Herri Setiawan
Universitas Indo Global Mandiri

Published : 7 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 7 Documents
Search

Implementation of Android Smartphone as CCTV Camera Based on Wifi Network Herri Setiawan; Tasmi Tasmi; Husnawati Husnawati
Journal of Information System and Informatics Vol 2 No 2 (2020): Journal of Information Systems and Informatics
Publisher : Universitas Bina Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33557/journalisi.v2i2.97

Abstract

The Security systems using cameras as monitors or what is commonly known as Closed Circuit Television (CCTV) have recently become more prevalent. However, to have a monitoring system or monitoring requires a fairly expensive cost to buy hardware and installation services. On the other hand, the development of mobile devices is increasingly being used, such as smartphones and tablets. The ease of carrying and the variety of applications available such as WIFI devices and a series of other applications and at relatively affordable prices have made this mobile device more and more in demand by the public today. This research is based on the idea of ​​creating a CCTV camera application using a smartphone that is always with us. This use will be useful for seeing the state of the room or certain places and can be monitored directly using the Android mobile device itself or from a Laptop / PC / Tablet and others.
Penggunaan Metode Signature Based dalam Pengenalan Pola Serangan di Jaringan Komputer Herri Setiawan; M. Agus Munandar; Lastri Widya Astuti
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 8 No 3: Juni 2021
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.2021834200

Abstract

Masalah keamanan jaringan semakin menjadi perhatian saat ini. Sudah semakin banyak tools maupun teknik yang dapat digunakan untuk masuk kedalam sistem secara ilegal, sehingga membuat lumpuh sistem yang ada. Hal tersebut dapat terjadi karena adanya celah dan tidak adanya sistem keamanan yang melindunginya, sehingga sistem menjadi rentan terhadap serangan. Pengenalan pola serangan di jaringan merupakan salah satu upaya agar serangan tersebut dapat dikenali, sehingga mempermudah administrator jaringan dalam menanganinya apabila terjadi serangan. Salah satu teknik yang dapat digunakan dalam keamanan jaringan karena dapat mendeteksi serangan secara real time adalah Intrusion Detection System (IDS), yang dapat membantu administrator dalam mendeteksi serangan yang datang. Penelitian ini menggunakan metode signatured based dan mengujinya dengan menggunakan simulasi. Paket data yang masuk akan dinilai apakah berbahaya atau tidak, selanjutnya digunakan beberapa rule untuk mencari nilai akurasi terbaik. Beberapa rule yang digunakan berdasarkan hasil training dan uji menghasilakan 60% hasil training dan 50% untuk hasil uji rule 1, 50% hasil training dan 75% hasil uji rule 2, 75% hasil training dan hasil uji rule 3, 25% hasil training dan hasil uji rule 4, 50% hasil training dan hasil uji untuk rule 5. Hasil pengujian dengan metode signatured based ini mampu mengenali pola data serangan melaui protokol TCP dan UDP, dan monitoring yang dibuat mampu mendeteksi semua serangan dengan tampilan web base.AbstractNetwork security issues are becoming increasingly a concern these days. There are more and more tools and techniques that can be used to enter the system illegally, thus paralyzing the existing system. This can occur due to loopholes and the absence of a security system that protects it so that the system becomes vulnerable to attacks. The recognition of attack patterns on the network is an effort to make these attacks recognizable, making it easier for network administrators to handle them in the event of an attack. One of the techniques that can be used in network security because of a timely attack is the Intrusion Detection System (IDS), which can help administrators in surveillance that comes. This study used a signature-based method and tested it using a simulation. The incoming data packet will be assessed whether it is dangerous or not, then several rules are used to find the best accuracy value. Some rules used are based on the results of training and testing results in 60% training results and 50% for rule 1 test results, 50% training results and 75% rule 2 test results, 75% training results and rule 3 test results, 25% training results and the result of rule 4 test, 50% of training results and test results for rule 5. The test results with the signature-based method can recognize attack data patterns via TCP and UDP protocols, and monitoring is made to be able to detect all attacks with a web-based display.
The Use of KPI in Group Decision Support Model of ICT Projects Performance Evaluation Herri Setiawan; Jazi Eko Istiyanto; Retantyo Wardoyo; Purwo Santoso
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 2: EECSI 2015
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (348.728 KB) | DOI: 10.11591/eecsi.v2.497

Abstract

This paper proposes The Use of KPI in Group Decision Support System Model of ICT Projects Evaluation at Local Government Agency in Indonesia. This study is a part of the attempt to improve local government performance in Indonesia, especially for Local Government Agencies (SKPD) involved in Decision Support System (SPK), which should be optimized through Information Technology. Different from the prior research, in this paper we try to describe how to determine KPI in an ICT project at local government agency and the applicable evaluation model. Generally, this paper will discuss how to make an performance indicator, so that the output of an ICT project product can result the expected outcome, benefit, and impact. Furthermore, it will be explained in regard to the Group Decision Support System (GDSS) evaluation model by considering the applicable legislation aspect, which facilitates decision makers such as: Government Institution Executives, ICT Managers Unit, Business Process Owner Unit, and Society represented by Regional House of Representative, to give assessment or evaluation upon the implementation of ICT Projects at Local Government Agency. As the research support, survey and interview have been conducted to stakeholders in decision-making. The proposed model is expected to be able to give ideas and solutions in evaluating ICT Projects done at local government agencies in Indonesia.
Rekayasa Augmented Reality Planet dalam Tata Surya sebagai Media Pembelajaran Bagi Siswa SMP Negeri 57 Palembang Agmita Clara Rosa; Hastha Sunardi; Herri Setiawan
Jurnal Informatika Global Vol 10, No 1
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (554.233 KB) | DOI: 10.36982/jiig.v10i1.728

Abstract

ABSTRACTInformation Technology Utilization in teaching materials is considered very helpful in providing science learning material about the type of solar system, the texture and layers that are inside the planet. Augmented reality technology is combines two-dimensional or 3-dimensional virtual objects into a real three-dimensional environment and then projects virtual objects in real time and takes place simultaneously. Showing material, the application can also display images of planets in 3D animation objects along with planetary layers and practice questions, using text books as markers for augmented reality with marker tracking methods that can be used on android. The method used from this application is the Rational Unified Process and modeling the Unified Modeling Language (UML). Using C# programming language for coding programs that will be used in making augmented reality. By building a system of simulating the solar system of the planet Bima Sakti as an iteractive learning media for students using an Android-based augmented reality technology that is effective in providing information about the descriptions of planets and planetary layers, it is hoped that there will be added value for students to get to know the Creator. By knowing how great the universe is, students will certainly be able to understand the vastness of this universe, which of course there will be awareness for students that the Creator of this universe, of course, is greater than his creation and more powerful over his creation. So that the material from this application can be combined with religious studies, especially Islamic Religion.Keywords : Augmented Reality, Solar System. Interactive learning, C # (C Sharp), RUPABSTRAKPemanfaatan Teknologi  Informasi pada bahan ajar untuk siswa dinilai sangat membantu dalam memberikan materi pembelajaran IPA tentang sistem tata surya jenis, tekstur dan lapisan yang ada didalam planet. Teknologi Augmented Reality adalah teknologi yang mengabungkan benda maya dua dimensi ataupun 3 dimensi kedalam sebuah lingkungan nyata tiga dimensi lalu memproyeksikan benda-benda maya tersebut dalam waktu nyata dan berlangsung bersamaan. Menampilkan materi, aplikasi juga dapat menampilkan gambar planet dalam objek animasi 3D disertai lapisan planet dan latihan soal, menggunakan buku teks sebagai marker untuk augmented reality dengan metode marker tracking yang dapat digunakan  diandroid. Metode yang digunakan dari aplikasi ini adalah Rational Unified Process dan pemodelan Unified Modeling Language (UML). Menggunakan bahasa pemrograman C#  untuk coding program yang akan digunakan dalam pembuatan augmentedreality. Dengan membangun system  simulasi tata surya planet Bima Sakti sebagai media pembelajaran iteraktif bagi siswa menggunakan teknologi augmented reality berbasis android yang efektif dalam memberikan informasi tentang deskripsi planet dan lapisan planet, diharapkan ada nilai tambah bagi siswa untuk lebih mengenal Sang Pencipta. Dengan mengenal betapa besar jagat raya ini, maka siswa tentunya akan dapat memahami begitu luasnya alam ini, yang tentunya akan ada kesadaran bagi siswa bahwa Sang Pencipta alam raya ini, tentunya lebih besar dari ciptaannya dan lebih berkuasa atas ciptaannya.  Sehingga materi dari aplikasi ini  dapat dikombinasikan dengan pelajaran agama, khususnya Agama Islam.Kata kunci : Augmented Reality, Tata Surya, Pembelajaran Interaktif, RUP
USING INTERNET SITE AS TEACHING MODEL IN ENHANCING ENGLISH VOCABULARY FOR INDEPENDENT LEARNERS Yeni Andikasari; Herri Setiawan
Jurnal Informatika Global Vol 3, No 1
Publisher : UNIVERSITAS INDO GLOBAL MANDIRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (475.004 KB) | DOI: 10.36982/jiig.v3i2.339

Abstract

English language learners in high education institutions believe that vocabulary learning is difficult and  complicated. At the university level, learners are forced to make conscious effort to learn vocabulary outside of the classroom because of the  learning time  in the classroom  is limited. Consequently, the learners play an important role in developing and enhancing their vocabulary. now, surving on the Internet has been the most popular way to learn English because it is convenient as well as entertaining. It saves a lot of time. beside that Some websites provide beautiful illustrations to learn English so the learners learn by fun. A few websites supply amusing games and online language exercises to attract attention thereby helping them learn English effectively.  Having been inspired from article by Dr.Vangeepuram Sreenathachary 2011, about  using Internet in improving one’s english language skills and supported by some finding of  Marc Rosenberg adapted Strategies for delivering knowledge in the digital Age by Rosenberg, M. J,2001, authors of This paper aims at using  internet site as a teaching model to enhancing learners English vocabulary. The instructional plan covers the objectives, materials, activities and assessment. Instructional strategies to use quesioner sheet, guided and reflective discussion,web site link.  Key words:  Internet site, Independent Learners, Teaching model,Vocabulary
Implementasi Honeypot Sebagai Pendeteksi Serangan Pada Virtual Private Server (VPS) M. Alamsyah Pratama; Herri Setiawan; Zaid Romegar Mair
Jurnal Software Engineering and Computational Intelligence Vol 1 No 1 (2023)
Publisher : Informatics Engineering, Faculty of Computer Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jseci.v1i1.3045

Abstract

VPS (Virtual Private Server) is a server virtualization technology that is currently widely used by users for a variety of purposes, including personal, work, office, and business. Virtual Private Server (VPS) is a technology that uses VPS. Since renting a virtual private server (VPS) is less expensive than purchasing or renting a dedicated server, VPS is widely used. However, VPS has some disadvantages as well, one of which concerns security. The Intrusion Detection System (IDS), the Virtual Private Network (VPN), and the Honeypot are just a few of the other options that can be utilized to secure servers. The Honeypot application is needed to protect Virtual Private Server (VPS), which requires a detection application that can reduce attacks on VPS. Cowrie is able to detect and record all attacks that occur on the server based on the results of attack testing that was carried out 25 times for each attack test, beginning with port scanning and progressing through DDoS attacks, brute force attacks, and individual, double, and multiple tests. considered to be very effective, but when multiple attacks were carried out simultaneously, the server experienced a downtime or lag
Implementasi Alat Monitoring Suhu Ruangan Berbasis Internet Of Things (IoT) Menggunakan Metode MQTT dan HTML Pada Ruangan Server Universitas Indo Global Mandiri Palembang Parhan Oktaria Putra; Herri Setiawan; Zaid Romegar Mair
Jurnal Software Engineering and Computational Intelligence Vol 1 No 1 (2023)
Publisher : Informatics Engineering, Faculty of Computer Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36982/jseci.v1i1.3046

Abstract

The server room is an important room that is useful as a place to store devices related to the server. Inside the server room itself there are also important data that need to be protected so that security standards are needed to protect the room starting from air temperature, humidity, fire prevention. To meet these security standards, a tool is provided to monitor the temperature in the server room. By using a temperature sensor, namely DHT-11 and the NodeMCU ESP8266 Module as a tool for reading sensors, MQTT as a communication protocol and HTML for simple display, Telegram as a notification medium. This tool is useful so that we don't have to come directly to the server room to check room temperature and activities in checking temperature become easier because a website is provided that provides information about room temperature in real time