cover
Contact Name
Ida Bagus Ary Indra Iswara
Contact Email
lppm@stiki-indonesia.ac.id
Phone
-
Journal Mail Official
gungariana@stiki-indonesia.ac.id
Editorial Address
-
Location
Kota denpasar,
Bali
INDONESIA
Jurnal RESISTOR (Rekayasa Sistem Komputer)
Published by STMIK STIKOM Indonesia
ISSN : 25987542     EISSN : 25989650     DOI : -
Jurnal RESISTOR merupakan jurnal yang diterbitkan oleh Lembaga Penelitian dan Pengabdian Kepada Masyarakat (LPPM) STMIK STIKOM Indonesia, dengan P-ISSN 2598-7542 dan E-ISSN 2598-9650. Jurnal RESISTOR diterbitkan pertama kali pada bulan Oktober 2017 dan memiliki periode penerbitan sebanyak dua kali dalam setahun, yaitu pada bulan April dan Oktober.
Arjuna Subject : -
Articles 16 Documents
ANALISA DAN PROBLEM SOLVING KEAMANAN ROUTER MIKROTIK RB750RA DAN RB750GR3 DENGAN METODE PENETRATION TESTING (STUDI KASUS: WARNET AULIA.NET, TANJUNG HARAPAN LAMPUNG TIMUR) Hidayat, Arif; Saputra, Ismail Puji
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol 1 No 2 (2018): Jurnal RESISTOR Edisi Oktober 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (754.776 KB) | DOI: 10.31598/jurnalresistor.v1i2.323

Abstract

Information and communication technology is something that is difficult to separate from human life in the present era. One example of information and communication technology is a network of proxy routers. This study uses the penetration testing method, which aims to analyze the security system of the proxy router that has been applied to Warnet Aulia.net. In analyzing network security, the Mikrotik Router is done by the method of penetration testing where the form of attacks on the network is simulated. In this study Python and Winboxpoc.py were successfully run on the Windows 10 operating system. The results of this study indicate that the network security owned by the Aulia.net cafe network still has many gaps to exploit. As for the results of some attacks, it shows serious things in terms of exploitation, such as the output of getting a proxy router password and username. Therefore, this study also provides a solution on how to prevent the mikrotik router from being exploited. Problem solving is explained using several alternative solutions, so that practitioners or network technicians are expected to be able to utilize knowledge related to the results of this study in order to secure the router.
ANALISIS KINERJA PROTOKOL ZIGBEE DI DALAM DAN DI LUAR RUANGAN SEBAGAI MEDIA KOMUNIKASI DATA PADA WIRELESS SENSOR NETWORK Hartawan, I Nyoman Buda; Desnanjaya, I Gusti Made Ngurah
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol 1 No 2 (2018): Jurnal RESISTOR Edisi Oktober 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1028.527 KB) | DOI: 10.31598/jurnalresistor.v1i2.320

Abstract

Wireless sensor network is a technology used in supporting monitoring activities both inside and outside environment. Data communication on wireless sensor networks is done wirelessly. The Zigbee protocol is one of the protocols used in data communication on wireless sensor networks as an implementation of XBEE devices. In this study measurement of Zigbee protocol performance on XBEE devices inside and outside environment. The measurement conditions in the room are limited by the wall partition, while the outdoor conditions are line of sight. Measurements were made by sending packet data using XCTU software, by testing distance parameters, packet delay, packet loss, RSSI, and throughput with 84 Bytes packet data size. The results showed that the measurement results of XBEE Pro S2 devices that were carried out indoors were able to communicate with a maximum distance of 30 meters, while the outdoor measurements showed the communication capability of XBEE Pro S2 devices reached a maximum distance of 600 meters.
SISTEM LAMPU OTOMATIS DENGAN SENSOR GERAK, SENSOR SUHU DAN SENSOR SUARA BERBASIS MIKROKONTROLER Lukman, Musfirah Putri; ., Junaedy; Rieuwpassa, Yosua Friendly Yorendy
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol 1 No 2 (2018): Jurnal RESISTOR Edisi Oktober 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (764.838 KB) | DOI: 10.31598/jurnalresistor.v1i2.305

Abstract

This research aims to implement a movement sensor, temperature sensor dan sound sensor for turning on lamp automatically on public toilet. This system serves to automatically turning on the lamp when a person entering the toilet and also turning it back off when there is no one in the toilet. The hardwares used in this system are an Arduino Uno, a PIR movement sensor, a MLX90614 temperature sensor, a KY - 038 sound sensor, a relay, and a 3W LED lamp. Software used to built the program for this system is Arduino IDE where this software is using the C programming language. The final result from the test show that the PIR sensor can detect a person movement whether they are going in or out from the toilet while the KY - 038 sensor and MLX90614 sensor still have their weaknesses when trying to detect sound or temperature.
KLASIFIKASI DIABETIC RETINOPATHY MENGGUNAKAN SELEKSI FITUR DAN SUPPORT VECTOR MACHINE Rosadi, Muhammad Imron; Sanjaya, Cahya Bagus; Hakim, Lukman
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol 1 No 2 (2018): Jurnal RESISTOR Edisi Oktober 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (755.713 KB) | DOI: 10.31598/jurnalresistor.v1i2.312

Abstract

Diabetic Retinopathy is a disease common complications of diabetes mellitus. The complications in the form of damages on the part of the retina of the eye.  The high levels of glucose in the blood are the cause of small capillaries become broke and can lead to blindness. The symptoms shown by the sufferers of Diabetic Retinopaythy (DR), among others, microaneurysms, hemorrhages, exudates, soft hard exudate and neovascularization. These symptoms are at a certain intensity can be an indicator of the phase (the level of severity) DR sufferers. There are four stages of the process of pattern recognition, namely preprocessing,feature ekstraction, feature selection and classification. On preprocessing the image do Change the RGB image into Green channel, image Adaptive Histogram Equalization, removal of blood vessels, removal of optic disks, detection of exudate. A collection from the results of preprocessing placed in the vector of characteristics by using the feature extraction of GLCM consisting of order 1 and 2, to order then conducted as input Support Vector Machine (SVM). While in SVM there are three issues that emerged, namely; How to select a kernel function, what is the optimal number of input features, and how to determine the best kernel parameters. These issues are important, because the number of features affect the required kernel parameters values and vice versa, so that the selection of the features required in building the classification system. On the research of feature extraction methods was presented GLCM, features selection, and SVM for detecting diabetic retinopathy. feature selection process using the F-Score feature to select the results of features extraction. From the results of the selection of these features is used to input the classification. The dataset used amounted to 50 data, which is divided into 2 classes, where 25 sets taken from normal retinal scans and 25 sets of the rest of the scan of the retina with diabetic retinopathy. SVM classification with feature selection to increase accuracy and computational time than lose without a selection of features with a value of 90% accuracy and computational time 0.010 seconds.
DETEKSI JARAK PANDANG AMAN SEBAGAI ACUAN UNTUK KESELAMATAN PENERBANGAN DENGAN MENGGUNAKAN METODE BACKPROPAGATION Hakim, Moch Rizki Kurniawan; Fanani, Aris
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol 1 No 2 (2018): Jurnal RESISTOR Edisi Oktober 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (613.145 KB) | DOI: 10.31598/jurnalresistor.v1i2.304

Abstract

Delay is a term used when the flight schedule late while depart or arrive. Delay causes due to bad weather, technical problems on the plane, uncompleted crew, and others. Delay is procedure to avoid unexpected condition for example is accidents. Bad weather is the the one of delay reason difficult to estimated or detected because relativity variable of each hour. Bad weather can be detected by the air visibility. According to the official standart of transportation the minimum distance of visibility is 5 kilometers. While distance less than for flight safety, can be categorized as danger. Therefore, the porpose of this research is to know early when the flight has to be delayed or not. Therefore to detect a weather condition can be use backpropagation method which can be identified through several factors such as wind speed, humidity, and temperature in the air. Based on this research using 720 data, obtained a high accuracy of 95.71%, recall of 97.81%, and precision of 94.98%. With learning rate of 0.1 and hidden layer as much as 100, which shows that the detection of visibility has a very good performance. Therefore the model can be used for the detection of the visibility of the safe.
IMPLEMENTASI TEKNIK DEEP PACKET INSPECTION DENGAN MENGGUNAKAN WIRESHARK PADA SISTEM OPERASI UBUNTU Pratama, I Putu Agus Eka; Dharmesta, Putu Adhika
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol 1 No 2 (2018): Jurnal RESISTOR Edisi Oktober 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (965.732 KB) | DOI: 10.31598/jurnalresistor.v1i2.274

Abstract

Deep Packet Inspection (DPI) is a technique commonly used by network administrator to be able to monitor in detail the flow of data in the form of data packets that occur at that moment. This data stream will produce an information that can be used for network management purposes. One example of a case study that can be done with this technique is the intranet that is available in Information Technology major Udayana University’s. Deep Packet Inspection Technique is done with purpose to identifying the initial slowing down of network speed on Information Technology major Udayana University’s.
IMPLEMENTASI KATOOLIN SEBAGAI PENETRASI TOOLS KALI LINUX PADA LINUX UBUNTU 16.04 (STUDI KASUS: REVERSE ENGINEERING FILE .APK) Eka Pratama, I Putu Agus; Wiradarma, Anak Agung Bagus Arya
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol 1 No 2 (2018): Jurnal RESISTOR Edisi Oktober 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1149.508 KB) | DOI: 10.31598/jurnalresistor.v1i2.278

Abstract

The Linux Operating System is known for its open-source characteristic which means everyone is free to develop Linux with the use of available source code. The result of Linux development is called Linux distribution (Distro). There are various Linux distributions in accordance with their respective uses, one of them is Kali Linux. Kali Linux is a Linux distro that is developed to penetrate the security of computer systems. Kali Linux uses a variety of tools to perform its functions. However, for users who want to use the functionality of Kali Linux without having to change the Linux distro that has been used, the user can use Katoolin. Katoolin can provide the convenience and flexibility for users who want to use Kali Linux as a special Linux distro for the purpose of penetrating computer system security without having to replace the distro that has been used or do a full install of Kali Linux. One case study that can be solved using the Kali Kali Linux based tool on Katoolin is Reverse Engineering. The case study was solved using one of the tools in the Reverse Engineering category named apktool that available on Katoolin.
Penerapan Algoritma A* (Star) Menggunakan Graph Untuk Menghitung Jarak Terpendek Gede Wahyu Antara Dalem, Ida Bagus
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol 1 No 1 (2018): Jurnal RESISTOR Edisi April 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (750.436 KB) | DOI: 10.31598/jurnalresistor.v1i1.253

Abstract

Algorithm A* (Astar) is one of the algorithm that belongs to category of searching method that has information (informed searched method). This algorithm is very good as process solution path finding (way seeker). This algorithm looks for the shortest route which will be taken a starting point to the next object. Collection data technique used in this simulation is by using Algorithm A* with heuristic function. The main purpose of this research is to learn the way of work Algorithm A* in looking for the fastest, which is simulated like a condition when someone looks for route in a traffic way. This simulation gives a realistic pictures for Algorithm A* behavior in looking for shortest route.
Integrasi Sistem Single Sign On Pada Sistem Informasi Akademik, Web Information System Dan Learning Management System Berbasis Central Authentication Service Udayana, I Putu Agus Eka Darma
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol 1 No 1 (2018): Jurnal RESISTOR Edisi April 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (643.021 KB) | DOI: 10.31598/jurnalresistor.v1i1.265

Abstract

Elearning and web based information systems is a means to communicate and exchange information for academic purposes.  Nowadays lightweight directory access protocol (LDAP) is a state of the art method of choice. With LDAP technologies user only need one username and password to access to multiple web based application, The problem is if the user wanted to do autentification said user had to input their credentials over and over again for each application. To solve that problem single sign on mechanism (SSO) is invented. With SSO user only need login once and they got all the same credentials with them to all intergrated application wthin the campus. To implement the SSO we use Central authentication service (CAS) as a authentifiation central within LDAP structure as a user management. In this reseach we see that single sign on (SSO) system that intergrated into student management system, E-Learning system and  Internal blog system both use of database based system or even LDAP based system.
Trainer Atmega32 Sebagai Media Pelatihan Mikrokontroler Dan Arduino Desnanjaya, I Gusti Made Ngurah; Iswara, Ida Bagus Ary Indra
Jurnal RESISTOR (Rekayasa Sistem Komputer) Vol 1 No 1 (2018): Jurnal RESISTOR Edisi April 2018
Publisher : LPPM STMIK STIKOM Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1146.368 KB) | DOI: 10.31598/jurnalresistor.v1i1.266

Abstract

The microcontroller is one of the necessary parts of a computer system. In a simple microcontroller will produce a specific output based on the input received and the program given. The microcontroller as semiconductor technology its presence greatly assist the development of electronics world. With a functional architecture but contains a lot of transistor content is integrated, thus supporting the creation of a more portable electronic circuit. One effort made to graduate Computer Systems courses can compete in the world of work is to provide more practice. Therefore it takes the media trainer microcontroller training to facilitate practical activities. Through this research, hope can realize a media trainer microcontroller training that can do the instructions given. That is, the most critical part of a computerized system is the program itself created by a programmer.

Page 1 of 2 | Total Record : 16