Claim Missing Document
Check
Articles

Found 9 Documents
Search

Pengembangan Media Pembelajaran Berbasis Augmented Reality Hedis Wahda Habibti; Bayu Wibisana; Hendri Purnomo
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 1 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i1.2

Abstract

Proses pembelajaran yang baik haruslah memuat aspek interaktif, menyenangkan, menantang, memotivasi dan memberikan ruang yang lebih bagi siswa untuk dapat mengembangkan kreativitas dan kemandirian, sesuai dengan bakat dan minat siswa. Media pembelajaran yang menarik juga sangat diperlukan bagi siswa SMK, dikarenakan dalam pembelajaran SMK lebih mengutamakan praktikum dari pada teori. Perlu dipertimbangkan dalam pemilihan media yaitu tujuan pembelajaran, efektif, mudah diperoleh, peserta didik, penggunaan, tidak kaku, biaya, dan kualitas. Salah satu perkembangan media pembelajaran yang saat ini masih baru adalah media pembelajaran dengan menggunakan Augmented Reality. Augmented Reality merupakan aplikasi penggabungan dunia nyata dengan dunia maya dalam bentuk dua dimensi maupun tiga dimensi yang diproyeksikan dalam sebuah lingkungan nyata dalam waktu yang bersamaan. Augmented Reality dapat digunakan dalam hiburan, kedokteran, mekanik, dan media pembelajaran. Augmented Reality dapat dibangun dengan menggunakan bantuan software Vuforia dan Unity 3D. Hasil akhir berupa media pembelajaran interaktif dengan Augmented Reality
Efektifitas Penggunaan Media Sosial Dalam Pemasaran Klinik Unizar Rifqi Sulthon Abqari; Yusuf Hendra Pratama; Bayu Wibisana
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 1 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i1.4

Abstract

Tujuan tinjauan literatur ini adalah untuk mengidentifikasi efektifitas penerapan digital marketing di pelayanan kesehatan. Metode: Metode penulisan tinjauan literatur ini berdasarkan Mandeley. Pencarian literatur menggunakan kata kunci sesuai dengan judul Efisiensi, Sosial Media, Klinik. Artikel dipilih berdasarkan kriteria inklusi yang terdiri dari penelitian dan clinical review, berbahasa Inggris-Indonesia, dan full text. Artikel yang tidak lengkap di ekslusi dari tinjauan ini. Dari hasil penelusuran literatur ditemukan 4 artikel yang dapat dilanjutkan ke tahap peninjauan. Hasil dari tinjauan literatur ditemukan bahwa digital marketing memiliki peran dalam meningkatkan ikatan dengan calon konsumen yang berarti sebagai upaya promosi rumah sakit atau pelayanan Kesehatan. Rumah sakit mendapatkan peningkatan dalam jumlah pasien, sehingga dapat disimpulkan digital marketing efektif digunakan sebagai media untuk promosi di pelayanan Kesehatan
Arsitektur Dan Organisasi Komputer Veni Virda Hariati; Hendri Purnomo; Bayu Wibisana
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 1 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i1.5

Abstract

Artikel ini membahas tentang konsep dasar arsitektur dan organisasi komputer, jenis-jenis arsitektur komputer yang umum digunakan, serta pentingnya pengetahuan tentang arsitektur dan organisasi komputer dalam pengembangan sistem komputer. Konsep dasar meliputi struktur fisik sistem komputer dan cara sumber daya sistem digunakan untuk menyelesaikan tugas tertentu. Jenis-jenis arsitektur komputer yang dibahas meliputi arsitektur Von Neumann, arsitektur Harvard, arsitektur RISC, dan arsitektur CISC. Arsitektur RISC dan CISC adalah dua pendekatan yang berbeda dalam merancang instruksi dan set instruksi dalam arsitektur komputer. Arsitektur RISC juga cenderung menggunakan register-register yang lebih banyak, sehingga mengurangi ketergantungan pada akses ke memori utama.Di sisi lain, arsitektur CISC menggunakan set instruksi yang lebih kompleks dan beragam. Instruksi-instruksi dalam arsitektur CISC dapat melakukan tugas yang lebih kompleks dalam satu instruksi, seperti operasi aritmatika yang kompleks atau akses langsung ke memori. Set instruksi CISC biasanya lebih besar dan beragam, termasuk instruksi-instruksi yang jarang digunakan. Meskipun instruksi-instruksi dalam arsitektur CISC dapat lebih kompleks, eksekusi instruksi biasanya membutuhkan lebih banyak siklus dan waktu.Kelebihan arsitektur RISC termasuk eksekusi instruksi yang lebih cepat dan efisien, konsistensi dalam ukuran dan format instruksi, serta ketergantungan yang lebih rendah pada memori utama. Arsitektur RISC juga cenderung lebih mudah diimplementasikan dalam perangkat keras dan memungkinkan pipelining yang efisien. Namun, kelemahan arsitektur RISC adalah jumlah instruksi yang terbatas, yang mungkin memerlukan lebih banyak instruksi untuk melakukan tugas yang kompleks.Sementara itu, kelebihan arsitektur CISC termasuk kemampuan untuk melakukan tugas yang kompleks dalam satu instruksi, dukungan untuk instruksi-instruksi yang jarang digunakan, dan ukuran kode yang lebih kecil. Arsitektur CISC juga dapat mengurangi jumlah instruksi yang diperlukan untuk melakukan tugas yang kompleks. Namun, kelemahan arsitekturCISC adalah kompleksitas eksekusi instruksi yang dapat mempengaruhi kinerja, serta ketergantungan yang lebih besar pada memori utama.Dalam praktiknya, kedua arsitektur ini memiliki aplikasi yang berbeda dalam sistem komputer modern. Arsitektur RISC cenderung digunakan dalam perangkat berperforma tinggi yang membutuhkan eksekusi instruksi yang cepat, seperti dalam superkomputer, server, atau mikrokontroler. 
Pemanfaatan Digital Marketing Bagi Universitas Islam Al-Azhar (Unizar) Danang Priyo Jatmiko; Hendri Purnomo; Bayu Wibisana
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 1 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i1.6

Abstract

Digitalization an important role as a marketing media and transmission of academic/non-academic information. Therefore, analysis related to optimizing the use of digital marketing for Unizar. The hope, using digital marketing to expand the range of Unizar promotions to remote areas. Al-Azhar Islamic University (UNIZAR) is one of the oldest and well-known campus on Lombok Island, starting to develop digital systems in various aspects that support campus activities. UNIZAR realizes that digital marketing can reach all people wherever they are without any geographical or time boundaries. The digital system that UNIZAR has begun to use includes in the academic field using the Academic System called SIAKAD UNIZAR, as well as in utilizing social media as a means of massive promotion and publication. Even though Unizar has used digitization, its utilization is considered not optimal. This is of particular concern, because digitization plays an important role as a marketing medium or delivery of academic and non-academic information. Therefore, it is necessary to carry out an analysis related to optimizing the use of digital marketing for Unizar.. Digital marketing to promote Unizar using social media such as Facebook, Instagram and YouTube. The use of Instagram, and Youtube are social media with the most users, so it's more efficient to promote Unizar. And now time to change to use digital marketing in order to increase the number of prospective new students Unizar
Data Security Analysis Using Virtual Ridgeback in Network Forensics Firmansyah Firmansyah; Yusuf Hendra Pratama; Bayu Wibisana
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i2.8

Abstract

Recorded two hospitals in Jakarta were hit by cyberattacks which caused patient data in hospital computer networks to be inaccessible. Symantec is an American company that manufactures data security software, according to Symantec's report entitled Internet Security Threat Report Volume 24 which was released in February 2019 then, in 2018, as much as 2.23%, cyberattacks in the global arena occur in Indonesia, increasing from the previous year, namely 1.67%. Meanwhile, the figure also places Indonesia in fifth place as the country that has the most cyber threats in 2018. It can operate on physical networks or on virtual networks. The only requirement is that the Ridgeback installation has access to the layer 2 network layer. Ridgeback Network Defence makes resistance to intruders using interactive defences and causes intruders to spend unnecessary resources. Interactive Defence is an advanced disguise and fraud capability designed to ensnare intruders in several ways, namely by managing billions of feeds in the network that can trigger intruder responses, affect intruder behavior so that they are easier to detect, and block access to protected network services without revealing that service has been blocked. This research is expected to create a control center by adopting a Software Defined Network (SDN) so that it can capture intruders and get data about the attack, which can be used as evidence in the process of investigating network forensics quickly and precisely.
Implementation of Live Forensic Virtual Router for Network Traffic Comparison Firmansyah Firmansyah; Bayu Wibisana; Hendri Purnomo
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i2.9

Abstract

An entrepreneur or a service provider in the internet network world, will certainly find clients with different characters. Clients who are not technology blind, especially routers, sometimes want full access to the router, or some clients who ask to add a router to be able to directly access the router in full. Virtual Router allows clients to process their own network, as if the client has a router. Network forensics has the ability to reconstruct events using a system that stores all data traffic activities on the network, so that investigations can be carried out by looking back at events that have occurred and analyzing events that occurred in the past. Wireshark can review data packages in real time. This means that the wireshark application will monitor all incoming and outgoing data packets through a predefined interface and the next will display the results of the data package
Building Virtual Local Area Network (VLAN) for Self-Attendance Using Manageable Switch at Institut Sains & Teknologi Akprind Yogyakarta Firmansyah Firmansyah; Bayu Wibisana; Hendri Purnomo; Yusuf Hendra Pratama
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v1i2.31

Abstract

Building a manageable network to support the implementation of Virtual Local Area Network (VLAN) in independent attendance for students and lecturers, which can avoid individuals entrusting attendance, is part of today's technological developments, so that it is hoped to produce an individual who is independent, intelligent and supported. with a high level of technological mastery. The AKPRIND Yogyakarta Institute of Science & Technology has implemented this technology on the main server, but the VLAN implementation is specifically designed for Presence Mandiri in the west and east buildings on campus 1. Each building is designed to have 2 broadcast domains and use 2 switches to be able to produce communications. data between buildings that have the same broadcast domain. The switch on the Presence Mandiri VLAN network at the AKPRIND Yogyakarta Institute of Science & Technology has 2 VLAN IDs with the configuration used being VLAN Trunking (VTP). The IP addressing provided is DHCP from each switch, which can divide the network on each available port. This VLAN configuration is all done using a network simulation tool, namely Cisco Packet Tracert 6.1.0 in ICMP testing, with the protocol used is Internet Protocol version 4 or IPv4
The Role of Blockchain in Digital Content Copyright Alfin Kurniawan; Elya Elya; Bayu Wibisana
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 3 No. 01 (2025): The Role of Digital Technology in Enhancing Education, Security, and Business
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v3i1.24

Abstract

The rapid advancement of digital technology has significantly transformed content distribution and consumption patterns while simultaneously increasing the vulnerability to digital copyright infringement. This article explores the application of blockchain technology as a strategic solution for protecting digital content copyright, particularly in the Indonesian context. Utilizing a literature review method, the study investigates key blockchain features transparency, decentralization, immutability, and smart contract automation that enhance the integrity and security of intellectual property rights management. Blockchain enables the permanent and tamper-proof recording of content ownership and creation timestamps, while also facilitating automated royalty distribution without third-party intervention. These capabilities make blockchain an efficient mechanism for copyright verification and real-time rights tracking. However, blockchain adoption in Indonesia still faces significant challenges, including limited digital literacy among creative industry actors, inadequate technological infrastructure, and the absence of clear legal frameworks supporting its implementation in the field of intellectual property rights. The study also highlights initial initiatives across various sectors, such as education, music, and digital art, where blockchain has been employed to secure content through NFTs and decentralized copyright registration platforms. Findings emphasize the need for multi-sector collaboration, the establishment of supportive regulations, and technological education to ensure the successful implementation of blockchain-based copyright systems. Overall, blockchain has the potential to serve as a transformative pillar in developing a fairer, more transparent, and sustainable copyright protection ecosystem in the digital era.
Development of a Mobile Application to Improve Digital Literacy Skills Muh. Aldinova Setiawan; Bayu Wibisana; Hendri Purnomo
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 3 No. 2 (2025): Digital Transformation and Its Impact on Behavior, Literacy, and Information Se
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v3i2.54

Abstract

The rapid advancement of digital technologies in recent years has created an urgent need to improve digital literacy skills, especially among students and young adults who are active users of mobile devices and online platforms. This study aims to develop a mobile application designed to improve users’ digital literacy skills, with a particular focus on accessing, evaluating, and using digital information responsibly. The study followed a Research and Development (R&D) approach using the ADDIE (Analysis, Design, Development, Implementation, Evaluation) model to systematically guide the creation and testing of the application. The mobile application includes interactive learning materials, quizzes, and simulations covering core aspects of digital literacy such as information seeking strategies, critical evaluation of online sources, digital security practices, and ethical behavior in digital environments. Initial testing with a sample group of students showed significant improvements in digital literacy competencies, as evidenced by an increase in post-test scores compared to pre-test results. User feedback also highlighted the application’s ease of use, engaging interface, and relevance to real-world digital challenges. The study concludes that the mobile application can serve as an effective educational tool in promoting digital literacy, offering flexible and accessible learning opportunities that align with the digital habits of modern learners.