Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jazi Eko Istiyanto is active.

Publication


Featured researches published by Jazi Eko Istiyanto.


International Journal of Advanced Computer Science and Applications | 2011

Modularity Index Metrics for Java-Based Open Source Software Projects

Andi Wahju Rahardjo Emanuel; Retantyo Wardoyo; Jazi Eko Istiyanto; Khabib Mustofa

Open Source Software (OSS) Projects are gaining popularity these days, and they become alternatives in building software system. Despite many failures in these projects, there are some success stories with one of the identified success factors is modularity. This paper presents the first quantitative software metrics to measure modularity level of Java-based OSS Projects called Modularity Index. This software metrics is formulated by analyzing modularity traits such as size, complexity, cohesion, and coupling of 59 Java-based OSS Projects from sourceforge.net using SONAR tool. These OSS Projects are selected since they have been downloaded more than 100K times and believed to have the required modularity trait to be successful. The software metrics related to modularity in class, package and system level of these projects are extracted and analyzed. The similarities found are then analyzed to determine the class quality, package quality, and then combined with system architecture measure to formulate the Modularity Index. The case study of measuring Modularity Index during the evolution of JFreeChart project has shown that this software metrics is able to identify strengths and potential problems of the project.


international conference on instrumentation communications information technology and biomedical engineering | 2009

A VHDL-based ADC on FPGA

Jazi Eko Istiyanto

A VHDL design of a controller for the pre-amplifier and the ADC present on a Spartan-3E FPGA Starter Kit board has been carried out and tested using a function generator and an oscilloscope. The design is based on the Moore-type of finite state machine. The VHDL design is discussed and its results presented.


International Journal of Advanced Computer Science and Applications | 2012

E-Participation Modeling and Developing with Trust for Decision Making Supplement Purpose

Vitri Tundjungsari; Jazi Eko Istiyanto; Edi Winarko; Retantyo Wardoyo

ICT has been employed in various areas, including e-Participation to support citizen participation and achieve democracy ideal. Trust as a social behavior can be used as a method to model preferences and facilitate better participation and interaction in a decision making within a group of decision makers. In this paper we present literatures survey related to e-Participation and trust in computer science; we also proposed a Group Decision Support System model and application, which utilizes trust to support decisions in a collaborative team. In brief, the model is based on the synthesis of group members’ preferences following an appropriate aggregation procedure.


International Journal of Advanced Computer Science and Applications | 2016

The Group Decision Support System to Evaluate the ICT Project Performance Using the Hybrid Method of AHP, TOPSIS and Copeland Score

Herri Setiawan; Jazi Eko Istiyanto; Retantyo Wardoyo; Purwo Santoso

This paper proposed a concept of the Group Decision Support System (GDSS) to evaluate the performance of Information and Communications Technology (ICT) Projects in Indonesian regional government agencies to overcome any possible inconsistencies which may occur in a decision-making process. By considering the aspect of the applicable legislation, decision makers involved to provide an assessment and evaluation of the ICT project implementation in regional government agencies consisted of Executing Parties of Government Institutions, ICT Management Work Units, Business Process Owner Units, and Society, represented by DPRD (Regional People’s Representative Assembly). The contributions of those decision makers in the said model were in the form of preferences to evaluate the ICT project-related alternatives based on the predetermined criteria for the method of Multiple Criteria Decision Making (MCDM). This research presented a GDSS framework integrating the Methods of Analytic Hierarchy Process (AHP), Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) and Copeland Score. The AHP method was used to generate values for the criteria used as input in the calculation process of the TOPSIS method. Results of the TOPSIS calculation generated a project rank indicated by each decision maker, and to combine the different preferences of these decision makers, the Copeland Score method was used as one of the voting methods to determine the best project rank of all the ranks indicated by the desicion makers.


ADVANCES OF SCIENCE AND TECHNOLOGY FOR SOCIETY: Proceedings of the 1st International Conference on Science and Technology 2015 (ICST-2015) | 2016

Classification of Indonesia black teas based on quality by using electronic nose and principal component analysis

Danang Lelono; Kuwat Triyana; Sri Hartati; Jazi Eko Istiyanto

An electronic nose (e-nose) with twelve MOS-based gas sensors have been used to classify the quality of the Indonesia black tea. The black tea samples were obtained from local tea shops in Yogyakarta, including first quality (Q1) or BOP (Broken Orange Pokoe), second quality (Q2) or BPII (Broken Pokoe II) and third quality (Q3) or Bohea. For each dry tea sample was tested 31 times, at temperatures (40.0 ± 1.0) °C without any treatment and it analyzed by unsupervised principal component analysis (PCA). The experimental results showed that all three samples almost have the same aroma when observed from the sensor response. The difference from the aroma samples lie on the sensor response of the signal intensity and it can be classified clearly by the PCA with first and second principal component accounted for 80.3% and 15.3% of the variance, respectively. Besides that, the analysis of PCA indicates that the sample Q2 is closed to Q1 and Q3. It suggests that a small constituent element of black tea in Q1 and Q...


POWER CONTROL AND OPTIMIZATION: Proceedings of the Second Global Conference on Power Control and Optimization | 2009

FUZZY RULE SURAM FOR CONTROL SYSTEM OF A SOLAR ENERGY WOOD DRYING CHAMBER

Zakarias Situmorang; Retantyo Wardoyo; Sri Hartati; Jazi Eko Istiyanto

The paper reports used the fuzzy rule Suram for control system of a wood drying chamber with solar as source of energy. Rule suram based of fuzzy logic with variables of weather is temperature ambient and conditions of air is humidity ambient, it implemented for wood drying process. The membership function of variable of state represented in error value and change error with typical of triangle and trapezium map. Result of Analysis to reach 8 fuzzy rule to control the output system can be constructed in a number of way of weather and conditions of air. It used to minimum of the consumption of electric energy by heater. The rule suram used to stability and equilibrium of schedule of drying in chamber by control of temperature and humidity. The result of implemented of fuzzy rule suram with the modification of membership function in range [0.5, 1] represented approximate to he conditions riel.


International Journal of Advanced Computer Science and Applications | 2015

Data Center Governance Information Security Compliance Assessment Based on the Cobit Framewok

Andrey Ferriyan; Jazi Eko Istiyanto

One of control domain of Cobit describes information security lies in Deliver and Support (DS) on DS5 Ensure Systems Security. This domain describes what things should be done by an organization to preserve and maintain the integrity of the information assets of IT where this all requires a security management process. One of the process is to perform security monitoring by conducting periodic vulnerability assessment to identify weaknesses. Because Cobit is not explained technically so it needs a method to utilizes data that has been standardized. One of the standardized database for vulnerability is CVE (Common Vulnerabilites and Exposures).This study aims to assess current condition of Data Center on Department of Transportation, Communication and Information Technology at Sleman Regency and assess the maturity level of security as well as providing solutions in particular on IT security. Next goal is to perform vulnerability assessment to find out which are the parts of the data center that may be vulnerable. Knowing weaknesses can help evaluate and provide solutions for better future. Result from this research is to create tool for vulnerability assessment and tool to calculate maturity model.


International Journal of Advanced Computer Science and Applications | 2013

Internet Forensics Framework Based-on Clustering

Imam Riadi; Jazi Eko Istiyanto; Ahmad Ashari; Subanar

Internet network attacks are complicated and worth studying. The attacks include Denial of Service (DoS). DoS attacks that exploit vulnerabilities found in operating systems, network services and applications. Indicators of DoS attacks, is when legitimate users cannot access the system. This paper proposes a framework for Internet based forensic logs that aims to assist in the investigation process to reveal DoS attacks. The framework in this study consists of several steps, among others : logging into the text file and database as well as identifying an attack based on the packet header length. After the identification process, logs are grouped using k-means clustering algorithm into three levels of attack (dangerous, rather dangerous and not dangerous) based on port numbers and tcpflags of the package. Based on the test results the proposed framework can be grouped into three level attacks and found the attacker with a success rate of 89,02%, so, it can be concluded that the proposed framework can meet the goals set in this research.


international conference on information and communication technology | 2010

Database server access framework

Bambang Sugiantoro; Retantyo Wardoyo; Sri Hartati; Jazi Eko Istiyanto

The availability of information continues to increase rapidly, the method for encoding and storage of information also increased. The development of information resources brings several problems, among them about how to combine the data storage and distributed differently. Information on an organization or company is usually stored in separate locations and different formats. When an increase in storage capacity and the amount of information search costs, companies are faced with the problem abundant amount of data. This research has resulted Mobile Agent to perform query on multiple database servers. Users configure the program to the database to be accessed in the form of a query command, username, password and address of the database server. Output can be either table or message information from a database that is accessed. Users can view the results of queries that are performed on each database server in one application.


international conference on instrumentation communications information technology and biomedical engineering | 2009

Developing transliteration pattern of Latin character text document algorithm based on linguistics knowledge of writing Javanesse script

Ema Utami; Jazi Eko Istiyanto; Sri Hartati; Marsono; Ahmad Ashari

Latin text document can be transliterated to Javanesse character. The propose of this transliteration model is being able to used by all society and not only for Javanesse society. The using of communication and information technology to build Latin to Javanesse characters transliteration pattern model using linguistic computation. That will be transliterated is parsed or broke to get token list (sylabic). The Context Free Recursive Descent Parser method with specific production rule can be used in checking and breaking Latin string to produce right Javanesse pattern. From the testing it is seen that by using The Context-Free Recursive-Descent Parser algorithm, text document in Latin writing can be processed so that syllable split patterns can be produced correctly. Using Pattern Matching method, the produced syllable split patterns are processed into the process of converting syllable split patterns to be Javanesse character and the mapping of their writing scheme. Text document transliteration algorithm covers: production rules for splitting Latin string, list of Latin string split model, and production rules for transliteration split Latin string pattern to Javanesse character.

Collaboration


Dive into the Jazi Eko Istiyanto's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sri Hartati

Gadjah Mada University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Edi Winarko

Gadjah Mada University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge