Claim Missing Document
Check
Articles

Web-Based Design Of Vehicle Management Information System Of Widyatama University Wahyu Wibowo, Ari Purno; Heryono, Heri; Hamdani, Dani
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3641

Abstract

Vehicle inventory management and data collection information system is a system based on a Management Information System so that it has complete implementation functions that aim to record all vehicles. The main objective of developing this information system is to provide services that are faster, transparent and accurate on the service side of borrowing official vehicles within the Widyatama University environment. In the current vehicle inventory information system, it is not yet computerized and is done manually. The inventory registration information system is expected to be useful for minimizing errors that have occurred so far such as the unclear condition of the vehicle and when the vehicle will return, the design of the inventory information system is expected to produce an inventory information system that can work optimally and efficiently can perform testing services, readiness of drivers and management of motorized vehicles that operate according to the provisions that have been regulated, where the type of service can be adjusted to vehicle test data that is periodic, mutations in (Arrive) / out (booking) can be seen clearly by officers or users, other functions are there are changes to the function and status of the vehicle so that the vehicle will always be available and ready to be used.
Text as a Social Network Analysis Topography And Political Communication In Indonesia Heryono, Heri Heryono; Hamdani, Dani; Purno Wahyu, Ari
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3645

Abstract

Political communication has a central role in shaping public opinion and political dynamics in Indonesia. This research aims to investigate the role of text in the context of Social Network Analysis (SNA) and political communication in Indonesia. This research combines NLP (Natural Language Processing) text analysis with SNA to understand how texts related to politics can provide insight into the relationship between political figures, political issues, and society. The research methodology involves collecting text data from various sources, such as social media, online news, blogs, and political discussion forums. The text data is then processed, analyzed and modeled with SNA analysis tools and NLP algorithms to identify relationships and communication patterns in a political context. In addition, this research also considers how the sentiments in these texts can influence the dynamics of sociopolitical networks. It is hoped that the results of this research will provide a deeper understanding of how political texts can be used as a tool for SNA analysis, with a focus on the Indonesian context. The findings of this research can be useful for political researchers, communication practitioners, and political decision makers to understand the political dynamics that are developing in the digital era. Apart from that, this research also has implications in understanding how political issues and political figures are understood and perceived by the public in political communication in Indonesia.
Monitoring cattle farms using Cloud Computing-based Internet of Things (IOT) tools using Artificial Intelligence Methods Rahayu, Ria Sri; Wahyu Wibowo, Ari Purno
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3736

Abstract

Cows are animals  valuable commodity  and it one of the economic supports for people in animal husbandry and agriculture, cows it selves able to  used for meat, there are currently many cattle farms in Indonesia and spread across several regions, the cattle breeding or livestock proses  Currently including in two types,   farming in cages and farming outside cages, the cows themselves can easily be infected by diseases which spread quickly to other cows, large numbers of cows diasble to monitor because of the limited equipment and number of farmers, the number of cages is flat being far from settlement areas will make the selection process difficult and disable simultaneously. To handle this problem, it can be deal with using sensor devices that are configured with IoT devices. These devices easily monitored health and room temperature which can be used for 24 hours, the results of the data from the temperature sensor are displayed information that represent like dashboard and displays the cow's temperature data in graphical view. The system sets a temperature range of 38.6 - 38.9. If above this temperature the cow is in distemper condition and needs to be quarantined and won’t spread to another cow. This system provide information and make it easier for farmers to supervise their livestock.
Detection of Malware Threats in Internet of Things Using Deep Learning Nashrullah, Naufal; Wahyu, Ari Purno
Brilliance: Research of Artificial Intelligence Vol. 4 No. 1 (2024): Brilliance: Research of Artificial Intelligence, Article Research May 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i1.3869

Abstract

This paper examines the potential risks associated with the Internet of Things (IoT) as a new gateway for cyberattacks. The continuous access it provides to systems, applications, and services within organizations increases the likelihood of serious threats, such as software piracy and malware attacks, which can result in the theft of sensitive information and significant economic losses. To address these concerns, researchers have proposed the use of Deep Convolutional Neural Network (DCNN) to detect malware infections in IoT networks by analyzing color image visualization. The malware samples were obtained from the Android Malware dataset on Kaggle. The proposed deep learning method, namely the Deep Convolutional Neural Network, was employed to detect malware infections in IoT networks.
RANCANG BANGUN SISTEM INFORMASI PENGUKURAN INDEKS PROFESIONALITAS APARATUR SIPIL NEGARA DENGAN DJANGO Tanjung, Muhammad Ali Akbar; Wibowo, Ari Purno Wahyu
Jurnal Informatika Teknologi dan Sains (Jinteks) Vol 7 No 1 (2025): EDISI 23
Publisher : Program Studi Informatika Universitas Teknologi Sumbawa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51401/jinteks.v7i1.5285

Abstract

Peraturan Badan Kepegawaian Negara Republik Indonesia Nomor 8 Tahun 2019 dan Peraturan Menteri Pendayagunaan dan Reformasi Birokrasi Nomor 38 Tahun 2018 menetapkan standar pengukuran Indeks Profesionalitas Aparatur Sipil Negara (IP ASN). Pengukurannya di beberapa instansi pemerintahan masih dilakukan secara manual atau semi-komputerisasi sehingga mengakibatkan proses tidak efisien, rawan kesalahan, dan tidak terintegrasi. Di Pemerintah Kabupaten Belitung, kondisi tersebut terjadi dan berdampak pada keterlambatan pengambilan keputusan dan kurangnya akurasi data yang mendukung pengembangan kompetensi ASN. Tujuan dari penelitian ini adalah untuk membuat aplikasi web berbasis Django yang dapat mengukur IP ASN dengan menggunakan metode pengembangan Waterfall dan menerapkan konsep Model-View-Template (MVT) Django. Selain itu, aplikasi ini diintegrasikan dengan Framework Rest Django (DRF) untuk mendukung pengembangan  Application Programming Interface (API), yang memungkinkan sistem terhubung dengan platform lain. Hasil pengembangan menunjukkan bahwa aplikasi ini dapat mempercepat analisis, membuat laporan yang lebih akurat, dan memungkinkan integrasi data dengan sistem yang sudah ada. Aplikasi memenuhi persyaratan fungsional dengan baik, menurut pengujian sistem dengan metode black-box testing. Aplikasi ini membuat pengukuran IP ASN lebih cepat dan efisien, dan membantu pengambilan keputusan berbasis data yang lebih baik. Diharapkan bahwa aplikasi ini akan meningkatkan profesionalitas ASN dilembaga pemerintah dan membantu transformasi digital sektor pemerintah
Cyber Pandemic – The New Cybersecurity Risks Sukenda, Sukenda; Zulpratita, Ulil Surtia; Muttaqin, Helmy Faisal; Wahyu, Ari Purno; Yustim, Benny
Brilliance: Research of Artificial Intelligence Vol. 4 No. 2 (2024): Brilliance: Research of Artificial Intelligence, Article Research November 2024
Publisher : Yayasan Cita Cendekiawan Al Khwarizmi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/brilliance.v4i2.4759

Abstract

We are amidst a digital pandemic. In 2020, COVID-19 sped up a change towards remote working and the product being utilized for these assaults has become more straightforward to execute, ransom ware assaults have risen quickly and keep on speeding up in 2021. The COVID-19 pandemic has changed both the actual world and the computerized space, where organizations and associations are being gone up against with overwhelming online protection challenges for which not many were prepared or prepared to confront. Attributable to the extreme change in working conditions, cyber attacks and information extortion presently rank third among the best worries of business pioneers, as detailed in the World Economic Forum's COVID-19 Risks Outlook. The likelihood of malignant digital movement is considerably more upsetting thinking about that 53% of organizations have never pressure tried their systems. The key focus point from these and a large group of other alarming probabilities is that readiness for any kind of digital emergency whatsoever levels of an association is critical. Top administration, network protection trained professionals and each representative should know how to treat an emergency hit. Cyber security centers around securing information, yet it is presently not adequate; organizations need cyber resilience.
Co-Authors A m i n u d i n Agung Rachmat Raharja Al-Husaini, Muhammad Aminudin Ananta Billy Ocean Andhika Dwi Syahputra Bagus Alit Prasetyo Baramukti Dewayana Bayu Dwi Rizkyadha Putra Benny Yustim Bob Foster Candra Perdana Chaniago, M Benny Christopher Prananta Sembiring Dani Hamdani Dani Hamdani Dani Hamdani, Dani Diah Sri Rejeki Diany Dimas Naufal Hakiki Egi Abinowi Egi Abinowi Endang Amalia Faisal Muttaqin, Helmy Fajar Sapta Ramadhan Faris Rai Fadhil Gavin Haryanto Hutagalung Ghifari, Muhammad Al Gilang Gemilang Ramadhan Putra Gilang Pratama Putra Hafizh Cahaya Putra, Vito Haria Saputry Haria Saputry Wahyuni Helmy Faisal Mutaqien Helmy Faisal Muttaqin Helmy Faisal Muttaqin Heri Heryono Heri Heryono Herwan Rahmansyah Heryono, Heri Heryono, Heri Heryono Hesti Pratiwi Hilma Najya I Ketut Suada Ilham Dzulfiqar Almaarif Indra Aliyudin Indra Guna Noviantama Jumadil Saputra Kaffah Imanuddin M R Santosa Kanugrahan, Ghanim Khansa Nurul Andini Khevin Asyahda Luginawati, Syita M Benny Chaniago Merryam Agustine Merryam Agustine Merryam Agustine Mualwan, Rifqi Muhamad Rizky Fauzan Muhammad Aiman Abdul Hafizh Muhammad Arief Fahrizal Muhammad Benny Chaniago Muhammad Benny Chaniago Muhammad Fiqh Nurhidayat Muhammad Rais Fauzan Muhammad Zacky Sudardjat Muttaqin, Helmy Faisal Nashrullah, Naufal Nenden Aryani Goddess Putra, Bayu Dwi Rizkyadha Putra, Gilang Pratama Rahayu, Ria Sri Resti Dewi Sri Retno Paryati Reyta, Fitriani Ria Fatimah Setiawati Rian Andrivani Rian Pirnandi Turnip Riky Arisandi Sadar Putra Sadeli Siti Mardiana Siti Mardiana Suhendri Suhendri Suhendri Suhendri Sukenda Sukenda Sulianta, Feri Sunjana * Sunjana Sunjana Syita Luginawati Tanjung, Muhammad Ali Akbar Taufik Hidayat Ulil Surtia Zulpratita Umi Hayati Yan Puspitarani Yusuf, Revy Muhammad