Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 194234 dokumen yang sesuai dengan query
cover
Bayu Kurnianto
"ABSTRAK
TNI Angkatan Laut sebagai komponen utama pertahanan negara di laut memiliki tugas diantaranya melaksanakan bidang pertahanan matra laut, menegakkan hukum dan menjaga keamanan di wilayah laut yurisdiksi nasional. Adapun ancaman yang dihadapi yaitu Operasi Militer Perang OMP berupa Agresi Militer dan Operasi Militer Selain Perang OMSP antara lain Bencana Alam, Kejahatan Lintas Negara, Pelanggaran Keamanan Laut, SAR / Kecelakaan Laut, dan untuk mendukung pelaksanaan OMP dan OMSP dibutuhkan peran Teknologi Informasi dan Komunikasi.Dinas Informasi dan Pengolahan Data Angkatan Laut sebagai Pembina Teknis Sistem Informasi di Lingkungan TNI AL harus mampu menyiapkan segala sarana dan prasarana yang meningkatkan kinerja Teknologi Informasi TI . Berkaitan dengan TI, TNI AL harus memiliki Arsitektur TI yang mampu memberikan layanan sistem informasi dan infrastruktur TI untuk seluruh bidang dan fungsi yang ada di TNI AL. Penggunaan informasi yang terdiri dari bidang operasi, intelijen, logistik. personel, perencanaan anggaran dan keuangan serta bidang khusus menuntut arsitektur TI yang handal dan lentur terhadap perkembangan.The Open Grup Architecture Kerangka kerja TOGAF memiliki kemampuan yang dapat mendukung perancangan Arsitektur TI di TNI AL. Kondisi TI yang belum terintegrasi, kebutuhan SI yang terus meningkat, kemajuan teknologi seperti virtualisasi cloud computing, maka perlu rancangan arsitektur TI. Hasil akhir dari penelitian ini adanya Rancangan Arsitektur Teknologi Informasi di lingkungan TNI AL yang dapat diimplementasikan oleh Disinfolahtal sebagai Pembina teknis sistem informasi.

ABSTRACT
Indonesia Navy as a major component of the national defense in the sea has the task of which carry out naval defense field, enforcing the law and maintaining security in the sea areas of national jurisdiction. Some threats that has to face are the Military Operation of War MOW such as military aggression and the Military Operations Other Than War MOTW such as Natural Dissaster, Transnational Crime, Sea Security Breach, SAR Marine Accidents, and to deal with that required a major tool weapon systems Alutsista superior.Information and Data Manajemen Services of the Navy as supervisor Technical Environmental Information System in the Indonesia Navy to be able to prepare all facilities and infrastructure is useful to enhance the performance of Information Technology. In connection with the Navy IT should have IT architecture capable of providing information system services and IT infrastructure for the entire area and functions that exist in the Indonesia Navy. Use of information consisting of field operations, intelligence, logistics. personnel, budget and financial planning as well as specialized field requires IT architecture to the development of a reliable and flexible.The Open Grup Architecture Framework TOGAF has the capability to support the design of the IT architecture in the Indonesian Navy. Conditions Information Technology that are not integrated, the need for information systems continues to increase, technological advances such as virtualization and cloud computing, it is necessary to design the architecture of Information Technology. The end result of this research the Architectural Design of Information Technology in the Indonesia Navy that can be implemented by Information and Data Manajemen Services of the Navy as supervisor of technical information systems."
2017
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Devi Thiyagarajan
"Data owners use the huge space offered by ‘Cloud’ Computing for storage of data and also for carrying out computations. To eliminate the burden of storing file locally, cloud stores them on remote servers using virtualization concepts. Therein arises one of the major issues in the field of cloud computing: security. Data owners lack in having direct control over files stored in the cloud and consequently, the problem of data security arises. An efficient scheme to provide data security, while storing data in the cloud has been proposed which makes use of Hyperelliptic curve cryptography (HECC) for encryption and decryption and Secure Hash Algorithm-3 (SHA-3) for data integrity verification. Implementation results clearly illustrate that HECC remains as a good alternative asymmetric key technique rather than ECC and RSA when securing documents in cloud."
Depok: Faculty of Engineering, Universitas Indonesia, 2015
UI-IJTECH 6:3 (2015)
Artikel Jurnal  Universitas Indonesia Library
cover
"The book presents innovative scientific research works by academics, research scholars and students, presented at the 2017 International Conference on Energy, Materials and Information Technology at Amity University Jharkhand, India. It includes contributions on system solutions based on soft computing techniques, and covers innovative soft computing techniques and tools with advanced applications. A major focus of the book is on presenting interdisciplinary problems and how they can be solved using information technology, together with innovative connections to other disciplines. It also includes papers on cloud computing and WSN-related real-time research. "
Singapore: Springer Nature, 2019
e20509041
eBooks  Universitas Indonesia Library
cover
Joaquim Filipe, editor
"This book contains the thoroughly refereed and revised best papers from the 7th International Conference on Web Information Systems and Technologies, WEBIST 2011, held in Nordwijkerhout, The Netherlands, in May 2011, organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), in collaboration with ACM SIGMIS and co-sponsored by the Workflow Management Coalition (WFMC). The 12 papers presented in this book were carefully reviewed and selected from 156 submissions. The papers are grouped into tow parts on "Internet Technology" and "Web Interfaces and Applications". In addition, the three invited presentations are also included."
Berlin: [, Springer-Verlag], 2012
e20408737
eBooks  Universitas Indonesia Library
cover
Maria Ulfah
"Sistem informasi, infrastruktur, jaringan dan perangkat keras merupakan aset teknologi informasi di Pusdatin BKPM yang perlu dikelola dan dipelihara dengan baik untuk mengurangi terjadinya permasalahan di kemudian hari. Pemeliharaan aset TI, bukan hanya tentang bagaimana memperpanjang jangka hidup aset dan memastikan bahwa aset tersebut beroperasi secara efisien dan ekonomis tetapi juga mempertimbangkan aspek perencanaan dan strategi pengelolaan aset TI. Ketiadaan informasi mengenai aset-aset TI berdampak pada pengelolaan aset-aset TI yang kurang baik sehingga perlu dilakukan suatu pendataan aset TI yang terstruktur, terjadwal dan rutin.
Sistem Informasi Manajemen Aset TI (SMATI) digunakan untuk mengumpulkan, menyimpan data dan informasi yang berkaitan aset TI. SMATI juga menyediakan kapabilitas pendukung keputusan melalui analisis data aset TI sebagai bahan pendukung keputusan pimpinan (bottom-up) dalam melakukan pengawasan, melakukan penilaian efektivitas pengelolaan aset, dan pemilihan teknologi di masa depan.
Penelitian ini melakukan perancangan spesifikasi kebutuhan sistem informasi dengan menggunakan Rational Unified Process (RUP) dengan disiplin Requirement pada Fase Inception dan Elaboration. Hasil dari penelitian ini adalah berupa dokumen artifak kebutuhan yang merepresentasikan kebutuhan Sistem Informasi Manajemen Aset TI di Pusdatin.

Information system, infrastructure, network, and hardware are information technology asset (IT Asset)s which have to be maintained and to be managed by Data and Information Center (Pusdatin) in order to minimize problems in the future. IT asset management, is not only about how to extend the lifecycle and to operate efficiently but also to consider in strategic aspect. The absence of IT assets information results poor IT asset management. Pusdatin requires a structured, scheduled, routine asset inventory to overcome this problem.
IT Asset Mangement System (SMATI) used by Pusdatin to collect and to reserve IT asset information. SMATI also provides decision support capability through analytical data. It can be used as a management decision support (bottom-up) in monitoring, assessing the effectiveness of asset management, and technology selection in the future.
This research is designing the system requirements specification information system using the Rational Unified Process (RUP) with Requirement discipline in Inception and Elaboration phase. The results of this study are in the form of a document artifacts that represent the needs of IT Asset Management Information System.
"
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2016
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Halida Ernita
"Layanan cloud merupakan sumber daya infrastruktur yang efisien, fleksibel dan memiliki skalabilitas serta performa yang lebih baik. PT. Bank XYZ saat ini menggunakan layanan infrastruktur public cloud untuk 22 aplikasi non-transaksional namun menyimpan data pribadi nasabah. Meningkatnya tren serangan siber mendorong Bank XYZ untuk menetapkan indikator kinerja kunci zero incident data breach yang menjadi acuan dalam melakukan pengamanan informasi pada Bank XYZ. Namun, pada kenyataannya terdapat temuan kerentanan pada aplikasi Bank XYZ yang terletak di public cloud dan kebocoran kredensial akses public cloud yang menyebabkan terjadinya penyalahgunaan resource cloud. Kedua masalah ini dapat memberikan dampak terjadinya insiden kebocoran data yang pada akhirnya menimbulkan kerugian finansial dan reputasi bagi Bank XYZ. Salah satu penyebab utama dari masalah ini adalah belum adanya tata kelola keamanan informasi public cloud yang mendefinisikan secara jelas penentuan wewenang dan tanggung jawab perusahaan maupun penyedia layanan cloud. Oleh karena itu penelitian ini bertujuan untuk melakukan perancangan tata kelola keamanan informasi public cloud pada Bank XYZ. Framework yang digunakan dalam menyusun rancangan tata kelola keamanan informasi yaitu ISO/IEC 27001:2022, ISO/IEC 27002:2022, ISO/IEC 27017:2015. Selain itu ketentuan regulator POJK No.11/OJK.03/2022 dan Undang-Undang Perlindungan Data Pribadi (UU PDP) No.27 Tahun 2022 juga menjadi landasan teori dalam penyusunan tata kelola keamanan informasi public cloud. Pelaksanaan penelitian ini dilakukan dengan metode kualitatif yaitu melalui wawancara, Focus Group Discussion (FGD), dan analisis dokumen internal dan ketentuan terkait dengan tata kelola cloud. Wawancara, FGD, dan analisis dokumen yang dilakukan pada penelitian ini menghasilkan daftar risiko dan kontrol risiko yang harus diterapkan dalam pengamanan public cloud, yang kemudian digunakan sebagai dasar dalam menyusun rancangan tata kelola keamanan informasi public cloud pada Bank XYZ. Luaran dari penelitian ini adalah rancangan tata kelola keamanan informasi public cloud pada Bank XYZ.

Cloud services offer efficient, more scalability, better performance, and adaptable infrastructure resources. PT. Bank XYZ presently uses public cloud infrastructure services for 22 non-transactional applications that store customer data. The increasing cyber-attack trend has driven Bank XYZ to set a key performance indicator of a zero-incident data breach as the reference for securing information at Bank XYZ. However, system vulnerabilities were detected in the Bank XYZ application that uses public cloud infrastructure and leaks of cloud access credentials, leading to misuse of cloud resources. This problem may impact the occurrence of data leakage incidents that end up causing financial and reputational losses to Bank XYZ. One of the main causes of this problem is the absence of public cloud information security governance that clearly defines the authority and responsibility of companies and cloud service providers. Therefore, this research aims to establish public cloud information security governance for Bank XYZ. ISO/IEC 27001:2022, ISO/IEC 27002:2022, and ISO/IEC 27017:2015 were utilized to create the public cloud information security governance design. Regulatory compliance, such as POJK No.11/OJK.03/2022 and personal data protection law (UU PDP) No.27 of 2022, also provides a theoretical basis for developing public cloud information security governance. This study utilized qualitative approaches such as interviews, Focus Group Discussions (FGD), and an analysis of internal documentation and cloud governance compliance. The interviews, focus groups, and document analysis conducted for this study result in a list of risk controls that must be used in the public cloud, which is then used to establish public cloud information security governance for Bank XYZ. The outcome of this research is the design of Bank XYZ's public cloud information security governance."
Jakarta: Fakultas Ilmu Komputer Universitas Indonesia, 2023
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Christian Abraham
"ABSTRAK
Lembaga Manajemen Aset Negara LMAN adalah suatu institusi pemerintah di bawah Kementerian Keuangan dan Direktorat Jenderal Kekayaan Negara DJKN yang bergerak dalam bidang optimalisasi aset negara. LMAN adalah lembaga yang didirikan pada November 2015 dan dalam strategi bisnisnya LMAN menyatakan kebutuhan adanya dukungan Teknologi Informasi TI terhadap kegiatan operasional LMAN dan integrasi eksternal dengan pihak lain. Dukungan TI tersebut dapat dinyatakan dengan kebutuhan adanya sistem TI LMAN. Pengembangan sistem TI yang baik memerlukan perancangan arsitektur TI yang mendeskripsikan komponen-komponen sistem informasi data dan aplikasi dan teknologi dari sistem tersebut. Selain untuk memenuhi kebutuhan dari LMAN, arsitektur TI LMAN juga harus memenuhi kebijakan TI yang disyaratkan dari arsitektur TI Kementerian Keuangan yang ditentukan oleh otoritas TI Kementerian Keuangan yaitu Pusat Sistem Informasi dan Teknologi Keuangan Pusintek yang menganut prinsip Federated Architecture.Penelitian ini bertujuan untuk merancang arsitektur TI LMAN yang memenuhi kebutuhan bisnis LMAN dan kesesuaian dengan kebijakan Pusintek. Data kebutuhan arsitektur TI LMAN dikumpulkan dari wawancara dengan pimpinan dan staf LMAN, divisi arsitektur Pusintek, dokumen internal organisasi, dan peraturan-peraturan terkait. Pendekatan yang digunakan dalam perancangan arsitektur TI adalah berdasarkan konsep Enterprise Architecture EA dengan menggunakan kerangka kerja TOGAF The Open Group Architecture Framework dan metode TOGAF ADM Architecture Development Method. Arsitektur TI LMAN yang dihasilkan memperlihatkan ketergantungan antara LMAN dengan DJKN terkait data dan proses terkait aset negara, dan pengaruh dari kebijakan Pusintek yang memberikan batasan dan juga peluang yang turut membentuk arsitektur TI yang dihasilkan. Lebih lanjut, rancangan arsitektur TI LMAN yang dihasilkan memperlihatkan: pada wilayah arsitektur data, LMAN membutuhkan data awal dari aset negara dari DJKN, data terkait optimalisasi aset, dan data pendukung/perkantoran; pada wilayah arsitektur aplikasi, dari 31 aplikasi baru yang diidentifikasi, aplikasi-aplikasi ini dapat dikategorikan ke dalam: aplikasi internal LMAN, aplikasi dari DJKN, dan aplikasi bersama yang disediakan Pusintek; pada wilayah arsitektur teknologi, LMAN akan menggunakan layanan infrastruktur pusat data dan konektivitas yang disediakan Pusintek, dan adanya pembatasan komponen teknologi pengembangan aplikasi sesuai kebijakan Pusintek.

ABSTRACT
State Asset Management Agency Lembaga Manajemen Aset Negara ndash LMAN is an Indonesian government institution that is under the authority of Indonesia Ministry of Finance and Directorate General of State Asset Direktorat Jenderal Kekayaan Negara ndash DJKN and have main activity of state asset optimalization. LMAN is founded on November 2015 and in their business strategy LMAN states there is a requirement of Information Technology IT support for LMAN operation activities and external integration to other parties. The support of IT can be expressed by the need of an LMAN IT system. In order to develop a good IT system it is required to design the LMAN rsquo s IT architecture, which will describe information system data and application and technology components of the system. Beside the need to meet LMAN rsquo s requirements, LMAN rsquo s IT architecture also have to complies with IT policies that governed by Ministry of Finance rsquo s IT authority ndash Center of Finance Information System and Technology Pusat Sistem Informasi dan Teknologi Keuangan ndash Pusintek with it rsquo s principle of Federated Architecture. The purpose of this research is to design LMAN rsquo s IT architecture that meets LMAN rsquo s business requirements and complies with Pusintek policies. LMAN rsquo s IT architecture requirements is gathered from interviews with LMAN rsquo s executive and staff, Pusintek rsquo s architecture division, LMAN rsquo s internal documents, and related regulations. The approach used in the design of the architecture are based on Enterprise Architecture EA concept, with the use of TOGAF The Open Group Architecture Framework framework and TOGAF ADM Architecture Development Method method.The resulted LMAN rsquo s IT architecture shows dependency of LMAN with DJKN in related to data and process of state asset management, and also the influence of Pusintek IT policies that contributes to restrictions and opportunities that shapes the resulted IT architecture. More detail, the resulted architecture design shows on data architecture domain, LMAN will need base state asset data from DJKN, asset optimalization related data, and office supporting data on application architecture domain, there are total of 31 new applications identified, these applications can be categorized into LMAN rsquo s internal application, DJKN applications, and common applications that provided by Pusintek on technology architecture domain, LMAN will utilize data center and connectivity infrastructure that provided by Pusintek, and the presence of restriction on application development components that governed by Pusintek. "
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2017
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Soutan Salim
"Tujuan penelitian ini adalah merancang sistem manajemen pengetahuan yang sesuai dengan kebutuhan perusahaan konsultan teknologi informasi PT. Magna Solusi Indonesia PT. MSI. Perancangan sistem manajemen pengetahuan PT. MSI menggunakan dua fase evaluasi infrastruktur dan analis, perancangan dan pengembangan sistem manajemen pengetahuan dan tujuh langkah yang terdapat pada metodologi yang dikemukakan oleh Tiwana 2002. Pengumpulan data dilakukan dengan menggunakan studi kepustakaan dan studi lapangan.
Hasil analisis menunjukkan bahwa perancangan sistem manajemen pengetahuan paling sesuai dibangun dengan menggunakan web application platform. Sistem manajemen pengetahuan, PT. MSI menekankan pada tiga proses pengetahuan yaitu menemukan pengetahuan, menggunakan pengetahuan, dan menggunakan menvalidasi kembali pengetahuan. Berdasarkan proses ini, maka fitur-fitur yang dibangun dalam sistem manajemen pengetahuan adalah document management. knowledge base, forum dan search retrieval.
Selain itu terdapat konten pencarian dalam sistem manajemen pengetahuan yang terdiri dari activities bagian, domain topik, type, product services, location. Prototype sistem manajemen menggunakan enam layer arsitektur manajemen pengetahuan, yaitu repository, transport layer, application layer, collaborative filtering, access and authentication layer dan interface layer.

The aim of this reseach is to design knowledge management system that fit to PT. MSI's needs as a consulting company in information technology. The design of PT. MSI's knowledge management system used two phases infrastructure evaluation and knowledge management system analysis, design and development and seven steps of Tiwana's methodology 2002 . The data was collected by using literature study and field research.
The result shows that web application platform is the most appropriate to use in designing knowledge management system. PT. MSI's knowledge management system focuses on three processes which are find knowledge, use knowledge, and reuse revalidate knowledge. The features of PT. MSI's knowledge management system is developed based on those processes. The features consist of document management. knowledge base, forum dan search retrieval.
The searching content is developed by using five attributes, which are activities department , domain topic, type, product services and location. Prototype of knowledge management system uses six layers architecture of knowledge management. The six layers are repository, transport layer, application layer, collaborative filtering, access and authentication layer dan interface layer.
"
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2017
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
"This book is an outcome of the second national conference on Communication, Cloud and Big Data (CCB) held during November 10-11, 2016 at Sikkim Manipal Institute of Technology. The nineteen chapters of the book are some of the accepted papers of CCB 2016. These chapters have undergone review process and then subsequent series of improvements. The book contains chapters on various aspects of communication, computation, cloud and big data. Routing in wireless sensor networks, modulation techniques, spectrum hole sensing in cognitive radio networks, antenna design, network security, Quality of Service issues in routing, medium access control protocol for Internet of Things, and TCP performance over different routing protocols used in mobile ad-hoc networks are some of the topics discussed in different chapters of this book which fall under the domain of communication.
Moreover, there are chapters in this book discussing topics like applications of geographic information systems, use of radar for road safety, image segmentation and digital media processing, web content management system, human computer interaction, and natural language processing in the context of Bodo language. These chapters may fall under broader domain of computation.
Issues like robot navigation exploring cloud technology, and application of big data analytics in higher education are also discussed in two different chapters. These chapters fall under the domains of cloud and big data, respectively."
Singapore: Springer Singapore, 2019
e20501467
eBooks  Universitas Indonesia Library
cover
Boma Anantasatya Adhi
"SIMPLE-O merupakan sistem penilaian esai otomatis berbasis LSA. Tesis ini membahas tentang rancang bangun arsitektur parallel yang mungkin diaplikasikan pada SIMPLE-O. Paralelisasi SIMPLE-O akan dilakukan dalam 2 tingkat, tingkat pertama dengan membuat cluster yang hemat energi, dan tingkat kedua adalah paralelisasi algoritma SVD. Paralelisasi algoritma SVD akan dilakukan pada 3 platform, yaitu: GPGPU, APU, CPU, dan dengan 3 jenis algoritma, algoritma numerik Golub-Kahan-Reinsch, algoritma eksak Hestenes-Jacobi dan prediksi nilai singular berbasis norm. Algoritma pendekatan berbasis norm pada platform GPU mampu meningkatkan kecepatan 5.8 kali lipat dari sistem awal dengan mempertahankan korelasi hasil penilaian hingga 0.928.

SIMPLE-O is an LSA based automatic essay grader. This tesis proposes several parallel computing architecture for SIMPLE-O. SIMPLE-O parallelization will be done in 2 level. First level is done by building a low power cluster and the second level is at the SVD algorithm level. Parallel SVD architecture will be implemented in 3 platform: GPGPU, APU, CPU with 3 algorithm, numeric based Golub-Kahan-Reinsch, Hestenes-Jacobi exact algorithm and singular value prediction based on norm. The proposed algorithm, Norm Based Approximation gains up to 5.8 times calculation speed of the original system while maintaining 0.928 correlation against reference algorithm."
Depok: Fakultas Teknik Universitas Indonesia, 2013
T34975
UI - Tesis Membership  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>