Jazi Eko Istiyanto
Gadjah Mada University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jazi Eko Istiyanto.
International Journal of Advanced Computer Science and Applications | 2011
Andi Wahju Rahardjo Emanuel; Retantyo Wardoyo; Jazi Eko Istiyanto; Khabib Mustofa
Open Source Software (OSS) Projects are gaining popularity these days, and they become alternatives in building software system. Despite many failures in these projects, there are some success stories with one of the identified success factors is modularity. This paper presents the first quantitative software metrics to measure modularity level of Java-based OSS Projects called Modularity Index. This software metrics is formulated by analyzing modularity traits such as size, complexity, cohesion, and coupling of 59 Java-based OSS Projects from sourceforge.net using SONAR tool. These OSS Projects are selected since they have been downloaded more than 100K times and believed to have the required modularity trait to be successful. The software metrics related to modularity in class, package and system level of these projects are extracted and analyzed. The similarities found are then analyzed to determine the class quality, package quality, and then combined with system architecture measure to formulate the Modularity Index. The case study of measuring Modularity Index during the evolution of JFreeChart project has shown that this software metrics is able to identify strengths and potential problems of the project.
international conference on instrumentation communications information technology and biomedical engineering | 2009
Jazi Eko Istiyanto
A VHDL design of a controller for the pre-amplifier and the ADC present on a Spartan-3E FPGA Starter Kit board has been carried out and tested using a function generator and an oscilloscope. The design is based on the Moore-type of finite state machine. The VHDL design is discussed and its results presented.
International Journal of Advanced Computer Science and Applications | 2012
Vitri Tundjungsari; Jazi Eko Istiyanto; Edi Winarko; Retantyo Wardoyo
ICT has been employed in various areas, including e-Participation to support citizen participation and achieve democracy ideal. Trust as a social behavior can be used as a method to model preferences and facilitate better participation and interaction in a decision making within a group of decision makers. In this paper we present literatures survey related to e-Participation and trust in computer science; we also proposed a Group Decision Support System model and application, which utilizes trust to support decisions in a collaborative team. In brief, the model is based on the synthesis of group members’ preferences following an appropriate aggregation procedure.
International Journal of Advanced Computer Science and Applications | 2016
Herri Setiawan; Jazi Eko Istiyanto; Retantyo Wardoyo; Purwo Santoso
This paper proposed a concept of the Group Decision Support System (GDSS) to evaluate the performance of Information and Communications Technology (ICT) Projects in Indonesian regional government agencies to overcome any possible inconsistencies which may occur in a decision-making process. By considering the aspect of the applicable legislation, decision makers involved to provide an assessment and evaluation of the ICT project implementation in regional government agencies consisted of Executing Parties of Government Institutions, ICT Management Work Units, Business Process Owner Units, and Society, represented by DPRD (Regional People’s Representative Assembly). The contributions of those decision makers in the said model were in the form of preferences to evaluate the ICT project-related alternatives based on the predetermined criteria for the method of Multiple Criteria Decision Making (MCDM). This research presented a GDSS framework integrating the Methods of Analytic Hierarchy Process (AHP), Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) and Copeland Score. The AHP method was used to generate values for the criteria used as input in the calculation process of the TOPSIS method. Results of the TOPSIS calculation generated a project rank indicated by each decision maker, and to combine the different preferences of these decision makers, the Copeland Score method was used as one of the voting methods to determine the best project rank of all the ranks indicated by the desicion makers.
ADVANCES OF SCIENCE AND TECHNOLOGY FOR SOCIETY: Proceedings of the 1st International Conference on Science and Technology 2015 (ICST-2015) | 2016
Danang Lelono; Kuwat Triyana; Sri Hartati; Jazi Eko Istiyanto
An electronic nose (e-nose) with twelve MOS-based gas sensors have been used to classify the quality of the Indonesia black tea. The black tea samples were obtained from local tea shops in Yogyakarta, including first quality (Q1) or BOP (Broken Orange Pokoe), second quality (Q2) or BPII (Broken Pokoe II) and third quality (Q3) or Bohea. For each dry tea sample was tested 31 times, at temperatures (40.0 ± 1.0) °C without any treatment and it analyzed by unsupervised principal component analysis (PCA). The experimental results showed that all three samples almost have the same aroma when observed from the sensor response. The difference from the aroma samples lie on the sensor response of the signal intensity and it can be classified clearly by the PCA with first and second principal component accounted for 80.3% and 15.3% of the variance, respectively. Besides that, the analysis of PCA indicates that the sample Q2 is closed to Q1 and Q3. It suggests that a small constituent element of black tea in Q1 and Q...
POWER CONTROL AND OPTIMIZATION: Proceedings of the Second Global Conference on Power Control and Optimization | 2009
Zakarias Situmorang; Retantyo Wardoyo; Sri Hartati; Jazi Eko Istiyanto
The paper reports used the fuzzy rule Suram for control system of a wood drying chamber with solar as source of energy. Rule suram based of fuzzy logic with variables of weather is temperature ambient and conditions of air is humidity ambient, it implemented for wood drying process. The membership function of variable of state represented in error value and change error with typical of triangle and trapezium map. Result of Analysis to reach 8 fuzzy rule to control the output system can be constructed in a number of way of weather and conditions of air. It used to minimum of the consumption of electric energy by heater. The rule suram used to stability and equilibrium of schedule of drying in chamber by control of temperature and humidity. The result of implemented of fuzzy rule suram with the modification of membership function in range [0.5, 1] represented approximate to he conditions riel.
International Journal of Advanced Computer Science and Applications | 2015
Andrey Ferriyan; Jazi Eko Istiyanto
One of control domain of Cobit describes information security lies in Deliver and Support (DS) on DS5 Ensure Systems Security. This domain describes what things should be done by an organization to preserve and maintain the integrity of the information assets of IT where this all requires a security management process. One of the process is to perform security monitoring by conducting periodic vulnerability assessment to identify weaknesses. Because Cobit is not explained technically so it needs a method to utilizes data that has been standardized. One of the standardized database for vulnerability is CVE (Common Vulnerabilites and Exposures).This study aims to assess current condition of Data Center on Department of Transportation, Communication and Information Technology at Sleman Regency and assess the maturity level of security as well as providing solutions in particular on IT security. Next goal is to perform vulnerability assessment to find out which are the parts of the data center that may be vulnerable. Knowing weaknesses can help evaluate and provide solutions for better future. Result from this research is to create tool for vulnerability assessment and tool to calculate maturity model.
International Journal of Advanced Computer Science and Applications | 2013
Imam Riadi; Jazi Eko Istiyanto; Ahmad Ashari; Subanar
Internet network attacks are complicated and worth studying. The attacks include Denial of Service (DoS). DoS attacks that exploit vulnerabilities found in operating systems, network services and applications. Indicators of DoS attacks, is when legitimate users cannot access the system. This paper proposes a framework for Internet based forensic logs that aims to assist in the investigation process to reveal DoS attacks. The framework in this study consists of several steps, among others : logging into the text file and database as well as identifying an attack based on the packet header length. After the identification process, logs are grouped using k-means clustering algorithm into three levels of attack (dangerous, rather dangerous and not dangerous) based on port numbers and tcpflags of the package. Based on the test results the proposed framework can be grouped into three level attacks and found the attacker with a success rate of 89,02%, so, it can be concluded that the proposed framework can meet the goals set in this research.
international conference on information and communication technology | 2010
Bambang Sugiantoro; Retantyo Wardoyo; Sri Hartati; Jazi Eko Istiyanto
The availability of information continues to increase rapidly, the method for encoding and storage of information also increased. The development of information resources brings several problems, among them about how to combine the data storage and distributed differently. Information on an organization or company is usually stored in separate locations and different formats. When an increase in storage capacity and the amount of information search costs, companies are faced with the problem abundant amount of data. This research has resulted Mobile Agent to perform query on multiple database servers. Users configure the program to the database to be accessed in the form of a query command, username, password and address of the database server. Output can be either table or message information from a database that is accessed. Users can view the results of queries that are performed on each database server in one application.
international conference on instrumentation communications information technology and biomedical engineering | 2009
Ema Utami; Jazi Eko Istiyanto; Sri Hartati; Marsono; Ahmad Ashari
Latin text document can be transliterated to Javanesse character. The propose of this transliteration model is being able to used by all society and not only for Javanesse society. The using of communication and information technology to build Latin to Javanesse characters transliteration pattern model using linguistic computation. That will be transliterated is parsed or broke to get token list (sylabic). The Context Free Recursive Descent Parser method with specific production rule can be used in checking and breaking Latin string to produce right Javanesse pattern. From the testing it is seen that by using The Context-Free Recursive-Descent Parser algorithm, text document in Latin writing can be processed so that syllable split patterns can be produced correctly. Using Pattern Matching method, the produced syllable split patterns are processed into the process of converting syllable split patterns to be Javanesse character and the mapping of their writing scheme. Text document transliteration algorithm covers: production rules for splitting Latin string, list of Latin string split model, and production rules for transliteration split Latin string pattern to Javanesse character.