cover
Contact Name
Achmad Solichin
Contact Email
achmad.solichin@budiluhur.ac.id
Phone
+628568198436
Journal Mail Official
bit@budiluhur.ac.id
Editorial Address
Jl. Ciledug Raya, Petukangan Utara, Jakarta Selatan, 12260. DKI Jakarta, Indonesia. Telp: 021-585 3753 Fax: 021-585 3752
Location
Kota adm. jakarta selatan,
Dki jakarta
INDONESIA
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur)
ISSN : 16939166     EISSN : 2685127X     DOI : http://dx.doi.org/10.36080/bit.v18i2.1618
JURNAL BIT (Budi Luhur Information Technology) merupakan Jurnal yang diterbitkan oleh Fakultas Teknologi Informasi, Universitas Budi Luhur dengan jadwal publikasi dua kali dalam satu tahun (April dan September). Jurnal BIT bertujuan sebagai media pertukaran informasi, pengetahuan mengenai pengembangan dan ilmu komputer serta keterkaitan dengan disiplin ilmu lainnya. Fokus dan Ruang Lingkup pada Jurnal BIT: System Engineering, Expert System, Decision Support System, Data Mining, Artificial Intelligence (AI), Computer Network, Computer Engineering, Image Processing, Genetic Algorithm, Information System, Business Intelligence dan Knowledge Management, Database System, Big Data, Enterprise Computing, Robotic, Internet of Things, Data Science, dan Topik studi lain yang relevan
Articles 11 Documents
Search results for , issue "Vol 19, No 1 (2022): APRIL 2022" : 11 Documents clear
Pengembangan Knowledge Management System Untuk Mengelola Pengetahuan Personel Pada Laboratorium Pengujian Slid Seameo Biotrop Zulkarnaen Noor Syarif; Mohammad Syafrullah; Devit Setiono; Irawan Irawan; Hendri Irawan
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 19, No 1 (2022): APRIL 2022
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/bit.v19i1.1837

Abstract

Knowledge of SOPs, documents, regulations, and experience is not well documented in the SEAMEO BIOTROP SLID environment to support the process of disseminating knowledge (knowledge) between employees in the SEAMEO BIOTROP SLID environment. Personnel experience and knowledge are lost when personnel are replaced, transferred, retired, or have expired personnel. At present, knowledge and experience in daily work accumulates in each personnel and is not documented in documents and systems, so it depends on each personnel. This research uses a methodology developed by Fernandez and Sabherwal. The results of this study are at the forefront of developing the knowledge management process. The knowledge management process developed at SLID SEAMEO BIOTROP is externalization, internalization, outreach for knowledge sharing, direction, routine, combination, socialization for discovery and knowledge sharing. Features created by a knowledge management system to support the knowledge management process consist of document management, knowledge management, discussion forums, and search capabilities. The prototype knowledge management system has been tested by SLID SEAMEO BIOTROP personnel using the user acceptance testing method and overall results are included in the evaluation criteria very well at the level of 84.51%.
Penerapan E-Commerce Berbasis Content Management System (CMS) Dengan Metode Business Model Canvas (BMC) Pada Toko Fajar Collection Muhammad Ircham Zamroni; Anita Diana; Dwi Achadiani
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 19, No 1 (2022): APRIL 2022
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/bit.v19i1.1725

Abstract

Fajar Collection is an individual business store that sells various products such as school uniforms, Muslim clothing, and casual clothes. In the existing business processes at Fajar Collection, using social media in the process of online sales transactions using Facebook and WhatsApp. However, with the online transaction business process, there are several obstacles experienced by the Fajar Collection store, namely, it is difficult for customers to find out stock availability, because there is no stock availability information on Facebook and WhatsApp, so customers have to ask the sales staff about stock inventory. Another obstacle is that the product promotion process is less than optimal, causing old products to be sold and slow to get new potential customers. Another obstacle is difficult in processing sales report data, because it is still done in bookkeeping by looking at sales notes to be included in the sales report, thus allowing different recordings of sales numbers and less than optimal in knowing sales data. Based on these constraints, an e-commerce website was designed using the Business Model Canvas (BMC) approach. Analysis of the strengths and weaknesses of the e-commerce business using the BMC methodology. The system was developed using the Unified Modeling Language (UML) approach and a Content Management System (CMS) based website with WordPress using the woocommerce plugin. Then it is optimized by applying Search Engine Optimization (SEO) so that the site is on the first page of search engines, making it easier for customers to find the site. With the E-Commerce website, it will expand product sales promotions, and help customers who want to buy directly from the website. It is hoped that by utilizing this E-Commerce website, it will be easier for customers to process the purchase transactions in Fajar Collection.
Sekuriti Teks Menggunakan Vigenere Cipher dan Hill Cipher Lekso Budi Handoko; Abdussalam Abdussalam
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 19, No 1 (2022): APRIL 2022
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/bit.v19i1.1790

Abstract

Keamanan data dalam sistem merupakan problem yang hingga saat ini membuat Peneliti terus mengembangkan keilmuan. kriptografi sebagai salah satu teknik keamanan data, khususnya pada dta teks melalui implementasi krptografi klasik. Pada penelitian ini telah diimplementasikan kombinasi vigenere dan hill cipher. Kedua algoritma merupakan algoritma yang mudah dalam implementasi, namun masing-masing memiliki kekurangan. Vigenere mudah dibrute force, sedangkan hill cipher pada proses dekripsi harus menggunakan kunci yang dapat dibali sehingga tidak semua kunci cocok untuk digunakan. Kombinasi Vigenere dan hill cipher telah diimplementasikan dan diuji coba menggunakan black box testing serta perhitungan Avalanche Effect. Pengujian menggunakan Avalanche Effect menghasilkan nilai rata-rata 52,46%.
Sistem Informasi Geografis Untuk Identifikasi Awal Tingkat Kerentanan Pencemaran Pada Lokasi Fasilitas Penampungan Produk Minyak Dan Gas Bumi Indah Crystiana; Taufan Junaedi
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 19, No 1 (2022): APRIL 2022
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/bit.v19i1.1791

Abstract

Construction of oil and gas product storage facilities is one of the oil and gas activities in the downstream sector. A common impact on the environment from oil and gas activities is in the form of pollution of land, water, or air, it is necessary to identify the level of vulnerability to pollution early, areas that are sensitive to pollution are the main concern. The results of the initial identification of the level of vulnerability to pollution are shown in the map of the level of vulnerability to pollution processed using a geographic information system using the method of interpolation, weighting, and overlapping. The results of the initial identification of the level of vulnerability to pollution at the location of the oil and gas product storage facilities are divided into 3 (three) classes of vulnerability levels, low, medium, and high. The study area is in a relatively medium to high level of vulnerability with a high level of vulnerability being near the sea, so it needs high attention in its management.
Model Matematika Panel Surya Satelit Komunikasi Orbit Rendah Ekuatorial Menggunakan Simulink Desti Ika Suryanti; Ahmad Fauzi
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 19, No 1 (2022): APRIL 2022
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/bit.v19i1.1792

Abstract

Solar cells or photovoltaic is a renewable energy source as a generator of electrical energy that is able to convert solar energy into electrical energy. Solar cells consist of series and parallel arrangement to form a solar panel. Solar panel technology is widely used, one of which is space technology, especially satellite technology. Solar cells use in satellites generates energy required for the satellite operation. To design the arrangement of solar cells based on the expected power and or the power produced, one of them is using mathematical modeling methods; The mathematical model of solar panels is developed and presented in this paper using the Matlab-Simulink GUI application. This mathematical model was developed using the basic circuit equations of a solar cell including the effects of solar irradiance and temperature changes. Based on the modeling, the output characteristic curve of the model is obtained according to the characteristics of each solar panel of the equatorial low orbit communication satellite. The power generated by the solar panel will increase when the solar irradiance increases at a constant temperature. When the temperature decreases and the solar irradiance remains constant, the output power and voltage increase slightly while the output current approaches a constant.
Implementasi Web Service RESTful dengan Autentikasi JSON Web Token dan Algoritma Kriptografi AES-256 untuk Aplikasi Peminjaman Laboratorium Berbasis Mobile pada Universitas Budi Luhur Gabriel Yoda Gustiegan; Painem Painem
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 19, No 1 (2022): APRIL 2022
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/bit.v19i1.1835

Abstract

Leasing the lab room is one of the services provided by the Integrated ICT LAB for every citizen of the Budiluhur University campus. So far in the process of borrowing the computer laboratory, the borrower must come directly to the Integrated ICT LAB or use social networks such as WhatsApp to communicate in two directions in making loans lab. This is not effective enough to serve borrowers who are usually lecturers. In the process of borrowing the lab, there are many problems, for example, the collision between lecture schedule and lecturer activity units, student activity units and other activities that require laboratory facilities. Seeing this problem, an application is needed to facilitate lab borrowing and coordination to the mobile-based ICT LAB Assistant. Meanwhile, for integration with existing systems a web service is required as a backend system so that lab lending services can be accessed by various platforms. The architecture used in the web service uses the RESTFUL API (Application Programming Interface), but there are still some problems with the RESTFUL API, namely regarding security in the process of authentication and data encryption on borrower data. In the REST architecture, a security method is needed, namely using the JSON Web Token and the Advanced Encryption Standard-256 (AES-256) cryptographic method. On the Web Services client side that provides requests and receives responses from the server then a token will be generated for the user which becomes plain data to be encrypted then saved to the database, and pulls the cipher data to be decrypted and returned to the calling application so that it can make transactions between platforms
Penggunaan Algoritma A-Star Untuk Strategi Penyebaran Pengunjung pada Pusat Belanja Lukman Hakim; Chyquitha Danuputri; Destriana Widvaninqrum
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 19, No 1 (2022): APRIL 2022
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/bit.v19i1.1836

Abstract

Shopping centers such as malls that have many tenants or shops make it difficult for many people to find the intended store and the distribution of visitors is uneven, the existence of maps or instructions makes it easy to find the target shop, Bay walk mall which has ± 100 shops with buildings which is quite broad, it should be noted how the deployment and navigation of store search is easier. This study uses the A-Star algorithm to find the shortest route, based on the destination store. Navigation application testing was conducted on Baywalk Mall visitors with a success percentage of 86.6%
Prediksi Cyberbullying Sebagai Alat Konseling Cyber Dengan Data Mining Classification Agus Pamuji; Heri Satria Setiawan
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 19, No 1 (2022): APRIL 2022
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/bit.v19i1.1789

Abstract

The growth of data and information has been growing rapidly while the users of information technology devices continues to increase. Moreover, the ease of access to information is supported by the presence of mobile communications technology virtually owned by each user. Currently, there is a significant increase in the number of users, which would be considered as having the opportunity for the presence of cyber crime, especially in the case of bullying. In this study, we have investigated and predicted the tendency of bullying by using a data mining approach. As for the analysis of the case studies presented and their technical implementation through a data mining approach, there are several techniques were carried out in the classification of three classes, namely no potential for bullying, violence and insults. Thus, three classes were detected based on the results of the investigation and several techniques were evaluated by utilizing a comparison of the performance of each technique. The final results will represent which techniques are the best performing and have bold factors that have a potential tendency to cyberbullying would have recommended as a follow-up for cybercounseling tools.
Pengembangan Knowledge Management System Berbasis Cloud Pada Kelas Karyawan Universitas Pramita Indonesia Hadidtyo Wisnu Wardani; Arief Wibowo
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 19, No 1 (2022): APRIL 2022
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/bit.v19i1.1757

Abstract

Knowledge Management System (KMS) is very important to manage knowledge and tacit to have added value for the organization, especially the Pramita Indonesia Employee Class, related to the routines of all employees in the work unit who are expected to provide solutions in solving problems that occur. With conditions that often occur at this time, knowledge and experience have not been documented, the socialization of standard operating procedures is not running properly and the tenure of employees is unknown so when there is a change of employees in the organizational structure, it will result in the loss of knowledge and experience possessed by an employee, confusion or incomplete information received to create misunderstandings between employees in communicating. Based on the results of research that are following the conditions that exist in the class work unit of Pramita Indonesia employees, the author tries to develop a KMS model. By using the Tiwana model framework, and the Becerra-Fernandez progress structure research methodology, as well as using the SECI Nonaka model development, to test the framework model using the Gathering Conversation (FGD) and Black Box Testing strategies, and using a Likert scale for scoring the system test results. , and the quality of the KMS software prototype is 72% with the Very Appropriate category, so the results show that the overall KMS prototype has been running well so that the proposed system can be used in managing knowledge to provide maximum service solutions efficiently and effectively
Cover Depan Vol. 19 No. 1 Atik Ariesta
Bit (Fakultas Teknologi Informasi Universitas Budi Luhur) Vol 19, No 1 (2022): APRIL 2022
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/bit.v19i1.1989

Abstract

Halaman Sampul dan Daftar Isi Vol.18 No. 2

Page 1 of 2 | Total Record : 11