Claim Missing Document
Check
Articles

Found 21 Documents
Search

Penyuluhan dan Pelatihan Mitigasi Bencana Gempa dan Kebakaran di SMAN 15 Padang Suhelmidawati, Etri; Guspari, Oni; Hadi, Ronal; Syofiardi, Syofiardi; Faizi, Abel Ardhya
Jurnal Pustaka Mitra (Pusat Akses Kajian Mengabdi Terhadap Masyarakat) Vol 4 No 2 (2024): Jurnal Pustaka Mitra (Pusat Akses Kajian Mengabdi Terhadap Masyarakat)
Publisher : Pustaka Galeri Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55382/jurnalpustakamitra.v4i2.704

Abstract

Berdasarkan lokasi geografis Indonesia yang diapit oleh dua lempeng aktif dunia menjadikan Indonesia sebagai salah satu negara rawan gempa. Disisi lain, kondisi cuaca yang sering panas dan letak bangunan yang berdekatan sangat memungkinkan untuk terjadinya bencana kebakaran. Oleh karena itu, Tim Pengabdi Teknik Sipil Politeknik Negeri Padang telah melakukan pengabdian masyarakat pada tanggal 23 Agustus 2023 di SMAN 15 Padang, Sumatera Barat. Tujuan kegiatan ini adalah memberikan penyuluhan dan pelatihan lansung tentang mitigasi bencana gempa dan kebakaran, serta mampu membantu masyarakat untuk mendapatkan solusi terhadap permasalahan dalam bidang mitigasi bencana terutama mengenai kesiapsiagaan. Metode pelaksanaan kegiatan diawali dengan memberikan penyuluhan mengenai mitigasi bencana gempa dan kebakaran kemudian demonstrasi lansung tentang pemakaian Alat Pemadam Api Ringan (APAR). Target luaran dari kegiatan pengabdian masyarakat ini adalah adanya peningkatan pemberdayaan masyarakat melalui pelatihan dan praktek lansung mitigasi bencana.
Peningkatan Kompetensi Digital Pelaku UMKM melalui Seminar dan Workshop: Pengalaman di Kelurahan Belian, Kepulauan Riau Humaira, Humaira; Azmi, Meri; Hadi, Ronal; Gusman, Taufik; Putra, Roni; Friadi, John; Nurhatisyah, Nurhatisyah; Windayati, Diana Titik
Jurnal Inovasi Pengabdian dan Pemberdayaan Masyarakat Vol 4 No 2 (2024): JIPPM - Desember 2024
Publisher : CV Firmos

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54082/jippm.652

Abstract

Pelaku Usaha Mikro, Kecil, dan Menengah (UMKM) menghadapi tantangan rendahnya kompetensi digital dalam memanfaatkan teknologi sebagai alat pemasaran di era digital. Untuk mengatasi permasalahan tersebut, kegiatan Seminar dan Workshop Digitalisasi UMKM dilaksanakan di Kelurahan Belian, Kecamatan Batam Kota, Kepulauan Riau. Tujuan kegiatan ini adalah meningkatkan kompetensi digital pelaku UMKM melalui pembekalan teori dan praktik. Metode kegiatan mencakup seminar untuk memberikan pemahaman dasar tentang digital marketing dan workshop untuk melatih keterampilan praktis, seperti desain konten media sosial, pembuatan logo usaha, hingga kreasi lagu promosi. Kegiatan ini melibatkan 50 peserta, yang masing-masing menghasilkan media promosi digital sebagai luaran. Hasil evaluasi menunjukkan peningkatan signifikan dalam pemahaman dan keterampilan digital peserta. Selain itu, kegiatan menghasilkan luaran berupa media promosi digital, publikasi ilmiah, dan dokumentasi kegiatan sebagai bentuk penyebaran dampak program. Dampak jangka panjang dari kegiatan ini diharapkan dapat meningkatkan daya saing dan keberlanjutan UMKM serta menjadi model pemberdayaan berbasis digital yang dapat direplikasi di wilayah lain.
Pemanfaatan Website untuk Promosi Pariwisata di Kawasan Agrowisata Puncak Labuang Kurnia, Rahmi Putri; Defni; Hadi, Ronal; Wijaya, Taruma Leo; Fryonanda, Harfebi; Hafizun, Altaf
AJAD : Jurnal Pengabdian kepada Masyarakat Vol. 4 No. 3 (2024): DECEMBER 2024
Publisher : Divisi Riset, Lembaga Mitra Solusi Teknologi Informasi (L-MSTI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59431/ajad.v4i3.404

Abstract

The development of technology-based tourism is a strategic step to increase the competitiveness of local destinations, such as Puncak Labuang in Nagari Limau Manis. This community service activity aims to increase the visibility and accessibility of Puncak Labuang tourism information by developing the visit.limaumanis.id website. The methods used include identifying needs, designing, developing systems, testing functionality, and training representatives of the Limau Manis Community Empowerment Forum (FPM). The activity results show that users consider this website easy to use and valuable. The training provided improves the ability of FPM representatives to manage and update content independently. A post-training survey revealed that 90% of participants felt more confident operating the website, and 88% considered the interface easy to understand. This implementation is expected to support the promotion of local tourism effectively and sustainably, which positively impacts the economy and welfare of the local community. This program shows the importance of synergy between technology and society for developing local potential.
Designing an Online Supervision System (Logbook) with Laravel Framework Hadi, Ronal; Defni, -; Medrofa, Arnila Cahya
International Journal of Advanced Science Computing and Engineering Vol. 2 No. 2 (2020)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (666.243 KB) | DOI: 10.62527/ijasce.2.2.49

Abstract

Final Year Project is one of the students’ graduation requirements to get a Bachelor Degree in Higher Education. The supervising process is an essential part of the final project activity between the supervisor and the students to supervise the students to produce a qualified final project. The article aims at designing a logbook application by using the Laravel Framework for students’ supervising process. The design of the logbook used Laravel framework and a MySQL database. It is utilized by Information Technology major Politeknik Negeri Padang.
Fiber to The Home (FTTH) Network Design with Addition of Optical Distribution Point (ODP) Using the Branching Method Asril, Aprinal Adila; Maria, Popi; Lifwarda, -; Antonisfia, Yul; Hadi, Ronal
International Journal of Advanced Science Computing and Engineering Vol. 5 No. 2 (2023)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/ijasce.5.2.136

Abstract

Optical fiber is a transmission medium that uses light as a signal conductor. In order for optical fibers to be used and the benefits are felt, a network architecture is needed, namely FTTH. FTTH consists of active devices such as OLT and ONT as well as passive devices consisting of ODC, Closure, and ODP. In this design, it uses OLS as a light signal transmitter and produces input power. However, over time and the increase in population capacity and the number of access services available, of course, there are more and more requests for the installation of optical networks in customers' homes. Therefore, the most available FTTH device is ODP in order to be able to withdraw cables to customers' homes and continue to expand FTTH. Therefore, this study will discuss the addition of new ODP with the branching method. Using OPM as a measuring tool and calculating the power link budget to find out that the resulting attenuation value is no more than 28dB.
Information System and Population Data Search Using the Boyer-Moore Algorithm in Nagari Kotobaru Simalanggang Sukma, Fanni; Hadi, Ronal; Chairani, Fitri; Sariani; Wardhani, Aditya
International Journal of Advanced Science Computing and Engineering Vol. 5 No. 3 (2023)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/ijasce.5.3.185

Abstract

The growth of information technology throughout the world is now faster and stronger than before, one of which is Information Systems. The development of the Nagari information system in Kotobaru Simalanggang aims to increase the efficiency of Nagari administrative staff in searching for population data while making it easier for the public to manage administrative documents such as correspondence. This system enables users to process documents such as letters through a special website. To improve the accuracy of data searches, the Boyer-Moore algorithm was used, with Population Identification Numbers (NIK) and resident names as search criteria. The Laravel framework with Model-View-Controller (MVC) architecture is used to create this website. The waterfall technique is used in the research process. This strategy was chosen because each stage must wait for the preceding stage to be completed before proceeding. In data search, the implementation of the Boyer-Moore method yields a 100% accuracy rate. This guarantees that the public receives the most relevant information.
Analisis Usability Testing pada Sistem Informasi Dokumentasi dan Pelaporan Akreditasi Zahra, Suci Khairatuz; Yulherniwati; Hadi, Ronal
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 5 No 3 (2024)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.5.3.247

Abstract

Study Program Accreditation is an effort to improve the quality of higher education institution services can be realized by building an information system and quality culture. This study was carried out to create an information system that is able to accommodate accreditation documentation and reporting in the Information Technology Department and analyzing usability testing with the system usability scale (SUS) and user interviews. The research results show that the average SUS score is 65. This score shows that users can accept information systems based on aspects of their usability. However, improving the quality of the application is still necessary, because the usability score also shows that the quality of the application is still at level D. Evaluation to improve application quality can begin by improving aspects of errors and satisfaction in the information system.
Black-Box Testing pada Sistem Evaluasi Capaian Pembelajaran Berdasarkan Outcome Based Education Yulherniwati; Febrian Kasmar, Andre; Hadi, Ronal; Humaira; Asri, Ervan
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 6 No 2 (2025)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.6.2.279

Abstract

The implementation of outcome based education curriculla requires an evaluation system capable of objectively and systematically measuring the achievement of graduation learning outcomes (GLO). Therefore, comprehensive testing of the GLO evaluation system is essentially to ensure its reliability. This study designs functional testing using a black box-testing testing approach, employing techniques such as equivalence class partitioning, boundary value analysis and state transition testing. The test case design process follow the software testing process according to ISTQB, focusing on the initial three stages: planning, analysis and design. The findings indicate that this approach is effective in verifying the qualityof GLO evaluation system based on OBE. The resulting test case design can serve as a reference for subsequent testing stages, both manual and automated
Real-time Defense Against Cyber Threats: Analyzing Wazuh's Effectiveness in Server Monitoring Alanda, Alde; Mooduto, H.A; Hadi, Ronal
JITCE (Journal of Information Technology and Computer Engineering) Vol. 7 No. 2 (2023)
Publisher : Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jitce.7.2.56-62.2023

Abstract

As cloud computing grows exponentially, organizations face escalating cybersecurity challenges due to increased cyber threats and attacks on cloud-based networks. Monitoring cloud servers is one action that can be taken to improve the security. This can be done with the help of various server monitoring tools, such as Wazuh. The study investigates Wazuh's effectiveness in real-time monitoring of three AWS EC2 instance-based cloud servers. Wazuh's capabilities such as log data collection, malware detection, active response automation, and Docker container monitoring, are examined. The research reveals detailed insights into user activities, web server access, and database operations. Wazuh proves adept at tracking file integrity, detecting malware, and responding actively, as evidenced by the 342 alerts generated during a 24-hour monitoring period. The result shows that Wazuh is a particularly effective tool for protecting cloud environments from cyberattacks because it provides quick and ongoing security monitoring, which is essential for securing intricate cloud infrastructures.
Cloud Computing Issues, Challenges, and Needs: A Survey Aljanabi, Mohammad; Abd-Alwahab, Shams N.; Saedudin, RD Rohmat; Ebraheem, Hind Raad; Defni, -; Hadi, Ronal; Ismail, Mohd Arfian
JOIV : International Journal on Informatics Visualization Vol 5, No 3 (2021)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/joiv.5.3.671

Abstract

Cloud computing represents a kind of computing that is based on the sharing of computing resources instead of possessing personal devices or local servers for handling several applications and tasks. This kind of computing includes three distinguished kinds of services provided remotely for clients that can be accessed by using the Internet. Typically, clients work on paying annual or monthly service fees for suppliers, in order to gain access to systems that work on delivering infrastructure as a service, platforms as a service, and software as a service for any subscriber. In this paper, the usefulness and the abuse of the cloud computing are briefly discussed and presented by highlighting the influences of cloud computing in different areas. Moreover, this paper also presents the kinds and services of cloud. In addition, the security issues that cover the cloud security solution requirements, and the cloud security issues, which is one of the biggest issues in recent years in cloud computing were presented in this paper. The security requirement that needs by the cloud computing covers privacy, lack of user control, unauthorized secondary usage, and finally data proliferation and data flow. Meanwhile, the security issues cover including ownership of device, the trust issue and legel aspects. To overcome the security issues, this paper also presents the solution at the end of this paper.