Moh Ali Romli
University of Technology Yogyakarta, Indonesia

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Aplikasi Konsultasi Kesehatan Mental dengan Fitur Penjadwalan di Bimbingan Konseling Universitas Teknologi Yogyakarta Kevina Maydiva Heriansaputri; Moh Ali Romli
J-INTECH ( Journal of Information and Technology) Vol 13 No 01 (2025): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v13i01.1922

Abstract

This study developed a mobile-based mental health consultation application at Universitas Teknologi Yogyakarta (UTY) to offer both online and offline counseling services for students. The tool incorporates two primary features online consultations and offline consultation scheduling, designed to improve students' access to mental health support. The system utilizes Flutter for cross-platform mobile application development, Firebase for data management, and Node.js for backend services. The study employs a Research and Development (R&D) methodology encompassing needs analysis, system design, implementation, and testing. The results indicate that the application successfully mitigates obstacles such time limitations, stigma, and restricted accessibility, hence enhancing student involvement with mental health services. The Self-Reporting Questionnaire 20 (SRQ-20) serves as a mental health screening instrument within the application, enabling students to evaluate their mental health status. This program aims to deliver a thorough and accessible solution for mental health counseling at UTY and may serve as a prototype for other universities.
Penerapan Metode A-Star untuk Rute Evakuasi dengan Menggunakan Jaringan Long Range Wide Area Network (LoRaWAN) Charles Daniel; Moh Ali Romli
J-INTECH ( Journal of Information and Technology) Vol 13 No 01 (2025): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v13i01.1923

Abstract

Optimal evacuation route planning is a crucial factor in disaster mitigation, especially in areas with limited communication infrastructure. This study proposes the application of the A-Star method for evacuation route optimization, supported by the Long-Range Wide Area Network (LoRaWAN) as an emergency communication system. The research methodology includes the development of an A-Star algorithm optimized with an adaptive heuristic function, integration with LoRaWAN-based sensors for real-time road condition monitoring, and simulations in various disaster scenarios. The results show that the developed system can reduce evacuation time by up to 31.4% compared to conventional methods and maintain communication connectivity up to 95% even under emergency conditions. Furthermore, the dynamic adaptation mechanism allows for automatic route changes based on current field conditions, enhancing the effectiveness of the evacuation process. Therefore, the integration of the A-Star method and LoRaWAN network proves to be a reliable and efficient solution for improving public safety during disasters.
Aplikasi Honeypot dalam Keamanan Jaringan untuk Mendeteksi Serangan Siber pada Infrastruktur TI Carlos Susanto; Moh Ali Romli
J-INTECH ( Journal of Information and Technology) Vol 13 No 01 (2025): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v13i01.1924

Abstract

The high security risks that are susceptible to hacking and exploitation by malicious actors to steal data or information often arise due to a lack of awareness regarding the critical importance of implementing deceptive network security using honeypots. Negligence can create vulnerabilities that are easily exploited, allowing attackers to initiate breaches. A notable network security approach involves using Honeypots, a method that creates a decoy server to mimic an authentic one. Honeypots are deliberately engineered to attract the attention of cyber attackers and facilitate their access to the trap server, thereby enabling the monitoring and analysis of their activities without compromising the integrity of the primary server. To achieve optimal network security, comprehensive testing of Honeypots is essential. This testing process serves as a fundamental metric in evaluating the efficacy and performance of Honeypot systems in mitigating cyber threats.