Henning Titi Ciptaningtyas
Departemen Informatika Institut Teknologi Sepuluh Nopember

Published : 15 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 15 Documents
Search

Steganografi Teks pada Aksara Sunda dengan Pendekatan Feature Coding Mohammad Rijal; Henning Titi Ciptaningtyas; Tohari Ahmad
Jurnal Teknik ITS Vol 7, No 1 (2018)
Publisher : Direktorat Riset dan Pengabdian Masyarakat (DRPM), ITS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j23373539.v7i1.28975

Abstract

Kemajuan teknologi membuat arus informasi semakin meningkat. Kebutuhan akan transmisi data yang aman menjadi sangat penting. Dalam dunia sekuritas, dikenal istilah steganografi. Steganografi merupakan teknik untuk menyembunyikan informasi tanpa diketahui keberadaan informasi rahasia tersebut. Salah satu jenis steganografi adalah steganografi teks yang menggunakan teks sebagai media penyampaian. Aksara Sunda yang memiliki 13 rarangkén atau vokalisasi dapat digunakan sebagai media dalam steganografi teks. Metode yang ditawarkan pada penelitian ini menggunakan pendekatan Feature Coding pada aksara Sunda. Feature Coding mengubah bagian dari teks yang menjadi media untuk menyimpan bit informasi. Pada aksara Sunda, rarangkén digeser untuk menyimpan bit secret message yang menjadi masukan. Pilihan pergeseran pada penelitian ini terbagi menjadi shift all yang menggeser semua rarangkén dan shift group yang menggeser kelompok posisi rarangkén dalam satu huruf. Hasil uji coba metode menunjukkan bahwa steganografi teks pada aksara Sunda berhasil dilakukan dengan menggeser rarangkén melalui penggantian blok Unicode. Capacity ratio yang dihasilkan dipengaruhi oleh jumlah rarangkén yang ada. Pilihan shift all menghasilkan rata-rata capacity ratio 57,01 bit/kiloByte. Pilihan shift group menghasilkan rata-rata capacity ratio yang lebih besar yaitu 60,74 bit/kiloByte. Kenaikan sebesar 6,54% disebabkan oleh jumlah rarangkén pada pilihan shift group yang lebih besar dari pilihan shift all.
Rancang Bangun Sistem Jemuran Pakaian Otomatis Menggunakan Metode Fuzzy Logic Muchammad Husni; Henning Titi Ciptaningtyas; Adetiya Bagus Nusantara
Operations Excellence: Journal of Applied Industrial Engineering Vol 11, No 1, (2019): OE Maret 2019
Publisher : Universitas Mercu Buana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22441/oe.v11.1.2019.019

Abstract

Clothesline clothing is a necessity that must be owned by almost every one. Rain or inclement weather up to now become a key issue for the people that have a clothesline. At the time of the rainy season, the majority of people feel anxious when they're drying the clothes. The anxiety will increase while at the time of drying clothes but concerned are located outside the House and in the House was no person. The genesis of the people so reluctant to open places pakain drying, fearing jemurannya wet exposed to rain water. This research has been made on a prototype automatic clothes clothesline system using microcontroller, Arduino wifi module, a motor with sensors-sensors installed in it. In the logic of determining the weather conditions used fuzzy logic to produce output that is accurate. The prototype architecture is intended to make it easier for people when drying their clothes, so when the rain struck, clothesline clothing can move automatically toward the shade so that her clothes were not wet exposed to rain water. Of all the testing and evaluation that have been carried out, i.e. testing the response of the sensor against rain, tools testing response tool against the light sensor, testing mobile applications in data reading on the sensor and testing system in controlling Clothesline the clothes manually using mobile applications, obtained that the system created has been functioning properly and produce output as expected.
Real Time Train Monitoring using Google Maps Supeno Djanali; Ary M. Shiddiqi; Hudan Studiawan; Henning T. Ciptaningtyas
IPTEK Journal of Proceedings Series Vol 1, No 1 (2014): International Seminar on Applied Technology, Science, and Arts (APTECS) 2013
Publisher : Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j23546026.y2014i1.366

Abstract

Recently, there are many train accidents occurred in Indonesia where train collision contributes most of the causes. PT Kereta Api Indonesia (KAI) as state-owned enterprise that is responsible in monitoring train movement has not implemented a real time monitoring system. Thus, the current monitoring system relies on radio communication between train stations and train driver. In this paper, we propose a system to assist PT KAI to monitor train activities in a real time fashion. The system is implemented on a web based application. This web-based monitoring application equipped with complete station and train data in Java and Sumatra Islands. All trains latitude and longitude positions are retrieved through an embedded GPS device on train and the longitude and latitude data are then submitted to database server. At the server, the data is displayed in Google Maps accessible to authorized users. With this real time train monitoring system, PT KAI can track all train positions simultaneously. Therefore, the operating trains can be notified should a train collision potential is detected. Thus, the safety of rail passengers will be more assured.
MAPPING POTENTIAL ATTACKERS AGAINST NETWORK SECURITY USING LOCATION AWARE REACHABILITY QUERIES ON GEO SOCIAL DATA Firdausi, Hafara; Santoso, Bagus Jati; Qudus, Rohana; Ciptaningtyas, Henning Titi
JUTI: Jurnal Ilmiah Teknologi Informasi Vol. 19, No. 2, Juli 2021
Publisher : Department of Informatics, Institut Teknologi Sepuluh Nopember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12962/j24068535.v19i2.a1071

Abstract

Attacks on network security can happen anywhere. Using Geo-Social Networks (GSN), i.e., a graph that combines social network data and spatial information, we can find the potential attackers based on the given location. In answering the graph-based problems, Reachability Queries are utilized. It verifies the reachability between two nodes in the graph. This paper addresses a problem defined as follows: Given a geo-social graph and a location area as a query point, we map potential attackers against network security using location-aware reachability queries. We employ the concepts of Reachability Minimum Bounding Rectangle (RMBR) and graph traversal algorithm, i.e., Depth-First Search (DFS), to answer the location-aware reachability queries. There are two kinds of the proposed solution, i.e., (1) RMBR-based solution map potential attackers by looking for intersecting RMBR values, and (2) Graph traversal-based solution map potential attackers by traversing the graph. We evaluate the performance of both proposed solutions using synthetic datasets. Based on the experimental result, the RMBR-based solution has much lower execution time and memory usage than the graph traversal-based solution.
Analisa Pengaruh Mobilitas Node Terhadap Kualitas Layanan Voice Call Pada Jaringan UMTS Alkaff, Muhammad; Djanali, Supeno; Ciptaningtyas, Henning Titi
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 1 No 1: April 2014
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (552.898 KB) | DOI: 10.25126/jtiik.201411103

Abstract

Abstrak IMS (IP Multimedia Subsystem) adalah bagian dari spesifikasi UMTS (Universal Mobile Telecomunication System) sesuai dengan release 5 dan 6. Telah banyak dilakukan penelitian tentang kinerja IMS namun umumnya dilakukan pada node UE (User Equipment) yang stationary. Penelitian ini bertujuan untuk meneliti pengaruh mobilitas UE terhadap kualitas layanan pada jaringan UMTS Release 5/6. Selain itu, juga akan dilakukan perbandingan pada kecepatan yang berbeda-beda untuk meneliti pengaruh perbedaan kecepatan tersebut terhadap kualitas layanan pada jaringan UMTS. Hasil uji coba menunjukkan, seiring dengan meningkatnya kondisi traffic, UE dengan kecepatan yang rendah mendapatkan hasil yang lebih baik jika dibandingkan dengan UE dengan kecepatan yang tinggi. Selain itu, pengaruh mobilitas UE menjadi semakin besar dengan bertambahnya kecepatan yang digunakan oleh UE. Secara umum, skenario dengan callee mobile mendapatkan hasil yang lebih baik seiring dengan bertambahnya kecepatan dan meningkatnya kondisi trafik. Kata kunci: IMS, Kecepatan, Mobilitas, UMTS Abstract IMS (IP Multimedia Subsystem) is a part of the specification of UMTS (Universal Mobile Telecommunications System) according to the release 5 and 6. Has done a lot of research on the performance of IMS but is generally performed on the UE node (User Equipment) that stationary. This study aimed to investigate the effect of mobility on the quality of service in the EU UMTS Release 5/6. In addition, comparisons will also be performed at different speeds to examine the effect of the speed difference to the quality of service in UMTS networks. Experimental results show, along with the increasing traffic conditions, the EU with a low speed get better results when compared to the EU with a high speed . In addition, the influence of EU mobility becomes larger with increasing speed used by the EU. In general, the scenario with mobile callee get better results with increasing speed and increasing traffic conditions. Keywords: IMS, Speed​​, Mobility, UMTS