Claim Missing Document
Check
Articles

Found 26 Documents
Search

Analisis dan Perancangan Sistem Mediation dengan Protokol Soap pada Web Service untuk Mengintegrasikan Antar Sistem Informasi yang Berbeda Platform Muhamad Femy Mulya; Nofita Rismawati
ULTIMA InfoSys Vol 8 No 2 (2017): Ultima InfoSys : Jurnal Ilmu Sistem Informasi
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1430.78 KB) | DOI: 10.31937/si.v8i2.665

Abstract

Web service is actually a collection of functions and methods contained on a server that can be called by the client remotely, then to call those methods we are free to use applications that will be created with any programming language that run on any platform. The existence of web service technology can bridge the technological differences of each source. The purpose of this system design is to build a mediation system that can integrate different information systems platforms, databases and functions, so that can communicate between systems. Software development methods used include three main parts of the method of analysis, design and literature study. Methods of analysis include the collection of data using samples, learning on existing systems, and analysis of the results of interviews aimed at the parties concerned. Design method using Unified Modeling Language (UML) approach. The result is a system-based mediation system design using the SOAP (Simple Object Access Protocol) protocol. Index Terms— Web Service, Mediation
Analisis Pemilihan Metode Quality Of Service Dengan Traffic Policing Dan Traffic Shaping Sebagai Pembanding Bandwidth Pada Cisco Router Internet Service Provider Nofita Rismawati; Muhamad Femy Mulya
ULTIMA InfoSys Vol 9 No 1 (2018): Ultima InfoSys : Jurnal Ilmu Sistem Informasi
Publisher : Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2474.874 KB) | DOI: 10.31937/si.v9i1.848

Abstract

Abstract— Bandwidth is a carrying capacity of data carriers on a network connection, using units of time in speed. The cost of bandwidth procurement is very expensive and if it is not set up with management and hardware support, good software or brainware will cause huge losses. Therefore, a quality service standard must be created in an Internet Service provider known as Quality of Service (QoS). On a Cisco Router there are several methods of Quality of Service configured in such a way that the bandwidth of an ISP can be restricted and well managed. Traffic Policing and Traffic Shaping are two methods of Quality of Service that are widely used and each has advantages and disadvantages in terms of technical and non technical. In this research will answer the use of the best Quality of Service method on Cisco ISP Router by using descriptive analysis through Quality of Service data analysis parameters. Index Terms— Bandwidth, Quality of Service
ANALISIS DAN IMPLEMENTASI DATA MINING MENGGUNAKAN ALGORITMA APRIORI UNTUK MENINGKATKAN PENJUALAN PADA KANTIN UNIVERSITAS TANRI ABENG Muhamad Femy Mulya; Nofita Rismawati; Raudha Rizky Alifi
Faktor Exacta Vol 12, No 3 (2019)
Publisher : LPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30998/faktorexacta.v12i3.4541

Abstract

Abstrak. Data Mining digunakan untuk ekstraksi informasi penting yang tersembunyi dari dataset yang besar. Dengan adanya data mining, maka akan didapatkan suatu permata berupa pengetahuan di dalam kumpulan data – data yang banyak jumlahnya. Pada penelitian ini akan dilakukan suatu analisa terhadap data dengan Data Mining menggunakan Metode Algoritma Apriori untuk meningkatkan penjualan di Kantin Universitas Tanri Abeng. Analisis ini diharapkan dapat membantu Penjual di Kantin Universitas Tanri Abeng untuk merencanakan strategi penjualan produk yang ditawarkan pada menu makanan yang dijual. Algoritma apriori adalah salah satu bagian dari analisis asosiasi, algoritma ini dipilih untuk menghasilkan suatu aturan asosiasi (association rule) dari hasil transaksi penjualan makanan di Kantin Universitas Tanri Abeng. Dalam menentukan aturan asosiasi (association rule), identifikasi item-item perlu dilakukan untuk mengkombinasikan beberapa menu yang mungkin dibeli oleh konsumen. Penentuan ini dimulai dari satu item hingga beberapa item, selanjutnya item set akan menghasilkan aturan asosiasi (association rule) dan nilai kepercayaan. Melalui perhitungan yang terkandung dalam aturan asosiasi (association rule), maka dapat disimpulkan bahwa hanya ada beberapa produk makanan yang dibeli dengan probabilitas tinggi dalam sampel transaksi penjualan makanan di Kantin Universitas Tanri Abeng. Dengan demikian, analisis asosiasi ini dapat membantu menyiapkan jenis stok makanan apa yang dibutuhkan di masa depan sehingga dapat mengurangi tingkat kehilangan makanan yang kurang diinginkan. Kata Kunci:Data Mining, Algoritma Apriori, Association Rule   Abstract. Data Mining is used for extracting important information that is hidden from large datasets. With data mining, you will get a jewel of knowledge in a large amount of data collection. In this study an analysis of data by Data Mining will be conducted using the Apriori Algorithm Method to increase sales at the Canteen of Tanri Abeng University. This analysis is expected to help sellers in the Tanri Abeng University Canteen to plan the sales strategy of the products offered on the food menu for sale. A priori algorithm is one part of the analysis of the association, this algorithm was chosen to produce an association rule from the results of food sales transactions at the Canteen of Tanri Abeng University. In determining the association rules, identification of items needs to be done to combine several menus that may be purchased by consumers. This determination starts from one item to several items, then the item set will produce association rules and trust values. Through the calculations contained in the association rules, it can be concluded that there are only a few food products purchased with a high probability in the sample of food sales transactions in the Canteen of the Tanri Abeng University. Thus, the analysis of this association can help prepare what types of food stocks are needed in the future so as to reduce the level of food loss that is less desirable. Key words: Data Mining, Algoritma Apriori, Association Rule
Analisis dan Perancangan Simulasi Enkripsi dan Dekripsi pada Algoritma Steganografi untuk Penyisipan Pesan Text pada Image menggunakan Metode Least Significant Bit (LSB) Berbasis Cryptool2 Nofita Rismawati; Muhamad Femy Mulya
Faktor Exacta Vol 12, No 2 (2019)
Publisher : LPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30998/faktorexacta.v12i2.3527

Abstract

Security and confidentiality of data is the central aspect of an information system so that it can only be accessed by the owner of the information or interested user. In sending data, without the existence of a technique of concealing important information, it will be very easy for people who do not have access rights/interests to know the contents of the information. Steganography is the art and science of hiding secret messages in other messages so that the contents of the secret message cannot be traced. In this study, steganography technic is implemented by using the Least Significant Bit (LSB) method, modifying less significant bits or the last bit in one byte of data by using text messages as a storage medium. The purpose of this study was to analyze and design an encryption and decryption simulation for the insertion of text messages in an image by using the steganography algorithm using the Least Significant Bit (LSB) method, so that it would secure the text messages sent by the sender to the receiver by inserting the text message into an image both in the format * .jpg, * .bmp and * .png. The software will be used to simulate steganography using free program (Open Source) Cryptool2  in order to describe the concepts of cryptography and cryptanalysis. Keywords: Steganography, Least Significant Bit (LSB), Cryptool2
Analisis dan Perancangan Sistem Personalisasi dan Monitoring SLA (Service Level Agreement) Berbasiskan NFC (Near Field Communication) Studi Kasus Akses Kontrol Vendor ke Perangkat Bts (Base Transceiver Station) Nofita Rismawati; muhamad femy mulya
Faktor Exacta Vol 11, No 4 (2018)
Publisher : LPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1315.364 KB) | DOI: 10.30998/faktorexacta.v11i4.2910

Abstract

NFC (Near Field Communication) is one of the communication technologies between the latest gadgets that use RFID (Radio Frequency Identification) systems to exchange data at close range, about 4 inches. NFC (Near Field Communication) technology, is the principle of standard wireless communication that allows two devices to exchange data when in a position close to one another. The purpose of this research is to analyze and design a personalization system for vendors by utilizing NFC (Near Field Communication) technology that can facilitate vendors to access the doors of BTS (Base Tranceiver Station) devices and at the same time help telecommunications operators in monitoring SLAs (Service Level Agreement) for every vendor who does troubleshooting directly to a BTS (Base Tranceiver Station) device, so that vendor performance can be monitored. In addition, it also helps interested parties (in this case, the telecommunications operator management) in evaluating the performance of a vendor. Key words: NFC, BTS, SLA
Analisis Dan Perancangan Simulasi Algoritma Paillier Cryptosystem Pada Pesan Text Dengan Presentation Format Binary, Octal, Hexadecimal dan Base64 Muhamad Femy Mulya; Nofita Rismawati; Dedy Trisanto
Faktor Exacta Vol 13, No 4 (2020)
Publisher : LPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30998/faktorexacta.v13i4.7429

Abstract

Abstrak. Setiap hari ratusan ribu orang yang berinteraksi secara elektronik, melalui media e-mail, e-commerce, mesin ATM ataupun telepon seluler. Peningkatan penyebaran informasi secara elektronik telah mengakibatkan ketergantungan yang meningkat terhadap kriptografi. Salah satu peranan dari kriptografi adalah untuk melakukan pengamanan data yaitu dengan menggunakan algoritma kriptografi. Algoritma paillier cryptosystem merupakan sebuah algoritma asimetris probabilistic untuk kriptografi kunci publik, algoritma paillier cryptosystem digunakan karena komputasi enkripsi dan dekripsi pada algoritma paillier cryptosystem cukup rumit, karena diperlukan dua kali operasi perpangkatan, satu kali operasi perkalian, dan satu kali operasi modulo. Dengan demikian tingkat keamanan algoritma paillier cryptosystem cukup baik. Tujuan dari penelitian ini adalah untuk menganalisa, merancang serta mengimplementasikan simulasi enkripsi dan dekripsi dari pesan text (berupa text writing maupun text file) menggunakan algoritma paillier cryptosystem dengan presentation format sebanyak 4 (empat) format yaitu, binary, octal, hexadecimal dan base64. Dengan demikian pesan text (berupa text writing maupun text file) akan lebih aman pada saat dikirimkan melalui email, sms maupun chatting dari pengirim ke penerima pesan. Adapun perangkat lunak (software) yang akan digunakan untuk membuat simulasi algoritma paillier cryptosystem ini menggunakan Cryptool2. Hasil penelitian menunjukkan bahwa presentation format binary menjadi yang tercepat untuk waktu (ms) proses enkripsi dan dekripsi, sedangkan Presentation format base64 menjadi yang terlama untuk waktu (ms) untuk proses enkripsi dan dekripsi. Kata Kunci: Kriptografi, Paillier Cryptosystem, Cryptool2  Abstract. Every day hundreds of thousands of people interact electronically, through e-mail, e-commerce, ATM machines or cell phones. The increase in the dissemination of information electronically has resulted in an increasing dependence on cryptography. One of the roles of cryptography is to secure data by using cryptographic algorithms. The paillier cryptosystem algorithm is an asymmetric probabilistic algorithm for public key cryptography, the paillier cryptosystem algorithm is used because the computation of encryption and decryption in the paillier cryptosystem algorithm is quite complicated, because it requires two power operations, one multiplication operation, and one modulo operation. Thus, the security level of the paillier cryptosystem algorithm is quite good. The purpose of this research is to analyze, design and implement simulation of encryption and decryption of text messages (in the form of text writing or text files) using the paillier cryptosystem algorithm with 4 (four) presentation formats, namely, binary, octal, hexadecimal and base64. Thus text messages (in the form of text writing or text files) will be safer when sent via email, sms or chat from sender to message recipient. The software that will be used to simulate the paillier cryptosystem algorithm uses Cryptool2. The results showed that the binary presentation format is the fastest for the encryption and decryption process time (ms), while the base64 presentation format is the longest for the time (ms) for the encryption and decryption process. Key words: Cryptography, Paillier Cryptosystem, Cryptool2
Expert System For Diagnosing Helminthic Disease In Children Using The Bayes Probability Technique Dedy Trisanto; Nofita Rismawati; Millati Izzatillah; Muhamad Femy Mulya
Journal of Information System, Informatics and Computing Vol 6 No 1 (2022): JISICOM: June 2022
Publisher : Sekolah Tinggi Manajemen Informatika dan Komputer Jayakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52362/jisicom.v6i1.817

Abstract

Worm disease or Ascariasis is an infection caused by the Ascaris lumbricoides worm that lives in the human body. Everyone is susceptible to this disease, but it is most common in children. Children who experience intestinal worms can be shown from a variety of symptoms from mild to those that interfere with the child's growth. This study aims to create a system that can adopt the knowledge of an expert who can provide users with diagnostic information such as from an expert regarding intestinal worms. The research uses the Bayesian Probability method. Bayes theorem is a method for generating parameter estimates by combining information from samples and other information that has been previously available. The expert system for diagnosing intestinal worms has been successfully implemented with a desktop-based application. The expert system can help the user get a diagnosis of the type of intestinal worms suffered according to the symptoms experienced.
Sistem Abensi Karyawan Berbasis Location Based Services (LBS) Menggunakan Platform Android Studi Kasus: PT.Noxus Ideata Prima Annisa Dayumi; Muhamad Femy Mulya
Jurnal SISKOM-KB (Sistem Komputer dan Kecerdasan Buatan) Vol 2 No 1 (2018): Volume II - Nomor 1 - September 2018
Publisher : Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract— As a company, PT. Noxus Ideata Prima is highly dependent on its human resources, as they are the main gear which moves the company. Based on said fact, employee scoring procedures are needed by the company to assess perfomances of each employee. one of considered factors which affect an employee’s perfomancesis attendance. Based on above statement, this research is conducted in order to increase effectivity and efficiency, and also modernizing the currently active manual employee attendance system to become an Android-based mobile application with Location Based System (LBS). The development of this system utilizes System Development Life Cycle (SDLC) method with waterfall model and developed in C# programming language, which also utilizes other important elements, including XML, JSON Data, RESTful API, and PostgreSQL. There are several main functions and features offered by the application, including attendance function for the employee to use after coming to the office, holiday-checking for the current year, and viewing reports of attendance of each employee which can be seen monthly, yearly, or as the data from previous year. Keyword: Attendance, Mobile Android, (Location Based System), C#
Analisis dan Perancangan Sistem Personalisasi dan Identifikasi Absensi Dosen Berbasis Smartcard Mifare Menggunakan Java Card Applet Nofita Rismawati; Muhamad Femy Mulya
Jurnal SISKOM-KB (Sistem Komputer dan Kecerdasan Buatan) Vol. 2 No. 2 (2019): Volume II - Nomor 2 - Maret 2019
Publisher : Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Smartcard is an invention in the field of IT that has simplified human life because it has many functions and capabilities to store data. The advantages of a smartcard are rewritable data, extensive data capacity, support for reading multiple data carriers (support for multiple tag reads), robust physicality and smart task. The purpose of this study is to analyze and design a system of personalization and identification for the attendance of lecturers by utilizing Mifare's smartcard technology using a java card applet that can facilitate the lecture attendance process on a campus. Besides that, it also helps interested parties (in this case, campus management) in evaluating the performance of a lecturer. This study uses the Prototype / Prototyping model research method with the Unified Modeling Language (UML) approach. The results of this study are a prototype design personalization system and identification of lecturer attendance based on Mifare smartcard technology using java card applets, as well as the results of testing the accuracy of prototype readings from the Mifare smartcard personalization and identification system with smartcard readers using Java card applets.
Analisi dan Simulasi Algoritma TEA (Tiny Encryption Algorithm) untuk Enkripsi dan Dekripsi Pesan Text menggunakan Cryptool2 Muhammad Femy Mulya; Nofita Rismawati
Jurnal SISKOM-KB (Sistem Komputer dan Kecerdasan Buatan) Vol. 3 No. 1 (2019): Volume III - Nomor 1 - September 2019
Publisher : Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (190.101 KB) | DOI: 10.47970/siskom-kb.v3i1.79

Abstract

The development of data and information technology and communication at this time is an important part of everyday human life. Along with the times, the human need for information is increasing. as the development of data and information technology that is increasingly advanced and developing, the internet can no longer guarantee to provide data that is safe enough for its users. Data is very important, so the accuracy of the data is needed in the decision making process. The importance of data values causes the availability of data security, so that data falls precisely and accurately on the right party. In this research a data security simulation will be designed using encryption and decryption methods using the TEA (Tiny Encryption Algorithm) algorithm. In the TEA (Tiny Encryption Algorithm) encryption process, this study uses 64 rounds, where each round consists of, addition, key & data substitution, and XOR. The purpose of this study is to analyze, design and implement TEA (Tiny Encryption Algorithm) algorithm in the form of encryption and decryption simulation of text messages (both text and text files), so that text messages (both text and text files) will be safer when sent via email from the sender to the recipient. Thesoftware that will be used to create a simulation of the TEA (Tiny Encryption Algorithm) algorithm uses Cryptool2, which is an Open Source program used to describe the concepts of cryptography and cryptanalysis. The test results prove that this simulation can secure text messages (both text writing or text files) with different character lengths and keys. The longer and larger the size of the text message (either text or text file) and the key, the longer it will take for the encryption process.