Claim Missing Document
Check
Articles

Found 12 Documents
Search

PEMODELAN ARSITEKTUR ENTERPRISE MENGGUNAKAN ENTERPRISE ARCHITECTURE PLANNING UNTUK MENDUKUNG SISTEM INFORMASI AKADEMIK DI JURUSAN TEKNIK INFORMATIKA STMIK DARMAJAYA BANDAR LAMPUNG Zaidal, Nisar; Triloka, Joko
Jurnal Informatika Vol 8, No 1 (2008): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The way of determining information system form able to fulfil requirement of business and aligning with organizational business growth is to develop enterprise architecture. Enterprise architecture defines a process for organizing and directing information system development plan, what consist of data architecture, application architecture and technology architecture to obtain management commitments and support in integrated information system development implementation. Methodology being used in modelling this architecture is Enterprise Architecture Planning (EAP). EAP defines a process for enterprise architects that emphasize interpersonal skills and techniques for organizing and directing enterprise architecture project, obtaining management commitment, presenting the plan to management and leading the organization through the transition from planning to implementation. Research place taken as case study is Informatics Faculty at Business and Informatics Institute Darmajaya Business modelling phase is a process which create business model as representative form that defined business comprise of business function performed by enterprise. Business model used as a basic on define three architecture and making implementation plan. Result of modelling business function in Informatics Faculty at Business and Informatics Institute Darmajaya is defined counted 27 detail business function. Data architecture gets 23 data entities candidate and relationship among others. Application architecture obtains by 20 application candidate. While technological architecture yield conceptual network architecture and enterprise business system architecture.
Analisis Quality of Service (QOS) Jaringan Internet Untuk Mendukung Rencana Strategis Infrastruktur Jaringan Komputer Di SMK N I Sukadana Muhammad Purwahid; Joko Triloka
JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi) Vol 2, No 3 (2019): JTKSI
Publisher : JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (463.345 KB)

Abstract

Dari hasil analisis data terdapat beberapa faktor yang mempengaruhi hasil pengukuran dengan menerapkan Qos (Quality Of Service) pada jaringan Internet SMKN I Sukadana yaitu dengan parameter throughput, Dellay, Jitter, dan Paket Losses maka di tarik kesimpulan  bahwa parameter QoS( (Quality Of Service) yang terdiri dari parameter Bandwidth, throughput, dellay, jitter dan paket losses sangat berpengaruh terhadap kegiatan pembelajaran yang dilakukan di sekolah yaitu denangan pemanfaatan konten pembelajaran yang di akses lewat internet, sehingga membutuhkan koneksi yang baik. Dan penerapan QoS pada jaringan internet di SMKN N I Sukadana dengan menggunakan metode Simple Queue masih didapat nilai Throughput yang sangat buruk dengan indeks 0 berdasarkan standar TIPHON yaitu 77 Kbps dan indeks 2 pada Ruang Tata Usaha yaitu 367 Kbps, serta indeks 2 pada Ruang Admin Jaringan dengan Throughput 754 Kbps.
Pelatihan Internet Sehat Sebagai Antisipasi Cyber Bullying Anak Remaja di Panti Asuhan “Kemala Puji” Bandar Lampung KURNIA FADILA; Hary Sabita; Anandha Sartika Putri; Joko Triloka
Jurnal Pengabdian Masyarakat Madani Vol 1 No 2 (2021): Jurnal Pengabdian Masyarakat Madani (JPMM)
Publisher : Sekolah Tinggi Ekonomi Bisnis Syariah Bina Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (365.814 KB) | DOI: 10.51805/jpmm.v1i2.39

Abstract

The background of foster children in Kemala Puji orphanage are mostly from poor families, orphans, neglected, and homeless child. The institution have been serve, nurture, and empower by providing them a sufficient living. Hence, it still needs a better improvement. This is because these children deserve to be made for the next generation. This activity aims to rise of social care between humanity in adolescents, especially for children in the orphanage. This have been done by imparting knowledge to them about healthy internet. Moreover, its increases understanding how to use the internet more healthily, properly and to anticipate of cyber bullying against them. The outcome of training activities are the youth children have been understood how to use a healthy internet, and they have been sufficient skills how to use internet which was given during the training.
Silent Monitoring And Cyber Law Awareness Siswa SMK Trisakti Bandar Lampung Rionaldi Ali; Yuni Puspita Sari; R.Z Abdul Aziz; Joko Triloka; Sri Lestari
Jurnal Publika Pengabdian Masyarakat Vol 1, No 02 (2019): Jurnal Publika Pengabdian Masyarakat
Publisher : Institut Informatika dan Bisnis Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (446.494 KB) | DOI: 10.30873/jppm.v1i02.1975

Abstract

Pengabdian dengan judul “Silent Monitoring and Cyber Law Awareness” ini bertujuan untuk memberikan dampak positif bagi siswa pada sisi psikologis melalui sistem monitoring, yang akan membuat siswa merasa selalu terawasi meski tidak ada guru maupun orang tua di setiap aktivitasnya dimanapun ia berada. Sehingga perilaku siswa menjadi terdidik dan terbiasa dengan sikap dan akhlak seperti yang dicita-citakan oleh pendidikan nasional Indonesia. Sekolah mendapat dukungan besar dalam hal pengawasan terhadap siswa, serta dampak yang positif kepada sistem monitor yang sudah dimiliki oleh sekolah dengan dilengkapi pengawasan sampai pada tingkat per siswa setiap saat dengan diterapkannya aplikasi monitoring yang diberi nama Safe Minor dan workshop monitoring dan cyberlaw. Adapun hasil dari kegiatan PKM tersebut mampu meningkatan pemahaman mitra sebesar 90% terkait pengoperasian dan teknik penerapan aplikasi monitoring (Safe Minor). Kata kunci : silent monitoring and cyber law
Detection of SQL Injection Attack Using Machine Learning Based On Natural Language Processing Joko Triloka; Hartono Hartono; Sutedi Sutedi
International Journal of Artificial Intelligence Research Vol 6, No 2 (2022): Desember 2022
Publisher : International Journal of Artificial Intelligence Research

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (673.401 KB) | DOI: 10.29099/ijair.v6i2.355

Abstract

There has been a significant increase in the number of cyberattacks. This is not only happening in Indonesia, but also in many countries.  Thus, the issue of cyber attacks should receive attention and be interesting to study.  Regarding the explored security vulnerabilities, the Open Web Application Security Project has published the Top-10 website vulnerabilities. SQL Injection is still become one of the website vulnerabiliteis which is often exploited by attacker. This research has implemented and tested five algorithms. They are Naïve Bayes, Logistic Regression, Gradient Boosting, K-Nearest Neighbor, and Support Vector Machine. In addition, this study also uses natural language processing to increase the level of detection accuracy, as a part of text processing. Therefore, the main dataset was converted to corpus to make it easier to be analyzed. This process was carried out on feature enginering stage. This study used two datasets of SQL Injection. The first dataset was used to train the classifier, and the second dataset was used to test the performance of classifier. Based on the tests that have been carried out, the Support Vector Machine get the highest level of accuracy detection. The accuracy of detection is 0.9977 with 0,00100 micro seconds per query time of process. In performance testing, Support Vector Machine classifier can detect 99,37% of second dataset. Not only Support Vector Machine, the study have also revealed the detection accuracy level of further tested algorithms: K-Nearest Neighbor (0,9970), Logistic Refression (0,9960), Gradient Boosting (0,99477), and Naïve Bayes (0,9754).
BUSINESS MODELS FOR INTEROPERABLE IOT ECOSYSTEMS Joko Triloka
Prosiding International conference on Information Technology and Business (ICITB) 2020: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 6
Publisher : Proceeding International Conference on Information Technology and Business

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Internet of Things (IoT) was the solution on a huge number of the connected and specified “things” in the business field. Moreover, IoT companies also often transformed their applications for numerous industries. This transformation required cost strategies in designing service structures. This overview showed that the IoT ecosystem embraced the business models. The shareholders were still looking for the formula while the business ecosystems had a lack of various actors, business models, and business tools. Therefore, it was concluded that the IoT ecosystem were potential for the business models on condition that the interoperability and the interconnection of a system were well-prepared.Keywords: IoT, Interoperability, Business Model
Method for Detection and Mitigation Cross Site Scripting Attack on Multi-Websites Hartono Hartono; Joko Triloka
Prosiding International conference on Information Technology and Business (ICITB) 2021: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND BUSINESS (ICITB) 7
Publisher : Proceeding International Conference on Information Technology and Business

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Cross-Site Scripting (XSS) attack exploits scripting security bugs and issues on the website. XSS attack focuses and occurred on client browser application or frontend. It consists of three types of attacks: stored, reflected, and document object manipulation. The XSS attacks can cause fatal and dangerous problems, such as theft of user data, account takeovers, and illegal access to banking transactions or important data. Studies on XSS detection and mitigation have been carried out by some researchers, but it still leaves some problems, such as there is no connected mitigation to respond to the attack, using only a single-layer security mechanism and fewer payload data to test, weak measurement of the defense effectiveness from XSS attack, and the use of insufficient experiment and data testing. In addition, the method used in previous research still fails to solve all types of XSS attack. Most of the previous research also separates the method of attack detection and its mitigation. Therefore, this study proposes not only for detection but also for mitigation to overcome XSS attacks. The proposed method in this study is divided into two parts: detection and mitigation method. The proposed detection method is by using machine learning, based on lexical analysis. Then, the proposed mitigation method is the multi-layer security method which consists of five layers of the security. The proposed method has been structured systemati-cally and procedurally. In previous research, the partial methods proposed in this paper has been effectively implemented. There-fore, the proposed method is regarded as appropriate method to detect and mitigate XSS attack. Keywords—XSS, cross site scripting, mitigation system, machine learning, cyber-attack, lexical analysis
Membangun Jiwa Entrepreneurship pada Komunitas Dif_able melalui Pelatihan Kerajinan Sulam Maduaro Khas Lampung Muhammad Saputra; Kurnia Fadila; Joko Triloka
VIVABIO: Jurnal Pengabdian Multidisiplin Vol. 4 No. 2 (2022): VIVABIO:Jurnal Pengabdian Multidisiplin
Publisher : Sam Ratulangi University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35799/vivabio.v4i2.43184

Abstract

Membangun jiwa entrepreneurship pada komunitas dif_able melalui pelatihan kerajinan sulam maduaro khas Lampung. Tujuan kegiatan pengabdian ini adalah untuk menjadikan komunitas ini menjadi komunitas yang mandiri secara ekonomi dengan memanfaatkan kain sulam maduaro sebagai salah satu produk kerajinan unggulan yang dapat dijual kepada konsumen atau wisatawan berbasis kearifan local. Metode pendekatan yang digunakan dalam kegiatan ini meliputi pendekatan institusional, metode diskusi, pendekatan partisipatif, dan praktik. Kegiatan Pengabdian yang dilakukan menggunakan konsep POAC (Planning, Organizing, Actuating, Controlling) pada setiap elemen kegiatan sehingga kegiatan yang dilakukan berjalan dengan efektif dan efisien. Kegiatan pengabdian yang dilakukan berfokus kepada 3 (tiga) kegiatan diantaranya pelatihan kewirausahaan, pelatihan mengenai praktik langsung mengenai keterampilan sulam Maduaro, pelatihan pemasaran produk secara online. Setiap kegiatan yang dilakukan diukur dengan menggunakan pretest dan posttest sebagai acuan pemahaman setiap peserta kegiatan terhadap pelatihan yang diberikan.Pada hasil pretest untuk pelatihan kewirausahaan didapatkan nilai 41% dan hasil postest didapatkan nilai 93% hal tersebut menunjukan pengetahuan peserta kegiatan pada materi kewirausahaan. Pada hasil pretest untuk pelatihan sulam maduaro didapatkan nilai 43% dan hasil postest didapatkan nilai 91 %  hal tersebut menunjukan pengetahuan peserta kegiatan pada materi sulam maduaro meningkat. Pada hasil pretest untuk pelatihan pemasaran produk secara online didapatkan nilai pretest sebesar 45% dan hasil postest didapatkan nilai 92% hal tersebut menunjukan pengetahuan peserta kegiatan pada materi pemasaran produk secara online meningkat. Hasil kegiatan pengabdian yang dilakukan dalam pelatihan kewirausahaan menghasilkan luaran berupa peningkatan kemampuan komunitas Dif_able terkait dengan kewirausahaan serta rancangan bisnis model canvas. Hasil kegiatan pengabdian dalam pelatihan sulam maduaro, berupa hasil inovasi diantaranya handbag maduaro, hiasan dinding maduaro, gantungan kunci maduaro, peci maduaro. Hasil kegiatan pengabdian dalam pelatihan sulam maduaro, berupa hasil inovasi diantaranya handbag maduaro, hiasan dinding maduaro, gantungan kunci maduaro, peci maduaro.  Hasil kegiatan pengabdian dalam pelatihan pemasaran produk secara online, berupa website penjualan online yang terkoneksi dengan beberapa e-commerce dengan nama website sulammaduaroonline.com. 
DESAIN JARINGAN UNTUK MENDUKUNG RENCANA STRATEGIS DI SMK MUHAMMADIYAH 2 METRO Agung Wibowo; Joko Triloka
Aisyah Journal Of Informatics and Electrical Engineering (A.J.I.E.E) Vol. 5 No. 1 (2023): Aisyah Journal Of Informatics and Electrical Engineering
Publisher : Aisyah Journal Of Informatics and Electrical Engineering (A.J.I.E.E)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30604/jti.v5i1.179

Abstract

Kemajuan teknologi melalui penerapan internet diharapkan dapat mendukung dan meningkatkan mutu pendidikan, sistem e-learning telah banyak diaplikasikan oleh masyarakat dunia, dan menjadi tren pendidikan berbasis TIK, Jaringan hotspot yang terinstalasi di SMK Muhammadiyah 2 Metro saat ini masih menggunakan topologi Basic Service Set. Teknologi Wireleess LAN saat ini mayoritas menggunakan standar IEEE 802.11 a/b/g/n, standar yang akan digunakan dalam penelitian ini adalah 802.11n, Untuk mengatasi hal tersebut maka diterapkan hotspot dengan menggunakan topologi Extend Service Set, penelitian ini peneliti menggunakan metode analisis kualitatif deskriptif dengan menganalisis kondisi jaringan pada SMK Muhammadiyah 2 metro, alat yang digunakan dalam penelitian ini adalah Modem Huawei HG8245, Router Mikrotik seri RB 750 GR 3, Swith Layer2, Wi-Fi ubiquity unifi AP, Wifi Analizer, Laptop/Komputer, Controller Unifi Ap berdasarkan hasil penelitian ini diagnosa yang telah dilakukan yaitu manajemen jaringan dengan memperhatikan analisis QoS beserta teknologi jaringan wlan roaming. Dengan adanya teknology wireless roaming perangkat access point akan tersentralisasi menjadi satu kesatuan dan perangkat end user dapat terhubung dengan baik tanpa melakukan autentikasi ulang.
SOSIALISASI PENGGUNAAN APLIKASI ADUAN ELEKTRONIK MAKSIMUM KOMPLAIN (EMAK) PADA DINAS SOSIAL KABUPATEN PRINGSEWU Dwi Yana Ayu Andini; Zulkifli Zulkifli; Andi Mulyono; Panji Bintoro; M. Galih Ramaputra; Joko Triloka
Jurnal Abdimas Bina Bangsa Vol. 4 No. 1 (2023): Jurnal Abdimas Bina Bangsa
Publisher : LPPM Universitas Bina Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46306/jabb.v4i1.361

Abstract

The social service is a government agency tasked with improving the quality of social welfare for individuals, groups and communities. One of the mandates of the social service is the service of social complaints in the regions, especially in Pringsewu District. Currently the complaint system still uses a manual system. This caused an obstacle, namely the slow service of complaints, so EMAK (Maximum Complaint Electronic Application) was created to speed up and improve the handling of complaints related to the need for social services, especially in the administrative area of the Pringsewu social service. The methods used in the EMAK application are interview methods, observation methods and literature reviews. This application is designed with a simple layout to facilitate the use of social services manager, just enter according to the section, users can directly access the relevant application. The Emak application was developed to make it easier for social services to process information on public complaints