Claim Missing Document
Check
Articles

Found 8 Documents
Search
Journal : Compiler

PERANCANGAN ALGORITMA ANGGI (AA) DENGAN MEMANFAATKAN DIFFIE-HELLMAN DAN RONALD RIVEST (RC4) UNTUK MEMBANGUN SISTEM KEAMANAN BERBASIS PORT KNOCKING Suhendar, Anggi Sri Septiani; Sajati, Haruno; Astuti, Yenni
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (154.818 KB)

Abstract

In managing a server, an administrator takes a variety of ways for ensuring the safety and cosiness of the system. One type of threat that attack on the server is done on a port that is in an open state, thus making people who do not have access rights to perform port scanning to infiltrate into the server. One solution to cope with the attack on the port can be done by using port knocking. Port knocking is a method that can be applied to the server with the workings of such a code to unlock the safe. Port knocking is done by inserting a predetermined port sequenced to open a specific port. At the port sequenced delivery process takes an additional authentication likes keyport. Anggi algorithm (AA) is an algorithm that is built by combination o f Diffie-Hellman and RC4. The algorithm is used for encryption and descriptions a keyport from client side to the server side. In the process of sending a keyport to be modified by using the arithmetic calculation. Process of encryption and description keyport is done to prevent some attacks on the server by hackers with extracting such information after successfully breaking into a port. The results o f implementation AA algorithm on the process of port knocking can secure the delivery process o f keyport and improve the security o f server.
CLUSTERING FILE TERDISTRIBUSI Astuti, Yenni; Ali Akbar, Muhammad Harikem
Compiler Vol 4, No 2 (2015): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (168.261 KB)

Abstract

The development of information technology is increasing at this time, certainly makes it easy for users of the technology itself. One of them in transferring files in a distributed manner, there are many types of files that make it difficult admin in selecting and classifying the file and then will be distributed to each - its own servers. By creating a new system that will facilitate Clustering distributed file an admin in file transfer without having to select the files to be distributed, because the system will automatically read from the file types that will be distributed on its own servers - each.
PEMANFAATAN HISTORY PADA BROWSER KOMPUTER UNTUK MENENTUKAN PEMILIHAN WEBSITE ATAU BLOG PADA SEOINDONESIA Adi Arlina, Ketut Agus; Astuti, Yenni
Compiler Vol 3, No 2 (2014): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (187.771 KB)

Abstract

Seoindonesia is a web based application that is used to boost the ratings visitors of website or blog using Together in Single Connection (TSC) technique. In this software, the selection of blogs or websites that would be raised using a lowest ratings pattern. Website or blogs listed on Seoindonesia opened by random with choosing some websites or blogs that has the lowest ratings. The selection of a websites or blogs randomly, causing discomfort to the user side. One way to access and improve seoindonesia is to use history on the browser. History on the browser is a facility to record and store data of story browsing and use of the internet search history. Utilization history on browser can only be accessed by using the extension. Extensions is a plug-in applications that have a specific function and can be installed on a computer's browser. Web browser noted most frequently visited of history or blog and than sent to the extensions can be used to direct the opening of a new website or blog address in accordance with the categories of the previous website address. Website or a blogsposted by extension,is a member of seoindonesia, so it can increase the number of visitors who will rise the rank, with an increase of 64% (7 points) and 36% (4 points) decreased with the overall function of the test is 11 points in seo alexa rank.Application development by using a browser on computer,able to improve the system seoindonesia on the grouping and categorizing of website or blog.
PEMANFAATAN INTRUSION DETECTION SYSTEM (IDS) SEBAGAI OTOMATISASI KONFIGURASI FIREWALL BERBASIS WEB SERVICE MENGGUNAKAN ARSITEKTUR REPRESENTATIONAL STATE TRANSFER (REST) Awangga, Demmy Nanda; Sajati, Haruno; Astuti, Yenni
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (300.762 KB)

Abstract

Many things can destabilize a computer network connections, both with regard to hardware and software. Therefore, we need a technique for network security, one of them is firewall. The problems that arise in this final project is to build a linux based firewall automation application via web service by using REST (Representational State Transfer) architecture and IDS (Intrusion Detection System). The system buid firewall rules using linux operating system with the help o f 2 pieces o f IDS to detect theactivities of traffic data between the intruder and the server that will be recorded in the IDS database. The system will compare the server with IDS on the router to get the IP address o f the actual intruders, so it will be blocked by the firewall. The applications is used to prevents the ping o f death attack usingweb service and REST protocol so that firewall rules will run automatically.
ANALISIS KEBUTUHAN BANDWIDTH DENGAN MODEL SHARING SYSTEM PADA MIKROTIK ROUTERBOARD 450G DI JARINGAN OFFICE STTA Irawaty, Mardiana; Mulyawan, Ferry; Astuti, Yenni
Compiler Vol 6, No 1 (2017): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (845.235 KB)

Abstract

The limitations between the amount of bandwidth and users can make the internet slow. Observing the flow of data on the internet network is one way to identify the  bandwidth requirements which used on the STTA office network. This thesis analyzes the data traffic with sharing system model. The observed data is in the category of elastic flow rate, i.e: TCP (Transmission Control Protocol). The traffic data is converted to a measured data graph and then  analyzed  by  traffic  load,  throughput,  and  flow  of  loss  parameters.  The  highest observation value of traffic load is 0.37, Throughput of 9.3 Mbps (93%), and the flow of loss of 23%. From the results of the research, it can be concluded that in general internet network at STTA office is in good category.
KONFIGURASI INTER-VLAN PADA CISCO BERBASIS GRAPHICS USER INTERFACE (GUI) SEBAGAI PEMBELAJARAN PERALATAN JARINGAN KOMPUTER CISCO Pratama, Aditya Wisnu; Wintolo, Hero; Astuti, Yenni
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (145.459 KB)

Abstract

Computer network using LAN has limitations in terms of the large number of computers that will be connected to the switch equipment. This limitation can be overcome by connecting the LAN between each other using a router. Networks inter LAN still pose a problem in terms of safety, although the amount can be overcome. To overcome the problem requires a LAN in a small group that is often known as Virtual Local Area Network (VLAN). VLAN can be connected as is often done on the LAN in general with the addition of some equipment that is able to be used as the connecting or known by the name of inter-VLAN. inter-VLAN configuration can be done directly and indirectly. the configuration directly by configuring the network equipment such as switches and routers, while the indirect configuration can be done using packet tracer. In doing inter-VLAN configuration requires a command performed by an administrator. Commands that is configured on the network equipment is a command that is still a command line or a particular script. For people who have not worked as a network administrator needed a software Graphics User Interface (GUI) for ease in studying network administration. Software Graphics User Interface (GUI) can facilitate a person who has worked as an administrator to configure inter-VLAN.
Performance Analysis of Wireless Local Area Network Using Router Tenda N-300 Waluyo, Catur Budi; Erik, Alber; Astuti, Yenni
Compiler Vol 8, No 1 (2019): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (819.784 KB) | DOI: 10.28989/compiler.v8i1.424

Abstract

Today's wireless communication system is a trend for the information society. This is inseparable from communication needs with high mobility and low costs. One of them is the Wireless Local Area network with the IEEE 802.11 standard. Wireless LAN is a communication technology that uses radio wave transmission media by utilizing free space as a transmission line. The transmitted signal is strongly influenced by distance, frequency, transmitter power, receiver sensitivity, and antenna gain. A loss occurs in the process of transmitting data from the sender to the recipien. In order to no loss that occurs, it requires a good performance, and a wide coverage area. The purpose of this study is to analyze the QoS data, calculate the coverage area, receiver power, and compare the results of theoretical calculations with the measurement results. The analysis results show the average throughput for each data rate of 6 Mbps, 15 Mbps and 35 Mbps at 383.8 kbps, 328.2 kbps and 329.8 kbps. The average delay is 5.28 ms, 4.81 ms and 4.66 ms. The average packet loss is 2.83% ms, 2.66% ms and 2.16% ms. The average jitter is 0.036 ms, 0.032 ms and 0.014 ms.
Recognition of Hand Gestures Using Image with Histogram Feature Extraction and Euclidean Distance Classification Method Astuti, Yenni; Sudaryanto, Sudaryanto; Ariyanti, Indah Dwi
Compiler Vol 13, No 2 (2024): November
Publisher : Institut Teknologi Dirgantara Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28989/compiler.v13i2.2640

Abstract

Human-Computer Interaction technology allows humans to communicate with computers using natural language such as gestures. One of the gestures used by humans to communicate is hand gestures. In this research, hand gestures are recognized using images that represent pitch, roll, and yaw movement. As a feature extraction method, the histogram is used, while the classification method used is the Euclidean distance. From the experimental results, the combination of the histogram feature extraction method and the Euclidean distance classification method had an accuracy of 30 percent for images representing pitch and yaw movements, and 60 percent for images representing roll movements.