Claim Missing Document
Check
Articles

Analisis Perbandingan Kinerja Protokol Transport Layer Pada Lalu Lintas Data VIOP dan IPTV Prabowo, Dedy Agung; Reswan, Yuza
Jurnal Sistem Informasi Vol 9, No 2 (2017): Oktober
Publisher : Major of Information Systems Faculty of Computer Science Sriwijaya University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract One of the use of VOIP and IPTV technology that is increasingly used as a communication application on the internet are video call and video streaming, so when the data required a reliable and fast protocol performance in the process of delivery. The problem of the research is analyzing the performance of layer transport protocol in VOIP and IPTV data traffic. The objective of the research is to know the advantages and disadvantages of VOIP and IPTV data traffic and it is useful to contribute to the development of transport layer protocols in VOIP and IPTV data traffic in the future. This research is conducted independently without related to place and time.  This reasearch uses SoftPerfect network Protocol Analyzer software. SoftPerfect network Protocol Analyzer is used to compare the performance of transport layer protocols of TCP, UDP, SCTV based on six parameters using different LAN and Wireless cable, test time, and sharing time. The method used in this research is based on the research approach. The results of this study indicate that SCTV protocol is a protocol that has good performance in VOIP and IPTV data traffic with TCP and UDP protocol. Keywords : Analysis, Performance, TCP, UDP, SCTP, VOIP, IPTV   Abstrak Salah satu pemanfaatan teknologi VOIP dan IPTV yang semakin banyak digunakan sebagai aplikasi komunikasi pada internet adalah video call dan video streaming, sehingga pada data tersebut dibutuhkan suatu unjuk kerja protokol yang handal dan cepat dalam proses pengirimannya. Masalah pada penelitian ini adalah menganalisis kinerja protokol transport layer pada lalu lintas data VOIP dan IPTV.Tujuannya adalah untuk mengetahui kelebihan dan kekurangan pada lalu lintas data VOIP dan IPTV dan bermanfaat memberikan konstribusi perkembangan protokol transport layer pada lalu lintas data VOIP dan IPTV ke depan.Penelitian ini dilaksanakan secara mandiri tanpa terkait tempat dan waktu menggunakan software SoftPerfect network Protokol Analyzer. SoftPerfect network Protokol Analyzer digunakan untuk membandangkan kinerja ketiga protokol transport layer yaitu TCP,UDP,SCTV berdasarkan enam parameter dengan menggunakan jaringan kabel LAN dan Wireless, waktu pengujian, serta lama sharing yang berbeda. Metode yang dilakukan pada penelitian ini di dasarkan pada kerangka penelitian .Hasil penelitian ini menunjukan bahwa protokol SCTV merupakan protokol yang memiliki kinerja yang baik dalam lalu lintas data VOIP dan IPTV dibandingkan dengan protokol TCP dan UDP. Kata Kunci : Analisis, Kinerja, TCP, UDP, SCTP, VOIP, IPTV.
IMPLEMENTASI KALMAN FILTER DALAM TEKNIK HAND TRACKING SEBAGAI KONTROL POINTER MOUSE KOMPUTER Reswan, Yuza; Prabowo, Dedy Agung
Jurnal Sistem Informasi Vol 10, No 1 (2018): April
Publisher : Major of Information Systems Faculty of Computer Science Sriwijaya University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In their daily life, humans usually use hands for the interaction between humans and machines or humans and human so that the human-computer interaction and computer-based Computer Vision using fingers has more value than using other objects. Many techniques are developed based on the Computer Vision model, one of the technique that is implemented in this field is Hand Tracking. The use of such techniques uses certain algorithms to improve performance, one of which is the filter algorithm.Kalman Filter is an estimator algorithm in which information from an object is detected in a frame and the status of the object in the previous frame to create an approximate status of the new state of the object so that the process of unstable object movements in the tracking process that occurs due to noise can be minimized by the kalman filter. The use of Hand Tracking techniques and Kalman Filter algorithm is expected to meet the needs of more advanced human and computer interactions. The results of this study are expected to be useful as a means of scientific development in the field of informatics engineering and the ability to build software in the field of Hand Tracking techniques and Kalman Filter algorithm as well as expected This application can be used for personal or public interest.
PERANCANGAN APLIKASI PENGAMANAN DATA TEXT MENGGUNAKAN KOMBINASI ALGORITMA HILL CIPHER DAN ALGORITMA RSA Prabowo, Dedy Agung; reswan, yuza
Jurnal Sistem Informasi Vol 10, No 2 (2018): Oktober
Publisher : Major of Information Systems Faculty of Computer Science Sriwijaya University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

It is now commonplace that secrecy must be truly enhanced and tightened as it weighs the emergence of the latest technology that is growing rapidly. Of course an agency, group, or individual have data that is confidential and do not want to be known by other parties hence the need for a system capable of securing the data. For this reason this research aims to create Cryptography application by applying a combination of Hill Cipher and RSA algorithm, Cryptography is also called coding language and I apply Hill Cipher because it is a classical method that uses multiplication for each encoded character while RSA is a modern method that has 2 keys ie key public and secret key where the public key is used for encryption and secret key to retranslate the original form. By applying a combination of classical and modern methods it can be more secure so it is more difficult to be solved by unwanted parties. Keyword : Data Security, Cryptography, Hill Cipher, RSA
Sistem Pendukung Keputusan Penyaluran Bantuan Pemerintah Menggunakan Algoritma Weigted Product Reno Septia Erlangga; Yuza Reswan
Jurnal Media Infotama Vol 18 No 1 (2022): April
Publisher : UNIVED Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37676/jmi.v18i1.1746

Abstract

One factor that is strongly suspected to have contributed to reducing the number of poverty in Indonesia is the existence of a social assistance program by the central government. The social assistance program provided by the government on a regular basis to the community is very helpful if the distribution is right on target. The distribution of government assistance in Lunjuk Village, Seluma Barat District, Seluma Regency is still carried out conventionally, namely by providing assistance to all residents who are considered poor by the staff on duty without going through a selection process first. The amount of assistance provided by the government is limited so that not all residents can get this assistance. To facilitate the process of grouping residents, we need a system that can provide the right conclusions based on predetermined criteria. One of them uses a decision support system application. A system that can provide conclusions on the priority of beneficiaries based on the data that has been inputted. The conclusion generated by the application requires the right method to be implemented into the system and one of them is the weighted product method which can provide optimal solutions in the rating system. 1. The Decision Support System for the Distribution of Government Assistance Using the Weighted Product Algorithm in Lunjuk Village was built using the PHP programming language and MySQL database. The application can provide a priority list of beneficiaries based on the calculation results of the Weighted Product Algorithm using criteria weight data and data from Lunjuk Village residents.
IMPLEMENTASI KOMPILASI ALGORITMA KRIPTOGRAFI TRANSPOSISI COLUMNAR DAN RSA UNTUK PENGAMANAN PESAN RAHASIA Yuza Reswan; ujang juhardi; Bobi Tri Yuliansyah
Jurnal Informatika Upgris Vol 4, No 2: Desember (2018)
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/jiu.v4i2.2812

Abstract

Data security is important in maintaining the confidentiality of certain data that can only be known by those who have rights. If the data transmission is done by using network, there is a big possibility the data to be known by unauthorized parties.The columnar transposition algorithm is one simple transposition password. Columnar transposition is one of the classic cryptographic algorithms. Columnar transposition is one part of the transposition cipher with cryptographic method where the message is written in a row from a specified length, and then the column per column is read again with a reading sequence based on a keyword. Series length is determined by the length of the keyword. The order of column readings is based on column order.RSA Algorithm is one of asymmetric cryptography, which is a type of cryptography that uses two different keys: public key and private key. Thus, there is one key, namely the public key, which can be sent through a free channel, without any particular security. In this case there are two keys arranged so that they have a relationship in modulo arithmetic equation. In this case, combining both columnar transposition algorithms and RSA algorithms allows security in the form of message data to be very effective for locking the data even better.Keywords: Cryptography, Columnar Transposition, RSA, Java
Sistem Pendukung Keputusan Penyaluran Bantuan Langsung Tunai Dana Desa (BLT-DD) Desa Selika Menggunakan Algoritma Fuzzy Logic Reza Julianti; Yuza reswan; Ujang juhardi; Marhalim Marhalim
Just TI (Jurnal Sains Terapan Teknologi Informasi) Vol 13, No 2 (2021): Juli 2021
Publisher : Politeknik Negeri Samarinda

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46964/justti.v13i2.744

Abstract

BLT (Bantuan Langsung Tunai) adalah bantuan berupa uang tunai dari pemerintah diberikan kepada masyarakat yang terdampak covid-19, sebagai kelanjutan dan perluasan sasaran dari program rumah tangga sasaran (RTS), pengambilan keputusan dalam metode fuzzy logic. Namun dalam pelaksanaannya, Pemerintah Desa menghadapi beberapa permasalahan diantaranya ketika data keluarga yang memenuhi kriteria untuk mendapatkan BLT melampaui jumlah  kuota penerima BLT. Di Desa Selika, banyak kepala keluarga yang memenuhi syarat sesuai dengan kriteria yang ditentukan, namun  kouta yang ditentukan terbatas maka pemerintah kota harus melakukan seleksi sebaik-baiknya agar BLT berjalan dengan lancar. Maka dibutuhkan suatu sistem yang mampu menentukan penerima BLT tersebut, yaitu dengan melakukan pembobotan terhadap variabel penilai yang sesuai dengan aturan/ketentuan yang berlaku. Sistem ini sudah dapat menyimpan data yang dimasukan oleh user atau pengguna, sitem ini juga dilengkapi dengan fitur login dan penggantian password. Sistem dalam program berjalan dengan baik dan penentuan penerima BLT menghasilkan data-data yang valid. Sitem pendukung keputusan ini dapat membantu kepala desa dan perangkat desa, desa selika dalam penentuan penerima (BLT-DD).
Implementation of the C45 Algorithm for Predicting the Visit Rate of Patients at dr. Daniel Bengkulu Jery Rohmadan Wahari; Yuza Reswan
Jurnal Komputer, Informasi dan Teknologi (JKOMITEK) Vol. 2 No. 1 (2022): JUNI
Publisher : Penerbit ADM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i1.536

Abstract

In the business world, every clinic must of course be able to compete and think about how the clinic can continue to grow and expand its business scale. However, the problems faced by companies have varying degrees of difficulty and complexity, ranging from very simple problems to very complex problems. The general objective of this research is to fulfill one of the requirements for writing a thesis to obtain a Bachelor's degree in Computer Science at the Informatics Engineering Study Program, University of Muhammadiyah Bengkulu. Application of predictive application of patient visit rate at Dr. clinic. This Daniel can be used to help Dr. Daniel in predicting the level of patient visits, both new patients and old patients as well as the distance from the patient's home to Dr. Daniel. So this application can be used as a reference to predict patient visits on the next day. The MySQL database can accommodate information and data that is input into this patient visit rate prediction application. From the results of the tests carried out, it can provide convenience for Dr. Daniel in predicting the level of patient visits so that he can provide good service to patients.
Perancangan Aplikasi Pengamanan Data Text Menggunakan Kombinasi Algoritma Hill Cipher Dan Algoritma RSA Yuza Reswan; Dedy Agung Prabowo
Jurnal Sistem Informasi Vol 10, No 2 (2018)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (326.407 KB) | DOI: 10.36706/jsi.v10i2.8057

Abstract

ABSTRACTIt is now commonplace that secrecy must be truly enhanced and tightened as it weighs the emergence of the latest technology that is growing rapidly. Of course an agency, group, or individual have data that is confidential and do not want to be known by other parties hence the need for a system capable of securing the data. For this reason this research aims to create Cryptography application by applying a combination of Hill Cipher and RSA algorithm, Cryptography is also called coding language and I apply Hill Cipher because it is a classical method that uses multiplication for each encoded character while RSA is a modern method that has 2 keys ie key public and secret key where the public key is used for encryption and secret key to retranslate the original form. By applying a combination of classical and modern methods it can be more secure so it is more difficult to be solved by unwanted parties.Keyword : Data Security, Cryptography, Hill Cipher, RSAABSTRAKDi masa sekarang sudah menjadi hal yang biasa bahwa kerahasiaan harus benar – benar ditingkatkan dan diperketat karena menimbang kemunculan teknologi terbaru yang semakin pesat berkembang. Tentu sebuah Instansi, kelompok, ataupun individu memiliki data yang bersifat rahasia dan tidak ingin diketahui oleh pihak lain maka dari itu diperlukannya system yang mampu mengamankan data tersebut. Untuk itulah penelitian ini bertujuan membuat aplikasi Kriptografi dengan menerapkan kombinasi Algoritma Hill Cipher dan RSA, Kriptografi juga disebut bahasa persandian dan saya menerapkan Hill Cipher karena merupakan metode klasik yang menggunakan perkalian untuk tiap karakter yang disandikan sedangkan RSA adalah metode modern yang memiliki 2 kunci yaitu kunci publik dan kunci rahasia dimana kunci publik digunakan untuk penyandian dan kunci rahasia untuk menterjemahkan kembali k bentuk asli. Dengan menerapkan kombinasi metode klasik dan modern ini dapat lebih mengamankan sehingga lebih sulit untuk dapat di pecahkan oleh pihak – pihak yang tidak diinginkan.Kata Kunci : Pengamanan Data, Kriptografi, Hill Cipher, RSA.
Analisis Perbandingan Kinerja Protokol Transport Layer Pada Lalu Lintas Data VIOP dan IPTV Yuza Reswan; Dedy Agung Prabowo
Jurnal Sistem Informasi Vol 9, No 2 (2017)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1076.83 KB) | DOI: 10.36706/jsi.v9i2.7988

Abstract

AbstractOne of the use of VOIP and IPTV technology that is increasingly used as a communication application on the internet are video call and video streaming, so when the data required a reliable and fast protocol performance in the process of delivery. The problem of the research is analyzing the performance of layer transport protocol in VOIP and IPTV data traffic. The objective of the research is to know the advantages and disadvantages of VOIP and IPTV data traffic and it is useful to contribute to the development of transport layer protocols in VOIP and IPTV data traffic in the future. This research is conducted independently without related to place and time. This reasearch uses SoftPerfect network Protocol Analyzer software. SoftPerfect network Protocol Analyzer is used to compare the performance of transport layer protocols of TCP, UDP, SCTV based on six parameters using different LAN and Wireless cable, test time, and sharing time. The method used in this research is based on the research approach. The results of this study indicate that SCTV protocol is a protocol that has good performance in VOIP and IPTV data traffic with TCP and UDP protocol.Keywords : Analysis, Performance, TCP, UDP, SCTP, VOIP, IPTV
Implementasi Kalman Filter Dalam Teknik Hand Tracking Sebagai Kontrol Pointer Mouse Komputer Yuza Reswan; Dedy Agung Prabowo
Jurnal Sistem Informasi Vol 10, No 1 (2018)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (548.244 KB) | DOI: 10.36706/jsi.v10i1.8031

Abstract

ABSTRACTIn their daily life, humans usually use hands for the interaction between humans and machines or humans andhuman so that the human-computer interaction and computer-based Computer Vision using fingers has more valuethan using other objects. Many techniques are developed based on the Computer Vision model, one of the techniquethat is implemented in this field is Hand Tracking. The use of such techniques uses certain algorithms to improveperformance, one of which is the filter algorithm. Kalman Filter is an estimator algorithm in which informationfrom an object is detected in a frame and the status of the object in the previous frame to create an approximatestatus of the new state of the object so that the process of unstable object movements in the tracking process thatoccurs due to noise can be minimized by the kalman filter. The use of Hand Tracking techniques and Kalman Filteralgorithm is expected to meet the needs of more advanced human and computer interactions. The results of thisstudy are expected to be useful as a means of scientific development in the field of informatics engineering and theability to build software in the field of Hand Tracking techniques and Kalman Filter algorithm as well as expectedThis application can be used for personal or public interest.Keywords: Computer Vision, Hand Tracking, kalman FilterABSTRAKDalam kesehariannya, manusia seringkali menggunakan tangan untuk interaksi antara manusia dan mesin ataupunmanusia dengan manusia sehingga interaksi manusia dan komputer berbasis Computer Vision mengunakan jaritangan memiliki nilai lebih dibandingkan menggunakan objek lain. Banyak teknik yang dikembangkan berdasarkanmodel Computer Vision, salah satu teknik yang sering diimplementasikan dalam bidang ini adalah Hand Tracking.Sering kali penggunaan teknik tersebut menggunakan algoritma tertentu untuk meningkatkan kinerjanya, salahsatunya adalah algoritma kalman filter. Kalman Filter adalah sebuah algoritma estimator yang dimana informasidari objek terdeteksi di suatu frame dan status objek tersebut pada frame sebelumnya untuk membuat statusperkiraan dari status baru objek tersebut sehingga proses pergerakan objek yang tidak stabil pada proses trackingyang terjadi karena noise dapat diminimalkan oleh kalman filter. Penggunaan teknik Hand Tracking dan algoritmaKalman Filter diharapkan mampu memenuhi kebutuhan interaksi manusia dan komputer yang lebih maju. Hasilpenelitian ini diharapkan berguna sebagai sarana pengembangan keilmuan dalam bidang teknik informatikadan kemampuan dalam membangun perangkat lunak pada bidang teknik Hand Tracking dan algorita KalmanFilter serta diharapkan Aplikasi ini dapat digunakan untuk kepentingan pribadi maupun umum.Kata Kunci : Computer Vision, Hand Tracking, kalman Filter
Co-Authors A.R Walad Mahfuzi Abdullah, Dedy Achmad Rajes Adelia, Serlina Adesio, Lambardo Agus, Mat Anggoro, Leo Tri Anggraini, Ani Anggraini, Laura Anugrah Ilahi, Puja Apridiansyah, Yovi Ar. Walad Mahfuzi Ari Satrio Wibowo Ariksa Abdul Lasin Arnoldi Arnoldi Baihaqi, Ikhwan Bobi Tri Yuliansyah cantika Cecep Saputra Dandi Sunardi Darnita, Yulia Dedy Abdullah Dedy Agung Prabowo Dena, Yunita Meli Diana Diana Diana Diana Dyah Parmitha Pertiwi Elviani, Elviani Evandra, Geri Melano Fajar Ramadianto Feby Ayu Sahputry Giova Giova Gunawan Gunawan Gunawan Gunawan Guntur Alam Handayani, Kurnia Marga Harry Witriyono Hidayah, Aditia hidayah, agung kharisma Hidayat, Roki Imanullah, Muhammad Jayusta, Evan Jery Rohmadan Wahari Juansen, Monsya Juhardi, Ujang Khairullah Khairullah Khairullah Khairullah Khairullah, Khairullah Laura Anggraini Leo Tri Anggoro M Taufik Ma'ruf Mahfuzhi, A.R Walad Mahfuzhi, A.R. Walad Mahfuzhi, A.R. Walad Mahfuzhi Mahfuzi, A.R Walad marhalim, marhalim Marton Marton Ma’ruf, M. Taufik Muhammad Husni Rifqo Muhammad Imanullah Muhammad Immanullah, Muhammad Muntahanah Muntahanah Muntahanah, Muntahanah Nuri David Maria Veronika Padli, Zeko Pagestu, Yolan Pahrizal, Pahrizal Paulina, Yanti Putra, Erwin Dwik Putra, Erwin Dwika Putra, Yonaldo PUTRI WAHYUNI R.S, Penti Septian Raffles, Richard Rajes, Achmad Rasyid, Muhammad Soelaiman Reno Septia Erlangga Reza Julianti Ricardo, Ryo Rifqo, Muhammad Husni Ristontowi Ronny Saputra, Ronny Rozali Toyib Sahputra, Eka Sahputry, Feby Ayu Sahrudin, Sahrudin Sapitri, Tari Juita Seprianti, Widia simanjuntak, Yuliy Gusnitasari Sonita, Anisya Sundari Sundari Surya Ade Saputera Syahputra, Arevo Tari Juita Sapitri Tirta Sari, Puput Toyib, Rozali Trisista, Adinda Ujang Juhardi ujang juhardi Wahidah, Alifah Nur Wibowo, Ari Satrio Widia Seprianti Wijaya, Ardi Witriyono, Harry Yonaldo Putra Yulia Darmi Yunita Meli Dena