Basuki Hari Prasetyo
Universitas Budi Luhur

Published : 9 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 9 Documents
Search

Implementasi Algoritme Profile Matching Untuk Perekrutan Karyawan Mujito Mujito; Basuki Hari Prasetyo; Nasrul Sani
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 3 No 2 (2019): Agustus 2019
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v3i2.918

Abstract

IT infrastructure at PT. Citra Multi Service is a very important part in the company where this is all part of the Foundation or framework that supports a system or organization to maintenance. The prospective employee selection process done by checking and selection is manually done by checking one by one the documentary was sent by the applicant, so make appraisers hassles and inefficient and require quite a long time, and the occurrence of human error as well as an assessment of subjective, sometimes the end result is not the best prospective employees. In this study using two aspects and in the aspect there are a few criteria. The basic Technique consists of aspect criteria Desktop Support, Network Engineer, Server Engineer, Security Engineer and Data Center Engineer. On the aspect of Personality consists of Dexterity, communication, discipline, Team Work and Responsibility. Method or Algorithm used is a Matching Profile. The results of this research is an application that produces the decision supporting systems output a rank of each prospective employees, so the management decision makers can see the ability of each candidate employees based on the rank.
Perbandingan Metode Huffman dan Run Length Encoding Pada Kompresi Dokumen Pujianto Pujianto; Mujito Mujito; Basuki Hari Prasetyo; Danang Prabowo
InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan Vol 5, No 1 (2020): InfoTekJar September
Publisher : Universitas Islam Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30743/infotekjar.v5i1.2892

Abstract

Penggunaan media penyimpanan yang efektif dan efesien sangat didambakan oleh semua orang, ukuran besar dan kecilnya sebuah document sangat mempengaruhi media penyimpanan dan juga ketika pengiriman document juga mempengaruhi kecepatan pengiriman. Dengan memanfaatkan beberapa metode Kompresi kita dapat memperkecil ukuran pada sebuah document. Beberapa diantaranya adalah metode Huffman dan Metode Run Length Encoding dimana pada penelitian ini akan membahas mengenai perbandingan dari metode Huffman dalam melakukan proses Kompresi dengan metode Run Length Encoding menggunakan beberapa jenis document yaitu document yang berjenis pdf, word, excell dan powerpoint. Dari hasil penelitian menunjukan bahwa metode huffman lebih baik didalam melakukan proses compress document dibandingkan dengan metode Run Length Encoding. Hal ini dapat dilihat dari ukuran file setelah dilakukan proses Kompresi, ukuran file sesudah Kompresi pada metode huffman mengalami penyusutan sedangkan ukuran file sesudah Kompresi pada metode Run Length Encoding terdapat 1 file mengalami peningkatan
The Feasibility of Credit Using C4.5 Algorithm Based on Particle Swarm Optimization Prediction Siswanto Siswanto; Abdussomad Abdussomad; Windu Gata; Nia Kusuma Wardhani; Grace Gata; Basuki Hari Prasetyo
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.2019

Abstract

Credit is a belief that one is given to a person or other entity which is concerned in the future will fulfill all the obligations previously agreed. The objective of research is necessary to do credit analysis to determine the feasibility of a credit crunch, through credit analysis results, it can be seen whether the customer is feasible or not. The methods are is used to predict credit worthiness is by using two models, models classification algorithm C4.5 and C4.5 classification algorithm model based Particle Swarm Optimization (PSO). After testing with these two models found that the result C4.5 classification algorithm generates a value of 90.99% accuracy and AUC value of 0.911 to the level diagnostics Classification Excellent, but after the optimization with C4.5 classification algorithm based on Particle Swarm Optimization accuracy values amounted to 91.18% and the AUC value of 0.913 to the level of diagnosis Excellent Classification. These both methods have different accuracy level of 0.18%.
Sistem Pakar Untuk Mengidentifikasi Kerusakan Perangkat PABX Panasonic NS1000 Dengan A* Pathfinding Siswanto Siswanto; Helmy Ligaputra; M. Anif; Windu Gata; Basuki Hari Prasetyo
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 3 (2020): Juni 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v4i3.1882

Abstract

Someone can be said to have the ability to handle damage to the Panasonic NS1000 PABX device and perform a configuration of at least 3 years or already have a certificate of competence and training. The problem to be investigated is the number of experts there is only one and can only identify 5 damage per day and 1 day there are 25 damage. PABX Panasonic NS1000 has 30 rules and 130 data symptoms of damage as its knowledge base. This Expert System is designed to identify damage to PABX Panasonic NS1000 mobile application-based applications using the A * (A star) pathfinding algorithm and the forward chaining method with the PHP (Jquery Mobile) programming language and the database using MySQL, as an application program used by PT. Mediatama Anugrah Citra to facilitate the process of troubleshooting and effective problem solving on target. The features in this expert system include the identification of problems, the identification process, up to the achievement of the goal state and solutions effectively, quickly and precisely, the user as the user or admin has its own login and access rights in identifying, entry and editing. In the programming case testing process it can be seen that the application of the A * Pathfinding algorithm with the heuristic function has proven ineffectively implemented in the expert system and the results of the UAT testing process, the respondents agree (above 91.23%) that overall the expert system helps the expert and can deduce damage to PABX devices correctly.
Aplikasi Pengamanan Data Email Menggunakan Algoritma Kriptografi XTEA Berbasis WEB M. Anif; Siswanto Siswanto; Basuki Hari Prasetyo; Muhammad Fachri; Gunawan Pria Utama
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 17, No 2 (2020)
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (695.989 KB) | DOI: 10.36080/bit.v17i2.1144

Abstract

PT. Tanabe Indonesia bergerak di bidang manufacture dalam bidang kesehatan dan menggunakan fasilitas email maupun sharing folder berbasis cloud. Dalam hal ini perusahaan tersebut belum mempunyai sjstem keamanan yang dapat mengamankan isi dari pesan email. Dalam implementasinya, proses pengiriman email di dalam suatu jaringan tidak menutup kemungkinan untuk dibaca oleh orang yang tidak bertanggung jawab, seperti penyusup. Masalah tersebut dapat diatasi dengan membuat Aplikasi Pengamanan Data Email Menggunakan Algoritma Kriptografi XTEA(Xtended Tiny Encryption Algorithm) berbasis web, agar pesan email tersebut tidak mudah dibobol. Aplikasi yang dibangun juga terdapat fasilitas tambahan, yaitu proses login untuk dapat mengaksesnya, sehingga hanya pihak tertentu yang memiliki hak akses yang dapat menggunakan aplikasi ini. Bahasa pemrograman yang digunakan dalam membangun aplikasi pengamanan data ini adalah bahasa pemrograman PHP yang berbasis web. Dari hasil uji coba, format file akan berubah menjadi format .sc. dan setelah melalui proses encrypt akan berubah menjadi lebih besar dengan rata-rata ukuran file bertambah sekitar 22,221 persen dari ukuran asli file sebelum melalui proses encrypt. Dari hasil uji coba setelah melalui proses decrypt rata-rata perubahan ukuran file akan bertambah sebesar 77,779% persen (berkurang 22,221 persen), sama dengan rata-rata pada proses encrypt.
Aplikasi Penilaian Kinerja Dan Perilaku Kerja Karyawan Universitas Budi Luhur Berbasis Web Subandi Subandi; Basuki Hari Prasetyo; Dian Anubhakti
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 17, No 1 (2020)
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1178.845 KB) | DOI: 10.36080/bit.v17i1.1002

Abstract

Perlunya sistem SDM yang efektif dan efisien, termasuk penilaian kinerja karyawan yang tepat sasaran, adil, obyektif dan berdampak meningkatkan motivasi kerja dan produktivitas kerja karyawan di lingkungan Universitas Budi Luhur Jakarta. Penilaian kinerja karyawanyang saat ini dilakukan melalui pengisian formulir Sasaran Kerja Karyawan(SKK) masih dirasakan belum optimal. Mendapatkan sistem penilaian kinerja karyawanyang lebih obyektif, efektif dan tepat sasaran di lingkungan Universitas Budi Luhur Jakarta yang berbeda dari sistem penilaian kinerja karyawan yang diterapkan saat ini, namun tetap mengacu pada peraturan pemerintah yang berlaku. Belum tersedianya Peta strategi yang mengambarkan keterkaitan antara rencana strategis, visi misi dan harapan para stakeholder, kesulitan dalam mengukur Key Perfomance Indikator (KPI) merupakan masalah yang dihadapi Universitas Budi Luhur yang terkait dengan pengukuran kinerja pegawai. Menyadari kebutuhan ini maka perlu dirancang aplikasi penilaian kinerja dan perilaku kerja karyawan Universitas Budi Luhur berbasis web yang dapat digunakan oleh Universitas Budi Luhur untuk menyusun Key Performance Indikator (KPI) dengan menggunakan framework Balance Score Card (BSC) memastikan KPI Rektor Universitas Budi Luhur diturunkan ke level bawahnya serta meningkatkan KPI dan menggukur hasil. Dalam tulisan ini didapatkan peta strategi Universitas Budi Luhur, matriks menggunakan Balance Score Card, bobot penilaian dengan 360 derajat. Pengujian tingkat penerimaan user (UAT) dilakukan dengan memberikan kuesioner terhadap 20 (dua puluh) pengguna aplikasi penilaian kinerja, berdasarkan hasil pengujian 61% user sangat setuju dengan aplikasi penilaian kinerja, 37,5% setuju dengan aplikasi penilaian kinerja dan 1,5% kurang setuju dengan aplikasi penilaian kinerja.
Kendali dan Monitoring Ruang Server dengan Sensor Suhu DHT-11, Gas MQ-2 serta Notifikasi SMS Firdiansyah Firdiansyah; Siswanto Siswanto; Muhammad Anif; Basuki Hari Prasetyo
Prosiding SISFOTEK Vol 3 No 1 (2019): SISFOTEK 2019
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1201.222 KB)

Abstract

If the server room temperature is too hot it will cause damage to the existing hardware in the server room, whereas if the gas threshold is too high it will be able to indicate that a fire has occurred in the server room. One way to maintain the temperature level of 20-21ºC / (68-71ºF) and 350 ppm - 1000 ppm gas levels in the server room is to periodically monitor the temperature and gas content whether it is within the threshold that we specify ... So that if one day there is a deviation temperatures outside the tolerance range can be immediately taken responsive measures. Currently the server administrator must continue to monitor changes in temperature in the server room in stable condition and still manually. Temperature and gas monitoring systems and web-based control using DHT11 sensors and MQ-2 sensors can be one solution to monitor the temperature of the server room so that it is always in a conducive state, so as to minimize the occurrence of excess heat in devices in the server room . If there is a situation where changes in temperature and gas in the server room are detected, the system will send a notification to the user via SMS and automation of the additional air conditioning so that it can stabilize the room temperature again. Thus the temperature and gas of the server room will continue to be maintained and stable in full control by the server administrator without having to continue to be in the server room. The programming language used to create this system is the Arduino programming language whose syntax resembles the C language and for its visual appearance using the PHP programming language and MySQL database. From the observation of 23 days the application trial was able to run and give notification as much as 98% and system failure as much as 2%.
Perekrutan Karyawan Menggunakan Algoritme TOPSIS dan Pengujian UAT Siswanto Siswanto; Muhammad Satria Al Aziz; Mujito Mujito; Basuki Hari Prasetyo
Prosiding SISFOTEK Vol 4 No 1 (2020): Vol 4 No 1 (2020): SISFOTEK 2020
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (572.838 KB)

Abstract

The problem at PT. Putra Bangsingja Perkasa has difficulty in providing employee recommendations that are accepted according to the needs of the 160 prospective employees who register every 6 months of employee recruitment and who assess only 2 people. Employee recruitment applications using the TOPSIS algorithm need to be made to recommend employees who really meet the quality and match the desired criteria such as physical appearance, comprehension, communication, work motivation, education and work experience. The final results of this study are the results of the UAT testing process, the respondents agree (above 83.3%) that overall this employee recruitment application helps the leadership in providing employee recommendations that are accepted according to their needs.
Pengamanan File Audio Menggunakan Algoritma Kriptografi Blowfish Dan Pengujian UAT Siswanto; Farizal Dias Amsari; Basuki Hari Prasetyo; Wahyu Pramusinto; Gunawan Pria Utama; M. Anif
Prosiding SISFOTEK Vol 5 No 1 (2021): SISFOTEK V 2021
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (506.2 KB)

Abstract

The current problem at PT. Central Asia Insurance is data or information from meeting recordings that have been made without security so that the resulting data is leaked and can be published by unauthorized persons. This study aims to secure the results of the meeting in the form of audio that will be sent to the branch of PT. Central Asia Insurance using blowfish cryptographic algorithm and UAT testing. Therefore, I created an encryption application to secure the audio from the meeting at PT. Central Asia Insurance. The goal is to prevent irresponsible people from being able to know the results of the meeting directly because the Audio file has been encrypted. By making this application, it can guarantee the audio file of the meeting at PT. Central Asia insurance can be accepted by people who are entitled and have keys. The final result of this research is that this application is able to encrypt audio files with a maximum data size of 120 Mb. Based on trials carried out as many as 15 encrypted files, the encrypted file size becomes large with an average value of 12,009,507 bytes and an average encryption process time of 37.0 seconds while the decryption time is 52.2 seconds. So that the files obtained can be protected and can only be accessed by users who have a password lock. In the UAT test, a questionnaire with a Likert scale scale of 5. has been used. As a result, the respondents agree (above 91.23%) that the overall application of the blowfish algorithm to secure data files can be kept confidential.