cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
ekrek@gunadarma.ac.id
Editorial Address
Jalan Margonda Raya 100
Location
Kota depok,
Jawa barat
INDONESIA
Jurnal Ilmiah Teknologi dan Rekayasa
Published by Universitas Gunadarma
ISSN : 14109093     EISSN : 20898088     DOI : http://dx.doi.org/10.35760/tr.
Jurnal ini diterbitkan secara berkala tiga kali dalam setahun, April, Agustus, dan Desember. Artikel yang dimuat dalam jurnal ini merupakan artikel ilmiah hasil penelitian tentang teknologi dan rekayasa yang meliputi teknik informatika, teknik elektro, teknik mesin, dan teknik industri. Artikel dapat ditulis dalam bahasa indonesia maupun bahasa inggris.
Articles 10 Documents
Search results for , issue "Vol 19, No 3 (2014)" : 10 Documents clear
Pengamanan Data Menggunakan Kriptografi EC Signcryption dan Steganografi Least Significant Bit (LSB) Triasanti, Dini
Jurnal Ilmiah Teknologi dan Rekayasa Vol 19, No 3 (2014)
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The study aims at developing multiple security system of data namely data signcryption (signature-encryption). The concealment of the encryptioned data in text, or image, or audio, or video. In the study, the cryptograph method used is Elliptic Curve Signcryption, while steganograph used is modificated LSB (Least Significant Bit) method. The system is succeed to be developed using Java program, embedding and retrieving operation can be done fast, it is not significantly depended on the change of stego file. From the side of HVS, HAS, and the combination, there is no change of picture and audio quality in stego file, compress fiture, encryption and signature (signcrypt), as well as the steganograph can provide multi-protection of data.Keywords: Cryptograph, Steganograph, Elliptic Curve Signcryption, Least Significant Bit, Java.
Perbandingan Konsumsi Energi Algoritma AES (256 Bit) dan Twofish (256 Bit) Pada Ponsel Berbasis Android Allo, Serli Liling; Subali, M
Jurnal Ilmiah Teknologi dan Rekayasa Vol 19, No 3 (2014)
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Running an encryption/decryption application on cell phone will be followed by the running CPU, memory, and energy stored in the battery. However, the baterry energy is limited. Therefore, it is important to observe how much energy consummed by encryption/decryption algorhytm to be one of determiners in algorhytm selecting. The study aims at comparing the energy consumption algorhytm of AES (256 bit) and Twofish (256 bit) on Android-based cell phone. To achieve that, the current, voltage, and time encryption/decryption. In the study, the current and voltage encryption/decryption are obtained from direct measurement, while time encryption/decryption is from algorithm benchmark on SSE (Secret Space Encryptor) application program. Energy consumption is obtained from the current, voltage, and time encryption/decryption multiplication. The result indicates that energy consumption algorythm of AES (256 bit) is bigger than Twofish (256 bit).Keywords: AES (256 bit), Encryption/Decryption Energy Consumption, Twofish (256 bit)
Analisis Keamanan Jaringan Wireless LAN (WLAN) Pada PT. PLN (Persero) Wilayah P2B Area Sorong Rumalutur, Sonny
Jurnal Ilmiah Teknologi dan Rekayasa Vol 19, No 3 (2014)
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The study discusses about the safety of Wireless Local Area Network (Wireless LAN) in PT. PLN (Persero) in P2B area in Sorong from outer attack to the protocol of Wireless Protected Access (WPA), Web Proxy, and Virtual Private Network (VPN) which is used to attack the LAN. Three softwares used as attacker are Network Stumbler. Aircrack, and Wreshark. The softwares are used in laptop at the distance of 5m to 25m from LAN wireless access point. Based on the result of the experiment, it indicates that the fastest time responded by WPA protocol is from the attacker of Network Stumbler, and followed by Aircrack and Wireshark.Keywords: Wireless Protected Access, Web Proxy, Virtual Private Network
Pengaruh Konsentrasi Padatan Terhadap Kerugian Tekanan Aliran Lumpur Ridwan, Ridwan
Jurnal Ilmiah Teknologi dan Rekayasa Vol 19, No 3 (2014)
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mud is basically a mixture of solid particles and water forming a suspension. At the time of the mud is flowing through pipes, if the pressure of the flow is not high enough to overcome the drag/friction between particles and against the walls of the channels, then the system will not work properly and optimally. The pressure loss in each fluid flows needs to be recognized and calculated because it will affect the whole system performance. The purpose of the study is to observe the influence of concentration weight (Cw) to the pressure loss on the system. The test fluid is mud with two variations of Cw namely Cw 25% and Cw 50%, as well as, standard hydraulic fluid (Cw 0%). The test pipe used is acrylic pipe with inner diameter of 1” (25,4 mm) and length of 200 mm. The equipment composition is designed and manufactured, as well as equipped by measuring tools such as pumps (piston type), manometer, beaker glass, digital scales, tank shelters, stopwatch, data processing computer, etc. The result of analysis indicates that the higher concentration weight of mud, the bigger friction and pressure loss occuring in the same Reynolds number/speed comparisons. The pressure loss of mud flow with the speed of 0,5 m/sec to 0,65 m/sec contributes the lowest pressure loss.Keywords: Concentration weight, pressure, mud, manometer
Sistem Online Pada Aplikasi Sistem Informasi Berbasis Desktop Menggunakan Virtual Private Network Humaini, Irfan
Jurnal Ilmiah Teknologi dan Rekayasa Vol 19, No 3 (2014)
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Recently, data processing by online and real time has been a certainty. This is possible by information technology development, especially regarding to internet. Every companies or business that want to improve must follow the development in order to stay current and not miss the chance in the free-market competition as present. By understanding such condition, in the study, to improve the performance of a company which has not had desktop-based online and real time system information, the system information application is developed to be an online and real-time system information by keep use the existing and more advanced desktop-based system information application to connect every part and branch of the company which is expanded in some areas. It is done without extremely changing the exist system information such as being designed from the scratch and web-based. In development of the system information, the technology used is virtual private network (VPN), in this case, VPN LogMeIn Hamachi. The justification of using the VPN LogMeIn Hamachi technology or application is because it is considered to be safe, easy to install, quick and economic.Keywords: Virtual Private Network, LogMeIn Hamachi
Implementasi Logika Fuzzy Pada Penentuan Karakteristik Teknik Disain Perancangan Produk Mainan Anak Suhartini, Nanih
Jurnal Ilmiah Teknologi dan Rekayasa Vol 19, No 3 (2014)
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Intergrated design toys requires estimations from various parties who have interest in kids’ toys. The estimations are variables and attributes of kids’ toys, determining the technical characteristics, and providing the prior picture of technical characteristics and prior attribute which have to be met in accordance with costumers’ demands and needs. The method used to interpret the customers’ demands in a product is Fuzzy Quality Function Deployment (Fuzzy QFD). The method is able to synchronize between what customer’s demand with what they able to provide. Based on the result of the analysis, the variable of costumer’s demand of kids’ toys product consists of five main variables of customer’s demand characteristics of the kids’ toys namely forms, size, materials, benefits, and benefits of the toys. To meet the customer’s demands, it needs technical requirements, namely productive, kids’ idea-expressible, responsive, image, knowledge improvable, imaginative, communicative, and flexible. From the seven characteristics, there is a prior scale to improve the characteristics, namely responsive, image, kids’ idea-expressible, imaginative, knowledge improvable, flexible, and communicative.Keywords: Fuzzy Logic, technical characteristics, kids’ toy.
SYSTEM INFORMATION DEVELOPMENT PLAN OF TUITION PAYMENT BY SDLC WATERFALL METHOD Nurasiah, Nurasiah
Jurnal Ilmiah Teknologi dan Rekayasa Vol 19, No 3 (2014)
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Information and Communication Technology utilization on academic administration service in college is now a need. It is no longer a prestige or a modern college management lifestyle. The writer conduct an analysis of system information of tuition payment occuring in the college. She develops the system information of the occuring tuition payment by waterfall method and draws a system design described by Unified Modelling Language (UML). The academic integrated and online system can make the system become more efficient and effective so that it produces the more accurate information.Keywords: SDLC, Waterfall, Tuition
Metode Craft Berbantuan Perangkat Lunak WinQsb Untuk Usulan Perbaikan Tata Letak Fasilitas V2.0 Pada Industri Dompet CV. X Wahyuni, Rossi Septy; Safitri, Astri Anggraini
Jurnal Ilmiah Teknologi dan Rekayasa Vol 19, No 3 (2014)
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Facility layout design is the main foundation in a production and work area layout system employing the width to place machines or other supporting production facilities and to make it easier for moving materials in order to achieve orderly, safety, and comfortable work condition and material flow. The improvement proposal done on facility layout of wallet industry uses CRAFT method with WinQSB V2.0 software. Later, the facility layout improvement will change some area of the facility in accordance to the material flow, so that the distance of flowing and handling cost can be reduced. The total of handling cost of the wallet industry’s facility layout before the improvement is amounted to IDR 785.000,-. Meanwhile, the total of handling cost in the improvement proposal is amounted to IDR 563.100,-. Based on the result of handling cost before and after the improvement, the percentage difference is 28,26%.Keywords: Wallet Industry, Layout Proposal, CRAFT Method
Perancangan Sistem Distribusi Data Antar Sistem Pada Sistem Informasi Sekolah Tinggi Teknik Cendekia (STTC) Putera, Bintang Eka; Subali, Muhammad
Jurnal Ilmiah Teknologi dan Rekayasa Vol 19, No 3 (2014)
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The number of sub-systems which is part of System Information in Sekolah Tinggi Teknik Cendekia (SI-STTC) brings up a question of “how does the whole sub-system exchange information?”. Information exchange inter system needs a rule applying confidential aspects, data integrity and availability as system security standard. Based on the aspects, STTC designs a system named Intersystem Data Integrity System (SIDAS), a web service system designed by SOAP-XML architecture protocol. The system works on intermediate layer protocol so that it is considered to be used as inter sub-system data communication module. The design of SIDAS refers to the main aspect of computer security and business satisfaction aspect. The main aspect of computer security includes confidentiality, integrity, and availability aspect. Business satisfaction aspect refers to the criteria mentioned by COBIT as business need for information. The method used in the study includes two main parts namely business process analysis method and software development method. Business process analysis method includes analysis of business process rule and analysis of the STTC system user role, while software development analysis method use evolutionary development process model to adjust with the specification of development system done. The study produces a result of a system design which can be used as inter sub-system data integrator of System Information Sekolah Tinggi Teknik Cendekia (SI-STTC).Keywords: System Information, STTC, Web Service, Data Distribution, SOAP, XML
Merancang dan Mensimulasi Infinite Impulse Response Chebyshev Low-Pass Digital Filter Menggunakan Perangkat FPGA Wijayanti, Mariza
Jurnal Ilmiah Teknologi dan Rekayasa Vol 19, No 3 (2014)
Publisher : Universitas Gunadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study will present filter design. The first step is determining the filter specification, next, calculating the low pass, high pass, and band-pass of IIR filter, then simulating the design calculation result using MATLAB, and last, implementing the design using FPGA. Direct form is considered to be the approach in realizing digital filter. IIR filter is implemented in Spartan-IIIxc3s500c-4fg320 FPGA and simulated by assisted with Xilinx ISE 9.2i. The software is used in code synthesis and simulation. The code of IIR filter fixed focus form has been realized. The modules used are multiplier, adder, and delay. The result of data simulation then is compared with Matlab program output. Based on the result of filter comparisons, the error occurs because of the component of Divider use which rounding the result of dividing process.Keywords: Filter, IIR, FPGA, Xilinx-Ise 9.2i, Matlab

Page 1 of 1 | Total Record : 10