Articles
Decision Support System for Property Insurance Selection Using Simple Additive Weighting (SAW) Method
Anggraini Kusumaningrum;
Astika Ayuningtyas;
Leonardo Tampubolon;
Anton Honggowibowo;
Haruno Sajati;
Mardiana Irawaty
Jurnal Internasional Teknik, Teknologi dan Ilmu Pengetahuan Alam Vol 3 No 2 (2021): International Journal of Engineering, Technology and Natural Sciences
Publisher : University of Technology Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.46923/ijets.v3i2.137
Every human being cannot predict what events will happen to him, whether natural disasters or non-natural disasters that can befall his property assets. Property insurance is a type of protection for property assets such as houses, apartments, and offices. The goal is to anticipate financial losses due to unexpected events that befall your property. Data such as Risk-Based Capital (RBC) is needed in choosing a property insurance company, the amount of premium, insurance coverage, and the premium period as a material consideration in making decisions. In implementing the Property Insurance Selection Decision Support System Application using the Simple Additive Weighting (SAW) method, the user determines the main priority weights from the predetermined criteria, from the results of determining the priority weights, a recommendation for property insurance companies is obtained which is desired by the property owner from the calculation results, it can be concluded that the average calculation speed of the application of 30 experimental sample data is 1264 ms or 1.264s
Decision Support System for Property Insurance Selection Using Simple Additive Weighting (SAW) Method
Anggraini Kusumaningrum;
Astika Ayuningtyas;
Leonardo Tampubolon;
Anton Honggowibowo;
Haruno Sajati;
Mardiana Irawaty
Jurnal Internasional Teknik, Teknologi dan Ilmu Pengetahuan Alam Vol 3 No 2 (2021): International Journal of Engineering, Technology and Natural Sciences
Publisher : University of Technology Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (462.031 KB)
|
DOI: 10.46923/ijets.v3i2.137
Every human being cannot predict what events will happen to him, whether natural disasters or non-natural disasters that can befall his property assets. Property insurance is a type of protection for property assets such as houses, apartments, and offices. The goal is to anticipate financial losses due to unexpected events that befall your property. Data such as Risk-Based Capital (RBC) is needed in choosing a property insurance company, the amount of premium, insurance coverage, and the premium period as a material consideration in making decisions. In implementing the Property Insurance Selection Decision Support System Application using the Simple Additive Weighting (SAW) method, the user determines the main priority weights from the predetermined criteria, from the results of determining the priority weights, a recommendation for property insurance companies is obtained which is desired by the property owner from the calculation results, it can be concluded that the average calculation speed of the application of 30 experimental sample data is 1264 ms or 1.264s
AUTOMATISASI PENENTUAN JALUR KONEKSI INTERNET PADA TIGA PROVIDER
Galih Dwi Wicaksono;
Haruno Sajati;
Dwi Nugraheny
Compiler Vol 5, No 1 (2016): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (179.467 KB)
|
DOI: 10.28989/compiler.v5i1.104
Along with the times, the computer network has undergone many changes from time to time. Eventually, internet network is known. To test the reachability of a host on an IP address (internet protocol) network and to measure the round-trip time for messages sent from the host to the destination, computer needs to perform ping process. Ping operates by sending ICMP (Internet Control Message Protocol) echo request packets to the target host and waiting for an ICMP response. internet connection lane determination automation uses three providers done by comparing the smallest average value of the result of the ping. The test results are printed in the form of a statistical summary of the response packets received, including the minimum, maximum and average round-trip time. The signal strength is not directly proportional to the value of average, because the signal strength is affected by the report the data RSCP, throughput and quality of services covering CSSR (Call Setup Success Ratio), CCSR (Call Completion Success Ratio), DCR (Dropped Call Ratio) and BCR (Blocked Call Ratio) which can be used to optimize the network.
PEMBANGKITAN WARNA ANGKA TOKEK DENGAN METODE LINIER CONGRUEN METHOD (LCM)
Haruno Sajati;
Dwi Nugraheny;
Antok Hermawan
Compiler Vol 5, No 1 (2016): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (175.487 KB)
|
DOI: 10.28989/compiler.v5i1.99
Color blindness is an abnormality in terms of seeing certain colors that occur as a result of demage to come cells (cone cells) in the retina of the eye, so that people with color blindness can be hard to catch a certaincolor spectrum. People suffering from color blindness would have difficulty distinguishing certain shades can not even see certain colors. Developed by Dr. Ishihara test Shinobu Ishihara in 1917, until now the Ishihara test methods still be one of the main option in almost all countries to identify someone who had color blindess. In the figure gecko color generation system with linear method congruen method (lcm) described the components of software and hardwer that is required in the manufacture of color generator application numbers congruen gecko with a linear congruen method (lcm). The determination of the initial value of the constant linear congruen method (lcm) into the determination of the color composition result generated randomly. System testing and completion of a questionnaire completed by Guttman and Likert scale. Diman on functional testing system results obtained with Guttman scale 100% yes that users can guess the number that appears on the color generation process. And the interface testing diselesaika with Likert scale with 85% strongly agree result the system has a 94% look attractive and easy to use system.
THE AUDIO VIDEO OF WEB-BASED COMPRESSION WITH FFMPEG
Afrizal Triantoro;
Haruno Sajati;
Asih Pujiastuti
Compiler Vol 7, No 2 (2018): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (596.212 KB)
|
DOI: 10.28989/compiler.v7i2.280
In general, video compression only compresses video files without compressing the audio files in them. This results in the compression process not being maximized.This study discusses the process of compressing video and audio files to get maximum compression. The application built is a web-based video compression software utilizing FFmpeg to do the compression process by breaking down the original video which has a resolution of 720 to 4 files, namely 720, 480, 360, and 240 resolutions. The test is done by comparing the compression results only to video files and compressing to video and audio and there is a 1-2 MB file size difference, whereas when compared to the original file, there is a 5-20 MB size difference. In addition to conducting this test also performed compression testing on different devices and obtained relatively similar results on all devices. Test the image quality on the compressed file obtained the image quality results in the standard video compression below 30dB results.
BANDWIDTH MANAGEMENT TO SET OF INTERNET CONNECTION REFERING FROM STRUCTURAL POSITION USE MIKROTIK RB751-2HnD WITH WEB BASED IN ADISUTJIPTO HIGH SCHOOL TECHNOLOGY
Brama Ady Sulistiyo;
Haruno Sajati;
Elizabeth Nurmiyati Tamatjita
Compiler Vol 3, No 1 (2014): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (110.924 KB)
|
DOI: 10.28989/compiler.v3i1.62
Development of information technology and computer networks in particular its services on the one hand facilitate the work of human beings, but as a very widespread internet usage, internet access usage levels become unmanageable. The need for a web-based application that facilitates an admin to manage the bandwidth seems very necessary. By using or utilizing the API (application programming interface) that has been provided by the router is to create a Bandwidth Management Application To Set Internet Connection Referring Structural Position Use Mikrotik RB751G - 2HnD With Web Based In Adisutjipto Technology High School. The results Application test show and prove that bandwidth isn’t right as the transfer rate. As for transfer rate or download speed is not affected by bandwidth rather influenced by the size distribution of the bandwidth paths. Test results also proved that a bandwidth leased from a provider not in accordance with the offer.
PERANCANGAN KEAMANAN SISTEM MENGGUNAKAN ALGORITMA HONEYPOT PADA APLIKASI KRS ONLINE (STUDI KASUS : SEKOLAH TINGGI TEKNOLOGI ADISUTJIPTO)
Yoris Setiawan;
Haruno Sajati;
Bambang Sudibya
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (160.53 KB)
|
DOI: 10.28989/compiler.v2i2.56
Many colleges already apply web based academic information system use internet connection, so it is need a system security to protect from attacks such as SQL Injection and Brute Force. Honeypot is a system security which devide two system that are original and fake system. Original system used by user to access academic information system that source from correct database. While fake system used to separate hacker and user. Hackers who try to enter with SQL Injection is send to fake system directly which has wrong data. This fake system seems correct and all action that was happened in will be noted on log history. When hacker try some password ese Brute Force, system will reset user password automatically. This system already test with 79 times SQL Injection and 29 times Brute Force attack. All attacks can handle nicely with honeypot algorithm.
PERANCANGAN DAN PENERAPAN ALGORITMA RIZKI TANJUNG 24 (RTG24) UNTUK KOMPARASI KATA PADA FILE TEXT
Rizki Tanjung;
Haruno Sajati;
Dwi Nugraheny
Compiler Vol 3, No 1 (2014): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (118.663 KB)
|
DOI: 10.28989/compiler.v3i1.68
Plagiarism is the act of taking essay or work of others, and recognize it as his own work. Plagiarism of the text is very common and difficult to avoid. Therefore, many created a system that can assist in plagiarism detection text document. To make the detection of plagiarism of text documents at its core is to perform string matching. This makes the emergence of the idea to build an algorithm that will be implemented in RTG24 Comparison file.txt applications. Document to be compared must be a file. Txt or plaintext, and every word contained in the document must be in the dictionary of Indonesian. RTG24 algorithm works by determining the number of same or similar words in any text between the two documents. In the process RTG24 algorithm has several stages: parsing, filtering, stemming and comparison. Parsing stage is the stage where every sentence in the document will be broken down into basic words, filtering step is cleaning the particles are not important. The next stage, stemming is the stage where every word searchable basic word or root word, this is done to simplify and facilitate comparison between the two documents. Right after through the process of parsing, filtering, and stemming, then the document should be inserted into the array for the comparison or the comparison between the two documents. So it can be determined the percentage of similarity between the two documents.
PENERAPAN HIDS (HOST INTRUSION DETECTION SYSTEM) DALAM MEMBANGUN KONFIGURASI FIREWALL SECARA DINAMIK
Alfian Firdaus;
Haruno Sajati;
Yuliani Indrianingsih
Compiler Vol 2, No 2 (2013): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (89.028 KB)
|
DOI: 10.28989/compiler.v2i2.46
Development o f information technology and computer networks in particular its services on the one hand facilitate the work of human beings, but as the very widespread use of the internet, the security level of digital data has become more vulnerable to exploitation. The problem arises when the attacks happened on a computer network in a relatively fast, so that an administrator must always keep an eye on the computer network security. Limitations o f an administrator is exactly what underlies thecreation o f a system capable o f detecting and prevention of these attacks, so the time efficiency can be actually implemented. The system is built to prevent attacks on computer networks such as port scanning, ftp, ssh and telnet brute force. This system will analyze the number o f errors that occur on login these services, and makes a decision system if the login error exceeds the tolerance of an administrator. I f the number o f errors exceeds the tolerance, it will automatically create the firewall rules in a very short duration is one minute, so the system is able to prevent the attacks which happened in a very quick time.
SISTEM KEAMANAN JAIL BASH UNTUK MENGAMANKAN AKUN LEGAL DARI KEJAHATAN INTERNET MENGGUNAKAN THC-HYDRA
Cakra Aminuddin Hamka;
Haruno Sajati;
Yuliani Indrianingsih
Compiler Vol 3, No 1 (2014): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (211.103 KB)
|
DOI: 10.28989/compiler.v3i1.63
Along with the development of current technology, making technology is very important in today's life. Security level digital data has become more vulnerable to exploitation, the problem arises when an information technology device was attacked by people who do not want to take a responsible and important data illegally, so the administrator must act quickly to secure important data. Making a data security technology on the internet is very important information. Limitations administrator underlying the creation of a system that is able to detect and defense systems against such attacks is automation, so that it can be applied to data security. The system is built to prevent attacks on computer networks with more specific on THC - Hydra. This system will analyze the number of errors in the log into the database, and if the error exceeds the tolerance rules are made by the administrator. If the error is more than 3 times in one minute, then with automation, the system will create a rule that can imprison users who do not have such access, and access to the prison in the illegal user can not perform such activities on legal access and access to activities conducted illegal user can be recorded on a file and jail.txt. So under any circumstances and not in supervising administrator, the security of other user data will be safe and can not be retrieved or viewed by a user of illegal access.