Andy Hidayat Jatmika
YOU?
Author Swipe
View article: Information Systems Security Risk Management Using the COBIT 2019 Framework and NIST 800-30 on the Website People's Representative Council NTB
Information Systems Security Risk Management Using the COBIT 2019 Framework and NIST 800-30 on the Website People's Representative Council NTB Open
This research analyzes information security risk management on the website of the Regional People's Representative Council (DPRD) of West Nusa Tenggara (NTB) using the COBIT 2019 and NIST 800-30 frameworks. The main objective of this resea…
View article: Security Analysis of the Lombok Tourism Android Application Using Penetration Testing (Pentesting) Methods Based on the OWASP Mobile Top 10-2024 Framework
Security Analysis of the Lombok Tourism Android Application Using Penetration Testing (Pentesting) Methods Based on the OWASP Mobile Top 10-2024 Framework Open
Android has become the most widely used operating system for mobile devices, playing a crucial role in supporting the tourism sector. As tourism in Indonesia grows, the demand for quick and easy access to information for travel planning ha…
View article: PENCARIAN RUTE BERDASARKAN PERGERAKAN NODE TETANGGA PADA PROTOKOL ROUTING AODV UNTUK MENEMUKAN RUTE YANG HANDAL DI JARINGAN MANET
PENCARIAN RUTE BERDASARKAN PERGERAKAN NODE TETANGGA PADA PROTOKOL ROUTING AODV UNTUK MENEMUKAN RUTE YANG HANDAL DI JARINGAN MANET Open
The movement of nodes in a Mobile Ad Hoc Network (MANET) is very dynamic and unpredictable. Each node in this network moves freely at different speeds and directions, which causes continuous changes in the network topology. The movement of…
View article: PENCARIAN RUTE BERDASARKAN JARAK NODE TERDEKAT DAN EFISIENSI ENERGI PADA PROTOKOL ROUTING AOMDV DI JARINGAN MANET
PENCARIAN RUTE BERDASARKAN JARAK NODE TERDEKAT DAN EFISIENSI ENERGI PADA PROTOKOL ROUTING AOMDV DI JARINGAN MANET Open
The distance of nodes when communicating is a major challenge in route finding. The long distance of nodes will consume a lot of energy in the routing process so that the occurrence of failure or disconnection of the routing path becomes a…
View article: THREAT MODELING MENGGUNAKAN PENDEKATAN STRIDE DAN DREAD UNTUK MENGETAHUI RISIKO DAN MITIGASI KEAMANAN PADA SISTEM LAYANAN PENDIDIKAN
THREAT MODELING MENGGUNAKAN PENDEKATAN STRIDE DAN DREAD UNTUK MENGETAHUI RISIKO DAN MITIGASI KEAMANAN PADA SISTEM LAYANAN PENDIDIKAN Open
Information system security is increasingly crucial with the rise of cyber threats. This study identifies and evaluates security risks in education service systems using STRIDE and DREAD-based Threat Modeling. STRIDE identifies threats suc…
View article: IMPLEMENTASI OWASP TOP 10 DALAM PENGUJIAN PENETRASI WEBSITE : MENGIDENTIFIKASI CELAH KEAMANAN DALAM SISTEM PENGELOLAAN VOTING INDONESIA
IMPLEMENTASI OWASP TOP 10 DALAM PENGUJIAN PENETRASI WEBSITE : MENGIDENTIFIKASI CELAH KEAMANAN DALAM SISTEM PENGELOLAAN VOTING INDONESIA Open
The rapid advancement of information technology has had a major influence in every aspect of life, including in government operations. the availability of platforms such as websites can be a medium for disseminating information transparent…
View article: Android-Based Porang Cultivation Application Design for North Lombok District Porang Farmers
Android-Based Porang Cultivation Application Design for North Lombok District Porang Farmers Open
Porang is a plant that has the potential to be developed as an export commodity as a food ingredient or industrial ingredient (i.e., food, cosmetics, medicine, or health). North lombok regency location is one of the districts in ntb that c…
View article: AUDIT DAN ANALISIS WEBSITE PEMERINTAH MENGGUNAKAN PENGUJIAN PENETRASI SQL INJECTION DAN CROSS SITE SCRIPTING (XSS)
AUDIT DAN ANALISIS WEBSITE PEMERINTAH MENGGUNAKAN PENGUJIAN PENETRASI SQL INJECTION DAN CROSS SITE SCRIPTING (XSS) Open
This study aims to analyze the security of government websites, focusing on vulnerabilities caused by SQL Injection and Cross Site Scripting (XSS) attacks. In accordance with Presidential Instruction No. 3 of 2003 on National Policy and St…
View article: Reducing Transmission Signal Collisions on Optimized Link State Routing Protocol Using Dynamic Power Transmission
Reducing Transmission Signal Collisions on Optimized Link State Routing Protocol Using Dynamic Power Transmission Open
Many devices connected to a network inevitably result in clashes between communication signals. These collisions are an important factor that causes a decrease in network performance, especially affecting Quality of Service (QoS) like thro…
View article: Analysis Of Android Malware Analysis Of Android Malware "Undangan Pernikahan.Apk" Using Static And Dynamic Methods
Analysis Of Android Malware Analysis Of Android Malware "Undangan Pernikahan.Apk" Using Static And Dynamic Methods Open
This research aims to analyze Android malware "UndanganPernikahan.apk" using static methods with reverse engineering techniques and dynamic analysis. The analysis process uses several tools to understand the characteristics, behavior, and …
View article: Implementation of GNU Privacy Guard (GPG) Hybrid Encryption to Improve Information Security at the University of Mataram’s Electronic Signature (E-Sign)
Implementation of GNU Privacy Guard (GPG) Hybrid Encryption to Improve Information Security at the University of Mataram’s Electronic Signature (E-Sign) Open
Electronic signatures have been widely used for administrative purposes since 2020, especially when activities from home are a priority. University of Mataram is one of the state universities that provides electronic signature facilities (…
View article: Modifikasi Protokol Routing DSDV Menggunakan Algoritma Dynamic-power transmission untuk Mengurangi Interferensi Sinyal dalam Pengiriman Data Berdasarkan Tingkat Kepadatan Node di Jaringan MANET
Modifikasi Protokol Routing DSDV Menggunakan Algoritma Dynamic-power transmission untuk Mengurangi Interferensi Sinyal dalam Pengiriman Data Berdasarkan Tingkat Kepadatan Node di Jaringan MANET Open
Mobile Ad-Hoc Network (MANET) is a decentralized collection of nodes that exchange information temporarily via wireless transmission. When nodes communicate, all nodes in the communication range will be affected by signal interference from…
View article: 3D mapping of fire hotspot in East Rinjani forest area using GIS and remote sensing
3D mapping of fire hotspot in East Rinjani forest area using GIS and remote sensing Open
Wildfires in Indonesia reached their peak during the drought of 2015, with estimated burnt forest and land of up to 2.6 million hectares. During the dry season of 2020, high temperatures and high winds were responsible for losing 659.02 he…
View article: ANALISA PERBANDINGAN ARSITEKTUR DATA CENTER SWITCH CENTRIC DAN SERVER CENTRIC PADA SISTEM E-VOTING
ANALISA PERBANDINGAN ARSITEKTUR DATA CENTER SWITCH CENTRIC DAN SERVER CENTRIC PADA SISTEM E-VOTING Open
The development of e-voting was first introduced in the United States in 1974. Various countries around the world have also implemented e-voting using Electronic Voting Machines (EVMs), the internet, mobile phones, fax, and other technolog…
View article: PEMBUATAN TERMOSTAT CERDAS TANGGAP PERUBAHAN CUACA BERBASIS IOT UNTUK HIDROPONIK SISTEM WICK PADA TANAMAN PAKCOY
PEMBUATAN TERMOSTAT CERDAS TANGGAP PERUBAHAN CUACA BERBASIS IOT UNTUK HIDROPONIK SISTEM WICK PADA TANAMAN PAKCOY Open
Hydroponics is an agricultural cultivation that uses water as a growing medium. One of the plants that can be cultivated hydroponically is the pakcoy plant. Pakcoy is a plant with an optimum water temperature range for its growth which is …
View article: TRANSFORMASI PELAYANAN DESA BERBASIS DIGITAL MODERN DAN PENGEMBANGAN SUMBER DAYA MANUSIA MELALUI PROGRAM PELATIHAN
TRANSFORMASI PELAYANAN DESA BERBASIS DIGITAL MODERN DAN PENGEMBANGAN SUMBER DAYA MANUSIA MELALUI PROGRAM PELATIHAN Open
Mataram University as a tertiary institution has the duties and functions of implementing the Tri Dharma of Higher Education, namely education and teaching, research, and community service. Such efforts are not only carried out and become …
View article: EVALUASI PERFORMANSI PROTOKOL 6LOWPAN TERHADAP CSMA/CA PADA PERANGKAT IOT
EVALUASI PERFORMANSI PROTOKOL 6LOWPAN TERHADAP CSMA/CA PADA PERANGKAT IOT Open
The Internet of Things (IoT) has unique design requirements compared to typical network devices, particularly regarding energy efficiency and performance expectations. To meet the need for low power consumption and easy integration with ex…
View article: Meningkatkan Kinerja Protokol Routing Aomdv Dalam Memilih Node Tetangga Berdasarkan Bandwidth, Round Trip Time, Dan Packet Loss Ratio Untuk Menemukan Rute Terbaik
Meningkatkan Kinerja Protokol Routing Aomdv Dalam Memilih Node Tetangga Berdasarkan Bandwidth, Round Trip Time, Dan Packet Loss Ratio Untuk Menemukan Rute Terbaik Open
Mobile ad hoc network or in short MANET is a group of node that exchange the information from source node to destination node on wireless network. The main problem in MANET is on the network structure that change continously that is cause …
View article: Implementasi Algoritma Pemilihan Node Tetangga Terbaik Pada Protokol Routing DSR di Jaringan MANET
Implementasi Algoritma Pemilihan Node Tetangga Terbaik Pada Protokol Routing DSR di Jaringan MANET Open
Mobile Ad Hoc Network (MANET) is a wireless telecommunications technology that consists of a collection of dynamic nodes. Due to these properties resulted in the mobility of nodes in MANET. So that every relationship between nodes will alw…
View article: Smart EV Navigation and Data Collection System for Tree Based Data Modeling Using IoT
Smart EV Navigation and Data Collection System for Tree Based Data Modeling Using IoT Open
Machine learning for autonomous can be done by recording the displacement and condition of the vehicle through manual control by humans and modeling the data.The research proposes designing a data collection system for tree-based data mode…
View article: Pengamanan Internet of Things Berbasis NodeMCU Menggunakan Algoritma AES Pada Arsitektur Web Service REST
Pengamanan Internet of Things Berbasis NodeMCU Menggunakan Algoritma AES Pada Arsitektur Web Service REST Open
Data confidentiality and resource's limitation issues are challenges for the Internet of Things. To implement good security on IoT systems, cryptography can do it, but it needs an effective encryption algorithm that does not require a lot …
View article: Rancang Bangun WSN berbasis nRF24L01 dan SIM800l bertenaga Surya untuk Implementasi IoT secara Outdoor
Rancang Bangun WSN berbasis nRF24L01 dan SIM800l bertenaga Surya untuk Implementasi IoT secara Outdoor Open
Internet of things (IoT) requires an internet network for data communication between machines. Wifi is not always available outdoors and requires more portable data communication. This study aims to design a prototype Wireless Sensor Netwo…
View article: Solar-powered IoT based smart hydroponic nutrition management system using FARM
Solar-powered IoT based smart hydroponic nutrition management system using FARM Open
Good nutrition and water conditions are significant in a hydroponic system. Nutrients in hydroponic systems are periodically re-mixed to target the right amount of TDS. The TDS amount needs to be regularly measured after the weather change…
View article: Penerapan Algoritma EA-SHORT pada Protokol Routing AOMDV untuk Menemukan Rute yang Handal Berbasis Energi di Jaringan MANET
Penerapan Algoritma EA-SHORT pada Protokol Routing AOMDV untuk Menemukan Rute yang Handal Berbasis Energi di Jaringan MANET Open
Mobile Ad Hoc Network (MANET) is a stand-alone wireless network, consisting of several nodes that can move in all directions freely. The routing protocol used as the object of this study is Ad Hoc On-Demand Multipath Distance Vector (AOMDV…
View article: Dampak Variasi Model Propagasi Terhadap Protokol Routing Reaktif, Proaktif, dan Hybrid di Jaringan VANET (Studi Kasus Kota Bima)
Dampak Variasi Model Propagasi Terhadap Protokol Routing Reaktif, Proaktif, dan Hybrid di Jaringan VANET (Studi Kasus Kota Bima) Open
VANET is a subset of Mobile Adhoc Network (MANET) that utilizes wireless technology, which in the VANET network the node is presented as a vehicle and the route for a vehicle is presented as a highway that will be passed by that vehicle. I…
View article: Smart solar powered hydroponics system using internet of things and fuzzy association rule mining
Smart solar powered hydroponics system using internet of things and fuzzy association rule mining Open
Hydroponics is an alternative to limited space agriculture by involving electrical energy for irrigating nutrients for plants. Apart from using an AC power source, hydroponics can also use a DC power source which makes it more portable and…
View article: Penerapan Algoritma Semut pada Protokol Routing AOMDV untuk Optimasi Pencarian Rute di Jaringan VANET
Penerapan Algoritma Semut pada Protokol Routing AOMDV untuk Optimasi Pencarian Rute di Jaringan VANET Open
VANET is a wireless network that is a derivative of the MANET network. VANET network is one network that can be used to communicate between one vehicle and another vehicle. With the existence of the VANET network, it is expected to be able…
View article: ANALISIS PENGARUH VARIAN MODEL PROPAGASI TERHADAP KOMUNIKASI DATA PADA PROTOKOL ROUTING TORA, MDART DAN ZRP DI JARINGAN VANET (STUDI KASUS PETA JALAN KOTA PRAYA DAN BYPASS LOMBOK)
ANALISIS PENGARUH VARIAN MODEL PROPAGASI TERHADAP KOMUNIKASI DATA PADA PROTOKOL ROUTING TORA, MDART DAN ZRP DI JARINGAN VANET (STUDI KASUS PETA JALAN KOTA PRAYA DAN BYPASS LOMBOK) Open
VANET is part of the Mobile Ad-hoc Network (MANET), but the nodes on VANET have a higher level of mobility. Each node that moves will cause network activity (topology changes) such as route search and message sending handled by each node. …
View article: SISTEM INFORMASI KEGIATAN PROGRAM STUDI TEKNIK INFORMTAIKA UNIVERSITAS MATARAM
SISTEM INFORMASI KEGIATAN PROGRAM STUDI TEKNIK INFORMTAIKA UNIVERSITAS MATARAM Open
As an educational institution, each university competes to build an information system to provide the best service for all university citizens. Communication between lecturers, and between students is one of the focuses of the attention of…
View article: Sistem Monitoring Tanaman Cerdas Menggunakan Wireless Sensor Network dan Evolutionary Fuzzy Association Rule Mining
Sistem Monitoring Tanaman Cerdas Menggunakan Wireless Sensor Network dan Evolutionary Fuzzy Association Rule Mining Open
Plant conditions monitoring requires specific knowledge in agriculture. The knowledge includes decision support to describe between good (ideal) and bad conditions from each different plant. Fuzzy rules capable to describes plants bio sign…