Claim Missing Document
Check
Articles

APLIKASI BANGUNAN BERSEJARAH DI JAKARTA DENGAN MENGGUNAKAN MACROMEDIA FLASH 8.0 Adly Hilman Maris; Yudi Irawan Chandra
Jurnal Manajemen Informatika 2010
Publisher : Jurnal Manajemen Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penulisan ilmiah ini berisi tentang sebuah Aplikasi Bangunan Bersejarah yangada di Jakarta. Aplikasi ini dibuat untuk membantu user yang ingin mengetahuiinformasi tentang perkembangan sejarah museum dengan tampilan yangmenarik dan interaktif dan menerapkan teknologi informasi yang sedangberkembang saat ini. Dalam penulisan ilmiah ini, penulis membuat aplikasidengan menggunakan Macromedia Flash 8.0 dengan bahasa pemogramanActionScript 2.0 untuk memudahkan penulis dalam pembutan aplikasi tersebutyang menampilkan text, gambar bergerak dan suara. sehingga dapat diharapkanlebih menarik minat para pengguna dalam mengenal bangunan bersejarah yangada di jakarta. Daftar Pustaka : 16 (2001-2008)
BUILD COMPUTER NETWORK USING TCP / IP VERSION 6 Yudi Irawan Chandra
JAKSTIK Journal Vol 3, No 1 (2003): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper will explain about IP version 6 and how pengalokasiannya. This time to request anIP address that has been done through agencies appointed by the IANA (Internet AssignedNumbers Authority) which is determined on a regional basis, such as APNIC (Asia PacificNetwork Information Center), which handles special requests IP addresses for the AsiaPacific region, including areas served by APNIC is Indonesian. Similar organizations thathandle regions of North America, South America, the Caribbean, and Sub-Saharan Africa isARIN, whereas in Europe, the Middle East, and parts of Africa is the RIPE-NCC.
VIRUS ATTACK PREVENTION TECHNIQUES USING LOCAL VISUAL BASIC SCRIPT AND TEXT EDITOR Yudi Irawan Chandra
JAKSTIK Journal Vol 3, No 1 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The rapid development in recent local viruses that sometimes infect your computer,demanding to take part should start thinking about how to manufacture pencegahnya. This isnecessary, because the local virus is sometimes difficult to detect by some leading anti-virus,antivirus, except by some local-made which was then published as an antivirus that canhandle one or several types of local virus. This could occur because the virus might havecaused the local work is not as generally non-local viruses, so that out of the standard virussearches, for example, only rarely local virus that infects exe files or com files or the other,making it very difficult to detect as a virus or not, except when the virus has been reportedand detected by antivirus software maker, the new virus could be overcome, again created bythe assumption that the virus a step ahead of antivirus. One cause of the difficulty ofdetecting these local viruses, since almost no different from ordinary files, let alone the virusis also using the local language. One side might be proud, because some names of local virusis Indonesian, and has become a name in the database list of international virus. Now it's timeto try to disassemble the local virus defense manual, which these techniques may someday beable to create a simple antivirus. Dismantle local virus defense techniques using visual basicscript and bahsa edior text refers to the target of securing some vital parts infected by thevirus, such as the Registry, MSCONFIG, sysedit, cmd, folder windows, system32 and manymore. This meant that by understanding the techniques, we expect it to disassemble the viruspertahahanan able to prevent the virus infecting computers earlier, this is in line with theassumption that prevention is better than cure.
DATA SECURITY DESIGN HEALTH SYSTEM USING cryptographic SmartCard Yudi Irawan Chandra
JAKSTIK Journal Vol 3, No 2 (2003): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Person's medical record information is one factor that determines the quality of serviceprovided by central health care services to patients and, therefore, this medical recordinformation should always be there when needed. Confidentiality of medical recordinformation is very important because this information to explain the special relationshipbetween patient and physician, which must be protected from leakage according to the codeof medical ethics and the applicable legislation.Smart card technology (smartcard) offers convenience and security of data storage because ofthe mechanism for data encryption before the data is stored in memory, and the pin (secretcode) that maintain such data in order not to be read by unauthorized parties. Smartcard canalso be easily carried so as to ensure the availability of data whenever needed.
DETECTING trojan virus, PREVENTION STEPS TO YOUR COMPUTER SYSTEM Handling Yudi Irawan Chandra
JAKSTIK Journal Vol 3, No 2 (2004): Journal
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Trojan Horse or better known as the "Trojan" in the computer system is part of a digitalinfection whose presence is not expected by the owner of the computer. Trojan consisting offunctions of unknown purpose, but the outline has destructive properties. Trojans go into acomputer over a network is inserted at the time by surfing with physical media.Trojans do not take effect directly as well as computer viruses, but the potential hazards canbe far greater than computer viruses. Trojans can be activated and controlled by remote orusing the timer. Remote control as well as the Remote Administration Tools, which is theserver version will be controlled by the attacker through his version of the client. Many thingscan be done by an attacker if the victim's computer that has been controlled. Certain unusualports open trojan indicate active eventsHandling Trojan can be done in two ways, namely prevention (preventive) and treatment(recovery). Prevention efforts conducted prior to the occurrence of infection, namely effortsto keep the system has no security holes. Treatment of business conducted after the system isinfected, the effort to close security holes that have been exploited and eliminate the cause ofinfection.Understanding of the nitty gritty of Trojans need to be known by Internet users to avoid orminimize attacks against him and be able to perform the treatment if infected.
DESIGNING AND MAKING authentication server DISTRIBUTED SYSTEM BASED ON XML Yudi Irawan Chandra
JAKSTIK Journal Vol 4, No 1 (2005): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Not completely secure computer networks from a variety of attacks and weaknesses of thesystem that can be exploited so that it can cause overall system failure. On the other hand,handling the security aspects of the application is still done in conjunction with thedevelopment of business processes so that the resulting system will not become effective ifthe application has many users with a variety of diverse access rights. In addition, efforts tointegrate various kinds of applications become more complex because each application has itsown method with limitations on certain platforms. Based on this background developed anauthentication server. How the authentication server is the first time by listing all theattributes In addition, registration applications must also include a list of users and accessrights. Client application then sends the user data and applications to a server identityauthentication each time a user login request. Before data is sent, the data is encrypted andthen converted to XML format. Arriving on the server, the data is then translated into textform and then decrypted into plaintext. These data are used as parameters to be validated byfirst passing the port knocking. If the validation is successful port knocking, then the specialsession will be created for that user. Then the session will be returned to the application to beprocessed further. Almost the same process also applies if the user requesting access to aprocedure. The difference lies in the validation process which involves the examination of thevalidity of the session, permissions, parameters and requirements can be met. While in thelogoff process, limit switches so that the user session is terminated can no longer perform theaccess. The existence of authentication server integration proved to facilitate a variety ofapplications under a single security system for all XML-formatted data is transferred. Inaddition, the ease of integration flexibility is also evidenced by the authentication server forcoordinating the various applications and users that use it. On the other hand, authenticationserver also serves to improve the security system shown in the form of resistance to theplaintext data reading, the man in the middle attacks and unauthorized access.
TELECOMMUNICATIONS NETWORK THROUGH SIGNAL INJECTION POWER "POWER LINE COMMUNICATION" Network Connection INTERNET AS AN ALTERNATIVE Yudi Irawan Chandra
JAKSTIK Journal Vol 5, No 1 (2006): JOURNAL
Publisher : STMIK Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The flow of electric current in a sinusoidal wave form apparently can be used for voice communication and data signals known as Powerline Communications (PLC). How is the concept?, In sederana this analogy that the electrical current can flow like water to generate waves and sea foam. Is the current wave, while the foam form of noise. Noise is utilized by the PLC technology to deliver voice and data signals.  Internet presence by some of our communities is a means of communication are quite expensive, so use only a limited circle only. One reason can we say, access the Internet through a telephone line which is very slow, it raises the amount of money should we spend. What's the solution? the answer is Digital Power Line technology. 
BUILD COMPUTER NETWORK USING TCP / IP VERSION 6 Yudi Irawan Chandra
Majalah SIKOMTEK Vol 4, No 1 (2004): Sikomtek
Publisher : Majalah SIKOMTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper will explain about IP version 6 and how pengalokasiannya. This time to request anIP address that has been done through agencies appointed by the IANA (Internet AssignedNumbers Authority) which is determined on a regional basis, such as APNIC (Asia PacificNetwork Information Center), which handles special requests IP addresses for the AsiaPacific region, including areas served by APNIC is Indonesian. Similar organizations thathandle regions of North America, South America, the Caribbean, and Sub-Saharan Africa isARIN, whereas in Europe, the Middle East, and parts of Africa is the RIPE-NCC.
Automatic Garden Umbrella Prototype with Light and Rain Sensor Based on Arduino Uno Microcontroller Chandra, Yudi Irawan; Riastuti, Marti; Kosdiana, Kosdiana; Nugroho, Edo Prasetiyo
International Journal of Artificial Intelligence & Robotics (IJAIR) Vol. 2 No. 2 (2020): IJAIR : November
Publisher : Informatics Department-Universitas Dr. Soetomo

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2810.471 KB) | DOI: 10.25139/ijair.v2i2.3152

Abstract

Park is a green open space widely used by the community to carry out various activities ranging from recreation, playing, sports, and other passive activities. Current weather conditions are often uncertain. This makes people inconvenient when it rains suddenly, especially when outdoors such as in parks. Because if they don't immediately take shelter when it rains, it can make the body sick, besides that, rainwater can damage the non-waterproof gadgets they carry. In other conditions, when the weather is bright, and the sun is shining hot, it can make people feel hot and lazy to do outdoor activities in the park. Therefore, an automatic umbrella tool was made that functions as a shelter in the garden. In this tool, there is a light sensor module and also a rain sensor, which is controlled with the Arduino Uno microcontroller as an input data processor and an L298N motor driver, which functions to regulate the speed and direction of the DC motor rotation (to the right and left) as an umbrella drive. When the motor rotates to the right, the umbrella will open, while when the motor rotates to the left, the umbrella will close again.
APLIKASI SISTEM PAKAR UNTUK MENDIAGNOSA PENYAKIT PARU PADA ANAK MENGGUNAKAN METODE RAPID APPLICATION DEVELOPMENT (RAD) Dian Gustina; Yudi Irawan Chandra
Prosiding Semnastek PROSIDING SEMNASTEK 2015
Publisher : Universitas Muhammadiyah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penggunaan teknologi informasi untuk keperluan akses berbagai informasi saat ini telah memasyarakat secara luas, termasuk digunakan untuk mengakses informasi kesehatan seperti kesehatan paru pada anak. Sistem Pakar adalah satu cabang kecerdasan buatan yang membuat penggunaan secara luas knowledge yang khusus untuk penyelesaian masalah tingkat manusia yang pakar. Kebutuhan informasi yang cepat dan tepat dari seorang pakar kesehatan anak sangatlah dibutuhkan. Hal inilah yang mendorong pembangunan sebuah sistem pakar kesehatan paru anak untuk diwujudkan. Pembangunan aplikasi ini bertujuan untuk membuat sebuah sistem berbasis pengetahuan kedokteran dalam mendiagnosa penyakit paru serta menyajikan informasi secara cepat dan efisien kesehatan paru anak tersebut. Metode Rapid Application Development (RAD) digunakan dalam pembangunan aplikasi ini karena merupakan salah satu metode pembangunan sistem yang ditujukan untuk menyediakan pengembangan yang jauh lebih cepat dan mendapatkan hasil dengan kualitas yang lebih baik dibandingkan dengan hasil yang dicapai melalui siklus tradisional. Aplikasi ini dibuat dengan menggunakan bahasa pemrograman JAVA dan berjalan melalui software AppInventor di platform Android.
Co-Authors Abdul Hakim Achmad Sarif Adly Hilman Maris Adly Hilman Maris Agus Budi Setyawan Ahmad Ilham Shalaby Ambar Ari Astuti Anak Agung Sri Rahayu Anak Agung Sri Rahayu Anargya Satya Rifisyah Putro Andhi Hariyanto Andre Pratama Putra Andri Hidayat Anis Mirza Anugrah Ramadhan Bagaskara Aqwam Rosadi Kardian Ariyanto Ariyanto Ariyanto Ariyanto Artha Wulan Dhika Artha Wulan Dhika Asmoro, Eko Tri Awaludin Awaludin Bagaskara, Anugrah Ramadhan Dian Gustina Dian Gustina Dian Gustina, Dian Diana, Desy Dicky Hidayat Diyah Ruri Diyah Rury Irawati Doni R Djafar Doni R. Djafar Eko Tri Asmoro Erick Orlando Eriek Erlando Eriek Orlando Eris Kurniawan Ferri Yusra Ferri Yusra Finna Rachmania Fitri Sjafrina Fitriani, Risma Rahmalia Harlina, MS Harry Busura Harry Zulfikar Heri Iskandar Heri Kiswanto Hilman Adly Maris Imron Maulana Irawati, Diyah Ruri Irawati, Diyah Rury Ire Puspa Wardhani Irfan Irfan Fauzy Irfan Fauzy Kodsiana Kodsiana Kosdiana Kokoy Rokoyah Kokoy Rokoyah Kosdiana Kosdiana Kosdiana Kosdiana Kosdiana Kosdiana Kosdiana Kosdiana, Kosdiana Kristina Airinia Lukman, Saepul Lusita, Melani Dewi Maria Magdalena Pur Dwiastuti Maria Sri Wulandari Marti Riastuti Melani Dewi Lusita Mirza, Anis MMSI Irfan ,S. Kom MMSI SKom Diyah Ruri Irawati MS Harlina MS Herawati Munich Heindari Ekasari Munich Heindari Ekasari Nanang Harianto Nasrul Nasrul Nugroho, Edo Prasetiyo Nur Azis Nur Azis Nurzaman, Fahrul Orlando, Eriek Pipit Dewi Arnesia Purba, Minda Mora Purtiningrum, Susi Wagiyati Putra, Noval Dwi Putri Soraya PUTRI SORAYA Rahayu Noveandini Rahmat Hidayat Rahmat Kurniadi Willyadi Rahmat Kurniadi Willyadi rfan Fauzy Risma Rahmalia Fitriani Rokoyah, Kokoy Rudi Atur Ruri, Diyah Samlawi Samlawi Satrio Junianto Prayitno Setiawan, Rino Yulendri Siska Wulandari Sjafrina, Fitri Sugeng Prasetyo Nugroho Sukmarani, Wendri Surya Darma Susi Widayati Sutarno Sutarno Sutarno Sutarno Taufik Zulfika Titi Ayem Lestari Titi Ayem Lestari, Titi Ayem Untara Untara Untara Untara Wendri Sukmarani Winda Sari Br. Purba Wismo, Agus Yoestian Abdullah Yudhi Destri Young Yuliani, Nafisah Yundari, Yundari