Claim Missing Document
Check
Articles

Found 21 Documents
Search

Continuous Integration and Continuous Deployment (CI/CD) for Web Applications on Cloud Infrastructures Alde Alanda; Hanriyawan Adnan Mooduto; Rizka Hadelina
JITCE (Journal of Information Technology and Computer Engineering) Vol 6 No 02 (2022): Journal of Information Technology and Computer Engineering
Publisher : Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jitce.6.02.50-55.2022

Abstract

At this time, the application development process has experienced much development in terms of tools and the programming language used. The application development process is required to be carried out in a fast process using various existing tools. The application development and delivery process can be done quickly using Continuous Integration (CI) and Continuous Delivery (CD). This study uses the CI/CD technique to develop real-time applications using various programming languages implemented on a cloud infrastructure using the AWS codepipeline, which focuses on automatic deployment. Application source code is stored on different media using GitHub and Amazon S3. The source code will be tested for automatic deployment using the AWS code pipeline. The results of this study show that all programming languages can be appropriately deployed with an average time of 60 seconds
The Rise of Deep Learning in Cyber Security: Bibliometric Analysis of Deep Learning and Malware Kamarudin, Nur Khairani; Firdaus, Ahmad; Osman, Mohd Zamri; Alanda, Alde; Erianda, Aldo; Kasim, Shahreen; Ab Razak, Mohd Faizal
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.1535

Abstract

Deep learning is a machine learning technology that allows computational models to learn via experience, mimicking human cognitive processes. This method is critical in the development of identifying certain objects, and provides the computational intelligence required to identify multiple objects and distinguish it between object A or Object B. On the other hand, malware is defined as malicious software that seeks to harm or disrupt computers and systems. Its main categories include viruses, worms, Trojan horses, spyware, adware, and ransomware. Hence, many deep learning researchers apply deep learning in their malware studies. However, few articles still investigate deep learning and malware in a bibliometric approach (productivity, research area, institutions, authors, impact journals, and keyword analysis). Hence, this paper reports bibliometric analysis used to discover current and future trends and gain new insights into the relationship between deep learning and malware. This paper’s discoveries include: Deployment of deep learning to detect domain generation algorithm (DGA) attacks; Deployment of deep learning to detect malware in Internet of Things (IoT); The rise of adversarial learning and adversarial attack using deep learning; The emergence of Android malware in deep learning; The deployment of transfer learning in malware research; and active authors on deep learning and malware research, including Soman KP, Vinayakumar R, and Zhang Y.
A Deep Learning-based Fault Detection and Classification in Smart Electrical Power Transmission System Khaleefah, Shihab Hamad; A. Mostafa, Salama; Gunasekaran, Saraswathy Shamini; Khattak, Umar Farooq; Yaacob, Siti Salwani; Alanda, Alde
JOIV : International Journal on Informatics Visualization Vol 8, No 2 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.2.2701

Abstract

Progressively, the energy demands and responsibilities to control the demands have expanded dramatically. Subsequently, various solutions have been introduced, including producing high-capacity electrical generating power plants, and applying the grid concept to synchronize the electrical power plants in geographically scattered grids. Electrical Power Transmission Networks (EPTN) are made of many complex, dynamic, and interrelated components. The transmission lines are essential components of the EPTN, and their fundamental duty is to transport electricity from the source area to the distribution network. These components, among others, are continually prone to electrical disturbance or failure. Hence, the EPTN required fault detection and activation of protective mechanisms in the shortest time possible to preserve stability. This research focuses on using a deep learning approach for early fault detection to improve the stability of the EPTN. Early fault detection swiftly identifies and isolates faults, preventing cascading failures and enabling rapid corrective actions. This ensures the resilience and reliability of the grid, optimizing its operation even in the face of disruptions. The design of the deep learning approach comprises a long-term and short-term memory (LSTM) model. The LSTM model is trained on an electrical fault detection dataset that contains three-phase currents and voltages at one end serving as inputs and fault detection as outputs. The proposed LSTM model has attained an accuracy of 99.65 percent with an error rate of just 1.17 percent and outperforms neural network (NN) and convolutional neural network (CNN) models.
Implementation of The Moving Average Method for Forecasting Inventory in CV. Tre Jaya Perkasa Huriati, Putri; Erianda, Aldo; Alanda, Alde; Meidelfi, Dwiny; Rasyidah, -; Defni, -; Suryani, Ade Irma
International Journal of Advanced Science Computing and Engineering Vol. 4 No. 2 (2022)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (366.89 KB) | DOI: 10.62527/ijasce.4.2.77

Abstract

The supply chain is an organization's place to distribute production goods and services to customers. This chain is a network of various organizations that are interrelated and have the aim of carrying out the procurement or supply of goods. Inventory is storing goods in the form of raw materials, semi-finished goods or finished goods that will be used in the production or distribution process. CV. Tre Jaya Perkasa is a company engaged in the distribution of goods such as snacks, drinks and daily necessities. CV. Tre Jaya Perkasa is located in Solok, West Sumatra, Indonesia. From January 2020 to June 2021, CV. Tre Jaya Perkasa has made more than 10 thousand transactions. Based on the sales data, each period (month) of sales transactions can increase and decrease, and the company must plan product sales in the coming period. To maximize profits and minimize losses, a strategy is needed to maintain the availability of goods that are often purchased by customers. From historical transaction data, the company can predict how much stock should be provided for transactions in the coming period. The method used is the moving average method, to measure the error rate of forecasting, MAD, MSE and MAPE are used. Based on the research that has been done, then carried out on the product Trick Potato Biscuit BBQ 24 BOX X 10X18 forecasting comparison between using 3 periods and 5 periods, using 5 product data that are most often purchased by buyers, it was found that the average value of MAD, MSE and MAPE closer to 0 is to use 3-period forecasting.
Systematic Literature Review: Digitalization of Rural Tourism Towards Sustainable Tourism Rasyidah; Erianda, Aldo; Alanda, Alde; Hidayat, Rahmat
International Journal of Advanced Science Computing and Engineering Vol. 5 No. 3 (2023)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/ijasce.5.3.134

Abstract

In the context of rural tourism, the internet is crucial. It is vital to create and implement new technology in order to assist digital tourism in tourist communities and undeveloped, frontier, and remote locations.  The utilization of big data can enhance the precision of predicting tourist flows, providing valuable insights to assist and enhance destination management, planning, and advertising. It can also ease mobility and encourage visitors to be distributed according to time. In addition to supporting visitors with specific access needs and keeping management informed about visitor behavior, artificial intelligence (AI) and automation can also be very helpful in the tourist industry by enabling those with limited mobility to travel the world. In this sense, as the sharing and gig economies grow along with technology, we have more options in our everyday lives—as long as they are properly set up and maintained. Therefore, this paper aims to study the research on internet criteria based on AlUla framework to achieve sustainable tourism in rural areas and to identify the key journals, articles and authors. The findings in this research are that there has been an increase in the number of journals post COVID19, where the country that produces the most journals is China and the author that is most cited is Pesonen JA. To achieve the goal of sustainable digital rural tourism, infrastructure is needed in the form of internet penetration, internet speed and usability, and internet security level.
Capacity Building for Farming System Digitalization Using Farming Management System Hidayat, Rahmat; Amnur, Hidra; Alanda, Alde; Yuhefizar; Satria, Deni
International Journal of Advanced Science Computing and Engineering Vol. 5 No. 3 (2023)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/ijasce.5.3.186

Abstract

Agriculture is one of the most important areas of human activity around the world. As the population increases, it is necessary to increase agricultural production. In the age of information technology, information plays a key role in people's lives. Agriculture is rapidly becoming a highly development-intensive industry where farmers need to collect and evaluate a large amount of information in their business processes to become more efficient in production and communicate information accordingly. Modernizing agriculture requires technological know-how for the efficient use of agricultural inputs. It deals with factors such as ecological footprint, product safety, labor welfare, nutritional responsibility, plant/animal health and welfare, economic responsibility and local market presence. They cover almost all stages in the production chain concerning day-to-day agricultural tasks, transactional activities for all stakeholders involved, and support for information transparency in the food chain. The use of information technology and network infrastructure currently enables the application of technology in agricultural business processes, but there is no standardized solution to enable interoperability and integration among services and stakeholders. Farming Management System (FMS) is expected to be a solution and standard in the use of technology in agriculture. Farming management system is a management system specifically designed to assist farmers or farm managers in managing their farming operations more efficiently and effectively. This system usually consists of integrated software and hardware to monitor and collect data from various aspects of agriculture, such as irrigation, fertilization, pesticide spraying, etc.
A Comprehensive Review of Cyber Hygiene Practices in the Workplace for Enhanced Digital Security Armoogum, Sheeba; Armoogum, Vinaye; Chandra, Anurag; Dewi, Deshinta Arrova; Kurniawan, Tri Basuki; Bappoo, Soodeshna; Mohd Salikon, Mohd Zaki; Alanda, Alde
JOIV : International Journal on Informatics Visualization Vol 9, No 1 (2025)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.9.1.3787

Abstract

In today's digital age, cybercrime is increasing at an alarming rate, and it has become more critical than ever for organizations to prioritize adopting best practices in cyber hygiene to safeguard their personnel and resources from cyberattacks. As personal hygiene keeps one clean and healthy, cyber hygiene combines behaviors to enhance data privacy. This paper aims to explore the common cyber-attacks currently faced by organizations and how the different practices associated with good cyber hygiene can be used to mitigate those attacks. This paper also emphasizes the need for organizations to adopt good cyber hygiene techniques and, therefore, provides the top 10 effective cyber hygiene measures for organizations seeking to enhance their cybersecurity posture. To better evaluate the cyber hygiene techniques, a systematic literature approach was used, assessing the different models of cyber hygiene, thus distinguishing between good and bad cyber hygiene techniques and what are the cyber-attacks associated with bad cyber hygiene that can eventually affect any organization. Based on the case study and surveys done by the researchers, it has been deduced that good cyber hygiene techniques bring positive behavior among employees, thus contributing to a more secure organization. More importantly, it is the responsibility of both the organization and the employees to practice good cyber hygiene techniques. Suppose organizations fail to enforce good cyber hygiene techniques, such as a lack of security awareness programs. In that case, employees may have the misconception that it is not their responsibility to contribute to their security and that of the organization, which consequently opens doors to various cyber-attacks. There have not been many research papers on cyber hygiene, particularly when it comes to its application in the workplace, which is a fundamental aspect of our everyday life. This paper focuses on the cyber hygiene techniques that any small to larger organization should consider. It also highlights the existing challenges associated with the implementation of good cyber hygiene techniques and offers potential solutions to address them.
Implementasi Cloud Based Video Conference System Menggunakan Amazon Web Service Alanda, Alde; Satria, Deni
JITCE (Journal of Information Technology and Computer Engineering) Vol. 5 No. 02 (2021)
Publisher : Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jitce.5.02.75-80.2021

Abstract

Since December 2019, the world and Indonesia have fought a major disaster, namely the Covid-19 virus pandemic. With the rapid spread or transmission of the virus, the Indonesian government decided to impose social distancing or social restrictions that impacted the education sector. Students and lecturers cannot conduct lectures face-to-face in class or laboratory, but lectures must be conducted online. For that, we need an open-source system developed by the campus in carrying out online courses. This application was developed using cloud technology and JITSI as an open-source video-conferencing application. In this study, testing of the features that exist in video conferencing and resource usage on the server is carried out. The results of feature testing on the application run as expected with several important features used for learning such as chat, share screen, recording features that can run optimally. The result tested the system resources based on the number of participants, 31 participants with an average use of 2.1GB RAM and 78 participants with an average RAM usage of 2.8GB.
Continuous Integration and Continuous Deployment (CI/CD) for Web Applications on Cloud Infrastructures Alanda, Alde; Mooduto, Hanriyawan Adnan; Hadelina, Rizka
JITCE (Journal of Information Technology and Computer Engineering) Vol. 6 No. 02 (2022)
Publisher : Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jitce.6.02.50-55.2022

Abstract

At this time, the application development process has experienced much development in terms of tools and the programming language used. The application development process is required to be carried out in a fast process using various existing tools. The application development and delivery process can be done quickly using Continuous Integration (CI) and Continuous Delivery (CD). This study uses the CI/CD technique to develop real-time applications using various programming languages implemented on a cloud infrastructure using the AWS codepipeline, which focuses on automatic deployment. Application source code is stored on different media using GitHub and Amazon S3. The source code will be tested for automatic deployment using the AWS code pipeline. The results of this study show that all programming languages can be appropriately deployed with an average time of 60 seconds
Real-time Defense Against Cyber Threats: Analyzing Wazuh's Effectiveness in Server Monitoring Alanda, Alde; Mooduto, H.A; Hadi, Ronal
JITCE (Journal of Information Technology and Computer Engineering) Vol. 7 No. 2 (2023)
Publisher : Universitas Andalas

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25077/jitce.7.2.56-62.2023

Abstract

As cloud computing grows exponentially, organizations face escalating cybersecurity challenges due to increased cyber threats and attacks on cloud-based networks. Monitoring cloud servers is one action that can be taken to improve the security. This can be done with the help of various server monitoring tools, such as Wazuh. The study investigates Wazuh's effectiveness in real-time monitoring of three AWS EC2 instance-based cloud servers. Wazuh's capabilities such as log data collection, malware detection, active response automation, and Docker container monitoring, are examined. The research reveals detailed insights into user activities, web server access, and database operations. Wazuh proves adept at tracking file integrity, detecting malware, and responding actively, as evidenced by the 342 alerts generated during a 24-hour monitoring period. The result shows that Wazuh is a particularly effective tool for protecting cloud environments from cyberattacks because it provides quick and ongoing security monitoring, which is essential for securing intricate cloud infrastructures.