Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : Prosiding Seminar Nasional Sisfotek (Sistem Informasi dan Teknologi Informasi)

Monitoring Ruangan Jarak Jauh Menggunakan Mikrokontroler Dfrduino, Sensor Passive Infrared dan Buzzer M. Anif; Siswanto Siswanto; Gunawan Pria Utama
Prosiding SISFOTEK Vol 1 No 1 (2017): SISFOTEK 2017
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1082.29 KB)

Abstract

Aplikasi ini dibuat dengan mikrokontroler dan beberapa komponen yang saling terhubung, yaitu DFRduino dengan processor ATMEGA328P, Sensor PIR (Passive Infra Red), Buzzer dan Ethernet Shield yang bahasa pemrogramannya menggunakan Arduino IDE. Aplikasi ini bersifat online dan real-time sehingga dapat diakses dimana saja, dengan bahasa pemrograman PHP (Hypertext Prepocessor) sebagai interface antara pengguna dan aplikasi. Tujuan dari perancangan aplikasi ini adalah untuk membantu manusia dalam mencegah tindak pencurian. Cara kerja aplikasi ini adalah ketika ada sumber gerakan atau motion, sensor PIR menangkap sinyal, lalu meneruskan biner kepada DFRduino yang dilanjutkan ke buzzer agar berbunyi sebagai tanda peringatan, kemudian komputer server memberikan notifikasi dengan cara mengirim pesan via Yahoo Messenger kepada ID Yahoo yang sudah diinput sebelumnya. Log kejadian tersebut akan tersimpan ke dalam database.
Implementasi Algoritme Profile Matching dan Pengujian UAT Untuk Memilih Karyawan Terbaik Siswanto Siswanto; Recky Juniansyah Asad; Gunawan Pria Utama; Wahyu Pramusinto; M Anif
Prosiding SISFOTEK Vol 4 No 1 (2020): Vol 4 No 1 (2020): SISFOTEK 2020
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (638.725 KB)

Abstract

In supporting the performance or enthusiasm of employees in the regulation department, the company gives rewards or awards to employees who get the title as the best employees in the form of money with a certain nominal value. It is expected that this reward can stimulate the enthusiasm of employees at work. But when assessing employees there are obstacles, including subjective judgments and calculation errors often occur in determining who the employee gets the title of the best employee. The application for selecting the best employees has been made using the profile matching algorithm. In this study using two aspects, namely aspects of performance consisting of speed of work, quality of work, work responsibilities and problem solving and personality aspects consisting of absenteeism, work knowledge, attitude, team work and loyalty. So that the final results of this study in the form of the results of the testing process with the UAT, the respondents agreed (above 91.2%) that overall the application for selecting employees helps the decision maker management in providing the best employee recommendations based on ranking correctly.
Pengamanan File Audio Menggunakan Algoritma Kriptografi Blowfish Dan Pengujian UAT Siswanto; Farizal Dias Amsari; Basuki Hari Prasetyo; Wahyu Pramusinto; Gunawan Pria Utama; M. Anif
Prosiding SISFOTEK Vol 5 No 1 (2021): SISFOTEK V 2021
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (506.2 KB)

Abstract

The current problem at PT. Central Asia Insurance is data or information from meeting recordings that have been made without security so that the resulting data is leaked and can be published by unauthorized persons. This study aims to secure the results of the meeting in the form of audio that will be sent to the branch of PT. Central Asia Insurance using blowfish cryptographic algorithm and UAT testing. Therefore, I created an encryption application to secure the audio from the meeting at PT. Central Asia Insurance. The goal is to prevent irresponsible people from being able to know the results of the meeting directly because the Audio file has been encrypted. By making this application, it can guarantee the audio file of the meeting at PT. Central Asia insurance can be accepted by people who are entitled and have keys. The final result of this research is that this application is able to encrypt audio files with a maximum data size of 120 Mb. Based on trials carried out as many as 15 encrypted files, the encrypted file size becomes large with an average value of 12,009,507 bytes and an average encryption process time of 37.0 seconds while the decryption time is 52.2 seconds. So that the files obtained can be protected and can only be accessed by users who have a password lock. In the UAT test, a questionnaire with a Likert scale scale of 5. has been used. As a result, the respondents agree (above 91.23%) that the overall application of the blowfish algorithm to secure data files can be kept confidential.
Penerapan Algoritma C4.5 , SVM Dan KNN Untuk Menentukan Rata-Rata Kredit Macet Koperasi Siswanto Siswanto; Riefky Sungkar; Basuki Hari Prasetyo; M.Anif; Subandi Subandi; Gunawan Pria Utama; Raden Sutiadi; Buana Suhurdin Putra
Prosiding SISFOTEK Vol 7 No 1 (2023): SISFOTEK VII 2023
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

problem that often occurs is the difficulty in determining the average bad credit spread across 7,823 savings and loan cooperatives in Indonesia. The main problem faced by savings and loan cooperatives is the difficulty in identifying and mitigating credit risks that can cause bad credit. Bad credit not only harms cooperatives, but can also disrupt the financial stability of cooperative members. The lack of effective tools to measure and predict credit risk makes cooperatives potentially face unnecessary losses. The aim of this research is to apply the C4.5, SVM, and KNN algorithms in determining the average non-performing loans of savings and loan cooperatives, comparing the results and performance of the three such algorithms in the context of credit risk management, and improve understanding of the use of machine learning techniques in identifying credit risk patterns that may be difficult to detect manually. The application of the C4.5 Algorithm, SVM (Support Vector Machine), and KNN (K-Nearest Neighbors) models in determining the average bad credit in the context of savings and credit cooperatives is carried out by considering the appropriate configuration. This research first collects and preprocesses data which includes credit history, income, length of membership, and other related factors from savings and loan cooperatives. Next, factor analysis and feature selection are carried out to identify the factors that most influence credit risk. The results of the three models are evaluated using various evaluation metrics, such as accuracy, precision, recall, F1-score, and AUC-ROC. The results of this research The results show that the SVM model has the highest performance in predicting credit risk, followed by the C4.5 and KNN algorithms. Careful feature selection and robust model validation are also key components in accurate credit risk assessment. Thus, the results of this research can help cooperatives better manage credit risk and make more informed decisions regarding loan approvals.