Claim Missing Document
Check
Articles

Found 25 Documents
Search

Ketersediaan Tinggi Website menggunakan Penskalaan Otomatis dan Penyeimbang Beban AWS Haeruddin, Haeruddin; Andik Yulianto; Stefanus Eko Prasetyo; Gautama Wijaya; Dominggo Givarel
Telcomatics Vol. 10 No. 1 (2025)
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/telcomatics.v10i1.10951

Abstract

The rapid development of information technology requires digital service systems to have high performance and optimal availability. One of the main challenges in managing web-based services is the system's ability to deal with an unpredictable surge in the number of users. If not anticipated, this can cause a decrease in performance and even detrimental downtime. This study aims to analyze and implement the concept of auto scaling and load balancing in an effort to improve the performance and availability of web-based services. Auto scaling functions to automatically adjust the number of server resources according to workload needs, while load balancing plays a role in distributing network traffic evenly to several servers. The research method used is an experiment, by implementing and testing service performance before and after the implementation of auto scaling and load balancing. The test results show that the combination of the two technologies is able to increase the speed of service response, reduce server load, and maintain optimal service availability. This research is expected to be a reference in the development of reliable and efficient cloud-based systems.
Comparison of DES, AES, IDEA RC4 and Blowfish Aglorithms in Data Encryption and Decryption Stefanus Eko Prasetyo; Gautama Wijaya; Felix
Jurnal E-Komtek (Elektro-Komputer-Teknik) Vol 9 No 1 (2025)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/e-komtek.v9i1.2259

Abstract

The advancement of information technology has had a significant impact, one of which is as a medium for transmitting information from one place to another, making information access easier for many people. However, the ease of access to communication media also poses challenges for information security, as information becomes more vulnerable to being accessed, stolen, or manipulated by irresponsible parties. To protect the confidentiality of information, specific methods are needed, one of which is cryptography. In cryptography, there are various algorithms, including DES, AES, IDEA, Blowfish, Twofish, and RC4. This research aims to compare the performance of several cryptographic algorithms in the data encryption and decryption processes, focusing on processing speed and the size of the encrypted file. The results of the research show differences in processing time and file size of encrypted and decrypted data for each algorithm. Keywords: Aglorithms, Decryption, Encryption.
Rancangan Jaringan Highly Available PT Pundi Mas Berjaya (PMB) Prasetyo, Stefanus Eko; Wijaya, Gautama; Hasanah, Nafisatul; Jemmy, Jemmy; Syahfira, Putri
Telcomatics Vol. 8 No. 1 (2023)
Publisher : Universitas Internasional Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37253/telcomatics.v8i1.7359

Abstract

In the digital age, networks are an important factor for implementing communication and exchanging information. Campus networks, which are private networks specifically designed for a particular institution, are essential for the institution because they provide access to the necessary information and services. However, campus networks are also vulnerable to security threats such as cybercrime and malware attacks. Firewall implementation can minimize these threats by controlling access to network services. Pundi Mas Berjaya (PMB), a company that provides software solutions to the global market, requires a highly available and redundant campus network. This research uses Cisco Packet Tracer to design and configure the network required by PMB. Implementing a highly available and redundant campus network with a hierarchical network model will improve the performance of the PMB campus network connectivity and security.
The Development of a Deep Learning-Based Chatbot for Stock Keeping Unit (SKU) Management Julianto, Hendra; Wijaya, Gautama; Haeruddin, Haeruddin
Jurnal Inovatif : Inovasi Teknologi Informasi dan Informatika Vol. 7 No. 2 (2024)
Publisher : Universitas Ibn Khaldun Bogor

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Digital communications platforms, one of the revolutionary breakthroughs brought by rapid technological development. Such breakthroughs include technology in chatbots, which has now become a mighty tool, especially within the commercial sectors. This research hence focuses on the evolution of a chatbot in solving SKU management problems through deep learning technologies, such as the Multilayer Perceptron neural networks. The chatbot's goal is to deliver precise and effective information on SKU codes, stock levels, and product characteristics. The chatbot showed a high accuracy rate of 98% in answering questions about the given dataset after extensive testing. The findings demonstrate the potential of chatbots with deep learning to improve customer service and operational effectiveness in companies
Website Security Analysis Using Vulnerability Assessment Method : Case Study: Universitas Internasional Batam Haeruddin; Gautama Wijaya; Hendra Winata; Sukma Aji; Muhammad Nur Faiz
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 2 (2024): JINITA, December 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i2.2476

Abstract

In today’s digital era, ensuring website security is crucial, especially in the education sector which is frequently targeted by cyber attacks. This research aims to test security of the Universitas Internasional Batam (UIB) website using OWASP ZAP and Nessus. The method will be used in this research was vulnerability assessment. It will involve gathering information with the tools such as, Nmap, whois and nslookup. OWASP ZAP detected 11 vulnerabilities, categorized into 6 medium level and 5 low level, including Content Security Policies (CSP) and anti-clickjacking headers. Otherwise, Nessus only detected one medium level vulnerability, the absence of HTTP Strict Transport Security (HSTS). The difference in detection results from the tools that OWASP ZAP is better at finding web application weakness that are consistent with the OWASP Top Ten 2021, while Nessus specifically targets server and network configuration. For educational institutions, these results emphasize the importance of conducting regular vulnerability assessment to protect sensitive data. Recommended action include implementing CSP to prevent Cross-site scripting (XSS) and other injection attacks, enforcing HSTS to secure communication, and its recommend to updating software to mitigate the unknown vulnerabilities. By adopting these measures, institutions can reduce their exposure to cyber attacks, its also can maintain user trust, and strengthen overall security. This research provides a pratical framework for stregthening the security of educational websites against evolving threats. These findings highlight that the importance of using multiple tools can provide a more comprehensive view of security gaps.