Claim Missing Document
Check
Articles

PERANCANGAN JARINGAN RT/RW NET BERBASIS TEKNOLOGI FIBER TO THE HOME (FTTH) DI DUSUN KEDON RT.005 BANTUL Noraga, Bima; Suharjo, Imam
JATISI Vol 12 No 1 (2025): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Universitas Multi Data Palembang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v12i1.10245

Abstract

The planning of the Fiber to the Home (FTTH) network development in Dusun Kedon Rt.005 Bantul focuses on enhancing fast and stable internet access for the community. In today's digital era, the need for reliable internet connectivity is increasingly important, especially in rural areas that are often neglected in terms of information technology infrastructure. The RT/RW Net network in Dusun Kedon is designed using the FTTH method, utilizing Mikrotik RB750r2 devices, Optical Line Terminal (OLT), Optical Distribution Cabinet (ODC), Optical Distribution Point (ODP), and Optical Network Terminal (ONT). A comparison between the use of FTTH networks and point-to-point networks shows several advantages and disadvantages, including. (1) In the FTTH network, the optical fiber from the provider is split using a splitter to serve multiple customers, while in point-to-point, the optical fiber is directly connected from the service provider to the customer's location. (2) The performance of the FTTH network is influenced by the number of users since the bandwidth is shared, whereas point-to-point offers more stable performance without bandwidth sharing. (3) The FTTH network requires fewer cables and hardware components compared to point-to-point. (4) The FTTH network is more vulnerable to failure if the splitter or main fiber experiences damage, which can affect multiple users simultaneously. In contrast, a point-to-point failure only affects a single customer. (5) The implementation and maintenance costs of the FTTH network are lower compared to point-to-point.
Parking Quota Monitoring System Internet of Things Based Pili, M. Ali Sahbana; Suharjo, Imam
Journal Of Information System And Artificial Intelligence Vol. 5 No. 2 (2025): Vol. 5 No.2(2025): Journal of Information System and Artificial Intelligence Vo
Publisher : Universitas Mercu Buana Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26486/jisai.v6i2.227

Abstract

The development of science and technology has now progressed rapidly. Humans try to overcome parking problems by adopting automatic equipment systems, replacing manual systems. One approach applied is to design an information model regarding the number of automatic parking areas around the parking lot entrance. This information system will display information regarding the number of parking slots available in the parking area. This research produces systems and tools that can monitor parking quotas using IR sensors. System users can park their vehicles as long as the parking lot is not full and the user's ID card has been registered with the system. By using RFID, the system allows users to park easily without swiping the card first. The system will automatically increase the parking quota if it detects a vehicle leaving the parking area. Based on the results of tests carried out to enter parking automatically where the parking quota has not been met and the ID card that has been registered can run well with a percentage of 98%. Meanwhile, the automatic parking exit system also runs well with a percentage of 98%. This presentation is influenced by the speed of the sensor in reading the presence of the vehicle.
SISTEM PEMBERIAN PAKAN UNTUK BURUNG PUYUH BERBASIS IoT MENGGUNAKAN ESP8266 DAN LOAD CELL Ihsanudin, Muhammad; suharjo, imam
Jurnal Informatika dan Teknik Elektro Terapan Vol. 13 No. 3 (2025)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v13i3.6760

Abstract

Penelitian ini mengembangkan Sistem Pemberian Pakan untuk Burung Puyuh berbasis Internet of Things (IoT) menggunakan ESP8266 dan load cell. Burung puyuh yang dibudidayakan di Indonesia memerlukan pengelolaan pakan yang efisien untuk meningkatkan kesehatan dan produktivitasnya. Proses pemberian pakan manual seringkali menyebabkan ketidakakuratan, mengurangi efisiensi, dan berdampak negatif pada kesehatan burung. Sistem ini memungkinkan peternak untuk mengontrol dan memantau pemberian pakan secara otomatis melalui aplikasi Blynk, menggunakan NodeMCU ESP8266 dan load cell untuk mengukur berat pakan dengan akurat. Hasil pengujian menunjukkan tingkat keberhasilan rata-rata sebesar 97.33%, dengan notifikasi real-time yang membantu peternak memantau status pakan. Dengan sistem otomatis ini, diharapkan efisiensi operasional meningkat, biaya berkurang, dan kesejahteraan hewan terjaga. Penelitian ini memberikan solusi inovatif dalam pengelolaan pakan, mendorong peternak untuk beradaptasi dengan teknologi. Namun, pengembangan lebih lanjut diperlukan untuk meningkatkan keandalan sistem, terutama dalam menghadapi potensi kendala jaringan, guna memastikan kinerja optimal di masa mendatang
Smart Temperature and Humidity Monitoring pada Data center Dinas Komunikasi dan Informatika Daerah Istimewa Yogyakarta berbasis Raspberry Pi 5 dan Notifikasi Discord Widiyatmoko, Ari; Suharjo, Imam
Jurnal Kridatama Sains dan Teknologi Vol 7 No 02 (2025): Jurnal Kridatama Sains dan Teknologi
Publisher : Universitas Ma'arif Nahdlatul Ulama Kebumen

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53863/kst.v7i02.1742

Abstract

A data center is a vital component of Information and Communication Technology (ICT) infrastructure that requires continuous physical environmental monitoring, particularly for temperature and humidity. These parameters significantly affect the stability and longevity of server equipment. Therefore, a monitoring system with high accuracy, reliability, and rapid response capability is essential. This study aims to design and develop an integrated temperature and humidity monitoring system using a Raspberry Pi 5 as the control unit, employing a DHT22 sensor to measure environmental conditions. The collected data is stored in a MariaDB database, visualized through a Grafana dashboard, and complemented with automated notification delivery via the Discord platform. The implementation and testing were conducted at the Data center managed by the Department of Communication and Informatics of the Special Region of Yogyakarta. The system supports real-time monitoring, alerts when environmental parameters exceed defined safety thresholds, and automated daily reports sent to a designated Discord channel. The research follows an engineering-based system development method, comprising stages of literature study, needs analysis, system design, implementation, testing, and evaluation. The testing results indicate that the system performs accurate sensor readings (within a tolerance range of ±0.4°C for temperature and ±1.4% for humidity) and successfully stores data periodically in the database. It also reliably sends automatic alerts to Discord when temperature or humidity levels exceed the specified thresholds (18–27°C and 30–60% RH) and delivers visual dashboard reports twice daily on a schedule. This monitoring system is expected to support the operational team of the Data center in managing environmental security more effectively and responsively
Sistem Pendukung Keputusan Berbasis SAW dengan Virtualisasi Dasboard Interaktif untuk Penilaian Kinerja Pegawai di PT. Lingkar Organik Indonesia Erdinus, Erdinus; Suharjo, Imam
Jurnal Riset dan Aplikasi Mahasiswa Informatika (JRAMI) Vol 6, No 04 (2025): Jurnal Riset dan Aplikasi Mahasiswa Informatika (JRAMI)
Publisher : Universitas Indraprasta PGRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30998/jrami.v6i04.14173

Abstract

PT. Lingkar Organik Indonesia merupakan perusahaan yang bergerak di bidang sosial dan bisnis ramah lingkungan dengan fokus pada pemberdayaan masyarakat. Proses penilaian kinerja pegawai masih menggunakan cara menual. Hal ini menimbulkan tantangan peneliti untuk merancang sistem pendukung perusahaan yang dapat membantu proses penilaian secara lebih sistematis dan terukur. Rancangan sistem ini menggunakan metode Simple Additive Weighting (SAW). Pemilihan metode ini berdasarkan penilaian terhadap bobot pada setiap kriteria yang telah ditentukan. Sistem ini menggunakan bahasa pemrograman PHP dan basis data MySQL yang mendukung pengelolaan data secara online dan efisien. Tujuannya agar perusahaan mampu lebih objektif, transparan dan memudahkan pengambilan keputusan oleh tim HRD maupun manajer.
Implementasi Traefik sebagai Reverse Proxy dengan Prinsip Zero Trust Nuryasa, Arnanda; Suharjo, Imam
Jutisi : Jurnal Ilmiah Teknik Informatika dan Sistem Informasi Vol 13, No 1: April 2024
Publisher : STMIK Banjarbaru

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35889/jutisi.v13i1.1704

Abstract

Technology and application development are experiencing massive development, without realizing it, cyber crime is also increasing rapidly. The increase in cyber attacks is a concern and makes concerns about important data owned. The impact can make applications or services lose and important data can be stolen and misused. With the application of Treafik as one of the reverse proxies, it aims to be a solution in an effort to increase application security by integrating it with the development of an IP whitelist system that has Zero Trust Security principles. The method used in the development contains several stages of research, namely, system analysis, system design, configuration, and test scenarios. The results of testing and research show that the IP whitelist system runs well according to the system design and the application of traefic can improve the application security system by denying unrecognized access to the IP whitelist system with a "forbidden" message.Keywords: Traefik; Reverse Proxy; Whitelist IP; Zero Trust Security AbstrakTeknologi dan pengembangan aplikasi mengalami perkembangan yang sangat masif, tanpa disadari ternyata kejahatan cyber juga meningkat pesat. Meningkatnya serangan cyber ini menjadi keresahan dan membuat kekhawatiran akan data penting yang dimiliki. Dampaknya dapat membuat aplikasi atau service menjadi loss dan data-data penting dapat dicuri dan disalahgunakan. Dengan penerapan Traefik sebagai salah satu reverse proxy bertujuan untuk dapat menjadi solusi dalam upaya meningkatkan keamanan aplikasi dengan di integrasikan pada pengembangan sistem whitelist IP yang berprinpip Zero Trust Security. Metode yang digunakan dalam pengembangan memuat beberapa tahapan penelitian yaitu, analisis sistem, perancangan sistem, konfigurasi, dan skenario pengujian. Hasil pengujian dan penelitian menunjukkan sistem whitelistIP berjalan dengan baik sesuai rancangan sistem dan penerapan traefik dapat meningkatkan sistem keamanan aplikasi dengan menolak akses masuk yang tidak dikenali pada sistem whitelist IP dengan pesan “forbidden”. 
Prototype Mentoring Pengembangan Karakter Mahasiswa Dengan Metode Profile Matching Mustakim, Mustakim; Suharjo, Imam
Jurnal Tika Vol 8 No 3 (2023): Jurnal Teknik Informatika Aceh
Publisher : Fakultas Ilmu Komputer Universitas Almuslim Bireuen - Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51179/tika.v8i3.2456

Abstract

Character is an important aspect that students must have to face challenges in the global era. However, each student has a different character, not all have the same potential due to different interests, desires, and abilities. Therefore, a program is needed that can help students develop their character according to their potential and interests. One program that can be used is mentoring, which is a guidance and development process carried out by Academic Supervising Lecturers to their students. Mentoring can improve academic quality, skills, and student character through intensive, personal, and ongoing interaction. This research focuses on the development of student character through mentoring carried out by Academic Supervising Lecturers to their students. This research was conducted by having students fill in data to carry out self-evaluation with parameters of 16 skills that must be mastered in the 21st century based on the World Economic Forum Report in 2015. Each skill chooses the lowest value of 1 and the highest of 7. The evaluation value can be known by the students themselves with the output of three skills with the highest potential and 3 lowest that need to be developed. The profile matching method is used to calculate the total value that will be used for ranking. This highest value can be seen by each academic supervising lecturer for their students. The result of this research is a Prototype that can help students develop their character according to their potential and interests. This prototype can also improve the quality of education in colleges by creating a harmonious, effective, and productive mentoring relationship.
BACKEND API DATA PROTECTION MENGGUNAKAN JWT TOKEN DAN ALGORITMA AES 256-BIT DENGAN BAHASA PEMROGRAMAN GOLANG Prasetya, Agustinus Bayu; Suharjo, Imam
Jurnal Informatika dan Teknik Elektro Terapan Vol. 13 No. 1 (2025)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v13i1.5699

Abstract

Data security is a critical concern in the development of web-based applications and backend APIs, particularly in protecting sensitive information from unauthorized access. This research aims to integrate Advanced Encryption Standard (AES) 256-bit for data encryption and JSON Web Token (JWT) for user authentication, developed using the Go programming language. The methodology employed is Research and Development (R&D), encompassing stages of requirement analysis, system design, implementation, and testing. The results show that combining AES 256-bit and JWT provides a dual-layer security mechanism, ensuring data integrity and confidentiality during storage and transmission. This solution proves effective for high-security applications such as e-commerce, healthcare, and online examinations. Additionally, the system offers seamless integration with third-party applications, promoting ease of adoption without compromising security. The study concludes that this integrated approach enhances data protection and facilitates secure API interactions across various platforms
PROTOTYPE PENDETEKSI KEBAKARAN MULTIRUANG MENGGUNAKAN NODE MCU ESP8266 DENGAN NOTIFIKASI BOT TELEGRAM Yudhistira, Octavian Erwin; Suharjo, Imam
Jurnal Informatika dan Teknik Elektro Terapan Vol. 13 No. 1 (2025)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v13i1.5992

Abstract

Abstrak. Penelitian ini menyajikan pengembangan sistem deteksi kebakaran multiruangan yang terintegrasi dengan bot Telegram untuk notifikasi yang efisien dan tepat waktu. Sistem ini memanfaatkan NodeMCU ESP8266 sebagai CPU, yang memungkinkan koneksi beberapa sensor api, gas, dan suhu, untuk memantau berbagai ruangan. Setelah mendeteksi api, kebocoran gas, atau suhu melebihi 35°C, sistem memicu peringatan yang dikirimkan ke BOT Telegram. BOT ini akan mengirimkan notifikasi ke pengguna, memberikan pembaruan secara real-time tentang insiden kebakaran. Integrasi BOT Telegram meningkatkan keandalan sistem dan pengalaman pengguna dengan memberikan peringatan tepat waktu kepada pengguna di mana pun lokasi pengguna. Hasil eksperimen memvalidasi kemampuan sistem untuk mendeteksi kejadian kebakaran secara akurat dan segera memberi tahu pengguna melalui BOT Telegram, yang berpotensi membantu dalam respons cepat dan meminimalkan kerusakan terkait kebakaran. 
Identifikasi Dan Analisis Terjadinya Peretasan Pada Domain Website dari Data Google Cache Suharjo, Imam; Wahyu Setyaningsih, Putry
TEKNOLOGI: Jurnal Ilmiah Sistem Informasi Vol 14 No 1 (2024): January
Publisher : Universitas Pesantren Tinggi Darul 'Ulum (Unipdu) Jombang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/teknologi.v14i1.4311

Abstract

Keamanan situs web seringkali dihadapi oleh pemiliknya, terutama terkait dengan praktek Black Hat SEO yang menggunakan peretasan untuk memanipulasi mesin pencari. Pengumpulan data dilakukan melalui pencarian Google dalam 24 jam terakhir, dengan proses scraping/crawling menggunakan apify.com. Dari hasil pencarian tersebut, diperoleh 7.604 konten (445 domain) dihack dalam 81 hari untuk domain go.id, dan 3.576 konten (252 domain) dihack dalam 43 hari untuk domain ac.id. Fokus penelitian terbatas pada domain dengan TLD ac.id dan go.id. Hasil analisis data mengungkapkan empat jenis peretasan utama. Pada domain go.id, kasus Reflected XSS in search mencapai 45%, Invisible backlink 8%, konten terhack 45%, dan subdomain 2%. Sedangkan pada domain ac.id, Reflected XSS in search mencapai 34%, Invisible backlink 38%, konten terhack 26%, dan subdomain 2%. Penelitian ini memberikan gambaran bahwa setiap hari terjadi peretasan di antara 5-6 institusi berbeda, baik di lembaga pendidikan maupun pemerintah.