Claim Missing Document
Check
Articles

Pembangunan Sistem Operasi Berbasis Linux Menggunakan Metode Linux From Scratch Wamiliana Wamiliana; Fahmi Kharismaldie; Wisnu Wardhana
Jurnal Komputasi Vol 1, No 2 (2013)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v1i2.553

Abstract

GNU/Linux is an operating system that allows the users to build or develop their own operating system. There are two methods that can be used, Remaster and Linux From Scratch. The difference is the LFS method builds a system from zero while Remaster using existing Linux distributions [4]. The goal of this research is to investigate the steps of building Linux base operating system using LFS method. The operating system has been built successfully and can be used to fulfill the daily needs such as playing music or video, browsing, programming, and other tasks.Keywords: GNU/Linux, Linux From Scratch, open source, operating system
IMPLEMENTASI METODE DYNAMIC PROGRAMMING PADA APLIKASI PENENTUAN JARAK MINIMUM Wamiliana Wamiliana; Dian Kurniasari; Fatkur Rokhman
Jurnal Komputasi Vol 1, No 1 (2013)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v1i1.393

Abstract

Mathematics and Computer Science are closely related. Many problems that appear in Computer Science’s problems can be solved by using mathematical techniques or concepts; for example, finding the nearest distance, minimum fares, or minimum time. The determination of the minimum value can be found by using of mathematical programming, namely dynamic programming. Nevertheless, there are several another consideration factors such as security roads impassable, the vehicle used, comfortability road infrastructure, and others. Dynamic programming is one of the methods in mathematics which is useful to create a sequence of interrelated decisions, and provides a systematic procedure to determine the optimal combination of a decision. This paper will discuss about dynamic programming that applied in the determination of the minimum distance. Determination of the minimum distance will use an application to make it easier for calculation.Keywords: mathematics, dynamic programming, minimum distance, application
Implementasi Pengamanan Text File Pada Hybrid Sistem Menggunakan Algoritma Vigenere dan Algoritma Adaptive Minimum Error Least Significant Bit Replacement (AMELSBR) Wamiliana Wamiliana; Tryo Romadhoni Pujakusuma; Febi Eka Febriansyah; Dwi Sakethi
Jurnal Komputasi Vol 6, No 2 (2018)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v6i2.1663

Abstract

The development of technology and the internet allows everyone to exchange data andinformation. Problems arise when the information is confidential, especially for a company,institution and also individuals who have important documents and data. Therefore, the securityof the data is a must. In this case cryptography plays a role of encrypting secret messages intothe form of unreadable messages and steganography that hides the irregular messages into theimage media, resulting in double security in the delivery of secret messages. In this research wedevelop a hybrid system using Vigenere and AMELSBR with cover media in the form of (.jpg)format as input (cover), file type (.png) as output (stegoimage) and data be inserted as a file withtext format. The conclusion of this research is that the hybrid system can be used to encrypt thesecret message and hide it into the cover media to make it more secure in data transmission.Therefore, the use of AMELSBR method is good used in steganography. Stegoimage canwithstand the process of manipulating the brightness and contrast with the image record musthave the dominant black color value (rgb (0,0,0)) or white (rgb (255,255,255)) and not manycolor variants, in other words the image can restore the file without experiencing excessivereduction of meaning after the manipulation of brightness and contrast is an image with binaryimage quality and grayscale image.
Bandwidth Shaping Menggunakan Proxy Squid Dwi Yatmoko Siambudi; wamiliana .; wisnu wardhana
Jurnal Komputasi Vol 6, No 1 (2018)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v6i1.1644

Abstract

The development of technology is very fast. Nowadays, technology has influenced human life. For most people, handphone and computer now become a necessity. Computer can give  information as we need with internet, but internet can cause a negative influence as well. In this research, we build an web base application which can block a negative-influence sites using Squid Proxy. Squid is a daemon that used as a proxy server and web cache. It can work as a connection sharing, filtering and caching. The web which domain block is successfully built which can create a bandwidth share and domain block web base application.
IMPLEMENTASI SEQUENTIAL ALGORITHM UNTUK PENCARIAN KATA DALAM APLIKASI PEMBELAJARAN JAPANESE GRAMMAR Wamiliana Wamiliana; Bainah Sari Dewi; Dyan Shandy Utama
Jurnal Komputasi Vol 3, No 1 (2015)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v3i1.973

Abstract

MENGIMPLEMENTASIKAN ALGORITMA PENCARIAN, SEQUENTIAL ALGORITHM, UNTUK MEMBANTU PENGGUNA APLIKASI PEMBELAJARAN JAPANESE GRAMMAR MENEMUKAN MATERI YANG DIINGINKAN DENGAN MELAKUKAN PENCARIAN KATA PADA SEARCH BOX.PENGGUNA AKAN LANGSUNG DIARAHKAN MENUJU KATA YANG DICARI.
Penyederhanaan Tata Bahasa Bebas Konteks Dalam Bentuk Normal Chomsky Menggunakan PHP Rico Andrian; Wamiliana Wamiliana; Ismail Indra Pratama
Jurnal Komputasi Vol 3, No 2 (2015)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v3i2.1129

Abstract

In this research we develop an application to simplify context-free grammar into a Chomsky normal form. This software was made to complete the process of simplification of the context-free grammar (CFG) so that user can identify the stages of a process of simplification, easy to understand the simplification at any stages as well as speed up the process. This software is created using the PHP programming language and use context-free grammar (CFG) as the input. The process order is carried out starting from removing epsilon, unit, and useless production so that the result is in Chomsky Normal Form. Black Box testing results with the method of partitioning software equivalen suggests that simplification of software context-free grammar into a Chomsky normal form using PHP was successful and suitable with the user needs.
PENERAPAN KONSEP FINITE STATE AUTOMATA (FSA) PADA MESIN PEMBUAT MINUMAN KOPI OTOMATIS Wamiliana Wamiliana; Didik Kurniawan; Rizky Indah Melly
Jurnal Komputasi Vol 1, No 1 (2013)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v1i1.415

Abstract

This research discusses about a simulating application for automatic coffee machine which can do processes of making 7 types of choices of drinks; coffee, milk, chocolate, coffee milk, coffee brown, mocha, and chocolate milk automatically. In this application, the concept of Finite State Automata (FSA) was applied to recognize and to capture the pattern on the process for making coffee drinks. In this application, Finite State Automata (FSA) was applied to read input symbols given from the starting state to the final state in order to get the language recognized by the machine. Further, the process will be done accordance with the read language.Keywords: Coffee Machine, Finite State Automata (FSA), Language and Automata Theory.
SIMULASI SISTEM PENGATURAN LALU LINTAS OTOMATIS DENGAN KARAKTERISTIK KERAPATAN PADA SIMPANG TIGA DAN SIMPANG EMPAT MENGGUNAKAN ALGORITMA MILOZA Wamiliana Wamiliana; Izzatuz Zakiyah Mukhtarisa; Ossy Dwi Endah Wulandari
Jurnal Komputasi Vol 1, No 2 (2013)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v1i2.546

Abstract

Nowadays, the traffic control system already done computerized. However, usually the system is set without considering density of the changing vehicles. In this research, an algorithm developed to solve the problem of traffic control is still constant and manual (fixed time traffic). The algorithm is called Miloza algorithm. Miloza algorithm is an algorithm used to find the optimum solution of traffic control based on density characteristics of the vehicle. The purpose of this research is to make a simulation of automatic control system for traffic light with density characteristics at the three and four junctions using MilozaAlgorithm as an alternative solution. The simulation application is made using visual basic programming language and the method of application development used is prototype method.Keywords: traffic control, algorithm, simulation
PERBANDINGAN METODE DYNAMIC CELL SPREADING (DCS) DAN SPREAD SPECTRUM PADA STEGANOGRAFI BERBASIS APLIKASI WEB Wamiliana Wamiliana; Astria Hijriani; pita utari ningtyas
Jurnal Komputasi Vol 5, No 1 (2017)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v5i1.1522

Abstract

The security is the most important thing in sending a secret message and there are many ways to send a message safely, one of those is steganography. In this research we will compare Dynamic Cell  Spreading (DCS) and Spread Spectrum method based on web application using image as the media and hide the secret message. The file format used are (.jpg) as input cover,(.png) as output stegoimage, and  (.txt) as data that can be inserted. Doing some test to manipulate brightness, contrast, and cropping the results show that Spread Spectrum method better than Dynamic Cell Spreading method. The Spread Spectrum method mostly returns the message in the brightness and contrast manipulation. Cropping stegoimage on the right area or bottom image has less risk of losing data depend on the cropping scale and image resolution.
Implementasi Kriptografi Dan Steganografi Pada Media Gambar Menggunakan Hill Cipher Dan Least Significant Bit (LSB) Eka Fitri Jayanti; Wamiliana Wamiliana; Rico Andrian
Jurnal Komputasi Vol 5, No 1 (2017)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/komputasi.v5i1.1411

Abstract

Cryptography can be used to process message using a specific algorithm that make the message difficult to be understood. After that, steganography is used to hide the message in other forms. This research used modified Hill Cipher and Least Significant Bit (LSB) to build a web based application for sending message and get the original message using an android application. The title and cipher key will be sent automatically by the application to the recipient's email. This application can be used by organizations or companies and use stego cover with file type .jpg and message with file type .txt. The modified Hill Cipher and LSB method can be used to encrypt message, embed it to a image and reveal it to the original message. Our research show that the LSB method has the best possibility to reveal message on image manipulated by changing brightness and contrast if the cover in grayscale, and dominant red and white colours image quality.