Articles
Water Resources Mapping for Firefighters in Kotamadya Yogyakarta Based on Android
Yuliani Indrianingsih;
Haruno Sajati;
Bayu Sugara
Compiler Vol 8, No 2 (2019): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (403.393 KB)
|
DOI: 10.28989/compiler.v8i2.519
Fire extinguishing system in placing reservoirs there are still many officers who do not know the location so that they can implement computerized technology so that firefighters can work to maximize the information technology made by the author well. Mobile-based reservoir mapping system application developed using Geofence method. The main purpose for this application that officers can easily find the location of the reservoir closest to the location of the fire and where officers can also find out the location of the reservoir distance from the fire. The accuracy of testing results with Google maps where the accuracy is very precise to the location of the water source or reservoir. Testing using a smartphone comparison from Android 4.1 Jelly Bean version to Android 7.0 Nougat can run with distance results in the application using google maps, get the same results and where there is a test version of Android V4.4 Kitkat that did not work because RAM does not support this application. Testing in the form of a black box method where this method tests every function contained and the test is functioning and running as smoothly as possible where the system is functioning properly with success rate 100%.
PENCARIAN INFORMASI DATA PESAWAT MENGGUNAKAN NOMOR REGISTRASI PESAWAT DENGAN MEMANFAATKAN DATABASE DAN JSON
Yulis Robert Latumaone;
Haruno Sajati;
Nurcahyani Dewi Retnowati
Compiler Vol 5, No 2 (2016): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (338.648 KB)
|
DOI: 10.28989/compiler.v5i2.172
Currently, not much o f public didn’t know about the information of data aircraft, the manufacture and type is sample. The aircraft also has registration number which not same between one aircraft with another aircraft. Information retrival of data aircraft can used registrationnumber with developed in an applicationwith take advantage of database and JSON (JavaScript Object Notation). JSON is a data exchange system that ’s easily translated in to the language o f computer or human. Data exchange these give mean make the distribution application base o f webservices. Web services is a system that provide service the another system to share resource. Procces o f made an application with base of web services must suitable with SOA (Service Oriented Architecture), where SOA is a model representation to up model shape which hasdistribution. For Implementation SOA, it can use the language of programming PHP (Hypertext Preprocessor). Tested on six aircraft, indicated o f airport and airline data can to point out that use of database and JSON can be run well. Decided o f internet network is an obtacle to present data.
MEMBANGUN SISTEM KEAMANAN ARP SPOOFING MEMANFAATKAN ARPWATCH DAN ADDONS FIREFOX
Kristopedus Zonggonau;
Haruno Sajati
Compiler Vol 4, No 1 (2015): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (199.955 KB)
|
DOI: 10.28989/compiler.v4i1.87
The Development of information Technology, especially computer networks and the service in a rejuvenate the human side. The development of the internet is very widespread. The security level digital data becomes vulnerable to attack by the attacker. Arp spoofing is one of the attacks in a network that can be used to view digital data traffic such as emails, passwords and etc, when is running in the network. The process of prevention againtst arp spoofing attacks, made an application to detect and block the attacker in the network by Firefox Addons. Attacker will be directly blocking (drop) into to Mikrotik OS. Users avoid the attack arp spoofing. The results of testing one, two and three can be detect and block the presentation of the results of 83%, so That’s the terms of security in the network can be safe from attack to the attacker.
DETEKSI JERAWAT PADA WAJAH MENGGUNAKAN METODE VIOLA JONES
Haruno Sajati;
Yuliani Indrianingsih;
Puspa Ira Dewi Candra Wulan
Compiler Vol 5, No 1 (2016): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (224.202 KB)
|
DOI: 10.28989/compiler.v5i1.103
Acne is a skin disease that most often grow in the face and very disruptive to affect the appearance of a person's face. Viola Jones is one method to help detect acne so someone get information about the state of the face and immediately overcome. Viola Jones Method has three main processes integral image is used to determine whether there is a feature haar particular in an image, the method adaboost machine learning is used to select features haar specific that will be used to adjust the threshold value, and a cascade classifier as the classification of the final determining regions the face in the picture. Testing of 30 samples, the results obtained showed that the method is less accurate Viola Jones is used as a method of detection of acne with results average 25 % the percentage of common acne, blackheads 0 % and 45% of cystic acne. The number of samples used to create xml greatly affect the results of detection.
Uniform Resource Locator (URL) Detection Security System Based on Android
Haruno Sajati;
Harliyus Agustian;
Eko Murdiansyah
Compiler Vol 8, No 1 (2019): May
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (613.013 KB)
|
DOI: 10.28989/compiler.v8i1.343
The use of the internet, which is currently increasing dramatically, certainly brings the convenience of finding information. The increase in internet usage also eventually gave rise to cybercrime crimes, one of which was by spreading a URL or fake site to steal someone's personal data. The research done is how to build an Android-based application that can detect the security of a URL. The goal is that internet users, especially social media, can avoid cybercrime crime that wants to steal personal data. Making an application uses the Regular Expression method to analyze each line of the Webpage Source Code in the URL based on 8 criteria taken from the World Wide Web Consortium (W3C). The application was then tested with 10 phishing-charged URLs and compared with Kaspersky, McAfee, and AdBlock applications. Based on the results of trials and comparisons, applications that have been made are able to detect 6 or 60% of the 10 URLs. Kaspersky and McAfee applications can detect 70%, while AdBlock only detects 3 or 30% of 10 URLs that contain phishing.
ALGORITMA MASIH MUSLIATUN (MM) UNTUK MENDUKUNG SISTEM OTOMATISASI PENDAFTARAN PRAKTIKUM DENGAN PENGUJIAN PADA JARINGAN KOMPUTER (STUDI KASUS DI STTA YOGYAKARTA)
Masih Musliatun;
Haruno Sajati;
Yuliani Indrianingsih
Compiler Vol 2, No 1 (2013): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (214.016 KB)
|
DOI: 10.28989/compiler.v2i1.38
Practicum registration systems that exist on campus STTA previously done manually, where students will sign up to the admin to bring proof of payment practicum. Students are free to choose his own class, this often resulted in unbalanced number of students in the classroom lab that is consideredless effective way. This makes the emergence of the idea to establish an MM algorithm is applied to a practical application o f automation systems. MM algorithm works by determining many lab classes based on students who took the KRS. Furthermore, students who have paid practicum will be immediately incorporated into the classes that are available with regard to the number of students and GPA o f students per class, so it will obtain practical classes by the number o f students and the average GPA o f each class balanced.Concept application using client-server database, where the database is on the Local Area Network (LAN) STTA. To facilitate the management admin, then the application will be tested on the LAN network and VPN (Virtual Private Network) network. LAN is a computers network that are connected to a computer server by using specific topologies, typically used in areas of the building or area a distance o f not more than 1 km (local area). While VPN is a secure way to access the Local Area Network that is in range, using the Internet or other public network to perform packet data transmission in private. By using a VPN, users can access the computer that is on the LAN even though the user is not in the same location with a LAN.
PEMANFAATAN INTRUSION DETECTION SYSTEM (IDS) SEBAGAI OTOMATISASI KONFIGURASI FIREWALL BERBASIS WEB SERVICE MENGGUNAKAN ARSITEKTUR REPRESENTATIONAL STATE TRANSFER (REST)
Demmy Nanda Awangga;
Haruno Sajati;
Yenni Astuti
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (300.762 KB)
|
DOI: 10.28989/compiler.v2i2.49
Many things can destabilize a computer network connections, both with regard to hardware and software. Therefore, we need a technique for network security, one of them is firewall. The problems that arise in this final project is to build a linux based firewall automation application via web service by using REST (Representational State Transfer) architecture and IDS (Intrusion Detection System). The system buid firewall rules using linux operating system with the help o f 2 pieces o f IDS to detect theactivities of traffic data between the intruder and the server that will be recorded in the IDS database. The system will compare the server with IDS on the router to get the IP address o f the actual intruders, so it will be blocked by the firewall. The applications is used to prevents the ping o f death attack usingweb service and REST protocol so that firewall rules will run automatically.
PENERAPAN SISTEM KEAMANAN MENGGUNAKAN CRYPTOGRAPHY PADA APLIKASI CHATTING DENGAN MEMODIFIKASI ALGORITMA RIVEST SHAMIR ADLEMAN (RSA)
Muttaqin Muttaqin;
Haruno Sajati;
Nurcahyani Dewi Retnowati
Compiler Vol 3, No 1 (2014): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (288.434 KB)
|
DOI: 10.28989/compiler.v3i1.66
Chatting application is an application which used for communication through local network or internet. It can use to make communication to be effective and easy to use but there are several shortage in delivery information process is data security when communication is going on. Using chrypthography with modification Rivest Shamir adleman (RSA) algorithm in encryption process and decryption on packet data which transmited is one of security system which can used in this application then the security of data packet secured. Result from implementation of chatting application which apply chrypthography with modification Rivest Shamir adleman (RSA) algorithm have done in local network and internet able to run smoothly and have done by several testing cases based on certain scenario. Whereas process testing encryption and decryption using tools wireshark.
AUTOMATISASI PENENTUAN JALUR KONEKSI INTERNET PADA TIGA PROVIDER
Galih Dwi Wicaksono;
Haruno Sajati;
Dwi Nugraheny
Compiler Vol 5, No 1 (2016): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (179.467 KB)
|
DOI: 10.28989/compiler.v5i1.104
Along with the times, the computer network has undergone many changes from time to time. Eventually, internet network is known. To test the reachability of a host on an IP address (internet protocol) network and to measure the round-trip time for messages sent from the host to the destination, computer needs to perform ping process. Ping operates by sending ICMP (Internet Control Message Protocol) echo request packets to the target host and waiting for an ICMP response. internet connection lane determination automation uses three providers done by comparing the smallest average value of the result of the ping. The test results are printed in the form of a statistical summary of the response packets received, including the minimum, maximum and average round-trip time. The signal strength is not directly proportional to the value of average, because the signal strength is affected by the report the data RSCP, throughput and quality of services covering CSSR (Call Setup Success Ratio), CCSR (Call Completion Success Ratio), DCR (Dropped Call Ratio) and BCR (Blocked Call Ratio) which can be used to optimize the network.
PEMBANGKITAN WARNA ANGKA TOKEK DENGAN METODE LINIER CONGRUEN METHOD (LCM)
Haruno Sajati;
Dwi Nugraheny;
Antok Hermawan
Compiler Vol 5, No 1 (2016): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (175.487 KB)
|
DOI: 10.28989/compiler.v5i1.99
Color blindness is an abnormality in terms of seeing certain colors that occur as a result of demage to come cells (cone cells) in the retina of the eye, so that people with color blindness can be hard to catch a certaincolor spectrum. People suffering from color blindness would have difficulty distinguishing certain shades can not even see certain colors. Developed by Dr. Ishihara test Shinobu Ishihara in 1917, until now the Ishihara test methods still be one of the main option in almost all countries to identify someone who had color blindess. In the figure gecko color generation system with linear method congruen method (lcm) described the components of software and hardwer that is required in the manufacture of color generator application numbers congruen gecko with a linear congruen method (lcm). The determination of the initial value of the constant linear congruen method (lcm) into the determination of the color composition result generated randomly. System testing and completion of a questionnaire completed by Guttman and Likert scale. Diman on functional testing system results obtained with Guttman scale 100% yes that users can guess the number that appears on the color generation process. And the interface testing diselesaika with Likert scale with 85% strongly agree result the system has a 94% look attractive and easy to use system.