Claim Missing Document
Check
Articles

PERANCANGAN DAN PENERAPAN ALGORITMA RIZKI TANJUNG 24 (RTG24) UNTUK KOMPARASI KATA PADA FILE TEXT Tanjung, Rizki; Sajati, Haruno; Nugraheny, Dwi
Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (118.663 KB)

Abstract

Plagiarism is the act of taking essay or work of others, and recognize it as his own work. Plagiarism of the text is very common and difficult to avoid. Therefore, many created a system that can assist in plagiarism detection text document. To make the detection of plagiarism of text documents at its core is to perform string matching. This makes the emergence of the idea to build an algorithm that will be implemented in RTG24 Comparison file.txt applications. Document to be compared must be a file. Txt or plaintext, and every word contained in the document must be in the dictionary of Indonesian. RTG24 algorithm works by determining the number of same or similar words in any text between the two documents. In the process RTG24 algorithm has several stages: parsing, filtering, stemming and comparison. Parsing stage is the stage where every sentence in the document will be broken down into basic words, filtering step is cleaning the particles are not important. The next stage, stemming is the stage where every word searchable basic word or root word, this is done to simplify and facilitate comparison between the two documents. Right after through the process of parsing, filtering, and stemming, then the document should be inserted into the array for the comparison or the comparison between the two documents. So it can be determined the percentage of similarity between the two documents.
PEMANFAATAN INTRUSION DETECTION SYSTEM (IDS) SEBAGAI OTOMATISASI KONFIGURASI FIREWALL BERBASIS WEB SERVICE MENGGUNAKAN ARSITEKTUR REPRESENTATIONAL STATE TRANSFER (REST) Awangga, Demmy Nanda; Sajati, Haruno; Astuti, Yenni
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (300.762 KB)

Abstract

Many things can destabilize a computer network connections, both with regard to hardware and software. Therefore, we need a technique for network security, one of them is firewall. The problems that arise in this final project is to build a linux based firewall automation application via web service by using REST (Representational State Transfer) architecture and IDS (Intrusion Detection System). The system buid firewall rules using linux operating system with the help o f 2 pieces o f IDS to detect theactivities of traffic data between the intruder and the server that will be recorded in the IDS database. The system will compare the server with IDS on the router to get the IP address o f the actual intruders, so it will be blocked by the firewall. The applications is used to prevents the ping o f death attack usingweb service and REST protocol so that firewall rules will run automatically.
MEMBANGUN SISTEM KEAMANAN ARP SPOOFING MEMANFAATKAN ARPWATCH DAN ADDONS FIREFOX Zonggonau, Kristopedus; Sajati, Haruno
Compiler Vol 4, No 1 (2015): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (199.955 KB)

Abstract

The Development of information Technology, especially computer networks and the service in a rejuvenate the human side. The development of the internet is very widespread. The security level digital data becomes vulnerable to attack by the attacker. Arp spoofing is one of the attacks in a network that can be used to view digital data traffic such as emails, passwords and etc, when is running in the network. The process of prevention againtst arp spoofing attacks, made an application to detect and block the attacker in the network by Firefox Addons. Attacker will be directly blocking (drop) into to Mikrotik OS. Users avoid the attack arp spoofing. The results of testing one, two and three can be detect and block the presentation of the results of 83%, so That’s the terms of security in the network can be safe from attack to the attacker.
PENERAPAN HIDS (HOST INTRUSION DETECTION SYSTEM) DALAM MEMBANGUN KONFIGURASI FIREWALL SECARA DINAMIK Firdaus, Alfian; Sajati, Haruno; Indrianingsih, Yuliani
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (89.028 KB)

Abstract

Development o f information technology and computer networks in particular its services on the one hand facilitate the work of human beings, but as the very widespread use of the internet, the security level of digital data has become more vulnerable to exploitation. The problem arises when the attacks happened on a computer network in a relatively fast, so that an administrator must always keep an eye on the computer network security. Limitations o f an administrator is exactly what underlies thecreation o f a system capable o f detecting and prevention of these attacks, so the time efficiency can be actually implemented. The system is built to prevent attacks on computer networks such as port scanning, ftp, ssh and telnet brute force. This system will analyze the number o f errors that occur on login these services, and makes a decision system if the login error exceeds the tolerance of an administrator. I f the number o f errors exceeds the tolerance, it will automatically create the firewall rules in a very short duration is one minute, so the system is able to prevent the attacks which happened in a very quick time.
DETEKSI JERAWAT PADA WAJAH MENGGUNAKAN METODE VIOLA JONES Sajati, Haruno; Indrianingsih, Yuliani; Candra Wulan, Puspa Ira Dewi
Compiler Vol 5, No 1 (2016): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (224.202 KB)

Abstract

Acne is a skin disease that most often grow in the face and very disruptive to affect the appearance of a person's face. Viola Jones is one method to help detect acne so someone get information about the state of the face and immediately overcome. Viola Jones Method has three main processes integral image is used to determine whether there is a feature haar particular in an image, the method adaboost machine learning is used to select features haar specific that will be used to adjust the threshold value, and a cascade classifier as the classification of the final determining regions the face in the picture. Testing of 30 samples, the results obtained showed that the method is less accurate Viola Jones is used as a method of detection of acne with results average 25 % the percentage of common acne, blackheads 0 % and 45% of cystic acne. The number of samples used to create xml greatly affect the results of detection.
DETEKSI KEDIPAN MATA PADA VIDEO MENGGUNAKAN OPEN CV Sajati, Haruno; Kusumaningrum, Anggraini; Utomo, Bagus Budi
Compiler Vol 6, No 1 (2017): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (311.759 KB)

Abstract

In the development of technology in the current era is one of the most rapid progress, it is marked by almost all managers of data and information has been done with the computer because of the increasingly diverse information issues handled, Detection of objects is one of the most important early stages before Done object recognition process. Eye blink detection can be used to open a new file or an application. In this research use case detection eye blinking on video using OpenCV to open notepad application. The blink detection uses the haar cascade classifier method for realtime detection and the  OpenCV Library. The first step determines the pattern 1111100000. Next enter the video sample avi format to match with a predetermined pattern. In this program the system managed to detect the eye according to the pattern by circling the eye area when the eyes are open or literate and when the eyes closed or brake there is no circle in the eye area for the correct video sample.
PEMBANGKITAN WARNA ANGKA TOKEK DENGAN METODE LINIER CONGRUEN METHOD (LCM) Sajati, Haruno; Nugraheny, Dwi; Hermawan, Antok
Compiler Vol 5, No 1 (2016): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (175.487 KB)

Abstract

Color blindness is an abnormality in terms of seeing certain colors that occur as a result of demage to come cells (cone cells) in the retina of the eye, so that people with color blindness can be hard  to catch a certaincolor spectrum. People suffering from color blindness would have difficulty distinguishing certain shades can not even see certain colors. Developed by Dr. Ishihara test Shinobu Ishihara in 1917, until now the Ishihara test methods still be one of the main option in almost all countries to identify someone who had color blindess. In the figure gecko color generation system with linear method congruen method (lcm) described the components of software and hardwer that is required in the manufacture of  color generator application numbers congruen gecko with a linear congruen method (lcm). The determination of the initial value of the constant linear congruen method (lcm) into the determination of the color composition result generated randomly. System testing and completion of a questionnaire completed by Guttman and Likert scale. Diman on functional testing system results obtained with Guttman scale 100% yes that users can guess the number that appears on the color generation process. And the interface testing diselesaika with Likert scale with 85% strongly agree result the system has a 94% look attractive and easy to use system.
PENCOCOKAN GAMBAR SIDIK JARI DENGAN KAMERA HANDPHONE MENGGUNAKAN METODE RANSAC DAN TRANSFORMASI AFFINE BERBASIS ANDROID Sajati, Haruno; Nughraheny, Dwi; Suwarso, Nova Adi
Compiler Vol 6, No 1 (2017): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (784.267 KB)

Abstract

Fingerprints occur due to stroke differences. These stroke differences have occurred at a time when humans are still fetal form. A normal fingerprint pattern is formed of lines and spaces. These lines are called ridges whereas the spaces between these lines are called valleys. To make an introduction to the fingerprint image requires a variety of support tools. Starting from a fingerprint machine, a smartphone that has a fingerprint sensor and much more. In this research, the acquisition of image is done by grayscaling, histogram equalization, gabor filter, binary, thinning, 8 neighbors, matching.The result of making android application with the method that has been described to show unfavorable results seen from the calculation of the accuracy of 63%. Based on testing the specs android OS devices, this application can run on android with OS 4.4.2 specification kitkat.Fingerprints occur due to stroke differences. These stroke differences have occurred at a time when humans are still fetal form. A normal fingerprint pattern is formed of lines and spaces. These lines are called ridges whereas the spaces between these lines are called valleys. To make an introduction to the fingerprint image requires a variety of support tools. Starting from a fingerprint machine, a smartphone that has a fingerprint sensor and much more. In this research, the acquisition of image is done by grayscaling, histogram equalization, gabor filter, binary, thinning, 8 neighbors, matching.The result of making android application with the method that has been described to show unfavorable results seen from the calculation of the accuracy of 63%. Based on testing the specs android OS devices, this application can run on android with OS 4.4.2 specification kitkat. Keywords : OCR Fingerprint, Fingerprint recognition, Minutiae based matching, Fingerprint image processing.
AUTOMATISASI PENENTUAN JALUR KONEKSI INTERNET PADA TIGA PROVIDER Wicaksono, Galih Dwi; Sajati, Haruno; Nugraheny, Dwi
Compiler Vol 5, No 1 (2016): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (179.467 KB)

Abstract

Along with the times, the computer network has undergone many changes from time to time. Eventually, internet network is known. To test the reachability of a host on an IP address (internet protocol) network and to measure the round-trip time for messages sent from the host to the destination, computer needs to perform ping process. Ping operates by sending ICMP (Internet Control Message Protocol) echo request packets to the target host and waiting for an ICMP response. internet connection lane determination automation uses three providers done by comparing the smallest average value of the result of the ping. The test results are printed in the form of a statistical summary of the response packets received, including the minimum, maximum and average round-trip time. The signal strength is not directly proportional to the value of average, because the signal strength is affected by the report the data RSCP, throughput and quality of services covering CSSR (Call Setup Success Ratio), CCSR (Call Completion Success Ratio), DCR (Dropped Call Ratio) and BCR (Blocked Call Ratio) which can be used to optimize the network.
Notification Using Telegram to Identify and Determine the Needs of Handling Packaging Dangerous Goods Fahlevi, Wildansyah Reza; Lukito, Indro; Sajati, Haruno
Compiler Vol 8, No 1 (2019): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (412.729 KB)

Abstract

Aviation requires a very high level of security and safety, so that there is no problem that can harm various parties, one of the things that must be considered is about the transportation and handling of Dangerous Goods material. Existing handling system on the flight of dangerous goods systems where outside there is still a lot of risk of handling errors until there is data inaccuracy that can harm various parties, because almost all handling done manually. In addition, the plane does not want to delay and does not want to insert dangerous goods into the plane, so to anticipate the problem conditions, built a system that performs faster, easier and accurate handling, where the system uses PHP programmer language and utilize Telegram API as media Client Server. The built tool explains how to identify packaging, calculations and documents, this tool has reliability with the ability to calculate and identify faster than the manual way with average calculations whose value is significantly different. The values obtained by manually counting which is about 175 Minutes 8 Second or equivalent to 2 Hours 55 Minutes 8 Second and counting with the system  about 94 Minutes 44 Seconds or equivalent to 1 Hour 34 Minutes 44 Seconds, then more than 46% the results are different.
Co-Authors . Sudaryanto Afrizal Triantoro Agustian, Harliyus Aldri Frinaldi Alfian Firdaus Anarianto, Donny Andaruwati, Ragil Andaruwati, Ragil Anggi Sri Septiani Suhendar Anggraini Kusumaningrum Anggraini Kusumaningrum Anggraini Kusumaningrum Anggraini Kusumaningrum, Anggraini Antok Hermawan Anton Honggowibowo Anton Setiawan Honggowibowo Arwin Datumaya Wahyudi Sumari Astika Ayuningtyas Astika Ayuningtyas Astika Ayuningtyas Astika AyuningTyas, Astika Awangga, Demmy Nanda Bagus Budi Utomo Bambang Sudibya Bambang Sudibya, Bambang Bayu Sugara Brama Ady Sulistiyo Cakra Aminuddin Hamka Candra Wulan, Puspa Ira Dewi Dedi Bintang Pamungkas Demmy Nanda Awangga Dewi Retnowati, Nurcahyani Dwi Kholistyanto Dwi Nughraheny Dwi Nugrahenny Dwi Nugrahenny, Dwi Dwi Nugraheny Dwi Nugraheny Dwi Nugraheny Dwi Nugraheny, Dwi Edi Triono Nuryatno Eko Cahyo Nugroho, Eko Cahyo Eko Murdiansyah Eko Poerwanto Elizabeth Nurmiyati Tamatjita Evi Wahyuningsih Fahlevi, Wildansyah Reza Fakhri Yahya, Muhammad Firdaus, Alfian Freddy Kurniawan Freddy Kurniawan Galih Andita Sukma Galih Dwi Wicaksono Hamka, Cakra Aminuddin Harliyus Agustian HARLIYUS AGUSTIAN Hermawan, Antok Ida Ayu Putu Sri Widnyani Indro Lukito Irawaty, Mardiana Kholistyanto, Dwi Kristopedus Zonggonau Lasmadi, Lasmadi Latumaone, Yulis Robert Leonardo Tampubolon Lukito Edi Nugroho Lukito, Indro Maria Asumpta deny Kusumaningrum Masih Musliatun Murdiansyah, Eko Musliatun, Masih Muttaqin Muttaqin Nova Adi Suwarso Nughraheny, Dwi Nur Hanifah Nur Hanifah Nurcahyani Dewi Retnowati Nurcahyani Dewi Retnowati Nurcahyani Dewi Retnowati Nurdin, Riani Okto Dinaryanto Pujiastuti, Asih Puspa Ira Dewi Candra Wulan Ramdan, Ramdan Ridi Ferdiana Rizki Tanjung Salam Aryanto Setiawan, Yoris Sri Mulyani Sudaryanto Sudaryanto SUDARYANTO SUDARYANTO Sugara, Bayu Suhendar, Anggi Sri Septiani Sukma, Galih Andita Sulistiyo, Brama Ady Suwarso, Nova Adi Tanjung, Rizki Triantoro, Afrizal Utomo, Bagus Budi Wicaksono, Galih Dwi Wildansyah Reza Fahlevi Wintolo, Hero Wiyasa, Ega Ari Yenni Astuti Yenni Astuti Yenni Astuti, Yenni Yoris Setiawan Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yulis Robert Latumaone Zonggonau, Kristopedus Zulham Zulham