Conference Presentations by Ratih Puspasari
CITSM, 2020
This paper describes the implementation of an automatic control system for aeroponics. This syste... more This paper describes the implementation of an automatic control system for aeroponics. This system contains a lattepanda as the main processing unit and an adjustable interface to suit the needs of the cultivated plant. It gets input from temperature sensors, light sensors and humidity sensors and displays the output on the LCD screen module. The system results are simulated with the help of simulation software. And then the evaluation of the experimental results of the control system applied to aeroponics is based on environmental factors. The proposed lecture grows on an aeroponic device. The green plant was chosen to build an automatic control system in aeroponics. The results show that the system can be more efficient in saving labour and increasing the economic value of the product.

CITSM, 2019
Digital documents are objects that must be secured because they contain a variety of important in... more Digital documents are objects that must be secured because they contain a variety of important information both about personal or organizational data. securing digital documents which means securing information, information security guarantees business continuity, reducing risk, and optimizing return on investment. In the face of the need for rapid validation for the process of legalizing copies of diplomas and grades. But in the legalization must have good security. Where it aims to overcome the threat of modification and falsification of digital documents in the form of diplomas. This study aims to reduce the risk of falsification of diploma digital documents by using the concept of Digital Signatures which are expressed on copies of documents, using the SHA-1 algorithm will be able to produce digital signatures based on data available on diplomas and diploma legalization dates. Digital marking method designed to be applied in a person's diploma validation system or student validity by applying the SHA-1 algorithm. Where the results of a digital signature will be applied to digital documents as proof of diploma legalization for the validity of digital documents.

CITSM, 2019
In guaranteeing the quality of a tertiary institution, the government has promoted a regulation g... more In guaranteeing the quality of a tertiary institution, the government has promoted a regulation governing tertiary quality assurance that regulates the minimum standards that must be possessed by every tertiary institution. The Internal Quality Assurance System or known by the term SPMI has been understood by the Chancellor, Deputy Chancellor, Dean and Chair of the Study Program but for the ordinary staff and lecturers of SPMI is not very well understood. This is caused by the absence of a discussion forum or a place to share knowledge about the internal quality assurance system to staff and lecturers where one of the tasks is to run operations to support the operation of SPMI. The solution to overcome this is by building a Knowledge Management System which acts as a forum for sharing the knowledge that can be utilized to increase the knowledge of staff and lecturers regarding internal quality assurance at their respective colleges.

The 6 th International Conference on Cyber and IT Service Management (CITSM 2018), 2018
This paper specifically discusses how chaos functions are applied in the crystallographic algorit... more This paper specifically discusses how chaos functions are applied in the crystallographic algorithm of vigenere cipher, along with the mechanism of chaos function to the vigenere cipher algorithm and the application of chaos theory to the level of ciphertext security which it will produce such as chaos theory that is logistic equation. In the world of cryptography, chaos theory is used to generate numbers at random. This random number will then be used as the key in performing the encryption process. The chaos function is a function that has a sensitive nature to the initial value, meaning that a small change in the initial value will result in a major change in the value of the next function. Such properties can be applied in cryptography to maintain data integrity, especially in stream cipher cryptographic algorithms such as vigenere cipher, vigenere cipher algorithms have problems with very low security levels. In the vigenere cipher algorithm a key, called the initial key, is made of a key longer than the initial key called a key stream that is very easy to solve. The application of chaotic function in vigenere cipher can improve the security of the key used, since the chaos function can generate random numbers for the initial key on the vigenere cipher algorithm that has the sensitive properties at the initial value.

The 6 th International Conference on Cyber and IT Service Management (CITSM 2018), 2018
An employee performance appraisal is undertaken to recommend candidates for achievers to get an a... more An employee performance appraisal is undertaken to recommend candidates for achievers to get an award. The focus of this research is to propose problem-solving methods in determining outstanding employees for award. The goal is to get the most potential employees according to the criteria expected by the decision maker. Evaluation of employee performance to obtain high achieving employees depends on the discipline of work and administration, reliability, maturity and personal integrity, morale, communication and working principle, quantity and quality of work and concern for organizations that are interconnected with each other. With so many alternative choices and the number of factors to consider makes it difficult for decision makers to make choices. The problem is almost impossible to be analyzed by the human brain through the relationship between all the criteria along with the alternative to determine a truly objective. Decision support system with profile matching method is the solution to determine the most potential employees. This method determines the weight value for each attribute and then proceeds with a ranking process that will select the best alternatife of the most potential employee. The result of employee performance evaluation using 200 employee appraisal data obtained accuracy level of 93% where 193 data in accordance with the value obtained from employee performance evaluation process.

The 6 th International Conference on Cyber and IT Service Management (CITSM 2018), 2018
Competitive competition in the service sector employers do make an improvement in serving custome... more Competitive competition in the service sector employers do make an improvement in serving customer demand. Because in the case of services, customer satisfaction is crucial that the business can survive or not in competition with other similar businesses. In services voucher electrically, there have been people who run the business. However, the infrastructure used to tend manually. This will have an impact if the traffic of transactions made high enough. Most of the state of the waiters vouchers electrical services have many used cell phones manually and quite a few are registering more than one voucher distributor electrically to one type of provider. This study designed a system to SMS Gateway Service System for Improving Customer Care Toll On Sale Electric. This system works for diverting the path to the SMS Gateway that contains more than one port. The transfer line at the SMS Gateway of decisions made based on the data processing that takes into account the possibility-the possibility of ports being used so that each transaction can be performed optimally.

CITSM 2019, 2019
Digital documents are objects that must be secured because they contain a variety of important in... more Digital documents are objects that must be secured because they contain a variety of important information both about personal or organizational data. securing digital documents which means securing information, information security guarantees business continuity, reducing risk, and optimizing return on investment. In the face of the need for rapid validation for the process of legalizing copies of diplomas and grades. But in the legalization must have good security. Where it aims to overcome the threat of modification and falsification of digital documents in the form of diplomas. This study aims to reduce the risk of falsification of diploma digital documents by using the concept of Digital Signatures which are expressed on copies of documents, using the SHA-1 algorithm will be able to produce digital signatures based on data available on diplomas and diploma legalization dates. Digital marking method designed to be applied in a person's diploma validation system or student validity by applying the SHA-1 algorithm. Where the results of a digital signature will be applied to digital documents as proof of diploma legalization for the validity of digital documents.
Papers by Ratih Puspasari

IT (INFORMATIC TECHNIQUE) JOURNAL, 2021
Teknologi informasi sangat penting dan melekat dalam kehidupan masyarakat saat ini, dalam perkemb... more Teknologi informasi sangat penting dan melekat dalam kehidupan masyarakat saat ini, dalam perkembangannya terdapat penggunaan sejumlah istilah-istilah komputer yang digunakan. Dalam istilah komputer ada beberapa istilah yang kadang tidak dimengerti oleh masyarakat umum dan juga dengan seiring perkembangan teknologi, istilah-istilah komputer yang ada semakin bertambah, untuk itu dibutuhkan media yang dapat digunakan dalam mengatasi masalah tersebut. Pada aplikasi penerjemah istilah komputer terdapat sebuah pencarian yang digunakan untuk memudahkan pengguna dalam mencari istilah komputer, untuk itu dibutuhkan optimasi pencarian istilah komputer menggunakan algoritma boyer-moore. Algoritma boyer-moore adalah algoritma untuk mempermudah pencarian string yang melakukan perbandingan karakter dari kanan ke kiri sehingga proses pencarian akan lebih cepat dan akurat, selain itu untuk lebih memudahkan pengguna dalam perancangan aplikasi istilah komputer juga memanfaatkan fitur speech recognit...

IT (INFORMATIC TECHNIQUE) JOURNAL, 2017
Pada saat ini penggunaan lampu sangatlah dibutuhkan dan untuk menonaktifkannya harus manual akiba... more Pada saat ini penggunaan lampu sangatlah dibutuhkan dan untuk menonaktifkannya harus manual akibat dari penggunaan lampu yang begitu banyak tentunya tagihan listrik akan banyak juga serta apalagi sering lupa untuk mematikan lampu tersebut, maka pemakaian listrik bagi lampu tidak akan terkontrol dan tidak dapat diawasi dengan baik. Dengan menggunakan Light Dependent Resistor (LDR) dengan didukung oleh mikrokontroler ATMega 8535 dan peralatan elektronik lainnya tentunya dapat membangun sebuah rangkaian sederhana untuk mengatur intensitas cahaya dalam sebuah ruangan. Dilengkapi oleh aplikasi Bascom AVR yang akan membuat sebuah program dengan memanfaatkan metode fuzzy logic sebagai kecerdasan dalam program untuk menyeimbangkan intensitas cahaya dalam ruangan. Sehingga persentase intensitas cahaya dalam ruangan lebih stabil dengan kadar cahaya yang diinginkan. Monitoring yang dilakukan adalah dengan bantuan camera yang berada diluar ruangan dan akan ...

Journal of Social Responsibility Projects by Higher Education Forum, Jul 31, 2021
Sistem informasi pendataan obat merupakan sebuah aplikasi yang digunakan dalam pelayanan medis, d... more Sistem informasi pendataan obat merupakan sebuah aplikasi yang digunakan dalam pelayanan medis, dimana dengan penggunaan sistem pendataan obat data obat akan tersimpan dan tersususn rapi dalam waktu yang lama, kemudian dengan adanya penggunaan sistem ini mengurangi biaya penyimpanan berkas dan meminimalisisr ruang penyimpanan berkas. Sebelum penggunaan sistem pendataan obat ini diberikan pihak klinik bidan supiani dalam mendata obat dengan melakukan pencatatan di sebuah kertas biografi pasien yang mana di kertas tersebut akan tersimpan riwayat berobat dan jenis penyakit yang pernah diderita oleh pasien. Sistem manual tersebut menyebabkan kerumitan dalam pelayanan yang diberikan pada pasien, karena pasien akan menunggu sangat lama dikarenakan administrasi akan melakukan pencarian dan pembongkaran data apabila pasien tersebut sudah pernah berkunjung atau berobat, jika baru pertama sekali ingin berobat pihak administrasi harus mencari no urut dan mencatat nama pasien dan biodata pasien sehingga menimbulkan waktu yang cukup lama dalam proses administrasi. Dengan sistem informasi pendataan obat yang diberikan pada paraktek umum bidan supiani, sangatlah membantu dalam hal perekaman data, penyimpanan berkas dan sampai pelayanan untuk pasien menjadi lebih cepat dan efisien. Satu hal lagi pihak paraktek umum bidan supiani dapat melaukan rekapitulasi dalam satu hari obat apa saja yang berkurang. Hal ini sangat memberikan kontribusi yang sangat besar bagi pihak praktek umum bidan sehingga dapat meningkatkan pelayanan berobat pasien. Hasil evaluasi setelah diberikan pelatihan mengalami peningkatan setelah diberikan pelatihan dan pendampingan dalam pelatihan penggunaan sistem informasi pendataan obat yang dikembangkan oleh Tim, yakni sebesar 88,75%. Hasil tersebut menunjukkan bahwa peningkatan pengetahuan dan keterampilan peserta kegiatan setelah mengikuti rangkaian kegiatan masuk dalam katagori "Sangat Baik.

Internal Quality Assurance of High Education Based on Knowledge Management System
2019 7th International Conference on Cyber and IT Service Management (CITSM), 2019
In guaranteeing the quality of a tertiary institution, the government has promoted a regulation g... more In guaranteeing the quality of a tertiary institution, the government has promoted a regulation governing tertiary quality assurance that regulates the minimum standards that must be possessed by every tertiary institution. The Internal Quality Assurance System or known by the term SPMI has been understood by the Chancellor, Deputy Chancellor, Dean and Chair of the Study Program but for the ordinary staff and lecturers of SPMI is not very well understood. This is caused by the absence of a discussion forum or a place to share knowledge about the internal quality assurance system to staff and lecturers where one of the tasks is to run operations to support the operation of SPMI. The solution to overcome this is by building a Knowledge Management System which acts as a forum for sharing the knowledge that can be utilized to increase the knowledge of staff and lecturers regarding internal quality assurance at their respective colleges.

T eknik yang digunakan untuk mengamankan informasi pengiriman pesan pada jaringan WLAN dengan tek... more T eknik yang digunakan untuk mengamankan informasi pengiriman pesan pada jaringan WLAN dengan teknik kriptografi. Kriptografi merupakan langkah-langkah logis bagaimana menyembunyikan pesan dari orang-orang yang tidak berhak atas pesan tersebut dengan melakukan pembangkitan kunci, enkripsi dan dekripsi. Kriptografi bertujuan untuk memberi layanan keamanan (yang juga dinamakan sebagai aspek-aspek keamanan . U ntuk dapat menggunakan teknik kript o grafi, dibutuhkan sebuah metode. Oleh sebab itu peneltii menggunakan metode Stream Cipher. Stream cipher merupakan cipher yang hamper sama dengan caesar cipher (cipher yang menggeser urutan alphabet sehingga urutannya alfabetnya berubah), tetapi cipher ini mempunyai kunci yang unik, yaitu menggunakan karakter sebelumnya sebagai kunci. Namun peneliti akan membandingakan metode stream cipher dengan metode caesar cipher agar dapat diketahui metode yang mana yang keamanannya lebih baik. Dalam kriptografi, sandi Caesar, atau sandi geser, kode Caes...

Permainan catur adalah salah satu permainan dalam kategori board game yang diminati oleh banyak o... more Permainan catur adalah salah satu permainan dalam kategori board game yang diminati oleh banyak orang. Permainan ini pertama kali ditemukanoleh orang-orang Arab dan Persia. Kata catur berasal dari bahasa sansekertadari kata chaturanga yang berarti “empat divisi ketentaraan”. Kemudian permainan catur mulai berkembang dan menyebar keseluruh dunia hingga saatini. Permainan ini selalu mengandalkan strategi sebagai daya tariknya danbiasa disebut sebagai strategi abstrak. Kebanyakan orang memainkanpermainan ini hanya sebagai hiburan atau rekreasi. Kekhalifahan Ali bin Abu Tholib merupakan salah satu pencetus permainan catur ke seluruh penjuru dunia dan ini terjadi pada abad ke-6, bahkan Ali bin Abu Tholib sendiri juga memainkan permainan catur dan memopulerkannya , Muhammad Khalid bin walid merupakan panglima perang pada masa itu juga ikut memainkan permainan catur yang strateginya di gunakan untuk dalam peperangan. Said bin Jubair yang juga merupakan sahabat Nabi juga bisa memainkan catu...
SEMNASTEKNOMEDIA ONLINE, 2015
Penerapan data mining pada penelitian ini merupakan penerapan yang dilakukan untuk mengolah data ... more Penerapan data mining pada penelitian ini merupakan penerapan yang dilakukan untuk mengolah data impor dan data ekspor ikan. Algoritma yang digunakan untuk mendapatkan rule based minning adalah association rule. Penerapan data mining dengan metode association rule dirancang dengan vb.net 2010 dan database sql server 2008. Proses mining ini dilakukan untuk mengambil informasi support dan confidence, dimana pada penelitian ini data impor dan ekspor yang diolah untuk membantu perusahaan dalam menentukan letak atau posisi penyimpanan produk impor dan ekspor berdasarkan tujuan Negara impor dan ekspor tersebut. Metode association rule ini sangat sesuai untuk pengklasifikasian item-item transaksi yang ada. Maka aplikasi yang akan dirancang ini diharapkan dapat membantu proses data mining untuk pengolahan data impor – ekspor ikan.

Digital Document Security on Legalize Higher Education Diplomas with Digital Signature and SHA-1 Algorithm
2019 7th International Conference on Cyber and IT Service Management (CITSM)
Digital documents are objects that must be secured because they contain a variety of important in... more Digital documents are objects that must be secured because they contain a variety of important information both about personal or organizational data. securing digital documents which means securing information, information security guarantees business continuity, reducing risk, and optimizing return on investment. In the face of the need for rapid validation for the process of legalizing copies of diplomas and grades. But in the legalization must have good security. Where it aims to overcome the threat of modification and falsification of digital documents in the form of diplomas. This study aims to reduce the risk of falsification of diploma digital documents by using the concept of Digital Signatures which are expressed on copies of documents, using the SHA-1 algorithm will be able to produce digital signatures based on data available on diplomas and diploma legalization dates. Digital marking method designed to be applied in a person's diploma validation system or student validity by applying the SHA-1 algorithm. Where the results of a digital signature will be applied to digital documents as proof of diploma legalization for the validity of digital documents.

Journal of Social Responsibility Projects by Higher Education Forum, 2022
The practice of Mandiri Midwife Supiani is a maternity clinic where service and marketing operati... more The practice of Mandiri Midwife Supiani is a maternity clinic where service and marketing operations still use conventional methods, the founder of the Mandiri Midwife Supiani practice took the initiative to establish services for public health, especially for services for pregnant women and childbirth based on health services which is the most important thing for the community, where the community will consult and brobat for the complaints suffered against him. But if it is not supported by information technology, this noble idea will sink and become obsolete by the trend of the development of people's habits in obtaining information, where currently social media plays an important role in the marketing field, excellent service will be realized by the application of information technology, based on this the team provide solutions and assist the founder and owner of the Mandiri Midwife Supiani practice to be able to realize the application of Information technology as an excelle...

Automatic Monitoring and Control System in Aeroponic Plant Agriculture
2020 8th International Conference on Cyber and IT Service Management (CITSM), 2020
This paper describes the implementation of an automatic control system for aeroponics. This syste... more This paper describes the implementation of an automatic control system for aeroponics. This system contains a lattepanda as the main processing unit and an adjustable interface to suit the needs of the cultivated plant. It gets input from temperature sensors, light sensors and humidity sensors and displays the output on the LCD screen module. The system results are simulated with the help of simulation software. And then the evaluation of the experimental results of the control system applied to aeroponics is based on environmental factors. The proposed lecture grows on an aeroponic device. The green plant was chosen to build an automatic control system in aeroponics. The results show that the system can be more efficient in saving labour and increasing the economic value of the product.

2018 6th International Conference on Cyber and IT Service Management (CITSM), 2018
An employee performance appraisal is undertaken to recommend candidates for achievers to get an a... more An employee performance appraisal is undertaken to recommend candidates for achievers to get an award. The focus of this research is to propose problem-solving methods in determining outstanding employees for award. The goal is to get the most potential employees according to the criteria expected by the decision maker. Evaluation of employee performance to obtain high achieving employees depends on the discipline of work and administration, reliability, maturity and personal integrity, morale, communication and working principle, quantity and quality of work and concern for organizations that are interconnected with each other. With so many alternative choices and the number of factors to consider makes it difficult for decision makers to make choices. The problem is almost impossible to be analyzed by the human brain through the relationship between all the criteria along with the alternative to determine a truly objective. Decision support system with profile matching method is t...

Decision Support System For Improving Electronic Pulse Buyer Services Based Sms Gateway
2018 6th International Conference on Cyber and IT Service Management (CITSM), 2018
Competitive competition in the service sector employers do make an improvement in serving custome... more Competitive competition in the service sector employers do make an improvement in serving customer demand. Because in the case of services, customer satisfaction is crucial that the business can survive or not in competition with other similar businesses. In services voucher electrically, there have been people who run the business. However, the infrastructure used to tend manually. This will have an impact if the traffic of transactions made high enough. Most of the state of the waiters vouchers electrical services have many used cell phones manually and quite a few are registering more than one voucher distributor electrically to one type of provider. This study designed a system to SMS Gateway Service System for Improving Customer Care Toll On Sale Electric. This system works for diverting the path to the SMS Gateway that contains more than one port. The transfer line at the SMS Gateway of decisions made based on the data processing that takes into account the possibility - the possibility of ports being used so that each transaction can be performed optimally.
Uploads
Conference Presentations by Ratih Puspasari
Papers by Ratih Puspasari