Claim Missing Document
Check
Articles

Found 16 Documents
Search

Sistem Terintegrasi untuk Perencanaan dan Pengendalian Pembangunan Wilayah Berbasis Kampung Zaidir Zaidir; Indra Listiawan
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 5 No. 1 (2020): Mei 2020
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (355.399 KB) | DOI: 10.14421/jiska.2020.51-07

Abstract

Development planning in the village begins with the Development Planning Conference. The government considers the need for solutions in solving development problems up to the village and village level so that on November 7, 2018 a Mayor Regulation number 72 of 2018 concerning the formation of village administrators is issued so that development is no longer based on RT-RW but based on village. The many functions of village administrators need an appropriate system for processing data. Manually processing data has weaknesses, especially in planning and controlling budget. The purpose of this study is to produce an integrated system for planning and controlling village-based area development. The research method used consists of library research, data collection and system development of the Waterfall method (system analysis, system design, system implementation and system testing). The results of this study are a system that is capable of processing data from budget proposals to reporting and can provide varied information for village administrators, LPMK and Kelurahan.
Workshop Penggunaan Aplikasi Presensi Berbasis Mobile dengan Validasi Radius Lokasi Aini, Farida Nur; Listiawan, Indra
Jurnal Pelayanan dan Pengabdian Masyarakat (Pamas) Vol 7, No 4 (2023): Jurnal Pelayanan dan Pengabdian Masyarakat (PAMAS)
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat (LPPM Universitas Respati Indonesia)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52643/pamas.v7i4.3558

Abstract

Employee attendance is data that shows the daily attendance of employees in a company. Data that can be generated from an employee's absence is the time of arrival and departure of employees as proof of attendance at work in the office. There are several problems that arise from this finger print presence equipment. The first problem is the sensitivity of the tool, this presence tool sometimes takes a long time to recognize employee fingerprints, secondly the location of the finger print tool is too far from the employee room. The use of a Mobile-Based Presence application with Location Radius Validation is a solution to the presence problem. To facilitate the use of this presence application, it is necessary to conduct a workshop on the use of the presence application by employeesKeyword : fingerprint, presence, location
Optimalisasi Tata Laksana Administrasi Desa Berbasis Teknologi Informasi bagi Perangkat Desa Katekan Gantiwarno Klaten Munir, Agus Qomaruddin; Listiawan, Indra; Wijaya, Nurhadi; Utari, Evrita Lusiana
Wikrama Parahita : Jurnal Pengabdian Masyarakat Vol. 8 No. 1 (2024): Mei 2024
Publisher : Universitas Serang Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30656/jpmwp.v8i1.6634

Abstract

Perangkat desa di Desa Katekan, Gantiwarno, Klaten, Jawa Tengah, menghadapi banyak tantangan, pada era digital saat ini terutama dalam hal mendapatkan informasi dan pelayanan administrasi berbasis TIK yang dapat dimanfaatkan secara publik untuk kepentingan masyarakat. Perangkat desa seringkali tidak maksimal dalam memberikan layanan yang optimal, terutama jika mereka tidak mampu memanfaatkan teknologi informasi untuk mendukung proses pelayanan yang lebih baik. Untuk membantu perangkat desa menggunakan tata kelola administrasi berbasis TI, workshop aplikasi kantor diberikan dengan tiga materi pokok pada microsof office yaitu miscrosoft word, microsoft excel dan microsoft power point. Kegiatan yang dilaksanakan diawali tahap persiapan, pembekalan bagi mahasiswa serta pelaksanaan kegiatan berupa pemberian workshop secara periodik. Hasil kegiatan menunjukkan peningkatan pemahaman perangkat desa tetang tatakelola administrasi berbasis teknologi informasi serta pengetahuan perangkat desa untuk mengakses informasi dan pengetahuan dari internet untuk mendukung pelayanan kepada masyarakat.
Performance Analysis of Family Welfare Empowerment Application: A Kanban Method Approach Zaidir, Zaidir; Sujarweni, Veronika Wiratna; Listiawan, Indra
Journal of Applied Informatics and Computing Vol. 7 No. 2 (2023): December 2023
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v7i2.6534

Abstract

This research examines the application of the Kanban method in testing a family welfare empowerment application. The Kanban method, initially developed by Toyota in manufacturing, has been effectively applied in software development. This study involves a series of tests involving various features within the application, such as user registration, village data collection, processing of the family welfare empowerment data at the Village/District level, and more. The test results show that most tests were successful, highlighting the application's success in executing essential functions such as user registration and event scheduling. However, some tests failed, primarily in inputting village, hamlet, and community unit data. These results indicate that using the Kanban method in testing a family welfare empowerment application can potentially enhance development and testing efficiency. Metrics such as testing time, test success, and time efficiency have provided valuable insights into the application's performance. In conclusion, this testing provides a foundation for further application development, focusing on improving the areas that experienced testing failures. This research also opens up opportunities for further studies on using the Kanban method in software testing in various other application development contexts.
Optimasi Unjuk Kerja Memory dalam Bahasa Dart pada Aplikasi Monitoring Pegawai Listiawan, Indra; Aini, Farida Nur; Zaidir, Zaidir; Sahal, Ahmad
JURNAL INFORMATIKA DAN KOMPUTER Vol 9, No 1 (2025): Februari 2025
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat - Universitas Teknologi Digital Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26798/jiko.v9i1.1418

Abstract

Penelitian ini mengeksplorasi dan menganalisis teknik optimisasi kinerja memori dalam bahasa pemrograman Dart, khususnya dalam konteks aplikasi pemantauan karyawan. Mengingat pentingnya pengelolaan memori yang efisien dalam pengembangan aplikasi real-time, penelitian ini berfokus pada penggunaan keyword const untuk meningkatkan performa aplikasi. Hasil eksperimen menunjukkan bahwa penggunaan const menghasilkan waktu proses yang lebih cepat tanpa mengurangi penggunaan memori. Analisis lebih lanjut mengungkapkan bahwa const memungkinkan optimisasi pada waktu kompilasi yang meningkatkan kecepatan eksekusi dengan memastikan objek tidak dapat diubah setelah dibuat. Namun, const tidak mempengaruhi jumlah memori yang dialokasikan untuk objek, menunjukkan bahwa ukuran memori tetap sama terlepas dari penggunaannya. Penelitian ini memberikan wawasan penting tentang bagaimana const dapat digunakan untuk mengoptimalkan performa aplikasi Dart dalam hal kecepatan, meskipun tidak berdampak signifikan pada penggunaan memori. Temuan ini diharapkan dapat memberikan kontribusi signifikan dalam pengembangan aplikasi Dart yang lebih efisien dan responsif, serta memperkaya literatur akademik terkait optimisasi kinerja memori dalam bahasa pemrograman Dart.
Optimising Bcrypt Parameters: Finding the Optimal Number of Rounds for Enhanced Security and Performance Listiawan, Indra; Zaidir, Zaidir; Winardi, Sugeng; Diqi, Mohammad
Compiler Vol 13, No 1 (2024): May
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/compiler.v13i1.2111

Abstract

Recent advancements in the field of information security have underscored the imperative to fine-tune Bcrypt parameters, particularly focusing on the optimal number of rounds as the objective of research. The method of research is a Brute Force Search method to find the optimal value of bcrypt rounds. The primary focal point of optimization lies in the number of Bcrypt rounds due to its direct impact on security levels. Elevating the number of rounds serves to fortify the security of the Bcrypt algorithm, rendering it more resilient against brute-force attacks. The execution of the Bcrypt rounds in the experimental method mirrors real-world scenarios, specifically in the evaluation of Bcrypt parameters with a focus on entropy assessment of the hash. The selection of the number of rounds should consider the specific needs of the system, where security takes precedence or faster performance is a crucial factor.