T. Mantoro, Muhammad Elky Fahriza, Muhammad Agni Catur Bhakti
{"title":"Effective of Obfuscated Android Malware Detection using Static Analysis","authors":"T. Mantoro, Muhammad Elky Fahriza, Muhammad Agni Catur Bhakti","doi":"10.1109/ICCED56140.2022.10010587","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010587","url":null,"abstract":"The effective security system improvement from malware attacks on the Android operating system should be updated and improved. Effective malware detection increases the level of data security and high protection for the users. Malicious software or malware typically finds a means to circumvent the security procedure, even when the user is unaware whether the application can act as malware. The effectiveness of obfuscated android malware detection is evaluated by collecting static analysis data from a data set. The experiment assesses the risk level of which malware dataset using the hash value of the malware and records malware behavior. A set of hash SHA256 malware samples has been obtained from an internet dataset and will be analyzed using static analysis to record malware behavior and evaluate which risk level of the malware. According to the results, most of the algorithms provide the same total score because of the multiple crime inside the malware application.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115601716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. S. Attarbashi, Abdulazeez E. Altaleb, Azana Hafizah Mohd Aman, Aisha Hassan Abdalla Hashim, S. Eker
{"title":"A Review of 5G Technology: Architecture and Challenges","authors":"Z. S. Attarbashi, Abdulazeez E. Altaleb, Azana Hafizah Mohd Aman, Aisha Hassan Abdalla Hashim, S. Eker","doi":"10.1109/ICCED56140.2022.10010607","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010607","url":null,"abstract":"5G Networks are considered as a new evolution since it aims to increase the wireless capacity 1000 times the previous generations. By 2025, it is expected that 5G will be connecting around 3 billion people and 41.6 billion devices enabling the Internet of Things (IoT) and the Internet of Everything (IoE) while increasing energy efficiency 90% more than 4G and reducing 20% of carbon emissions. In this paper, the deployment requirements and challenges of 5G Networks are reviewed. Starting with the overall network architecture and network slicing framework including the service-type slicing and the infrastructure slicing are investigated. Later, the spectrum and multiple access techniques are explained. Finally, the challenges and the available solutions have been discussed.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Richa Rahmaliya Sunhadji, Selfin Anugrah Amdani, Sofa Lailatul Ma’rifah, Muhamad Deva Prayoga, Paikun Paikun, Dio Damas Permadi
{"title":"Preservation of Kasepuhan Traditional House Culture to Maintain Unesco Global Recognition Ciletuh Geopark","authors":"Richa Rahmaliya Sunhadji, Selfin Anugrah Amdani, Sofa Lailatul Ma’rifah, Muhamad Deva Prayoga, Paikun Paikun, Dio Damas Permadi","doi":"10.1109/icced56140.2022.10010381","DOIUrl":"https://doi.org/10.1109/icced56140.2022.10010381","url":null,"abstract":"The uniqueness of traditional culture and the characteristics of the conventional house building of Kasepuhan Sinar Resmi is one part that has received an assessment that Ciletuh is recognized by the world as Unesco Global Geoparks. The uniqueness of the house building is only found in a relatively small environment, while the surrounding houses have followed the general building design so that if the uniqueness of the traditional house is not maintained it can slowly disappear. Some of the problems why people build houses following the general design include the absence of design standards, not knowing how many materials are needed, or the main materials for building houses are very limited. Based on this, this research is very important to create a special design portfolio for traditional houses. The method of observation and interviews with traditional elders is a way to produce designs that are in accordance with the ancestral culture that is firmly held by traditional culture. This study aims to produce a special design for a leuit house or rice barn according to custom, which consists of a portfolio of buildings equipped with building component modules, as well as the number of building material needs. The results of this study are expected to be a reference for the community in making special buildings for leuit houses or rice barns and can be a reference for policy makers in providing sources of building materials for traditional houses. Further research needs to produce a portfolio of traditional residential houses.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126437262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cutifa Safitri, Q. Nguyen, Media Anugerah Ayu, T. Mantoro
{"title":"Robust Implementation of ICN-based Mobile IoT for Next-Generation Network","authors":"Cutifa Safitri, Q. Nguyen, Media Anugerah Ayu, T. Mantoro","doi":"10.1109/ICCED56140.2022.10010561","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010561","url":null,"abstract":"This paper proposes a Mobile IoT optimization method for Next-Generation networks by evaluating a series of named-based techniques implemented in Information-Centric Networking (ICN). The idea is based on the possibility to have a more suitable naming and forwarding mechanism to be implemented in IoT. The main advantage of the method is in achieving a higher success packet rate and data rate by following the proposed technique even when the device is mobile / roaming around. The proposed technique is utilizing a root prefix naming which allows faster process and dynamic increase for content waiting time in Pending Interest Table (PIT). To test the idea, a simulation is carried out by mimicking how IoT can be implemented, especially in smart cities, where a user can also travel and not be static. Results show that the proposed technique can achieve up to a 13% interest success rate and an 18.7% data rate increase compared to the well-known implementation algorithms. The findings allow for possible further cooperation of data security factors and ensuring energy reduction through leveraging more processes at the edge node.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122262469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. R. Ramdania, A. Wahana, Cindy Hanny Nurulaeni, Y. A. Gerhana, W. B. Zulfikar
{"title":"Speeded Up Robust Features Algorithm on Augmented Reality for Sirah Nabawiyah Learning Media","authors":"D. R. Ramdania, A. Wahana, Cindy Hanny Nurulaeni, Y. A. Gerhana, W. B. Zulfikar","doi":"10.1109/ICCED56140.2022.10010625","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010625","url":null,"abstract":"Based on the survey results, 85% of young children do not know about the history of the prophet or the miracles that were revealed to the prophet. Studying the history of the prophet is an embodiment of the 4th pillar of faith, namely Faith in the Prophet. Given the urgency, several learning media in various forms have been created and marketed to introduce Sirah nabawiyah, one of which is Augmented Reality. This study aims to build an application to recognize the history of the prophet using Augmented Reality. The Speeded Up Robust Features (SURF) algorithm is applied to detect AR markers. Based on the effectiveness test results, the application can display objects with an average time of 0.17 seconds for a distance of 10 cm, 0.23 seconds for a distance of 20 cm, and 0.34 seconds for a distance of 30 cm. This shows that the algorithm can function well in detecting objects.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128162118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Interaction, Identification, Customer Satisfaction and Customer Loyalty on Online Video on Demand","authors":"Muhammad Aufar Alfarisi, Yudi Fernando, R. Ikhsan","doi":"10.1109/ICCED56140.2022.10010667","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010667","url":null,"abstract":"This study investigates the correlation between online video-on-demand customer interaction, identification, satisfaction, and loyalty. Online questionnaires were used to obtain data from residents of the JABODETABEK region. Only 227 respondents participated out of 1.500 questionnaires that were sent out The IBM SPSS was utilized to define respondent characteristics, and it was discovered that 100% of respondents were video-on-demand subscribers who lived in the JABODETABEK area. The PLS-SEM was utilized to test the proposed hypotheses. The results found that interaction, identification, and customer satisfaction impact customer loyalty positively.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126982004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sinka Puji Yuninda, Satriani Aga Pasma, T. Mantoro
{"title":"Patient Data Security in Telemedicine Services from Data Misuse in Health Practice","authors":"Sinka Puji Yuninda, Satriani Aga Pasma, T. Mantoro","doi":"10.1109/ICCED56140.2022.10010685","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010685","url":null,"abstract":"Misuse of a person's data can be found anywhere because of a lack of knowledge about how to manage data and secure it properly. The rapid development of information technology, creates various activities easily, including in the health sector. In the field of health itself, there is a long-distance consultation using various applications that facilitate long-distance relationships between doctors and patients, known as telemedicine. However, the emergence of this development does not deny the existence of cybermedicine. Cyber medicine is the dissemination of clinical and non-clinical patient information that can be misused for personal gain that can harm others. This can be used in telemedicine, all online-based, so there is a possibility of data leakage. The authors want to examine the extent of data protection for patients who use telemedicine services. This study was conducted using a literature review method taken from articles related to telemedicine. Therefore, there is a need for regulations to provide legal protection for victims who experience theft of personal data by providing certainty in the management of data and information, especially the management of personal data. If the data is not managed properly and appropriately, it will lead to abuse and cybercriminal attacks.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130390520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Subaeki, Aedah Abd Rahman, K. Manaf, Riffa Haviani Laluma, A. Wahana, N. Lukman
{"title":"Assessing Tax Online System Success: A Validation of Success Model with Focus Group Study","authors":"B. Subaeki, Aedah Abd Rahman, K. Manaf, Riffa Haviani Laluma, A. Wahana, N. Lukman","doi":"10.1109/icced56140.2022.10010597","DOIUrl":"https://doi.org/10.1109/icced56140.2022.10010597","url":null,"abstract":"Measuring the success of information systems using the success model has been widely carried out. However, validation of the model is needed. This is done with the aim that the model made is by the system that represents it. One of the concepts validated by the model in this study is the focus group study. A focus group study was conducted to examine. Further, the model was developed so that the model can be said to be feasible. Several stages in the focus group study are interviews, consultations, discussions, and seminars, involving several participants who know the topic to be studied.Focus group studies are conducted to provide a deeper understanding of the study being studied. This was done in response to the limited information obtained from research tools such as surveys. Because research tools such as surveys generally ask closed questions, there is no feedback. Focus group studies can be used as a whole in the research design or individual treatment of the topic to be explored.Some researchers argue that in conducting validation, the method used is quantitative. Although they use quantitative and qualitative methods, only a few are aware of it. This article describes how qualitative methods are used as model validation before quantitative methods are used as model validation. The results of the focus group study are in the form of methodologies, analyses, and reports.This article is handy to illustrate that model validation is carried out qualitatively before quantitative validation is carried out. The results of this study are in the form of modeling processes, methodologies, human resources needed in the availability of research, and validation recommendations in carrying out research implementation.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"92 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128020042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Praseptiadi, Pratama Dahlian Persadha, A. Susandi, Teddy Mantoro
{"title":"Private Data Protection as Countermeasure Against Misuses of Medical Intelligent Technology Data: a Literature Study","authors":"Praseptiadi, Pratama Dahlian Persadha, A. Susandi, Teddy Mantoro","doi":"10.1109/ICCED56140.2022.10010546","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010546","url":null,"abstract":"Medical Technologies develop along with the development of the Industrial Revolution 4.0 (I.R. 4.0). In I.R. 4.0, a collaborative ecosystem is formed between cyber technology and automation technology to be able to create \"intelligent\" systems to facilitate various human activities, including activities related to health. The most important thing in the system is data since it is the basis for the development of various key icons technologies in the I.R. 4.0: Cloud Computing, Internet of Things (IoT), Big Data, Artificial Intelligence (Al), Augmented Reality, and Cyber Security. Unfortunately, with the variety of I.R. 4.0 products, the data produced by these products is also scattered everywhere. Misuse of this scattered data—which the owner may not even know where the data are stored—can harm the individual concerned, and even the very existence of the state. Healthcare services now are undergoing Digital Transformation in which these data were needed to build high-quality services. The Health Digital Transformation strategy changes the direction of health services to be simpler and easier to use by the public, increasing efficiency, and thus providing a higher quality health service system so that it can trigger better economic growth. On the regulatory aspect, The Private Data Protection Bill was proposed by the Indonesian government to protect the data of the Indonesian people. Literature studies are used to obtain knowledge between the three: technology development, digital transformation in healthcare, and private data protection. This study seeks how important private data protection regulation is to realize digitally transformed healthcare. The study conducted indicates Private Data Protection Bills have the means to guarantee the rights of the data owner and prevent their data (including medical intelligence data) to be misused.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132510040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aditya Welly Andi, C. Slamet, D. Maylawati, J. Jumadi, A. R. Atmadja, M. Ramdhani
{"title":"Sentiment Analysis of State Capital Relocation of Indonesia using Convolutional Neural Network","authors":"Aditya Welly Andi, C. Slamet, D. Maylawati, J. Jumadi, A. R. Atmadja, M. Ramdhani","doi":"10.1109/ICCED56140.2022.10010503","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010503","url":null,"abstract":"The current government policy led by President Joko Widodo regarding relocating the capital city from Daerah Khusus Ibukota (Capital Special Region) of Jakarta to East Kalimantan has drawn a variety of comments, ranging from praise, criticism, suggestions, innuendo to hate speech. This is supported by many Indonesian political figures who have Twitter accounts to provide support or opinions on this policy. This study aims to analyze the sentiments about this issue. There is very varied sentiment from this issue, either positive or negative responses. This research used Convolutional Neural Network (CNN) algorithm as a part of the Deep Learning method to classify sentiments towards government policy on moving capital city of Indonesia with data obtained from Twitter. The process begins with text pre-processing containing case folding, tokenizing, stop-words removing, stemming, and changing the emoticon to word. Then, the word embedding process used Word2Vec. The result of experiment of CNN algorithm with 1,515 tweets in the Indonesian language and 15 times of experiment shows that the average accuracy is 66.68% with the highest accuracy is 70.3%. The experiment used five training and testing data splitting variations, with three epochs, among others: 10 epochs, 30 epochs, and 100 epochs.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"84 1-2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132152232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}