Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo
{"title":"The Decision Accuracy of Acquaintance List from Different Risk-cost Analysis","authors":"Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo","doi":"10.1109/TSSA.2018.8708840","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708840","url":null,"abstract":"Consultation-based Collaborative Intrusion Detection Network (CIDN) aims to improve the detection accuracy of an Intrusion Detection System (IDS). Acquaintance management has become a vital process which responsible for the acquaintance selection in CIDN. In an acquaintance management algorithm, the trustworthiness of the IDS is estimated by the used of risk-cost analysis. However, the inaccurate estimation of the risk cost value has lead to a poor acquaintance list quality. As there is more than one risk-cost analysis, it is beneficial to analyze the used of different risk-cost analysis in an acquaintance management algorithm. We implement three different risk-cost analysis in four different environments of CIDN. The result shows that in the mix component of the DDoS attack, our proposed risk-cost analysis provide higher acquaintance detection accuracy.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scrum Implementation for Online Transaction Processing (OLTP) in Hospital Management","authors":"T. Setiadi, Syauqi Bima Premapasha","doi":"10.1109/TSSA.2018.8708797","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708797","url":null,"abstract":"The majority of e-class hospitals in Indonesia still apply manual, non-computerized systems to conduct operational activities every day. This causes problems especially for hospital directors, because as a director requires a system that can evaluate the operations of the hospital. This problem was initiated due to the data of operational activities that are currently available are not well managed. This happens because there is no system for employees so that employees have difficulty managing data from each process.In this paper, we discuss Online Transaction Processing (OLTP) application development using the Scrum Framework. Scrum can address complex adaptive problems, by increasing productivity and creativity of all stakeholders involved. The test results with User Accepted Testing (UAT), Usability Testing and Scrum analysis based on the results of the development of the project show the OLTP system with the Scrum method has met the needs of the functional aspects and the development of the X hospital system","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment of IT Governance of Bakti Internet Access Program Based on the COBIT5 Framework : Case Study: Balai Latihan Kerja Kendari","authors":"Raditya Muhammad, Ian Yosef Matheus Edward","doi":"10.1109/TSSA.2018.8708833","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708833","url":null,"abstract":"The Universal Service Obligation (USO) program mandated by the Ministry of Communication and Information (KOMINFO) through the Badan Aksesibilitas Telekomunikasi dan Informatika (Bakti) is the foundation of the Internet Access Program for underdeveloped regions, frontier and outermost regions in Indonesia. The Internet Access Program aims to reduce the gap in understanding information and communication technology (ICT) between rural and urban areas. With the amount of technology investment costs managed in this program, it is necessary to standardize information technology governance in the implementation of this program, so the objectives can be realized. In this research, information technology governance system will be developed that refers to international standards COBIT 5. Case studies were carried out at one of the target locations of the Internet Access program at BLK Kendari with the assessment of the current capability level, gap analysis, risk analysis, and proposed recommendations. The proposed recommendations are expected to be able to help program management so that the goal of using information technology to form IT-based communities can be achieved.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116344271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging SDN for Handover in Distributed Mobility Management of 5G Network","authors":"Rifqy Hakimi, Harashta Tatimma Larasati, Alvin Mustafa, Abdallah Abu-Arabiya","doi":"10.1109/TSSA.2018.8708820","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708820","url":null,"abstract":"Distributed Mobility Management (DMM) is considered by many to be a suitable mobility management system for future 5G network. This approach implements flatter and more flexible architecture by distributing the data plane among the networks. Data traffic is not traversed to core but segregated locally, making it closer to the edge of the network. This can be achieved by implementing Software Defined Network (SDN) paradigm, i.e. separating control and data plane This paper surveys and analyzes numerous related work on DMM for 5G network particularly on handover protocol Those proposed solutions are in different in terms of architectures and procedures. Some of them can also be referring to quite similar concept under different nomenclature There are two proposed solutions for handover in DMM, SDN-based handover without tunneling and SDN-based handover with tunneling. The comparative analysis between those two are presented as well","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114823415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kholilatul Wardani, A. Kurniawan, E. Mulyana, Hendrawan
{"title":"ROI Based Post Image Quality Assessment Technique on Multiple Localized Filtering Method on Kinect Sensor","authors":"Kholilatul Wardani, A. Kurniawan, E. Mulyana, Hendrawan","doi":"10.1109/TSSA.2018.8708810","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708810","url":null,"abstract":"Region of Interest (ROI) Image Quality Assessment is an image quality assessment model based on Structural Similarity Index (SSI) used in the specific designated image region to be assessed. The output assessment value used by this image assessment model is 1 which means identical and -1 which means not identical. The assessment model of ROI Quality Assessment in this research is used to measure image quality on Kinect sensor capture result used in Mobile HD Robot after applying Multiple Localized Filtering Technique. The filter is applied to each capture sensor depth result on Kinect, aiming to eliminate structural noise which occurs in the Kinect sensor. Assessment is done by comparing the image quality before and after filter applied to certain regions. The Kinect sensor will be conditioned to capture a square black object measuring 10cm x 10cm perpendicular to a homogeneous background (white with RGB code 255,255,255). The results of Kinect sensor data will be taken through EWRF 3022 by visual basic 6.0 program periodically, 10 times each session with frequency 1 time per minute. The results of this trial show the same similar index (value 1: identical) in the luminance, contrast and structural section of the edge region or edge region of the specimen. The value indicates that the Multiple Localized Filtering Technique is applied to the noise generated by the Kinect sensor. Based on the ROI Image Quality Assessment model, there is no effect on the image quality generated by the sensor.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132265290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Book Data Content Similarity Detector With Cosine Similarity (Case study on digilib.uad.ac.id)","authors":"Dewi Soyusiawaty, Yahya Zakaria","doi":"10.1109/TSSA.2018.8708758","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708758","url":null,"abstract":"A library always tries to complete its book collection, yet visitors often find it difficult to search for an alternative book of an unfound book they search. Based on the questionnaire result, 83.3% respondents of library visitors take a long time in finding the exact data content of a book as an alternative of an unfound book. There are some books having similar title but the content is different. As a result, the visitors get it more difficult. For now digilib.uad.ac.id has not been able to give an alternative book when book searching done by visitors. The aim of this research is to ease the library visitors to find the exact reference book as an alternative book of an unfound book in the library by implementing Cosine Similarity method in detecting similarity.The research subject was the similarity detector system of the book data content in the library by using Cosine Similarity method. The data collection method was literature study, interview, and questionnaire. The system development phases included database design, interface design, flowchart design of book data content similarity and system evaluation with Blackbox Test, Alpha Test, and Accuracy Testing.This research developed a web-based application to detect book data content similarity by comparing the resume of a book that visitor searches with other books by using Cosine Similarity method based on the highest to the lowest score rank. System evaluation result with Blackbox test to librarians shows that the system runs well, the input can be received properly, and the output meets the expectation. On the Alpha Test evaluation, the system is also accepted by the users with 92.5% of respondent evaluation shows a highly positive response towards it. This application is reasonably used with the result of Accuracy Testing of system comparison of 82.14% relevant.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127561681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensic Analysis of Android-based Instant Messaging Application","authors":"I. Riadi, Arizona Firdonsyah","doi":"10.1109/TSSA.2018.8708798","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708798","url":null,"abstract":"The rapid development of Android technology has an impact on the increasing number of devices that use Android as operating system. Applications developed for the Android platform are also very diverse, including instant messaging applications. Short Message Service, Blackberry Messenger, Line, and WhatsApp are multi-platform instant messaging applications with lots of users, so the possibility of digital crime that occurs by digital crime perpetrators has also increased significantly. The process of investigating digital crime cases require digital evidence to solve it. The process of obtaining digital evidence requires a forensic investigation technique against the physical evidence that has been obtained using certain methods. This research focuses on forensic steps to obtain digital evidence from Instant Messaging application on Android smartphones and smartwatches using widely used mobile forensic software, namely, Andriller, Oxygen Forensic Suite, WhatsApp DB / Key Extractor, and Metasploit using a framework developed by the National Institute of Standard Technology (NIST). The results of this research are presented in the form of a comparison table of artifact extraction success rate from each tool. The conclusions obtained from this research are: forensic measures carried out based on the NIST Mobile Forensics framework can be applied to the digital evidence retrieval process Instant Messaging applications on smartphones and Android smartwatches with Oxygen Forensic Suite has the highest successful rate at 57.14% on BBM and WhatsApp artifact extraction and 42.85 on Smartwatch’s SMS and LINE Messenger artifact extraction. WhatsApp DB/ Key Extractor has the highest successful rate at 42.85 on Smartphone’s WhatsApp artifact extraction but has weakness in Smartwatch’s SMS, BBM, and LINE Messenger artifact extraction and Metasploit has the lowest success ratio.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121245632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Fadil Novar, Ari Yanuar Ridwan, B. Santosa
{"title":"SCOR and AHP Based Monitoring Dashboard to Measure Rice Sourcing Performance at Indonesian Bureau of Logistics","authors":"Muhammad Fadil Novar, Ari Yanuar Ridwan, B. Santosa","doi":"10.1109/TSSA.2018.8708814","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708814","url":null,"abstract":"Rice is one of nine main commodities in Indonesia and it has been the main food for Indonesian people for over decades. Indonesian Bureau of Logistics (Bulog) is a company under Indonesian Government which is responsible to manage the distribution of the Rice Commodity. Sourcing process of the Rice Commodity is the most crucial process in Bulog. In spite of the importance of the process, the sourcing process was not maintained using any system at all. For such an important organization, which manages important product, the sourcing process of rice commodity at Bulog should be measured and monitored. Supply chain processes, such as sourcing product, have to be measured and monitored in order to assure that the processes are well executed and to give aid for improvements. Hence, in this paper, Supply Chain Measurement System is designed based on the Supply Chain Operations Reference model and Analytical Hierarchy Process. Thereafter, a monitoring system that is capable to monitor each of the metrics in the system is designed in a web-based application. This research leads to seventeen metrics in total which are distributed into four performance attributes on the designed Supply Chain Measurement System. The most important performance attribute in rice sourcing process was Reliability with 0.593 in AHP weighting. The designed monitoring system was able to provide a compact summary and a brief insight into the condition of the monitored process to the executives of the organization.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131578597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Kamelia, Eki Ahmad Zaki Hamidi, Akhmad Jazuli Baskara
{"title":"E-Key Prototype Implementation Based on Short Message Service (SMS) Technology","authors":"L. Kamelia, Eki Ahmad Zaki Hamidi, Akhmad Jazuli Baskara","doi":"10.1109/TSSA.2018.8708768","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708768","url":null,"abstract":"Smart home technology covers many systems in a house, such as lighting systems, electronic appliance control, garden maintenance systems, security systems and so on. The use of SMS (Short Message Service) technology on cellular phones has been widely applied in various researches in the fields of smart homes, smart agriculture and industry. The research aimed to implement the electronic key using a keypad, GSM module, limit switch and the Arduino Nano. Arduino Nano serves as a processor for the control of the door lock that will be ordered through the keypad and SMS gateway, the keypad used as a close command and the SMS gateway used as a remote command for the owner of the house or building to open or lock the door. There are several components as the actuator, i.e. solenoid, buzzer and SMS gateway. The solenoid has the function to lock or open the door automatically, the buzzer functions as an alarm, and the SMS gateway has a function to send the activity/status of the door. The warning system uses a buzzer that will light up for 30 seconds if the door is open (according to the limit switch detection) whereas there is no input from the SMS or keypad.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126795389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Study of Rectangular Patch Antenna Array for High Altitude Platform Station","authors":"Ryan Fikri, M. A. Wibisono, Iskandar","doi":"10.1109/TSSA.2018.8708824","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708824","url":null,"abstract":"In order to expand the telecommunication network to the rural area, a suitable antenna is required to be applied on the High Altitude Platform Station (HAPS). In this paper, design and study of rectangular patch antenna array is proposed, in case determining antenna parameters based on 5.18GHz working frequency. High gain patch array antenna is required to use on point to point communication, so the array method is chosen to get high gain. The parameters observed from the antenna such as gain, radiation pattern, return loss, bandwidth and Voltage Standing Wave Ratio (VSWR) are simulated by Microwave Office Software to get best result of design antenna. The simulation result shows that designed antenna has high gain and suitable for HAPS due to its small size and thickness.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132933313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}