibility and accuracy in managing supporting production inventory. Without a computerized system, the company often faces difficulties in tracking available stock, updating depleted items, and anticipating customer demand. In response to these issues, a supporting production inventory control information system was designed to assist the warehouse department in managing item data. This system is web-based and was developed using the waterfall method, with PHP as the programming language and MySQL as the database. Testing was conducted using the User Acceptance Testing (UAT) method. The resulting system is capable of providing information on item data, goods receipt, goods issuance, and generating transaction reports that are useful for users.
Implementasi Metode Local Binary Pattern (LBP) Dan K-Nearest Neighbor (K-Nn) Pada Sistem Berpakaian Di Prodi Teknik Informatika Universitas Pelita Bangsa Isarianto; Helmi Ahmad Fauzi Candra
Prosiding Sains dan Teknologi Vol. 3 No. 1 (2024): Seminar Nasional Sains dan Teknologi (SAINTEK) ke 3 - Januari 2024
Publisher : DPPM Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The student code of ethics is a set of rules that regulate students' attitudes, words, actions, appearance, and clothing while they are students. Pelita Bangsa University students also follow the development of fashion trends from fashion developments every year, which will have an impact on the dress code of ethics for students of the Pelita Bangsa University Faculty of Engineering. Dressing neatly and politely means wearing formal clothes when participating in campus activities. Several lecturers require wearing formal (collared) clothing when participating in learning activities. Research has been proposed to detect clothing using the Local Binary Pattern (LBP) method with the K-Nearest Neighbor (KNN) classification. 130 images were used with a composition of 70 images of t-shirts and 60 images of shirts. This system is used to detect t-shirts and shirts. A system will be designed to detect shirts that focus on Pelita Bangsa University students using the Local Binary Pattern (LBP) and K-Nearest Neighbor (KNN) methods as classifiers. It is hoped that the results of testing this research can get better accuracy than previous research. This accuracy was obtained from testing 130 images using the Lbp extraction method with values of R=1 and P=8, in addition to the KNN classification with values of K=1 and Euclidean distance parameters.
Implementasi Metode Forward Chaining Untuk Mendiagnosa Penyakit Tumor Otak Isarianto; Melinda Indriani
Prosiding Sains dan Teknologi Vol. 4 No. 1 (2025): Seminar Nasional Sains dan Teknologi (SAINTEK) ke 4 - Februari 2025
Publisher : DPPM Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Expert systems can assist people in conducting early disease diagnosis by simulating expert knowledge in answering questions and providing solutions. This web-based application enables users to obtain analysis results regarding appropriate treatment and necessary medical actions based on their symptoms. At Central Medika Hospital, consultations are limited to specific doctor practice hours and involve relatively high fees. As a result, patients experiencing symptoms such as severe headaches resembling brain tumor indications outside practice hours must wait for examination, potentially delaying treatment. To address this issue, a brain tumor diagnostic expert system was developed using a rule-based approach with the Forward Chaining algorithm. The system was built using the Waterfall development method, with MySQL as the database and PHP and HTML as the programming languages. The research involved two types of testing: functional testing using Black-box testing and accuracy testing of the Forward Chaining calculations. The results showed that the system functioned very well, and the accuracy test achieved a result of 100%, indicating that the system’s diagnostic conclusions were fully consistent with the predefined rules.