This Author published in this journals
All Journal Jurnal Infra
Agustinus Noertjahyana
Program Studi Informatika

Published : 29 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 29 Documents
Search

Aplikasi Pengelola Tamu Wedding berbasis Mobile Android Winata Sukiman; Agustinus Noertjahyana; Anita Nathania Purbowo
Jurnal Infra Vol 7, No 2 (2019)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (753.781 KB)

Abstract

In a wedding there must be guests who have been invited by the person who has the wedding event. It is clear that the presence of the guest is very important because it supports in enlivening the wedding. Of course, guests who have been invited by the bride and groom are guests who are highly expected to attend the wedding. When we invite guests to attend a wedding, it is necessary to share the invitation to let them know that they will be invited to attend the wedding.In this thesis, a guest management application based on mobile android will be created. The guest manager in question is managing guests in terms of sending invitations and reception. Delivery of invitations through the application is done by sending an invitation via e-mail. The wedding invitation also contains applications that must be downloaded guests because in the application there is a qr code as a marker of guest identity. In addition, if there is a door prize, then drawing or taking door prize winners is done in the application. In the application there is also a wedding schedule and there is a google maps direction if there are troubled guests looking for the location of the wedding. While in terms of reception is done by doing a scan there is a qr code that is in the application. So that when the guest comes, only with the qr code, the guest identity can be known. If the guest forgets to download the application then guest searches can be based on names.The final result of this thesis is the guest management application can help in sending wedding invitations and help reduce the queue that is available at reception.
Pengembangan Aplikasi DVR Driving dengan Fitur Remote Live Streaming dan Speedometer Berbasis Android Nico Gufron; Justinus Andjarwirawan; Agustinus Noertjahyana
Jurnal Infra Vol 9, No 1 (2021)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

On this era, motor vehicles already help people on daily basis, helping people to deliver goods, or transporting people. But on the way, there is a disaster waiting, either accidents on other vehicles or other accidents. Therefore, in this thesis will develop an application for DVR based on Android, equipped with additional features, such as GPS, Speedometer, and Live Streaming. In this application, users are able to record and take pictures with location and description about the videos and photos they take. Furthermore, live streaming feature added to help other users to join live streaming just entering channel name. Live streaming library helped by Agora Video Broadcasting library. The tests were carried out by adding applications to different smartphone devices 
Analisis Perbandingan Kinerja Algoritma Load Balancer NGINX pada Studi Kasus PRS William Chen; Agustinus Noertjahyana; Justinus Andjarwirawan
Jurnal Infra Vol 7, No 2 (2019)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (405.831 KB)

Abstract

The development of technology will certainly create new problems, where more client activity will be available to access existing servers. One example is the activity of registering an online study plan at Petra Christian University. Where most students log in simultaneously into the PRS system which results in full access to the server.This study will conduct a trial with the implementation of a container using a docker. Containerization technology is a very effective way to run an application. Where with containerization, it will set the entrance from the client to the server via the docker assistance and with some of the algorithms it has, namely Round Robin, hashes and Least Connection.With the tests carried out it can find the algorithm of the NGINX load balancer which is the most effective and efficient when distributing workload to the web service available in the online PRS case study. So that the PRS process going forward using existing algorithms becomes more effective and efficient.
Aplikasi untuk Monitoring Jaringan IoT Menggunakan Algoritma Address Shuffling dengan HMAC Elvan Alandi; Agustinus Noertjahyana; Justinus Andjarwirawan
Jurnal Infra Vol 8, No 2 (2020)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the increasing market of the Internet of Things and Wireless Sensor Network (WSN). Increasing network security on the Internet of Things is important. Internet of Things is used starting from smart homes, smart campuses, smart cities, etc. so securing the Internet of Things network is more important than securing ordinary local networks. In addition, IoT devices have weaknesses in computing capabilities and storing sensitive data. There are four main types of weaknesses in the network, namely address spoofing attacks, false address conflicts, address exhaustion attacks and negative reply attacks.The method used is Address shuffling with HMAC. This method is run by the DHCPv6 server (Dynamic Host Configuration Protocol) as a network coordinator and is monitored by the Android application to secure the Internet of Things network. DHCPv6 server is used on the Internet of Things network because it is faster and easier to control through the server, can be used on large networks and stop and restart commands can be done on the server. Additionally, when a DHCPv6 server has a problem, this will not interrupt other devices on one network.The result of this program is a monitoring application that is able to notify users of attacks and the network is able to minimize four weaknesses in the network. So that later this application can help users to take preventive actions against attacks on the network.
Pembuatan Program Absensi Sidik Jari untuk Bagian Pergudangan PT. Puji Surya Indah Hans Sebastian Thenady; Alexander Setiawan; Agustinus Noertjahyana
Jurnal Infra Vol 7, No 2 (2019)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (990.074 KB)

Abstract

Employee’s productivity could affect the performance of a company, so it must be considered & maintained. One way to maintain the employee’s productivity is by monitoring the employee’s performance through their attendance. But, it also requires the right tool to prevent the forgery of attendance data input by employees. For example, if you use a timestamp machine, the company’s employees can fake data on their absences by entrusting the attendance card (to be stamped) to their colleagues. Therefore, an attendance program that is assisted by using a fingerprint machine, will be designed to help the company maintain the productivity of the employees of the Puji Surya Indah company. This attendance program consists of a user interface, which will be created using Visual Studio 2017, with the Visual Basic programming language. In addition, a database was also established to store employee, user, and attendance and payroll data, using MySQL. The final result of making this program is an attendance program, which can store personal data of employees, user data, along with attendance reports and employee’s salaries. The conclusion obtained from the making of this program is that this program is feasible to use, but still needs to be added features and justify the way the data is displayed; overall, this program gets scores of 66.6% good and 3.33% adequate from respondents.
Sistem Pakar Rekomendasi Produk Makeup Berbasis Web dengan Metode Forward Chaining Nikita Christy; Lily Puspa Dewi; Agustinus Noertjahyana
Jurnal Infra Vol 7, No 2 (2019)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (404.061 KB)

Abstract

As time goes by, more brands of makeup are popping up. From these brands, there are lots of different types of makeup products which are mostly the same. Because of the many new makeup products, buyers often find it difficult to determine which products are suitable for their skin condition. In assisting in the selection of suitable makeup products, a makeup product recommendation expert system is needed by giving questions that are easily understood by the buyer and the buyer will get recommendations for the appropriate products.Makeup product recommendation expert system uses knowledge rule based that uses an expert as a knowledge base to determine the rule. In processing the information that has been given by the user, the forward chaining method is used by checking the facts that lead to conclusions generated from these facts to test the truth of the hypothesis.The results of the application testing for makeup products show that the application can produce recommended makeup products that are in accordance with the wishes of the user. This decision making process also makes it easy for users because it can be accessed from anywhere and at any time.
Kombinasi Metode Partial Rank Correlation dan Flow Correlation Coefficient untuk Membedakan DDoS dengan Flash Crowds Calvin Kamtoso; Agustinus Noertjahyana; Rolly Intan
Jurnal Infra Vol 9, No 1 (2021)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the growing of internet user, causing DDoS attacks to also become more sophisticated. This of course causing DDoS detection became a challenge itself. On the other hand, there is flash crowds which is a traffic generated from a huge amount of valid user. While DDoS attack is becoming more sophisticated, it causes discrimination a DDoS attacks from flash crowds become more challenging.This research will be conducted by combining two methods of partial rank correlation and flow correlation. Partial rank correlation itself can be used to detect low-rate and high-rate DDoS attacks. Meanwhile flow correlation coefficient can be used to discriminate DDoS from flash crowds, albeit it is lacking the capability to detect low-rate DDoS attacks.With the test carried, it can be acknowledged whether combining two methods could produce a program that could detect DDoS, flash crowds, or not. Then whether by combining the two methods could increase the accuracy of detection rate and false positive alarm rate of said program than when each method is run independently.
Penerapan Fuzzy pada Indikator Teknikal untuk Memprediksi Trend dan Manajemen Resiko pada Pasar Forex Sutikno Goutama; Agustinus Noertjahyana; Rolly Intan
Jurnal Infra Vol 8, No 2 (2020)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Trading on the forex market (foreign exchange) is an activity that can provide large profits and convenience for traders because it does not require a physical office space and the trading process can be done anywhere. However, trading activity cannot be separated from the risk of large losses, because trader sometimes do not understand the movement of trends or having difficulties in determining the risk that must be taken. These problems make traders likely to get losses compared to gain profits. Therefore, traders need a program or expert advisor (EA) that can help to predict trends and manage market risk.Dynamic forex market movements and diversity on pair currency, often make traders confuse to read the right circumstances and determine when the right time to trade. As a solution to overcome the uncertainty in analyzing the market, one of the concepts that can be applied is fuzzy logic. This concept can help to change something which has uncertainty into a value that can be used as a reference.Results conducted on 3 technical indicators (Relative Strength Index, Stochastic Oscillator, and Moving Average Convergence/Divergence) in forex market using fuzzy logic in the form of expert advisor (EA) program shows that several expert advisor (EA) with predetermined parameters will produce appropriate stop loss output limits, which provide the largest profit of 128.04 in AUD/USD pair, 175.42 in GBP/USD pair and 250.26 in USD/JPY pair in the last 3 years.
Pengembangan Chrome Extension untuk Mengidentifikasi Phishing Website berdasarkan URL dengan Algoritma Random Forest Kevin Benedict; Agustinus Noertjahyana; Endang Setyati
Jurnal Infra Vol 9, No 1 (2021)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The ever developing technology makes internet one of the most important part in human’s daily activity. This development is also followed by the increase of phishing activity which is not only in quantity, but also in the variety of techniques. The loss caused by phishing attacks is quite big. There are a lot of applications for preventing phishing attacks, but most of them are still not accurate enough. Several studies show that ensemble learning algorithm has a good capability in detecting phishing website.In this research a chrome extension which uses a Random Forest model to detect phishing websites has been developed. Random Forest is one of the most well-known ensemble learning algorithm. The most important hyperparameters which would be experimented with are n_estimators, min_samples_leaf, min_samples_split, max_features, and max_depth. Features used are Lexical features which are based on references from other researches, and Domain-based features which are the newly proposed ones, comprised of Global Page Rank, Average Daily Time, Sites Linking In, Domain Age, and Registration Period. All features are obtained only from the URL.This research shows that dataset quality is the most impacting factor in making a good model. Hyperparameter tuning is also an important part but is only limited to certain scenario. The newly proposed features could make an improvement to the model’s performance. From several experiments, the usage of Lexical and Domain-based features has successfully achieved the best accuracy of 98.28%.
Pembuatan Aplikasi Pengiriman Berkas Reyner Wijoyo; Alexander Setiawan; Agustinus Noertjahyana
Jurnal Infra Vol 8, No 1 (2020)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The file sending process still done manually so the sender and recipient don’t know the location of the file and can’t track the file. furthermore, the total cost of sending file outside is still recorded manually so BAUK does not know the costs each unit spent.Because of that problem, file sending application based on website and android was created using PHP, MySql, and Java. Starts by creating a database to save all data and then create a website so that users can view and input data, then proceed with creating an android application using SOA and Rest so website database can be used on android and have the same data.This application can help the process of sending files by recording them automatically, tracking the files location, and see the total cost each unit.