14 research outputs found

    HAVERSINE FORMULA UNTUK MEMBATASI JARAK PADA APLIKASI PRESENSI ONLINE

    Get PDF
    Sistem presensi yang ada di suatu perguruan tinggi umumnya dilakukan secara konvensional dengan membubuhkan tandatangan pada lembar presensi, atau menggunakan id card, namun banyak permasalahan yang terjadi seperti pemalsuan tandatangan maupun id cardnya hilang. Penelitian ini bertujuan untuk mengatasi permasalahan presensi tersebut dengan membuat aplikasi presensi online menggunakan smartphone dan menggunakan fitur GPS, untuk membatasi area lokasi proses presensi digunakan rumus harvesine. Dengan penerapan harversine formula, hasil penelitian ini sistem mampu mendeteksi lokasi dan menghitung jarak sebagai pembatas toleransi presensi. Dengan menghitung nilai garis bujur dan lintang, sehingga presensi hanya dapat dilakukan pada jarak tertentu saja.     Kata kunci : GPS, Haversine formula, Online, Presensi

    IMPLEMENTASI QUICK RESPONSE (QR) CODE PADA APLIKASI PRATINJAU KONTEN KOMIK CETAK

    Get PDF
    Indonesia menduduki peringkat kedua di dunia untuk jumlah pembaca komik dengan nilai rata-rata seseorang membaca 3,11 buku komik, atau sekitar 3 buku per orang. Indonesia berada di bawah Finlandia sebagai pembaca komik terbanyak dengan jumlah rata-rata satu orang membaca hampir empat buku komik. Dibalik tingginya jumlah pembaca komik di Indonesia, ada masalah pada komik baru. Calon pembaca ingin tahu seperti apa konten yang tersaji di dalam komik yang akan dibaca, tetapi tidak bisa melihat-lihat isi komik atau meninjau terlebih dahulu isi komik yang masih baru karena komik tersebut selalu disegel atau dibungkus dengan plastik. Apabila calon pembaca membuka segel komik tersebut, maka komik itu harus dibeli. Tujuan penelitian ini menyediakan fasilitas dalam mengelola konten pratinjau komik dan memudahkan calon pembaca untuk mengakses pratinjau dengan implementasi QR code. Hasil dari penelitian ini yaitu calon pembaca dapat mengakses pratinjau komik dengan memindai QR Code pada komik, kemudian path URL muncul dan mengarahkan calon pembaca ke halaman pratinjau komik secara online

    Stateless Authentication with JSON Web Tokens using RSA-512 Algorithm

    Get PDF
    Today's technology needs are getting higher, one of the technologies that continues to grow now is Web Service (WS). WS can increase service flexibility on a system. However, security at WS is one of the things that needs attention. One effort to overcome this problem is JWT (JSON Web Token). JWT is one of the authentication mechanisms in WS, with a standard signature algorithm, HMAC SHA256, RSA-256 or ECDSA. In this research we will discuss the performance of JWT RSA-512 which is implemented on SOAP and RESTful. Because based on previous research the speed performance of the 512-bit algorithm is better, but it is not yet known if applied to JWT. The test results show that the speed of the JWT RSA-512 token on the RESTful process is superior to 24.69% compared to SOAP. Then the speed of the authentication of JWT RSA-512 tokens, RESTful is superior to 11.64% compared to SOAP. Whereas in testing the size of JWT RSA-512 generated tokens, RESTful is only 1.25% superior to SOAP.Today's technology needs are getting higher, one of the technologies that continues to grow now is Web Service (WS). WS can increase service flexibility on a system. However, security at WS is one of the things that needs attention. One effort to overcome this problem is JWT (JSON Web Token). JWT is one of the authentication mechanisms in WS, with a standard signature algorithm, HMAC SHA256, RSA-256 or ECDSA. In this research we will discuss the performance of JWT RSA-512 which is implemented on SOAP and RESTful. Because based on previous research the speed performance of the 512-bit algorithm is better, but it is not yet known if applied to JWT. The test results show that the speed of the JWT RSA-512 token on the RESTful process is superior to 24.69% compared to SOAP. Then the speed of the authentication of JWT RSA-512 tokens, RESTful is superior to 11.64% compared to SOAP. Whereas in testing the size of JWT RSA-512 generated tokens, RESTful is only 1.25% superior to SOAP

    Application of the Finite State Machine Algorithm on 2D Platformer Rabbit Games vs Zombies

    Get PDF
    This research develops Android games by applying the FSM Algorithm (Finite State Machine) for the movement of NPC (Non-Player Character) to produce dynamic movements. The popular and legendary game with the appearance of side scroller is Super Mario Bross and Shovel Knight, the game is the most preferred game of its time to the present, but the game does not apply AI (Artificial Intelligence) so the game seems less challenging. The game is a concept game that is currently rarely used. Based on this, a side scroller-based survival game was created by implementing AI on NPCs on the Android platform. The AI used is the FSM Algorithm which functions to regulate enemy movements. The method used in developing multimedia products of this game uses MDLC (Multimedia Development Life Cycle). Based on the tests that have been carried out, the alpha test results are functionally appropriate and the results of beta testing using UserAcceptence Test (UAT) obtained a value of 86.40% which is declared feasible to use and can be developed. The advantages of this game are the presence of shock elements in the form of landslides, bursts of water, rock rain, and attacks by eagle

    Designing UI/UX For SDN 1 Sukamulya Ciamis Website Using the Five Planes and WEBUSE Methodologies

    Get PDF
    The web-based information world is currently experiencing rapid growth, encompassing interactive, dynamic, and static elements, with educational institutions being one of its prominent users. It provides swift and precise information services, contributing significantly to the fundamental development of the education sector. The school profile website from the Ministry of Education and Culture (KEMENDIKBUD) currently only provides basic profile features. Due to the lack of information and features on the website, a redesign and further development are necessary. Therefore, this research, based on interviews with relevant parties such as SDN 1 Sukamulya, calls for a redesign and development of the website. The approach taken in this redesign and development utilizes the Five Plans method. The creation of a website that aligns with user preferences, combines an attractive design, and offers an experience that meets user needs. The design and development of this website will be evaluated using the WEBUSE method. WEBUSE (Web Usability Evaluation) is a method for assessing the extent of usability based on a comprehensive usability criteria questionnaire. In the UI/UX design phase, the Five Planes method was applied, and after the design phase, the website's feasibility was assessed using the WEBUSE method. This research successfully designed a website for SDN 1 Sukamulya by applying the Five Planes method in the design process. Based on the comparison of evaluations using the WEBUSE method, the usability score of the website improved from a usability score of 0.657, falling into the "good" range (0.6 - 0.8), to a usability score of 0.829, falling into the "excellent" range (0.8 - 1). This score indicates that the website's usability level is excellent, demonstrating that the design and development efforts have successfully provided an outstanding user experience

    Sistem Pendukung Keputusan dengan Metode Simple Additve Weighting (SAW) untuk Prediksi Anggaran Biaya Wisata

    Get PDF
    Memprediksi anggaran perencanaan biaya wisata merupakan salah satu aktivitas yang harus dilakukan sebelum melakukan perjalanan wisata, sehingga kegiatan perjalanan wisata tidak mempengaruhi stabilitas keuangan dan anggaran tersebut dapat digunakan sebagai referensi untuk melakukan tour berikutnya. Pembuatan prediksi anggaran biaya perjalanan wisata tidak mudah dilakukan dan membutuhkan pertimbangan beberapa faktor, serta melibatkan proses perhitungan. Agar prediksi akurat dari anggaran biaya perjalanan wisata dapat dilakukan, diusulkan untuk menerapkan sistem pendukung keputusan menggunakan metode Simple Additive Weighting (SAW). Algoritma SAW digunakan dalam penelitian ini karena dapat memberikan alternatif prediksi anggaran perjalanan terbaik berdasarkan peringkat informasi anggaran yang ada. Hasil percobaan pada penelitian menunjukkan bahwa, penerapan metode SAW dengan menggunakan 3 parameter (total biaya anggaran, lama liburan, jumlah orang) serta proses penyaringan (filterisasi) pada data anggaran yang telah tersimpan berdasarkan parameter tujuan objek wisata, dapat memberikan alternatif prediksi anggaran perjalanan wisata terbaik

    Data Integrity Testing of Digital Evidence Data Capture Results on Private Cloud Computing Services

    Get PDF
    Private Cloud has better advantages than other cloud services because private cloud is managed and run by the company itself so that cloud needs can be tailored to the company's needs, but allows abuse from within the company itself, as in the case study simulation of a Gojek startup company. This case occurred because of a security weakness in the system so that internal people took advantage of these weaknesses for their own benefit by leaking confidential data, acquisitions were carried out to prove and find evidence of crime, acquisitions used live acquisition techniques, namely acquisitions on an ongoing system, namely monitoring network traffic using Wireshark tools , the method in this case uses the Digital Forensics Investigating Framework (DFIF), data integrity must be properly maintained when acquiring digital evidence because to maintain the authenticity of the digital evidence obtained, then data integrity is tested on the digital evidence obtained, testing is carried out on digital evidence before and after the acquisition to see if there is a change in data integrity, the research results show that there is no change in data integrity

    Reverse Engineering untuk Analisis Malware Remote Access Trojan

    Get PDF
    Para hacker menggunakan malware Remote Access Trojan untuk merusak sistem kemudian mencuri data para korbannya. Diperlukan analisis mendalam mengenai malware baru-baru ini karena malware dapat berkamuflase seperti sistem tidak dicurigai. Penggunaan teknik basic analysis sangat tergantung pada perilaku malware yang dianalisis, analisis akan sulit ketika ditemukan malware baru yang menggunakan suatu teknik baru. Reverse engineering merupakan salah satu solusi untuk melakukan analisis malware karena menggunakan teknik reverse engineering kode pada malware dapat diketahui.  Malware Flawed ammyy ini merupakan software yang disalahgunakan dari Ammyy Admin versi 3 oleh hacker TA505. Penelitian ini bertujuan untuk bagaimana alur untuk melakukkan identikasi malware kususnya malware RAT dengan teknik reverse engineering dan tools yang bias digunakan. Penelitian ini menggunakan metodologi deskriptif,. Hasil dari penelitian menunjukan bahwa alur untuk melakukan reverse engineering dan tools yang dapat digunakan.

    Analysis Malware Flawed Ammyy RAT Dengan Metode Reverse Engineering

    Get PDF
    Malware is currently growing rapidly, diverse and complex. But, human resources that can carry out malware analysis is limited, because special expertise is needed.Reverse engineering is one of many solution that can carry out malware analysis, because reverse engineering techniques can reveal malware code. On March 5, 2018, found spam email containing files, the file contained malware flawed ammyy. This flawed ammyy is a software that comes from Ammyy Admin version 3 and then misused by hackers TA505. This study aims to identify the malware, especially the Flawed Ammyy RAT malware. This research uses descriptive methodology, then to do malware analysis used dynamic analysis and reverse engineering methods. The results of the study show that the Flawed Ammyy RAT malware works by hiding in the Ammyy Admin application then connecting to the attacker with ip address 103.208.86.69. netname ip address 103.208.86.69 is zappie host. There are 50 registry changes that are carried out by malware on infected systems. After the attacker has been connected with the victim, the attacker can easily do the remote control without the victim's knowledge. </strong

    Pelatihan Pembuatan Pupuk Dari Pembalut Wanita Plus Cairan MOL Limbah Sayuran Pasar Cikurubuk Untuk Santri Pondok Pesantren Al-Mubarok Tasikmalaya

    Get PDF
    Potensi Pondok Pesantren dengan jumlah 600 santriwati sangat besar , tetapi ketika pengelolaan limbah pembalut wanita tidak dilakukan secara baik dan benar akan menjadi persoalan. Di sisi lain limbah sampah sayur dan buah pada pasar Cikurubuk Tasikmalaya belum dimanfaatkan sebagai pupuk cairan MoL merupakan peluang yang dapat dimanfaatkan secara industri kecil atau menengah. Kedua masalah tersebut diberikan solusi antara lain pemanfaatan bahan yang terkandung dalam pembalut wanita digunakan sebagai bahan campuran media tanaman , sedangkan Limbah Sayur dan buah dimanfaatkan sebagai bahan untuk pupuk cair organik yang dikenal dengan Mikro Organisma Lokal (MoL). Sosialisasi solusi keduanya dilakukan pada lingkungan pondok pesantren Al Mubarok Tasikmalaya.  Pengelolaan limbah pembalut wanita dan limbah sayur dan buah jika dilakukan dengan baik dan benar akan membawa manfaat baik secara langsung ataupun tidak dan pelatihan ini merupakan pembekalan dasar bagi santriwati jika kembali ke daerah masing-masing dapat menularkan ilmu tentang pengelolaan limbah tersebut
    corecore