Claim Missing Document
Check
Articles

Found 20 Documents
Search

Plume Detection System Based Internet of Things I Nyoman Susila Astraning Utama; Sirojul Hadi; I Putu Hariyadi
International Journal of Engineering and Computer Science Applications (IJECSA) Vol 1 No 1 (2022): March 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (808.285 KB) | DOI: 10.30812/ijecsa.v1i1.1698

Abstract

Security is one of the important aspects in a system or environment. Residential, office, tourist and industrial areas are places that are prone to fires because they contain flammable objects. Slow handling when a gas leak occurs can trigger a fire. The solution that can be used to minimize the occurrence of fires is to build tools that work to monitor the condition of the room or environment that is prone to leakage of gas or other flammable liquids. The design and manufacture of a system to detect LPG and alcohol gas leaks can be useful for providing information in the event of a gas or alcohol leak so that it can be handled quickly and minimize fire damage. This system combines an plume detection system with an internet of things system so that it can provide information when a gas or flammable liquid leak occurs. The gas leak information is sent as a notification to the telegram from the operator. The design and manufacture of this system uses the Waterfall methodology with the following stages: analyzing (covering the need for system creation), system design (including designing electronic circuits and web monitoring interfaces), implementing system design and testing the system as a whole. The result of this research is that an electronic detection system has been successfully built that can distinguish gases and can provide information via telegram and web if gas is detected in the sensor environment. In the LPG gas leak test, the results show that the characteristics of LPG gas, namely the sensor output voltage, have an average of 4.17 volts with an average Part Per Million (PPM) of 8340 and the characteristics of alcohol gas, namely the sensor output voltage, have an average of 0, 13 volts with an average Part Per Million (PPM) of 254.
Implementation of Port Knocking with Telegram Notifications to Protect Against Scanner Vulnerabilities Husain Husain; I Putu Hariyadi; Kurniadin Abd Latif; Galih Tri Aditya
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer Vol 23 No 1 (2023)
Publisher : LPPM Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/matrik.v23i1.3459

Abstract

The opening of the service port on the Mikrotik router provides an opening for hackers to enter the Mikrotik service to access the router illegally. This research aimed to close certain ports that are gaps for hackers and uses port knocking and telegram bots. The Telegram bot was used as a message notification to managers in real-time to provide information that occurs when the vulnerability scanning process is carried out to find and map weaknesses in the network system. Searching for weaknesses also includes looking for open router service ports such as ports 22, 23, 80, and 8291. This research used the Network Development Life Cycle method, which started from analysis design and prototype simulation to implementation. The research results after testing were able to secure local network service ports against vulnerability scanners on routers using the port knocking method, and testing attack schemes carried out from each scheme could run well on the router’s local network and obtain notifications via telegram bots in real time to administrators. This research contributes to administrators’ ability to secure networks so irresponsible people do not easily infiltrate them.
Implementasi Metode Waterfall untuk Membuat Antarmuka pada Aplikasi Koperasi Simpan Pinjam Berbasis Mobile Dharma, I Made Yadi; Hariyadi, I Putu; Adil, Ahmat; Santoso, Heroe
JTIM : Jurnal Teknologi Informasi dan Multimedia Vol 6 No 3 (2024): November
Publisher : Puslitbang Sekawan Institute Nusa Tenggara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/jtim.v6i3.586

Abstract

Current technological developments have penetrated various sectors of human daily activities, almost every human activity is supported by technology that functions to facilitate the completion of work, starting from things that seem trivial to quite complicated work. Therefore, Banjar Tri Parartha residents who have a business unit in the form of a savings and loan cooperative with funds from member contributions, run it by carrying out cooperative principles to help the economic movement of its citizens based on the principle of family. At this time the process of recording, calculating to the reporting process is still done conventionally, so that cooperative administrators are quite busy every time they make an accountability report that is carried out every year. By running the analysis and design process in the application creation stage using the waterfall method. So in the interface design it is adjusted to what is needed by the cooperative. It is hoped that this research can be a reference in making applications as the next stage. By using the application design starting from the recording stage, processing calculations and presenting reports, it is hoped that all stakeholders will find it easier to monitor and obtain cooperative financial information, so that the transparency of cooperative funds can provide certainty for its members.
SISTEM PENDUKUNG KEPUTUSAN KELOMPOK PENENTUAN DOSEN PENGAMPU MATA KULIAH DENGAN METODE PROMETHEE DAN BORDA Heroe Santoso; Raisul Azhar; I Putu Hariyadi; Husain, Husain; Yayan Suganda
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 4 No. 1 (2023): Juni 2023
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46764/teknimedia.v4i1.88

Abstract

Lecturers are professional educators and scientists with the main task of teaching, transforming, developing and disseminating science, technology, and art (IPTEKS) through teaching, research and community service. The position of lecturers as professionals serves to increase the dignity of lecturers and develop science and technology to improve the quality of national education. The goal is to implement the national education system and realize the goals of national education. The head of the study program and the dean in determining the lecturers for the courses are still done manually based on the competence of each lecturer and looking at the previous semester's teacher decisions. In this method of determination, of course, the results obtained are still not optimal because there are still some lecturers who do not match the competencies/qualifications of the courses being taught. Based on the problems above, the faculty will think of a better system, namely switching from a manual system to a Group Decision Support System (GDSS). The GDSS method used is the promethee and borda method which is one method of solving decision-making problems in a group. With promethee and borda method, several different opinions or perceptions about a decision can be combined into a group/joint decision. That way, the resulting decisions can be accepted by the group. The system development method uses the waterfall method which consists of several stages, including: data collection stage, analysis stage, design stage, coding stage and testing stage. The conclusion of this study resulted in a Group Decision Support System for determining the lecturers of courses using the borda method. Based on the results of system testing, respondents stated that the system can simplify and speed up the process of determining the course lecturers.
IMPLEMENTATION OF CONTINUOUS INTEGRATION/CONTINUOUS DEPLOYMENT TO AUTOMATE COMPUTER NETWORK INFRASTRUCTURE CONFIGURATION MANAGEMENT Hariyadi, I Putu; Raisul Azhar; Heroe Santoso; Khairan Marzuki; I Made Yadi Dharma
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 4 No. 2 (2023): Desember 2023
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46764/teknimedia.v4i2.127

Abstract

Computer network infrastructure is one of the supporting components for smooth operations for companies that utilize Information and Communication Technology (ICT). Companies are required to continue to innovate to continue to grow so it requires various adjustments, including changes to the policy configuration of computer network infrastructure. Implementation of configuration changes to computer network infrastructure if done manually will be inefficient and ineffective. In addition, it is prone to errors as a result of human error resulting in downtime. The application of Continuous Integration/Continuous Deployment (CI/CD) can be a solution to overcome these problems. This study analyzes the implementation of CI/CD on network infrastructure which is simulated using the PNETLab and GitLab CI/CD tools as well as Ansible Configuration Management. Based on the tests conducted five times, it can be concluded that the Ansible Playbook that has been created and integrated with the GitLab CI/CD pipeline can be used to automate configuration management of MikroTik-based network infrastructure that is simulated in PNETLab. CI/CD can speed up the implementation of configuration changes on network devices through an automated process. Testing additional configurations on the test network takes an average of 82.6 seconds. Meanwhile, on the production network, it takes an average of 80.2 seconds. On the other hand, testing the configuration deletion on the test network takes an average of 56.6 seconds. Meanwhile, on the production network, the average is 54.4 seconds. In addition, the application of CI/CD can minimize errors because before the configuration is applied to the production network, the configuration is tested first on the test network automatically. Application of the configuration to the production network is carried out only if testing of the configuration on the test network is successful. The CI/CD mechanism can improve the performance and reliability of computer network infrastructure.
Internet Machine Prototype with a Coin Payment Using a Rock Pi Microcontroller Azhar, Raisul; Santoso, Heroe; Hariyadi, I Putu; Husain, Husain; Afriandi, Mahsus
Jurnal Bumigora Information Technology (BITe) Vol 6 No 1 (2024)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v6i1.3543

Abstract

Background: Coins are widely used in game machines to play game applications. Internet use is usually done by purchasing an internet package. This method is often used, but coins are rarely used.Objective: The aim of this research is how to make a machine that is capable of using coins as internet payment, especially hotspots.Methods: The research method was carried out using an experimental method with stages of analysis, prototype design, and testing using a descriptive approach.Result: This research produced 1 one-unit prototype machine equipped with an application for internet hotspots by inserting IDR 500 and IDR 1000 coins with connection limits according to the value of the coins entered.Conclusion: This research produces prototypes and coin internet application software.
Otomasi Manajemen dan Pengawasan Linux Container (LCX) Pada Proxmox VE Menggunakan Ansible Pratama, Muh Akromi Arya; Hariyadi, I Putu
Jurnal Bumigora Information Technology (BITe) Vol 3 No 1 (2021)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v3i1.807

Abstract

In the development of internet service technology, it has become a major requirement as a means of communication and exchanging information. Especially in the field of education such as elementary schols, internet facilities are very much needed where the users are administrative staff, teachers, students via the internet can access various knowledge needed quickly, so that it can simplify the learning process. Therefore, the bandwidth sharing system or it can be called bandwidth management must be in accordance with the conditions of the network service to be applied and bandwidth management is indispensable for multi-service networks, because the more and more varied applications that can be served by a network have an effect on link usage. In the network. The method in this research uses library research and the implementation uses the Hierarchical Token Bucket method, which is an application that function to regulate the distribution of bandwidth. The purpose of this analysis is to provide a bandwidth management system to make a fair distribution for users connected to the network. The results showed that the Hierarchicak Token Bucket method can regulate bandwidth usage for each client when downloading, uploading, streaming and browsing
Implementasi Software-Defined Network Terintegrasi Firewall pada Proxmox untuk Pengontrolan Konfigurasi Jaringan dan Pengamanan Layanan Container Hariyadi, I Putu; Dharma, I Made Yadi; Azhar, Raisul; Suriyati, Suriyati
JTIM : Jurnal Teknologi Informasi dan Multimedia Vol. 7 No. 1 (2025): February
Publisher : Puslitbang Sekawan Institute Nusa Tenggara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/jtim.v7i1.644

Abstract

Virtualization technology has helped companies consolidate various server roles into a single physical server, reducing hardware costs. Hypervisor is a software in virtualization that is used to manage server hardware, allowing multiple Virtual Machines (VM)/Containers (CT) to run on a single physical machine. Companies face various challenges to remain competitive in the digital era, such as the need for rapid deployment of virtual guests and virtual networks on hypervisors in development, testing, and production environments, as well as securing network services. The purpose of this study is to implement SDN on hypervisors to centrally control virtual network configurations with a simple design, reducing setup and maintenance costs and time. In addition, it also implements a firewall and Virtual Private Network (VPN) based on OpenVPN and a reverse proxy to secure the hypervisor and VM/CT so that services remain available. This study presents a new approach that integrates Software-Defined Network (SDN)-based network management with comprehensive security solutions on hypervisors. This approach combines efficiency in network management and security that have rarely been focused on simultaneously in previous studies. The research method uses the Network Development Life Cycle (NDLC). The hypervisor used is Proxmox Virtual Environment (PVE) which is installed on the Virtual Private Server (VPS) provider IDCloudHost. Based on the results of the trials that have been carried out, it can be concluded that the simple zone type SDN on PVE can be used to control network configurations centrally and more simply such as routing, Dynamic Host Configuration Protocol (DHCP), Source Network Address Translation (SNAT), hostname registration and Internet Protocol (IP) from CT to forward lookup zone on the Domain Name System (DNS) server. Activating the firewall and creating rules at the cluster and CT levels from PVE and OpenVPN can protect the infrastructure when accessed both internally and externally. While the implementation of nginx reverse proxy can secure access to HTTP/HTTPS services on CT in PVE.
Plume Detection System Based Internet of Things I Nyoman Susila Astraning Utama; Sirojul Hadi; I Putu Hariyadi
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 1 No. 1 (2022): March 2022
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v1i1.1698

Abstract

Security is one of the important aspects in a system or environment. Residential, office, tourist and industrial areas are places that are prone to fires because they contain flammable objects. Slow handling when a gas leak occurs can trigger a fire. The solution that can be used to minimize the occurrence of fires is to build tools that work to monitor the condition of the room or environment that is prone to leakage of gas or other flammable liquids. The design and manufacture of a system to detect LPG and alcohol gas leaks can be useful for providing information in the event of a gas or alcohol leak so that it can be handled quickly and minimize fire damage. This system combines an plume detection system with an internet of things system so that it can provide information when a gas or flammable liquid leak occurs. The gas leak information is sent as a notification to the telegram from the operator. The design and manufacture of this system uses the Waterfall methodology with the following stages: analyzing (covering the need for system creation), system design (including designing electronic circuits and web monitoring interfaces), implementing system design and testing the system as a whole. The result of this research is that an electronic detection system has been successfully built that can distinguish gases and can provide information via telegram and web if gas is detected in the sensor environment. In the LPG gas leak test, the results show that the characteristics of LPG gas, namely the sensor output voltage, have an average of 4.17 volts with an average Part Per Million (PPM) of 8340 and the characteristics of alcohol gas, namely the sensor output voltage, have an average of 0, 13 volts with an average Part Per Million (PPM) of 254.
Assessing Twitter User Sentiment Regarding Divorce Issues Using the Random Forest Method Muhamad Azwar; I Putu Hariyadi; Raisul Azhar
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 4 No. 2 (2025): September 2025
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v4i2.4980

Abstract

The issue of divorce remains a complex and sensitive topic within Indonesian society, influenced by various factors such as repeated disputes, domestic violence, lack of harmony, financial difficulties, and other socio-cultural aspects. With the rise of social media, particularly Twitter, public discussions regarding divorce have become more widespread, allowing individuals to express their opinions and sentiments on the subject. These diverse perspectives create a wealth of sentiment data that can be analyzed to understand public perception and societal trends related to divorce. This study aims to classify public sentiment on divorce-related discussions using the Random Forest algorithm, providing insight into how people perceive and react to divorce issues. The research adopts a quantitative approach with a case study framework. The methodology involves data collection through web scraping techniques to gather approximately 1500 tweets containing discussions on divorce. The collected data is then preprocessed, including text cleaning, tokenization, and feature extraction, before being used to train and evaluate the Random Forest model. Sentiments are classified into three categories: negative, neutral, and positive. The classification model's performance is assessed using accuracy and F1-score metrics derived from the confusion matrix to determine its effectiveness in categorizing sentiments. Experimental results indicate that the Random Forest algorithm achieves an accuracy of 70%. The relatively low accuracy is attributed to the imbalance in sentiment class distribution, where negative sentiments dominate while positive sentiments are underrepresented. This imbalance affects the model's ability to predict positive sentiments effectively. The implications of this research contribute to a better understanding of public sentiment dynamics regarding divorce, which can be beneficial for policymakers, psychologists, and social researchers in analyzing societal attitudes towards marital dissolution.