Claim Missing Document
Check
Articles

Found 10 Documents
Search
Journal : TEKNOLOGI INFORMASI

MODEL PEMBELAJARAN TEKNOLOGI INFORMASI DAN KOMUNIKASI PADA SEKOLAH LANJUTAN TINGKAT PERTAMA Setyowibowo, Sigit
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 3 NO. 1 TAHUN 2012
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The use of computers today are not just limited to the processing and manipulation of data alone but can also be used to create application programs related to education, especially the lessons of ICT by using a recorded human voice first. The purpose of this study was to create a learning application program of ICT in an interactive and communicative-based computer so that in the learning process is expected to run in both directions. The program also aims to reduce the saturation of the students in receiving the material being taught. Software (software) to program a computer learning aids Information and Communication Technology was created using Macromedia Flash program. Keywords: Help Program, Information and Communication Technology, Macromedia Flash
APLIKASI SISTEM PENDUKUNG KEPUTUSAN DIAGNOSA PENYAKIT PARU-PARU DENGAN METODE FORWARD CHAINING Yunus, Mahmud; Setyowibowo, Sigit
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 2 NO. 2 TAHUN 2011
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In Indonesian lung disease have a high death. Tubercolosis (TB) world report (2006) by World Health Organization (WHO), Indonesia still the third biggest after India and China with around 539.000 cases and around 101.000 peoples die for a year. Derived from those fact it need more attention from mass society. My research can be used to decision support system which used to lung disease diagnosed, and know what kind of disease from their symptom. Decision support system use production rule method for representating knowledge about the kind of lung disease and their symptom. This inference engine use tree method and forward chaining. Result derived from this research shown that tree method and forward chaining can be used in finding lung disease from their symptom.  Key words: tree, forward chaining, lung.
IMPLEMENTASI SNORT SEBAGAI ALAT PENDETEKSI INTRUSI MENGGUNAKAN LINUX Setyowibowo, Sigit; Affandi, Mohammad
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 4 NO. 2 TAHUN 2013
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Network security system on the server is an important factor to ensure the stability , integrity and validity of the data . Implementation of Snort -based Intrusion Detection System can save the cost of procurement of software because it is free and quite reliable in detecting security attacks . Snort -based IDS systems can be implemented on the Linux operating system . Snort main settings and network settings , especially on existing Snort rule . An attack can be detected or not by SnortI IDS , depending on the presence or absence of an appropriate rule. Testing the IDS system was done with several attack patterns to test the reliability of Snort to detect an attack against the security system . Based on the results of testing the system Snort IDS with ping , nmap port scanning , exploits , SQL Injection , accessing the database . Snort can provide warning of an attack against the security of a network system . The warning results can be used as a reference for determining the network security policy. Key words : Linux , Intrusion Detection System , Snort
MEMBANGUN SERVER VOIP DENGAN ASTERISK DI LINUX BESERTA ADMINISTRASI USER BERBASIS WEBSITE Setyowibowo, Sigit; ., Syahminan
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi VOL. 1 NO. 1 TAHUN 2010
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of computer network allows for rapid pass voice traffic over computer networks or common called VoIP (Voice Over Internet Protocol). Voice over Internet Protocol (VoIP) is a technology capable of passing voice traffic and video or even a form of data packets over a computer network based on IP (Internet protocol). Major emphasis of VoIP (Voice Over Internet Protocol) is the cost. With two locations that are connected to the internet or network then the conversation becomes very low cost even close to free (Rp0, 00 -). This system is designed using an asterisk on fedora 7 -1.6.0.13 Keywords : VoIP (Voice Over Internet Protocol)
ANALISIS ONLINE SHOP DI INDONESIA MENGGUNAKAN TOOLS ALEXA.COM KATEGORI FORUM ONLINE DAN IKLAN BARIS Setyowibowo, Sigit; Firdaus, Nasrul
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi Vol 6 No 1 Tahun 2015
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Perkembangan teknologi informasi yang semakin pesat menimbulkan banyak hal baru bermunculan salah satunya yaitu online shopping, Online Shopping adalah pembelian barang maupun jasa yang dilakukan melalui internet, Indonesia menduduki peringkat ke-4 tertinggi di Asia Tenggara dalam populasi pemakaian internet pada tahun 2014, hal ini mengindikasikan bahwa Indonesia merupakan pasar yang menjanjikan dalam bisnis online shopping. kaskus.co.id, berniaga.co.id, olx.co.id merupakan contoh dari beberapa situs online shooping diindonesia, penelitian ini bertujuan untuk memberikan rangking dari ke-3 situs tersebut untuk nantinya dapat digunakan sebagai bahan pertimbangan bagi penjual dalam memasarkan produknya. Penelitian ini mengguna menggunakan situs pemeringkatan dalam metode pemberian rangking yaitu alexa.com Keywords: online shoping, forum online , alexa.com
KEAMANAN AUTHENTIKASI HOTSPOT MENGGUNAKAN CAPTCHA Prasetyo, Kiki Pradikta; Widiyanti, Rahayu; Setyowibowo, Sigit
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 6 NO 2 TAHUN 2015
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Hotspot networking SMKMuhammadiyah2Malang do not have a good security system that can be used by unauthorized users. With the issue of the security system research and design that has a hotspot networks security level better than before. The purpose of this study is to secure hotspot network of ilegal users by adding a captcha in the authentication process using MikroTik hotspot. Data collection methods used to analyze the data and make the information that will be used to determine the problems faced. System development method using the waterfall method. The use of captcha on the authentication process hotspot login page in SMK Muhammadiyah 2 Malang using Mikrotik has not been able to provide evidence of the power system network security hotspot. This is evidenced by the test using a brute force attack techniques. The testing process using the same time frame with the type of passwords that are very weak and not obtained differences of the results achieved. Hotpsot proxy authentication security system based captive portal using only user and password as the authentication process already has a good level of security even without using captcha. Keyword:Networking Security, authentication, hotspot, captcha.
IMPLEMENTASI QUALITY OF SERVICE DENGAN METODE QUEUE TREE PADA KAMPUS STMIK PRADNYA PARAMITA MALANG Setiawan, Daniel; Setyowibowo, Sigit
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 8 NO 2 Tahun 2017
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Bandwidth management on network system is very important to regulate how much bandwidth to be received by each user. One method is to use a method of bandwidth management queue tree. Queue tree method can provide a fair and equitable bandwidth according to the user that is connected to the network system. Researchers have goals implement bandwidth management with methods queue tree along maximize quality of service on campus STMIK Pradnya Paramita Malang. Internet users on campus STMIK Pradnya can get a fair and equitable bandwidth according to its use. Based on the results of tests that have been conducted by researchers, that the network system that has been created to maximize the quality of service by using the queue tree method can be implemented on campus STMIK Pradnya Paramita Malang. And students can use the internet as appropriate.Keywords: , Queue Tree, Bandwidth Management, Network System
SISTEM INFORMASI WISATA KULINER BERBASIS WEB SEBAGAI MEDIA PROMOSI KULINER DI KOTA MALANG Farida, Eni; Setyowibowo, Sigit
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi VOL 9 NO 1 Tahun 2018
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Limited information about the place to eat in Malang city, such as food type, food price,eating location, dining hour become reference to provide complete information to tourists. To helptourists or local people looking for information on where to eat, needed a medium capable provideinformation on the address of the place to eat, the type of food served, the hours of operation, andthe price of food. The purpose of this research is the development of a web-based application ofculinary tourism information system in the city of Malang that can help the tourists or locals whowill find a place to eat recommendations in the city of Malang. Based on a series of stages ofresearch conducted it can be concluded that the culinary tourism information system in the city ofMalang can provide convenience for the tourists or residents in the search for information oneating places in Malang. Detailed and accurate information can help the tourists and localresidents in deciding where to eat they will choose Keywords: wisata, kuliner, wisatawan
IMPLEMENTASI SISTEM KEAMANAN JARINGAN MENGGUNAKAN METODE PACKET FILTERING BERBASIS ASA 5520 PADA PT. XYZ Putra, Agung Triwicaksono; Setyowibowo, Sigit; Arifin, Samsul
JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi Vol 10 No 1 Tahun 2019
Publisher : JURNAL TEKNOLOGI INFORMASI: Teori, Konsep, dan Implementasi

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

PT. XYZ is one of the fourth largest cigarette producers in Indonesia with a market share of 7%. Has more than 40 marketing offices spread throughout Indonesia. Every branch offices have sales that using public internet to upload and download data from headquarter server’s. Constraints faced by PT. XYZ that public server used for upload and download process was down due to attacker from external network, causing disruption to sales team activities. Sales team can’t achieve the target to visit 6427 outlets from total 64980 outlets. The purpose of this research is to develop a network security system environment that able to protect internal servers of PT. XYZ from the threat both internal network and extenal. This study implemented using packet filtering method that applied to CISCO ASA 5520 device. The network security system that already implemented are able to protect the server from unauthorized security threats so it does not interfere sales team's operations. Keywords: Network Security, Packet Filtering, ASA 5520
Kunci Otomatis Berbasis Internet of Things dengan Mikrokontroler NodeMCU Jayanti, Ratna Dwi; Setyowibowo, Sigit; Widarti, Dinny Wahyu
Teknologi Informasi : Teori, Konsep, dan Implementasi : Jurnal Ilmiah Vol 11 No 1 (2020): JURNAL TEKNOLOGI INFORMASI: Teori, Konsep dan Implementasi Vol 11 No 1 Tahun 202
Publisher : LPPM STIMATA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36382/jti-tki.v11i1.487

Abstract

Penguncian rumah pada umumnya menggunakan gembok konvensional atau gembok besi yang harus mempunyai kunci fisik untuk dapat membuka atau menutup gemboknya. Kunci konvensional mempunyai kelemahan antara lain mudah rusak dan jika kunci fisik hilang maka gembok tidak dapat dibuka dan jika lupa mengunci akan memberikan akses kejahatan. Penerapan teknologi elektronik sebagai salah satu solusi dinilai paling relevan untuk diterapkan. Salah satu kunci elektronik yang dapat diaplikasikan adalah kunci solenoid yang merupakan gabungan antara kunci dan solenoid yang biasa digunakan dalam elektronisasi suatu perangkat seperti kunci otomatis dan lain-lain. Aplikasi kunci solenoid dapat menjadi solusi keamanan rumah dengan menggabungkan kunci solenoid dengan Arduino dan Smartphone Android. Dimana smartphone merupakan media pengontrol pintu rumah dengan menggunakan fitur Wifi pada smartphone yang terhubung dengan sistem mikrokontroler Arduino. Arduino sebagai input untuk membuka dan mengunci secara otomatis pada solenoid lock. Penelitian ini menghasilkan rangkaian mikrokontroler Arduino dengan smartphone Android sebagai perangkat rumah pintar dan membantu pengguna dalam memantau dan mengendalikan pintu dan jendela.