Claim Missing Document
Check
Articles

Found 9 Documents
Search

FORENSIK TEKNOLOGI INFORMASI PADA HOTSPORT AREA (Study Kasus pada HotSport Fatek Area) Haryono .; Rahmadya Trias H
PARADIGMA : JURNAL ILMU PENGETAHUAN AGAMA, DAN BUDAYA Vol 11 No 1 (2010): PARADIGMA : Jurnal Ilmu Pengetahuan, Agama dan Budaya
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat Universitas Islam 45

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Privacy and ease of information technology tend to make people depend on availability. Computer network system is attached day after day without compromise. These attacks are designed to steal personal identity, to disable the online presence of business, or to completely destroy sensitive information that is essential for personal or business goals. All of this is the responsibility of each organization to establish system that is safe enough to protect their own interests as well as those whosubscribe. Computer crime continues to, so does the need for professional computer personnel who are trained in dealing with computer crime forensics to gather digital evidence, in terms of applying the tools necessary security, and cooperate with law enforcement agencies. This research paper presents the design and implementation of an experiment and Computer Security Forensic Analysis (CSFA) laboratory and tools associated with it. Laboratory is expected to be a trainingfacility for computer security in the future
IMPLEMENTASI KEAMANAN VIRTUAL PRIVA TE NETWORK Haryono .
PARADIGMA : JURNAL ILMU PENGETAHUAN AGAMA, DAN BUDAYA Vol 9 No 1 (2008): PARADIGMA : Jurnal Ilmu Pengetahuan, Agama dan Budaya
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat Universitas Islam 45

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Intranet is an adoption of internet technology connecting local computer network to all computer networks in the world. Intranet is object to the attacks of computer system security. It implement a Virtual Private Network (VPN). A technique that can solve the broblem is by using Firewall. I It’s technology consist of three basic architectures: dual ported host, screened host, and screened subnet. By using one of thejirewall architectures, each computer system in the intranet computer network is secure from the attack. It will reduce the risk of Information System from Fault Accident.
TINJAUAN YURIDIS PERLINDUNGAN HUKUM TERHADAP NASABAH DALAM TRANSAKSI GIRO PERBANKAN DI INDONESIA Haryono .
Jurnal Surya Kencana Dua : Dinamika Masalah Hukum dan Keadilan Vol 3, No 2 (2016): Jurnal Surya Kencana Dua: Dinamika Masalah Hukum & Keadilan
Publisher : Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (192.296 KB) | DOI: 10.32493/SKD.v3i2.y2017.509

Abstract

Bank is a financial institution that plays a strategic role to promote the economy of a country. Indeed, in its development the banking sector plays a very important role in the economy of a country. Therefore, if the banking sector is experiencing a crisis, it will have an impact on the Indonesian economy.Keywords: Protection, customers, banking
PENERAPAN METODE PEMBELAJARAN BRAINSTORMING UNTUK MENINGKATKAN HASIL BELAJAR PESERTA DIDIK TENTANG PERENCANAAN JARINGAN PADA MATA PELAJARAN RANCANG BANGUN JARINGAN DI KELAS XI TIB SMK NEGERI 2 KOTA BOGOR Haryono .
JURNAL TEKNOLOGI PENDIDIKAN Vol 7, No 2 (2018)
Publisher : Prodi Teknologi Pendidikan Sekolah Pascasarjana Univ. Ibn Khaldun

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (250.355 KB) | DOI: 10.32832/tek.pend.v7i2.1220

Abstract

Penelitian ini beranjak dari fenomena yang terjadi di kelas bahwa rendahnya pemahaman dan hasil belajar peserta didik pada mata pelajaran Rancang Bangun Jaringan (RBJ)tentang Perencanaan Jaringan.Oleh karena itu seorang guru perlu mempertimbangkan strategi pembelajaran sehingga dapat meningkatkan hasil belajar peserta didik.Penelitian ini bertujuan: (1) Untuk mengetahui metode pembelajaran brainstormingdapat meningkatkan hasil belajar peserta didik tentang Perencanaan Jaringan Pada Mata Pelajaran Rancang Bangun Jaringan Di Kelas XI TIB SMK Negeri 2 Kota Bogor; (2) Untuk mendeskripsikanproses peningkatan hasil belajar peserta didik tentang Perencanaan Jaringan Pada Mata Pelajaran Rancang Bangun Jaringan sebelum dan sesudah menggunakan metode pembelajaran brainstorming di Kelas XI TIB SMK Negeri 2 Kota Bogor; dan (3) Untuk mengukur besarnyapeningatan hasil belajar peserta didik tentang Perencanaan Jaringan Pada Mata Pelajaran Rancang Bangun Jaringan sesudah menggunakan metode pembelajaran brainstorming di Kelas XI TIB SMK Negeri 2 Kota Bogor.Hasil penelitian ini menunjukkan bahwa dengan menggunakan metode pembelajaran brainstorming dapat menjadi variasi pembelajaran yang menyenangkan bagi peserta didik sehingga terbukti meningkatkan hasil belajar peserta didik di kelas XI TIB SMK Negeri 2 kota Bogor. Sebelum menggunakan metode pembelajaran brainstorminghasil belajar peserta didik hanya mencapai nilai rata-rata 66,72 kemudian terjadi peningkatan setelah menggunakan metode pembelajaran brainstorming menjadi 74,78 pada siklus 1 dan 79,08. pada siklus 2Dari uraian di atas peneliti menyimpulkan bahwa penggunaan metode pembelajaran brainstorming yang disesuaikan dengan materi pembelajaran dapat menciptakan situasi belajar yang menyenangkan sehingga terjadi peningkatan hasil belajar peserta didik. Oleh karena itu peneliti menyarankan agar penggunaan metode pembelajaran brainstorming disosialisasikan dan digunakan sebagai alternatif dalam pembelajaran di sekolah-sekolah di lingkungan Dinas Pendidikan Kota Bogor.
Pengaruh Pembelajaran Organisasi, Kepemimpinan, Lingkungan Kerja Terhadap Motivasi Pegawai Kecamatan Karimun Untuk Peningkatan Disiplin Kerja Pegawai Haryono .; Raden Richky Dwi Muhardin; Permana Tedjo .
Jurnal Manajemen Maranatha Vol. 11 No. 1 (2011)
Publisher : Universitas Kristen Maranatha

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (537.253 KB) | DOI: 10.28932/jmm.v11i1.44

Abstract

This research want to understand the influence of learning organization, leadership, a work environment against motivation clerk subdistricts karimun for an increase discipline of work employees. This research uses the approach of quantitative. The data used is data a primer that obtained from 65 of the respondents. The technique of the analysis that used is the path of analysis. There are the influence of being significant and markedly between variables of learning organization (X1), leadership (X2) and a work environment (X3) impact on motivation (Y1), Twhere obtained that the value of Tstatistic on each of exogen variable > Ttable of 1.99897. There are the influence of being significant and markedly between variables of learning organization (X1), leadership (X2), a work environment (X3) and motivation (Y1) have an effect upon discipline of work (Y2), where obtained that the value of Tstatistic on each of exogenous variable > Ttable of 1.99897. There are influences of being significant and markedly between variables exogenous with a variable endogenous, where the magnitude of the influence of obtained amounting to, 6629 or 66.29%. It is notice the magnitude of the influence of a whole exogenous variable against a variable endogenous amounting to 67.97% and the rest amounting to 32.13% caused by other variables.Keywords: Learning Organization, Leadership, A Work Environment, Motivation Work, Employees Work Employees Discipline
FORENSIK TEKNOLOGI INFORMASI PADA HOTSPORT AREA (Study Kasus pada HotSport Fatek Area) Haryono .; Rahmadya Trias H
PARADIGMA : JURNAL ILMU PENGETAHUAN AGAMA, DAN BUDAYA Vol 11 No 1 (2010): PARADIGMA : Jurnal Ilmu Pengetahuan, Agama dan Budaya
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat Universitas Islam 45

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Privacy and ease of information technology tend to make people depend on availability. Computer network system is attached day after day without compromise. These attacks are designed to steal personal identity, to disable the online presence of business, or to completely destroy sensitive information that is essential for personal or business goals. All of this is the responsibility of each organization to establish system that is safe enough to protect their own interests as well as those whosubscribe. Computer crime continues to, so does the need for professional computer personnel who are trained in dealing with computer crime forensics to gather digital evidence, in terms of applying the tools necessary security, and cooperate with law enforcement agencies. This research paper presents the design and implementation of an experiment and Computer Security Forensic Analysis (CSFA) laboratory and tools associated with it. Laboratory is expected to be a trainingfacility for computer security in the future
IMPLEMENTASI KEAMANAN VIRTUAL PRIVA TE NETWORK Haryono .
PARADIGMA : JURNAL ILMU PENGETAHUAN AGAMA, DAN BUDAYA Vol 9 No 1 (2008): PARADIGMA : Jurnal Ilmu Pengetahuan, Agama dan Budaya
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat Universitas Islam 45

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Intranet is an adoption of internet technology connecting local computer network to all computer networks in the world. Intranet is object to the attacks of computer system security. It implement a Virtual Private Network (VPN). A technique that can solve the broblem is by using Firewall. I It’s technology consist of three basic architectures: dual ported host, screened host, and screened subnet. By using one of thejirewall architectures, each computer system in the intranet computer network is secure from the attack. It will reduce the risk of Information System from Fault Accident.
Transfer Gaya Gambar Batik Menggunakan Neural Style Transfer dan Convolutional Autoencoder Celvyn Yulian; Handri Santoso; Ito Wasito; Haryono .
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 10 No 4 (2023): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v10i4.5573

Abstract

The challenge of neural networks to process visual art judgments like humans inspired Gatys et al and in 2015 they succeeded in creating neural style transfer (NST) that can transfer European artistic image styles to other images. At present, research related to NST has been widely conducted, but its use with a convolutional autoencoder (CAE) as one of the NN architectures capable of compressing NST output is still rare. This research intends to design an NST system with CAE as an additional architecture in charge of the compression process while maintaining the force transferred. As a substitute for European-style artistic images, batik is used as an original Indonesian artistic work. NST and compression images will be measured using structural similarity index measure (SSIM) evaluation metrics. The evaluation results showed that the system designed managed to get an average SSIM score of 0.67 out of 1 and an average value of storage size reduction ratio of 37.43% from the original size. Then, the survey showed that the quality of the compressed image was quite good with a score of 64.09% and the compressed image was quite usable in the field of work of each respondent with a score of 49.09%.
Sistem Pengenalan Emosi Menggunakan Autoencoder + CNN + Attention Mikhail Aresa Latumahina; Handri Santoso; Ito Wasito; Haryono .
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 10 No 4 (2023): JATISI (Jurnal Teknik Informatika dan Sistem Informasi)
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35957/jatisi.v10i4.5576

Abstract

In the Digital Transformation era, many businesses use technology in the form of Deep Learning which is used to change the way business is run, one of the methods used is Emotion Recognition. Emotion Recognition itself is part of Computer Vision, and computer vision tasks are usually done using the CNN algorithm. Accuracy is important in Emotion Recognition where many studies use various methods, both Transfer and Hybrid learning to try to improve this aspect, so this research intends to design a Autoencoder + CNN + Attention that can be used for Emotion recognition, which is made by combining Encoder, CNN, and Attention Mechanisms. this model is circumspect by using FER2013 and compared to the CNN + Attention model which is shutting down in the same way. Even though the Autoencoder + CNN + Attention managed to get 64% Accuracy in Evaluate Test_Model compared to CNN + Attention which got 55%, it should be noted that adjustments still have to be treated because of the 43% sensitivity of testing on external data such as tuning, layer adjustments, and FER2013 data augmentation.