Articles
PENERAPAN SEO (SEARCH ENGINE OPTIMIZATION) MENGGUNAKAN TEKNIK TOGETHER IN A SINGLE CONNECTION (TSC) DALAM MENINGKATKAN KUNJUNGAN PADA SEBUAH BLOG
Devia Tito Setyaningsih;
Hero Wintolo;
Dwi Nugraheny
Compiler Vol 1, No 2 (2012): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (243.293 KB)
|
DOI: 10.28989/compiler.v1i2.13
One of the internet service used by the people of Indonesia is a blog that can be accessed via http://blogspot.com or http://wordpress.com and others. Everyone can use this medium for the purpose of publication of information in the form of text, images, sounds, or video without having to master web programming languages. One of the obstacles a person who has a blog is a way of increasing number of visitors to his blog. In order for many visitors the blog owner needs to understand about SEO (Search Engine Optimization).To allow users to blog in increasing the number of visitors and ranking his blog, they invented a system that utilizes parallel processing techniques and create a new method, named TSC (Together in a Single Connection) to increase the number of visitors, number of pages viewed and ranking.Increase blog traffic system based on parallel processing can improve the effectiveness in increasing traffic to a blog. With this system the blog owner is expected to be easier to rise to visit his blog.
USE VLSM (VARIABLE LENGTH SUBNET MASKING) ANDROID BASED SIMULATOR FOR ADMINISTRATIVE SUPPORT NETWORK
Bimio Wahyu Aji;
Hero Wintolo;
Dwi Nugraheny
Compiler Vol 2, No 1 (2013): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (133.783 KB)
|
DOI: 10.28989/compiler.v2i1.30
Administration o f networking IP addressing especially IP version 4 have a less using IP address for the limited. Through for the using by networking o f services base on TCP/IP addressing, however that can be used VLSM (Variable Length Subnet Masking) method o f subnetting addressing thorough the public area networking to divided IP addressing private it's called as sub network ID or Local Area Network (IP private). Therefore dividing have choose a calculate IP addressing o f VLSM Method used by simulator calculating IP address subnetting. The use o f goal-based subnetting android simulator to facilitate the distribution o f IP within the network administrator by using the simulator VLSM IP subnetting calculations automatically and efficiently. An application that helps administrators in calculating VLSM subnetting IP, to support network administration so that administrators can make solving the network ID into sub-networks. IP results obtained from the simulator, can be tested with VLSM on various internet network service providers obtain a quite optimal for purposes o f network administration.
Pemantauan Sebaran Mahasiswa Dikampus Saat Pandemi Covid19 Menggunakan Metode Share Location
Hero Wintolo;
Haruno Sajati;
Evi Wahyuningsih
Jurnal Informatika Vol 10, No 1 (2023): April 2023
Publisher : LPPM Universitas Bina Sarana Informatika
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31294/inf.v10i1.15055
Penelitian ini membahas penanganan pandemic saat virus corona masih tinggi penularannya pada kegiatan belajar mengajar di kampus Institut Teknologi Dirgantara Adisutjipto yang dilakukan secara offline. Metode yang digunakan adalah share lokasi yang dilakukan oleh mahasiswa melalui smartphone yang dimilikinya. Data share lokasi yang berupa data GPS direkam dan diproses pada server dan ditampilkan dalam bentuk titik pada peta. Data ini dikirimkan oleh mahasiswa saat akan masuk ke dalam kampus, tempatnya di pos satpam melalui aplikasi yang diakses melalui QR code yang ditempelkan pada pos tersebut. Di pos satpam juga disediakan computer yang dapat mengakses aplikasi pada sisi server untuk memantau psosisi dan jumlah mahasiswa yang masuk ke dalam kampus. Data-data tersebut ditampilkan dalam sebuah peta yang merupakan perangkat lunak yang dibuat pada penelitian ini dengan memanfaatkan Application Program Interface (API) Google Map. Hasil dari penelitian menunjukan bahwa sebanyak 20 orang mahasiswa yang akan mengikuti perkuliahan offline pada ruang Halim 2 Gedung Halim Perdanakusuma Institut Teknologi Dirgantara Adisutjipto. Dari 20 orang yang mengisikan data, 14 orang berhasil mengirmkan data dan 6 orang gagal mengirimkan data. Kegagalan terjadi karena perangkat lunak yang dibangun untuk penelitian ini hanya bisa digunakan pada smartphone berbasis android. Kegagalan pengiriman data koordinat pada smartphone terjadi pada merk iphone. Data 14 mahasiswa yang berhasil mengirimkan koordinatnya. dari 14 orang pengunjung itu 12 terdeteksi berada didalam Halim 2 sedangkan 2 orang lainnya berada diluar Halim 2, padahal 14 orang tersebut berada didalam Halim 2 sehingga kualitas GPS pada smartphone masing-masing mahasiswa ini dapat dikatakan tidak sama. This research discusses the handling of pandemics when the coronavirus transmission is still high in teaching and learning activities on the campus of the Adisutjipto Institute of Aerospace Technology which are carried out offline. The method used is a location sharing by students via their smartphones. Location share data in the form of GPS data is recorded and processed on the server and displayed in the form of dots on the map. This data is sent by students when they are about to enter the campus, where it is at the security post through an application that is accessed via a QR code attached to the post. The security guard post also provides computers that can access applications on the server side to monitor the position and number of students entering the campus. These data are displayed in a map which is software created in this study by utilizing the Google Map Application Program Interface (API). The results of the study showed that as many as 20 students would take offline lectures in the Halim 2 room, the Halim Perdanakusuma Building, Adisutjipto Institute of Aerospace Technology. Of the 20 people who filled in the data, 14 people succeeded in sending data and 6 people failed to send data. The failure occurred because the software built for this research could only be used on Android-based smartphones. Failure to send coordinate data on a smartphone occurs on the iPhone brand. Data from 14 students who successfully submitted their coordinates. of the 14 visitors, 12 were detected inside Halim 2 while 2 others were outside Halim 2, even though 14 of these people were inside Halim 2 so the quality of the GPS on each student's smartphone could be said to be not the same.
Descriptive Analysis and ANOVA Test with File Sending on Computer Networks Attacked with Rogue's Dynamic Host Configuration Protocol (DHCP)
Hero Wintolo;
Yuliani Indrianingsih;
Wahyu Hamdani;
Syafrudin Abdie
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 9, No 2 (2023): June
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.26555/jiteki.v9i2.26167
The requirement for a computer that is physically connected to a computer network to be able to access existing resources on a computer network in the form of an IP address obtained statically or dynamically. On a static IP address, there are not many problems that arise because it is loaded directly into the computer, while for a dynamic IP address, security problems arise in the form of a dynamic IP address sharing server in the form of DHCP Rogue. The configuration that is added to the first router when the network is hit by a DHCP rogue attack is to configure the main router, in this case, the first router, and the switch used as a connecting device between computers. configuration on both switches is done by snooping trust which is useful for securing IP addresses to avoid IP attackers. This research was conducted to find out if a computer network with a dynamic IP address was attacked by sending files between computers. Files with the longest sending time indicate an attack on the computer network. The method used in this study is the ANOVA test with descriptive-based analysis. Based on the results of the analysis, it is known that the average file transfer time on networks affected by DHCP Rogue is higher than the average file transfer time on normal and mitigated networks, and the significant value of the ANOVA test results has a value of 0.004. In general, it can be concluded that there are differences in data transfer when the network is normal, the network is subject to DHCP Rogue, and the network has been mitigated with DHCP Rogue.
Correlation Analysis in Software Information Dissemination Testing in Regional Apparatus Organizations (RAD) to Support Jogja Smart City
Hero Wintolo;
Sudaryanto Sudaryanto;
Friska Ayu Dhawara
Jurnal Internasional Teknik, Teknologi dan Ilmu Pengetahuan Alam Vol 4 No 1 (2022): International Journal of Engineering, Technology and Natural Sciences
Publisher : University of Technology Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (741.127 KB)
|
DOI: 10.46923/ijets.v4i1.142
The application of information technology is one of the characteristics of smart cities that are used to provide services for their citizens. This application does not only change what previously did not use information technology to use information technology but the uses of software that is specifically used to serve the community so that the service process becomes fast as is done in the Regional Government RAD (Pemda) of Yogyakarta City. Before using a special application, dissemination services were performed using Microsoft Excel which can only be accessed on a computer. The software for information dissemination was tested by distributing questionnaires with questions grouped on Service quality improvement for information dissemination and User satisfaction. The results were processed and analyzed using the correlation method. The result showed a value of sig.(2-tailed) is 0,000, the Correlation Coefficient of 0,400, so it can be concluded that the relationship between improving service quality for information dissemination on RAD and user satisfaction is significant, strong enough, and unidirectional.
Pengembangan Layanan Penyebaran Informasi Akademik Berbasis Android
Gregorius Ferdian F.D.Setyawan;
Hero Wintolo;
Yuliani Indrianingsih
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 2 No. 3 (2018): Januari 2018
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (245.303 KB)
|
DOI: 10.14421/jiska.2018.23-04
E-pengumuman is a multimedia-based information dissemination application that utilizes internet network as data eye media. The use of android mobile apps as a tool for accessing anything connected to the internet helps the customers with information submitted by the app site. Make the Internet as a central storage server to manage data as well as information. Services available on the application can be accessed through student information websites, faculty, and courses. While the news can be accessed via mobile Android. The results of this app testing show that this application can be used as a delivery service and receive information appropriately.
Spanning Tree Protocol (STP) Based Computer Network Performance Analysis on BPDU Config Attacks and Take Over Root Bridge Using the Linear Regression Method
Yuliani Indrianingsih;
Hero Wintolo;
Eviana Yulianti Saputri
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v6i2.703
Spanning Tree Protocol (STP) is used in manageable switch devices that apply more than one path to the connection between switches. This study aims to assist engineer staff in improving STP network security. Furthermore, the benefit is to improve the STP network security system by using the Spanning Tree Protocol and Virtual Local Area Network (VLAN) trunking mitigation techniques. The results of testing data before STP is attacked, after STP attacked, and anticipatory data. Then a simple linear regression analysis is carried out by the result of that there is not a significant relationship between time and size in the DoS attack, which  48.6% of the time variable is influenced by the size of  variable, while  the remaining 51.4% by other variables. Root attack is 43.8%-time variable is influenced by size variable, the remaining 56.2% by other variables. Correlation between Karl Pearson DoS and root, there is a significant relationship between time and size, with the DoS correlation coefficient (-0.697) in contrast root (-0.662), and paired sample t-test (paired sample t-test) can be concluded the anticipation which is done by using BPDU guard and root guard mitigation.
PENERAPAN ALOGRITMA LIPAT PADA STEGANOGRAFI YANG MEMANFAATKAN RMS ( RECORD MANAGEMENT SYSTEM ) DI J2ME
Wintolo, Hero;
Retnowati, Nurcahyani Dewi;
Fendriyanto, Prasetyo
SENATIK STT Adisutjipto Vol 1 (2013): Kreativitas Anak Bangsa untuk Kemajuan Teknologi dan Informasi
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.28989/senatik.v1i0.38
The continued development of technology driven by the growing digital media facilities. A digital device in particular should pay attention to the level of security. Ease of sending messages in both text and image becomes very easy. However, one thing is important in the information, which can be performed using encryption steganography. In this thesis, steganography implemented by utilizing the mobile phone messaging facilities. The process of insertion into the text is converted into a binary image first, then take the final bit of the binary to insert text to be inserted. After the insertion process, the message to be sent by using the provider as the link destination address. The process of sending a message that has been tested on several telecommunication provider in Indonesia indicates the existence of different delivery success rate, but the message until it can not be opened unless the application has been made.
Use of Lipat Algorithm on Android to Secure Data Communication in Social Media
Wintolo, Hero;
Pujiastuti, Asih;
Imam, Muhammad
SENATIK STT Adisutjipto Vol 4 (2018): Transformasi Teknologi untuk Mendukung Ketahanan Nasional [ ISBN 978-602-52742-0-6 ]
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.28989/senatik.v4i0.138
Cryptography is one of science that learn about securing a message. Message security is done by randomizing the message (encryption) and returned to it’s original form (description). In this study, the designer of the system first and build an application to secure the message by using the Lipat Algorithm method that aims to secure messages consisting of letters, numbers, or symbols. Applications are designed and built running on Mobile Android. The Lipat Algorithm Method applies a fourfold system in the encryption process and the description of the message to be encrypted and in the description will advance 4 (four) characters forward or backward. Based on testing done the application managed to perform the encryption process and description correctly, ranging from short messages to messages as much as 2305 characters.
PENERAPAN GRID COMPUTING UNTUK MENGKOMPILASI PROGRAM BERBAHASA C/C++
Indrianingsih, Yuliani;
Wintolo, Hero;
Sari, Ika Kartika
SENATIK STT Adisutjipto Vol 1 (2013): Kreativitas Anak Bangsa untuk Kemajuan Teknologi dan Informasi
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.28989/senatik.v1i0.41
Grid computing is a group of computers that connected to computer network and working together to complete a certain task. The computers inside must be coheren so the processors can work evenly when given a task from server. Grid computing can be used in many areas and purpopes, and in this research it will be used to compile C/C++ program. Compilation is a process to transform a human readable source code into a computer readable code. The compilation process will take place in a personal computer (PC). By using grid system in compilation process, the waiting time of a source code will be reduced as the compilation task will be divided among the computers. For that reason a C/C++ compiler software that using grid computing will be made. The task will be distributed among the computers inside the grid. It can also help someone who want to compile C/C++ source code but he doesn’t have the compiler on his PC.