Articles

Found 32 Documents
Search

Pemodelan Lingkungan Virtual untuk Interaksi Avatar Berbasis Context Pada Proyek Digital Life at Campus (DiL@C) Sajati, Haruno; Nugroho, Lukito Edi; Ferdiana, Ridi
Jurnal Buana Informatika Vol 3, No 2 (2012): Jurnal Buana Informatika Volume 3 Nomor 2 Juli 2012
Publisher : Universitas Atma Jaya Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract. Campus activities that use information technology increasing rapidly, these activities e.g. studying activity, access to information and so on. The increased activities forces instance has an "assistants" who can help the real user to complete their works and responsibilities. Virtual world allows the user to be in a different context so that it can follow a different activity at one time. Avatar requires a virtual Environment for the activity. This research build a model in virtual world (VES) that would bring together between avatars, virtual objects and context to work in a scenario in Digital Life at Campus (Dil@C). Design written in this paper to formulate a model of Context based communication, system architecture and implementation that can be applied in the virtual world.Keywords: DiL@C, avatar, context, Virtual Environment System (VES). Abstrak. Aktifitas kampus yang memanfaatkan teknologi informasi semakin banyak, Aktifitas ini contohnya perkuliahan, akses informasi dan lain-lain. Peningkatan aktifitas ini memaksa instance di dalam kampus memiliki ”asisten” yang dapat membantu real user untuk menyelesaikan pekerjaan dan tanggung jawabnya. Dunia virtual memungkinkan user dapat berada pada konteks yang berbeda sehingga dapat mengikuti aktifitas yang berbeda pada satu waktu. Pengembangan model avatar yang merepresentasikan user dalam dunia maya membutuhkan lingkungan virtual untuk beraktifitas. Penelitian ini memodelkan sebuah dunia virtual (VES) yang dapat mempertemukan antara avatar, obyek-obyek virtual dan konteks untuk bekerja dalam sebuah skenario dalam Digital Life at Campus (DiL@C). Perancangan yang ditulis dalam paper ini merumuskan model komunikasi berbasis konteks, arsitektur sistem dan implementasi yang bisa diterapkan dalam dunia virtual.Kata Kunci: DiL@C, avatar, konteks, Virtual Environment System (VES).
PENCOCOKAN GAMBAR SIDIK JARI DENGAN KAMERA HANDPHONE MENGGUNAKAN METODE RANSAC DAN TRANSFORMASI AFFINE BERBASIS ANDROID Sajati, Haruno; Nughraheny, Dwi; Suwarso, Nova Adi
Compiler Vol 6, No 1 (2017): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (784.267 KB)

Abstract

Fingerprints occur due to stroke differences. These stroke differences have occurred at a time when humans are still fetal form. A normal fingerprint pattern is formed of lines and spaces. These lines are called ridges whereas the spaces between these lines are called valleys. To make an introduction to the fingerprint image requires a variety of support tools. Starting from a fingerprint machine, a smartphone that has a fingerprint sensor and much more. In this research, the acquisition of image is done by grayscaling, histogram equalization, gabor filter, binary, thinning, 8 neighbors, matching.The result of making android application with the method that has been described to show unfavorable results seen from the calculation of the accuracy of 63%. Based on testing the specs android OS devices, this application can run on android with OS 4.4.2 specification kitkat.Fingerprints occur due to stroke differences. These stroke differences have occurred at a time when humans are still fetal form. A normal fingerprint pattern is formed of lines and spaces. These lines are called ridges whereas the spaces between these lines are called valleys. To make an introduction to the fingerprint image requires a variety of support tools. Starting from a fingerprint machine, a smartphone that has a fingerprint sensor and much more. In this research, the acquisition of image is done by grayscaling, histogram equalization, gabor filter, binary, thinning, 8 neighbors, matching.The result of making android application with the method that has been described to show unfavorable results seen from the calculation of the accuracy of 63%. Based on testing the specs android OS devices, this application can run on android with OS 4.4.2 specification kitkat. Keywords : OCR Fingerprint, Fingerprint recognition, Minutiae based matching, Fingerprint image processing.
MEMBANGUN SISTEM KEAMANAN ARP SPOOFING MEMANFAATKAN ARPWATCH DAN ADDONS FIREFOX Zonggonau, Kristopedus; Sajati, Haruno
Compiler Vol 4, No 1 (2015): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (199.955 KB)

Abstract

The Development of information Technology, especially computer networks and the service in a rejuvenate the human side. The development of the internet is very widespread. The security level digital data becomes vulnerable to attack by the attacker. Arp spoofing is one of the attacks in a network that can be used to view digital data traffic such as emails, passwords and etc, when is running in the network. The process of prevention againtst arp spoofing attacks, made an application to detect and block the attacker in the network by Firefox Addons. Attacker will be directly blocking (drop) into to Mikrotik OS. Users avoid the attack arp spoofing. The results of testing one, two and three can be detect and block the presentation of the results of 83%, so That’s the terms of security in the network can be safe from attack to the attacker.
PENERAPAN EIGENFACE UNTUK COMPUTER BASED TEST (CBT) PENERIMAAN MAHASISWA BARU SEKOLAH TINGGI TEKNOLOGI ADISUTJIPTO Sajati, Haruno; Ayuningtyas, Astika; Kholistyanto, Dwi
Compiler Vol 6, No 2 (2017): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (447.556 KB)

Abstract

One of the development of computer technology is the availability of systems or applications that help human work everyday so that can be resolved quickly and correctly. The system, one of which is Computer Based Test (CBT). CBT is an application used for tests conducted using computers that are in the application there are some features of CBT security when working on the problem. CBT can use a stand-alone computer, a computer connected to a network or a computer connected to the internet. Facial recognition is a type of biometric application that can identify specific individuals in a digital image by analyzing and developing face patterns. In its implementation, CBT has a weakness in the security system that becomes the gap of CBT users to commit fraud, therefore required a good security system with the creation of CBT applications that use eigenface algorithm. It is necessary to have a security system that overcomes the problem that is required identification of face recognition of participants during the test so that cheating can be reduced. The results of the test using eigenface algorithm accuracy rate reached 82%, some things that affect the level of accuracy is, the intensity of light, facial position and the use of accessories on the face.
THE AUDIO VIDEO OF WEB-BASED COMPRESSION WITH FFMPEG Triantoro, Afrizal; Sajati, Haruno; Pujiastuti, Asih
Compiler Vol 7, No 2 (2018): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (596.212 KB)

Abstract

In general, video compression only compresses video files without compressing the audio files in them. This results in the compression process not being maximized.This study discusses the process of compressing video and audio files to get maximum compression. The application built is a web-based video compression software utilizing FFmpeg to do the compression process by breaking down the original video which has a resolution of 720 to 4 files, namely 720, 480, 360, and 240 resolutions. The test is done by comparing the compression results only to video files and compressing to video and audio and there is a 1-2 MB file size difference, whereas when compared to the original file, there is a 5-20 MB size difference. In addition to conducting this test also performed compression testing on different devices and obtained relatively similar results on all devices. Test the image quality on the compressed file obtained the image quality results in the standard video compression below 30dB results.
AUTOMATISASI PENENTUAN JALUR KONEKSI INTERNET PADA TIGA PROVIDER Wicaksono, Galih Dwi; Sajati, Haruno; Nugraheny, Dwi
Compiler Vol 5, No 1 (2016): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (179.467 KB)

Abstract

Along with the times, the computer network has undergone many changes from time to time. Eventually, internet network is known. To test the reachability of a host on an IP address (internet protocol) network and to measure the round-trip time for messages sent from the host to the destination, computer needs to perform ping process. Ping operates by sending ICMP (Internet Control Message Protocol) echo request packets to the target host and waiting for an ICMP response. internet connection lane determination automation uses three providers done by comparing the smallest average value of the result of the ping. The test results are printed in the form of a statistical summary of the response packets received, including the minimum, maximum and average round-trip time. The signal strength is not directly proportional to the value of average, because the signal strength is affected by the report the data RSCP, throughput and quality of services covering CSSR (Call Setup Success Ratio), CCSR (Call Completion Success Ratio), DCR (Dropped Call Ratio) and BCR (Blocked Call Ratio) which can be used to optimize the network.
PERANCANGAN KEAMANAN SISTEM MENGGUNAKAN ALGORITMA HONEYPOT PADA APLIKASI KRS ONLINE (STUDI KASUS : SEKOLAH TINGGI TEKNOLOGI ADISUTJIPTO) Setiawan, Yoris; Sajati, Haruno; Sudibya, Bambang
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (160.53 KB)

Abstract

Many colleges already apply web based academic information system use internet connection, so it is need a system security to protect from attacks such as SQL Injection and Brute Force. Honeypot is a system security which devide two system that are original and fake system. Original system used by user to access academic information system that source from correct database. While fake system used to separate hacker and user. Hackers who try to enter with SQL Injection is send to fake system directly which has wrong data. This fake system seems correct and all action that was happened in will be noted on log history. When hacker try some password ese Brute Force, system will reset user password automatically. This system already test with 79 times SQL Injection and 29 times Brute Force attack. All attacks can handle nicely with honeypot algorithm.
PERANCANGAN ALGORITMA ANGGI (AA) DENGAN MEMANFAATKAN DIFFIE-HELLMAN DAN RONALD RIVEST (RC4) UNTUK MEMBANGUN SISTEM KEAMANAN BERBASIS PORT KNOCKING Suhendar, Anggi Sri Septiani; Sajati, Haruno; Astuti, Yenni
Compiler Vol 2, No 2 (2013): November
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (154.818 KB)

Abstract

In managing a server, an administrator takes a variety of ways for ensuring the safety and cosiness of the system. One type of threat that attack on the server is done on a port that is in an open state, thus making people who do not have access rights to perform port scanning to infiltrate into the server. One solution to cope with the attack on the port can be done by using port knocking. Port knocking is a method that can be applied to the server with the workings of such a code to unlock the safe. Port knocking is done by inserting a predetermined port sequenced to open a specific port. At the port sequenced delivery process takes an additional authentication likes keyport. Anggi algorithm (AA) is an algorithm that is built by combination o f Diffie-Hellman and RC4. The algorithm is used for encryption and descriptions a keyport from client side to the server side. In the process of sending a keyport to be modified by using the arithmetic calculation. Process of encryption and description keyport is done to prevent some attacks on the server by hackers with extracting such information after successfully breaking into a port. The results o f implementation AA algorithm on the process of port knocking can secure the delivery process o f keyport and improve the security o f server.
ANALISIS KUALITAS PERBAIKAN CITRA MENGGUNAKAN METODE MEDIAN FILTER DENGAN PENYELEKSIAN NILAI PIXEL Sajati, Haruno
Angkasa: Jurnal Ilmiah Bidang Teknologi Vol 10, No 1 (2018): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (205.411 KB)

Abstract

Metode Median Filter adalah salah satu metode perbaikan kualitas citra pada domain spatial. Domain spatial memiliki kelebihan pada hasil perbaikan karena perbaikan citra dilakukan per-pixel. Karena perbaikan citra dilakukan terhadap pixel, metode Median Filter memiliki komputasi yang tinggi dan waktu eksekusi yang lama.Dengan melakukan penyeleksian terhadap pixel yang perlu diperbaiki dapat mengurangi waktu proses perbaikan dan meningkatkan kualitas citra karena pixel yang sudah benar, tidak perlu diperbaiki. Pengukuran kualitas citra dilakukan menggunakan Peak Signal to Noise Ratio (PSNR) dengan membandingkan nilai citra asli dengan citra hasil perbaikan. Nilai PSNR ideal untuk disebut sebagai citra yang baik adalah 30dB.Kualitas Citra metode Median Filter dengan penyeleksian memiliki kenaikan nilai PSNR sebesar 5.6% dan memiliki kenaikan kecepatan waktu proses perbaikan kualitas citra sebesar 8.3% dibanding merubah semua nilai pixel citra
PERANCANGAN DAN PENERAPAN ALGORITMA RIZKI TANJUNG 24 (RTG24) UNTUK KOMPARASI KATA PADA FILE TEXT Tanjung, Rizki; Sajati, Haruno; Nugraheny, Dwi
Compiler Vol 3, No 1 (2014): Mei
Publisher : Sekolah Tinggi Teknologi Adisutjipto Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (118.663 KB)

Abstract

Plagiarism is the act of taking essay or work of others, and recognize it as his own work. Plagiarism of the text is very common and difficult to avoid. Therefore, many created a system that can assist in plagiarism detection text document. To make the detection of plagiarism of text documents at its core is to perform string matching. This makes the emergence of the idea to build an algorithm that will be implemented in RTG24 Comparison file.txt applications. Document to be compared must be a file. Txt or plaintext, and every word contained in the document must be in the dictionary of Indonesian. RTG24 algorithm works by determining the number of same or similar words in any text between the two documents. In the process RTG24 algorithm has several stages: parsing, filtering, stemming and comparison. Parsing stage is the stage where every sentence in the document will be broken down into basic words, filtering step is cleaning the particles are not important. The next stage, stemming is the stage where every word searchable basic word or root word, this is done to simplify and facilitate comparison between the two documents. Right after through the process of parsing, filtering, and stemming, then the document should be inserted into the array for the comparison or the comparison between the two documents. So it can be determined the percentage of similarity between the two documents.