cover
Contact Name
Rahmadya Trias Handayanto
Contact Email
rahmadya.trias@gmail.com
Phone
-
Journal Mail Official
piksel.unisma@gmail.com
Editorial Address
rogram Studi Teknik Komputer Fakultas Teknik Universitas Islam 45 Jl. Cut Meutia No. 83 Bekasi 17113
Location
Kota bekasi,
Jawa barat
INDONESIA
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic
ISSN : 23033304     EISSN : 26203553     DOI : https://doi.org/10.33558/piksel
Core Subject : Science,
Jurnal PIKSEL diterbitkan oleh Universitas Islam 45 Bekasi untuk mewadahi hasil penelitian di bidang komputer dan informatika. Jurnal ini pertama kali diterbitkan pada tahun 2013 dengan masa terbit 2 kali dalam setahun yaitu pada bulan Januari dan September. Mulai tahun 2014, Jurnal PIKSEL mengalami perubahan masa terbit yaitu setiap bulan Maret dan September namun tetap open access tanpa biaya publikasi. p-ISSN: 2303-3304, e-ISSN: 2620-3553. Available Online Since 2018.
Articles 304 Documents
Web-Based Document Workflow Management Information System Emny Harna Yossy; Yohan Aris Darmawan
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Vol 11 No 2 (2023): September 2023
Publisher : LPPM Universitas Islam 45 Bekasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33558/piksel.v11i2.7226

Abstract

In business process and document approval characteristics, approval workflow is a process for automatically flowing business between approval providers with predetermined rules. When viewed from the process of requesting goods still uses e-mail. With the increasing number of documents that must be approved and still using e-mail communication media, obstacles were found that caused delays in the document approval process. In this study, the authors aim to create a computerized workflow document, which will be implemented in the procedure for purchasing requests for goods and requests for promotional items from branches and assisting document recipients in sorting out documents that have not/have been approved which are expected to provide benefits to users in carrying out the process. Document approval. The information system the author has developed can only be run for internal users who already have login access to the system and can only be accessed using the internal network. The development process uses the waterfall method, and data collection methods in this study include observation, interviews, and literature study. System testing is carried out using blackbox testing evaluation and interface design evaluation using the eight golden rules. From the implementation and evaluation results, it was concluded that the system had achieved the desired results, namely, the branch admin page for sending information on approval documents and the approval party page for responding to documents.
Enhancing Permit Status Checking for the Integrated Public Service Information and Reporting System Application Dwi Listriana Kusumastuti; Farhan Mubarak; Rehan Choirul Rohily; Sahtia Murti; Yulius Denny Prabowo; Emny Harna Yossy
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Vol 11 No 2 (2023): September 2023
Publisher : LPPM Universitas Islam 45 Bekasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33558/piksel.v11i2.7227

Abstract

The district government of Sanggau already has a public service mall (MPP), which is used by all agencies as a place of service. SIPADU (Integrated Public Service Information and Reporting System) is the name of this application, which has various features to meet the needs of MPPs (Public Service Mall). Currently, users of the SIPADU application find it difficult to check the status of permissions. Users must first complete the authentication procedure in order to obtain the desired permission status. This research was conducted to implement a solution to make it easier for users to check the status of the submitted licensing by building a web-based system that will search for the data without requiring login authentication. The analytical methods used include Literature Study and Interview. The design method used is the waterfall method with 6 stages of the process, namely Planning, Analysis, Design, Implementation, Testing, and Verification. The result of this system is a website that can check the status of the permit being submitted. The results of the User Interface evaluation are following the provisions of the Eight Golden Rules method and the results of the evaluation of system testing using the BlackBox testing method with the results showing 100% no errors occur so that it is very suitable for use by users. This study applies the Web Scraping method using PHP scripts and using the Apache Web Server to obtain all licensing data using authentication data provided by PT Media Visual Group so that all users of the SIPADU application can track licensing.
Container Infrastructure on Laravel to Improve Online Shop Sucianna Ghadati Rabiha; Achmad Fadhitya Muharram; Fahmi Anwar Kusuma; Hendrawan Sulistya; Eduard Pangestu Wonohardjo; Emny Harna Yossy
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Vol 11 No 2 (2023): September 2023
Publisher : LPPM Universitas Islam 45 Bekasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33558/piksel.v11i2.7229

Abstract

A laundry business is a business that operates laundry services or similar and is often used by the general public. The development of this business is quite fast, as many consider renting laundry to be more convenient. This rapid increase is inversely proportional to the evolution of companies in using technology as a means of digitizing their businesses. The digitization process can make it easier for business owners to manage, monitor, promote, and receive business reviews. One attempt to overcome this is to develop a web-based laundry management and publishing application using the Laravel framework and container infrastructure, with the aim of making business management and advertising easier for laundry entrepreneurs and customers to choose from to facilitate washing area. This study uses data collection techniques in the form of literature reviews, questionnaires and uses technologies to facilitate the development process such as the Laravel framework, MySQL, Google Maps API, and container and waterfall infrastructure as application development methods. The test technique used is black box. The result of the research is a web-based laundry application that conforms to the eight golden rules, has been tested by laundry owners and customers, and can achieve the research goals.
Enhancing Usability of the Academic Information System at Bhayangkara University: A Design Thinking and System Usability Approach Rakhmi Khalida; R Wisnu Prio Pamungkas
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Vol 11 No 2 (2023): September 2023
Publisher : LPPM Universitas Islam 45 Bekasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33558/piksel.v11i2.7239

Abstract

Bhayangkara University implements an information system to assist its academic process, namely SIA (Academic Information System). The high level of usability in SIA affects the smooth running of the academic process. This research uses a combination of design thinking and system usability scale methods as an approach to increase usability in AIS applications. The results show that the SIA application has a high usability value with a B rating scale and the good acceptable category is pleasant for users. Recommendations for improvements based on the method used are increasing server capacity so that SIA can work more relevantly, and effectively, and can use last a long time
Security System Exploitation on Domains and Subdomains of UIN Syarif Hidayatullah Jakarta Thoyyibah T; Wasis Haryono; Tomi Hardi
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Vol 11 No 2 (2023): September 2023
Publisher : LPPM Universitas Islam 45 Bekasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33558/piksel.v11i2.7263

Abstract

A computer is a machine that can be used to process any information. In the computer world, crime often occurs. Thus security is needed, for computer systems to avoid various attacks. In the world of computers, especially on the Internet, virus attacks often occur, such as worms, trojans, software piracy and credit card theft problems. Despite the many offers of computer sophistication in processing information, there are still weaknesses that can be exploited by irresponsible parties. This can be detrimental to the rightful owner of the information. So that it can cause small-scale to large-scale damage. Therefore, it is very important for us to know about security exploits so that we can prevent such exploitation and avoid abuse from certain parties. although no system is completely secure. at least we have minimized the possibility by knowing security exploits. Forms of security exploitation generally use various techniques, therefore a security system is needed that is able to overcome these forms of exploitation. This study discusses how to exploit a system and its techniques with the object used is a security system in the domain and subdomain of UIN Syarif Hidayatullah Jakarta. It is hoped that with this research the reader can know and understand the exploitation techniques used so that they can prevent or treat when this exploitation technique is used. The research method used consists of several paths, namely foot printing, scanning, DOOS, Acess, Filtering, finally Covering tracks and creating a backdoor. The research output is the display of the University's network security and its exploitation process.
Application of Holographic Technology in Education Suzanna Suzanna
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Vol 11 No 2 (2023): September 2023
Publisher : LPPM Universitas Islam 45 Bekasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33558/piksel.v11i2.7320

Abstract

This research examines the benefits of holographic technology so that it can be used in education. The current education system already makes extensive use of computer-based information and communication technology; however, the application of holography technology is still a futuristic (future) concept due to difficulties in implementing technical procedures and software requirements in the application of holography technology. This research discusses technology related to holography and how the practice of holography will be applied in the future, affecting many areas of life, especially the world of education. In this study, researchers also conducted experiments on a group of children aged 3 - 4 years using holography technology with the HolograFX Game as a tool for conducting experiments. From the experimental results, it can be concluded that holograms can be accepted by children and provide them with the opportunity to learn in different ways and methods and provide impressive experiences.
Comparation of Federated and Centralized Learning for Image Classification Farhanna Mar'i; Ahmad Afif Supianto; Fitra Abdurrachman Bachtiar
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Vol 11 No 2 (2023): September 2023
Publisher : LPPM Universitas Islam 45 Bekasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33558/piksel.v11i2.7367

Abstract

Federated Learning (FL) is a new approach in machine learning or it can also be called collaborative learning, which is a machine learning method that includes client devices to carry out the training process, so that clients do not need to send training data to the server but directly conduct training on their respective devices. respectively. The models generated from local training will be sent to the server for further global aggregation. Therefore, FL is referred to as machine learning which can maintain the privacy of the data owner, because the data is not submitted to the server and is still stored in each client's device. In this study, a performance comparison will be carried out to prove whether the latest approach which is Federated Learning, can produce the same accuracy performance as the traditional approach, that is Centralized Machine Learning, in the case of Image Classification. The comparison of two approaches would be conducted by using the Open Source Image Classification dataset, namely MNIST. The performance of two approaches would be presented by evaluation that is Accuracy. The result shows that Federated Learning almost overcome the performance of Centralized Learning in the case of Image Classification by provided Accuracy 76%.
Getfix: Revolutionizing Electronic Equipment Repair through a User-Centric Mobile Application Dinda Lusita Fristiani Anissa; Ria Andryani
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Vol 11 No 2 (2023): September 2023
Publisher : LPPM Universitas Islam 45 Bekasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33558/piksel.v11i2.7369

Abstract

The use of electronic equipment is inseparable from people's lives, in its use electronic equipment often experiences damage but the handling of damaged goods experienced by users is still minimal due to the lack of getting information about relevant and qualified technicians, it is difficult to find a trusted service place and users must bring the items they want to repair directly to the service place, so a system design is needed that can connect users with technicians to be able to repair damaged electronic equipment in the form of mobile applications. In this design, the design thinking method is applied which contains several stages, namely empathize, define, ideate, prototype and test. The application design model is made by considering the target user to facilitate the exchange of information regarding the repair of electronic equipment damage. The results of this study provide a recommendation for the UI / UX design of a mobile application system to call a technician named Getfix, by providing electronic equipment service ordering services and calling technicians online
Effectiveness of Using MIT App Inventor as an Android-Based Learning Media Miftahul Jannah; Khairunnisa Khairunnisa; Teguh Ansyor Lorosae; Sahrul Ramadhan
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Vol 11 No 2 (2023): September 2023
Publisher : LPPM Universitas Islam 45 Bekasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33558/piksel.v11i2.7379

Abstract

Massive updates on technology make teachers have to be more extra in determining the learning materials and media used. The technology used must be up-to-date and provide good results as a learning medium that must be used. Technological developments must truly be transferable as learning media, given that Revolution 5.0 is targeting innovation and development in more sophisticated technologies such as AI, IoT, and robots. Humans can slowly be replaced with machines and everything may be computerized. By being given knowledge from now on, at least students have provisions for the future. The process of transferring knowledge is not only done by speaking in front of the class, the process also requires media or intermediaries to bridge it so that the process of transferring knowledge becomes more optimal and faster. The use of appropriate learning media can certainly make students better understand what is being taught. On this basis, the purpose of this study was to determine the effectiveness of using Mit App Inventor as a learning medium. The method used is Descriptive Quantitative. Data collection was carried out by distributing questionnaires to students of SMK 1 Muhammadiyah Bima who had used Mit App Inventor in their learning process. The results of this study indicate that the use of Mit App Inventor at SMK 1 Muhammadiyah Bima is effective. The first indicator "Platform Quality" gets a percentage of 88.5%, the second indicator "Student Understanding" gets a percentage of 93.9%, the third indicator gets a percentage of "Student Preference" 81.2% and the fourth indicator "Benefits Obtained" gets a percentage 80.3%. It can be said that Mit App Inventor is of good quality, easy to understand, and provides good benefits for the learning process.
Fuzzy Time Series and Data Visualization for Forecasting Sales of Grocery Ingredients Rahmat Zulfikar Nasution; Sriani Sriani
PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic Vol 11 No 2 (2023): September 2023
Publisher : LPPM Universitas Islam 45 Bekasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33558/piksel.v11i2.7383

Abstract

The development of information technology is currently increasingly rapid and produces very large amounts of data. Grocery store or also commonly known as UD. Ridho has several problems in determining the availability of basic food ingredients and the amount of demand for goods is uncertain, which means that grocery stores often experience shortages of supplies and/or excess supplies of basic food supplies at certain times. The forecasting method that will be used in this research is Fuzzy Time Series (FTS) with the aim of overcoming this problem by estimating sales of goods (basic necessities) at UD. Ridho in Dolok Masihul. The results obtained are a system that was built to predict sales of basic food ingredients at UD. Ridho in Dolok Masihul is suitable for use so it is hoped that it can help UD owners. Ridho in determining the amount of basic food supplies in the future correctly so that UD. Ridho did not experience any losses or reduced income.