Browsing by Author "Rosita, Ai"
Now showing 1 - 10 of 10
Results Per Page
Sort Options
- ItemACCREDITATION MANAGEMENT: AUTOMATIC ASSESSMENT OF PUBLIC HEALTH CENTER ACCREDITATION BASED ON FACTS AND SURVEYOR ANALYSIS(Solid State Technology Volume: 63 Issue: 4, 2020) Rosita, AiHealth development is an important aspect in the national development framework. The purpose of carrying out health development is to increase awareness, willingness and ability to live a healthy life for everyone so that an optimal degree of public health can be achieved. The success of health development will greatly support the improvement of the quality and competitiveness of Indonesian human resources. First Level Health Facility Accreditation (FKTP) is an acknowledgment given by an independent accreditation agency established by the Minister of Health after meeting accreditation standards. The purpose of this study was to develop automatic scoring for Public health center accreditation and tStandard health center accreditation documents in districts / cities. In the automation process, the design uses a water mall approach.
- ItemANDROID DATA SECURITY USING CRYPTOGRAPHIC ALGORITHM COMBINATIONS(International Journal of Psychosocial Rehabilitation, Vol. 24, Issue 1, 2020) Hananto, April Lia; Priyatna, Bayu; Rosita, AiAndroid is a platform that is very vulnerable to hacked by bad people to steal users' data intentionally or unintentionally [1]. To deal with data disturbances it is necessary to use cryptography [2], one of which is Playfair Chipper. Playfair's cryptographic algorithms are currently being developed with various types of matrix table modifications, ranging from changes in matrix size, or changes in the encryption process steps. The results of applying the Playfair combination and modification algorithm with the Linear Feedback Ship Register (LFSR) for securing data on the Android platform. Testing the application of the results of the Playfair algorithm modification using the Avalanche Effect can be concluded that the resulting ciphertext has a high complexity.
- ItemBUSINESS DEVELOPMENT STRATEGY FOR LEATHER PRODUCT IN SUKAREGANG GARUT WITH BUSINESS MODELING CANVAS METHOD(Journal of Advanced Research in Dynamical & Control Systems, Vol. 11, 03-Special Issue, 2019) Rosita, Ai; Yustim, Benny; Heryono, HeriThe center of leather industry Sukaregang Garut is a collection of family business groups categorized as Small and Medium Enterprise (SMEs), the production of leather-based goods is a potential business for very high foreign exchange if managed with a good managerial. Inadequate supply of raw materials, lack of variety of raw materials, and supply of accessories that still rely on imported products, make the commodity leather products difficult to compete to enter the global market. The intense competition among craftsmen has become an obstacle for the price to be inevitable, resulting difficulty for craftsmen earning high prices. To overcome these obstacles required a management of production and comprehensive marketing to involving all elements of craftsmen and suppliers of new materials. Required analyse the right business process to find solutions from all existing problems. The Canvas business model is one of the business process model to find solutions needed for leather good production actors in Sukaregang as an effort to find the right solution by performing SWOT analysis on some business components that exist on it home industry.
- ItemTHE EFFECTIVENESS OF THE BRUTE FORCE ALGORITHM FOR PASSWORDS RECOVERY(International Journal of Psychosocial Rehabilitation, Vol.24, Issue 02, 2020) Sulianta, Feri; Zulpratita, Ulil Surtia; Rosita, AiSecurity problems, password theft, phishing websites, crackers, hacking threaten information ownership. Moreover, passwords with minimal durability which is considered as weak passwords become easy targets for crackers. There are so many method used to break the password for recovery lost. Every method has advantage and disadvantage, which is depend on condition and situation, including the characteristic of the password which is need to recover. Brute force is one of the oldest method to recover password, and still be used to recover the password for specific needs. In this research, the Brute Force method will be introduced as a method of recovering and breaking passwords. This method is easy to use in guessing passwords even though it takes longer because it is done by tapping a number of keywords. Thus computer users are more concerned about maintaining the confidentiality of passwords so as not to be easily broken down by others, because with a short time the password can be broken.
- ItemIMPLEMENTASI KERANGKA KERJA MDA PADA PEMBUATAN GAME “DARK SIZE OF THE MOON”(Seminar Nasional Pengaplikasian Telematika SINAPTIKA,Universitas Mercu Buana, 2015-09-26) Rosita, Ai; Falahah; Tri, Mohammad DimasPembuatan game, sebagai sebuah software, masih banyak dikerjakan secara non formal, tanpa mengikuti metoda atau kerangka kerja tertentu. Padahal, sama seperti halnya software, keberhasilan game sangat ditentukan oleh penggunanya (pemain game). Oleh karena itu dipandang perlu mengenalkan satu kerangka kerja formal pada pembuatan game. MDA (mechanics, dynamics, aesthetic) merupakan salah satu kerangka kerja formal pembuatan dan perancangan game yang memetakan hubungan persepsi antara pemain dengan pembuat game. Kerangka MDA kemudian diterapkan sebagai pendekatan dalam perancangan game “Dark Side of The Moon”, yaitu game yang bergenre runner dan berjalan pada lingkungan android. Melalui kerangka ini, dapat diidentifikasi latar belakang genre game, desain antarmuka yang dibuat, serta “tone” atau target kesan yang ingin dicapai oleh game tersebut terhadap para pemainnya.
- ItemINFORMATION SYSTEM SECURITY ANALYSIS AT PT. TELKOM USING KAMI INDEX(International Journal of Psychosocial Rehabilitation, Vol.24, Issue 02, 2020) Yuliani, SY; Heryono, Heri; Rosita, Ai; Zulpratita, Ulil Surtia; Angga Laksana, Eka; Sulianta, Feriby the development of information technology, it provides convenience way for every individual or institution to perform its duties and functions. Information security used by institutions must be maintained, yet they can manage and further they can avoid failure. Therefore it is important to assess the relevant institutions to determine the level of maturity and completeness of information security. The assessment carried out was by using the Information Security Index (KAMI) issued by the Ministry of Communication and Information that has fulfilled the requirements and aspects of information security that refer to ISO 27001. Currently, PT Telekomunikasi Indonesia (TELKOM) has implemented information technology. At PT TELKOM there are well-implemented access controls including security or supervision of important work locations (server room, archive space); only employees are given a username and password to access it and also have implemented security to detect and prevent network access usage (including network wireless).
- ItemINTEGRATED MODEL DEVELOPMENT OF HORTICULTURE AND FORECAST COMMODITY USING WEB BASED GEOGRAPHIC INFORMATION SYSTEM AND SMS GATEWAY TECHNOLOGY(The 4th International Conference on Information Technology for Cyber and IT Service Management (CITSM), Sunan Gunung Djati State Islamic University, 26 - 28 April, 2016) Sulianta, Feri; Rosita, Ai; Laksana, Eka AnggaAgro industries are the industry's most promising and holds great promise for farmers in Indonesia. However, there is a pile of problems in the agricultural industry in Indonesia, namely fluctuations in prices when the implementation of the harvest. These constraints caused by increased yields while consumer demand has not changed, as a result of certain commodity farmers suffered losses. The major causes of products instability is because lack of information for the amount of the supply needs of the crop for farmers. For this reason, information management of agriculture (E-Agriculture) utilizing simulation production forecasts by combining GIS technology and SMS Gateway will be modeled as a basis to solve the problems of agriculture in province of West Java, especially in the district of Bandung and Garut in regulating the balance of plant production horticulture.Simulation web based Geographic Information System (GIS) is developed by considering simulation components, GIS and SMS Gateway Technology, and Spatial Data Layer.
- ItemIntegration of Safety Management System with other systems in Aircraft Maintenance Services Companies in Indonesia(International Journal of Psychosocial Rehabilitation, Vol. 24, Issue 2, 2020) Rosita, Ai; Rahayu, Agus; Wibowo, Lili AdiOne of the determinants of the advancement of the aviation industry is the support of aircraft maintenance companies or Aircraft Maintenance and Overhaul (MRO). The airlines are very hopeful of MRO facilities in order to extend the life of the company's assets to ensure the availability of transportation services in the future. MRO services are very complex because they involve various processes whose performance depends on aircraft buildup and maintenance reliability, regulations, spare parts availability, and availability of certified human resources (Vieira & Loures, 2016). The number of incidents of civil aviation accidents is the biggest issue for the entire world community. both national and international flights. There are four main parts of the organization that are operational actors in the aviation world: Aircraft Operator Company, Air Traffic Control Organization, Airport Operations and Aviation Operations (Aviation & Regulation, n.d.). The implementation process of applying SMS to MRO companies was built with four main pillars, namely: Safety policy, Safety Risk Management, Safety Assurance and Safety Promotion media. The safety policy covers the concentration and commitment of the company's leadership to the implementation of the Safety Management System in an MRO, especially regarding the resources that must be provided by the leadership. Safety risk management includes monitoring of all ten potential hazards with conditions below the acceptable risk threshold. Safety assurance is a safety guarantee that is demonstrated by maintaining all potential hazard data below the permitted value threshold. Safety promotion is an activity carried out continuously by the company to enhance the safety awareness of all company employees
- ItemSAFETY AWARENESS IMPROVEMENT EFFORT THROUGH INTEGRATED SAFETY MANAGEMENT(Journal of Advanced Research in Dynamical & Control Systems, Vol. 11, 03-Special Issue, 2019) Rosita, Ai; Rahayu, Agus; Wibowo, Lili AdiRisk Management is an activity for analysing the fault within a sequence of task. The fault analysis of cycle task entities before the tasks is being performed. The failure occurred can be in form of inconsistency settlement time, insufficient cost (over budget), damage or destruction of property or the occurrence of accidents or incidents during the work process takes place. The Safety Management System is a method for managing and measuring the risk or potential hazard level in a work cycle and attempting to adjust the risk level down to an acceptable risk. Two aspects of risk value in safety management are severity risk and number of probability events. Risk management in the context of hazard control is an analysis job of every business process that exists in the company. The business process is illustrated by a turtle diagram modeling method in which it is equipped with various parameters of the safety management system in order to obtain a picture of the potential hazards in each of the existing business process units. It includes financial systems, production management, logistics management, production planning programs, and quality assurance. The integration of safety systems in each business process unit is monitored and controlled through a HIRA (Hazard Identification Risk Assessment) that contains the value of risk Probability and severity. The HIRA value will be controlled through a data entry mechanism in the form of hazard reporting of all the functions that run the business process. HIRA values are controlled in real time through a computer system so that aspects of risk reduction and any increase can be controlled transparently so that mitigation can be done earlier. Integrated safety management system is a distributed risk control effort that can be controlled and monitored jointly for all the functions of the organization.
- ItemSYNTAX ERROR ON WRITTEN LANGUAGE IN BIPA PROGRAM: A Study on Cambodian Students at Widyatama University Bandung, Indonesia(International Journal of Psychosocial Rehabilitation, Vol.24, Issue 02, 2020) Heryono, Heri; Zulpratita, Ulil Surtia; Yuliani, Sy; Rosita, AiBahasa Indonesia becomes one of the most favored language for foreigner, especially in Asia. Though the language has the similar root as Malay, Singapore and several South-east Asian countries, Indonesia attracts more to the foreigners within some reasons. The study of Bahasa Indonesia for foreigners is called BIPA, Bahasa Indonesia untuk Penutur Asing. This program has continually developed since the beginning of its appearance. Foreigners who come to Indonesia in various purposes, as traveling, business or even study in some institutions. One of the institution which accepted foreigners as their student was Widyatama University Bandung. They collaborated with NPIC (National Polytechnic Institute of Cambodia) to have a join degree program in 2017 (batch I) and in 2018 (batch II). Students tended to make some mistakes in learning process. The errors were attributable to their native language (Khmer) which was basically different with Bahasa Indonesia. During the learning process in BIPA Program, syntax error occurred especially in written language when they sent information through social media (instant messaging), such as WhatsApp or Line. The research was conducted in Widyatama University during a four-month-program. The research focused only in Syntax level and This study was qualitative research in the form of case study.