Claim Missing Document
Check
Articles

MEMBANGUN CUSTOMER CARE SYSTEM BAGI PENGGUNA PRODUK HEWLETT-PACKARD BERBASIS WEB Harsono, Andri; Lestari, Uning; Iswahyudi, Catur
Jurnal Script Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Script

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT            Notebook is no longer a luxury item anymore but it’s become being demands in the work place and even at school. So many vendors offers their notebook series that fit to their customer needs, and one of them is Hewlett-Packard. With so many customers it should be handled seriously to full fill their needs about their product. As an electronic with thousands or even millions of electrical component inside, the possibility of damage cannot be avoided. Therefore an expert system is need to be made for customer to help them handle some faulty components. This expert system that build based on forward chaining as inference machine and Depth-First Search as searching method is designed as part of vendor concern about their customer and it’s covered from purchasing where customer registered their product until their product become out of warranty. This web based system offers their customer so they can do error troubleshooting and download driver need for their product in this case is notebook. The damage that customer experienced is not always detected properly in this system because some faulty conditions needs an expert technician to handle it. For customer, expert system using is very helpful as damage possibility reference that may happened based on existing symptom. Keyword: customer, expert system, web
SISTEM PAKAR UNTUK MENENTUKAN KEPRIBADIAN SESEORANG BERDASARKAN TES PERSONALITAS FLORENCE LITTAUER BERBASIS WEB Iskandar, Sigit; Sholeh, Mohammad; Iswahyudi, Catur
Jurnal Script Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Script

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACTPersonality is very important to be known by everyone so that every individual is able to develop its advantages. Someone who had difficulty in developing itself the possibility of not knowing at all its weaknesses and shortcomings. Expert System is a system that is built to remove the ability of one or several experts in the computer that is used to solve the problems faced by users in a specific field. To help everyone who wants to know his personality, the authors build A web based expert system for determining human personality based on Florence Littauer personality test that is able to assist the introduction of ones personality. The process of making these applications using object-oriented methodologies with modeling Unified Modeling Language (UML). In the implementation phase the authors use a web-based programming using Ruby on Rails. This application can help the user to know his personality, so it can help to develop themselves. Keywords : Expert System, Personality, Ruby, Rails.
IMPLEMENTASI METODE INTERNET SEHAT PADA JARINGAN KOMPUTER WIRELESS DI MASJID AL AMIN BERBAH Hariman, Isa; Sholeh, Mohammad; Iswahyudi, Catur
Jurnal Jarkom Vol 1, No 1 (2013): Edisi Desember 2013
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT The development of computer network technology growing rapidly in line with the needs of the community information service that uses computer networks. The need for the use of the Internet in society based so that all parts of society in Indonesia has knowledge of information technology. The mosque is used as a medium for the spread of the Internet due to the expected future output of the deployment of information technology knowledge will be of good content and useful to society. By using this method as a way to surf the internet sound is good and right that will be implemented into the wireless computer networks in the mosque. Healthy internet methods are implemented on the wireless computer networks using a proxy server that will be implemented some security configuration that is OpenDNS, Squid, IPTables and Dansguardian. From the security configuration is tested one at a time by accessing the content of some categories of negative examples to test the efficacy in blocking sites or negative content from the proxy server before. From the research, the combination of multiple security configurations will be selected based on the advantages and disadvantages that will be used so the proxy server. From the entire configuration will be secure wireless computer networks in the mosque Al Amin Berbah. The implementation of the method on a healthy internet wireless computer network at the mosque will produce a safe way to surf from all negative content. Users can surf the internet without being distracted by negative content. Keywords: Healthy Internet, Proxy Server, Mosque. 
MEMBANGUN SISTEM MANAJEMEN PERGUDANGAN MENGGUNAKAN ARSITEKTUR THREE-TIER ., Anggreawan; Hamzah, Amir; Iswahyudi, Catur
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT               Three-tier architecture is an innovation of client server architecture. In the three-tier architecture, there are services presentation or user interface logic is placed on the client machine. Issued on the business logic and the client code is placed in the middle level. Data services layer contains the database server. Each level in the three-tier models are on a separate computer. Three-tier model concept is a concept that divides functionality into layers, applications gain scalability, and security. Currently the system at PT. Ungaran Sari Garment has been computerized in handling the transaction flow of goods in and out. However, the application still has the disadvantage that the application can only be used by a single computer (stand alone) and standard office without any database and system well. With the advantages of three-tier architecture, then build warehouse management system using three-tier architecture to assist in arranging entry and exit of goods to the warehouse, making the system more efficient in terms of use. Results from this study is the implementation of the warehousing system with three-tier architecture using SQLyog as its database can be used to input data entry and exit of goods to the warehouse, checking periodically warehousing reports in accordance with the functionality of each admin. By using a three-tier architecture as not to burden-sharing functionality on the server side and the client, because can use any computer that has been given permission by the server and are interconnected by a network. On the client side is only installation any web browser Keywords : Warehouse management system, Website, Client server, Three-tier.
TEKNOLOGI 4G PADA JARINGAN GSM UNTUK KEBUTUHAN MOBILE INTERNET DI KOTA YOGYAKARTA Santoso, Bambang Wahyu; Iswahyudi, Catur; Triyono, Joko
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

AbstractThe rise of 4G LTE networks with all the benefits can promise super-fast mobile data communications. Currently  in Yogyakarta has been present 4G LTE technology that can be enjoyed by a few people, it is certainly affected by 4G device such a sim card 4G different sim cards 3G, data packets are used, a mobile device that supports 4G technology, as well as the area of coverage signal 4G uneven, to the area of signal coverage 4G in Yogyakarta city can be seen on the website of the network operator Indosat, and XL with coverage in the form of network points, but what about the location of base stations 4G on each network operator gsm, as well as the results of field testing on 4G signal quality in Yogyakarta.  Surely this is a question of its own for some parties, who want speed internet at a faster devices using 4G signal.To answer these questions do research on signal quality 4G in Yogyakarta. With this research is expected that people who want to enjoy the services of 4G technology can determine the location of the nearest 4G base stations, the maximum distance 4G signal, optimal distance to be able to enjoy 4G services. and people can also knew the distribution pattern 4G signal in Yogyakarta city. Keywords: 4G, GSM, 4G base stations, Mobile Internet, Yogyakarta.
ANALISIS DAN PERANCANGAN VLAN PADA DISHUBKOMINFO KABUPATEN MANGGARAI MENGGUNAKAN CISCO PACKET TRACER Pantu, Yosefina; Iswahyudi, Catur; Rachmawati, Rr. Yuliana
Jurnal Jarkom Vol 3, No 1 (2015): Desember 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT       Department of Transportation, Communication and Information of Manggarai Regency, is one of the instance of Regional Government of Manggarai, NTT, which is responsible to help the Head of Region concerning transportation, communication and information affairs. The lackness of human resources which was competent in computer networking, the high cost of VSAT IP Broadband internet service and maintenance cost of network’s backbone which is wireless based, have been becoming a problem to the Department concerning their main duties. As an impact, it is necessary to the Department to change their network’s backbone to wired network based, using VLAN. VLAN can divide network into several segments with low cost implementation. The using of VLAN Trunking Protocol (VTP) will ease the network administrator in managing VLAN.            The VLAN design in this study used hierarchical model. The logical layer for data distributing was divided into two layers, core/distribution and access layer. Routing between VLANs used “router-on-a-stick using trunk” model, so that the workstations which were owned by different VLAN can communicate each other by using one router only. By using simulation method for testing the design, it was discovered that all workstations between different VLAN have been successfully connected each other and all servers were well-functioned.   Key words : VLAN, VTP,  hierarchical, router-on-a-stick using trunk
SISTEM TELEMETRI TINGKAT KONSENTRASI GAS CO2 SEBAGAI PENANGANAN DAMPAK GLOBAL WARMING BERBASIS MIKROKONROLER DENGAN INFORMASI SMS GATEWAY Suseno, Hadi Prasetyo; Novianta, Muhammad Andang; Iswahyudi, Catur
Jurnal Teknologi Technoscientia Vol 10, No 1 (2017): Vol 10 No 1 Agustus 017
Publisher : IST AKPRIND YOGYAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The average temperature of global warming on the earths surface today has increased by 0.74 ± 0:18°C, the increase was due to the increase in the average temperature of the atmosphere, ocean and land earth. Emissions of the most influential on the quality of the air is carbon emissions, especially carbon dioxide (CO2). The CO2 contributes to global warming is 50%. The CO2 gases absorb and reflect radiation emitted waves of the earth, so that the heat will be stored on the surface of the earth. This study aimed to design a data logger system monitoring the level of concentration of CO2 using the oxygen sensor (OOM202), carbon dioxide sensor (MG81), as well as temperature and humidity sensors (DHT22) with microcontroller-based SMS gateway information. The study tested are simulated in the laboratory with electronic testing and testing communication systems. The test results showed good performance with the prototype, the results of monitoring CO2 emissions seen huge levels of carbon dioxide (ppm) is proportional to the output voltage (Vout) is generated. The greater the concentration levels of gas detected by the sensor, the output voltage generated will be greater, than that difference or distinction ADC output between the measured and calculated because of several errors, such as error output ADC ± 2 bits, error rounding conversion of ADC to volt. The measurement results are different, in the closed and open area refers to the measurement parameters are displayed on an alphanumeric display. Measuring system can transmit data via SMS information system with an average response time of less than 1 minute, it depends on the quality of the signal and traffic data from a provider by the user.
OPTIMASI ALGORITMA SUPER ENKRIPSI UNTUK MENINGKATKAN PENGAMANAN DATA CITRA DIGITALDALAM PENGIRIMAN MMS PADA PIRANTI CERDAS Setyaningsih, Emy; Iswahyudi, Catur; Widyastuti, Naniek
JURNAL TEKNOLOGI TECHNOSCIENTIA Technoscientia Vol 5 No 2 Februari 2013
Publisher : Lembaga Penelitian & Pengabdian Kepada Masyarakat (LPPM), IST AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (485.282 KB) | DOI: 10.34151/technoscientia.v5i2.536

Abstract

Advances in technology have made communication and information technology functions into convergent and known as ICT (Information and Communication Technology). Internet and smart devices have an important role as a medium for multimedia convergence at this time. Mobile communications technology also developed rapidly, as well as the development of features that support services in the GSM system, among others, is MMS (Multimedia Messaging Service) that allows data transmission such as images, audio, and video.Computational complexity becomes an important concern in the development of cryptographic techniques on smart devices in the limited of bandwidth on wireless networks, also limited processing, memory, and time. This paper will discuss the security of image message using the concept of super encryption to optimize security of encryption key that adopts the concept of steganography method called End Of File (EOF). Applications built able to combine the speed, security, and flexibility so as to produce a good combination of speed, high security, complexity, reasonable computational overhead, and computational power.Image encryption algorithm is successfully implemented on a smart device with Android based operating system. Application also has the fastprocess and efficient computing resource. These are evidenced by the average time of encryption for image size of 256 x 256 pixels at 0.75 seconds and the image with a size of 480 x 640 pixels at 2.09 seconds. Average time decryption to image size of 256 x 256 pixels by 0.58 seconds and the image with a size of 480 x 640 pixels of 1.66 seconds.
PENINGKATAN KEAMANAN TRANSMISI REAL TIME VIDEO SURVEILLANCE MENGGUNAKAN SECURE SOCKET LAYER Iswahyudi, Catur; Pratama, Nanda Adi; Triyono, Joko
JURNAL TEKNOLOGI TECHNOSCIENTIA Technoscientia Vol 12 No 1 Agustus 2019
Publisher : Lembaga Penelitian & Pengabdian Kepada Masyarakat (LPPM), IST AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (617.071 KB) | DOI: 10.34151/technoscientia.v12i1.1968

Abstract

Security is a very important aspect of data exchange. Usually, the data in video surveillance is transmitted only for certain parties. The data must accepted to entitled user with maintained confidentiality, and avoid from packet sniffing by others. Therefore, to secure the data in video surveillance, it needs a data encryption method to hide information.SSL (Secure Socket Layer) is reliable for securing a real-time data or video transmission. SSL can be implemented on a webserver that has public hosting. In this study, Zoneminder video surveillance system implemented on the web server, then SSL will encrypt the transmitted data between the Zoneminder server and the client.The results shows that surveillance videos protected by SSL, safe from packet sniffing actions and no degradation on QoS and video quality.
ANALISIS PERBANDINGAN KINERJA DAN KUALITAS LAYANAN ANTARA FIRMWARE DEFAULT DAN FIRMWARE OPENWRT PADA ACCESS POINT TP-LINK MR3020 Iswahyudi, Catur; Setiawan, Dedi
Jurnal Teknologi Vol 10 No 1 (2017): Jurnal Teknologi
Publisher : Jurnal Teknologi, Fakultas Teknologi Industri, Institut Sains & Teknologi AKPRIND Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Access point berfungsi sebagai pusat pemancar dan penerima sinyal radio pada jaringan nirkabel. Kinerja access point tidak hanya ditentukan oleh spesifikasi perangkat keras dalam access point tersebut, tetapi juga oleh firmware. Firmware bawaan dalam access point TP-LINK TL-MR3020 masih memiliki banyak kekurangan. Kekurangan yang paling mendasar adalah proses identifikasi usb dongle modem yang lama, sekitar 2 hingga 3 menit. Kekurangan lainnya adalah koneksi yang tidak stabil dan panas yang berlebihan. Salah satu solusi mengatasi kekurangan tersebut adalah mengupgrade firmware asli dengan firmware OpenWRT. Penelitian ini bertujuan untuk membandingkan kinerja dan kualitas layanan antara firmware asli dan firmware OpenWRT pada perangkat Access Point TP-LINK MR3020. Pengujian dilakukan dengan cara membandingkan kinerja acces point antara firmware default dan firmware OpenWRT menggunakan parameter througput, delay, jitter, dan packet loss. Dengan hasil pengujian tersebut, dapat diberikan rekomendasi untuk upgrade firmware perangkat access point.Hasil pengujian pada parameter throughput menunjukkan bahwa kualitas bandwidth aktual menggunakan firmware openWRT memiliki kinerja yang lebih baik dibandingkan firmware default dengan selisih rata-rata 26.9%. Sedangkan pada parameter delay diketahui bahwa waktu yang dibutuhkan untuk menempuh jarak dari titik asal ke titik tujuan menggunakan firmware openWRT lebih cepat dibandingkan AP dengan firmware default dengan rata-rata selisih 22.9ms. Pada pengujian parameter Jitter diketahui bahwa variasi kedatangan paket lebih rendah firmware openWRT dibandingkan dengan access point firmware default dengan rata-rata selisih 0.31ms. Pada pengujian parameter packet loss diketahui bahwa jumlah paket yang hilang lebih rendah pada firmware default dibandingkan firmware OpenWRT dengan rata-rata selisih 1.6%. Secara umum dapat disimpulkan bahwa firmware OpenWRT lebih unggul pada parameter throughput, delay, dan jitter, sedangkan firmware default unggul pada parameter packet loss.
Co-Authors -, Cahyana -, Suraya Agradira Dwi Wahyuda Agung purnomo Ahmad Hanafi Amir Hamzah Amran Syahrul Iriawan Putra Amrullah, Yusuf Amri Andri Harsono Andri Harsono, Andri Anggreawan - Anggreawan ., Anggreawan Aris Wahyu Murdiyanto Ariyana, Renna Yanwastika Bagus Wicaksono Bambang Wahyu Santoso Bambang Wahyu Santoso, Bambang Wahyu beny firman, beny Cyrilla Indri Parwati Dedi Setiawan Edhy Sutanta (Jurusan Teknik Informatika IST AKPRIND Yogyakarta) Eko Darmanto eko tresno prabowo Ema Utami Emy Setyaningsih Erfanti Fatkhiyah Erna Kumalasari Nurnawati Erna Kumalasari Nurnawati Fadly Isnureza Sarwadyanto Fina Febrianti Gardyas Bidari Adninda Hadi Prasetyo Suseno Hariyanto, Satriawan Dini Hary Wibowo Hendra Septian Isa Hariman Iwan Risgianto Joko Triyono Joko Triyono JULIANTO Julianto Kartika Indayani Kurniati, Devi Kusumaningsih, Rr. Yuliana Rachmawati La Ode Malik Hasan Laksono Trisnantoro Luthfia Wilaksono, Nurina Ivana M Yusuf Ali Fiqri M. Andang Novianta, M. Andang Mohammad Sholeh Mufid Wahyuaji Muhammad Andang Novianta Muhammad Andang Novianta Muhammad Puguh Pamungkas Muhammad Rosyid MUHAMMAD SHOLEH Naniek Widyastuti Naniek Widyastuti Noviana Pratiwi Noviana Pratiwi, Noviana Nurcahyo, Raden Wisnu P.Aji, Galih Tegar Pamuji, Septi Ade Pratama, Nanda Adi Prita Haryani Purnawan Purnawan Purnawan Purnawan Purnawan Ragusta, Yuda Reza Pakiding Rizki Pratama Rizkyka Angellia Rizqi Aji Nugroho Rosalia Arum Kumalasanti Rosid, Ibnu Abdul Rr Yuliana Rachmawati K Rr Yuliana Rachmawati Kusumaningsih RR. Yuliana Rachmawati Rr. Yuliana Rachmawati k, Rr. Yuliana Rachmawati Rr. Yuliana Rachmawati, Rr. Yuliana Rr.Yuliana Rachamawati, Rr.Yuliana Rusyda, Annisa Rizka Alhimna Sahid Aris Budiman, Sahid Aris Samuel Kristiyana Sholeh, Muhammad Sigit Iskandar Sigit Iskandar, Sigit Sisilia Endah Lestari, Sisilia Endah Suparni Setyowati Rahayu Suwanto Raharjo Taufik Hidayat Tomas Antonio Correia Freitas, Tomas Antonio Correia Toto Rusianto Tri Anto Tri Mulyadin Triyono, Joko Uning Lestari Uning Lestari Utami, Ema Utami Utomo, Ariyadi Dwi Wahyu Widianto Witri Anik Witri Anik, Witri Yosefina Pantu Yosefina Pantu, Yosefina Yunis Aprilianti Zulfikar .L, Fauzul Rachman