Claim Missing Document
Check
Articles

Found 8 Documents
Search

Perancangan Sistem Penyedia File Sharing dengan Enkripsi URL menggunakan Algoritma Rijndael I Made Adi Bhaskara; Dewa Made Wiharta; Oka Saputra
Jurnal Teknologi Elektro Vol 19 No 2 (2020): (Juli - Desember) Majalah Ilmiah Teknologi Elektro
Publisher : Universitas Udayana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24843/MITE.2020.v19i02.P08

Abstract

Information in the digital era is growing very fast, seen from the rapid exchange of information. Information in the form of data or text is widely distributed and can be spread easily and quickly through the website. Generally a website uses website-based programming with the GET method where the GET method has a weakness of system data that can be seen in the access directory. This causes the data in the directory can be taken by unauthorized persons. Based on these problems the file sharing system provider was designed with URL encryption using the rijndael algorithm. The system provides services for sharing data and downloading data securely. Between the provider and recipient of the data each has an application that is an application to upload and an application to download and the admin is tasked with regulating the number of users of the application user. Existing data in the URL shared by the user upload application that has been in the form of an encrypted ciphertext with the shared rijndael algorithm can only be downloaded by the download application user. Each application has an authentication process where only registered users can access the application according to their respective roles. Research that has been done to get the results of encryption conducted on the upload application changes the URL into a ciphertext that can only be downloaded using a download application so that weaknesses in the GET method can be overcome. Keywords : GET method, encrypt, URL, rijndael algorithm, authentication, download, upload ciphertext
Data and Information Security Audit Using IT Baseline Protection Manual At PT. XYZ I Made Adi Bhaskara; Luh Gede Putri Suardani; Wayan Artha Wijaya
International Journal of Engineering and Emerging Technology Vol 2 No 2 (2017): July - December
Publisher : Doctorate Program of Engineering Science, Faculty of Engineering, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Development of technology security issues is one important aspect of an information system. Data security and information governance in an enterprise has an important role in maintaining the confidentiality of data in the company and keeping the data intact. Without good data security governance it will arise various problems such as vulnerable to hacker attacks and theft of important corporate data, the identity of employees in the company prone to be stolen by using phishing websites, and loss of data caused by technical things like sudden power outages or lost internet connection . The IT Baseline Protection Manual provides an effective way of understanding needs and priorities in securing data through the process of measuring the level of maturity (Capability Level). Audit of data and information security at PT. XYZ aims to measure the level of data security process capability using domains available in the IT Baseline Protection Manual. The audit stage starts from the case study survey, the selection of the IT Baseline Manual Protection domain and the results of the questionnaire obtained as a representation of the level of maturity with the assessment standard using Maturity Level. Maturity Level value obtained from the results of data security and information security using the domain of IT Baseline Protection Manual that is equal to 2,695 of the maximum score 5. Audit results show that the maturity level of dataI security process at PT. XYZ is at Level 2 (Managed) which still needs to be improved to achieve maximum data security. Index Terms—Audit, IT Baseline Protection Manual, Maturity Level.
Analysis and Design Decision Support System of New English Teacher by Using Analytical Hierarchy Process (AHP) in EF English First Bali Putri Suardani; I Made Adi Bhaskara; Komang Oka Saputra
International Journal of Engineering and Emerging Technology Vol 2 No 2 (2017): July - December
Publisher : Doctorate Program of Engineering Science, Faculty of Engineering, Udayana University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract—The purpose of this study is to develop a decision support system to decide the best new English Teacher. The methods used are method of analysis, design method, and literature study. The learning method that is done is to survey the running company system, conduct interview with HRD, and analysis the survey. In literature study conducted by looking for references sources related to the research undertaken. The design is data management subsystem, knowledge base model and user interface. The results achieved are the creation of an application decision support system that can be used to select the most appropriate English teacher and in accordance with the criteria required. This system helps support the decision-making process for new English teacher. Keywords—system, decision, analytical hierarchy process (AHP)
Perbandingan Algoritma Dijkstra dan Floyd-Warshall Menggunakan Software Defined Network untuk Rute Terpendek Bhaskara, I Made Adi; Kumara, I Made Surya; Darma, I Gede Wira; Raharja, I Kadek Agus Wahyu
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol. 7 No. 2 (2024): Jurnal RESISTOR Edisi Agustus 2024
Publisher : Prahasta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31598/jurnalresistor.v7i2.1623

Abstract

Perkembangan teknologi jaringan yang pesat telah mendorong lahirnya arsitektur Software Defined Network (SDN) yang memungkinkan mengatur dan mengontrol jaringan melalui perangkat lunak terpusat. Dengan SDN, administrator jaringan dapat mempercepat koneksi dan mengelola lalu lintas jaringan dari satu lokasi pusat tanpa harus mengakses perangkat keras secara langsung. Openflow adalah protokol komunikasi yang memungkinkan pengawasan dan kontrol penuh terhadap jaringan. Urgensi dari penelitian ini terletak pada kebutuhan untuk menentukan jalur terpendek secara efisien dalam SDN agar mendapatkan performa jaringan yang terbaik. Algoritma Dijkstra sering digunakan dalam SDN untuk menentukan jalur terpendek, namun Algoritma Floyd-Warshall juga dapat digunakan dengan pendekatan pemrograman dinamis. Penelitian dilakukan untuk membandingkan kedua algoritma ini dalam memperoleh jalur terpendek pada SDN. Metode yang digunakan yakni pertama, Algoritma Floyd-Warshall diubah menjadi Algoritma Dijkstra pada controller. Kemudian, dibangun tiga skema topologi jaringan menggunakan mininet, masing-masing terdiri dari dua host (host awal dan tujuan), satu controller, dan beberapa switch. Pengujian dilakukan pada controller dengan algoritma berbeda menggunakan tools POX pada tiga skema topologi jaringan. Pada penelitian ini diperoleh untuk mendapatkan jalur terpendek pada SDN, Algoritma Dijkstra terbukti lebih unggul dibandingkan Algoritma Floyd-Warshall. Dengan ini menunjukkan bahwa pemilihan algoritma yang tepat pada controller SDN dapat meningkatkan efisiensi jaringan.
Meningkatkan Efisiensi Operasional Hotel dan Spa melalui Integrasi Sistem Reservasi dengan Interoperabilitas Database Ariawan, Made Pasek Agus; Peling, Ida Bagus Adisimakrisna; Subiksa, Gde Brahupadhya; Bhaskara, I Made Adi
Jurnal Bangkit Indonesia Vol 13 No 1 (2024): Bulan Maret 2024
Publisher : LPPM Sekolah Tinggi Teknologi Indonesia Tanjung Pinang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52771/bangkitindonesia.v13i1.274

Abstract

This research focuses on the crucial role of databases in information management within the Hotel Reservation System and Spa Reservation System. The lack of database integration between these two systems has significant implications for data management, leading to operational errors. The study highlights the challenges of synchronizing reservation information between hotel rooms and spa services as a tangible example of the negative impacts. To address these issues, the implementation of interoperability is proposed for both databases, aiming to facilitate data exchange and integration. These steps are anticipated to mitigate irregularities in information management, enhance coordination between systems, and offer benefits to both operational efficiency and customer satisfaction. The proposed solution reflects efforts to improve the efficiency and data integrity within both information systems. The integration of hotel and spa reservation systems through the merging of ERD diagrams results in an efficient and structured centralized database. The relationships between entities are designed to support data interaction and improve the overall functionality of the system. This integration provides benefits for businesses in terms of efficiency, customer relations, sales, and data analysis.
Studi Literatur: Analisa Perbandingan Teori Tentang Tingkat Keamanan Antar Algoritma Simetris Bhaskara, I Made Adi; Ariawan, Made Pasek Agus; Peling, Ida Bagus Adisimakrisna; Prayudha, I Putu Astya
Jurnal Bangkit Indonesia Vol 13 No 1 (2024): Bulan Maret 2024
Publisher : LPPM Sekolah Tinggi Teknologi Indonesia Tanjung Pinang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52771/bangkitindonesia.v13i1.278

Abstract

Data security has become a critical issue in the digital age, and cryptographic algorithms play a vital role in preserving information confidentiality. Symmetric algorithms offer convenience and speed, but choosing the right algorithm is crucial to ensuring an adequate level of security. Disciplines of cryptography is generally known, there are two categories of a data encryption and decryption algorithm one of which is a symmetric algorithm. Symmetric algorithms are widely used in the encryption of the data so that new theories are emerging. Types of symmetric algorithms are various algorithms such as DES algorithm, AES or Rijndael algorithm, 3DES algorithm and others. Along with the many theories of symmetric algorithms are used in the discipline cryptography, the security of an algorithm with other algorithms need to be compared to find the most appropriate against attack. Based on this literature study results obtained that the AES algorithm is the most secure algorithm compared to DES and 3DES.
Analisis Klasifikasi Citra Penokohan Topeng Bali Menggunakan Model EfficientnetV2 Dan Xception Yuniari, Widya; Kumara, Surya; Raharja, Agus Wahyu; Bhaskara, Adi; Pradnya Dana, Wikan; Darma, Wira
Jurnal Bangkit Indonesia Vol 13 No 2 (2024): Bulan Oktober 2024
Publisher : LPPM Sekolah Tinggi Teknologi Indonesia Tanjung Pinang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52771/bangkitindonesia.v13i2.319

Abstract

Abstract— Bali is one of the provinces with quite complex cultural diversity in Indonesia. One of them is the characterization of traditional masks. Traditional masks in Balinese tradition are not only intended as performance accessories, but also as symbols of characterization, social status in indigenous communities, rites, and certain primordial activities. Every detail in the curve of the carving on the Balinese mask indicates an aesthetic richness that is certainly measurable as an ontological entity. In this case, the magnitude of this aesthetic measurability can be assisted by using various computational methods. This study tries to create a machine learning model with supervised learning to create a classification system for Balinese mask characterization. The methods used include: processing mask images into a 3-dimensional vector, each representing the red, green and blue color indices. Then each vector will go through a training process to create a measurability model for each characterization. The models used are EfficientNetV2 and Xception which are developments of convolutional models. The performance measurement metrics used are Accuracy, Precision, Recall & F1-Score. The Xception model produced an accuracy of 97%, while the EfficientNetV2 model produced an accuracy of 99%. Keywords— Bali, Classification, EfficientNetV2, Mask, Xception
Analisis Unjuk Kerja Klasifikasi Citra Motif Kain Bali Menggunakan Model Inception Dan EfficientNet Yuniari, Ni Putu Widya; Kumara, I Made Surya; Raharja, I Kadek Agus Wahyu; Pradnya Dana, Gde Wikan; Darma, I Gede Wira; Bhaskara, I Made Adi
Progresif: Jurnal Ilmiah Komputer Vol 21, No 1: Februari 2025
Publisher : STMIK Banjarbaru

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35889/progresif.v21i1.2568

Abstract

Bali, with its rich culture and diverse symbolism reflected in the traditional fabric motifs. However, the manual recognition of Balinese fabric motifs faces challenges such as pattern complexity, similarity between motifs, and limited public knowledge. This study aims to address these challenges by using Artificial Intelligence (AI) to automate the process of accurately and efficiently identifying Bali fabric motifs. The research develops a motif recognition model for Bali fabrics using Inception V3 and EfficientNet B1 algorithms in image classification analysis. The research methodology used is experimental, starting with dataset collection, data augmentation, feature extraction, modeling, and testing. The results show that the EfficientNet model achieved an accuracy of 99% on the 25th iteration, much higher than Inception V3, which only achieved 62% accuracy. These results indicate that the EfficientNet model is more effective in recognizing and classifying Bali fabric motifs and strengthen the potential of artificial intelligence in cultural preservation.Keywords: Bali; Classification; EfficientNet; Inception; Pattern AbstrakBali, dengan kekayaan budaya yang kompleks serta beragam simbolisme. Salah satunya tercermin dalam rupa motif kain tradisional Bali. Namun, pengenalan manual motif kain Bali sering terhambat oleh tantangan seperti kerumitan pola, kesamaan antara motif, dan keterbatasan pengetahuan masyarakat. Penelitian ini bertujuan untuk mengatasi tantangan tersebut dengan menggunakan kecerdasan buatan (AI) untuk mengotomatisasi proses identifikasi motif kain Bali secara akurat dan efisien. Penelitian ini mengembangkan model pengenalan motif kain Bali dengan menggunakan algoritma Inception V3 dan EfficientNet B1 dalam analisis klasifikasi citra. Metode penelitian yang digunakan adalah eksperimen, dimulai dengan pengumpulan dataset, augmentasi data, ekstraksi fitur, pemodelan, dan pengujian. Hasil penelitian menunjukkan bahwa model EfficientNet B1 mencapai akurasi 99% pada iterasi ke-25, jauh lebih tinggi dibandingkan dengan Inception V3 yang hanya memperoleh akurasi 62%. Hasil ini menunjukkan bahwa model EfficientNet lebih efektif dalam mengenali dan mengklasifikasikan motif kain Bali serta memperkuat potensi kecerdasan buatan dalam pelestarian budaya.Kata kunci: Bali; EfficientNet; Inception; Klasifikasi; Motif