Claim Missing Document
Check
Articles

Found 5 Documents
Search

PENGEMBANGAN SISTEM INFORMASI GEOGRAFIS (SIG) PADA PLATFORM GOOGLE UNTUK PENANGGULANGAN KEBAKARAN DI JAKARTA SELATAN Edy Irwansyah; Sena Adhinugraha; Tri Datara Wijaya
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2011
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penelitian yang dilakukan bertujuan untuk pengembangan sistem informasi geografis pada platform googlemengenai letak posisi daerah rawan kebakaran di wilayah Jakarta Selatan beserta titik-titik pendukungpenanggulangan dan juga sebagai alat analisis untuk pengembangan dan penambahan komponen pendukungdalam penanganan dan penanggulangan bencana kebakaran. Metodologi yang digunakan dalam penelitian inimenggunakan metodologi waterfall model yang terdiri berbagai tahapan seperti: requirements, analysis,design, coding, testing dan maintenance. Kesimpulan yang yang dapat ditarik dari penelitian ini antara lainadalah pemanfaatan aplikasi dari sistem informasi geografis (SIG) khususnya yang berbasis web berguna untukSUDIN pemadam kebakaran sebagai alat bantu untuk menanggulangi bahaya kebakaran khususnya di JakartaSelatan. Pemanfaatan SIG ini juga memberikan informasi yang berguna bagi masyarakat mengenai persebarantitik rawan kebakaran dan titik penanggulangan terdekat sehingga masyarakat harus tetap wasapada terhadappotensi kebakaran yang dapat terjadi setiap saat.
ZONASI DAERAH BAHAYA KEGEMPAAN DENGAN PENDEKATAN PEAK GROUND ACCELERATION (PGA) Edy Irwansyah; Edi Winarko
Seminar Nasional Informatika (SEMNASIF) Vol 1, No 5 (2012): Geoinformatic And GIS
Publisher : Jurusan Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penelitian ini bertujuan untuk menyusun zonasi daerah bahaya kegempaan pada infrastruktur bangunan di kota Banda Aceh menggunakan pendekatan nilai peak ground acceleration (PGA) dari fungsi atenuasi global dan lokal. PGA dihitung menggunakan fungsi antenuasi yang menggambarkan korelasi antara intensitas gerakan tanah setempat, magnitude gempa dan jarak dari sumber gempa. Data yang digunakan bersumber dari katalog gempa merusak badan meteorologi, klimatologi dan geofisika rentang tahun 1973 – 2011. Metode penelitian terdiri dari enam tahapan yaitu pembuatan grid, perhitungan jarak dari sumber gempa ke centroid grid, perhitungan nilai PGA, pengembangan aplikasi komputer, ploting nilai PGA di centroid grid, dan penyusunan zona bahaya kegempaan dengan algoritma kriging. Kesimpulan penelitian adalah bahwa fungsi atenuasi global yang dikembangkan oleh Youngs et al, 1997 dapat diaplikasikan dengan baik untuk menghitung nilai PGA di Kota Banda Aceh. Kota Banda Aceh secara mikro dapat dibagi dalam dalam tiga zona bahaya kegempaan yaitu zona bahaya kegempaan rendah dengan nilai PGA 0.8767 gals hingga 0.8780 gals, zona bahaya kegempaan menengah dengan nilai PGA 0.8781 gals hingga 0.8793 dan zona bahaya kegempaan tinggi dengan nilai PGA 0.8794 gals hingga 0.8806 gals
Physical Vulnerability Modeling Based On Flood Inundation Model and Image Mining Maulana Ibrahim Rau; Guruh Samodra; Hendra Pachri; Edy Irwansyah; Muhammad Subair
Jurnal Teknik Sipil dan Lingkungan Vol. 1 No. 3: Desember 2016
Publisher : Departemen Teknik Sipil dan Lingkungan, IPB University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (12.81 KB) | DOI: 10.29244/jsil.1.3.137-146

Abstract

Flash flood disaster occurred within the City of Garut, West Java, Indonesia, on 20th September 2016, which caused many casualties and damages. Flood model could be performed to model the already-occurring disaster, as well as to depict future events that may occur to overcome any potential disasters, where the inundation flood model depicted the element at risk. In order to assist the analysis for the damages occurred, image mining could be used as part of the approach, where online media was utilized as well. The image mining resulted information about building damages caused by the flood. Afterwards, the physical vulnerability (buildings/residents) model could be further performed. Finally, the relationship between vulnerability and the flood inundation were portrayed. The resulted physical vulnerability model showed that larger height of the flood water caused higher degree of loss of the building, in which portrayed the need for total rebuild of houses as well. Considering available open source data and fast data acquisition, the approach showed such efficient approaches, where the results could be used in order to establish recommendation for building reinforcement, spatial planning, or protection wall in flood prone areas within the future time.
Kajian Keamanan Sistem Informasi Akademik Menggunakan Framework COBIT 5 Supit, Yonal; Edy Irwansyah
Jurnal Teknomatika Vol 17 No 1 (2024): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v17i1.1330

Abstract

This study examines the security of academic information systems using the COBIT 5 Framework. Key issues are uncertainty in protecting student and staff data, the potential for cyberattack vulnerabilities, and non-compliance with international security standards. The goal is to evaluate the security level of the system and suggest improvement recommendations according to COBIT 5 principles. Research methods include Renstar IT policy analysis, system audits, and interviews with IT personnel and related academic communities. Data is analyzed quantitatively to identify weaknesses and opportunities for improvement. The COBIT 5 framework is used as a security assessment framework. The results highlight the need for improvement, including access management, activity monitoring, and continuous improvement plans. Using COBIT 5, substantial measures such as strengthening access controls and developing disaster recovery plans can be identified. The research emphasizes the importance of a structured approach in improving the security of academic information systems, with COBIT 5 as a useful tool. With the right measures, system security can be enhanced to protect the integrity, confidentiality, and availability of critical data for educational institutions. In conclusion, these measures demonstrate how important COBIT 5 implementation is in addressing information security challenges in academic environments.
Kajian Keamanan Sistem Informasi Akademik Menggunakan Framework COBIT 5 Supit, Yonal; Edy Irwansyah
Jurnal Teknomatika Vol 17 No 1 (2024): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v17i1.1330

Abstract

This study examines the security of academic information systems using the COBIT 5 Framework. Key issues are uncertainty in protecting student and staff data, the potential for cyberattack vulnerabilities, and non-compliance with international security standards. The goal is to evaluate the security level of the system and suggest improvement recommendations according to COBIT 5 principles. Research methods include Renstar IT policy analysis, system audits, and interviews with IT personnel and related academic communities. Data is analyzed quantitatively to identify weaknesses and opportunities for improvement. The COBIT 5 framework is used as a security assessment framework. The results highlight the need for improvement, including access management, activity monitoring, and continuous improvement plans. Using COBIT 5, substantial measures such as strengthening access controls and developing disaster recovery plans can be identified. The research emphasizes the importance of a structured approach in improving the security of academic information systems, with COBIT 5 as a useful tool. With the right measures, system security can be enhanced to protect the integrity, confidentiality, and availability of critical data for educational institutions. In conclusion, these measures demonstrate how important COBIT 5 implementation is in addressing information security challenges in academic environments.