cover
Contact Name
Fristi Riandari
Contact Email
hengkitamando26@gmail.com
Phone
+6281381251442
Journal Mail Official
hengkitamando26@gmail.com
Editorial Address
Romeby Lestari Housing Complex Blok C Number C14, North Sumatra, Indonesia
Location
Unknown,
Unknown
INDONESIA
Jurnal Mandiri IT
ISSN : 23018984     EISSN : 28091884     DOI : https://doi.org/10.35335/mandiri
Core Subject : Science, Education,
The Jurnal Mandiri IT is intended as a publication media to publish articles reporting the results of Computer Science and related research.
Articles 17 Documents
Search results for , issue "Vol. 12 No. 2 (2023): October: Computer Science and Field." : 17 Documents clear
Penetration Testing on Mail Server Website using the OWASP Method Hendra Saputra; Ali Zainal Abidin; Faldi Faldi; Muhammad Taufiq Sumadi
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i2.232

Abstract

Technological advancements have positively impacted various fields, including the Internet. Awareness of system security has become a crucial concern for application developers. Protecting networks from disruptions or hacker attacks can be achieved through self-testing methods, such as Penetration Testing (Pentest). This research conducts a penetration test on the mail server domain, mail.umtk.sch.id, using the tools OWASP Zap and Acunetix. The results of this testing reveal the detection of 9 vulnerabilities and based on the OWASP Top 10 2017 vulnerability categories, five categories were identified: Broken Authentication, Sensitive Data Exposure, Broken Access Control, Security Misconfiguration, and Using Components with Known Vulnerabilities
Hybrid model for optimization of ambulance allocation relocation in smart cities Rafiqa Dewi
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i2.235

Abstract

To increase the percentage of survival of citizens both in normal times and in times of emergency or Emergency Medical Services (EMS) which is one of the main pillars in a smart city, among the most important is ambulance management. A hybrid model between LR-MEXCLP is a model that combines local activity estimation with the TIMEXCLP model by achieving maximum coverage on MEXCLP which then this hybrid model can lead in solving a series of ambulance facility placement problems more accurately. This model was developed by establishing an integration model between the ability to estimate local activity and maximum completion coverage and with the shortest response time, so as to create a reliable ambulance service in a smart city.
Application of the Dijkstra method in finding the shortest route for hospitals in Kabupaten Tegal Gunawan Gunawan; Wresti Andriani; Khadziqul Humam Munfi
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i2.238

Abstract

Health services are one of the most critical aspects of human life. Getting medical care quickly and efficiently can be a determining factor in saving a person's life in an emergency. In this article, we will review the application of the Dijkstra Method in finding the shortest route to Mitra Siaga hospitals in Kabupaten Tegal. This article is expected to contribute to understanding and developing a more efficient transportation system in Kabupaten Tegal, focusing on health services. Dijkstra algorithm for determining the shortest route. Dijkstra's algorithm is an algorithm that intends to find the shortest path on a graph. The principle of the Dijkstra Algorithm is searching for two passes with the most negligible weight. Based on the results of testing 10 times, the accuracy of this application is 100%. In this study, limited to the initial location tested, this application has not used the current location at its initial location. For the development of this application, you can use the current location at the initial location so that this application runs optimally
Digitizing learning modules without internet quota to accelerate education equity in Pabean Udik Village Indramayu Achmad Zuchriadi; Fajar Rahayu; Silvia Anggraeni; Muhammad Alif Razi; Jati Kinsela Brajamusti; Mutiara Putri R Darmawan
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Education equality for the Indonesian people still needs to be improved; for example, in Indramayu, the average length of schooling for the community has only reached 6.52 years (2021) and 6.83 years (2022), still below the 12-year compulsory education program. One way of equitable distribution of education through digitisation of the Education module still needs to be solved, especially related to uneven internet access facilities and the high price of internet quota. Therefore, it is necessary to carry out this activity so that a system that contains digital learning modules can be produced without using internet quota. This activity aims to digitise learning modules that can be accessed without internet quota to accelerate education equity for Pabean Udik Village Indramayu school students. Activities are carried out by designing a system consisting of hardware, web-based applications and learning module content, both K-13 modules and Virtual laboratories. The result obtained is the availability of a system that contains learning module content and virtual laboratories that can be accessed without internet quota using smartphones, tablets and computers. This system is expected to be a solution for equitable development, especially for students in Indramayu, to increase students' knowledge even though the average school time is still below national standards. This system can also be implemented in other regions to accelerate education equity in Indonesia.
Comparison of SAW methods with WP method laptop recommendations Ahmad Taufik Marsaoly; Riffa Haviani Laluma
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i2.244

Abstract

In this era, laptop users are increasing rapidly to support people's work. Various types and brands of laptops have been produced and distributed on the Indonesian market with various specifications and different uses. Survey results from indonesiabaik.id show that the use of laptops without internet for work is 54.55%. Meanwhile, laptops used for entertainment were 34.94%. With various types, specifications and uses of laptops having varying prices from cheap to expensive, this creates a dilemma for people in choosing a laptop that suits their needs. Many people have already bought laptops, but the increasing demand ends up having to buy another laptop to suit the increasing work and entertainment needs. The method used for comparison is the SAW method with the WP method in a web-based application that can recommend laptops. The results of this research show that recommending laptops using the SAW method or the functionally WP method is very helpful in finding out the overall ranking or level of the laptop. However, in terms of effectiveness, the SAW method still has the possibility of having the same ranking value and that could cause a dilemma for people in determining the ranking order on laptops. Meanwhile, the WP method has the possibility of the same ranking value being very small so it can determine the laptop ranking order better than the SAW method. From the overall comparison, it can be concluded that the WP method is better in recommending laptops.
Comparison of investor detection algorithm in internet of things based home security systems Didit Karyadi
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i2.245

Abstract

Empirical studies state that the environment is the main factor that influences crime patterns, so closed circuit television (CCTV) is an option to reduce the risk of crime. However, CCTV is less effective because it requires high bandwidth & storage and cannot provide notifications. Therefore, a technology called the internet of things (IoT) has emerged so that CCTV or webcams can work together with sensors to detect the presence of intruders and provide notifications. This research proposes a system that detects intruders and sends notifications to home owners without being tied to time and place. This system is usually referred to as a smart home security system. This research aims to compare intruder detection algorithms in IoT-based home security systems. This research method uses the internet of things (IoT) in smart homes or home security by comparing the accuracy and processing time of the HoG+SVM and Yolo V3 algorithms. The results of the system implementation show that the most accurate intruder detector is the Yolo V3 algorithm with an accuracy of 99% and a processing time of 14.852 seconds. This processing time can be accelerated by using a Graphics Processing Unit (GPU) with higher specifications.
Geographic information system for boyolali tourist object mapping android based Maria Atik Sunarti Ekowati; Kristyana Dananti; Darsini Darsini; Sri Wening
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i2.246

Abstract

Boyolali is part of Indonesia which is rich in tourism potential and regional specialties. Boyolali is a city that has tourist attractions and typical regional souvenirs. Boyolali tourist attractions are New Selo, Gancik Hill, Kedung Kayang Waterfall, Omah Bammbu Merapi, Cengklik Reservoir, Gunung Madu Valley, Dairy Cow Agro Tourism, Brown Canyon, Tlatar Water Park, Mount Merbabu Trekking, Kedung Goro, Umbul Tirto, Gardens Raya Indrokilo, Bade Reservoir, Restu Wijaya Waterboom. However, there are problems for tourists outside the region due to the lack of information obtained or tourists' knowledge about where the tourist attractions they can visit are located. Apart from that, tourists are also confused about where to go. The aim of this research is to provide a solution to the problems faced by tourists by developing a geographic information system for mapping tourist attractions by utilizing the global positioning system (GPS) feature available on Android smartphones. Through the design of the application being developed, it is hoped that tourists and visitors to Boyolali tourist attractions will be able to obtain convenience in mapping tourist locations in the Boyolali area as well as help provide comments and ratings about the quality of the products produced by sellers.
Implementation of forward chaining in tourism recommendation selection expert system based on user preferences Firahmi Rizky
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i2.247

Abstract

Precise travel recommendations tailored to user preferences are a key element in enriching the travel experience. In this context, the Forward Chaining method in the User Preference-Based Travel Recommendation Selection Expert System offers a powerful and highly personalised approach. This article describes the implementation steps of the Forward Chaining method, which involves identification of user preferences, conversion of preferences to facts, initialisation of knowledge base, Forward Chaining process, evaluation of results, and customised travel recommendations. This method allows the system to dynamically respond to user preferences, generate accurate recommendations, and ensure that users are satisfied with their experience. However, some challenges such as privacy protection, complexity of user preferences, and knowledge base updates must be considered. Therefore, this article also discusses important implications of implementing the Forward Chaining method, including strict privacy protection, regular updates of the knowledge base, as well as the system's ability to learn from user feedback. In conclusion, the Forward Chaining method is a very useful approach in improving travel recommendation services tailored to user preferences, which can enrich the travel experience and result in higher satisfaction for users.
Penetration Testing on Mail Server Website using the OWASP Method Hendra Saputra; Ali Zainal Abidin; Faldi Faldi; Muhammad Taufiq Sumadi
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i2.232

Abstract

Technological advancements have positively impacted various fields, including the Internet. Awareness of system security has become a crucial concern for application developers. Protecting networks from disruptions or hacker attacks can be achieved through self-testing methods, such as Penetration Testing (Pentest). This research conducts a penetration test on the mail server domain, mail.umtk.sch.id, using the tools OWASP Zap and Acunetix. The results of this testing reveal the detection of 9 vulnerabilities and based on the OWASP Top 10 2017 vulnerability categories, five categories were identified: Broken Authentication, Sensitive Data Exposure, Broken Access Control, Security Misconfiguration, and Using Components with Known Vulnerabilities
Hybrid model for optimization of ambulance allocation relocation in smart cities Rafiqa Dewi
Jurnal Mandiri IT Vol. 12 No. 2 (2023): October: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v12i2.235

Abstract

To increase the percentage of survival of citizens both in normal times and in times of emergency or Emergency Medical Services (EMS) which is one of the main pillars in a smart city, among the most important is ambulance management. A hybrid model between LR-MEXCLP is a model that combines local activity estimation with the TIMEXCLP model by achieving maximum coverage on MEXCLP which then this hybrid model can lead in solving a series of ambulance facility placement problems more accurately. This model was developed by establishing an integration model between the ability to estimate local activity and maximum completion coverage and with the shortest response time, so as to create a reliable ambulance service in a smart city.

Page 1 of 2 | Total Record : 17