Claim Missing Document
Check
Articles

Found 23 Documents
Search

Design of Private Geographycal Information System (GIS) Server for Battlefield Management System Alde Alanda; Erwadi Bakar
JOIV : International Journal on Informatics Visualization Vol 1, No 1 (2017)
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1140.323 KB) | DOI: 10.30630/joiv.1.1.14

Abstract

Geographic Information System (GIS) data is needed for model earth surface in 3D simulation for SAR operation to make simulation process as real as possible. Adding integrated GIS data server to simulation system make simulation application user does not need to input and prepare the GIS data manually, by reducing simulation application user task, user can more concentrate on simulation process.In this research the design and implementation of GIS data application that can provide the data needed by a simulation application using existing data on the online map provider. Application designed to display data necessary to carry out the conversion of GIS data to the format used in the simulation . Based on the test resuls of the conversion of GIS data to map format generated simulation has the same texture to the original map. Simulations can be run by using the map conversion and  the simulation can run using real map but the level of height accuracy  is not optimal.
Network Security Assessment Using Internal Network Penetration Testing Methodology Deni Satria; Alde Alanda; Aldo Erianda; Deddy Prayama
JOIV : International Journal on Informatics Visualization Vol 2, No 4-2 (2018): Cyber Security and Information Assurance
Publisher : Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2300.569 KB) | DOI: 10.30630/joiv.2.4-2.190

Abstract

The development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted by Symantec, the desire to renew an existing security system within a year within a company has the result that only 13% of respondents consider changes to the security system to be important from a total of 3,300 companies worldwide as respondents. This lack of awareness results in the emergence of security holes that can be used by crackers to enter and disrupt the stability of the system. Every year cyber attacks increase significantly, so that every year there is a need to improve the security of the existing system. Based on that, a method is needed to periodically assess system and network security by using penetrarion testing methods to obtain any vulnerabilities that exist on the network and on a system so as to increase security and minimize theft or loss of important data. Testing is carried out by using internal network penetration testing method which tests using 5 types of attacks. From the results of the tests, each system has a security risk of 20-80%. From the results of these tests it can be concluded that each system has a security vulnerability that can be attacked.
Liquefaction Potential Map based on Coordinates in Padang City with Google Maps Integration - Liliwarti; - Satwarnirat; Alde Alanda; Rizka Hadelina
JOIV : International Journal on Informatics Visualization Vol 4, No 1 (2020)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1370.527 KB) | DOI: 10.30630/joiv.4.1.312

Abstract

Abstract— Padang City is prone to liquefaction phenomena due to earthquakes. These phenomena can cause various damages to structures, infrastructures, and even can also cause deaths. Therefore, as one of the urban populated cities, the information about liquefaction potential is needed. One of them is by providing a liquefaction potential map, which is useful for mitigation and seismic disaster risks strategies. This article aims to provide a digital map of liquefaction potential in Padang City that integrates with Google Maps. The map is based on 40 coordinates in 7 subdistricts in the city with 3 colored markers that represent the levels of potential liquefaction i.e. no liquefaction level, moderate liquefaction level, and severe liquefaction level. The levels are classified based on the analysis of the secondary Cone Penetration Test data by using the calculation of the Factor of Safety and Liquefaction Potential Index with an earthquake assumption of 8 SR. The result shows that the map has ben able to display information about liquefaction potential, where 32.05% coordinates are classified as no liquefaction level with the highest percentage are in Kuranji, 22.5% are classified as moderate liquefaction level with the highest percentage are in Padang Utara, and 45.0% are classified as severe liquefaction level with the highest percentage are in Koto Tangah.
Rancang Bangun Aplikasi Knowledge Management Berbasis Web Yance Sonatha; Indri Rahmayuni; Alde Alanda; Iswandi Saputra
invotek Vol 18 No 2 (2018): INVOTEK: Jurnal Inovasi, Vokasional, dan Teknologi
Publisher : Universitas Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (463.103 KB) | DOI: 10.24036/invotek.v18i2.423

Abstract

Knowledge management is an organization of knowledge held by individuals within an organization. With knowledge management,an individual knowledge can be own by organization so it can give a benefit to organization in order to enhance business competitiveness.Management and documentation of the knowledge in order to become a reference for all the employee within the organization are need a development and implementation of appropriate knowledge management system. The implementation of knowledge management system must be supported by specific features to store and organize the existing knowledge.To overcome this problem, a knowledge management system was designed in the form of a web-based programming system using PHP programming languages ​​with GTFW and MySQL Framework. Knowledge management systems are equiped with data search facilities, documentation and records of problems, information and download features from each of available documents.
Implementasi Cloud Based Video Conference System Menggunakan Amazon Web Service Alde Alanda; Deni Satria
JITCE (Journal of Information Technology and Computer Engineering) Vol 5 No 02 (2021): Journal of Information Technology and Computer Engineering
Publisher : Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jitce.5.02.75-80.2021

Abstract

Since December 2019, the world and Indonesia have fought a major disaster, namely the Covid-19 virus pandemic. With the rapid spread or transmission of the virus, the Indonesian government decided to impose social distancing or social restrictions that impacted the education sector. Students and lecturers cannot conduct lectures face-to-face in class or laboratory, but lectures must be conducted online. For that, we need an open-source system developed by the campus in carrying out online courses. This application was developed using cloud technology and JITSI as an open-source video-conferencing application. In this study, testing of the features that exist in video conferencing and resource usage on the server is carried out. The results of feature testing on the application run as expected with several important features used for learning such as chat, share screen, recording features that can run optimally. The result tested the system resources based on the number of participants, 31 participants with an average use of 2.1GB RAM and 78 participants with an average RAM usage of 2.8GB.
Sistem Keamanan Pintu Rumah Berbasis Cloud Computing Humaira; Alfajri Maulana Ibrahim; Alde Alanda
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.3.1.56

Abstract

Sistem door security ini diciptakan agar dapat memantau lingkungan sekitar area jangkauan dari alat ini. Sistem ini bekerja dengan menggunakan pantulan sinyal ultrasonic dari Sensor jarak yang terhubung ke server database dan terekam pada aplikasi Android User. Sistem ini menggunakan Arduino Mega, Wemos D1 R2, sensor jarak, kamera vc0706, selonid doorlock, dan buzzer. System kerjanya sensor jarak akan diterima di Arduino Mega dan dikirim ke Wemos D1 R2 menggunakan software serial yang data akan dikirim ke database menggunakan jaringan internet yang terhubung di Wemos.
Sistem Pendukung Keputusan Pemilihan Program Studi di Politeknik Negeri Padang Menggunakan Metode AHP dan SAW Berbasis Web Sarah Latifah Marif; Meri Azmi; Alde Alanda
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 2 (2022)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.3.2.64

Abstract

The criteria used in the decision support system for the selection of study programs at the Padang State Polytechnic are data obtained from questions in the form of questionnaires. This web-based decision support system uses the Laravel framework and MySQL as the database. The method used in this system is the AHP (Analytic Hierarchy Process) method for weighting the values for each criterion and the SAW (Simple Additive Weighting) method for determining the study program which can produce faster and more subjective data. This decision support system will produce more accurate data and the results obtained are more optimal so that it can help prospective students solve problems in determining which study program to choose according to their abilities by providing advice for decision support
Sistem Informasi Harga Komoditas Pangan untuk Pasar-Pasar di Kota Padang Indri Rahmayuni; Yance Sonatha; Alde Alanda; Aldo Erianda
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 1 No 1 (2020)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (495.738 KB) | DOI: 10.62527/jitsi.1.1.5

Abstract

Padang City as the Capital of West Sumatra Province is the main gate of various types of trade commodities in the country. Padang is also a trading center in West Sumatra. Based on BPS data in 2016, there are 17 markets in Padang City with 8 markets managed by the community and 9 markets managed by the City Government of Padang. To assist the community in providing information on the prices of food commodities, a web-based information system is needed that provides information on the price of food commodities (especially basic food) for markets in the city of Padang. Through this information system, the public can find out the price of food commodities by grouping: per-commodity, per-market, and prices at a certain time period. The information system in the form of this website was created using the Laravel 5.5 framework which is one of the breakthroughs in the field of web programming. The Laravel Framework makes it easy for application developers to create web-based information systems. This information system is developed using the Waterfall method where development begins with the analysis, design, implementation, and testing stages.
Continuous Integration and Continuous Deployment (CI/CD) for Web Applications on Cloud Infrastructures Alde Alanda; Hanriyawan Adnan Mooduto; Rizka Hadelina
JITCE (Journal of Information Technology and Computer Engineering) Vol 6 No 02 (2022): Journal of Information Technology and Computer Engineering
Publisher : Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jitce.6.02.50-55.2022

Abstract

At this time, the application development process has experienced much development in terms of tools and the programming language used. The application development process is required to be carried out in a fast process using various existing tools. The application development and delivery process can be done quickly using Continuous Integration (CI) and Continuous Delivery (CD). This study uses the CI/CD technique to develop real-time applications using various programming languages implemented on a cloud infrastructure using the AWS codepipeline, which focuses on automatic deployment. Application source code is stored on different media using GitHub and Amazon S3. The source code will be tested for automatic deployment using the AWS code pipeline. The results of this study show that all programming languages can be appropriately deployed with an average time of 60 seconds
The Rise of Deep Learning in Cyber Security: Bibliometric Analysis of Deep Learning and Malware Kamarudin, Nur Khairani; Firdaus, Ahmad; Osman, Mohd Zamri; Alanda, Alde; Erianda, Aldo; Kasim, Shahreen; Ab Razak, Mohd Faizal
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.1535

Abstract

Deep learning is a machine learning technology that allows computational models to learn via experience, mimicking human cognitive processes. This method is critical in the development of identifying certain objects, and provides the computational intelligence required to identify multiple objects and distinguish it between object A or Object B. On the other hand, malware is defined as malicious software that seeks to harm or disrupt computers and systems. Its main categories include viruses, worms, Trojan horses, spyware, adware, and ransomware. Hence, many deep learning researchers apply deep learning in their malware studies. However, few articles still investigate deep learning and malware in a bibliometric approach (productivity, research area, institutions, authors, impact journals, and keyword analysis). Hence, this paper reports bibliometric analysis used to discover current and future trends and gain new insights into the relationship between deep learning and malware. This paper’s discoveries include: Deployment of deep learning to detect domain generation algorithm (DGA) attacks; Deployment of deep learning to detect malware in Internet of Things (IoT); The rise of adversarial learning and adversarial attack using deep learning; The emergence of Android malware in deep learning; The deployment of transfer learning in malware research; and active authors on deep learning and malware research, including Soman KP, Vinayakumar R, and Zhang Y.