cover
Contact Name
Hidra Amnur
Contact Email
hidra@pnp.ac.id
Phone
+6282386434344
Journal Mail Official
admjitsi@gmail.com
Editorial Address
Kampus Politeknik Negeri Padang, Jurusan Teknologi Informasi. Gedung E. Limau Manis, Pauh. Padang - Sumatera Barat. Indonesia
Location
Kota padang,
Sumatera barat
INDONESIA
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi
ISSN : 27224619     EISSN : 27224600     DOI : 10.30630/jitsi
Core Subject : Science,
The journal scopes include (but not limited to) the followings: Computer Science : Artificial Intelligence, Data Mining, Database, Data Warehouse, Big Data, Machine Learning, Operating System, Algorithm Computer Engineering : Computer Architecture, Computer Network, Computer Security, Embedded system, Coud Computing, Internet of Thing, Robotics, Computer Hardware Information Technology : Information System, Internet & Mobile Computing, Geographical Information System Visualization : Virtual Reality, Augmented Reality, Multimedia, Computer Vision, Computer Graphics, Pattern & Speech Recognition, image processing Social Informatics: ICT interaction with society, ICT application in social science, ICT as a social research tool, ICT education
Articles 139 Documents
Sistem Keamanan Pintu Rumah Berbasis Cloud Computing Humaira; Alfajri Maulana Ibrahim; Alde Alanda
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.3.1.56

Abstract

Sistem door security ini diciptakan agar dapat memantau lingkungan sekitar area jangkauan dari alat ini. Sistem ini bekerja dengan menggunakan pantulan sinyal ultrasonic dari Sensor jarak yang terhubung ke server database dan terekam pada aplikasi Android User. Sistem ini menggunakan Arduino Mega, Wemos D1 R2, sensor jarak, kamera vc0706, selonid doorlock, dan buzzer. System kerjanya sensor jarak akan diterima di Arduino Mega dan dikirim ke Wemos D1 R2 menggunakan software serial yang data akan dikirim ke database menggunakan jaringan internet yang terhubung di Wemos.
Keamanan Jaringan Wireless Dengan Kali Linux Hidra Amnur; Rasyidah; Fajar Setyawan
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.3.1.57

Abstract

The development of wireless technology or wireless produces something interesting to discuss. Wireless technology is not always about how fast communication can be done. Security issues are very important to discuss, especially in an era that is all digital and all minimalist which no longer requires cables. Security needs to be considered to provide a sense of security when using a device connected to a Wi-Fi. For that, it is necessary to do a security analysis on a wifi. This analysis is carried out using the Penetration Testing method by carrying out attacks to find weaknesss in the Wi-Fi network security system. So, you will see the strength of the password on the Wi-Fi network. Security testing is also carried out on the communication path between clients and access points. So that from the results of this test it will be seen how safe the Wi-Fi network security system is
Deteksi Ancaman Keamanan Pada Server dan Jaringan Menggunakan OSSEC Ronal Hadi; Yarmis Yuliana; Hanriyawan Adnan Mooduto
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.3.1.58

Abstract

Cyber crimes can attack computer networks, infiltrate the network, retrieve confidential data and paralyze computer network systems. In overcoming the crimes that will occur, a system equipped with a firewall and an Intrusion Detection System (IDS) is needed. Firewall and IDS as network security features that can protect servers, networks, and block attacks. Firewall and IDS features can be implemented in OSSEC Tools. OSSEC is an open-source host-based intrusion detection system (HIDS) capable of performing log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerts, and active responses. OSSEC is capable of monitoring a single server or thousands of servers in server/agent mode
Wazuh sebagai Log Event Management dan Deteksi Celah Keamanan pada Server dari Serangan Dos Fitri Nova; Muhammad Dehan Pratama; Deddy Prayama
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.3.1.59

Abstract

Server monitoring is the process of monitoring server system resources such as monitoring server performance also helps identify other performance-related problems such as resource utilization, application downtime, and response time to a service. File Integrity Monitoring (FIM) is the activity of monitoring the integrity of a file to maintain the integrity of a file from unauthorized changes, by utilizing Wazuh as one of the open source applications to monitor has various features to perform monitoring. Computer network security becomes something that needs to be considered as technology develops rapidly. It is the responsibility of a network administrator to monitor system security at any time. Given the various threats that can enter the system at any time, an application is needed that can detect and prevent the threat in real time. The problem raises the idea for the author to utilize one of the applications, namely Suricata in which there is an IDS (Intruction Detection System) method that will serve as an attacker detection. Suricata will display an alert when there is a suspicious package. The resulting alert will be stored in the file log. Then the log will be displayed on the Wazuh web interface. Alerts that appear on Wazuh will be sent to network administrators via e-mail
Alat Keamanan Pintu Menggunakan E-KTP, Modul RFID dan AWS EC2 berbasis NODEMCU ESP8266 Verdian Ramdhani; Rahmat Hidayat; Hendrick
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.3.1.60

Abstract

The current door locking sistem still uses conventional keys, making it less efficient for homes with many doors because there are too many keys to carry. In addition, conventional locks are easily opened by thieves and also locks can be duplicated by irresponsible people. So that a more practical and efficient lock is needed, from this problem the author has the idea to produce a safe and practical RFID-based door security device. By utilizing E-KTP as an RFID tag as a security for the door of the house. Design and build a house door security using the NodeMCU ESP8266 microcontroller as a circuit controller. This study uses the Research and Development method, which is a method that aims to produce or develop certain products. Based on the test results, it can be concluded that the simulation of the door safety device can operate properly, according to the design made. The RFID reader used has a frequency of 13.56 Mhz which is placed on the door to read the E-KTP ID and sent to the AWS server with AWS EC2 as the website infrastructure to add other information and be stored in the MySQL database. If the ID is not in the database, Led The red light will light up and the buzzer will sound. If the ID is in the database, the servo motor will pull the door latch The yellow LED will light up, and will close the door again within 10 seconds.
IMPLEMENTASI JARINGAN SYARAF TIRUAN UNTUK PREDIKSI CUACA PADA PLTA SUMATERA BARAT Boby Putra Lubis; Hidra Amnur; Deddy Prayama
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 2 (2022)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.3.2.61

Abstract

The atmosphere that often changes erratically at this time causes weather forecasts to be unpredictable [1]. By using the Neural Network (NN) method for weather prediction, it is possible to estimate weather conditions more accurately [2]. With the help of the backpropagation algorithm which is commonly used for training data purposes, which can compare each sample data. In every process that occurs so as to get a minimum value on the Mean Square Error (MSE) [1]. The development of this program will be based on a website so that all who need information about weather forecasts for the next few months can view or search easily.
Sistem Informasi Penerimaan Donasi Zakat, Infaq dan Sedekah (ZIS) pada Etalase Sedekah Kota Padang Berbasis Web Framework Laravel Indra Zandi; Yance Sonatha; Fitri Nova
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 2 (2022)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.3.2.62

Abstract

The Sedekah Showcase is one of the organizations that organizes donations where this institution provides a forum for the community to distribute donations, which will later be distributed to the people in need who are registered. In analyzing the Donation Information System and ZIS (Zakat, Infaq, Alms) there are 6 aspects of system analysis needed, namely Performance (Performance), Information (Information), Economy (Economic), Control (Control), Efficiency (Efficiency), and Service ( services). In the donation information system and ZIS Etalase Sedekah, the actors involved are system administrators, donors, and volunteers. Information System for Receiving Donations and Zakat, Infaq and Alms (ZIS) at the Sedekah Showcase of Padang City Based on the Laravel Web Framework includes management of receiving donations and ZIS transactions as well as transaction history, periodic reporting of transactions, surveys of Beneficiaries, data management of Donors, Volunteers , and Beneficiaries. PHP programming language using Laravel framework and database using MySQL and using DOMPDF in designing e-reports.
Aplikasi Jemput dan Donor Darah Dengan Teknologi Open Street Maps dan JWT Token Berbasis Android Nova Putri Octaviani; Rika Idmayanti; Cipto Prabowo
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 2 (2022)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.3.2.63

Abstract

The development of information technology rapidly nowadays and lead to mobile development. In this thesis, will be built an android base application which is useful for health because it helps people who have difficulty getting donors and registers to carry out blood donor activities, so people don’t need to look for donors by posting broadcasts on social media because the application will help the process of finding donors to donate blood. This application uses Open Street Maps to get the address of the donor so the recipient can pick up blood and take it to PMI. This application also uses JWT Token to save the login session of each user who enters the application. This application use the internet connection to communicate with AWS server which already installed with Mysql and Apache inside of it. This application is built by Java programming language and use database Mysql. For interaction between android and server that is built an API based on the PHP programming language with PDO method. The result of this thesis will show question and result obtained by student at the time when finish doing the exam on the application
Sistem Pendukung Keputusan Pemilihan Program Studi di Politeknik Negeri Padang Menggunakan Metode AHP dan SAW Berbasis Web Sarah Latifah Marif; Meri Azmi; Alde Alanda
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 2 (2022)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.3.2.64

Abstract

The criteria used in the decision support system for the selection of study programs at the Padang State Polytechnic are data obtained from questions in the form of questionnaires. This web-based decision support system uses the Laravel framework and MySQL as the database. The method used in this system is the AHP (Analytic Hierarchy Process) method for weighting the values for each criterion and the SAW (Simple Additive Weighting) method for determining the study program which can produce faster and more subjective data. This decision support system will produce more accurate data and the results obtained are more optimal so that it can help prospective students solve problems in determining which study program to choose according to their abilities by providing advice for decision support
Teknologi Virtual Reality pada Media Pembelajaran Proses Pemasangan Kabel UTP Cross dan Straight Taufik Gusman; Muhammad Umar Huzein
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 2 (2022)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.3.2.65

Abstract

Virtual Reality is an engineering technology that aims to create simulations that are similar to reality. Virtual Reality is widely used for game development and education purposes. In the field of education, Virtual Reality is usually used as an alternative source of learning a material. Like an imitation of the digestive tract, students can learn the intricacies of the material being studied easily. The application of the cross and straight UTP cable installation process aims to facilitate the learning of Information Technology Department students who are still conducting online lectures and is used to make it easier for students to understand how to make straight and cross Local Area Network cables. Making this application using the Unity3D application, which is an application used to create applications or games based on virtual reality and augmented reality. For the manufacture of the models that will be used, made using the blender application. This Virtual Reality application will run on Google Carboard using an Android smartphone

Page 5 of 14 | Total Record : 139