p-Index From 2019 - 2024
1.323
P-Index
This Author published in this journals
All Journal Jurnal Infra
Justinus Andjarwirawan
Program Studi Teknik Informatika, Universitas Kristen Petra Surabaya

Published : 9 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 9 Documents
Search

Implementasi dan Analisa Snort dan Suricata Sebagai IDS dan IPS Untuk Mencegah Serangan DOS dan DDOS Darryl Santoso; Agustinus Noertjahyana; Justinus Andjarwirawan
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

DOS and DDOS is one of the most widely used attacks by hackers. DDOS is an attack with multiple attackers to deplete the resources of the target until the target cannot handle the request. To prevent the above attacks can use a firewall, the function of the firewall is the first defense of the computer that filters incoming or outgoing packets with rules on the network. Firewalls filter data based on IP addresses, protocols, and ports, so if you use a firewall, you can't analyze further attacks. In this study, to prevent this attack using a system namely Intrusion Detection System (IDS) and Intrusion Prevention System (IPS). The function of IDS is to detect unwanted traffic on a network or device, while IPS can detect and immediately fix the problem. By using IDS and IPS attacks can be analyzed more, IDS and IPS are more reliable tools than firewalls. The test was carried out in several DOS and DDOS scenarios using the Hping3 and Slowloris tools, the test results showed that from 10 attack scenarios and not attacks, snort and suricata were balanced in issuing True Positive alerts with 3 win scenarios each, for CPU usage Suricata excelled in 7 scenarios , and in HTTP Flood attacks suricata eliminate attacks faster.
Penerapan Metode Convolutional Neural Network Untuk Clothing Image Recognition Fuyi Gunawan Putri; Justinus Andjarwirawan; Anita Nathania Purbowo
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Object recognition is a development of the world of AI (Artificial Intelligence) which is used to recognize objects in digital images. Various kinds of recognition can be done with Clothing Image Recognition. In the global industrial era, development of fashion type and variant makes it difficult for people to recognize, for example topwear has variants ranging from sweatshirts, kurtas, waistcoats, etc. This makes users hard to distinguish categories from types of clothing. In fact, users often forget or didn't know the name of a clothing type that they want to find because they just remember the shape.Clothing image recognition uses the CNN (Convolutional Neural Network) method with the VGG16 model. The application of CNN with the VGG16 model will be carried out on Python and Keras as the library to speed up the research process on training data. Application of the program to mobile devices using Android Studio with the Kotlin programming language, with the help of the Tensorflow Lite library as machine learning on mobile devices. The results of this thesis show an accuracy of 81.83% for training data in epoch 1 and 82%-94% for training data in epoch 10 on clothing image recognition.
Implementasi Internet of Things Untuk Pembuatan Keyless Smart Door Dengan NFC Tag Dan QR Code Jason Evander; Resmana Lim; Justinus Andjarwirawan
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Along with the current pandemic that’s been going on, most people will spend their time at home, and wants to feel comfortable and safe because they spend most of the time inside their house. Many burglary door cases happen because the lack of security at their homes.In this research, a trial will be conducted to help resolve the problem by implementing Internet of Things technology on doors as a door lock. There are two ways that can be used for unlocking the lock. First is through scanning a QR Code and second is through a stick from NFC Tag in the form of a sticker that can be attached at a mobile phone. Scanning QR Code will be assisted by a camera, while the NFC Tag reader will be assisted by radio frequency waves to view the objects. Lastly, the fill in QR Code and NFC Sticker data will be assisted by an android-based application, so that the entire technology will be controller by the application. It is hoped that with the help of controlling the entire technology with this application, it will reduce and solve the existing problems regarding door locks that has been happening in our society.
Pengawasan Jalur Kapal dengan Automatic Identification System (AIS) berbasis Android Leonardo Yurion Tungribali; Justinus Andjarwirawan
Jurnal Infra Vol 10, No 2 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Indonesia, which is known as an archipelagic country, has a vast ocean that spans the country, that’s why Indonesia is known as a maritime country. With the vast sea, it becomes a wheel for economic turnover for Indonesia and internationally. Because Indonesia has 4 strategic points out of 10 points on international ship journeys, this makes Indonesian marine traffic very crowded and not a few ships from other countries cross Indonesian. When someone uses a ship to travel or deliver goods, there needs to be information about when the ship will arrive at its destination and the position of the ship when that person checks the information from the ship. Information about the ship consists of several important parts, the first is the estimated time of arrival (ETA), ETA is the time that ship will arrive at the port of destination, the second is the position of the vessel, the position of the vessel is in the form of latitude and longitude coordinates so that we can know the vessel's position on the map, and thirdly a ship specification that tells the ship type, ship size, MMSI, IMO, Call Sign, ship destination, and other important information. This information is quite difficult to find and also when looking for ETA the ship needs to go to the port and sometimes it is also not given in general at the port for certain vessels such as cargo and vessels other than passenger vessels. Therefore we need an application that can display ETA information, vessel position, and vessel specifications with the Android platform. The proposed application also has features that help users to do shipping or use transportation services using vessels. To obtain vessels information, an Automatic Identification System (AIS) is used which provides ship information and assists in calculating the vessel's ETA. ETA calculation and ship position prediction are assisted by the Haversine method. The results of the application have been tested with ETA information with test data, with the difference between ETA obtained from AIS and calculated by the system of ±20 minutes. The results of the application have been surveyed for the level of user satisfaction. The process of using the vessel is more helpful because of the features provided.
Pengamatan IP Cycling Pada VPN Menggunakan GRC Fingerprints dan DNSLeakTest R. Agastya Ardhitaputera Ramadhan; Justinus Andjarwirawan; Agustinus Noertjahyana
Jurnal Infra Vol 10, No 2 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

As information technology has evolved within the modern era, the needs of information rises along with it. Where every individual need information quickly and accurately, a supporting medium must support it. One of these medium is fast internet. Many are paranoid towards the idea of the government stealing their private information and using it for what they see fit. The objective of this research is to determine whether or not the stability of said VPN is of acceptable levels. The data will be taken hour-by-hour for 30(thirty) days from www.dnsleaktest.com and www.grc.com/fingerprints.htm. The results will then be forwarded to the Google Sheets website that has been programmed to receive the IP, Hostname, ISP and Country tags from the source code from said page. Commercial VPNs are private networks that allow its users to appear to be connecting from another network. This is however not without risk, for those services may not be safe. In this experiment, we have concluded that some VPNs are unstable when used at certain times.
Pengurangan Sampah Makanan dalam Bisnis Kuliner Menggunakan Konsep E-Marketplace pada Aplikasi Mobile Jessica Clarensia Suko; Djoni Haryadi Setiabudi; Justinus Andjarwirawan
Jurnal Infra Vol 10, No 2 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Food waste has a lot of negative impact on various aspects. The two biggest contributor of food waste are domestic food waste and food service food waste that come from foods that are unsold. There are a few mobile applications that help reducing food waste on a domestic level using food sharing between individuals, but it didn’t work effectively due to lack of trust. To resolve that, a mobile application with an e-marketplace concept will be created to reduce food waste that focuses on culinary businesses (food services) level. With e-marketplace concept, the individual who has the role to give the food to the consumers will be culinary businesses that used to make foods on day to day basis and have their own business reputation, so that hopefully it will increase the trust of the consumers on receiving leftover foods (unsold foods). The application was tested on two culinary businesses in Surabaya with the first culinary business being a small culinary business and not very well known by the public, while the second culinary business is a large and very well-known culinary business among the public. The result shows that the application can reduce food waste as much as 5% on the first culinary business, but the application has failed to reduce the food waste of the second culinary business. On the other hand, the application managed to increase the trust of the consumers on buying and accepting the leftover foods although there is culinary business that the consumers didn’t know before.
Aplikasi Self Management untuk Mencatat Jadwal Kegiatan Dengan Speech to Text Menggunakan Google API Berbasis Android Kevin Angka Wijaya; Justinus Andjarwirawan; Lily Puspa Dewi
Jurnal Infra Vol 10, No 2 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Self Management is a person's ability to control himself against an action. But there are still many people who underestimate this, especially in terms of scheduling activities. People tend to only rely on memory and organize activities incorrectly. This makes people think a lot and tend to forget things. Thus, a scheduler app can be a perfect solution for busy people. This paper was made to create an application for scheduling using speech to text. The features of the application are calendars, to-do lists, notes, and speech to text. Speech to text using the Google Speech API. Calendar connects directly to Google Calendar using the Google Calendar API. Other features are stored in a local database in the form of SQLite. The application was tested by measuring the speed of making a schedule using a stopwatch. The result is that the schedule can be made in 10.426 seconds using speech to text. By using the Google Speech API in making the schedule, the accuracy obtained reaches 96.45%.
Aplikasi Moblie Learning untuk Meningkatkan Interaksi Pembelajaran dalam Mendukung Penyerapan Materi Pembinaan UMKM oleh LPPM Universitas Kristen Petra dengan Menerapkan Model Learning Group Cynthia Wijaya; Djoni Haryadi Setiabudi; Justinus Andjarwirawan
Jurnal Infra Vol 10, No 2 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

 Synchronous learning provided by LPPM in learning events is often limited, and makes MSME participants have to understand and develop the material that has been delivered individually after receiving the lesson. This makes the lack of interaction in learning, and reduces the interest and attention of MSMEs to improve learning from the material obtained, especially when they find difficulties in learning. This can affect the level of absorption of material by MSMEs to be not optimal. Several previous studies using mobile learning still have weaknesses, namely learning is still more focused on individual learning so there is no interaction in the learning process through mobile learning.To overcome this problem, in this study a mobile learning application was designed with a learning group model that has collaborative features, such as the task forum feature where MSMEs can choose the question to be worked on and then give each other comments on whether the answers in each question are correct, problem box to help each other provide solutions from a lack of understanding of the material, discussion forums to discuss things that have not been discussed in the material, glossary, chat with tutors and mobile push notification support to encourage MSMEs to be more active in mobile learning.The results of this study based on questionnaires and activity calculations, it can be concluded that the mobile learning application with the learning group model helps MSMEs to understand or increase the absorption of material in training. In addition, it also makes MSMEs active in participating in the training, thus indirectly helping better absorption of material.
Sistem Rekomendasi Pembelian Laptop dengan K-Nearest Neighbor (KNN) Sheeren Hendrik Anggela; Leo Willyanto Santoso; Justinus Andjarwirawan
Jurnal Infra Vol 10, No 2 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Over a decade, the number of people who needs a laptop for their job is increased because of its slim design and internal battery that makes it easier to carry anywhere, if compare to an old-fashioned computer. However, the choices of laptop specifications are various, namely the laptop model, brand of the processor, the speed of processor, size of the screen, RAM, price, etc. Not all people knows the indicator of choosing the laptop that fit to their wants and needs. In this study, the process of recommendation system is used a methods namely K-Nearest Neighbor Collaborative Filtering. This method will estimate the distance with Euclidean formula between the users' criteria and the survey. The closest distance is considered as the recommendation. The data testing is done through counting the accuration based on the recommendation's result which is given to the user. The survey is used for counting the total of valid recommendation. he results of this study using a satisfaction survey that has been surveyed to 10 laptop shop employees. Based on the survey results, average accuracy of testing the recommendation results is 84%. Testing the appearance of the website is also quite good because most users give a value or rating of 4 or 5. Based on the testing results, it can be concluded that the appearance of the website and the results of recommendations with the K-Nearest Neighbor method is pretty good because they are in accordance with the criteria and needs of users.