Claim Missing Document
Check
Articles

Found 10 Documents
Search

Aplikasi Pengamanan Data Email Menggunakan Algoritma Kriptografi XTEA Berbasis WEB M. Anif; Siswanto Siswanto; Basuki Hari Prasetyo; Muhammad Fachri; Gunawan Pria Utama
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 17, No 2 (2020)
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (695.989 KB) | DOI: 10.36080/bit.v17i2.1144

Abstract

PT. Tanabe Indonesia bergerak di bidang manufacture dalam bidang kesehatan dan menggunakan fasilitas email maupun sharing folder berbasis cloud. Dalam hal ini perusahaan tersebut belum mempunyai sjstem keamanan yang dapat mengamankan isi dari pesan email. Dalam implementasinya, proses pengiriman email di dalam suatu jaringan tidak menutup kemungkinan untuk dibaca oleh orang yang tidak bertanggung jawab, seperti penyusup. Masalah tersebut dapat diatasi dengan membuat Aplikasi Pengamanan Data Email Menggunakan Algoritma Kriptografi XTEA(Xtended Tiny Encryption Algorithm) berbasis web, agar pesan email tersebut tidak mudah dibobol. Aplikasi yang dibangun juga terdapat fasilitas tambahan, yaitu proses login untuk dapat mengaksesnya, sehingga hanya pihak tertentu yang memiliki hak akses yang dapat menggunakan aplikasi ini. Bahasa pemrograman yang digunakan dalam membangun aplikasi pengamanan data ini adalah bahasa pemrograman PHP yang berbasis web. Dari hasil uji coba, format file akan berubah menjadi format .sc. dan setelah melalui proses encrypt akan berubah menjadi lebih besar dengan rata-rata ukuran file bertambah sekitar 22,221 persen dari ukuran asli file sebelum melalui proses encrypt. Dari hasil uji coba setelah melalui proses decrypt rata-rata perubahan ukuran file akan bertambah sebesar 77,779% persen (berkurang 22,221 persen), sama dengan rata-rata pada proses encrypt.
Two-Factor Aunthetication Untuk Keamanan Transaksi Online Studi Kasus Webdosen Univesitas Budi Luhur M. Anif
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 6, No 2 (2009)
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1313.836 KB) | DOI: 10.36080/bit.v6i2.471

Abstract

Hampir semua organisasi menghadapi masalah berkaitan dengan perlindungan asset digital yang dimilikinya. Beberapa hal dilakukan oleh organisasi untuk mengatasi masalah tersebut yaitu dilakukan dengan melindungi sistem komputer dan aplikasinya dari penyalahgunaan dari pengguna lain yang tidak berkepentingan melalui penggunaaan password. Memang kalau kita perhatikan dalam kurun waktu singkat password tidak akan tergantikan. Dimana password adalah cara efektif untuk melindungi asset yang sebagian sudah dilindungi melalui akses fisik, yang terbatas dan diawasi. Namun password yang memiliki sifat statis tidak 100% dapat mengamankan sistem tersebut dari penyalahgunaan.Begitu halnya dengan proses pengisian nilai Tugas, UTS dan UAS di Universitas Budi Luhur telah mengalami perkembangan yang sangat pesat, dengan versi terakhirnya aplikasi tersebut yang sudah berbasis Web. Namun pada tatanan keamanan belum bisa dikatakan aman dalam penggunaannya. User masuk ke dalam aplikasi melalui Single Factor Aunthentication atau menggunakan password yang bersifat statik (static password).Tujuan dari tulisan ini adalah untuk menawarkan pemikiran yang dapat diterapkan dalam setiap network. Untuk menghilangkan penyalahgunaan dari sistem keamanan yang serupa dengan cara mengisolasi mereka dari kelemahan yang dimiliki oleh faktor yang pertama (metode Single-Factor Aunthentication) tersebut, dengan menambahkan faktor yang kedua menggunakan password dinamis (metode Two-Factor Aunthentication) yang penerapannya dibantu dengan menggunakan token. Dalam hal ini token yang dipakai diganti dengan Handphone sebagai media penerima passkey. Passkey tersebut dibangkitkan dengan algoritma acak dari komputer server da dikirim dengan SMS. Sehingga diharapkan tingkat keamanan akan lebih baik dari sebelumnya.Keyword : Security, Dynamic Password, Aunthentication, SMS
PEMODELAN SISTEM UNTUK APLIKASI PENGELOLAAN PEMBERIAN DANA BANTUAN WARGA MISKIN DI JAKARTA Ita Novita; M. Anif
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 9, No 1 (2012)
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (497.143 KB) | DOI: 10.36080/bit.v9i1.493

Abstract

There is a problem with the unavailability of information on grant management for supporting poor people in Jakarta. This information on grant should be in terms of information on location area, where the poor people will receive assistance, how much they need and the form of grant the poor people expected. Therefore, application of this information should be developed in order to support all application of the grant. The first important step is to develop a good modeling system which produces integrated application in order to avoid error in applying the system. The modeling system is using object oriented approach by using Unified Modeling Language (UML). This technique modeling system will be realized in the form of case study which is a system modeling for application of grant management for poor people in Jakarta. The result of this modeling system is only to get the database which further can be used for developing application software. The software used for this system modeling is Rational Rose Enterprise 2000.Keywords : Poor People, Systems Modeling, Giving Fund, Unified Modeling Language (UML)
PENGEMBANGAN APLIKASI TEXT RECOGNITION DENGAN KLASIFIKASI NEURAL NETWORK PADA HURUF HIJAIYAH GUNDUL M. Anif; Safitri Juanita; Ika Disja Afriyani
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 10, No 1 (2013)
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (418.305 KB) | DOI: 10.36080/bit.v10i1.508

Abstract

Technological character recognition or OCR (Optical Character Recognition) have had fairly rapid growth and many have been used. Although the text recognition programs are widely available, but the majority of these programs can only recognize the Latin alphabet. How to recognize Arabic characters are converted to text alphabet is still very rare. Though the existence of Arabic text recognition has many advantages, for example, for people who do not recognize the Arabic script, it can be used as an alternative way to learn. This text recognition application using Artificial Neural Network learning algorithms (ANN) which is backpropagation algorithm an effective character classification which described in this study. In this study, the application will be developed to recognize the character recognition of Arabic characters Hijaiyah bare particular letters and Arabic numerals. Algorithms presented in the program as a tangible example of OCR (Optical Character Recognition) will be implemented in the Java programming language (Java Programming Language). With a certain level of accuracy in operation, can be obtained results (output) character appropriate to the class learning formed through the "OCR Train". Once fully developed, the application will then be tested by establishing Hijaiyah characters and Arabic numerals which are stored as image / image. Then open the file with the appropriate type of artificial neural expected to recognize the text in images of text characters / images are tested.Keywords: Optical Character Recognition, Text Recognition, Java Language Programming, Artificial Neural Network, Backpropagation, Arab.
Sistem Pakar Untuk Mengidentifikasi Kerusakan Perangkat PABX Panasonic NS1000 Dengan A* Pathfinding Siswanto Siswanto; Helmy Ligaputra; M. Anif; Windu Gata; Basuki Hari Prasetyo
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 4 No 3 (2020): Juni 2020
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v4i3.1882

Abstract

Someone can be said to have the ability to handle damage to the Panasonic NS1000 PABX device and perform a configuration of at least 3 years or already have a certificate of competence and training. The problem to be investigated is the number of experts there is only one and can only identify 5 damage per day and 1 day there are 25 damage. PABX Panasonic NS1000 has 30 rules and 130 data symptoms of damage as its knowledge base. This Expert System is designed to identify damage to PABX Panasonic NS1000 mobile application-based applications using the A * (A star) pathfinding algorithm and the forward chaining method with the PHP (Jquery Mobile) programming language and the database using MySQL, as an application program used by PT. Mediatama Anugrah Citra to facilitate the process of troubleshooting and effective problem solving on target. The features in this expert system include the identification of problems, the identification process, up to the achievement of the goal state and solutions effectively, quickly and precisely, the user as the user or admin has its own login and access rights in identifying, entry and editing. In the programming case testing process it can be seen that the application of the A * Pathfinding algorithm with the heuristic function has proven ineffectively implemented in the expert system and the results of the UAT testing process, the respondents agree (above 91.23%) that overall the expert system helps the expert and can deduce damage to PABX devices correctly.
Peningkatan Kualitas Guru di Masa Pandemi Covid-19 dengan Pelatihan Aplikasi Quizizz Samsinar Samsinar; Safitri Juanita; M. Anif
ABDI MOESTOPO: Jurnal Pengabdian Pada Masyarakat Vol 4, No 02 (2021): Juli 2021
Publisher : Universitas Prof. Dr. Moestopo (Beragama)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (467.657 KB) | DOI: 10.32509/abdimoestopo.v4i02.1402

Abstract

Pada Maret 2020, Kementerian Pendidikan dan Kebudayaan mengeluarkan Surat Edaran (SE) terkait penerapan kebijakan pendidikan dalam masa darurat penyebaran Covid-19. SMP Negeri (SMPN) 3 Kota Tangerang menerapkan pembelajaran daring dengan menggunakan beberapa aplikasi seperti Whatsapp, google classroom, aplikasi zoom dan google meet. Namun dari 53 guru yang ada pada SMPN 3 belum semua guru menggunakan aplikasi ini secara optimal untuk mendukung proses belajar mengajar secara daring terutama menggunakan aplikasi kuis daring. Berdasarkan kondisi tersebut maka diperlukan kegiatan pengabdian kepada masyarakat berupa pelatihan membuat dan mengelola evaluasi pembelajaran bagi siswa secara daring dengan memanfaatkan aplikasi Quizizz. Tujuan dari kegiatan adalah meningkatkan kualitas guru selama pandemi Covid-19 dengan memberikan pengetahuan dan pengalaman kepada guru dalam membuat dan mengelola kuis secara daring. Berdasarkan hasil pre-test dan post-test disimpulkan bahwa kegiatan pelatihan dapat meningkatkan kemampuan guru dalam mengelola kuis online, serta berdasarkan hasil kuesioner yang diberikan kepada peserta diklat menunjukkan bahwa 52,9% peserta setuju bahwa materi pelatihan sesuai dengan kebutuhan pekerjaannya saat ini, 76.5% peserta setuju instruktur menguasai materi dengan baik, 70,6% peserta setuju bahwa instruktur menjawab pertanyaan peserta dengan jelas dan segera dipahami, dan 88.2% peserta setuju fasilitas penyelenggaraan workshop online berjalan dengan baik.
APLIKASI MONITORING PENGISIAN TENGKI MINYAK KELAPA SAWIT DENGAN SENSOR ULTRASONIK SEEDSTUDIO SEN136B5B Ujang Edi Joko Saputra; Siswanto Siswanto; M. Anif
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 9, No 2 (2012)
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (904.444 KB) | DOI: 10.36080/bit.v9i2.505

Abstract

The function of palm oil tank is to accommodate a clean palm oil before palm oil goes to end. The staff who fill the tank with palm oil should monitor and record every height of the oil collected in the tank. For controlling officers still do its job manually by looking at the height of the oil in the tank with a direct view into the air gauge written on the wall of the tank. And, in recording the statement was recorded manually using daily reports. The control and monitoring of plant operations conventionally has many limitations, especially regarding the quality and efficiency and operating system manually is inefficient and very difficult for the officer in recording the monitoring of the oil loading in the tank. Therefore, necessary selected the right technology and easy operation. This research is made to raise the issue, which is to create a tool for monitoring the systems and control the palm oil tanks which should has a height of 5 meters and a diameter of 2 meter, and height limit of the oil tank lip is 50 cm, which can be monitored and controlled automatically. This automatic recording of application integration will facilitate staff in maintaining the height of the oil palm in the tank at the level of the normal range. This application is made in Visual Basic 6.0 programming language and database Microsoft Access. As well as to the height of the oil tank and for continuous control will in the form of numbers that can be accurately accounted.Keyword : Monitoring, Recording Charging Tank, Palm Oil, AT Mega 8535, Ultarasonik Seeedstudio SEN136B5B
Sistem Pakar Untuk Mengidentifikasi Kerusakan Laptop Compaq Presario CQ42 Dengan Backward Chaining Windu Gata; Siswanto Siswanto; Gunawan Pria Utama; M. Anif
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 17, No 1 (2020)
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (815.328 KB) | DOI: 10.36080/bit.v17i1.1012

Abstract

Masalah yang akan diteliti adalah jumlah pakarnya hanya ada satu serta hanya bisa mengidentifikasi 6 kerusakan per hari dan 1 hari ada 30 kerusakan. Kerusakan laptop Compaq Presario CQ42 ada 30 aturan(rule) dan 300 data gejala kerusakan sebagai knowledge basenya. Sistem Pakar ini dirancang untuk mengidentifikasi kerusakan pada laptop Compaq Presario CQ42 sebagai program aplikasi yang dipakai oleh Nice Computer untuk mempermudah dalam melakukan proses troubleshooting dan problem solving yang efektif dan tepat sasaran. Sistem pakar ini dibuat dengan metode Backward Chaining dan algoritme Best First Search berbasis client-server dengan bahasa pemograman Java dan basis datanya MySQL. Sistem ini mempunyai berbagai fasilitas antara lain: identifikasi kerusakan, entry identifikasi, ubah identifikasi, entry kesimpulan, ubah kesimpulan, login untuk admin dan login untuk user. Pada proses uji kasus pemrograman dapat diketahui bahwa penerapan algoritme Best First Search dengan metode Backward Chaining terbukti efektif diimplementasikan dalam sistem pakar dan hasil proses pengujian dengan UAT, para responden setuju (di atas 91,23%) bahwa secara keseluruhan sistem pakar membantu pakar serta dapat menyimpulkan kerusakan Laptop Compaq Presario CQ42 dengan benar.
Pengamanan Data User Login dengan Algoritma Kriptografi Tea dan Notifikasi SMS Siswanto Siswanto; M. Anif; Ulil Abshor
Prosiding SISFOTEK Vol 2 No 1 (2018): SISFOTEK 2018
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (573.276 KB)

Abstract

Application of user login data security is designed to secure user login user data at PT. TELKOM Indonesia TBK, HSI Division in Minitools application containing data from customer's internet number. The security of user logni data is very vulnerable to the theft of various irresponsible parties that will impact on the manipulation of customer data in the Minitools application. These problems can be encountered by adding applications to prevent irresponsible parties from being able to read passwords from user login data in the database. In addition, by adding SMS notification feature to prevent irresponsible parties are free to use user login data to access and change customer data on Minitools application. In this paper the algorithm used in cryptography, the cryptography algorithm Tiny Encryption Algorithm (TEA). For SMS notification itself, built using Gammu module as a special software aids SMS Gateway, PHP, and also Wavecom GSM M1306B modem. The result of this cryptographic testing, password data can be secured in the form of text encrypted (ciphertext). With the application of data security user cryptographic login and SMS notification for this login system will make the information system more secure because the password will be encrypted and the authentication code to login to the application Minitools sent to the user's mobile number. From the experimental results, the average duration of the encrypt process is 0.08361488 ms and the duration of the descrypt process is 0.166120556 ms. For the average sms the duration is not more than 10 second.
Pengamanan File Audio Menggunakan Algoritma Kriptografi Blowfish Dan Pengujian UAT Siswanto; Farizal Dias Amsari; Basuki Hari Prasetyo; Wahyu Pramusinto; Gunawan Pria Utama; M. Anif
Prosiding SISFOTEK Vol 5 No 1 (2021): SISFOTEK V 2021
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (506.2 KB)

Abstract

The current problem at PT. Central Asia Insurance is data or information from meeting recordings that have been made without security so that the resulting data is leaked and can be published by unauthorized persons. This study aims to secure the results of the meeting in the form of audio that will be sent to the branch of PT. Central Asia Insurance using blowfish cryptographic algorithm and UAT testing. Therefore, I created an encryption application to secure the audio from the meeting at PT. Central Asia Insurance. The goal is to prevent irresponsible people from being able to know the results of the meeting directly because the Audio file has been encrypted. By making this application, it can guarantee the audio file of the meeting at PT. Central Asia insurance can be accepted by people who are entitled and have keys. The final result of this research is that this application is able to encrypt audio files with a maximum data size of 120 Mb. Based on trials carried out as many as 15 encrypted files, the encrypted file size becomes large with an average value of 12,009,507 bytes and an average encryption process time of 37.0 seconds while the decryption time is 52.2 seconds. So that the files obtained can be protected and can only be accessed by users who have a password lock. In the UAT test, a questionnaire with a Likert scale scale of 5. has been used. As a result, the respondents agree (above 91.23%) that the overall application of the blowfish algorithm to secure data files can be kept confidential.