Claim Missing Document
Check
Articles

Found 15 Documents
Search

Group Decision Support System untuk Menentukan Kelayakan Penerima Bantuan Sosial dengan Metode AHP (Analytical Hierarchy Process) dan Borda Hidra Amnur; Nuria Sisma Putri; Deni Satria
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 3 (2022)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.3.3.95

Abstract

The Indonesian government wants to offer social assistance to lessen the burden on the underprivileged. The DTKS records prospective recipients of assistance as being from low-income families (Social Welfare Integrated Data). The elimination of DTKS will take place in order to stop recipients from receiving social assistance as the recipients' standard of living rises. The standard of living of the recipients and potential beneficiaries will change at some point. Therefore, whether or not the recipients and potential beneficiaries of DTKS are eligible, it is necessary to update the DTKS. The waterfall model SDLC methodology that is being used has the requirement that each process be completed before moving on to the next one or be completed in order. In order to assess the viability of DTKS, the system can use the AHP (Analytical Hierarchy Process) and Borda methods based on the decision maker, criteria, and sub-criteria. Only RT users whose feasibility reference is above 0.29 are considered eligible according to the AHP (Analytical Hierarchy Process) method's feasibility results. The results from the Borda method with the feasibility reference were given the highest priority and the lowest weight, respectively, for the final results on feasibility after going through the AHP process
Implementasi Cloud Based Video Conference System Menggunakan Amazon Web Service Alanda, Alde; Satria, Deni
JITCE (Journal of Information Technology and Computer Engineering) Vol. 5 No. 02 (2021)
Publisher : Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jitce.5.02.75-80.2021

Abstract

Since December 2019, the world and Indonesia have fought a major disaster, namely the Covid-19 virus pandemic. With the rapid spread or transmission of the virus, the Indonesian government decided to impose social distancing or social restrictions that impacted the education sector. Students and lecturers cannot conduct lectures face-to-face in class or laboratory, but lectures must be conducted online. For that, we need an open-source system developed by the campus in carrying out online courses. This application was developed using cloud technology and JITSI as an open-source video-conferencing application. In this study, testing of the features that exist in video conferencing and resource usage on the server is carried out. The results of feature testing on the application run as expected with several important features used for learning such as chat, share screen, recording features that can run optimally. The result tested the system resources based on the number of participants, 31 participants with an average use of 2.1GB RAM and 78 participants with an average RAM usage of 2.8GB.
A Comparative Study of Image Retrieval Algorithm in Medical Imaging Abdullah, Yang Muhammad Putra; Bakar, Suraya Abu; Hj Wan Yussof, Wan Nural Jawahir; Hamzah, Raseeda; Hamid, Rahayu A; Satria, Deni
JOIV : International Journal on Informatics Visualization Vol 8, No 3-2 (2024): IT for Global Goals: Building a Sustainable Tomorrow
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3-2.3447

Abstract

In recent times, digital environments have become more complex, and the need for secure, efficient, and reliable identification systems is growing in demand. Consequently, image retrieval has emerged as a critical area focusing on artificial intelligence and machine learning applications. Medical image retrieval has become increasingly crucial in today's healthcare field, as it involves accurate diagnostics, treatment planning, and advanced medical research. As the quantity of medical imaging data grows rapidly, the ability to efficiently and accurately retrieve relevant images from extensive datasets becomes critical. Advanced retrieval systems, such as content-based image retrieval, are imperative for managing complex data, ensuring that healthcare professionals can access the most relevant information to improve patient outcomes and advance medical knowledge. This paper compares three algorithms: Scale Invariant Feature Transform, Speeded Robust Features, and Convolutional Neural Networks in the context of two medical image datasets, ImageCLEF and Unifesp. The findings highlight the trade-offs between precision and recall for each algorithm, providing invaluable insights into selecting the most suitable algorithm for specific tasks. The study evaluates the algorithms based on precision and recall, two critical performance metrics in image retrieval.
A Web-based Group Decision Support System for Retail Product Sales a Case Study on Padang, Indonesia Azmi, Meri; Satria, Deni; Mulya, Farhan Rinsky; Sonatha, Yance; Putra, Dwi Sudarno
JOIV : International Journal on Informatics Visualization Vol 7, No 3 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.7.3.1331

Abstract

The industrial sector's growth has led to an increase in the number of industrial products available in the market. However, this has made it more challenging for retail merchants to choose which items to sell due to the overwhelming number of options. The seller must carefully consider various factors such as the type, quality, and probability of selling the goods to turn a profit. This research proposes a group decision support system to assist retail sellers in selecting the products to sell. The system is designed to process various information on comparing retail products against specific criteria, enabling sellers to make quick and accurate decisions. To achieve optimal results, this study combines three methods in the decision-making calculation process: Fuzzy Logic, EDAS, and Borda methods. The Fuzzy Logic method is used to assign a value to an unclear criterion, followed by the EDAS method ranking process, and ending with the combination of the decision-making results using the Borda method. The group decision support system is web-based and has been proven to provide effective solutions for retail business actors to increase sales and reduce losses. By using this system, retail sellers can make informed decisions about their products, enabling them to optimize their profits and reduce their risks. In conclusion, the increase in the number of industrial products has created challenges for retail merchants, but this research proposes a solution in the form of a group decision support system. Combining Fuzzy Logic, EDAS, and Borda methods results in an effective decision-making process that allows retail sellers to make informed decisions and achieve their business goals.
Web Application Penetration Testing Using SQL Injection Attack Alanda, Alde; Satria, Deni; Ardhana, M.Isthofa; Dahlan, Andi Ahmad; Mooduto, Hanriyawan Adnan
JOIV : International Journal on Informatics Visualization Vol 5, No 3 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.3.470

Abstract

A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store information safely and avoid cyber attacks. Web applications go through rapid development phases with short turnaround times, challenging to eliminate vulnerabilities. The vulnerability on the web application can be analyzed using the penetration testing method. This research uses penetration testing with the black-box method to test web application security based on the list of most attacks on the Open Web Application Security Project (OWASP), namely SQL Injection. SQL injection allows attackers to obtain unrestricted access to the databases and potentially collecting sensitive information from databases. This research randomly tested several websites such as government, schools, and other commercial websites with several techniques of SQL injection attack. Testing was carried out on ten websites randomly by looking for gaps to test security using the SQL injection attack. The results of testing conducted 80% of the websites tested have a weakness against SQL injection attacks. Based on this research, SQL injection is still the most prevalent threat for web applications. Further research can explain detailed information about SQL injection with specific techniques and how to prevent this attack.