Claim Missing Document
Check
Articles

Found 31 Documents
Search

PENDEKATAN ACTIVE DATABASE SYSTEM DAN BUSINESS RULE DALAM PENGEMBANGAN SISTEM INFORMASI Amin, M. Miftakul
Jurnal Informatika Vol 13, No 1 (2013): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

An information system is inseparable with the database as data repository and give the data service to information system. Information system basically translate the business rule from an organization into form of algorithm programming which later then planted in application. Database which used conventionally have the character of passive and there is no controlling mechanism, that happened only mechanism just enter and its exit of data. With the existence of active of database system, a database earn the reactive behavior and conduct the controlling of information system  at database level. Business rules which is as a rule planted in application can be planted directly into database and can be used concurrently by entire/all application that using database. This writing give the study about an alternative approach of  business rules and active database system in developing an information system by planting business rules in the form of programming algorithm into database management system so that more improving the performance of information system. This active database system approach  can be implemented not only in the field of information systems development, but can be used as a data base responsive to collaborate with the control system hardware. Key words : information system, active database system, business rule
TEKNIK MENYEMBUNYIKAN PESAN RAHASIA MENGGUNAKAN STEGANOGRAPHY DAN CRYPTOGRAPHY Amin, M. Miftakul
Jurnal Informatika Vol 15, No 1 (2015): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Development of Internet technology has demonstrated the communication that occurs does not require face to face directly. Safety factor becomes an important issue in the communication using the Internet network. Various attempts were made to keep the information security and confidentiality can be maintained. Steganography and cryptography techniques present as a technique to achieve data security. This research attempts to develop an application that can be used for communication by using two techniques. In this study steganography method used is the Least Significant Bit (LSB) whereas cryptography method used is the Caesar cipher. From the research that has been done can be generated an application that has been able to perform encryption and decryption of secret messages that can be hidden in a digital image color (24 bit). Key words : steganography, cryptography, LSB
PUSTAKA SANDI KLASIK BERBASIS COMPONENT OBJECT MODEL (COM) Amin, M. Miftakul
Jurnal Informatika Vol 14, No 2 (2014): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Security and confidentiality are important issues that need serious attention in the era of information technology. Cryptography is one technique for securing data and information. In cryptography, the data is disguised in such a way that even if the data can be read, it can not be understood by those who do not have the authority. Data that has not undergone encoding known as The term plaintext, and after camouflaged with an encryption method, then it will turn plaintext into ciphertext. In general, a system equipped with a password to restrict only certain parties were entitled to enter into the system. If the password can be solved or known by an unauthorized person, then the data or information that is in the system is threatened. This research aims to develop a library classical password that can be used as an attempt to realize the aspect of information security in access control, by utilizing the technology component object model (COM). From the results of tests performed can be seen that the COM libraries are packed in COM DDL can be used by a variety of programming languages fairly easily.Keywords— cryptography, component object model (COM)
SISTEM INFORMASI PRODUKSI PADA KALIANDA FARM LAMPUNG SELATAN Amin, M. Miftakul
Jurnal Informatika Vol 11, No 2 (2011): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Kalianda farm is a company engaged in the cultivation of laying hens. Operational reporting daily transactions and daily, weekly and monthly are still using hand written. On the other hand, management needs to get a quick report to be presented on a periodic basis. As one effort to achieve these objectives, it is necessary to build an information system that can assist livestock operations in the data record Kalianda farm feed, egg production, administration, warehouse and generate reports. The system is built using technology that runs in a multiuser network of Local Area Network (LAN) architecture client / server applications that are expected to directly obtain information about the recapitulation in a relatively short time and has managed to periodically. Data collection instruments using library research, interviews, and documentation. While the software to build applications using MS. Visual Basic 6.0, MySQL and Crystal Reports 8.5. Of this study obtained a production information system with client / server architecture, so the application can be run by several users at the same time to assist the administration of farm production in Kalianda South Lampung. Keywords: Information Systems, Production
Implementasi Socket Programming dalam Pembuatan Sistem Antrian Amin, M. Miftakul
Jurnal Informatika Vol 10, No 1 (2010): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Customer satisfaction is one aspect to be achieved by organizations that provide services to customers. One of the existing service is a queuing system which is the front guard in the process of service. Many public service organizations that have not applied the queuing system in the service. This resulted in a buildup of the queue and the calling process is still done conventionally. On the other hand queuing system that is much used in the form of hardware that if one day there is a change in the installation then the entire device must be replaced. Another alternative is a queuing system made with software that contains multimedia features. Making it easier for the installation and modification to the changes that occur. With the help of socket programming allows to send messages between computers connected in a queuing system, as well as additional multimedia features will further provide information of interest to the customer. Keyword: queuing system
Pengembangan Mobile Application Tracer Study (Studi Kasus : IBI Darmajaya) Amin, M. Miftakul
Jurnal Informatika Vol 11, No 1 (2011): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

IBI Darmajaya has several times held a tracer study. However, because the tracer study was done independently in each department, then it’s aspects vary greatly according to the interests of each department. Tracer studies also can not be used as a representing IBI Darmajaya’s graduates overall. This study presents an instrument by applying a tracer study in charging mobile application. Mobile application is built using the Wireless Application Protocol (WAP) as a content applications. The results of this study was obtained by a mobile software application that makes it easy for IBI Darmajaya’s graduates to fill out questionnaires of tracer study without experiencing barriers of distance and time. Keywords: Mobile Application, Tracer Study
Pengembangan Electronic Document Management System (EDMS) Sebagai Alternatif Pengarsipan di Perguruan Tinggi Amin, M. Miftakul
Jurnal Informatika Vol 10, No 2 (2010): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The purpose of this paper is to develop an electronic document management system (EDMS). With a system is expected to be an alternative in the management of electronic documents in the college environment. Writing this using qualitative research approach with observation, document analysis, and interviews for data collection process. The system used a web-based system that is expected to reach the  users of the system at large. This system has the functionality to store, archive, and retrieve electronic documents. Keyword : electronic document
IMPLEMENTASI FRAMEWORK INTEROPERABILITAS DALAM INTEGRASI DATA REKAM MEDIS Amin, M Miftakul
Jurnal Pseudocode Vol 1, No 1 (2014)
Publisher : Universitas Bengkulu

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (158.549 KB) | DOI: 10.33369/pseudocode.1.1.44-50

Abstract

Rekam medis merupakan data yang bersifat pribadi dan menjadi salah satu informasi penting yang wajib menyertai seseorang kemanapun dia pergi yang sering disebut sebagai pencatatan data riwayat pasien. Masalah yang sering muncul adalah tidak adanya keterkaitan antara masing-masing rumah sakit dalam ketersediaan informasi rekam medis. Penelitian ini mencoba menerapkan framework interoperabiltas dengan menggunakan web services untuk melakukan proses integrasi data rekam medis. Penelitian ini menunjukkan bahwa tersedianya model integrasi data rekam medis menggunakan web services memberikan kemudahan bagi pasien untuk memperoleh data rekam medis pasien tanpa harus datang langsung ke rumah sakit. Hal ini ditunjukkan dengan menggunakan WAP sehingga layanan web services dapat diakses dengan menggunakan ponsel.Kata Kunci: Framework, Interoperabilitas, Rekam Medis, WAP, Web Services.
Interoperabilitas perangkat lunak menggunakan RESTful web service Amin, M. Miftakul
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 4, No 1 (2018): January-June
Publisher : Prodi Sistem Informasi - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1277.359 KB) | DOI: 10.26594/register.v4i1.1129

Abstract

Pengembangan sistem informasi membutuhkan interoperabilitas dalam lingkungan yang heterogen, dilihat dari sistem operasi, perangkat lunak, bahasa pemrograman, dan basis data, sehingga dapat saling berkomunikasi dan bertukar data atau informasi. RESTful web service dapat digunakan sebagai salah satu teknologi untuk mewujudkan interoperabilitas. Sebuah studi kasus tentang aplikasi perpustakaan telah digunakan dalam penelitian ini. Aplikasi tersebut dibangun dengan Slim Framework PHP untuk sisi server dan Visual Basic pada sisi client. Komunikasi antara client dan server menggunakan HTTP method yaitu GET, POST, PUT, dan DELETE. Pengujian telah dilakukan untuk melihat performa dari web service yang telah dikembangkan menggunakan perangkat lunak Postman. Hasil dari penelitian ini menunjukkan bahwa, aplikasi client dapat mengakses web service yang disediakan di sisi server sebagai wujud interoperabilitas.   Information development systems need interoperability in heterogeneous environments, seen from operating systems, software, programming languages, and databases, so that they can communicate and exchange data or information. RESTful web services can be used as one of the technologies to realize interoperability. As case studies build library applications using PHP Slim Framework on the server side, while Visual Basic programming language is used on the client side. Communication Between client and server using HTTP Method that is GET, POST, PUT, and DELETE. Testing has been done to see the performance of web service functionality that has been developed using Postman software. The result shows that client applications can access the web services provided on the server side as a form of interoperability.
IMAGE STEGANOGRAPHY DENGAN METODE LEAST SIGNIFICANT BIT (LSB) Amin, M. Miftakul
CSRID (Computer Science Research and Its Development Journal) Vol 6, No 1 (2014): CSRID Februari 2014
Publisher : Universitas Potensi Utama

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (314.66 KB) | DOI: 10.22303/csrid.6.1.2014.53-64

Abstract

ABSTRAK Keamanan dalam menyampaikan pesan rahasia merupakan faktor penting dalam penyebaran informasi di dunia maya. Melindungi supaya pesan yang akan dikirimkan sampai kepada pihak yang berhak, perlu dibuat sebuah mekanisme penyembunyian pesan. Tujuan dari penelitian ini adalah menyembunyikan pesan berupa teks rahasia ke dalam citra digital true colour 24 bit dalam format RGB. Metode yang digunakan untuk menyisipkan pesan rahasia menggunakan metode LSB (Least Significant Bit) dengan mengganti bit terakhir atau bit ke-8 dalam setiap komponen warna RGB. Pilihan jenis file citra RGB dengan pertimbangan kapasitas pesan yang dapat disisipkan lebih besar dibandingkan jika menggunakan citra grayscale, hal ini dikarenakan dalam 1 pixel dapat disisipkan 3 buah bit pesan. Ujicoba yang dilakukan memberikan hasil bahwa pesan yang disembunyikan ke dalam citra digital tidak mengurangi kualitas citra digital secara signifikan, dan pesan yang telah disembunyikan dapat diekstrak kembali, sehingga pesan yang dikirimkan dapat sampai dengan aman kepada penerima.