Claim Missing Document
Check
Articles

Pengujian High Availability pada Asynchronous DNS Berbasis Restknot menggunakan Algoritma Round Robin Pratama, I Putu Agus Eka; Andreyana, Putu Veda; Nurjana, Putu Ramaditya
Jurnal Indonesia : Manajemen Informatika dan Komunikasi Vol. 5 No. 1 (2024): Januari
Publisher : Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK Indonesia Banda Aceh

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jimik.v5i1.582

Abstract

The existence of the Domain Name System (DNS) through the role of the DNS Record, functions to translate domain addresses into IP addresses. High availability is an absolute condition so that the service from the DNS Server is still available and running well. To make this happen, it is necessary to have an asynchronous API on the DNS server and data management on the DNS record. This research designs and implements RESTKnot as an asynchronous API on DNS Server for DNS record management, accompanied by high availability testing using Load Balancing techniques and the Round Robin (RR) algorithm. The test results show that RESTKnot can help the DNS record management process dynamically, where DNS records can be made through the RESTKnot API and RESTKnot CLI, to be sent to the RESTKnot agent and executed by Knot DNS. The test results also show that RESTKnot can realize high availability through a ten-time system access test scenario, where heavy traffic on the first web server can be immediately diverted to the second web server to achieve high availability.
Node.js Performance Benchmarking and Analysis at Virtualbox, Docker, and Podman Environment Using Node-Bench Method Pratama, I Putu Agus Eka; Raharja, I Made Sunia
JOIV : International Journal on Informatics Visualization Vol 7, No 4 (2023)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.7.4.1762

Abstract

As an asynchronous runtime environment (interpreter) for the development of scalable JavaScript-based network applications, it is necessary to know the performance of the web framework on Node.js in a virtualization-oriented development environment and a container-oriented development environment. This research aims to compare the performance of Node.js in several frameworks in VirtualBox, Docker, and Podman environments. The testing was carried out using some materials like a bench utility at Node Package Manager (NPM) involving the Adonis, Connect, Express, Fastify, Foxify, Hapi, Koa, Molecular, Plumier, Restify, and Sails frameworks, using Object Relational Mapping (ORM) and Raw Query Bookshelf, Knex, MySQL, MySQL2, and Sequelize at Ubuntu Linux operating system. The method research used in this research is the Node-Bench method with requests, latency, and throughput parameters. The testing results show that the best performance score is the Fastify framework with the Sequelize library (ORM) in a container-oriented development environment (Docker and Podman), and the worst performance score is the Express framework with the Mysql2 library (Raw Query) in a virtualization-oriented development environment (VirtualBox). Based on the testing results, developers who use Node.js are more advised to use the Fastify framework with the Sequelize library (ORM) in a container-oriented development environment (Docker or Podman) to obtain better performance. For further research, the implementation and testing at container-oriented development can use cloud-based service (IaaS cloud or PaaS Cloud) for the read-only immutable environment, scalability, and security reasons.Keywords— Docker, Node-Bench method, Node.js, Podman, VirtualBox.
Smart Expo UMKM Based on Extreme Programming Method: Evaluating on Black Box and UAT Pratama, I Putu Agus Eka; Andreyana, Putu Veda; Putra, Yogiswara Dharma
International Journal of Advances in Data and Information Systems Vol. 5 No. 2 (2024): October 2024 - International Journal of Advances in Data and Information System
Publisher : Indonesian Scientific Journal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59395/ijadis.v5i2.1344

Abstract

The rapid development of information technology (IT) and the post-Covid-19 pandemic conditions provide joint learning to provide an online service that allows a business expo event to be carried out virtually and online based on the web. UMKM or Micro, small, and medium enterprises (MSMEs), as the spearhead of the people's and regional economies, can utilize IT to improve product marketing and distribution through web-based virtual expos. For this reason, this study carried out the design and implementation of a web-based smart virtual expo using the Extreme Programming development method in a case study of the MSME business expo event in X Regency. The Extreme Programming development method was chosen to facilitate the adjustment of user needs to the virtual expo website developed through active communication with users during the development process and to make development possible in a relatively short time. This study uses a qualitative case study research method and the Black Box Testing method on the developer side and User Acceptance Testing (UAT) on the user side. The results of the study on Black Box Testing showed that all functionalities on the developed Smart Virtual Expo prototype can run well, and all users can accept the prototype well, with the largest age range at 41-50 years (56.8%) can use the prototype to access information and videos of products.
Mapping Review Penerapan Artificial Intelligence pada Cyber Security untuk Meningkatkan Security Awareness I Putu Agus Eka Pratama; I Made Oka Widyantara; Linawati; Nyoman Gunantara
Prosiding SISFOTEK Vol 8 No 1 (2024): SISFOTEK VIII 2024
Publisher : Ikatan Ahli Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid development of information technology (IT), on the one hand, has the potential to increase the number of cyber attacks, so cyber security needs to be handled properly. As the weakest element, efforts are needed to increase cyber security awareness on the user side. Artificial intelligence (AI), which is increasingly developing and widely applied in various fields of life, has the potential to be used to increase security awareness in users. To study this further, a literature study, review, and mapping analysis were conducted from a number of references in order to obtain an overview of the potential and future research plans related to the use of AI in cyber security for security awareness along with providing recommendations. This study conducted a study and analysis using the mapping review method on 37 selected papers indexed by Google Scholar, referring to the NIST (National Institute of Standards and Technology) framework. The results of the mapping review show that the mapping of publications related to the application of AI to cyber security to increase security awareness is the most in 2024, with the most trends being education/training, and the most widely used AI method is deep learning. This study recommends education and deep learning as areas that can be taken for future research related to the application of AI to cyber security.
IBC Tracer: Web-Based Application for Online Tracing the Spread of Covid-19 in Indonesia Using BFS Algorithm Pratama, I Putu Agus Eka
International Journal of Artificial Intelligence Research Vol 6, No 2 (2022): Desember 2022
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (451.486 KB) | DOI: 10.29099/ijair.v6i1.246

Abstract

In the case of handling the Covid-19 pandemic in Indonesia, there is a 3T (Testing, Tracing, Treatment) movement promoted by the government to reduce the impact of the spread and transmission of Covid-19. For tracing, there are currently no Information Technology-based applications or services that can assist the public in simulating the tracing of the spread of Covid-19 from one location to another location and providing disaster mitigation education to users through suggestions provided by the application after the tracking process. For this reason, this study was designed and implemented using a web-based Artificial Intelligence (Breadth-First Search) algorithm called Indonesia BFS Covid-19 (IBC). This research uses Design Science Research Methodology (DSRM) and tested using BlackBox Testing. From the testing results, it is concluded that the application can simulate the process of tracing the spread of Covid-19 in Indonesia well based on the starting point and destination, and users can gain an understanding of disaster mitigation education from the advice given by the post-tracing application, as part of 3T, to help decide the impact of the spread of Covid-19 in Indonesia.
Bibliometric Analysis of AI-Based Prototype Proposal for User Security Awareness in Healthcare Pratama, I Putu Agus Eka; Widyantara, I Made Oka; Linawati, Linawati; Gunantara, Nyoman
JOIV : International Journal on Informatics Visualization Vol 9, No 3 (2025)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.9.3.3319

Abstract

In the realm of public healthcare, integrating information technology (IT) must be judiciously balanced with heightened security awareness among users, given the escalating frequency of cyberattacks targeting this sector. Despite the availability of various product and service solutions aimed at enhancing user security awareness, these efforts have yet to yield optimal outcomes. There is a pressing need for innovative approaches to bolster healthcare user security awareness through IT, particularly leveraging the rapidly advancing field of artificial intelligence (AI). This study conducts a comprehensive review of prior research on the application of AI, specifically Large Language Models (LLM), within the domain of healthcare cybersecurity from 2014 to 2024. The objective is to ascertain the volume of publications, trace the evolution of publication trends, and assess the potential and positioning of research in this area. Employing a bibliometric analysis methodology, this study analyzes a dataset comprising 1000 related publications indexed by Google Scholar. The findings reveal that publications concerning applying LLM AI in healthcare cybersecurity constituted 12.82% in 2023, with a significant increase to 87.18% in 2024, representing a 6.8-fold rise. The mapping of publication developments is categorized into 24 clusters, with large language models, healthcare, retrieval-augmented generation, LLM, artificial intelligence, and cybersecurity emerging as the six most frequently discussed keywords in the research landscape. Consequently, this study underscores the substantial potential for current and future research on the application of AI in healthcare cybersecurity, advocating for the development of AI-based solutions to enhance healthcare user security awareness.
Co-Authors Adhigamika, Dewa Putu Surya Adinatha, Dewa Gde Eka Krisna Altry David Purba Anak Agung Bagus Arya Wiradarma Anam, Fahri Choirul Andreyana, Putu Veda Anindya, Tabina Dea Arista, I Putu Gede Eka Yuda Arya Widyaningrat, Made Gunawan Assegaf, Achmad Jefri Ayu Wirdiani Bernard, Rey Budi Rahardjo Butarbutar, Ryan Timothy Benget Daulat Daniswara, Rasendriya Revo Debora, Uli Rindu Dewa Gede Kesuma Yoga Dharmawangsa, I Dewa Gede Govindha Dharmesta, Putu Adhika Dwi Chayani, Ni Kadek Chita Dwi Putra Githa Efraim William Solang Gede Rasben Dantes Geovaldo, I Putu Hendra Gusti Agung Ayu Putri Gusti Made Arya Sasmita Hrikesa, I Gusti Ngurah Agung Agie I Gede Agus Pradipta I Gusti Agung Made Wirautama I Gusti Ayu Triwayuni I Ketut Adi Purnawan I ketut Gede Darma Putra I Komang Wahyu Hadi Permana I Made Adhiarta Wikantyasa I Made Agus Dwi Suarjaya I Made Candiasa I Made Oka Widyantara I Made Sunia Raharja I Made Sunia Raharja I Made Sunia Raharja, I Made Sunia I Nyoman Gunantara I Nyoman Piarsa I Putu Gede Eka Yuda Arista I Wayan Gus Arisna Ida Bagus Kade Taruna Irianto Yohanes Sampe Isna Wanda Robiulla Johan Tamin Kevin Christopher Bakkara Krisnadinatha, I Gede Arya Lampung, Pramayota Fane'a Linawati Linawati Linawati Liukae, Herry Daniel Prasetia Mahaputra, Putu Andre Maharani, Ni Putu Berliana Mahawardana, Putu Pasek Okta Meilani, Ni Putu Cindy Mohammad Ernico Suryo Wicaksono Muhammad Syakurrahman NI Kade Mega Handayani Ni Made Ika Marini Mandenni nugraha, gemara adiyasa parahita Nurjana, Putu Ramaditya Pramayota Fane'a Lampung Pratika, Made Toby Sathya pratiwi, Dewa Ayu gandhi Prawira, I Gede Denis Yuda Purniawan, I Made Arta Putra, I Putu Bayu Aditya Putra, Yogiswara Dharma Putu Adhika Dharmesta Putu Adhika Dharmesta Putu Bayu Suarnata Wahyu Putra Putu Ramaditya Nurjana Putu Veda Andreyana Putu Veda Andreyana Radityawan, I Wayan Ananta Reyhan Todo Noer Yamin Riani, Dinda Sasmita, Gusti Arya Sasmita, Gusti Made Arya Satriya, Rizki Dwi Syakurrahman, Muhammad Theca Difa Yulian Syahputri Wati, Ni Luh Made Adi Dharma Wibowo, I Kadek Tribuana Tungga Wicaksono, Mohammad Ernico Suryo Wiradarma, Anak Agung Bagus Arya Wiranatha, A. A. Kt. Agung Cahyawan Yogiswara Dharma Putra