cover
Contact Name
M. Miftach Fakhri
Contact Email
fakhri@diginus.id
Phone
+6282348761241
Journal Mail Official
fajarb@diginus.id
Editorial Address
Antang, Makassar, South Sulawesi, Indonesia
Location
Kota makassar,
Sulawesi selatan
INDONESIA
Journal of Progressive Information, Security, Computer and Embedded System
ISSN : 2986724X     EISSN : 29867258     DOI : https://doi.org/10.61255/pisces
Focus and Scope, PISCES scientific journal encompasses all aspects of the latest outstanding research and developments in the field of Computer science including: Artificial intelligence, Data science, Databases, Computer performance analysis, Computer security and cryptography, Computer networks, Parallel and distributed systems, Microcontroller, Internet of Things, Software engineering.
Articles 32 Documents
Pengembangan Sistem Informasi Support and Maintenance Berbasis Web pada Pengadilan Negeri Makassar Kelas IA Khusus M Syahid Nur Wahid; Harum, Kelvianto Pratama; Leo, Muhammad Alif; Nandasari, Putri; Andi Muh Achyar AM
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 1 Maret (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i1.20

Abstract

Makassar Class IA Special District Court is a first-level judicial institution located in Makassar City, South Sulawesi. This institution uses electronic devices and computers in its daily operations. However, the complaint system and electronic and computer processing still use the conventional method of manually recording and reporting complaints made. To overcome these problems, a "support and maintenance" information system was developed to make it easier for IT staff to manage incoming complaints to the IT department. The development of this information system uses the Waterfall model as its development method. The research method was carried out using several methods, namely observation and interviews to see and know directly the handling of complaints in the IT section of the Makassar District Court, as well as conducting a literature review of relevant readings related to research. The result of this research is a Web-based “Support and Maintenance” Information System.
Pembuatan Sistem Kebakaran Ruang Server Berbasis Web pada DISKOMINFO Kota Makassar Wahyu Hidayat M; Imam MJ, Khairul; Ahmad Safii, Jumadil; Alif Leo, Muhammad; Ahmad Faris Al Faruq
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 1 Maret (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i1.21

Abstract

Development of Web-Based Fire Alarm System in Server Room at Diskominfo Makassar City. Diskominfo Makassar City is an institution that carries out some of the regional government affairs of Makassar City in the  field of communication and informatics. Makassar City Diskominfo has a server room to handle services in the communications and informatics sector for sub-districts and villages in Makassar City. Making a web-based fire alarm is intended as a form of meeting server room security standards in terms of fire threats that can occur at any time and helping to supervise or monitor the server room. The working method or procedure for making this tool goes through the stages of analysis, design, implementation, and testing. The main components needed consist of a KY026 fire sensor, MQ2 sensor, ESP8266 microcontroller, and Laravel 7. This fire alarm tool utilizes Internet of Things (IoT) technology so that the tool can be connected to web applications. This tool detects indications of fire based on the flame wave indicator and carbon monoxide gas through the KY026 flame sensor and MQ2 sensor. Users of this tool will receive email notifications if there is a fire in the server room. It is easy for users to monitor server rooms by accessing web applications built using Laravel 7. This website is still local and can be accessed via a search engine with the address 192.168.43.244. This tool is expected to minimize damage and accelerate the handling of fire incidents in the server room. Testing of this tool was carried out on two components, namely the KY026 fire sensor and the MQ2 sensor. Based on the results of the tests that have been carried out, both components are able to detect fire indicators at certain distances. This is proven by the user receiving a fire notification when the component detects a wave of fire or carbon monoxide gas and the user can monitor the condition of the server room in real time.
Prototype Sistem Pembagian Beras Bansos Berbasis IoT Menggunakan E-KTP Edy, Marwan Ramdhany; Hairunnisa, Rini; Muhammad Fardan; Adistia, Ainun Zahra
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 1 Maret (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i1.22

Abstract

This study aims to design an IoT-based social assistance rice distribution system using e-KTP which can provide convenience in distributing rice to beneficiaries, practical and automatic social assistance only by bringing the e-KTP that has been registered without having to queue any longer. The results of the study show that the social assistance rice distribution system makes it easy for related village officials to distribute social assistance rice efficiently and effectively. The result of testing this system is that on each e-KTP there is a unique code that is different for each card which will be processed by the microcontroller and the data will be compared with the data registered in the database, with that if the user is registered the LCD will display a successful registered notification, but only Only e-KTPs that have been registered can collect this social assistance rice. Furthermore, there is a pin access on this tool as a second security which allows the recipient to be sick and can be represented by accessing it through the pin that has been inputted into the database.
Implementasi Kriptografi Vigenere Cipher untuk Keamanan Data Informasi Desa Irianti, Erva; Surianto, Dewi Fatmarani; Ainun Zahra Adistia; Muh. Juharman; Jumadil Ahmad Safi’i
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 1 Maret (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i1.24

Abstract

Data security on village information is a very important issue because it contains a lot of village information data. Important data cannot be denied that data can be edited or changed by unauthorized persons. So the data becomes insecure. Therefore, a technique is needed to secure data, namely using the classic Vigenere cipher cryptography technique, to maintain the security and confidentiality of messages or information so that it cannot be read by anyone, a desktop-based application is designed using the Java programming language which is carried out on the Netbeans IDE software to implementing the vigenere cipher algorithm as a technique for securing village information.
Analisis Jaringan LAN Menggunakan Teknologi EtherChannel untuk Meningkatkan Performa Jaringan pada SMK Kartika XX-I Makassar Baso, Fadhlirrahman; Hanifa A, Nurul; Putri Azzahra, Andi Shelma; Mukhtar, Nur Aisyah
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 1 Maret (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i1.25

Abstract

We often encounter network quality decreasing over time due to the increasing number of users using the same amount of bandwidth. The decrease in network quality is due to the increase in the number of network users, with this happening a solution is also provided using the concept of utilizing the technology found in EtherChannel. There are also two options for using this technology, namely the PagP (Port Aggregation Protocol) and LACP (Line Aggregation Control Protocol) protocols. By raising this problem, it aims to test the level of network quality using the PagP and LACP protocols. This test was carried out using the client-server concept, which uses an FTP server application as a container for data transfer or data exchange, while the VLC software application is used as a streaming service. The value generated by the PagP protocol is much better than LACP when compared to using FTP services.
PENGEMBANGAN WEB SEKOLAH TERINTEGRASI SISTEM INFORMASI AKADEMIK DI SMAN 10 SINJAI Nununk Febryanti; Jumadi M Parenreng; Firdaus
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 1 Maret (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i1.47

Abstract

This study aims to determine the results of the development and test results of an integrated school web academic information system at SMAN 10 Sinjai. This research uses a type of R&D research (research and development) using data collection techniques consisting of observation, interviews, questionnaires, and documentation techniques, and using a prototype development model consisting of stages of gathering needs, building prototypes, evaluating prototypes, coding systems, testing systems, evaluating systems, and using systems. The data analysis used is based on the ISO 25010 feasibility standard which consists of eight aspects. Based on the test results using ISO 25010 quality standards, the integrated school web academic information system at SMAN 10 Sinjai has met the standards where: a) functional suitability with a value of 94% (accepted), b) performance efficiency carried out using the GTMetriks application obtained a load result of 1.1 seconds (meets the standard), c) compatibility is tested on 5 devices obtained a successful value from all devices, d) usability conducted on 35 respondents by asking 30 questions obtained a value of 73% (feasible), e) reliability test success of 100% (meets), f) security at the medium level, g) maintainability is easy to maintain, and h) portability is tested on 6 browsers obtained no errors on the appearance and function of all browsers. The integrated school web academic information system at SMAN 10 Sinjai can be used in managing data related to school activities and school academic activities. Teachers can easily manage students' academic, and students can easily access grades and other academic activities.
Implementasi Model Prototyping dan Framework Laravel dalam pengembangan Sistem Informasi Kesekretariatan Sofyan, Muh Azikin; Aminuddin Bakry; Jumadi M Parenreng
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 1 Maret (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i1.53

Abstract

This study aims to determine the results of web-based JTIK FT UNM secretarial information system development and to test the quality of the system using the ISO 25010 standard. This research is research and development or Research and Development (R&D). This study uses the prototyping development model which is a development method of the system development life cycles (SDLC). Data was collected using interviews, observation, documentation and questionnaires. The results obtained in the form of web-based JTIK FT UNM secretarial information system development results with the results of testing using the ISO 25010 standard on functionality suitability characteristics are worth 1 (very good), on reliability characteristics obtained a reliability level of 100% (Fulfilling), on performance efficiency characteristics obtained a performance value of 97.4% (Grade A) Structure of 88.2% (Grade A) and Fully load time of 1.36 (acceptable), on Usability characteristics obtained a feasibility percentage of 93.2% (very feasible), on Security characteristics found no viruses and malware on the information system, on the compatibility characteristics it is worth 1 (very good), on the portability characteristics it is 1 (very good), and maintainability meets the standard 3 aspects of assessment. Based on the results of this study, it can be concluded that the JTIK FT UNM secretarial information system that has been created can function properly and is feasible to use.
Protokol Keamanan pada Wireless Sensor Network (WSN) Menggunakan Firewall Iptables dan Enkripsi Base64 Wahid, Abdul; Zain, Satria Gunawan; Parenreng, Jumadi Mabe; Juliady, Ilham
Progressive Information, Security, Computer, and Embedded System Vol. 2, No. 1 Maret (2024)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v2i1.91

Abstract

Currently, the era of technology is getting faster and more modern, such as the Internet of Things (IoT) system, most of which have been implemented in everyday life to facilitate every human activity. Such as the application of Wireless Sensor Network (WSN). Every public network service implementation has loopholes. This is very detrimental to companies that implement Wireless Sensor Network (WSN) system technology. If the server is hacked, the system data will be known by the hacker. For this reason, we need a way so that server security and data transfer processes are guaranteed. The method used is implementing an iptables firewall and encrypting data using Base64 encryption, where if this method is implemented then the server and any data sent in 2-way communication will be guaranteed safe from data reading and server hacking. So this method can be used to improve data security and server security.
Improvement of Document Security Against Aes-192 Algorithm Based Trojan Attacks (Advanced Encryption Standard): Peningkatan Keamanan Dokumen Terhadap Serangan Trojan Berbasis Algoritma Aes-192 (Advanced Encryption Standard) Sunarti, Irmayana
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 2 September (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i2.96

Abstract

Document security is the protection of information contained in documents from threats and risks that may arise, both from physical attacks and cyber attacks, one of which is a trojan attack. An algorithm is a solution or method of document security that is appropriate for maintaining the confidentiality and authenticity of documents, and can improve the security aspects of a document or information. The algorithm used in enhancing document security to encrypt and decrypt documents is the AES-192bit algorithm (Advanced Encryption Standard). The method used is the waterfall method which consists of literature studies, system analysis, system design, implementation and testing. The resulting application is an AES encryption and decryption application using the web-based AES-192 algorithm method. This application is intended to secure documents in the following formats: .docx, .xls, .xlsx, .pdf and .text. The results of the study can be concluded that increasing data security using the AES-192 algorithm is successful. The encryption process is carried out to produce data that is not easy to read and not easily hacked by others unless they have the key to decrypt the data. The key used to encrypt and decrypt is the same. If the key used is the same then the data can be used, but if it is different then the result will not be read.
data security Enhancement of Private Message Security Using Classic Cryptography Based on Cipher Substitution Algorithms: Peningkatan Pengamanan Pesan Pribadi Menggunakan Kriptografi Klasik Berbasis Algoritma Subtitusi Chiper Idrus, Hildayanti
Progressive Information, Security, Computer, and Embedded System Vol. 1, No. 2 September (2023)
Publisher : Sakura Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61255/pisces.v1i2.97

Abstract

In this growing digital age, message or information security is important because more and more information or messages are vulnerable to being accessed or read by unauthorized persons. To protect the privacy and confidentiality of personal information, an effective and reliable message security system is needed. One effective way is to use cryptographic algorithms such as the cipher substitution algorithm that has been used to secure data. Implementation of a message or information security system using a cipher substitution algorithm can be an effective and reliable solution for securing private messages from attacks and unauthorized access and maintaining the privacy and confidentiality of personal information. This study uses the method of Literature Study, System Analysis, Implementation, and Testing to analyze and implement a visual basic based cipher substitution algorithm. The result of this research is an application based on Microsoft Visual Basic that can encrypt and decrypt messages/texts. The cipher substitution algorithm shows that the encryption and decryption process can maintain the security of the message that has been tested so that message security is guaranteed and confidentiality is maintained.

Page 1 of 4 | Total Record : 32