Claim Missing Document
Check
Articles

Found 29 Documents
Search

AGENT UNTUK PEMANTAU KEAMANAN SERVER PADA JARINGAN INTERNET MENGGUNAKAN MOBILE DEVICE Bambang Sugiantoro
Seminar Nasional Informatika (SEMNASIF) Vol 1, No 3 (2009): Network And Security
Publisher : Jurusan Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Aplikasi penelitian agent remote akan memudahkan kerja admin untuk melakukan pengawasan terhadap server yang dikelolanya. Admin akan melakukan remote dengan cara login telnet melalui mobile device. Kemudian akan muncul tampilan terminal di layar mobile device. Mobile device yang digunakan adalah mobile device yang mendukung Mobile Information Device Profile (MIDP) dan juga mendukung layanan GPRS. Server yang digunakan adalah server yang mempunyai layanan telnet. Pendekatan yang digunakan dalam penelitian ini adalah dengan menggunakan konsep Object Oriented Programming (OOP).
ANALISIS TINGKAT KEAMANAN PADA DINAS XYZ TERHADAP SERANGAN PENGGUNA WIFI Bambang Sugiantoro
Seminar Nasional Teknologi Informasi Komunikasi dan Industri 2017: SNTIKI 9
Publisher : UIN Sultan Syarif Kasim Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (590.298 KB)

Abstract

Kantor dinas yang tersebar diseluruh indonesia telah banyak yang menggunakan teknologi wifi. Perlu dilakukan analisis keamanan untuk Maturity Model dengan skala 0-5 dan dilanjutkan dengan penetration test menggunakan metode ARP Spoofing dengan menggunakan tools yakni CommView for Wifi ver.6.3, Aircrack-ng 1.1 serta Cain and Abel ver.4.9.35. Dari hasil berhasil menangkap username dan password yang dikirim dari komputer client. Oleh karena itu jaringan wireless yang diterapkan di kantor dinas XYZ tergolong belum cukup aman dalam hal keamanan jaringan. Dan hasil dari analisis tersebut jaringan wireless termasuk golongan Repeatable but Intuitive, yakni masih menggunakan konsep basic pemasangan dan belum berfokus penuh dalam hal keamanan jaringan dimana nilai akhirnya adalah sebesar 1.678.
APPLICATION FOR MOBILE AGENT TO ACCESS MYSQL Bambang Sugiantoro; Retantyo Wardoyo; Sri Hartati; Jazi Eko Istiyanto
IJID (International Journal on Informatics for Development) Vol. 1 No. 2 (2012): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (322.188 KB) | DOI: 10.14421/ijid.2012.01204

Abstract

Availability of information is increasing rapidly, the method for encoding and storage of information also increased. The number of sources of information brings several problems, among them about how to combine the distributed data storage and different. Information on an organization or company is usually stored in separate locations and different formats. When there is an increase in storage capacity and the amount of information search costs, the company faced with an abundance amount of data. System development methodology used is Rapid Application Development (RAD) with a development framework Guidlines for Rapid Application Engineering (GRAPPLE). The software used in building this application is Borland Jbuilder 9. Rational Rose 2000 is used for the analysis and design using Unified Modeling Language (UML). Mysql server is a type of database to be accessed on each operating system. Operating system used in this study is Windows XP and Linux Fedora Core. This application was developed with aglets, which is one of software for building mobile agent applications.
Distributed Database Using Mobile Agent Bambang Sugiantoro; Retantyo Wardoyo; Sri Hartati; Jazi Eko Istiyanto
IJID (International Journal on Informatics for Development) Vol. 1 No. 1 (2012): IJID May
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (202.233 KB) | DOI: 10.14421/ijid.2012.01102

Abstract

The number of sources of information brings several problems, among them about how to combine the distributed data storage and different. Information on an organization or company is usually stored in separate locations and different formats. When there is an increase in storage capacity and the amount of information search costs, the company faced with an abundance amount of data. System development methodology used is object oriented design with a development framework
Analysis Quality of Service Wireless LAN at University PGRI Yogyakarta Nur Kukuh Wicaksono; Bambang Sugiantoro
IJID (International Journal on Informatics for Development) Vol. 6 No. 1 (2017): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (194.928 KB) | DOI: 10.14421/ijid.2017.06103

Abstract

PGRI University of Yogyakarta is an educational institution that uses the internet as one of the supporting facilities and infrastructures to manage and organize the data and information used by the student to find references about the lecture. PGRI University Yogyakarta has three buildings on the main campus building A building B and C buildings, where each building using wireless LAN as a means for students to use the internet network, the weakness of the wireless LAN network where poor internet network in the wireless LAN network. Thus the researchers wanted to analyze the Quality of Service wireless LAN networks in building A, building B, and C buildings, in each floor.With the existence of quality of the network at PGRI University of Yogyakarta will be done by interviews and observation methods, problems that occur in wireless LAN networks in each building have been prepared in advance, after which it will do an analysis of wireless LAN networks using quality of service parameters, namely delay, packet loss, bandwidth, throughput and factors that influence the wireless network at the University of PGRI Yogyakarta.The results of the measurement and monitoring of Quality of Service wireless LAN at PGRI University of Yogyakarta in building A, building B, C on each floor of the building can be classified in the category of poor with the average delay for each building to around 150 ms and packet loss = 28%, bandwidth = 173523 bits / s and throughput = 22%, and the factors that occurred in the signal range cannot cover every room in every building. From these results it can be concluded that the quality of the wireless LAN at the University PGRI Yogyakarta according to the TIPHON standards categorized as poor.
Design and Development of an Automatic Watering System Based on Bash Shell with OpenWRT Platform on Chili Plants Irham Son’Aniy; Bambang Sugiantoro
IJID (International Journal on Informatics for Development) Vol. 6 No. 1 (2017): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (235.319 KB) | DOI: 10.14421/ijid.2017.06101

Abstract

Indonesia is an agrarian country. Because of the wide agriculture area, Indonesia became the exporter country in agriculture sector. Nowadays,  the developments in every fields are  always  increasing. One of those field is technology. Technology should  give some  contributions which can develop the agriculture field. One of the contribution that can be done is automatic watering system on chili, so it become easier for the farmers to control the chili. The automatic watering system use internet technology to control a device from distance. This chili’s automatic watering system based on bash shell with openWRT platform. This  system  was  made to help farmers watering the chili automatically. The methods that used in this system can be based on the soil’s moisture, time, or manual. Soil’s moisture based method used soil moisture, that tool can measure the ground’s  moisture and automatically send order to the device. This system can reduce delays of the chili’s daily treatment, so the  chili’s  production  will  be  increasing.  This  system development used SLDC (Systems Development Life Cycle) method. Automatic watering system with openWRT platform can help farmers in watering and controlling chili. The system can perform the function of automatic watering feature and functionality can run well.
Design of Decision Support System Selection of Beach Tourism Object in GunungKidul using Fuzzy AHP Method Yudi Istianto; Bambang Sugiantoro
IJID (International Journal on Informatics for Development) Vol. 6 No. 2 (2017): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (355.233 KB) | DOI: 10.14421/ijid.2017.06203

Abstract

The tourism industry is currently one of the important assessments for a certain region. Gunungkidul has a lot of of beach tourism potentials until visitors are confused to choose the right beach. The purpose of this research is to analyze and apply Fuzzy Analytical Hierarchy Process method in calculating the selection of beach tourism object in Gunungkidul with eight main criteria into a website.Multi Criteria Decision Making (MCDM) is a decision-making method to establish the best alternative of a number of alternatives based on several criteria that will be considered. One method of MCDM is the Fuzzy Analytical Hierarchy Process method. Fuzzy Analytical Hierarchy Process is a method of developing Analytical Hierarchy Process (AHP), which can describe unclear decisions and minimize uncertainty on AHP. Fuzzy approach, especially triangular fuzzy number to AHP scale, is expected to minimize uncertainty so that expected result was obtained more accurately.The decision support system for choosing a beach resort in Gunungkidul has been successfully built by applying the Fuzzy Analytical Hierarchy Process method. The calculation of Fuzzy Analytical Hierarchy Process method with the same computer result with manual calculation. The testing system was done using Black Box method by testing Alpha and Betha. From the results of system testing, it was known that the average result of the overall function score was 104 which was on rating scale 97.51 - 120 (Very Good).
Analysys and Implementation IEEE 802.1Q to Improve Network Security Muhammad Syaeful Bahry; Bambang Sugiantoro
IJID (International Journal on Informatics for Development) Vol. 6 No. 2 (2017): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (585.9 KB) | DOI: 10.14421/ijid.2017.06202

Abstract

The development of technology today is very fast one only with the existence of the use of the computer network. This can be seen in the increasing number of organizations or companies that use the computer network to facilitate the flow of information within the organization or the company. But with the abundance of the use of network technology is only advancing network progressed only, but not maximize resource so that sometimes allows for the problem or traffic network. For that can be needed by network development solution made VLAN topology using NDLC method (Network Development Life Cycle). Vlans are able to improve the capabilities of the network and can reduce the amount of data that is sent to a destination that does not need to be so that the traffic in the network will be reduced by itself. In addition there is another reason why requires a VLAN is to reduce the possibility of the misuse of access rights. It can use the Mode Access. With the Mode will divide each Host into the VLAN each. With the existence of a VLAN shows can increase network ability as much as 13.4 %. With the data shows that a VLAN successful and able to make the network more efficient. In the VLAN network security aspect is able to optimize network security with the existence of access mode, so that the new host are not capable of entering it into the existing network topology.
Wireless Access Points Placement Analysis on WI-FI Signal Coverage with BAYESIAN Probability Method Mahbub Puba Fawzan; Bambang Sugiantoro
IJID (International Journal on Informatics for Development) Vol. 6 No. 2 (2017): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (595.86 KB) | DOI: 10.14421/ijid.2017.06204

Abstract

Wireless networks in a room are strongly influenced by interference. To overcome the interference and so that the performance from the wireless network is getting better, then optimization is done. There are several types of propagation that can interfere with the performance of wireless networks, which include the number of transmitters (access points), free space loss, Received Signal Strength (RSSI), coverage that can be served, measuring attenuation on barriers (concrete walls, soft partitions, doors, and floors).This research is an analytical study where the purpose of this study is to determine the position of access point a good in the Shari'ah Faculty Building and the Law using the method of Bayesian probability. The first stage of this research is to determine the distance of the signal reception to find out the strength of the signal with manual random sampling so that the data obtained varies. The second stage is to determine the position of the access point with a choice of several points so that the best position can be compared based on the plan of the Syari'ah Faculty and Law Building. The last step is calculating probability by the method of Bayesian probability.The results of this study are the position of the access point best on the 3rd floor, namely at position B with a probability value of 13 while on the 4th floor the position of access the point best in position A with a value of 10, position D with a value of 13 and position E with a value of 13. The most influential propagation in the Syari'ah Faculty Building and the Law is a concrete wall with a size of 60% reducing the magnitude of the signal emitted.(Abstract)
PEMANFAATAN METODE DNA KRIPTOGRAFI DALAM MENINGKATKAN KEAMANAN CITRA DIGITAL Kharisma Mahesa; Bambang Sugiantoro; Yudi Prayudi
JURNAL ILMIAH INFORMATIKA Vol 7 No 02 (2019): Jurnal Ilmiah Informatika (JIF)
Publisher : Teknik Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (632.523 KB) | DOI: 10.33884/jif.v7i02.1356

Abstract

There are many data transmitted on internet and certainly has positive and negative side. Negative side that perceived is the increase in cybercrime activities which is a threat to everyone. Securing confidential data is very necessary so that the data is not misused by others for individual or groups benefit. This research is developing an application that is able to secure data like digital images by applying cryptography. Cryptography is the most appropriate way to secure data like digital images. DNA cryptography is one of cryptography method. Beside to application of computing is very easy, this method has excess speed in processing, use minimal storage and power usage. The result from this research are application that are built can encrypt dan decrypt digital images which has a lot color distribution well. Application and method used will work well on image that have a lot or even distribution colors. But not in digital images that have 1 dominant or transparent color in that.