cover
Contact Name
Budi Hermawan
Contact Email
-
Phone
+62081703408296
Journal Mail Official
info@kdi.or.id
Editorial Address
Jl. Flamboyan 2 Blok B3 No. 26 Griya Sangiang Mas - Tangerang 15132
Location
Kab. tangerang,
Banten
INDONESIA
bit-Tech
ISSN : 2622271X     EISSN : 26222728     DOI : https://doi.org/10.32877/bt
Core Subject : Science,
The bit-Tech journal was developed with the aim of accommodating the scientific work of Lecturers and Students, both the results of scientific papers and research in the form of literature study results. It is hoped that this journal will increase the knowledge and exchange of scientific information, especially scientific papers and research that will be useful as a reference for the progress of the State together.
Articles 6 Documents
Search results for , issue "Vol. 5 No. 3 (2023): bit-Tech" : 6 Documents clear
APLIKASI BUSINESS INTELLIGENCE PENAMPIL DATA OMSET PENJUALAN USAHA MIKRO KECIL MENENGAH MENGGUNAKAN ONLINE ANALYTICAL PROCESSING DENGAN METODE GROWTH RATIO BERBASIS WEB William Thomas; Rino
bit-Tech Vol. 5 No. 3 (2023): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i3.558

Abstract

Micro, small and medium enterprises are businesses that are generally individually and are small business entities such as selling dumplings, fried bananas, even internet cafes and so on. This study aims to create a business intelligence application that displays sales turnover data for micro, small and medium enterprises using online analytical processing with a web-based growth ratio method that aims to help micro, small and medium enterprises by making application prototypes that can display data from sales results in various easy graphs. viewed and using the growth ratio formula method where the formula calculates the profit as a percentage and can be compared with the previous data. This application program is made for the public with the hope that micro, small and medium enterprises experience significant progress in profiting from their sales turnover Human-created applications were created to facilitate human needs and work ranging from lifestyle, health, security, entertainment, and others. In addition, we often also find several applications that have similarities with each other in various functions, appearance, and so on so that it spurs developers to have to work hard to develop these applications to attract the attention of website users by offering unique advantages and features that can be a differentiator from similar applications. The need for clear and precise information today is needed in everyday life in order to avoid false information or hoaxes. In addition, precise and accurate information can also be an important element that can influence developments in various aspects such as sales business, education, entertainment and so on at this time and in the future.
Topik yang saya akan bahas kali ini adalah tentang pelayanan BPJS Kesehatan melalui aplikasi Mobile JKN, khususnya dalam pemberian informasi dan pelayanan. Mobile JKN merupakan suatu inovasi terbaru pelayanan jaminan Kesehatan nasional yang berbasis elekt Gilbert Parera; Muhammad Darwis
bit-Tech Vol. 5 No. 3 (2023): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i3.691

Abstract

Mobile JKN is a new Government application to register and manage the health protection membership. The problem that often occurs is that many participants do not really understand the application and their use. Therefore, JKN mobile application needs to be adjusted and developed so that the usefulness and benefits can be felt by the participants and the wider community. The method used is the System Usability Scale (SUS), a questionnaire that can be used to measure the usability of a computer system according to the user's subjective point of view. In performing SUS calculations using 5-point Likert scale. The first SUS score was obtained from testing the JKN Mobile Application by distributing SUS questionnaires to 23 respondents.  The second test was carried out by involving 3 professionals and experts in the science of design and IT. The treatment of the SUS questionnaire in the second test was by adding points of recommendation for improvement to the Mobile JKN application in accordance with the first results in each statement of the second test questionnaire. And the results of the SUS score in this second test experienced a significant increase from 59 to 81, this shows that the recommendations for improvements to the Mobile JKN application need to be improved or need to be developed a lot. The Mobile JKN application needs to be developed a lot in terms of updating and providing information about this application because there are still many and do not understand about the Mobile JKN application.
Perancangan Web Sistem Informasi Tes Kemampuan Bahasa Inggris Kelas Menggunakan Metode Fisher Yates Shuffle Andri Wijaya; Frendy Dodo Chang
bit-Tech Vol. 5 No. 3 (2023): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i3.724

Abstract

Information technology has been rapidly developing over the past few decades, and the COVID-19 pandemic has further accelerated the adoption and implementation of technology in various aspects of our lives, particularly in the business sector and education., where improvements in the learning system that were originally offline become online, practical, and easy. Currently, information regarding the English Test at Faculty of Social Sains and Humanities Buddhi Dharma University (UBD) is still running manually starting from registration, scheduling, exam, and announcement of English test results which of course requires more time for both participants and faculty staff. In order to boost students English knowledge, an English comprehension exam test is needed as organized by the faculty, that is English Proficiency Test (EPT). The design of this EPT information system, a part of being able to change the manual method, and also to simplified the EPT procedure. The new system is using website which combined with Fisher-Yates Shuffle method for randomization the exam test to reduce fraudulent actions in the process of conducting English training tests, being followed by 94 respondents as English training participants, system tested using the User Acceptance Test (UAT) method with five aspects of quality components. The results obtained that the system built had a good criteria with a value of 75.93%.
Network Security Analysis with SnortIDS Using ACID (Analysis Console for Intrusion Databases Ruruh Wuryani; Indah Fenriana; Dicky Surya Dwi Putra; Desiyanna Lasut; Susanto Hariyanto
bit-Tech Vol. 5 No. 3 (2023): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i3.728

Abstract

The use of Wi-Fi and Ethernet is increasing in today's computer networks due to the advancement of technology. The development of networks today is characterized by the need for low-latency and high-bandwidth technology. The technology has also introduced 5G and Wi-Fi 6 which support high-speed internet surfing. The introduction of Network File System (NFS) in this era sparked the demand for Ethernet. NFS also increased the use of UNIX in education and professional computing in the 1980s. Then, in 1982, Token Ring Topology emerged as an alternative to the internet and was only standardized in 1985. Network security is an important factor in ensuring data is not stolen or damaged. With the increasing knowledge of hacking and cracking, and the availability of tools that can be easily used to launch attacks or intrusions, it is important to investigate when an attack occurs. One network forensic method for monitoring attacks on the network is using Snort IDS and Ntop to facilitate the logging process for monitoring the network system. Based on the results obtained from designing a network security with Snort Intrusion Detection System (IDS) using ACID (Analysis Console for Intrusion Databases) with the utilization of IPTables on Ubuntu Server can stop attackers. In this research, the researcher used IPTables on Ubuntu as a firewall to anticipate attacks. To prevent port scanning attacks conducted by the attacker, the author created a firewall using IPTables where the IPTables rules aim to block the IP address of the attacker.
Boarding House Provider Information with Multi Attribute Utility Theory (MAUT) Method Suwitno Suwitno; Niki Djanuar Chandra; Benny Daniawan
bit-Tech Vol. 5 No. 3 (2023): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i3.729

Abstract

The increasing rate of population growth in urban areas to find work or study and the high Basic Credit Interest Rates for Home Ownership Loans, the choice of renting a boarding house can be an alternative for those who do not want to stay in the long term. Implementation of Decision Support System provide choices for information system in order to assist the community in choosing a place to live such as a boarding house. One method of Decision Support System is Multi Attribute Utility Theory (MAUT). MAUT can be interpreted as method of systematic comparison by finding the total weight of a set of values in the criteria to obtain results. MAUT method on a web-based information system, it can help people determine the choice of the desired boarding house. The results from the MAUT method will be used an objective consideration for users. The results of this study were tested by Technology Acceptance Model to measure the acceptance of systems. The calculation of TAM uses questionnaire distributed to 88 respondents and based on t-statistics on the TAM test, Perceived Ease of Use (PEOU) against Attitude Toward Using (ATU) is 2.660, Perceived Usefulness (PU) against ATU is 4.218. Then Behavior Intention to Use (BITU) for Actual System Use (ASU) is 16,122 and PU for BITU is 4,218. Where the indicator to have a positive influence when the value is above 1.9894. Meanwhile, ATU against BITU is only 1.179 which means that it does not have a positive influence.
Asset and Inventory Data Monitoring Application Design PT. Transmarco Didi Kurnaedi; Erna Oktora; Irfan Nasrullah; Agung Prayoga; FX Agung Pramanto
bit-Tech Vol. 5 No. 3 (2023): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i3.731

Abstract

The use of IT asset and inventory management information systems can greatly benefit businesses in managing their IT assets. The objective of this study is to develop an information system application that simplifies the management of IT assets by monitoring inventory data, tracking requests for repair, borrowing, purchase, and inventory recording of IT assets. The study was conducted at PT. Transmarco and the development of the information system application involved layout design, diagram design (including an activity diagram), and database design processes. Modular programming languages such as PHP, Sublime Text, MySQL, and CSS were used in the development process. The IT Asset and Inventory Data Monitoring Application provides information on incoming goods data, outgoing goods data, stock goods, and usage history. By implementing this application, it is expected that managing asset data and IT inventory at PT. Transmarco will become much simpler, including managing item data, item history, and stock of goods. This system will enable firm personnel to efficiently manage IT assets according to the desired outcomes. Overall, the development of the IT asset and inventory data monitoring application at PT. Transmarco showcases the potential benefits of IT asset and inventory management information systems for businesses. The streamlining of IT asset management processes can result in improved efficiency, reduced costs, and better decision-making regarding IT asset investments.

Page 1 of 1 | Total Record : 6