Claim Missing Document
Check
Articles

Found 40 Documents
Search

Perancangan Arsitektur Sistem Digital Signage secara Terpusat pada Negara Berkembang Rahmat Yasirandi; Andrian Rakhmatsyah; Ridhwan Alifudin
Techno.Com Vol 18, No 2 (2019): Mei 2019
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (341.182 KB) | DOI: 10.33633/tc.v18i2.2304

Abstract

Banyak hal yang mendukung para stakeholder di Negara maju lebih beralih ke sistem digital signage untuk urusan signage, salah satu yang paling berperan adalah efisiensi. Efisiensi manajemen konten dan pendistribusian konten adalah salah satu yang utama yang dimunculkan. Dengan penyesuaian kebutuhan dan sumber daya, Negara berkembang juga dapat mengimplementasikan dan merasakan dampak manfaat dari sistem ini. Penelitian ini bertujuan untuk memberikan rancangan arsitektur sistem digital signage secara terpusat yang tepat untuk Negara berkembang. Dengan harapan bahwa sistem yang dikembangkan memiliki kemampuan layanan dan memiliki tujuan yang tetap sesuai dari sistem digital signage itu sendiri. Terbukti dengan hasil evaluasi terhadap sistem yang dibangun dapat membuktikan hipotesa H0 dan hipotesa H1. Menyatakan bahwa sistem yang dibangun tetap memiliki kemampuan skalabilitas dan performasi yang baik, dengan dapat dilihatnya hasil RTT di setiap DS Client bernilai 0,09 detik ketika jumlah DS Client mencapai 20 unit. Begitu juga pada hasil throughput di setiap DS client bernilai 5.9 Mbps ketika jumlah DS Client mencapai 20 unit. Dimana dengan nilai 5.9 Mbps tersebut, telah memenuhi kebutuhan minimum bandwith untuk memberikan layanan distribusi konten berupa video hingga 1080p.
INFORMATION SECURITY POLICY AND SOP AS THE ACCESS CONTROL DOCUMENT OF PT. JUI SHIN INDONESIA USING ISO/IEC 27002:2013 Muhammad Sukmaji; Rahmat Yasirandi; Muhammad Al Makky
Jurnal Pilar Nusa Mandiri Vol 17 No 2 (2021): Publishing Period for September 2021
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33480/pilar.v17i2.2282

Abstract

PT. Jui Shin Indonesia as the research population is a company engaged in the ceramics, granite, and cement industry. The existence of important assets owned by the company can not be denied the threat that will occur in these important assets. The importance of a company's assets, then the company must maintain the security of assets with various efforts. The security that must be maintained in this study is the security of information related to accessing control of important assets of the company. The purpose of this research is to analyze and design policy documents and SOP (Standard Operating Procedure) access control related to information security. This is done to minimize the risk that occurs in important assets of the company. The method used in this study is the OCTAVE method as a method of identification against risks that will occur in important assets of the company and the FMEA method as a method of risk analysis against the risk that has been identified through the OCTAVE method. The final result of this study is the creation of policy documents and access control SOPs related to information security which refers to the ISO/IEC 27002:2013 framework that focuses on clause 9. Access Control. Based on the results of the study, the researchers received proposals for policy document-making and SOPs as much as, namely, 17 for policy document-making and 18 for the creation of SOP documents.
Analysis and Implementation of Microservice Architecture Related to Patient Drug Schedule Based on FHIR Standard Ariq Musyaffa Ramadhani; Andrian Rakhmatsyah; Rahmat Yasirandi
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 7, No 2 (2021): August
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/jiteki.v7i2.21169

Abstract

In several previous studies, smart devices have been developed to help improve a patient's medication adherence but have problems, namely data management that is not centralized and not integrated, so that mitigation is quite vulnerable. In this study, a platform was built that can manage data centrally and apply the FHIR (Fast Healthcare Interoperability Resources) health data standard. The main components used to implement the FHIR standard are resources and REST APIs. The resource is a data model that defines the structure and data elements that are exchanged. This data exchange is carried out on top of the REST API using the HTTP protocol. Platform testing uses positive/negative testing and stress testing methods to be able to see the performance of the platform. The test results show that the platform prototype can provide a response that is in accordance with the request given and has a very tolerant error value of 0% with a latency value of 3 to 22 seconds with a total of 100 to 130 users.
Bag Toss Game based on Internet of Education Things (IoET) for the Development of Fine Motor Stimulation in Children 5-6 Years Old Seiba Shonia; Novian Anggis Suwastika; Rahmat Yasirandi
EMITTER International Journal of Engineering Technology Vol 8 No 2 (2020)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v8i2.516

Abstract

The development of a child's motor skills starts when a child is 0 months old to 6 years old. In general, the development of motor skills divided into fine motor development and gross motor development. Fine motor development is a development that involves small muscles to follow certain movements. An example of a game activity to help stimulate small muscle development is the Bag Toss game. This game helps stimulate fine motor development by increasing eye coordination with the hand. In addition to the types of activities that boost fine motor development, it also requires the ability to monitor, record, and process the results of children's activities to assess and analyze the status of a child's fine motor development. In this study, we developed the Bag Toss game system that connected to the Internet of Things (IoT) platform. Bag Toss game has linked with a sensor that will record children's play activities. The results of recording data will be sent to the IoT platform to be processed and presented through the internet network. The implementation of IoT for educational purposes is known as the Internet of Educational Things (IoET). The system built will be tested in terms of functionality, reading accuracy and child assessment. The functionality of the system works 100% according to predetermined component functions, as well as for 100% successful reading accuracy for the scenario of throwing distances of 1 meter and 1.5 meters. In addition, the average delay time for every hole is 0.62 seconds. The delay value can still be tolerated and does not interfere with the game when the child assessment is conducted. The child assessment involved 4 children, the results obtained that 3 children are in the Well Development (BSH) stage and 1 child in Very Well Development (BSB) stage.
Multi-Factor Authentication Using a Smart Card and Fingerprint (Case Study: Parking Gate) Isa Mulia Insan; Parman Sukarno; Rahmat Yasirandi
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 2 (2019): September, 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2019.4.2.309

Abstract

Security is one of the considerations in the development of smart parking. In Indonesia, the most common authentication factor is using a smart card as an authentication factor at the gate. Using a smart card as an authentication factor has loopholes that can be misused. Accordingly, authentication system needs an additional factor (more than one). Authentication that uses more than one factor is also called Multi-Factor Authentication (MFA). However, the MFA applied to smart parking can still be misused. The cause of the MFA can be misused because the MFA cannot ensure the user's smart card. Therefore, we apply the MFA at the gate in smart parking using a two-factor authentication system on this research. These two factors are the smart card and biometric data (fingerprint). This authentication system can prove the hypothesis that if the smart card lost, the smart card cannot be used by other than the owner (H0) and the smart card whose data has been rewritten or cloned cannot be a threat to the system (H1). Proofing of this hypothesis is bypassing several attack scenarios. Thus, the security of the proposed parking gate system can be guaranteed.
Sistem Peringatan Dini Gempa Bumi Multi Node Sensor Berbasis Fuzzy Dan Komunikasi IoT Muhammad Aditya Tisnadinata; Novian Anggis Suwastika; Rahmat Yasirandi
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 2 (2019): September, 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2019.4.2.311

Abstract

Deteksi gempa bumi dapat diukur dengan menghitung percepatan gerakan atau getaran secarahorizontal dan vertikal, adanya Gelombang P (Primer) dan Gelombang S (Sekunder) menjadiindikasi akan terjadinya gempa bumi. Salah satu faktor yang dapat digunakan dalam mende-teksi dan menghitung kekuatan gempa bumi adalah dengan menghitung percepatan getaranyang terjadi secara horizontal dalam Gelombang P. Dengan memanfaatkan hal itu dapatdiketahui besaran gempa yang terjadi dan dapat memberikan peringatan secepat mungkinpada masyarakat. TeknologiInternet of Thingsmemungkinkan sistem untuk dapat membacadata dengan secara otomatis dan terus menerus tanpa perlu banyak melibatkan manusia.Dalam melakukan klasifikasi gempa bumi sistem ini menggunakan algoritmaFuzzy Logicyang memiliki karakteristik dapat mengolah informasi dengan cepat dengan kompleksitasrendah sehingga sistem dapat memberikan peringatan secepat mungkin. Dalam validasi datasistem menggunakan beberapa tingkat validasi yang terdiri dari server perangkat dan serverutama. Hasil daripada penelitian ini dalam 1000 kali percobaan, sistem dapat melakukanproses validasi dan klasifikasi dengan rata-rata kecepatan yang dihasilkan adalah 10 - 15detik untuk satu kali pengolahan data dengan tingkat akurasi hasil akhir pada skala SIGBMKG dengan rata-rata 81.8%.
Deteksi Lokasi Pencemaran Air Sungai Citarum berbasis IoT menggunakan Fuzzy Inference System Annisa Gustien Widowati; Novian Anggis Suwastika; Rahmat Yasirandi
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 3 (2019): December, 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2019.4.3.315

Abstract

Citarum merupakan sumber dari denyut nadi perekonomian Indonesia sebesar 20% total produksi industri Indonesia dan sumber dari 60% produksi tekstil nasional. Kegiatan produksi tersebut menimbulkan permasalahan lingkungan akibat pembuangan limbah rumah tangga dan industri yang tidak menggunakan Instalasi Pengolahan Air Limbah (IPAL) secara optimal. Salah satu kendala dalam mengatasi pencemaran air sungai Citarum adalah menentukan lokasi dengan tingkat pencemaran tertinggi. Untuk mendeteksi lokasi pencemaran diperlukan pemantauan air sungai Citarum dengan pengambilan data terus-menerus secara realtime dan pengklasifikasian tingkat pencemaran dibutuhkan. Solusi dari permasalahan pendeteksian lokasi pencemaran dapat dibangun dengan memanfaatkan teknologi Internet of Things (IoT) sebagai solusi pembacaan data secara terus-menerus dan realtime. Kebutuhan klasifikasi didalam sistem diterapkan dengan metode fuzzy inference system tipe Mamdani dengan sifat dasar aturan yang dapat ditafsirkan, intuitif dan banyak digunakan khususnya untuk mendukung pengambilan keputusan yang dengan tingkat akurasi yang tinggi. Hasil yang didapatkan dari pengujian berdasarkan skenario pengujian tingkat akurasi klasifikasi sistem yang telah dilakukan menunjukkan akurasi sebesar 92% dengan nilai toleransi error pada sistem sebesar 4% serta toleransi akurasi pembacaan data oleh perangkat keras sistem yang dibangun menunjukkan pH 3.94%, TDS 4.92% dan suhu 1.84% dari deteksi di lima lokasi sungai Citarum di Bandung Selatan.
Deteksi Lokasi Pencemaran Air Sungai Citarum Berbasis Internet of Things menggunakan Klasifikasi Naive Bayes Annisa Marwa Nursantoso; Novian Anggis Suwastika; Rahmat Yasirandi
Indonesia Journal on Computing (Indo-JC) Vol. 5 No. 1 (2020): Maret, 2020
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2020.5.1.317

Abstract

Keberadaan lebih dari 500 industri dan pemukiman untuk kurang lebih 5 juta penduduk yang menghasilkan sekitar 200 ton limbah perharinya dibuang ke sungai Citarum tanpa melalui proses instalasi pengolahan air limbah (IPAL), merupakan sumber utama dari pencemaran sungai Citarum. Upaya pemerintah terhadap Citarum telah dilakukan selama 5 tahun dalam berbagai bentuk program, namun hasilnya belum signifikan. Salah satu kendala dalam program, untuk menanggulangi pencemaran air sungai Citarum adalah tidak ada data informasi yang menunjukan tingkat pencemaran dan lokasi pencemaran. Untuk mengatasi kendala tersebut, diperlukan sebuah sistem yang mampu melakukan pembacaan secara terus menerus dan menentukan lokasi yang diindentifikasi sebagai sumber pencemaran. Sistem yang dibangun untuk mendeteksi pencemaran dan lokasi pencemaran berbasis IoT dan klasifikasi naive bayes. Metode naive bayes dipilih karena dalam teknik data mining yang menerapkan teori Bayes dalam klasifikasi dengan asumsiĀ  yang sangat kuat (naif) akan independensi dari masing-masing kondisi kejadian. Hasil penelitian menunjukkan penggunaan metode klasifikasi naive bayes pada proses klasifikasi pencemaran air sungai memiliki tingkat akurasi sebesar 96%. Hasil ini dapat diterima untuk akurasi klasifikasi.
Design of API Gateway as Middleware on Platform as a Service Dita Oktaria; Joel Andrew M. K. Ginting; Maman Abdurohman; Rahmat Yasirandi
Indonesia Journal on Computing (Indo-JC) Vol. 6 No. 3 (2021): December, 2021
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2021.6.3.597

Abstract

The process of building a platform is a process that consists of various stages, there is a focus of work and requires different preparation, but until now there has been no awareness in utilizing data and information sources that have been available to be used as a basis for developing or creating a platform that is able to improve quality a system of integrity. For this reason, a Platform as a Service (PaaS) architecture was built which provides application development services to process data and information obtained from practicum activities during the lecture period based on cloud computing using the Service Oriented Architectural (SOA) method. The API gateway is used as middleware system. The results of the implementation and analysis carried out prove that the architecture using the API gateway as a built-in middleware can be considered to develop the Telkom University lab service system. Although there are adjustments to resources and needs, but the purpose of this architectural development has generally been realized. From the results of tests performed on a platform architecture that uses a gateway API, it produces RTT 2.081 seconds, 45 MB memory, and 8% CPU for each user in 100 users.
IT Asset Assessment Using Quantitative Risk Analysis (QRA) Method at XYZ Cafe Rahmat Yasirandi; Emiya Fefayosa Br Tarigan
Indonesia Journal on Computing (Indo-JC) Vol. 6 No. 3 (2021): December, 2021
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2021.6.3.613

Abstract

Many companies are starting to invest in information technology (IT) assets to improve their business performance and services in this era. This includes modern cafes, which are becoming a promising business trend, especially if they have branches in various places. As with XYZ Cafe, IT Assets play an essential role in running the business. This research has succeeded in utilizing the Quantitative Risk Analysis (QRA) Method to perform calculations and tabulations for any potential risks. The results show the increase in the value of losses by 371.5% of the issued IT Asset investment capital, or 477,388,063 Rupiah. In detail, through Across Asset Analysis, Across Asset Value is at the top of the rank, namely Mini PC, with a loss value of 127,440,000 Rupiah. Through Across Risk Analysis, the Accidental Errors is in the first rank with a loss value of 184,038,000 Rupiah. This result implies that stakeholders can develop and plan mitigation actions to reduce potential losses for the company. Mitigation actions can be in the form of regulations, standard operating procedures (SOP), proposed monitoring applications, or strategic plan at top-level management so every threat and risk can be controlled and managed.