27 research outputs found

    The Development of a Model for Complaint Delivery on Aviation Industry in Indonesia Based on SMS Gateway to Promote Flight Safety

    Get PDF
    The variety of complaints appearing on Aviation Industry in Indonesia actually indicates the existence of problems on aviation system in Indonesia. The number of complaints may serve as an early detection in a system before the occurrence of an accident in a flight. Increasing numbers of flight service users in Indonesia had not been supported with an adequate complaint delivery, whether it is for internal complaints or external ones. One of available solutions is to detect whether all system components on Aviation Industry in Indonesia is good or not. In an effort to enhance system performance, a model for integrated complaint delivery is developed on Aviation Industry based on SMS Gateway in Indonesia. The model is expected to become a data bank on Aviation Industry to ease controlling, evaluating and improving condition performance on flight systems. This research used comparative and descriptive methods. It also results in applied product hence it is expected that the output can be used to complement the current product/program operated by Directorate General of Civil Aviation (DGCA). The development of a model for complaint delivery is conducted to make cellular phone numbers inputs for all stakeholders on aviation industry. This strategy activates all stakeholders to provide information regarding the current conditions for all subsystems in flight system in Indonesi

    Adaptive Traffic Controller Based On Pre-Timed System

    Get PDF
    Adaptive traffic controller systems based on image processing have been developed widely. Nevertheless, in a developing country, the systems often could not be easily applied because all types of vehicle use the same road. Therefore, to overcome the problem, the new concept of the systems is proposed. The systems were developed from a pre-timed traffic controller system that based on AVR microcontroller. By default, the systems use the signal-timing plans to control the vehicle flow. To accommodate the traffic variations, a new method of vehicle detection has been built. The method calculated an intensity histogram standard deviation of the image representing a detection area to determine traffic density of each intersection lane. The systems modified the green-time of each lane based on the traffic density. The method could detect all types of vehicles and work properly in a day and a night time

    Perancangan Keamanan Sistem Menggunakan Algoritma Honeypot pada Aplikasi Krs Online (Studi Kasus : Sekolah Tinggi Teknologi Adisutjipto)

    Full text link
    Many colleges already apply web based academic information system use internet connection, so it is need a system security to protect from attacks such as SQL Injection and Brute Force. Honeypot is a system security which devide two system that are original and fake system. Original system used by user to access academic information system that source from correct database. While fake system used to separate hacker and user. Hackers who try to enter with SQL Injection is send to fake system directly which has wrong data. This fake system seems correct and all action that was happened in will be noted on log history. When hacker try some password ese Brute Force, system will reset user password automatically. This system already test with 79 times SQL Injection and 29 times Brute Force attack. All attacks can handle nicely with honeypot algorithm

    Algoritma Masih Musliatun (Mm) untuk Mendukung Sistem Otomatisasi Pendaftaran Praktikum dengan Pengujian pada Jaringan Komputer (Studi Kasus di Stta YOGYAKARTA)

    Full text link
    Practicum registration systems that exist on campus STTA previously done manually, where students will sign up to the admin to bring proof of payment practicum. Students are free to choose his own class, this often resulted in unbalanced number of students in the classroom lab that is consideredless effective way. This makes the emergence of the idea to establish an MM algorithm is applied to a practical application o f automation systems. MM algorithm works by determining many lab classes based on students who took the KRS. Furthermore, students who have paid practicum will be immediately incorporated into the classes that are available with regard to the number of students and GPA o f students per class, so it will obtain practical classes by the number o f students and the average GPA o f each class balanced.Concept application using client-server database, where the database is on the Local Area Network (LAN) STTA. To facilitate the management admin, then the application will be tested on the LAN network and VPN (Virtual Private Network) network. LAN is a computers network that are connected to a computer server by using specific topologies, typically used in areas of the building or area a distance o f not more than 1 km (local area). While VPN is a secure way to access the Local Area Network that is in range, using the Internet or other public network to perform packet data transmission in private. By using a VPN, users can access the computer that is on the LAN even though the user is not in the same location with a LAN

    Sistem Keamanan Jail Bash Untuk Mengamankan Akun Legal Dari Kejahatan Internet Menggunakan Thc-hydra

    Full text link
    Along with the development of current technology, making technology is very important in today\u27s life. Security level digital data has become more vulnerable to exploitation, the problem arises when an information technology device was attacked by people who do not want to take a responsible and important data illegally, so the administrator must act quickly to secure important data. Making a data security technology on the internet is very important information. Limitations administrator underlying the creation of a system that is able to detect and defense systems against such attacks is automation, so that it can be applied to data security. The system is built to prevent attacks on computer networks with more specific on THC - Hydra. This system will analyze the number of errors in the log into the database, and if the error exceeds the tolerance rules are made by the administrator. If the error is more than 3 times in one minute, then with automation, the system will create a rule that can imprison users who do not have such access, and access to the prison in the illegal user can not perform such activities on legal access and access to activities conducted illegal user can be recorded on a file and jail.txt. So under any circumstances and not in supervising administrator, the security of other user data will be safe and can not be retrieved or viewed by a user of illegal access
    corecore