Claim Missing Document
Check
Articles

Found 33 Documents
Search

Penerapan Metode A-Star untuk Rute Evakuasi dengan Menggunakan Jaringan Long Range Wide Area Network (LoRaWAN) Daniel, Charles; Romli, Moh Ali
J-INTECH ( Journal of Information and Technology) Vol 13 No 01 (2025): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v13i01.1923

Abstract

Optimal evacuation route planning is a crucial factor in disaster mitigation, especially in areas with limited communication infrastructure. This study proposes the application of the A-Star method for evacuation route optimization, supported by the Long-Range Wide Area Network (LoRaWAN) as an emergency communication system. The research methodology includes the development of an A-Star algorithm optimized with an adaptive heuristic function, integration with LoRaWAN-based sensors for real-time road condition monitoring, and simulations in various disaster scenarios. The results show that the developed system can reduce evacuation time by up to 31.4% compared to conventional methods and maintain communication connectivity up to 95% even under emergency conditions. Furthermore, the dynamic adaptation mechanism allows for automatic route changes based on current field conditions, enhancing the effectiveness of the evacuation process. Therefore, the integration of the A-Star method and LoRaWAN network proves to be a reliable and efficient solution for improving public safety during disasters.
Aplikasi Honeypot dalam Keamanan Jaringan untuk Mendeteksi Serangan Siber pada Infrastruktur TI Susanto, Carlos; Romli, Moh Ali
J-INTECH ( Journal of Information and Technology) Vol 13 No 01 (2025): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v13i01.1924

Abstract

The high security risks that are susceptible to hacking and exploitation by malicious actors to steal data or information often arise due to a lack of awareness regarding the critical importance of implementing deceptive network security using honeypots. Negligence can create vulnerabilities that are easily exploited, allowing attackers to initiate breaches. A notable network security approach involves using Honeypots, a method that creates a decoy server to mimic an authentic one. Honeypots are deliberately engineered to attract the attention of cyber attackers and facilitate their access to the trap server, thereby enabling the monitoring and analysis of their activities without compromising the integrity of the primary server. To achieve optimal network security, comprehensive testing of Honeypots is essential. This testing process serves as a fundamental metric in evaluating the efficacy and performance of Honeypot systems in mitigating cyber threats.
Development of Android-Based Package Sorting Application Based on Distance Arya, Dionisius; Romli, Ali
INOVTEK Polbeng - Seri Informatika Vol. 9 No. 2 (2024): November
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/wj72r311

Abstract

In the operational logistics of goods delivery, the effectiveness of couriers in organizing and managing packages plays a crucial role in optimizing delivery routes. The objective of developing this Android-based package sorting application is to reduce errors in the sorting process before packages are placed into storage bags. With the help of this application, couriers can prioritize the farthest packages for loading into the storage bags first, while stacking the nearest packages on top. The methodology employed involves scanning package receipts using barcodes and calculating distances based on the coordinates of the courier and the recipient using the Haversine formula. The application was tested using black-box techniques, ensuring that each feature functions as expected. Additionally, testing was conducted with five couriers and five admin staff from the delivery company by providing a questionnaire containing questions about the developed application. The number of errors before and after using the application was used to determine the success of error reduction in the package sorting process. The results from the questionnaire indicate a 96.88% reduction in sorting errors, signifying that the developed application effectively lowered the error rate during the package sorting process. This reduction in errors leads to a faster sorting process, providing benefits such as decreasing delivery delays, which significantly enhances customer satisfaction and improves the quality of the delivery company.
Mobile Health Monitoring Application as an Effort to Detect Stunting in Early Childhood Based on Android Bagus, Ridwan; Romli, Ali
INOVTEK Polbeng - Seri Informatika Vol. 9 No. 2 (2024): November
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/6m2tse18

Abstract

Stunting, as a chronic nutritional problem that inhibits optimal child growth, has a significant impact on Indonesia's demographic bonus potential. In Indonesia, the prevalence of stunting reached 24.4% in 2021, with long-term impacts including cognitive decline, low productivity, and increased risk of chronic diseases. Health Monitoring application for the detection and prevention of stunting in early childhood. Using the waterfall method, this research produced an application with seven main pages that allow comprehensive monitoring of child growth. Functionality testing showed a 95% success rate in implementing critical features, including navigation, authentication, and child data management. Feedback from 50 early adopters showed an 85% satisfaction rate and a 40% increase in the frequency of child growth monitoring. Key challenges included cross-platform data integration and performance optimization on low-specification devices, which were addressed through the development of a modular architecture and code optimization. The app has the potential to increase early detection of growth problems by 30%, enabling timely interventions to improve children's long-term health outcomes. Implementation simulations show a potential reduction in stunting prevalence of 5% within 3 years if widely used. Although limited to user interface development, this research lays the foundation for further development, including the integration of advanced data analysis and nutrition improvement features, which are projected to increase the effectiveness of stunting detection and intervention by up to 50%.
Implementasi Lapor Semanu Sebagai Sistem Pelaporan Kegiatan Perangkat Desa di Kalurahan Semanu-Gunungkidul Zakariyah, Muhammad; Romli, Moh. Ali; Sancoko, Sulistyo Dwi; Saifullah, Fatah Nur; Purnomo, Taufiq Dwi; Diansah, Febri Nur; Halim, Ridwan
Jurnal ABDI RAKYAT Vol. 2 No. 1 (2025): JURNAL ABDI RAKYAT
Publisher : Universitas Teknologi Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46923/jar.v2i1.511

Abstract

The suboptimal system for reporting activities in Kalurahan Semanu potentially hinders efficiency and community participation. Limited access and a less structured reporting flow present obstacles to information dissemination. This community service activity aimed to develop and implement the Lapor Semanu System as a technology-based solution for reporting activities. The methods employed included a participatory approach in identifying needs, designing mobile and website systems, and training village officials and the community on system usage. Evaluation was conducted through observation and feedback questionnaires from training participants. The results of this activity include the creation of a prototype two-sided Lapor Semanu System and the successful execution of training that demonstrated enthusiasm and initial understanding from participants, although the allocation of training time was noted as an important consideration for future development. This system has the potential to enhance efficiency and community participation in reporting activities within Kalurahan Semanu.
Optimizing Waste Routes with Cheapest Insertion and A-Star Fadli, Ilham Dwi Reza; Romli, Moh. Ali
Journal of Scientific Research, Education, and Technology (JSRET) Vol. 4 No. 4 (2025): Vol. 4 No. 4 2025
Publisher : Kirana Publisher (KNPub)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58526/jsret.v4i4.916

Abstract

Efficient waste management poses a significant challenge in many regions, particularly in optimizing waste collection routes. This research focuses on developing a web and mobile-based waste management application using the Cheapest Insertion Heuristic (CIH) algorithm to determine the most efficient collection routes. The application is built with the Flutter framework, integrates OpenStreetMap for mapping, and includes a notification feature for collection schedules. The dataset used includes waste bin locations, collection schedules, and real-time collection statuses. The primary objective is to create a system that minimizes travel distance and time for waste collecting vehicles. Testing results indicate that the application successfully enhances the efficiency of waste management routes. This application is expected to contribute to more effective waste management, increase public awareness regarding cleanliness, and support improved waste management systems in various regions.
Implementation of Least Significant Bit Steganography for Securing Electronic Land Certificates M. Fadhil Lutfi; Moh. Ali Romli
Journal of Scientific Research, Education, and Technology (JSRET) Vol. 4 No. 4 (2025): Vol. 4 No. 4 2025
Publisher : Kirana Publisher (KNPub)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58526/jsret.v4i4.910

Abstract

The government’s transition from physical to electronic land certificates raises significant concerns regarding document security and authenticity. This study implements the Least Significant Bit (LSB) steganography technique to secure electronic land certificates by embedding user identification and metadata into a digital image. The LSB method hides information within the least significant bits of image pixels, ensuring that the visual appearance of the image remains unchanged to the human eye. This approach enables the secure storage of sensitive data, allowing only authorized users to extract the hidden information for document verification. Experimental results demonstrate that the embedded image maintains high visual quality, as indicated by low Mean Squared Error (MSE) and high Peak Signal-to-Noise Ratio (PSNR) values. The LSB steganography technique thus provides an effective and imperceptible method for enhancing the confidentiality and integrity of electronic land certificates.
IMPLEMENTASI ALGORITMA RULE-BASED DAN CLUSTERING UNTUK APLIKASI PERAWATAN MOTOR MATIK ADAPTIF “MOTOCARE” Ilham, Rizky Alifian; Romli, Moh. Ali
Information System Journal Vol. 8 No. 02 (2025): Information System Journal (INFOS)
Publisher : Universitas Amikom Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24076/infosjournal.2025v8i02.2365

Abstract

Jadwal perawatan motor matik yang bersifat statis seringkali tidak sesuai dengan kondisi penggunaan kendaraan, sehingga menyebabkan perawatan menjadi kurang efektif. Penelitian yang dilakukan bertujuan untuk mengembangkan model perawatan yang adaptif pada aplikasi “Motocare” yang mampu mempersonalisasi interval servis berdasarkan perilaku berkendara pengguna. Metode yang diusulkan menggabungkan algoritma Clustering untuk mengelompokkan pengguna ke dalam kategori intensitas (tinggi, normal, ringan) dan algoritma Rule-Based untuk menyesuaikan target kilometer servis secara dinamis. Hasil pengujian menunjukkan model berhasil mempercepat interval servis untuk pengguna intensitas tinggi dan memperlambatnya untuk pengguna ringan. Kontribusi utama penelitian yang dilakukan adalah sebuah sistem rekomendasi cerdas yang proaktif dan personal tanpa memerlukan instalasi perangkat keras tambahan pada kendaraan.
Implementasi Sistem Rujukan Pasien Digital Terpadu Menggunakan Metode Deskriptif Kualitatif Untuk Optimalisasi Layanan Kesehatan Shidiq, Farihan; Romli, Moh. Ali
TIN: Terapan Informatika Nusantara Vol 6 No 7 (2025): December 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/tin.v6i7.8626

Abstract

The patient referral process at Bidan Mawar Clinic is still carried out manually using paper forms and telephone communication, which often causes delays and recording errors. This condition hampers coordination between midwives and community health centers (Puskesmas) and potentially reduces the quality of healthcare services. To address these issues, this study develops a web- and mobile-based patient referral system aimed at improving efficiency, accuracy, and the speed of the referral process. The research approach employs a descriptive qualitative method, including stages of needs analysis, system design using Unified Modeling Language (UML), and system implementation using Flutter for the mobile application, PHP and Express.js for the backend, and MySQL as the database. The implementation results show that the system can perform login, registration, referral data submission, and real-time status monitoring functions with a 100% success rate under normal testing scenarios. The developed system accelerates the referral process by up to twice as fast compared to the manual method, reduces administrative errors, and enhances coordination between midwives and Puskesmas. Therefore, this system contributes to improving the efficiency and quality of healthcare services at the primary healthcare level.
Implementasi Time Lock Auto Decryption Untuk Keamanan Surat Wasiat Digital Berbasis Web dan Mobile Gemasih, Reza; Romli, Moh. Ali
TIN: Terapan Informatika Nusantara Vol 6 No 6 (2025): November 2025
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/tin.v6i6.8627

Abstract

The management of wills in Indonesia still relies heavily on physical documents stored by notaries or family members. This manual approach presents several weaknesses, including the risks of damage, loss, forgery, and unauthorized access before the intended time. To address these issues, this study develops a digital will-security system utilizing a combination of AES–RSA encryption and a server-based Time-Released Cryptography (TRC) mechanism. AES is employed to encrypt document contents quickly and efficiently, while RSA secures the AES encryption key. TRC is implemented to ensure that the decryption process can only be performed at the predetermined time, thereby systematically preventing unauthorized access. This research adopts the Waterfall model, encompassing requirement analysis, system design, implementation, and performance and security testing. The test results show that the average encryption time for a 300 KB document is 125 ms, while the average decryption time is 118 ms. The TRC mechanism demonstrates 100% timing accuracy with no deviation from the release schedule, and all attempts to access the document before its designated time failed completely (0% success rate). The integration of AES–RSA and TRC proves effective in enhancing security, maintaining confidentiality, and controlling timely access to digital will documents.