Claim Missing Document
Check
Articles

Found 5 Documents
Search

MODEL OPTIMALISASI PELUANG PEMANFAATAN MEDIA JEJARING SOSIAL DALAM IMPLEMENTASI E-GOVERNANCE di INDONESIA Herri Setiawan; Puwo Santoso
Seminar Nasional Informatika (SEMNASIF) Vol 1, No 1 (2013): Information System and Application
Publisher : Jurusan Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Tidak bisa dipungkiri bahwa Teknologi Infomasi dan Komunikasi (TIK) saat ini ikut memudahkan penyelengggaraan pemerintahan. Melalui TIK ini dikenallah istilah e-Government, yaitu pengembangan penyalenggaraan kepemerintahan yang berbasis elektronik. Pemerintah terlalu fokus pada pengembangan e-Government, namun tidak menyadari bahwa sebenarnya diperlukan serangkaian langkah untuk memastikan masukan masyarakat betul-betul mengotimalkan pelaksanaan tugasnya. E-Governance mengemban fungsi yang luas, memastikan optimalnya hubungan dalam seluruh jaringan melalui penggunaan dan penerapan TIK. E-Governance adalah pendekatan prosedural dasar dan standar yang berhubungan dengan administrasi publik. Maraknya penggunaan social media menunjukkan gejala supply-driven. Governance hadir dalam sosok yang berwatak demand-side. Penelitian ini hendak menjawab bagaimanakah pola interaksi pemerintah-masyarakat yang dapat mengoptimalkan penggunaan social media. Atas dasar pemahaman akan iteraksi itulah dirumuskan model pengembangan TIK yang mengotimalkan kualitas interaksi antara kedua belah fihak.
Cloud Computing : Solusi ICT ? Ahmad Ashari; Herri Setiawan
Jurnal Sistem Informasi Vol 3, No 2 (2011)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (272.652 KB) | DOI: 10.36706/jsi.v3i2.736

Abstract

Salah satu topik terhangat Information and Communication Technology (Teknologi Informasi dan Komunikasi) saat ini adalah cloud computing. Teknologi cloud computing dihadirkan sebagai upaya untuk memungkinkan akses sumber daya dan aplikasi dari mana saja melalui jaringan Internet, sehingga keterbatasan pemanfaatan infrastruktur ICT yang sebelumnya ada dapat diatasi. NIST mendefiniskan Clud Computing adalah sebuah model untuk kenyamanan, akses jaringan on-demand untuk menyatukan pengaturan konfigurasi sumber daya komputasi (seperti, jaringan, server, media penyimpanan, aplikasi, dan layanan) yang dapat dengan cepat ditetapkan dan dirilis dengan usaha manajemen yang minimal atau interaksi dengan penyedia layanan. Pembahasan paper dimulai dengan uraian dari beberapa pendapat dan penelitian terdahulu tentang teknologi cloud computing, selanjutnya ditinjau kelebihan dan kekurangan yang dapat ditimbulkan atas implementasi cloud computing. Pembahasan diakhiri dengan kesimpulan apakah cloud computing merupakan solusi ICT ? dan saran yang dapat dijadikan bahan pertimbangan penguna dalam implementasi cloud computing. Kata kunci : ICT, cloud, computing, internet
Pengenalan Pola Serangan pada Internet of Thing (IoT) Menggunakan Support Vector Mechine (SVM) dengan Tiga Kernel Tasmi Tasmi; Ferry Antony; Dhamyanti Dhamyanti; Herri Setiawan; Fali Oklilas
Jurnal PROCESSOR Vol 18 No 2 (2023): Jurnal Processor
Publisher : LPPM Universitas Dinamika Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33998/processor.2023.18.2.1457

Abstract

Internet of things (IoT) technology is very popular these days around the world, with the development of IoT technology raises the impact of security threats and attacks on IoT devices. One of the most is the theft of data and information, one form of threat in IoT is malware. This research uses attacks in the form of bontet to detect attacks on the Internet of Things IoT) and uses Machine Learning to perform data detection of attacks on IoT devices. The method used in this research is Support Vector Mechine (SVM) by comparing three kernels namely Liner, polynominal and Radial Basis Function (RBF). This method is used to determine the level of accuracy in the detection process and compare between kernels. The results obtained are the accuracy value of 0.997 for the liner kernel, meaning that this kernel is able to separate the classes well, while the Polynomial kernel accuracy value of 0.993 is good in separating classes even though the value is smaller than the liner. Meanwhile, the RBF (Radial Basis Function) kernel has an accuracy of 1.0 (100%).
Metode Spread Spectrum untuk Penyisipan Pesan pada Citra Digital Herri Setiawan; Bedy Briliant Wijaya; Dewi Sartika
Bulletin of Computer Science Research Vol. 4 No. 1 (2023): December 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bulletincsr.v4i1.310

Abstract

Abstract The importance of the value of information in a message means that the message often does not reach the recipient, but instead falls into the hands of unwanted people. Various techniques are used to prevent access by unauthorized persons. One of the various techniques to protect this information is steganography, which is the hiding of a message inside another message to avoid suspicion that someone is trying to steal information. The initial stage of the insertion process is to perform a binary spread of the message characters with a scalar magnitude of 4 to produce a new segment followed by the generation of a random number (pseudonoise random number) using the steganography key and converted into binary form. Then proceed with modulation with XOR logic operation between the value of the binary segment and the line of random numbers that have been converted into binary to produce a new binary that will be inserted into the digital image object. The spread spectrum method produces quite good image quality after the insertion process, this can be proven by the PSNR test results which are more than 30 dB.
Analisis Semiotika Self-Love (Mencintai Diri Sendiri) dalam Video Klip “Jiwa yang Bersedih “ Ghea Indrawari Herri Setiawan
Sintaksis : Publikasi Para ahli Bahasa dan Sastra Inggris Vol. 1 No. 5 (2023): September: Publikasi Para ahli Bahasa dan Sastra Inggris
Publisher : Asosiasi Periset Bahasa Sastra Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/sintaksis.v1i5.71

Abstract

The purpose of this study is to apply self-love to help maintain mental health and reduce the risk of disorders in one's psychological condition in Ghea Indrawati's "Sad Soul" video clip. This analysis focuses on how the depiction of self-love is contained in each scene, then continues on Charles Sanders Peirce's semiotic model (triangle meaning). This research is qualitative research and uses semiotic analysis owned by Charles Sanders Peirce. For Charles Sanders Peirce, the fundamental principle of the nature of signs is representative and interpretive nature. The music video of the song "Sad Soul" was chosen because the music video has many moral messages aimed at loving yourself, this concept encourages someone to be able to recognize and accept themselves then be able to treat themselves well and as they are. The results of this study have 3 aspects, namely self-love as soft love for oneself that focuses on planting, nurturing, and developing oneself. Self-love as a dynamic state of self-appreciation, which grows from actions that support physical, psychological, and spiritual growth. Self-love as a feeling of comfort and the ability to set aside time for self-care.