Claim Missing Document
Check
Articles

Found 6 Documents
Search

Content Based Image Retrieval Using Lacunarity and Color Moments Of Skin Diseases Triwayuni, I Gusti Ayu; Darma Putra, I Ketut Gede; Eka Pratama, I Putu Agus
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp243-248

Abstract

The research conducted contributed in the form of CBIR application which was developed using texture and color feature extraction in searching the contents information of an object of skin disease image. The textured feature is extracted using Lacunarity, while for color feature extraction using Color Moments as well as a combination of both methods. The results of color characteristic extraction test using Color Moments Method yielded images corresponding to 100% similarity percentages and experimentation of texture characteristic extraction using Lacunarity Method yielded images corresponding to a percentage of suitability of 25%, followed by a combined test of both methods and the normalization process produces images corresponding to a percentage of conformity of 60%.
IMPLEMENTASI KATOOLIN SEBAGAI PENETRASI TOOLS KALI LINUX PADA LINUX UBUNTU 16.04 (STUDI KASUS: REVERSE ENGINEERING FILE .APK) Eka Pratama, I Putu Agus; Wiradarma, Anak Agung Bagus Arya
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol 1 No 2 (2018): Jurnal RESISTOR Edisi Oktober 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1149.508 KB) | DOI: 10.31598/jurnalresistor.v1i2.278

Abstract

The Linux Operating System is known for its open-source characteristic which means everyone is free to develop Linux with the use of available source code. The result of Linux development is called Linux distribution (Distro). There are various Linux distributions in accordance with their respective uses, one of them is Kali Linux. Kali Linux is a Linux distro that is developed to penetrate the security of computer systems. Kali Linux uses a variety of tools to perform its functions. However, for users who want to use the functionality of Kali Linux without having to change the Linux distro that has been used, the user can use Katoolin. Katoolin can provide the convenience and flexibility for users who want to use Kali Linux as a special Linux distro for the purpose of penetrating computer system security without having to replace the distro that has been used or do a full install of Kali Linux. One case study that can be solved using the Kali Kali Linux based tool on Katoolin is Reverse Engineering. The case study was solved using one of the tools in the Reverse Engineering category named apktool that available on Katoolin.
IMPLEMENTASI TEKNIK DEEP PACKET INSPECTION DENGAN MENGGUNAKAN WIRESHARK PADA SISTEM OPERASI UBUNTU Pratama, I Putu Agus Eka; Dharmesta, Putu Adhika
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol 1 No 2 (2018): Jurnal RESISTOR Edisi Oktober 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (965.732 KB) | DOI: 10.31598/jurnalresistor.v1i2.274

Abstract

Deep Packet Inspection (DPI) is a technique commonly used by network administrator to be able to monitor in detail the flow of data in the form of data packets that occur at that moment. This data stream will produce an information that can be used for network management purposes. One example of a case study that can be done with this technique is the intranet that is available in Information Technology major Udayana University’s. Deep Packet Inspection Technique is done with purpose to identifying the initial slowing down of network speed on Information Technology major Udayana University’s.
Manajemen Risiko Teknologi Informasi Terkait Manipulasi dan Peretasan Sistem pada Bank XYZ Tahun 2020 Menggunakan ISO 31000:2018 Pratama, I Putu Agus Eka; Pratika, Made Toby Sathya
JURNAL TELEMATIKA Vol 15, No 2 (2020)
Publisher : Institut Teknologi Harapan Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

PT XYZ is the largest private bank in Indonesia which was founded in 1955. The use of Information Technology (IT) at XYZ Bank has changed the mindset of the public in transactions. This can be seen from the ease with which online shopping and non-cash payments are made using the application. Along with the use of IT at XYZ Bank, it is necessary to pay attention to the risks that result from using IT. Risk is the possibility of an event occurring in making a decision. To meet the strategic objectives of using IT, a company must implement risk management called Enterprise Risk Management (ERM). Currently XYZ Bank has used the Operational Risk Management Framework (ORMF). This research will try to implement risk management using the ISO 31000: 2018 framework related to IT problems faced by XYZ Bank in 2020. The method used is the assessment process in ISO 31000: 2018 which includes risk identification, risk analysis, and risk evaluation. This research has obtained results in the form of a large enough chance of the problem to recur and it is necessary to reduce the risk impact. From this research, it is hoped that a conclusion can be drawn regarding the need for a review regarding the problems faced so that the business objectives of XYZ Bank can be achieved. PT XYZ adalah bank swasta terbesar di Indonesia yang berdiri pada tahun 1955. Penggunaan Teknologi Informasi (TI) pada Bank XYZ telah mengubah pola pikir masyarakat dalam bertransaksi. Hal ini terlihat dengan mudahnya belanja secara daring dan juga pembayaran secara nontunai menggunakan aplikasi. Seiring dengan penggunaan TI di Bank XYZ, perlu diperhatikan risiko yang diakibatkan dari penggunaan TI. Risiko adalah kemungkinan terjadinya suatu kejadian dalam pengambilan suatu keputusan. Untuk memenuhi tujuan strategis penggunaan TI, suatu perusahaan harus menerapkan manajemen risiko yang bernama Enterprise Risk Management (ERM). Saat ini Bank XYZ telah menggunakan Operational Risk Management Framework (ORMF). Penelitian ini akan mencoba untuk menerapkan manajemen risiko menggunakan framework ISO 31000:2018 terkait dengan permasalahan TI yang dihadapi oleh Bank XYZ di tahun 2020. Metode yang digunakan adalah dengan proses penilaian yang ada pada ISO 31000:2018 yang meliputi identifikasi risiko, analisis risiko, dan evaluasi risiko. Penelitian ini memperoleh hasil berupa peluang terjadinya kembali permasalahan tersebut cukup besar, sehingga perlu dilakukan pengurangan dampak risiko. Dari penelitian ini, diharapkan dapat diperoleh kesimpulan mengenai perlunya peninjauan ulang terkait masalah-masalah yang dihadapi, sehingga tujuan bisnis dari Bank XYZ dapat tercapai.
Computer Forensic Using Photorec for Secure Data Recovery Between Storage Media: a Proof of Concept Pratama, I Putu Agus Eka
International Journal of Science, Technology & Management Vol. 2 No. 4 (2021): July 2021
Publisher : International Journal of Science, Technology & Management

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46729/ijstm.v2i4.256

Abstract

Data plays the important role, so that data recovery and data security be prioritized. Computer users often lose their data due to personal errors or by attacks. Digital forensics has one sub-field called computer forensic, which has an important role in the process of secure data recovery. USB Flashdisk as the most widely used storage media has a probability of data loss. It is necessary to do computer forensic actions, especially secure data recovery, on it so that it can restore data securely to other media while protecting it by giving privilege root. In this research, computer forensic testing the 2781 files of various data formats that were erased on a 32 GB USB flash drive using Photorec. The media for collecting data recovery results using an Intel computer, 2 GB RAM, 1.8 GHz processor, the Linux operating system Xubuntu 20.04. Testing is carried out following the test scenarios that have been designed, then observed, recorded, and analyzed. Photorec places recovery data in 6 recup_dir subdirectories. Test results and analysis of the test results show that Photorec is a reliable tool for computer forensic, especially secure data recovery because it can restore 100% of data, accompanied by privilege root for all data recovery results, so they cannot be changed and deleted by an end-user without granted access.
Analisa Kategori Barang dengan Penjualan Terbanyak dalam Jangka Waktu 3 Bulan Menggunakan Data Warehouse Eka Pratama, I Putu Agus; Bernard, Rey
Jurnal ELTIKOM : Jurnal Teknik Elektro, Teknologi Informasi dan Komputer Vol 6 No 1 (2022)
Publisher : P3M Politeknik Negeri Banjarmasin

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31961/eltikom.v6i1.457

Abstract

UD. Makmur Sejahtera sebagai salah satu distributor terbesar untuk barang kebutuhan sehari-hari di Manokwari Papua, memiliki data-data transaksi penjualan untuk setiap kategori barang dan jenis barang. Data-data ini masih tersimpan secara fisik dalam bentuk nota serta belum didigitalkan untuk dapat dimanfaatkan secara maksimal untuk membantu UD. Makmur Sejahtera meningkatkan penjualan. Penelitian ini memiliki ide dasar pemanfaatan data digital transaksi penjualan untuk mengetahui kategori barang mana yang memiliki penjualan terbanyak dalam kurun waktu tiga bulan (Juli 2020 hingga September 2020) melalui proses Extraction, Transformation, Loading (ETL) berbasis Pentaho Data Integration, untuk kemudian disimpan dalam bentuk data multi dimensi, dikategorikan, dan divisualisasikan menggunakan Tableau. Hasil pengujian menunjukkan bahwa komoditas beras merupakan kategori barang dengan penjualan terbanyak pada kurun waktu tiga bulan serta implementasi Data Warehouse sangat membantu UD. Makmur Sejahtera di dalam mencapai tujuan bisnis usahanya.