Claim Missing Document
Check
Articles

Found 10 Documents
Search

Liquefaction Potential Map based on Coordinates in Padang City with Google Maps Integration - Liliwarti; - Satwarnirat; Alde Alanda; Rizka Hadelina
JOIV : International Journal on Informatics Visualization Vol 4, No 1 (2020)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1370.527 KB) | DOI: 10.30630/joiv.4.1.312

Abstract

Abstract— Padang City is prone to liquefaction phenomena due to earthquakes. These phenomena can cause various damages to structures, infrastructures, and even can also cause deaths. Therefore, as one of the urban populated cities, the information about liquefaction potential is needed. One of them is by providing a liquefaction potential map, which is useful for mitigation and seismic disaster risks strategies. This article aims to provide a digital map of liquefaction potential in Padang City that integrates with Google Maps. The map is based on 40 coordinates in 7 subdistricts in the city with 3 colored markers that represent the levels of potential liquefaction i.e. no liquefaction level, moderate liquefaction level, and severe liquefaction level. The levels are classified based on the analysis of the secondary Cone Penetration Test data by using the calculation of the Factor of Safety and Liquefaction Potential Index with an earthquake assumption of 8 SR. The result shows that the map has ben able to display information about liquefaction potential, where 32.05% coordinates are classified as no liquefaction level with the highest percentage are in Kuranji, 22.5% are classified as moderate liquefaction level with the highest percentage are in Padang Utara, and 45.0% are classified as severe liquefaction level with the highest percentage are in Koto Tangah.
Implementasi Cloud Based Video Conference System Menggunakan Amazon Web Service Alde Alanda; Deni Satria
JITCE (Journal of Information Technology and Computer Engineering) Vol 5 No 02 (2021): Journal of Information Technology and Computer Engineering
Publisher : Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jitce.5.02.75-80.2021

Abstract

Since December 2019, the world and Indonesia have fought a major disaster, namely the Covid-19 virus pandemic. With the rapid spread or transmission of the virus, the Indonesian government decided to impose social distancing or social restrictions that impacted the education sector. Students and lecturers cannot conduct lectures face-to-face in class or laboratory, but lectures must be conducted online. For that, we need an open-source system developed by the campus in carrying out online courses. This application was developed using cloud technology and JITSI as an open-source video-conferencing application. In this study, testing of the features that exist in video conferencing and resource usage on the server is carried out. The results of feature testing on the application run as expected with several important features used for learning such as chat, share screen, recording features that can run optimally. The result tested the system resources based on the number of participants, 31 participants with an average use of 2.1GB RAM and 78 participants with an average RAM usage of 2.8GB.
Web Application Penetration Testing Using SQL Injection Attack Alde Alanda; Deni Satria; M.Isthofa Ardhana; Andi Ahmad Dahlan; Hanriyawan Adnan Mooduto
JOIV : International Journal on Informatics Visualization Vol 5, No 3 (2021)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.3.470

Abstract

A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store information safely and avoid cyber attacks. Web applications go through rapid development phases with short turnaround times, challenging to eliminate vulnerabilities. The vulnerability on the web application can be analyzed using the penetration testing method. This research uses penetration testing with the black-box method to test web application security based on the list of most attacks on the Open Web Application Security Project (OWASP), namely SQL Injection. SQL injection allows attackers to obtain unrestricted access to the databases and potentially collecting sensitive information from databases. This research randomly tested several websites such as government, schools, and other commercial websites with several techniques of SQL injection attack. Testing was carried out on ten websites randomly by looking for gaps to test security using the SQL injection attack. The results of testing conducted 80% of the websites tested have a weakness against SQL injection attacks. Based on this research, SQL injection is still the most prevalent threat for web applications. Further research can explain detailed information about SQL injection with specific techniques and how to prevent this attack.
Design of Private Geographycal Information System (GIS) Server for Battlefield Management System Alde Alanda; Erwadi Bakar
JOIV : International Journal on Informatics Visualization Vol 1, No 1 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1140.323 KB) | DOI: 10.30630/joiv.1.1.14

Abstract

Geographic Information System (GIS) data is needed for model earth surface in 3D simulation for SAR operation to make simulation process as real as possible. Adding integrated GIS data server to simulation system make simulation application user does not need to input and prepare the GIS data manually, by reducing simulation application user task, user can more concentrate on simulation process.In this research the design and implementation of GIS data application that can provide the data needed by a simulation application using existing data on the online map provider. Application designed to display data necessary to carry out the conversion of GIS data to the format used in the simulation . Based on the test resuls of the conversion of GIS data to map format generated simulation has the same texture to the original map. Simulations can be run by using the map conversion and  the simulation can run using real map but the level of height accuracy  is not optimal.
Network Security Assessment Using Internal Network Penetration Testing Methodology Deni Satria; Alde Alanda; Aldo Erianda; Deddy Prayama
JOIV : International Journal on Informatics Visualization Vol 2, No 4-2 (2018): Cyber Security and Information Assurance
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2300.569 KB) | DOI: 10.30630/joiv.2.4-2.190

Abstract

The development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted by Symantec, the desire to renew an existing security system within a year within a company has the result that only 13% of respondents consider changes to the security system to be important from a total of 3,300 companies worldwide as respondents. This lack of awareness results in the emergence of security holes that can be used by crackers to enter and disrupt the stability of the system. Every year cyber attacks increase significantly, so that every year there is a need to improve the security of the existing system. Based on that, a method is needed to periodically assess system and network security by using penetrarion testing methods to obtain any vulnerabilities that exist on the network and on a system so as to increase security and minimize theft or loss of important data. Testing is carried out by using internal network penetration testing method which tests using 5 types of attacks. From the results of the tests, each system has a security risk of 20-80%. From the results of these tests it can be concluded that each system has a security vulnerability that can be attacked.
Sistem Keamanan Pintu Rumah Berbasis Cloud Computing Humaira; Alfajri Maulana Ibrahim; Alde Alanda
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022): Computer Engineering
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/jitsi.3.1.56

Abstract

Sistem door security ini diciptakan agar dapat memantau lingkungan sekitar area jangkauan dari alat ini. Sistem ini bekerja dengan menggunakan pantulan sinyal ultrasonic dari Sensor jarak yang terhubung ke server database dan terekam pada aplikasi Android User. Sistem ini menggunakan Arduino Mega, Wemos D1 R2, sensor jarak, kamera vc0706, selonid doorlock, dan buzzer. System kerjanya sensor jarak akan diterima di Arduino Mega dan dikirim ke Wemos D1 R2 menggunakan software serial yang data akan dikirim ke database menggunakan jaringan internet yang terhubung di Wemos.
Combining Deep Learning Models for Enhancing the Detection of Botnet Attacks in Multiple Sensors Internet of Things Networks Abdulkareem A. Hezam; Salama A. Mostafa; Zirawani Baharum; Alde Alanda; Mohd Zaki Salikon
JOIV : International Journal on Informatics Visualization Vol 5, No 4 (2021)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.4.733

Abstract

Distributed-Denial-of-Service impacts are undeniably significant, and because of the development of IoT devices, they are expected to continue to rise in the future. Even though many solutions have been developed to identify and prevent this assault, which is mainly targeted at IoT devices, the danger continues to exist and is now larger than ever. It is common practice to launch denial of service attacks in order to prevent legitimate requests from being completed. This is accomplished by swamping the targeted machines or resources with false requests in an attempt to overpower systems and prevent many or all legitimate requests from being completed. There have been many efforts to use machine learning to tackle puzzle-like middle-box problems and other Artificial Intelligence (AI) problems in the last few years. The modern botnets are so sophisticated that they may evolve daily, as in the case of the Mirai botnet, for example. This research presents a deep learning method based on a real-world dataset gathered by infecting nine Internet of Things devices with two of the most destructive DDoS botnets, Mirai and Bashlite, and then analyzing the results. This paper proposes the BiLSTM-CNN model that combines Bidirectional Long-Short Term Memory Recurrent Neural Network and Convolutional Neural Network (CNN). This model employs CNN for data processing and feature optimization, and the BiLSTM is used for classification. This model is evaluated by comparing its results with three standard deep learning models of CNN, Recurrent Neural Network (RNN), and long-Short Term Memory Recurrent Neural Network (LSTM–RNN). There is a huge need for more realistic datasets to fully test such models' capabilities, and where N-BaIoT comes, it also includes multi-device IoT data. The N-BaIoT dataset contains DDoS attacks with the two of the most used types of botnets: Bashlite and Mirai. The 10-fold cross-validation technique tests the four models. The obtained results show that the BiLSTM-CNN outperforms all other individual classifiers in every aspect in which it achieves an accuracy of 89.79% and an error rate of 0.1546 with a very high precision of 93.92% with an f1-score and recall of 85.73% and 89.11%, respectively. The RNN achieves the highest accuracy among the three individual models, with an accuracy of 89.77%, followed by LSTM, which achieves the second-highest accuracy of 89.71%. CNN, on the other hand, achieves the lowest accuracy among all classifiers of 89.50%.
Rancang Bangun Aplikasi Knowledge Management Berbasis Web Yance Sonatha; Indri Rahmayuni; Alde Alanda; Iswandi Saputra
invotek Vol 18 No 2 (2018): INVOTEK: Jurnal Inovasi, Vokasional, dan Teknologi
Publisher : Universitas Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (463.103 KB) | DOI: 10.24036/invotek.v18i2.423

Abstract

Knowledge management is an organization of knowledge held by individuals within an organization. With knowledge management,an individual knowledge can be own by organization so it can give a benefit to organization in order to enhance business competitiveness.Management and documentation of the knowledge in order to become a reference for all the employee within the organization are need a development and implementation of appropriate knowledge management system. The implementation of knowledge management system must be supported by specific features to store and organize the existing knowledge.To overcome this problem, a knowledge management system was designed in the form of a web-based programming system using PHP programming languages ​​with GTFW and MySQL Framework. Knowledge management systems are equiped with data search facilities, documentation and records of problems, information and download features from each of available documents.
Sistem Pendukung Keputusan Pemilihan Program Studi di Politeknik Negeri Padang Menggunakan Metode AHP dan SAW Berbasis Web Sarah Latifah Marif; Meri Azmi; Alde Alanda
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 2 (2022): Information Technology and Visualization
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/jitsi.3.2.64

Abstract

The criteria used in the decision support system for the selection of study programs at the Padang State Polytechnic are data obtained from questions in the form of questionnaires. This web-based decision support system uses the Laravel framework and MySQL as the database. The method used in this system is the AHP (Analytic Hierarchy Process) method for weighting the values for each criterion and the SAW (Simple Additive Weighting) method for determining the study program which can produce faster and more subjective data. This decision support system will produce more accurate data and the results obtained are more optimal so that it can help prospective students solve problems in determining which study program to choose according to their abilities by providing advice for decision support
Sistem Informasi Harga Komoditas Pangan untuk Pasar-Pasar di Kota Padang Indri Rahmayuni; Yance Sonatha; Alde Alanda; Aldo Erianda
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 1 No 1 (2020)
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (495.738 KB) | DOI: 10.30630/jitsi.1.1.5

Abstract

Padang City as the Capital of West Sumatra Province is the main gate of various types of trade commodities in the country. Padang is also a trading center in West Sumatra. Based on BPS data in 2016, there are 17 markets in Padang City with 8 markets managed by the community and 9 markets managed by the City Government of Padang. To assist the community in providing information on the prices of food commodities, a web-based information system is needed that provides information on the price of food commodities (especially basic food) for markets in the city of Padang. Through this information system, the public can find out the price of food commodities by grouping: per-commodity, per-market, and prices at a certain time period. The information system in the form of this website was created using the Laravel 5.5 framework which is one of the breakthroughs in the field of web programming. The Laravel Framework makes it easy for application developers to create web-based information systems. This information system is developed using the Waterfall method where development begins with the analysis, design, implementation, and testing stages.