input form
Recently Published Documents


TOTAL DOCUMENTS

43
(FIVE YEARS 12)

H-INDEX

5
(FIVE YEARS 0)

JURNAL WIDYA ◽  
2021 ◽  
Vol 2 (2) ◽  
pp. 129-145
Author(s):  
Arie Purwanto ◽  
Verdi Yasin ◽  
Rachmawaty Haroen
Keyword(s):  

Kemajuan teknologi informasi pada zaman sekarang sangat penting dan banyak di butuhkan tidak terkecuali pada rumah sakit. Pada bagian teknisi instalasi atau admisi rekam medik, karena berpengaruh untuk jalan nya operasional rumah sakit yang mengutamakan nyawa pasien, Installasi perangkat atau masalah pada sistem atau aplikasi sering terjadi , dan oleh sebab itu untuk memperbaiki masalah tersebut secara realtime sangat di butuhkan Sebuah Sistem untuk penanganan yang di lakukan oleh IT Helpdesk yang bertujuan untuk komunikasi secara cepat, pengajuan keluhan dengan sigap pada jika ada kendala dan perbaikan pada aplikasi,. Pada aplikasi Helpdesk ini Jika User Ada keluhan atau meminta bantuan untuk intsall perangkat, kemudian yang aka di lakukan adalah input form pengajuan keluhan pada aplikasi yang akan di cek oleh teknisi. Dan  apabila pengajuan yang berubpa no tiket pada aplikasi telah di respon ,maka akan segera di perbaiki jika ada yang harus di ganti atau dikomunikasi kan problem solving nya seperti apa langkah berikutnya ,dan aplikasi ini bisa di cek secara real time dan menjaga agar tidak ada keterlambatan respon terkait hal ini.


Author(s):  
Yendi Putra ◽  
Y Yuhandri ◽  
S Sumijan

In the millennial era, the internet has become a very basic need to support community activities in various fields, one of which is education. SMK Maritim Nusantara in supporting the learning process uses a web-based application called e-learning which is used by teachers and students. The school website has several documents in digital form that must be kept confidential, such as student data, teacher data, student grades. After scanning using the Acunetix WVS 10.5 application, information was obtained about the security holes found on the website https://www.e-learning.smkmn.sch.id, with the results of which there were 8 (eight) attacks with details, 2 (two). ) a hight category with the name Cross site scripting (XSS) attack, 4 (four) medium categories with the name HTML form attack without CSRF protection and 2 (two) low categories with the name Password type input attack with auto-complete enabled. The most dangerous attack category / hight is XSS. XSS attack is an attack that inserts malicious code in the form of javascript through an input form that aims to steal cookies and then uses the cookie to enter the web legally so that data can be manipulated and even deleted. For this reason, a strong system is needed to maintain security, confidentiality of school data, one way that can be used is by implementing the Standard Advance Encryption Algorithm (AES), this algorithm has a high level of security and uses little memory in its operation so that it does not burdensome to process and easy to implement. The results of research conducted by applying the AES Algorithm explain that previously there were 2 (two) high category vulnerabilities called XSS attacks, after the implementation of the AES Algorithm, the XSS attack vulnerability was no longer found. Based on the results obtained in the study, it can be concluded that the implementation of the AES Algorithm in tokens can improve the security of the https://www.e-learning.smkmn.sch.id website from XSS attacks.


2021 ◽  
Vol 6 (1) ◽  
pp. 57-62
Author(s):  
Dirgahayu Lantara ◽  
Andi Pawennari ◽  
Ahmad Padhil ◽  
Rahmaniah Malik ◽  
Irma Nur Afiah ◽  
...  

The development of the era where everything is instantaneous and fast as it is today must be supported by the development of increasingly sophisticated information technology. One of the functions of this technological development is to obtain accurate and fast information. But in fact, there are still companies / organizations that have not used computer technology as a work aid, such as the Bromo Rajawali Convection which still uses the manual method of writing employee data, namely data storage still using books. Therefore, the design of an employee data management information system is carried out that can help companies control the production data of each tailor employee. The method used in this research is the Waterfall method. It is called a waterfall because the steps that are passed must wait for the completion of the previous stage and run sequentially, for example the design stage must wait for the completion of the previous stage, namely the requirements stage [1]. The Waterfall method consists of 5 stages, namely Analysis, Design, Coding, Testing and Maintenance. The purpose of this study is to design an information system that can make it easier for companies to write down employee production data accurately. From the design results, there are two factors that support the running of the system, namely administration and production data, the input form available on the system that has been designed, namely the login input form and the employee data input form, while the output form contains complete data related to employee personal data and employee production data. With the creation of a management information system in writing data on employee production, the Rajawali Bromo Convection can accelerate the search for more accurate data in the future, and applications made later by the company can be used properly as one of the employee production data systems


Author(s):  
Xiaoshu Gao ◽  
Hetao Hou ◽  
Liang Huang ◽  
Guangquan Yu ◽  
Cheng Chen

Structural assessment for collapse is commonly approached by observing the failure or collapse of systems fully incorporating degradation. Challenges however exist in the performance indicator or damage measure due to compound impacts of uncertainties of external (seismic excitation) and internal (structural properties) characteristics with degradation behavior. To account for the impacts of uncertainties, the state-of-the-art kriging nonlinear autoregressive with exogenous (NARX) model is explored in this study to replicate the response of nonlinear single-degree-of-freedom systems. The generalized hysteretic Bouc-Wen model with internal uncertainties is selected to emulate the stiffness and strength degradation. A probabilistic stochastic ground motion model is introduced to represent the external uncertainties. The global terms of NARX model are selected by least-angle regression algorithm and the kriging model is utilized to surrogate uncertain parameters into corresponding NARX model coefficients. The predictions of kriging NARX models are further compared with that of the polynomial chaos nonlinear autoregressive with exogenous input form model as well as Monte Carlo simulation. The comparisons show that kriging NARX model presents an effective and efficient meta-model technique for uncertainty quantification of systems with degradation.


2021 ◽  
Vol 5 (1) ◽  
pp. 1-10
Author(s):  
Dwi Andayani ◽  
Nuke Puji Lestari Santoso ◽  
Alfiah Khoirunisa ◽  
Kelvin Pangaribuan

The current significant progress has been experienced by the publication of Information media, one of which is the scoring system. In measuring the ability of students or students in learning outcomes during the learning process assessment system is very important in an educational institution both high school and college. Universitas Raharja is one of the educational institutions that have implemented the assessment system (PEN +) online, which provides services to the lecturers of the University of Raharja in the input of the value that can be accessed anywhere and Anytime. However, nowadays for the process of the input of the value of work lecture (CTF) that has been run by students is still done manually or not computerized because lecturers still have to come to the campus to fill out a list of student value lists Submitted to the RPU. This is very inefficient, because in the assessment system PEN + lecturers have not been able to input the value of work lecture (KKP) in real time. Therefore, there is a need for development in the Coursework Assessment System (CTF) where the value of the input form is Grade. In this study there were 10 (ten) literature studies on the assessment. Thus there are 2 (two) advantages that the lecturer does not need to come to the campus to fill the form that is then handed over to the RPU and notifications for a list of values that students receive will be faster.


2020 ◽  
pp. 277-289
Author(s):  
Bear Cahill
Keyword(s):  

2020 ◽  
Author(s):  
Ralph S. Redden ◽  
Joseph MacInnes ◽  
Raymond M Klein

Inhibition of return (IOR) is an inhibitory aftereffect of visuospatial orienting, typically resulting in slower responses to targets presented in an area that has been recently attended. Since its discovery, myriad research has sought to explain the causes and effects underlying this phenomenon. Here, we briefly summarize the history of the phenomenon, and describe the early work supporting the functional significance of IOR as a foraging facilitator. We then shine a light on the discordance in the literature with respect to mechanism—in particular the lack of theoretical constructs that can consistently explain innumerable dissociations. We then describe three diagnostics (central arrow targets, locus of slack logic and the Psychological Refractory Period, and performance in speed-accuracy space) used to support our theory that there are two forms of inhibition of return—the form which is manifest being contingent upon the activation state of the reflexive oculomotor system. The input form, which operates to decrease the salience of inputs, is generated when the reflexive oculomotor system is suppressed; the output form, which operates to bias responding, is generated when the reflexive oculomotor system is not suppressed, Then, we subjected a published data set, wherein inhibitory effects had been generated while the reflexive oculomotor system was either active or suppressed, to diffusion modelling. As we hypothesized, based on the aforementioned theory, the effects of the two forms of IOR were best accounted for by different drift diffusion parameters. The paper ends with a variety of suggestions for further research.


2020 ◽  
Vol 4 (2) ◽  
pp. 34-40
Author(s):  
Ahmad Jamaludin ◽  
Donna Setiawati ◽  
Fariyono Fariyono

Research titled System Information Acceptance Services Aditama Android based.Aditama Computer is one of the company engaged in the service and sale of computers in Boyolali such as laptops, PCS, printers, CCTV, scanners, Fingerspots, LCD projectors.This business was established from 2003 and address at Jalan Kenanga No.14 Boyolali, Boyolali Sub-district, Boyolali district. The administration system of service acceptance on Aditama Computer is still simple, admin fill in the Entry service input form, and Rekap service data also still recab through the book.And that often happens admins are often late in giving information until the work of the computerThis makes it a frequent customer to ask admins directly through a short message.Itupun admin is also long in responding to customers. The purpose of this research is to design, implement, and test the service acceptance information system in Aditama Computer, producing information system of service acceptance to improve services in Aditama Computer.Methodelogi Research used is a waterfall, modeling objects using UML.For coding using PHP MySQL, and Android client. The result is an information system to facilitate the service to the customers.


2019 ◽  
Vol 3 (3) ◽  
pp. 552-559
Author(s):  
Khairil Hamdi ◽  
Budi Sunaryo ◽  
Arianto Arianto ◽  
Yuhefizar ◽  
Imam Gunawan

The feasibility of a home for family residence is the basis for growing and developing a better family life. The roof, floor, and walls are data on the indicator of the feasibility of the house at the time of the survey. The need for a system that can display RTLH locations in the Web Geographic Information System (WebGIS) accompanied by detailed RTLH data and photos. This study explains how the system tracks the location of RTLH survey data officers using Android GPS, then represents it on WebGIS. The tracking method starts when the clerk fills out the home data input form via the Android application. Location coordinates in the form of latitude and longitude will be detected automatically and become input parameters accompanied by photos and RTLH data details. Offline data will be stored in SQLite then sent to MySQL via database synchronization while online. The purpose of this research is to establish a location tracking system for RTLH survey officers to facilitate the validation process of data suitability between data and facts in the field. This system managed to track the location of RTLH survey officers by being marked by the appearance of markers on the Google Map on the WebGIS application. From a total of 14,949 houses in Kota Solok in December 2018, there were 938 RTLH. From 938 RTLH, the coordinates of the location of latitude and longitude are 100%.


Sign in / Sign up

Export Citation Format

Share Document