Claim Missing Document
Check
Articles

Found 6 Documents
Search

Implementasi Steganografi Menggunakan Metode Least Significant Bit (LSB) Berbasis Web (Studi Kasus : PT Bank Tabungan Negara) Turmudi Zy, Ahmad; Isarianto; Susilo, Arif; Mustafanah, Alif
Jurnal SIGMA Vol 14 No 3 (2023): September 2023
Publisher : Teknik Informatika, Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dalam sebuah perusahaan pasti terdapat sebuat interaksi pertukaran informasi baik pesan, data ataupun gambar untuk pertukaran tersebut di butuhkan sebuah aplikasi yang dapat mengirim dan menerima sebuah informasi, tak jarang sebuah perusahaan menggunakan social media sebagai alat pertukaran informasi. Dalam pertukaran informasi yang berkaitan dengan rahasia perusahaan di butuhkan keamanan yang sangat extra mengingat banyak sekali peretasan terhadap social media. Oleh karena itu untuk menyiasatinya kita membutuhkan kemanan tambahan yang dapat menyembunyikan pesan tersebut tanpa di ketahui oleh orang lain. dari permasalahan peretasan diatas penulis berusaha mencari keamanan tambahan untuk pertukaran pesan antara karyawan perusahaan yang aman dan tidak diketahui orang lain, kemudian penulis menemukan Steganografi yaitu teknik menyembunyikan pesan kedalam gambar jadi selain si pengirim dan si penerima tidak akan tahu bahwa gambar tersebut berisi pesan. Untuk metodenya penulis mengambil Leas Significant Bit karena dalam penerapannya wadah untuk mengisi pesan lebih banyak. Kata kunci: Steganografi, Secret Massage with Image, Image, Steganografi LSB.
Sistem Informasi Akademik Pada Sekolah MI Miftahuddiniyah Berbasis Web Afandi, Dedi; Hadapi Akhbar, Ahmad; Isarianto; Rozikin, Zaenur
Jurnal SIGMA Vol 14 No 4 (2023): Desember 2023
Publisher : Teknik Informatika, Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The world of education is currently developing very rapidly. In this rapid development, along with the development of technology and information that occurs. This very diverse technology and information requires quality improvements and mechanisms for the service sector to be more efficient, so that the Human Resources (HR) that have been produced from the world of education can make a contribution to the process of building the outside world in accordance with their expertise. When the data processing and academic data information system is running, it is still done manually so that it is possible to cause efficiency problems with time in the data processing process. To overcome these problems MI Miftahuddiniyah requires a web-based academic information system. The goal is to minimize errors and provide convenience to the school academics in processing data. The development method used in this information system is using the waterfall method, where the steps of this method begin with an analysis of system requirements, and continue with material collection, design, manufacture, testing (redesign if not appropriate) and system application. The results of this study are in the form of a website for the MI Miftahuddiniyah Academic Information System. The development of this Academic Information System is made in a web-based application that can make it easier for admins to process report data management, minimize errors and data loss because the processed data is stored in the database, and can speed up the process of inputting student grade data. Keywords:Web-Based Academic Information System with Waterfall Method, PHP, MySQL, SS
Analisis Prediksi Data Mining Untuk Mengetahui Minat Pembeli Terhadap Produk I-Pos Pada Pt Luma Technology Indonesia Menggunakan Algoritma Klasifikasi Naive Bayes Isarianto; Andhika Sardi, Sophian
Jurnal SIGMA Vol 14 No 4 (2023): Desember 2023
Publisher : Teknik Informatika, Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

PT Luma Technology Indonesia was established in 2007 and is engaged in software distributors for SMEs, especially products for the iPos Store Program for the Jabodetabek region. Besides being a software distributor, PT Luma Technology Indonesia also provides training services, assistance services and network installation services as after-sales services that can increase the value of the products being marketed. In addition to marketing their products offline, namely by consignment to several software stores in the Jabodetabek area, to keep up with the developments of the company, they also began using online methods to market their products such as through several e-commerce websites and social media. With so many prospective customers who submit PO on PT Luma Technology Indonesia. Then there will be a test of buying interest in prospective customers. PT Luma Technology Indonesia uses one of the classification methods, namely the naive bayesian method, to find out prospective customers who are interested or not in the ipos store program on PT Luma Technology Indonesia with a fairly high level of accuracy, in order to find out prospective customers who are interested in the ipos store program on PT Luma Technology Indonesia. Keyword: Analysis, data mining, interests, prospective customers, PT Luma Technology Indonesia, classification, naive bayes
IMPLEMENTASI SISTEM ABSENSI FACE RECOGNITION BERBASIS WEB PADA BAGIAN KESEJAHTERAAN RAKYAT KABUPATEN BEKASI suprapto; Isarianto; Alhadi Saputra; Handala Simetris Harahap; Ahmad Fauzi
Jurnal SIGMA Vol 15 No 1 (2024): Juni 2024
Publisher : Teknik Informatika, Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37366/sigma.v15i1.5067

Abstract

At this time, Bagian Kesejahteraan Rakyat Kabupaten Bekasi still uses finger print attendance, the attendance process using finger print is often problematic on machines that do not detect fingers, so the attendance process is done manually by writing on the attendance form. Plus, to carry out the attendance process, employees have to queue, so it is quite a waste of time. During the Covid-19 pandemic, finger print attendance is still dangerous because of physical contact when going to the attendance process. The attendance process needs to be improved again so that its use is more flexible, safe and efficient. By utilizing face recognition technology, face recognition-based attendance is attendance that is carried out using the detection of parts of the human face. Then in the design of the face recognition-based attendance system, the researcher uses a system modeling with Undefined Modeling Language (UML) and developed with the prototype method. This research shows that with the construction of this web-based facial recognition face attendance system, Bagian Kesejahteraan Rakyat Kabupaten Bekasi can be easier and safer from the Covid-19 outbreak in carrying out attendance in every condition, then in the recapitulation of the list of employees who attend Bagian Kesejahteraan Rakyat Kabupaten Bekasi it is easier because it is already stored in the database.
Peran Teknologi Informasi dalam Industri Manufaktur Menghadapi Revolusi Industri 4.0 Isarianto; Andhika Sardi, Sophian; Zakiatul, Zulfa Hidayah; Latif, Abdul
Jurnal Pelita Pengabdian Vol. 2 No. 2 (2024): Juli 2024
Publisher : DPPM Universitas Pelita Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37366/jpp.v2i2.4625

Abstract

Revolusi Industri 4.0 telah membawa perubahan signifikan dalam berbagai sektor, termasuk industri manufaktur. Teknologi informasi memainkan peran kunci dalam transformasi ini dengan memperkenalkan konsep pabrik pintar (smart factory) yang mengintegrasikan Internet of Things (IoT), big data, kecerdasan buatan (AI), dan cloud computing. Penelitian ini bertujuan untuk menganalisis peran teknologi informasi dalam industri manufaktur dan bagaimana teknologi ini membantu perusahaan menghadapi tantangan Revolusi Industri 4.0. Metode yang digunakan adalah kualitatif deskriptif dengan analisis literatur dari berbagai sumber referensi. Hasil penelitian menunjukkan bahwa implementasi teknologi informasi dalam manufaktur meningkatkan efisiensi produksi, mengurangi biaya operasional, dan meningkatkan daya saing perusahaan. Teknologi IoT memungkinkan pengumpulan data real-time, big data dan analitik mendukung pengambilan keputusan berbasis data, AI dan machine learning membantu dalam prediksi kegagalan mesin, dan cloud computing menyediakan infrastruktur yang fleksibel. Kesimpulannya, teknologi informasi berperan penting dalam mendukung industri manufaktur dalam menghadapi tantangan dan memanfaatkan peluang yang ditawarkan oleh Revolusi Industri 4.0.
Enhancing Network Security: Evaluating SDN-Enabled Firewall Solutions and Clustering Analysis Using K-Means through Data-Driven Insights Ahmad Turmudi Zy; Isarianto; Rifa’i, Anggi Muhammad; Nugroho, Agung; Ghofir, Abdul
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 9 No 1 (2025): February 2025
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v9i1.6056

Abstract

In the face of escalating and increasingly complex cyber threats, enhancing network security has become a critical challenge. This study addresses this issue by investigating the optimization of SDN-enabled firewall solutions using a data-driven approach. The research employs K-Means clustering to analyze attack patterns, aiming to identify and understand distinct patterns for improved firewall effectiveness. Through the clustering process, attack data was classified into three clusters: Cluster 0, indicating concentrated attack sources likely tied to high-activity regions or networks; Cluster 1, representing a dispersed distribution of attacks, pointing to diverse origins; and Cluster 2, linked to specific geographic regions or unique attack behaviors. The clustering efficacy was evaluated using the Silhouette Score (0.606) and the Davies-Bouldin Index (0.614), indicating meaningful and reliable clustering outcomes. These findings provide actionable insights into network threat patterns, enabling the refinement and enhancement of SDN-enabled firewalls. The study contributes to the field by demonstrating the potential of clustering techniques in uncovering patterns overlooked by traditional methods and paving the way for further research into alternative clustering algorithms and broader applications in network security.