Claim Missing Document
Check
Articles

Found 5 Documents
Search

Visualisasi 3D Gedung dengan Konsep Virtual Reality Berbasis Android Dwiny Meidelfi; Hanriyawan Adnan Mooduto; Dion Setiawan
invotek Vol 18 No 1 (2018): INVOTEK: Jurnal Inovasi, Vokasional, dan Teknologi
Publisher : Universitas Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (441.371 KB) | DOI: 10.24036/invotek.v18i1.264

Abstract

Penelitian ini bertujuan merancang dan membangun aplikasi virtual reality gedung jurusan Teknologi Informasi Politeknik Negeri Padang berbasis Android. Metode penelitian yang digunakan adalah penelitian kualitatif dimana strategis yang digunakan adalah Design and Creation. Penelitian ini menggunakan metode pengumpulan data observasi. Pengujian yang digunakan adalah menggunakan VR BOX. Hasil dari penelitian ini berupa aplikasi Virtual Reality Gedung Teknologi Informasi yang dapat menjadi media penyampaian informasi terhadap perguruan tinggi. Aplikasi ini sudah memvisualisasikan objek gedung beserta properti didalam gedung Teknologi Informasi, desain aplikasi menarik, informasi yang disajikan sebatas penetahuan umum. Virtual dapat berjalan dalam objek gedung dengan menggunakan kontrol pada kamera dan user mengendalikan untuk memulai atau berhenti.
Deteksi Ancaman Keamanan Pada Server dan Jaringan Menggunakan OSSEC Ronal Hadi; Yarmis Yuliana; Hanriyawan Adnan Mooduto
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.3.1.58

Abstract

Cyber crimes can attack computer networks, infiltrate the network, retrieve confidential data and paralyze computer network systems. In overcoming the crimes that will occur, a system equipped with a firewall and an Intrusion Detection System (IDS) is needed. Firewall and IDS as network security features that can protect servers, networks, and block attacks. Firewall and IDS features can be implemented in OSSEC Tools. OSSEC is an open-source host-based intrusion detection system (HIDS) capable of performing log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerts, and active responses. OSSEC is capable of monitoring a single server or thousands of servers in server/agent mode
Monitoring Suhu dan Kelembaban Tanah Serta Penyiraman Otomatis Buah Naga Berbasis AWS Dwi Suci Amelia; Hidra Amnur; Hanriyawan Adnan Mooduto
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 2 No 3 (2021)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1589.765 KB) | DOI: 10.62527/jitsi.2.3.49

Abstract

Indonesia is an agricultural country that has various types of horticultural plants, one of which is dragon fruit. Dragon fruit is a plant that requires extra care by paying special attention to its growth factors. One of the dragon fruit growth factors is temperature and soil moisture. Dragon fruit will grow well at temperatures ranging from 26-36 degrees Celsius. In addition, this plant must grow on soil that is always moist and not dry and not waterlogged. This is used to avoid rotting stems or dead plants. Therefore, this plant requires monitoring of soil temperature and humidity so that continuous monitoring can be carried out. This plant also requires automatic watering to keep the soil moist.
Sistem Monitoring Suhu Dan Jumlah Pengunjung Kafe Berbasis Cloud Computing Fachru Ramadhan; Hanriyawan Adnan Mooduto; Fitri Nova
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 2 No 4 (2021)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1435.627 KB) | DOI: 10.62527/jitsi.2.4.51

Abstract

Currently, Indonesia is being faced with the COVID-19 pandemic, to prevent being infected with the corona virus, it is to implement health protocols, especially in public places such as shopping centers to airports. The method taken by the Indonesian government in reducing the spread of the corona virus is by implementing PPKM (Enforcement of Community Activity Restrictions) which is one of the requirements for restaurants/cafes, namely limiting the number of visitors to eat in places that are allowed to be around 25% and checking the temperature of restaurant/cafe visitors. The Cloud Computing implementation tool on the temperature monitoring sistem and the number of visitors can assist in the implementation of health protocols in checking the body temperature of visitors at your cafe and make it easier for cafe owners to monitor the number of visitors so that when workers allow an increase in the number of visitors, it can be immediately known through a linked website. with tools.
Continuous Integration and Continuous Deployment (CI/CD) for Web Applications on Cloud Infrastructures Alde Alanda; Hanriyawan Adnan Mooduto; Rizka Hadelina
JITCE (Journal of Information Technology and Computer Engineering) Vol 6 No 02 (2022): Journal of Information Technology and Computer Engineering
Publisher : Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jitce.6.02.50-55.2022

Abstract

At this time, the application development process has experienced much development in terms of tools and the programming language used. The application development process is required to be carried out in a fast process using various existing tools. The application development and delivery process can be done quickly using Continuous Integration (CI) and Continuous Delivery (CD). This study uses the CI/CD technique to develop real-time applications using various programming languages implemented on a cloud infrastructure using the AWS codepipeline, which focuses on automatic deployment. Application source code is stored on different media using GitHub and Amazon S3. The source code will be tested for automatic deployment using the AWS code pipeline. The results of this study show that all programming languages can be appropriately deployed with an average time of 60 seconds