This Author published in this journals
All Journal bit-Tech Abdi-Dharma
Claim Missing Document
Check
Articles

Found 5 Documents
Search

Rancang Bangun Sistem Otomatisasi Rumah Berbasis Internet of Thing Dengan Telegram Yohanes Prasetiya; Rino
bit-Tech : Binary Digital - Technology Vol. 5 No. 1 (2022): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i1.515

Abstract

The purpose of this research is to design an application to automate electronic devices so that they can turn on and off automatically and to create a home security application with access and proximity sensors in the form of RFID. The method used in this study is a home automation system based on the internet of things with telegram. The results in this study are that using an internet of things-based home automation system can improve home security with entry access. By using a home automation system based on the internet of things, it can make it easier to control home electronics through applications and the results of the answers to the questionnaire respondents are above 50% on average in choosing the answer "Agree". These results indicate that this application is easy to use and in accordance with user needs.
Perancangan dan Penerapan Metode K-Means untuk Memprediksi Penjualan Toko Arya Elektrik Michael Setiawan; Rino
bit-Tech : Binary Digital - Technology Vol. 5 No. 2 (2022): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i2.562

Abstract

In a shop, the product is a staple that is sold and bought. There are products in the store between products that sell well and products that don't sell. Given this problem, it is necessary to create a system that can classify products that sell, products that sell well, and products that don't sell well, which was carried out at the Arya Elektrik Store and carried out from March to July 2022. The K-Means algorithm is not affected by the order of objects used. used, this is proven when the author tries to randomly determine the starting point of the cluster center of one of the objects at the start of the calculation. The number of cluster memberships generated is the same when using another object as the starting point for the cluster center. However, this only affects the number of iterations performed. The purpose is to create applications and analyze product sales at the Arya Elektrik Store using the K-Means method. With this system, it can provide convenience benefits for analyzing the grouping of product sales at the Arya Elektrik Store, determining and classifying product sales that are selling well, very selling, and less selling. The method used to collect data is observation and interviews. With this application, shop owners can see the results of grouping these products. So, if there are products that don't sell well, shop owners can look for other alternatives so that products that don't sell can be sold.
Pelatihan Desain Slide dengan Canva Junaedi; Lianny Wydiastuty Kusuma; Yo Ceng Giap; Suwitno; Aditiya Hermawan; Rino; Benny Daniawan; Riki
Abdi Dharma Vol. 2 No. 2 (2022): Abdi Dharma: Keuangan, Manajemen persediaan, Perpajakan, Etika bisnis UMKM, Dig
Publisher : LP3kM Universitas Buddhi Dharma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31253/ad.v2i2.1737

Abstract

Perkembangan di era sekarang banyak sekali perubahan dari segi teknologi. Perkembangan teknologi ini meliputi desain grafis, pemrograman, aplikasi dan sebagainya. Hal inilah yang membuat penulis sebagai pendidik untuk melakukan pengabdian kepada masyarakat dengan cara melakukan sebuah workshop dengan tema “Pelatihan Desain Slide dengan Canva” yang bertujuan untuk memperkenalkan membuat sebuah desain pada slide presentasi dengan baik, rapih dan interaktif sebagai media penyampaian pembelajarannya. Pelatihan Desain Slide dengan Canva ini juga didukung oleh Universitas Buddhi Dharma sebagai tempat dilaksanakannya pelatihan ini. Para peserta dari Pelatihan Desain Slide dengan Canva ini diikuti oleh para romo dan rahmani dari Magabudhi Kota Tangerang. Hasil dari pelatihan ini akan di implementasikan dalam pembuatan presentasi sebagai media pembelajaran.
APLIKASI BUSINESS INTELLIGENCE PENAMPIL DATA OMSET PENJUALAN USAHA MIKRO KECIL MENENGAH MENGGUNAKAN ONLINE ANALYTICAL PROCESSING DENGAN METODE GROWTH RATIO BERBASIS WEB William Thomas; Rino
bit-Tech : Binary Digital - Technology Vol. 5 No. 3 (2023): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v5i3.558

Abstract

Micro, small and medium enterprises are businesses that are generally individually and are small business entities such as selling dumplings, fried bananas, even internet cafes and so on. This study aims to create a business intelligence application that displays sales turnover data for micro, small and medium enterprises using online analytical processing with a web-based growth ratio method that aims to help micro, small and medium enterprises by making application prototypes that can display data from sales results in various easy graphs. viewed and using the growth ratio formula method where the formula calculates the profit as a percentage and can be compared with the previous data. This application program is made for the public with the hope that micro, small and medium enterprises experience significant progress in profiting from their sales turnover Human-created applications were created to facilitate human needs and work ranging from lifestyle, health, security, entertainment, and others. In addition, we often also find several applications that have similarities with each other in various functions, appearance, and so on so that it spurs developers to have to work hard to develop these applications to attract the attention of website users by offering unique advantages and features that can be a differentiator from similar applications. The need for clear and precise information today is needed in everyday life in order to avoid false information or hoaxes. In addition, precise and accurate information can also be an important element that can influence developments in various aspects such as sales business, education, entertainment and so on at this time and in the future.
Pendeteksi Serangan Jaringan Komputer Menggunakan Metode Intrusion Detection System dengan Memanfaatkan Snort Berbasis Telegram Juan Adi Dharma; Rino
bit-Tech : Binary Digital - Technology Vol. 6 No. 2 (2023): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v6i2.943

Abstract

The constantly evolving of information technology landscape has made information security something of paramount importance, yet the development of information technology is not met with a corresponding advancement in its security systems. As a result, in the current era, there is a multitude of cybercrimes in the realm of the internet. Therefore, this research aims to create a computer network attack detector using the Linux operating system by leveraging the Telegram-based Snort application and employing the Intrusion Detection System (IDS) method through an IDS-based application, namely Snort. Additionally, this study incorporates features for blocking IP addresses and changing the Linux server password through the Telegram application for initial response when an attack is detected, accomplished by sending specific commands within the Telegram application. Furthermore, this paper also introduce a feature for categorizing the risk of computer network attacks into three categories: Low, Medium, and High within the Telegram application. The results of this research demonstrate that Snort can detect predefined rules and send alerts to the Telegram application for every attack occurring within the Wireless Local Area Network (WLAN). Successful IP address blocking is achieved through Telegram integration with the Iptables application, and changing the Linux server password is also accomplished through Telegram by integrating the bash shell programming language found in the Terminal of the Linux operating system. Finally, the risk of attacks can be viewed within the Telegram application.