Articles
PEMANFAATAN CLOUD COMPUTING PADA APLIKASI NGEKOST BERBASIS ANDROID
Fathul Fata Deny Hp.;
Hero Wintolo;
Anggraini Kusumaningrum
Compiler Vol 5, No 2 (2016): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (189.669 KB)
|
DOI: 10.28989/compiler.v5i2.169
Ngekost is an android-based boarding search application that utilizes the Internet as a medium of exchange data. The use of mobile android application as a tool to access something that is connected to the Internet to help users find a variety of information. Ngekost applications builtby using cloud computing as a technology that makes the Internet as a central storage server to manage data and information. One media system making cloud computing is to use a Virtual Private Server (VPS) as a virtual server. Applications Ngekost offers boarding house in the city of Yogyakarta, Malang, and Makassar with centralized image data on the storage servers each - each city boarding information and data stored on the database webserver. Services provided on the application can be accessed via the website owners to register them boarding, boarding entering data and images, while searches for boarding accessed via mobile android. The results of testing this application indicates that the application Ngekost by leveraging cloud computing can be usedas an information service for owners and seekers boarding based regional city o f Yogyakarta, Malang, and Makassar.
RANCANG BANGUN E-LEARNING UNTUK KOMPONEN PESAWAT TERBANG ( STUDI KASUS DI STTA YOGYAKARTA)
Gilang Wiratmaja;
Hero Wintolo;
Nurcahyani Dewi Retnowati
Compiler Vol 5, No 1 (2016): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (199.606 KB)
|
DOI: 10.28989/compiler.v5i1.100
At this time need to develop the education system urgent to do. Various concepts and new techniques in teaching and learning has been developed to replace conventional teaching methods in class. this was due to a global computer network found. One method of teaching that is thrive at the present time is an e–learning. E-learning can help teachers to give subject matter without located in class by using the internet, it can maximize the limited time in class learning. The methodology used in the preparation of this study is study literature while the phase of system development using web engineering. To design these applications use several stages starting from data flow diagram (DFD), flowchart system, design table, relation table and design interface. After the e-learning application is completed and tested to 30 respondent sthrough the results questionnaire then got the result that the applications facilitate learning activities between faculty and students so as to improve the quality of learning. Significant results of the test by 30 respondents, this application are users friendly, stable and smooth. Then interactivity of learning via e-learning system can help mastery of e-learning.
PENERAPAN SEO (SEARCH ENGINE OPTIMIZATION) MENGGUNAKAN TEKNIK TOGETHER IN A SINGLE CONNECTION (TSC) DALAM MENINGKATKAN KUNJUNGAN PADA SEBUAH BLOG
Devia Tito Setyaningsih;
Hero Wintolo;
Dwi Nugraheny
Compiler Vol 1, No 2 (2012): November
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (243.293 KB)
|
DOI: 10.28989/compiler.v1i2.13
One of the internet service used by the people of Indonesia is a blog that can be accessed via http://blogspot.com or http://wordpress.com and others. Everyone can use this medium for the purpose of publication of information in the form of text, images, sounds, or video without having to master web programming languages. One of the obstacles a person who has a blog is a way of increasing number of visitors to his blog. In order for many visitors the blog owner needs to understand about SEO (Search Engine Optimization).To allow users to blog in increasing the number of visitors and ranking his blog, they invented a system that utilizes parallel processing techniques and create a new method, named TSC (Together in a Single Connection) to increase the number of visitors, number of pages viewed and ranking.Increase blog traffic system based on parallel processing can improve the effectiveness in increasing traffic to a blog. With this system the blog owner is expected to be easier to rise to visit his blog.
USE VLSM (VARIABLE LENGTH SUBNET MASKING) ANDROID BASED SIMULATOR FOR ADMINISTRATIVE SUPPORT NETWORK
Bimio Wahyu Aji;
Hero Wintolo;
Dwi Nugraheny
Compiler Vol 2, No 1 (2013): Mei
Publisher : Institut Teknologi Dirgantara Adisutjipto
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (133.783 KB)
|
DOI: 10.28989/compiler.v2i1.30
Administration o f networking IP addressing especially IP version 4 have a less using IP address for the limited. Through for the using by networking o f services base on TCP/IP addressing, however that can be used VLSM (Variable Length Subnet Masking) method o f subnetting addressing thorough the public area networking to divided IP addressing private it's called as sub network ID or Local Area Network (IP private). Therefore dividing have choose a calculate IP addressing o f VLSM Method used by simulator calculating IP address subnetting. The use o f goal-based subnetting android simulator to facilitate the distribution o f IP within the network administrator by using the simulator VLSM IP subnetting calculations automatically and efficiently. An application that helps administrators in calculating VLSM subnetting IP, to support network administration so that administrators can make solving the network ID into sub-networks. IP results obtained from the simulator, can be tested with VLSM on various internet network service providers obtain a quite optimal for purposes o f network administration.
Pemantauan Sebaran Mahasiswa Dikampus Saat Pandemi Covid19 Menggunakan Metode Share Location
Hero Wintolo;
Haruno Sajati;
Evi Wahyuningsih
Jurnal Informatika Vol 10, No 1 (2023): April 2023
Publisher : LPPM Universitas Bina Sarana Informatika
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.31294/inf.v10i1.15055
Penelitian ini membahas penanganan pandemic saat virus corona masih tinggi penularannya pada kegiatan belajar mengajar di kampus Institut Teknologi Dirgantara Adisutjipto yang dilakukan secara offline. Metode yang digunakan adalah share lokasi yang dilakukan oleh mahasiswa melalui smartphone yang dimilikinya. Data share lokasi yang berupa data GPS direkam dan diproses pada server dan ditampilkan dalam bentuk titik pada peta. Data ini dikirimkan oleh mahasiswa saat akan masuk ke dalam kampus, tempatnya di pos satpam melalui aplikasi yang diakses melalui QR code yang ditempelkan pada pos tersebut. Di pos satpam juga disediakan computer yang dapat mengakses aplikasi pada sisi server untuk memantau psosisi dan jumlah mahasiswa yang masuk ke dalam kampus. Data-data tersebut ditampilkan dalam sebuah peta yang merupakan perangkat lunak yang dibuat pada penelitian ini dengan memanfaatkan Application Program Interface (API) Google Map. Hasil dari penelitian menunjukan bahwa sebanyak 20 orang mahasiswa yang akan mengikuti perkuliahan offline pada ruang Halim 2 Gedung Halim Perdanakusuma Institut Teknologi Dirgantara Adisutjipto. Dari 20 orang yang mengisikan data, 14 orang berhasil mengirmkan data dan 6 orang gagal mengirimkan data. Kegagalan terjadi karena perangkat lunak yang dibangun untuk penelitian ini hanya bisa digunakan pada smartphone berbasis android. Kegagalan pengiriman data koordinat pada smartphone terjadi pada merk iphone. Data 14 mahasiswa yang berhasil mengirimkan koordinatnya. dari 14 orang pengunjung itu 12 terdeteksi berada didalam Halim 2 sedangkan 2 orang lainnya berada diluar Halim 2, padahal 14 orang tersebut berada didalam Halim 2 sehingga kualitas GPS pada smartphone masing-masing mahasiswa ini dapat dikatakan tidak sama. This research discusses the handling of pandemics when the coronavirus transmission is still high in teaching and learning activities on the campus of the Adisutjipto Institute of Aerospace Technology which are carried out offline. The method used is a location sharing by students via their smartphones. Location share data in the form of GPS data is recorded and processed on the server and displayed in the form of dots on the map. This data is sent by students when they are about to enter the campus, where it is at the security post through an application that is accessed via a QR code attached to the post. The security guard post also provides computers that can access applications on the server side to monitor the position and number of students entering the campus. These data are displayed in a map which is software created in this study by utilizing the Google Map Application Program Interface (API). The results of the study showed that as many as 20 students would take offline lectures in the Halim 2 room, the Halim Perdanakusuma Building, Adisutjipto Institute of Aerospace Technology. Of the 20 people who filled in the data, 14 people succeeded in sending data and 6 people failed to send data. The failure occurred because the software built for this research could only be used on Android-based smartphones. Failure to send coordinate data on a smartphone occurs on the iPhone brand. Data from 14 students who successfully submitted their coordinates. of the 14 visitors, 12 were detected inside Halim 2 while 2 others were outside Halim 2, even though 14 of these people were inside Halim 2 so the quality of the GPS on each student's smartphone could be said to be not the same.
Descriptive Analysis and ANOVA Test with File Sending on Computer Networks Attacked with Rogue's Dynamic Host Configuration Protocol (DHCP)
Hero Wintolo;
Yuliani Indrianingsih;
Wahyu Hamdani;
Syafrudin Abdie
Jurnal Ilmiah Teknik Elektro Komputer dan Informatika Vol 9, No 2 (2023): June
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.26555/jiteki.v9i2.26167
The requirement for a computer that is physically connected to a computer network to be able to access existing resources on a computer network in the form of an IP address obtained statically or dynamically. On a static IP address, there are not many problems that arise because it is loaded directly into the computer, while for a dynamic IP address, security problems arise in the form of a dynamic IP address sharing server in the form of DHCP Rogue. The configuration that is added to the first router when the network is hit by a DHCP rogue attack is to configure the main router, in this case, the first router, and the switch used as a connecting device between computers. configuration on both switches is done by snooping trust which is useful for securing IP addresses to avoid IP attackers. This research was conducted to find out if a computer network with a dynamic IP address was attacked by sending files between computers. Files with the longest sending time indicate an attack on the computer network. The method used in this study is the ANOVA test with descriptive-based analysis. Based on the results of the analysis, it is known that the average file transfer time on networks affected by DHCP Rogue is higher than the average file transfer time on normal and mitigated networks, and the significant value of the ANOVA test results has a value of 0.004. In general, it can be concluded that there are differences in data transfer when the network is normal, the network is subject to DHCP Rogue, and the network has been mitigated with DHCP Rogue.
Correlation Analysis in Software Information Dissemination Testing in Regional Apparatus Organizations (RAD) to Support Jogja Smart City
Hero Wintolo;
Sudaryanto Sudaryanto;
Friska Ayu Dhawara
Jurnal Internasional Teknik, Teknologi dan Ilmu Pengetahuan Alam Vol 4 No 1 (2022): International Journal of Engineering, Technology and Natural Sciences
Publisher : University of Technology Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (741.127 KB)
|
DOI: 10.46923/ijets.v4i1.142
The application of information technology is one of the characteristics of smart cities that are used to provide services for their citizens. This application does not only change what previously did not use information technology to use information technology but the uses of software that is specifically used to serve the community so that the service process becomes fast as is done in the Regional Government RAD (Pemda) of Yogyakarta City. Before using a special application, dissemination services were performed using Microsoft Excel which can only be accessed on a computer. The software for information dissemination was tested by distributing questionnaires with questions grouped on Service quality improvement for information dissemination and User satisfaction. The results were processed and analyzed using the correlation method. The result showed a value of sig.(2-tailed) is 0,000, the Correlation Coefficient of 0,400, so it can be concluded that the relationship between improving service quality for information dissemination on RAD and user satisfaction is significant, strong enough, and unidirectional.
Pengembangan Layanan Penyebaran Informasi Akademik Berbasis Android
Gregorius Ferdian F.D.Setyawan;
Hero Wintolo;
Yuliani Indrianingsih
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 2 No. 3 (2018): Januari 2018
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (245.303 KB)
|
DOI: 10.14421/jiska.2018.23-04
E-pengumuman is a multimedia-based information dissemination application that utilizes internet network as data eye media. The use of android mobile apps as a tool for accessing anything connected to the internet helps the customers with information submitted by the app site. Make the Internet as a central storage server to manage data as well as information. Services available on the application can be accessed through student information websites, faculty, and courses. While the news can be accessed via mobile Android. The results of this app testing show that this application can be used as a delivery service and receive information appropriately.
Spanning Tree Protocol (STP) Based Computer Network Performance Analysis on BPDU Config Attacks and Take Over Root Bridge Using the Linear Regression Method
Yuliani Indrianingsih;
Hero Wintolo;
Eviana Yulianti Saputri
JOIN (Jurnal Online Informatika) Vol 6 No 2 (2021)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v6i2.703
Spanning Tree Protocol (STP) is used in manageable switch devices that apply more than one path to the connection between switches. This study aims to assist engineer staff in improving STP network security. Furthermore, the benefit is to improve the STP network security system by using the Spanning Tree Protocol and Virtual Local Area Network (VLAN) trunking mitigation techniques. The results of testing data before STP is attacked, after STP attacked, and anticipatory data. Then a simple linear regression analysis is carried out by the result of that there is not a significant relationship between time and size in the DoS attack, which  48.6% of the time variable is influenced by the size of  variable, while  the remaining 51.4% by other variables. Root attack is 43.8%-time variable is influenced by size variable, the remaining 56.2% by other variables. Correlation between Karl Pearson DoS and root, there is a significant relationship between time and size, with the DoS correlation coefficient (-0.697) in contrast root (-0.662), and paired sample t-test (paired sample t-test) can be concluded the anticipation which is done by using BPDU guard and root guard mitigation.
Pendampingan Pelatihan IT Essential Cisco Networking Guna Meningkatkan Daya Saing Lulusan SMK N 3 Yogyakarta
Anggaraini Kusumaningrum;
Hero Wintolo;
Nurcahyani Dewi Retnowati;
Anton Setiawan Honggowibowo;
Asih Pujiastuti
Jurnal SOLMA Vol. 13 No. 1 (2024)
Publisher : Universitas Muhammadiyah Prof. DR. Hamka (UHAMKA Press)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.22236/solma.v13i1.12905
Pendahuluan: Kemahiran dan pemahaman di bidang teknologi khususnya jaringan komputer merupakan salah satu tujuan yang dapat dikuasai siswa setelah lulus SMK. Selama proses pembelajaran, kesenjangan pemahaman antara teori dan praktik mengakibatkan siswa kurang menguasai teori dan praktek. Kurangnya media praktek untuk pengenalan hardware, software dan network device menjadi kendala dalam proses pembelajaran teori dan praktek di SMK N 3 Yogyakarta. Studi ini bertujuan untuk menambah kemampuan dan keahlian para siswa agar kompetensinya meningkat. Metode: Analisis SWOT. Hasil: Sebanyak 36 siswa SMKN 3 Yogyakarta berhasil menyelesaikan pelatihan dan lulus. Kesimpulan: Sebanyak 36 siswa SMKN 3 Yogyakarta berhasil menyelesaikan pelatihan, lulus, serta mendapatkan sertifikat dengan rata-rata nilai kumulatif hasil ujian sertifikasi IT Essential Cisco Networking adalah 84,21, nilai minimal 76,38, dan nilai maksimal 94,55.