Swiss German University is a government and privately sponsored university for the ASEAN region. SGU is located on BSD City, Java, Indonesia.The Foundation , which was established in the year 2000, is a joint effort between Germany, Austria, Switzerland and Indonesia. Wikipedia.
Pratiwi M.,Swiss German University
Starch/Staerke | Year: 2017
Starch is a carbohydrate polymer consisting of glucose monomers with alpha-glycosidic bonds comprising amylose (linear chains) and amylopectin (linear and branched chains). Starch modification is generally carried out for two reasons. First, native starch has limited applications. Second, functional properties can be added to starch through the modification to produce resistant starch for use in functional foods. Resistant starch has been revealed to show several health benefits including increasing faecal bulk, lowering colonic pH, and reducing glycaemic response. Acid hydrolysis, debranching, autoclaving-cooling cycles, and heat moisture treatment (HMT) are the common methods involved in resistant starch production. These modifications can lead to changes in the structure of starch related to its resistance to human digestion. Here, the structural changes observed by gel-permeation/filtration chromatography (GPC/GFC), Fourier transform infra-red (FTIR) spectroscopy, X-ray diffractometry (XRD), differential scanning calorimetry (DSC), and scanning electron microscopy (SEM) are discussed. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Firdausi I.,Swiss German University |
Lim C.,Swiss German University |
Erwin A.,Swiss German University |
Nugroho A.S.,Agency for the Assessment and Application of Technology
Proceedings - 2010 2nd International Conference on Advances in Computing, Control and Telecommunication Technologies, ACT 2010 | Year: 2010
The increase of malware that are exploiting the Internet daily has become a serious threat. The manual heuristic inspection of malware analysis is no longer considered effective and efficient compared against the high spreading rate of malware. Hence, automated behavior-based malware detection using machine learning techniques is considered a profound solution. The behavior of each malware on an emulated (sandbox) environment will be automatically analyzed and will generate behavior reports. These reports will be preprocessed into sparse vector models for further machine learning (classification). The classifiers used in this research are k-Nearest Neighbors (kNN), Naïve Bayes, J48 Decision Tree, Support Vector Machine (SVM), and Multilayer Perceptron Neural Network (MLP). Based on the analysis of the tests and experimental results of all the 5 classifiers, the overall best performance was achieved by J48 decision tree with a recall of 95.9%, a false positive rate of 2.4%, a precision of 97.3%, and an accuracy of 96.8%. In summary, it can be concluded that a proof-of-concept based on automatic behavior-based malware analysis and the use of machine learning techniques could detect malware quite effectively and efficiently. © 2010 IEEE.
Lim C.,Swiss German University |
Ramli K.,University of Indonesia
Proceedings of 2014 2nd International Conference on Technology, Informatics, Management, Engineering and Environment, TIME-E 2014 | Year: 2015
With continuous increase rate of malware growth, detecting malware using conventional, signature-based method has failed to detect new or unknown malware. The new proposed framework is able to detect evasive malware and integrate key static and dynamic features to detect malware more accurately and efficiently. Our early experiments, based on 1603 malware samples, showed that the proposed system can analyze malware with the rate of about 144 seconds per binary code analyzed. Mal-One framework exhibits comparable overall time taken to detect and analyze the binary code to determine whether a binary code is malware or benign. © 2014 IEEE.
Sofianti T.D.,Swiss German University
Lecture Notes in Engineering and Computer Science | Year: 2014
Knowledge is asset to enhance the company's competitiveness. By managing knowledge, companies can improve performance in developing products and services to their customers. Many papers discuss the benefits, the process, and the success factors of knowledge management. However, discussion on its performance in B2B environment as a unitary system is still limited. Industrial distributors have customers at B2B level. It supports machines and equipments produced by manufactured by services. Industrial distributors sell the machines together with services to enhance value obtained by the customers from the machines. Services are provided starts from bidding process, ordering the machines from the manufacturer, delivery, installation, until the after sale stage such as maintenance. This paper promotes framework to measure knowledge management performance of industrial distributor in developing its service for the customers. The contribution of this paper is measurement framework of knowledge management in service development.
Suryajaya B.,Swiss German University
Advanced Science Letters | Year: 2014
SKK Migas implemented SOT (Sistem Operasi Terpadu) to allow SKK Migas system to retrieve specific information from PSC Contractor data source within integrated online system. It is expected that at the completion of SOT program, there will be huge transactional data that will be exchanged on daily basis, and without Data Mining, it will be extremely difficult to perform analysis. Meanwhile, this research will focus on poor data quality that may be resulted from poor data acquisition process, and how to improve SOT Data quality utilizing CRISP-DM methodology. This research found that the data contain some quality issues including missing values, negative values, useless attributes, and outliers that may affect analysis result and conclusion. At the end, this research proves that Data Quality Mining processes and algorithms can improve data quality, which expected to contribute to SKK Migas data analysis improvement. © 2014 American Scientific Publishers. All rights reserved.
Umniyati Y.,Swiss German University
Journal of Physics: Conference Series | Year: 2014
The 8-spinor realization of the chiral Skyrme-Faddeev model to describe leptons is proposed. The lepton charge being identified with the Hopf index. Energy in the model is proved to be estimated from below by the Hopf index to the power of 3/4. © Published under licence by IOP Publishing Ltd.
Lim C.,Swiss German University |
Nicsen,Swiss German University
Proceedings of the 2015 10th International Conference on Communications and Networking in China, CHINACOM 2015 | Year: 2015
The rapid growth of malware requires effective, automated, and accurate ways in analyzing and detecting it. Nowadays, malware not only have offensive characteristic, but also defensive ability to obfuscate itself to be analyzed or detected. It is more effective if these techniques can be identified before analyzing them. This research focuses on designing an effective, automated, and accurate model to detect evasive malware. A prototype is made to test the design. This prototype contains the most frequently evasion techniques used by malware: packer, anti debugging, and anti virtualization. In detecting packer, features of malware are extracted and scored based on the predefined risk and weight of each feature. Threshold of the score is set to determine whether the malware is packed or not. For detecting anti debugging and anti virtualization, several heuristic patterns are gathered and utilized. These capabilities are integrated into our static detection model for evasive malware. The model is able to provide an accuracy of 98.16 percent in determining packed malware with a false positive rate of 1.45 percent. The average time for processing a file that has size below 100 kilobyte is 3.2 second. © 2015 IEEE.
Djajadi A.,Swiss German University |
Gunarman G.G.,Swiss German University
Communications in Computer and Information Science | Year: 2011
This paper is concerned with design of a hybrid billboard with scrolling printed images and remotely updatable light emitting diodes matrix display for advertisement purposes. The images showing the advertisements are printed on a backlit sheet that is rolled on both left and right ends of the sheet. Thus, rolling a sheet on one direction allows translational moves of the image that is being shown to the viewer. The system is combined with the LED matrix display that shows the message of the products that is currently being displayed in the rotating image part. This message could be modified wirelessly anytime in a very short time by using a user interface program that is operated from distance in the office of the advertisement company. © 2011 Springer-Verlag Berlin Heidelberg.
Sohail A.,University of Queensland |
Turner M.S.,University of Queensland |
Prabawati E.K.,Swiss German University |
Coombes A.G.A.,University of Queensland |
Bhandari B.,University of Queensland
International Journal of Food Microbiology | Year: 2012
This study investigated the effect of microencapsulation on the survival of Lactobacillus rhamnosus GG and Lactobacillus acidophilus NCFM and their acidification in orange juice at 25°C for nine days and at 4°C over thirty five days of storage. Alginate micro beads (10-40μm) containing the probiotics were produced by a novel dual aerosol method of alginate and CaCl 2 cross linking solution. Unencapsulated L. rhamnosus GG was found to have excellent survivability in orange juice at both temperatures. However unencapsulated L. acidophilus NCFM showed significant reduction in viability. Encapsulation of these two bacteria did not significantly enhance survivability but did reduce acidification at 25°C and 4°C. In agreement with this, encapsulation of L. rhamnosus GG also reduced acidification in pear and peach fruit-based foods at 25°C, however at 4°C difference in pH was insignificant between free and encapsulated cells. In conclusion, L. rhamnosus GG showed excellent survival in orange juice and microencapsulation has potential in reducing acidification and possible negative sensory effects of probiotics in orange juice and other fruit-based products. © 2012 Elsevier B.V.
Kevindra Darwis A.,Swiss German University |
Lim C.,Swiss German University
ICACSIS 2011 - 2011 International Conference on Advanced Computer Science and Information Systems, Proceedings | Year: 2011
e-KTP (Indonesian: Kartu Tanda Penduduk Elektronik) was introduced by the Indonesian Interior Ministry to replace the existing identity card. With contactless smart card technology, e-KTP obligates every applicant to have their fingerprints scanned, verified, and saved in the central storage. Furthermore, the data of the fingerprint will be stored in the e-KTP smart card as well. Since it is a very sensitive data, thus, some security controls must be implemented. This project developed a system to address this issue. First, a mutual authentication program between smart card readers/terminals and e-KTP smart cards, before transaction begins. The process authenticates both sides and proves that they are authorized by employing cryptographic protocols, algorithms, and keys. Furthermore the project also developed encryption and decryption program to protect data during transmission. © 2011 Universitas Indonesia.