Claim Missing Document
Check
Articles

Pemodelan Lingkungan Virtual untuk Interaksi Avatar Berbasis Context Pada Proyek Digital Life at Campus (DiL@C) Sajati, Haruno; Nugroho, Lukito Edi; Ferdiana, Ridi
Jurnal Buana Informatika Vol 3, No 2 (2012): Jurnal Buana Informatika Volume 3 Nomor 2 Juli 2012
Publisher : Universitas Atma Jaya Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract. Campus activities that use information technology increasing rapidly, these activities e.g. studying activity, access to information and so on. The increased activities forces instance has an "assistants" who can help the real user to complete their works and responsibilities. Virtual world allows the user to be in a different context so that it can follow a different activity at one time. Avatar requires a virtual Environment for the activity. This research build a model in virtual world (VES) that would bring together between avatars, virtual objects and context to work in a scenario in Digital Life at Campus (Dil@C). Design written in this paper to formulate a model of Context based communication, system architecture and implementation that can be applied in the virtual world.Keywords: DiL@C, avatar, context, Virtual Environment System (VES). Abstrak. Aktifitas kampus yang memanfaatkan teknologi informasi semakin banyak, Aktifitas ini contohnya perkuliahan, akses informasi dan lain-lain. Peningkatan aktifitas ini memaksa instance di dalam kampus memiliki ”asisten” yang dapat membantu real user untuk menyelesaikan pekerjaan dan tanggung jawabnya. Dunia virtual memungkinkan user dapat berada pada konteks yang berbeda sehingga dapat mengikuti aktifitas yang berbeda pada satu waktu. Pengembangan model avatar yang merepresentasikan user dalam dunia maya membutuhkan lingkungan virtual untuk beraktifitas. Penelitian ini memodelkan sebuah dunia virtual (VES) yang dapat mempertemukan antara avatar, obyek-obyek virtual dan konteks untuk bekerja dalam sebuah skenario dalam Digital Life at Campus (DiL@C). Perancangan yang ditulis dalam paper ini merumuskan model komunikasi berbasis konteks, arsitektur sistem dan implementasi yang bisa diterapkan dalam dunia virtual.Kata Kunci: DiL@C, avatar, konteks, Virtual Environment System (VES).
ANALISIS KUALITAS PERBAIKAN CITRA MENGGUNAKAN METODE MEDIAN FILTER DENGAN PENYELEKSIAN NILAI PIXEL Sajati, Haruno
Angkasa: Jurnal Ilmiah Bidang Teknologi Vol 10, No 1 (2018): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (205.411 KB)

Abstract

Metode Median Filter adalah salah satu metode perbaikan kualitas citra pada domain spatial. Domain spatial memiliki kelebihan pada hasil perbaikan karena perbaikan citra dilakukan per-pixel. Karena perbaikan citra dilakukan terhadap pixel, metode Median Filter memiliki komputasi yang tinggi dan waktu eksekusi yang lama.Dengan melakukan penyeleksian terhadap pixel yang perlu diperbaiki dapat mengurangi waktu proses perbaikan dan meningkatkan kualitas citra karena pixel yang sudah benar, tidak perlu diperbaiki. Pengukuran kualitas citra dilakukan menggunakan Peak Signal to Noise Ratio (PSNR) dengan membandingkan nilai citra asli dengan citra hasil perbaikan. Nilai PSNR ideal untuk disebut sebagai citra yang baik adalah 30dB.Kualitas Citra metode Median Filter dengan penyeleksian memiliki kenaikan nilai PSNR sebesar 5.6% dan memiliki kenaikan kecepatan waktu proses perbaikan kualitas citra sebesar 8.3% dibanding merubah semua nilai pixel citra
PENERAPAN SISTEM KEAMANAN MENGGUNAKAN CRYPTOGRAPHY PADA APLIKASI CHATTING DENGAN MEMODIFIKASI ALGORITMA RIVEST SHAMIR ADLEMAN (RSA) Muttaqin, Muttaqin; Sajati, Haruno; Retnowati, Nurcahyani Dewi
Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (288.434 KB)

Abstract

Chatting application is an application which used for communication through local network or internet. It can use to make communication to be effective and easy to use but there are several shortage in delivery information process is data security when communication is going on. Using chrypthography with modification Rivest Shamir adleman (RSA) algorithm in encryption process and decryption on packet data which transmited is one of security system which can used in this application then the security of data packet secured. Result from implementation of chatting application which apply chrypthography with modification Rivest Shamir adleman (RSA) algorithm have done in local network and internet able to run smoothly and have done by several testing cases based on certain scenario.  Whereas process testing encryption  and decryption using tools wireshark.
PERANCANGAN ALGORITMA ANGGI (AA) DENGAN MEMANFAATKAN DIFFIE-HELLMAN DAN RONALD RIVEST (RC4) UNTUK MEMBANGUN SISTEM KEAMANAN BERBASIS PORT KNOCKING Suhendar, Anggi Sri Septiani; Sajati, Haruno; Astuti, Yenni
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (154.818 KB)

Abstract

In managing a server, an administrator takes a variety of ways for ensuring the safety and cosiness of the system. One type of threat that attack on the server is done on a port that is in an open state, thus making people who do not have access rights to perform port scanning to infiltrate into the server. One solution to cope with the attack on the port can be done by using port knocking. Port knocking is a method that can be applied to the server with the workings of such a code to unlock the safe. Port knocking is done by inserting a predetermined port sequenced to open a specific port. At the port sequenced delivery process takes an additional authentication likes keyport. Anggi algorithm (AA) is an algorithm that is built by combination o f Diffie-Hellman and RC4. The algorithm is used for encryption and descriptions a keyport from client side to the server side. In the process of sending a keyport to be modified by using the arithmetic calculation. Process of encryption and description keyport is done to prevent some attacks on the server by hackers with extracting such information after successfully breaking into a port. The results o f implementation AA algorithm on the process of port knocking can secure the delivery process o f keyport and improve the security o f server.
PERANCANGAN DAN ANALISA PERBANDINGAN ANTARA DELAY DAN THROUGHPUT PADA VIDEO STREAMING MENGGUNAKAN IPv4 DAN IPv6 TUNNELING Sajati, Haruno; Nugrahenny, Dwi; Nugroho, Eko Cahyo
SENATIK STT Adisutjipto Vol 1 (2013): Kreativitas Anak Bangsa untuk Kemajuan Teknologi dan Informasi
Publisher : Sekolah Tinggi Teknologi Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (618.114 KB) | DOI: 10.28989/senatik.v1i0.50

Abstract

Along with the rapid growth of the Internet, causing problem in the allocation of IPv4 addressing. Therefore, IPv4 only have less than 4 billion addresses and will soon be exhausted. Therefore, IPv6 has been created and used hexadecimal system on it addressing and has very large address allocation that is 3,4 x 1038 addresses. But now many network infrastructures in terms of hardware and software that have not fully support IPv6. So, the devices that still using IPv4 can through IPv6-based network infrastructures, they can use tunneling technique. This makes the emergence of the idea to test the delay and throughput in streaming video system which has a heavy workload on the network. Video streaming system on Vision 1.0 application takes advantage motor stepper webcam in order to support the visibility of the image that can be captured. Then the client who connected to the server can control remotely the motor stepper webcam. On the implementation phase, Vision 1.0 is running on IPv4 and IPv6 network. Next on the testing phase, carried out delay and throughput data collections from those both network systems. From the obtained results in testing, showed no significant difference. So, in general, the performance difference is not too pronounced when the video streaming system is running on both network systems. However, from a comparison based on mean value of delay and throughput, IPv4 is still superior due to the header of the data packet does not as big asIPv6 header which of course affects the packet data frame size, then the traffic network more crowded.
Pendampingan Pengenalan Metode Pengetikan Cepat Menggunakan Microsoft Word Bagi Siswa Kelas 5 SD IT Salsabila Al Muthi’in Yogyakarta Nugrahenny, Dwi; Wintolo, Hero; Kusumaningrum, Anggraini; Sudaryanto, Sudaryanto; Sajati, Haruno
KACANEGARA Jurnal Pengabdian pada Masyarakat Vol 2, No 1 (2019): Januari
Publisher : Sekolah Tinggi Teknologi Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (339.21 KB)

Abstract

Teknologi Informasi dan Komunikasi (TIK) pada jaman sekarang sangat dibutuhkan oleh setiap masyarakat baik itu orang dewasa maupun anak-anak. Khusus pada anak-anak, sangat dibutuhkan pelatihan penggunaan perangkat teknologi informasi dan komunikasi agar nantinya anak-anak dapat memanfaatkannya dengan baik. Salah satunya adalah dengan mengenalkan penggunaan aplikasi pengolah kata yaitu Microsoft Word. Microsoft Word adalah aplikasi pengolah kata yang sangat populer pada saat ini, dengan aplikasi tersebut dapat memudahkan kerja manusia dalam melakukan pengetikan surat maupun dokumen lain. Anak-anak dapat diajarkan aplikasi tersebut guna mendukung kesehariannya dalam kegiatan akademik di sekolah. Kegiatan pengabdian pada masyarakat semester ini dititikberatkan dalam bentuk Pendampingan Pengenalan Metode Pengetikan Cepat menggunakan Software Microsoft Word 2010 bagi siswa-siswi kelas 5 di SDIT Salsabila Al Muthi’in Yogyakarta. Diharapkan adanya pedampingan tersebut, siswa/siswi dapat lebih mengetahui tentang bagian-bagian Aplikasi Microsoft Word dan penggunaannya sehingga dapat membantu saat pengerjaan tugas sekolah maupun meningkatkan kreativitas. Hasil dari kegiatan pengabdian yang dilaksanakan memberikan pengalaman dan ketrampilan pada para siswa di SDIT Salsabilla Al-Muthi’in dalam menggunakan aplikasi Microsoft Word 2010.
PERANCANGAN KEAMANAN SISTEM MENGGUNAKAN ALGORITMA HONEYPOT PADA APLIKASI KRS ONLINE (STUDI KASUS : SEKOLAH TINGGI TEKNOLOGI ADISUTJIPTO) Setiawan, Yoris; Sajati, Haruno; Sudibya, Bambang
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (160.53 KB)

Abstract

Many colleges already apply web based academic information system use internet connection, so it is need a system security to protect from attacks such as SQL Injection and Brute Force. Honeypot is a system security which devide two system that are original and fake system. Original system used by user to access academic information system that source from correct database. While fake system used to separate hacker and user. Hackers who try to enter with SQL Injection is send to fake system directly which has wrong data. This fake system seems correct and all action that was happened in will be noted on log history. When hacker try some password ese Brute Force, system will reset user password automatically. This system already test with 79 times SQL Injection and 29 times Brute Force attack. All attacks can handle nicely with honeypot algorithm.
ALGORITMA MASIH MUSLIATUN (MM) UNTUK MENDUKUNG SISTEM OTOMATISASI PENDAFTARAN PRAKTIKUM DENGAN PENGUJIAN PADA JARINGAN KOMPUTER (STUDI KASUS DI STTA YOGYAKARTA) Musliatun, Masih; Sajati, Haruno; Indrianingsih, Yuliani
Compiler Vol 2, No 1 (2013): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (214.016 KB)

Abstract

Practicum registration systems that exist on campus STTA previously done manually, where students will sign up to the admin to bring proof of payment practicum. Students are free to choose his own class, this often resulted in unbalanced number of students in the classroom lab that is consideredless  effective way. This makes the emergence of the idea to establish an MM algorithm is applied to a practical application o f automation systems. MM algorithm works by determining many lab classes based on students who took the KRS. Furthermore, students who have paid practicum will be immediately incorporated into the classes that are available with regard to the number of students and GPA o f students per class, so it will obtain practical classes by the number o f students and the average GPA o f each class balanced.Concept application using client-server database, where the database is on the Local Area Network (LAN) STTA. To facilitate the management admin, then the application will be tested on the LAN network and VPN (Virtual Private Network) network. LAN is a computers network that are connected to a computer server by using specific topologies, typically used in areas of the building or area a distance o f not more than 1 km (local area). While VPN is a secure way to access the Local Area Network that is in range, using the Internet or other public network to perform packet data transmission in private. By using a VPN, users can access the computer that is on the LAN even though the user is not in the same location with a LAN.
BANDWIDTH MANAGEMENT TO SET OF INTERNET CONNECTION REFERING FROM STRUCTURAL POSITION USE MIKROTIK RB751-2HnD WITH WEB BASED IN ADISUTJIPTO HIGH SCHOOL TECHNOLOGY Sulistiyo, Brama Ady; Sajati, Haruno; Tamatjita, Elizabeth Nurmiyati
Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (110.924 KB)

Abstract

Development of information technology and computer networks in particular its services on the one hand facilitate the work of human beings, but as a very widespread internet usage, internet access usage levels become unmanageable. The need for a web-based application that facilitates an admin to manage the bandwidth seems very necessary. By using or utilizing the API (application programming interface) that has been provided by the router is to create a Bandwidth Management Application To Set Internet Connection Referring Structural Position Use Mikrotik RB751G - 2HnD With Web Based In Adisutjipto Technology High School. The results Application test show and prove that bandwidth isn’t right as the transfer rate. As for transfer rate or download speed is not affected by bandwidth rather influenced by the size distribution of the bandwidth paths. Test results also proved that a bandwidth leased from a provider not in accordance with the offer.
SISTEM KEAMANAN JAIL BASH UNTUK MENGAMANKAN AKUN LEGAL DARI KEJAHATAN INTERNET MENGGUNAKAN THC-HYDRA Hamka, Cakra Aminuddin; Sajati, Haruno; Indrianingsih, Yuliani
Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (211.103 KB)

Abstract

Along with the development of current technology, making technology is very important in today's life. Security level digital data has become more vulnerable to exploitation, the problem arises when an information technology device was attacked by people who do not want to take a responsible and important data illegally, so the administrator must act quickly to secure important data. Making a data security technology on the internet is very important information. Limitations administrator underlying the creation of a system that is able to detect and defense systems against such attacks is automation, so that it can be applied to data security. The system is built to prevent attacks on computer networks with more specific on THC - Hydra. This system will analyze the number of errors in the log into the database, and if the error exceeds the tolerance rules are made by the administrator. If the error is more than 3 times in one minute, then with automation, the system will create a rule that can imprison users who do not have such access, and access to the prison in the illegal user can not perform such activities on legal access and access to activities conducted illegal user can be recorded on a file and jail.txt. So under any circumstances and not in supervising administrator, the security of other user data will be safe and can not be retrieved or viewed by a user of illegal access.
Co-Authors . Sudaryanto Afrizal Triantoro Agustian, Harliyus Alfian Firdaus Anarianto, Donny Andaruwati, Ragil Andaruwati, Ragil Anggi Sri Septiani Suhendar Anggraini Kusumaningrum Anggraini Kusumaningrum Anggraini Kusumaningrum Anggraini Kusumaningrum, Anggraini Antok Hermawan Anton Honggowibowo Anton Setiawan Honggowibowo Astika Ayuningtyas Astika Ayuningtyas Astika AyuningTyas, Astika Awangga, Demmy Nanda Bagus Budi Utomo Bambang Sudibya Bambang Sudibya, Bambang Bayu Sugara Brama Ady Sulistiyo Cakra Aminuddin Hamka Candra Wulan, Puspa Ira Dewi Demmy Nanda Awangga Dwi Kholistyanto Dwi Nughraheny Dwi Nugrahenny Dwi Nugrahenny, Dwi Dwi Nugraheny Dwi Nugraheny Dwi Nugraheny, Dwi Ega Ari Wiyasa Eko Cahyo Nugroho, Eko Cahyo Eko Murdiansyah Eko Poerwanto Elizabeth Nurmiyati Tamatjita Evi Wahyuningsih Fahlevi, Wildansyah Reza Firdaus, Alfian Freddy Kurniawan Galih Andita Sukma Galih Dwi Wicaksono Hamka, Cakra Aminuddin HARLIYUS AGUSTIAN Hermawan, Antok Indro Lukito Irawaty, Mardiana Kholistyanto, Dwi Kristopedus Zonggonau Latumaone, Yulis Robert Leonardo Tampubolon Lukito Edi Nugroho Lukito, Indro Masih Musliatun Murdiansyah, Eko Musliatun, Masih Muttaqin Muttaqin Muttaqin Muttaqin, Muttaqin Nova Adi Suwarso Nughraheny, Dwi Nur Hanifah Nur Hanifah Nurcahyani Dewi Retnowati Nurcahyani Dewi Retnowati Nurdin, Riani Okto Dinaryanto Pujiastuti, Asih Puspa Ira Dewi Candra Wulan Riani Nurdin Ridi Ferdiana Rizki Tanjung Salam Aryanto Setiawan, Yoris Sudaryanto Sudaryanto Sugara, Bayu Suhendar, Anggi Sri Septiani Sukma, Galih Andita Sulistiyo, Brama Ady Suwarso, Nova Adi Tanjung, Rizki Triantoro, Afrizal Utomo, Bagus Budi Wicaksono, Galih Dwi Wildansyah Reza Fahlevi Wintolo, Hero Yenni Astuti Yenni Astuti, Yenni Yofita Sandra, S.Pd., M.Pd., Zico Farlin, Dr. Budiwirman, M.Pd., Yoris Setiawan Yuliani Indrianingsih Yuliani Indrianingsih Yuliani Indrianingsih Yulis Robert Latumaone Zonggonau, Kristopedus