Claim Missing Document
Check
Articles

Layanan Cloud Computing untuk Mendukung Kinerja Administrasi Database Tanpa Menggunakan Perintah SQL Wintolo, Hero; Retnowati, Nurcahyani Dewi; Ibrahim, Andi Ahmad Iswar
Jurnal ELTIKOM : Jurnal Teknik Elektro, Teknologi Informasi dan Komputer Vol. 4 No. 2 (2020)
Publisher : P3M Politeknik Negeri Banjarmasin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31961/eltikom.v4i2.174

Abstract

Penelitian ini memiliki tujuan untuk menyediakan layanan dalam bentuk aplikasi untuk melakukan kegiatan Database Manipulation Language (DML) yang diterapkan dalam bentuk cloud computing . Sebanyak tiga buah computer dimanfaatkan untuk memberikan layanan pemrosesan dan penyimpanan database tanpa menggunakan perintah yang ada pada Structure Query Language (SQL) dan satu buah computer digunakan sebagai server yang melayani pengguna untuk melakukan kegiatan DML tanpa menggunakan perintah SQL . Dengan menggunakan teknologi cloud pengelolaan database berbasis SQL yang biasanya menggunakan perintah berbasis command line dapat dilakukan dengan cara yang lebih mudah. Layanan yang diberikan oleh cloud untuk mengelola database berbasis SQL khususnya fungsi DML. Hasil dari implementasi layanan pada jaringan internet, Wireless lan, dan LAN dapat berjalan dengan baik dengan kasus pengujian fungsi pada ketiga media jaringan tersebut. Dengan demikian para pengguna yang sama sekali tidak mengerti bahasa SQL dapat menggunakan layanan ini dengan mudah untuk mengolah database SQL secara mandiri.
ANALISIS DETEKSI PENYUSUP PADA LAYANAN OPEN JOURNAL SYSTEM MENGGUNAKAN METODE NETWORK FORENSIC DEVELOPMENT LIFE CYCLE Wintolo, Hero; Riadi, Imam; Yudhana, Anton
SKANIKA: Sistem Komputer dan Teknik Informatika Vol 8 No 1 (2025): Jurnal SKANIKA Januari 2025
Publisher : Universitas Budi Luhur

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36080/skanika.v8i1.3284

Abstract

This study aims to detect intruders on a server computer used for Open Journal System (OJS) services. The server is connected to the internet via a router, making it vulnerable to external attacks. In this research, the tool used is Tripwire, installed on the server computer as the main object. Tripwire functions as a change detection tool for the file system, identifying suspicious activities and recording valid file hashes, verifying file integrity against this record periodically. The system is operated by journal managers from computers connected to the server within the same network address providing OJS services. The method used in this research is the Network Forensic Development Life Cycle (NFDLC), which consists of several stages: initiation, acquisition, implementation, operation, and disposition. Each stage is applied systematically to facilitate the forensic analysis of attacks. The research results show that the NFDLC method is effective in analyzing and detecting intruders in the network. Based on forensic analysis using Tripwire, 12 data losses were found in 7 attack incidents identified on the OJS service. This study successfully demonstrates that the NFDLC method and Tripwire tool are effective in detecting and analyzing intruders attempting to access the OJS service server computer.
The CNN Model with YOLO Architecture for Ultrasonography Images in Early Breast Cancer Detection Ayuningtyas, Astika; Wintolo, Hero; Sumari, Arwin Datumaya Wahyudi; Setyaningsih, Emy; Pujiastuti, Asih; Honggowibowo, Anton Setiawan; Nuryatno, Edi Triono; Kusumaningrum, Anggraini
Journal of Applied Data Sciences Vol 6, No 2: MAY 2025
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v6i2.587

Abstract

The rapid development of object detection technology has opened new opportunities in the healthcare sector, especially in early cancer detection. This paper presents a deep learning-based breast cancer detection system using ultrasound images. The primary goal of this study is to create a model that can effectively differentiate between malignant and benign breast tumors, assisting in early diagnosis. The proposed system employs the Convolutional Neural Network (CNN) algorithm with You Only Look Once version 5 (YOLOv5) architecture, which is renowned for its high speed and accuracy in object detection tasks. A dataset comprising 10,954 ultrasound images was used to train the model, with 70% allocated for training, 20% for validation, and 10% for testing. The study reveals that the model achieves a high accuracy rate of 92.8% for malignant tumor detection and 99.1% for benign tumors, with precision rates of 99.6% for malignant tumors and 97.5% for benign tumors. These results demonstrate the feasibility of the proposed model as a reliable tool for early breast cancer detection. The findings highlight the potential of deep learning in medical image processing, suggesting that this technology could be further developed into an accessible, efficient early detection system for breast cancer in clinical settings. Future research could explore the integration of additional imaging modalities and the application of this model in real-world healthcare environments
Post Attack Mitigation on Open Journal System Services Using Knowledge Understanding Assessment Defense (KUAD) Method Wintolo, Hero; Riadi, Imam; Yudhana, Anton
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 4, November 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i4.2279

Abstract

This research was conducted to investigate evidence of an attack and to restore data after an attacker compromised an Open Journal System (OJS) service on a computer server. The method used in this research is a new approach developed from the Network Forensic Digital Life Cycle (NFDLC) method. This new method, known as KUAD, has several stages for collecting cyber-attack evidence and restoring it after the Gacor attack has occurred. The stages in the KUAD method include initiation, acquisition, execution, mitigation, and disposition. The novelty of this method, compared to the previous one, lies in the inclusion of the mitigation stage, which aims to restore data or documents after an attack. The tool used to detect the attack and find evidence of the attack is Tripwire, whereas the tools used to restore lost data include crontab, which runs backup commands with rsync in four steps. Tripwire can optimally detect attacks by displaying the number of data entries that were added, deleted, or modified. A total of 15,135 files in .docx, .pdf, and .jpg formats, deleted by the attacker, were successfully restored using this backup technique. The success rate of using this technique for post-cyber attack mitigation reached 100%.
Spanning Tree Protocol (STP) Based Computer Network Performance Analysis on BPDU Config Attacks and Take Over Root Bridge Using the Linear Regression Method Indrianingsih, Yuliani; Wintolo, Hero; Saputri, Eviana Yulianti
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v6i2.703

Abstract

Spanning Tree Protocol (STP) is used in manageable switch devices that apply more than one path to the connection between switches. This study aims to assist engineer staff in improving STP network security. Furthermore, the benefit is to improve the STP network security system by using the Spanning Tree Protocol and Virtual Local Area Network (VLAN) trunking mitigation techniques. The results of testing data before STP is attacked, after STP attacked, and anticipatory data. Then a simple linear regression analysis is carried out by the result of that there is not a significant relationship between time and size in the DoS attack, which  48.6% of the time variable is influenced by the size of  variable, while  the remaining 51.4% by other variables. Root attack is 43.8%-time variable is influenced by size variable, the remaining 56.2% by other variables. Correlation between Karl Pearson DoS and root, there is a significant relationship between time and size, with the DoS correlation coefficient (-0.697) in contrast root (-0.662), and paired sample t-test (paired sample t-test) can be concluded the anticipation which is done by using BPDU guard and root guard mitigation.
Analisa Deskriptif Layanan Audio Streaming di Jaringan OSPF Single Area Pada Peralatan Cisco 2600 Dan Mikrotik RB951Ui Wintolo, Hero; Indrianingsih, Yuliani; Seto, Moh.Bambang Haryo
InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan Vol 6, No 2 (2022): InfoTekJar Maret
Publisher : Universitas Islam Sumatera Utara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30743/infotekjar.v6i2.3883

Abstract

Routing dinamis tidak hanya digunakan untuk mengelola jaringan komputer dengan jumlah router yang banyak atau lebih dari 10 router, tetapi dapat juga digunakan untuk mengelola jaringan komputer dengan jumlah router yang lebih sedikit dari itu. Salah satu routing dinamis yang banyak digunakan adalah OSPF. Dengan jumlah router yang sedikit seperti dalam penelitian ini hanya 2 buah, maka OSPF dengan single area menjadi pilihan untuk membandingkan dua buah router dari pabrikan yang berbeda dalam melayani audio streaming. Data suara dari komputer yang menjalankan audio streaming diubah menjadi tingkat kebisingan menggunaan perangkat lunak sound meter yang berbasis android menghasilkan nilai tertinggi 83 dan terendah 79 pada jaringan yang menggunakan router berbeda tersebut. Hasil analisa menggunakan analisa deskriptif menunjukan selisih yang tidak terlalu besar yang menyatakan bahwa router cisco seri 2600 memberikan layanan untuk audio streaming yang lebih baik dibandingkan mikrotik seri RB951Ui.
Pendampingan Pelatihan IT Essential Cisco Networking Guna Meningkatkan Daya Saing Lulusan SMK N 3 Yogyakarta Kusumaningrum, Anggaraini; Wintolo, Hero; Dewi Retnowati, Nurcahyani; Setiawan Honggowibowo, Anton; Pujiastuti, Asih
Jurnal SOLMA Vol. 13 No. 1 (2024)
Publisher : Universitas Muhammadiyah Prof. DR. Hamka (UHAMKA Press)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22236/solma.v13i1.12905

Abstract

Pendahuluan: Kemahiran dan pemahaman di bidang teknologi khususnya jaringan komputer merupakan salah satu tujuan yang dapat dikuasai siswa setelah lulus SMK. Selama proses pembelajaran, kesenjangan pemahaman antara teori dan praktik mengakibatkan siswa kurang menguasai teori dan praktek. Kurangnya media praktek untuk pengenalan hardware, software dan network device  menjadi kendala dalam proses pembelajaran teori dan praktek di SMK N 3 Yogyakarta. Studi ini bertujuan untuk menambah kemampuan dan keahlian para siswa agar kompetensinya meningkat. Metode: Analisis SWOT. Hasil: Sebanyak 36  siswa SMKN 3 Yogyakarta berhasil menyelesaikan pelatihan dan lulus. Kesimpulan: Sebanyak 36 siswa SMKN 3 Yogyakarta berhasil menyelesaikan pelatihan, lulus, serta mendapatkan sertifikat dengan rata-rata nilai kumulatif hasil ujian sertifikasi IT Essential Cisco Networking adalah 84,21, nilai minimal 76,38, dan nilai maksimal 94,55.
Empowering Teachers in Muhammadiyah Boarding School Yogyakarta toward Safer Digital Behavior through Smartphone Security Education Rakhmadi, Aris; Wintolo, Hero; Putri Silmina, Esi; Soyusiawaty, Dewi; Sunardi; Fadlil, Abdul
JURPIKAT (Jurnal Pengabdian Kepada Masyarakat) Vol. 6 No. 4 (2025)
Publisher : Politeknik Piksi Ganesha Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37339/jurpikat.v6i4.2843

Abstract

Abstract: This community-service program was implemented through the Program Pemberdayaan Umat (PRODAMAT) of Universitas Ahmad Dahlan with the aim of enhancing digital literacy and cybersecurity awareness among teachers at Muhammadiyah Boarding School (MBS) Yogyakarta. The activity focused on smartphone account security education through practical steps such as password management, two-factor authentication (2FA), and phishing awareness. A participatory approach was applied through training involving 15 teachers and staff, combining interactive discussions, demonstrations, and pretest–posttest evaluation. The results showed an increase in the average knowledge score from 4.63 to 4.90, digital awareness from 4.05 to 4.45, and intention and safe digital behavior from 4.35 to 4.73. These improvements reflect positive changes in participants’ understanding, awareness, and behavior toward digital security. The program highlights the importance of integrating technological skills with ethical and religious values to promote sustainable digital empowerment in Islamic educational environments.
Pendampingan dan pelatihan cara pengambilan foto produk UMKM untuk pemasaran di media sosial Nugraheny, Dwi; Pujiastuti, Asih; Sudaryanto, Sudaryanto; Wintolo, Hero; Agustian, Harliyus; Aryanto, Salam; Indrianingsih, Yuliani; Honggowibowo, Anton Setiawan
KACANEGARA Jurnal Pengabdian pada Masyarakat Vol 5, No 1 (2022): Januari
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/kacanegara.v5i1.1017

Abstract

The development of photography is very rapid and has become a very important need for human life. Many business opportunities can be created through photography, one of them is to support the marketing of a product. Product Photos are one of the factors that support so that merchandise will sold well. So it can be said that photography is a medium of visual communication in promoting products. Pengkok village is one of several villages in the Patuk Gunung Kidul sub-district which has many regional superior products produced by Micro, Small and Medium Enterprises (MSMEs). The activity of promoting superior products from the region is very important to support tourism activities and the economy of the surrounding community, especially in Patuk District, Gunung Kidul Regency. One of the activities to support promotions that can be done is taking pictures of attractive and beautiful products. Not all product photos for promotional purposes are produced from expensive and sophisticated equipment. Understanding photography techniques to take products’ photos is an important part in promoting products that attract consumers' attention. Therefore, there is a need for training in product shooting techniques using a smartphone. For this reason, to meet the needs of partners (BKAD in Patuk District) a Accompaniment/Training on product shooting techniques using Smartphones for MSME products in Pengkok village was held in the form of Community Service activities. The implementers of this service are lecturers of the Informatics Study Program, Adisutjipto Aerospace Technology Institute assisted by several students of the Informatics Study Program. This training is expected to increase the skills of the MSMEs of Pengkok Village in using smartphone cameras to take pictures of their products as marketing support, so that the resulting images/photos look better and attractive to consumers.The result of monitoring evaluation that has been done during the training is, there is 64% skill increase of the MSMEs of Pengkok Village in photography technique to take attractive product photos.
Co-Authors . Sudaryanto Abdul Fadlil Addiwinoto, Gunawan Aditya Wisnu Pratama Aditya, Reza Aditya, Reza Agustian, Harliyus Aji, Bimio Wahyu Amalia Farhati Aminuyati Anggit Tri Widiastuti Anggit Tri Widiastuti, Anggit Tri Anggraini Kusumaningrum Anggraini Kusumaningrum Anggraini Kusumaningrum, Anggraini Anton Setiawan Honggowibowo Anton Yudhana Arief Dwi Nugroho ARIF HIDAYATULLAH Aris Rakhmadi Arwin Datumaya Wahyudi Sumari Astika Ayuningtyas Astika AyuningTyas, Astika Astuti, Ellyana Mega Dewantri Bambang Sudibya Bambang Sudibya, Bambang Basuki Nugroho Susanto Basuki Nugroho Susanto, Basuki Nugroho Bimio Wahyu Aji Chris Tri Widyarto Christoporus Galih Pramudito Deny Hp., Fathul Fata Derry Purnamasari Derry Purnamasari, Derry Devia Tito Setyaningsih Dewi Retnowati, Nurcahyani Dewi Soyusiawaty Dwi Nugrahenny Dwi Nugrahenny, Dwi Dwi Nugraheny Dwi Nugraheny Dwi Nugraheny, Dwi Dwi Paradita, Lalu Septian Emy Setyaningsih Evi Wahyuningsih Eviana Yulianti Saputri Fathul Fata Deny Hp. Fera Suprapti Friska Ayu Dhawara Galih Andita Sukma Gilang Wiratmaja Gregorius Ferdian F.D.Setyawan Gunawan Addiwinoto Habib Satrio Atmojo Handoko Widya Kusuma HARLIYUS AGUSTIAN Haruno Sajati Hasibuan, Piniel Romulia Ibrahim Saleh Ibrahim, Andi Ahmad Iswar Ida Ayu Putu Sri Widnyani Imam Riadi Irawaty, Mardiana Khairur Razikin Kusumaningrum, Anggaraini Lalu Septian Dwi Paradita Lalu Suwandi Yusuf Muhamad Hafish Muhammad Imam, Muhammad Muhammad Rivai Ngadiyono Ngadiyono, Ngadiyono Nurcahyani Dewi Retnowati Nuryatno, Edi Triono Omara, Safik Piniel Romulia Hasibuan Pradana Nur Prasetya Pramudito, Christoporus Galih Prasetya, Pradana Nur Prasetyo Fendriyanto, Prasetyo Pratama, Aditya Wisnu Prayogi, Yogi Priyo Pujiastuti, Asih Putri Silmina, Esi Qurniawan, Wawan Razikin, Khairur Rivcky Septianto RIYAN ANDRIYANTO Safik Omara Saiful Bahri Salam Aryanto Saleh, Ibrahim Saputri, Eviana Yulianti Septianto, Rivcky Setiawan Honggowibowo, Anton Seto, Moh.Bambang Haryo Setyaningsih, Devia Tito Setyoadi, Wangsit Sudaryanto Sudaryanto SUDARYANTO SUDARYANTO Suhirman Sukma, Galih Andita Sumarsono Sumarsono Sumarsono Sumarsono Sunardi Suprapti, Fera SUWITO SUWITO Suwito Suwito Syafrudin Abdie Wahyu Hamdani Wangsit Setyoadi Wawan Qurniawan Widyarto, Chris Tri Wiratmaja, Gilang Wiwik Handayani Yenni Astuti Yenni Astuti, Yenni Yogi Priyo Prayogi Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yusuf, Lalu Suwandi Zulham Zulham Zuliana Zuliana Zuliana, Zuliana