Achmad Hindasyah, Achmad
Pusat Penelitian Bahan Industri Nuklir (PTBIN) - BATAN

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Program Simulasi Perancangan Rangkaian Magnetik Pembangkit Medan Elektromagnet untuk Pengujian Sensor GMR Hindasyah, Achmad; Purwanto, Setyo; Heru, Bambang; Taufik, Agus
Jurnal Fisika dan Aplikasinya Vol 9, No 1 (2013)
Publisher : Jurnal Fisika dan Aplikasinya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (29.618 KB) | DOI: 10.12962/j24604682.v9i1.776

Abstract

Pengujian unjuk kerja sensor Giant Magnetoresistance (GMR) dilakukan dengan memberikan variasi medan elektromagnetik dan mengukur perubahan resistansi sensor sebagai tanggapan dari masukan. Program ini, yang dibuat dengan menggunakan bahasa Lab View, dapat digunakan untuk merancang rangkaian magnetik sebagai pembangkit medan elektromagnet. Parameter masukan untuk program ini antara lain permeability relatif inti, jumlah lilitan, dimensi inti, fringing dan panjang air gap. Sedangkan parameter keluaran yang dihasilkan adalah reluktansi inti dan air gap, fluks pada inti dan udara serta arus listrik yang dibutuhkan. Parameter masukan dihitung dengan menggunakan persamaan-persamaan medan elektromagnetik untuk mendapatkan keluaran. Dengan menggunakan program ini, pembuatan rangkaian magnetik sebagai sumber medan elektromagnet untuk pengujian sensor GMR dan penentuan parameter-parameter fisis yang akurat menjadi lebih mudah.  
Sistem Informasi Quality Assurance Proses Produksi Menggunakan Metode Agile Berbasis Web Ernawati, Ayu; Kurnia, Dadang; Hindasyah, Achmad
Jurnal Informatika Universitas Pamulang Vol 6, No 3 (2021): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32493/informatika.v6i3.10272

Abstract

The company still uses manual recording of reports, namely using paper media in production activities, so during this pandemic it is quite difficult for admins and superiors to check reports. In addition, because the reporting process is still manual, data loss or data redundancy often occurs. This research designs and creates a web-based system to assist admins and superiors in checking reports. This system can provide item status reports, good item reports, service items, and damaged items, as well as monthly sales charts. For making this application using the agile method, where the application is made by collecting data which is then made an application that goes through the phases of planning, implementation, software testing, documentation, testing and maintenance. Based on the questionnaire on the satisfaction of using the system, a minimum number of 83.33 was obtained which indicates the application is in accordance with the company's request, where data can be stored properly and can detect double input data.
Analisis dan Implementasi Honeypot Honeyd Sebagai Low Interaction Terhadap Serangan Distributed Denial Of Service (DDOS) dan Malware Ubaidillah, Ubaidillah; Taryo, Taswanda; Hindasyah, Achmad
JTIM : Jurnal Teknologi Informasi dan Multimedia Vol 5 No 3 (2023): November
Publisher : Puslitbang Sekawan Institute Nusa Tenggara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35746/jtim.v5i3.405

Abstract

Every computer device connected to a wide computer network is vulnerable to security risks. These threats encompass vulnerabilities to data, information, resources, and services within the system. These threats include intrusion, eavesdropping, theft of vital data, as well as damage to the network system. These actions are carried out by parties who are not accountable, commonly referred to as intruders or attackers. One method to prevent or anticipate these malicious actions is by utilizing the honeyd Honeypot technique. The honeyd Honeypot adopts a low-interaction approach, which involves indirect interaction with attackers. This Honeypot serves as a decoy or simulated server intentionally presented as a target for attacks. The purpose of this Honeypot is to detect and analyze ongoing attacks. In this research, the honeyd Honeypot is implemented as a simulated server resembling an authentic server. This server provides various services and opens several ports deliberately prepared as attack targets, such as Port 139, and Port 21.The results of this research unveil the existence of attacks. Signs of these attacks include a surge in network traffic, reaching up to 100 Megabits above the normal level. Another indicator is a sudden spike in CPU usage, reaching 100%. The activities of these attacks can be analyzed through the installed Wireshark application on the Honeypot server. Information obtained from this analysis encompasses details about the attacker's activities, enabling more effective preventive, anticipatory, and corrective measures. These steps encompass securing the server, network system, and existing services.