Tangerang, Indonesia
Tangerang, Indonesia

Swiss German University is a government and privately sponsored university for the ASEAN region. SGU is located on BSD City, Java, Indonesia.The Foundation , which was established in the year 2000, is a joint effort between Germany, Austria, Switzerland and Indonesia. Wikipedia.


Time filter

Source Type

Firdausi I.,Swiss German University | Lim C.,Swiss German University | Erwin A.,Swiss German University | Nugroho A.S.,Agency for the Assessment and Application of Technology
Proceedings - 2010 2nd International Conference on Advances in Computing, Control and Telecommunication Technologies, ACT 2010 | Year: 2010

The increase of malware that are exploiting the Internet daily has become a serious threat. The manual heuristic inspection of malware analysis is no longer considered effective and efficient compared against the high spreading rate of malware. Hence, automated behavior-based malware detection using machine learning techniques is considered a profound solution. The behavior of each malware on an emulated (sandbox) environment will be automatically analyzed and will generate behavior reports. These reports will be preprocessed into sparse vector models for further machine learning (classification). The classifiers used in this research are k-Nearest Neighbors (kNN), Naïve Bayes, J48 Decision Tree, Support Vector Machine (SVM), and Multilayer Perceptron Neural Network (MLP). Based on the analysis of the tests and experimental results of all the 5 classifiers, the overall best performance was achieved by J48 decision tree with a recall of 95.9%, a false positive rate of 2.4%, a precision of 97.3%, and an accuracy of 96.8%. In summary, it can be concluded that a proof-of-concept based on automatic behavior-based malware analysis and the use of machine learning techniques could detect malware quite effectively and efficiently. © 2010 IEEE.


Lim C.,Swiss German University | Ramli K.,University of Indonesia
Proceedings of 2014 2nd International Conference on Technology, Informatics, Management, Engineering and Environment, TIME-E 2014 | Year: 2015

With continuous increase rate of malware growth, detecting malware using conventional, signature-based method has failed to detect new or unknown malware. The new proposed framework is able to detect evasive malware and integrate key static and dynamic features to detect malware more accurately and efficiently. Our early experiments, based on 1603 malware samples, showed that the proposed system can analyze malware with the rate of about 144 seconds per binary code analyzed. Mal-One framework exhibits comparable overall time taken to detect and analyze the binary code to determine whether a binary code is malware or benign. © 2014 IEEE.


Sofianti T.D.,Swiss German University
Lecture Notes in Engineering and Computer Science | Year: 2014

Knowledge is asset to enhance the company's competitiveness. By managing knowledge, companies can improve performance in developing products and services to their customers. Many papers discuss the benefits, the process, and the success factors of knowledge management. However, discussion on its performance in B2B environment as a unitary system is still limited. Industrial distributors have customers at B2B level. It supports machines and equipments produced by manufactured by services. Industrial distributors sell the machines together with services to enhance value obtained by the customers from the machines. Services are provided starts from bidding process, ordering the machines from the manufacturer, delivery, installation, until the after sale stage such as maintenance. This paper promotes framework to measure knowledge management performance of industrial distributor in developing its service for the customers. The contribution of this paper is measurement framework of knowledge management in service development.


Suryajaya B.,Swiss German University
Advanced Science Letters | Year: 2014

SKK Migas implemented SOT (Sistem Operasi Terpadu) to allow SKK Migas system to retrieve specific information from PSC Contractor data source within integrated online system. It is expected that at the completion of SOT program, there will be huge transactional data that will be exchanged on daily basis, and without Data Mining, it will be extremely difficult to perform analysis. Meanwhile, this research will focus on poor data quality that may be resulted from poor data acquisition process, and how to improve SOT Data quality utilizing CRISP-DM methodology. This research found that the data contain some quality issues including missing values, negative values, useless attributes, and outliers that may affect analysis result and conclusion. At the end, this research proves that Data Quality Mining processes and algorithms can improve data quality, which expected to contribute to SKK Migas data analysis improvement. © 2014 American Scientific Publishers. All rights reserved.


Umniyati Y.,Swiss German University
Journal of Physics: Conference Series | Year: 2014

The 8-spinor realization of the chiral Skyrme-Faddeev model to describe leptons is proposed. The lepton charge being identified with the Hopf index. Energy in the model is proved to be estimated from below by the Hopf index to the power of 3/4. © Published under licence by IOP Publishing Ltd.


Lim C.,Swiss German University | Nicsen,Swiss German University
Proceedings of the 2015 10th International Conference on Communications and Networking in China, CHINACOM 2015 | Year: 2015

The rapid growth of malware requires effective, automated, and accurate ways in analyzing and detecting it. Nowadays, malware not only have offensive characteristic, but also defensive ability to obfuscate itself to be analyzed or detected. It is more effective if these techniques can be identified before analyzing them. This research focuses on designing an effective, automated, and accurate model to detect evasive malware. A prototype is made to test the design. This prototype contains the most frequently evasion techniques used by malware: packer, anti debugging, and anti virtualization. In detecting packer, features of malware are extracted and scored based on the predefined risk and weight of each feature. Threshold of the score is set to determine whether the malware is packed or not. For detecting anti debugging and anti virtualization, several heuristic patterns are gathered and utilized. These capabilities are integrated into our static detection model for evasive malware. The model is able to provide an accuracy of 98.16 percent in determining packed malware with a false positive rate of 1.45 percent. The average time for processing a file that has size below 100 kilobyte is 3.2 second. © 2015 IEEE.


Perdana R.A.,Swiss German University | Purnama J.,Swiss German University
Proceedings - 2010 2nd International Conference on Advances in Computing, Control and Telecommunication Technologies, ACT 2010 | Year: 2010

To increase the number of customer, companies create some programs. Loyalty program is the one way to increase number of customer. Most of the companies merge, cooperate, and acquired with other companies that leads to integration of their system. The purpose of this research is to show an alternative solution to these integrations, an alternative that is easy to implement and undemanding in terms of time and resource. A system is designed to achieve this purpose and can handle subsystem in a different platform, especially in loyalty system to create direct rewarding module. A modeling system then created to fulfill those requirements. It created in Java and Windows platform, to prove that designed system architecture is working. Web service technology is used to provide interoperability. Business Process Execution Language (BPEL) and composite design pattern are used to provide abstraction. During the research it is proved that BPEL process enabled the designed system architecture to provide direct rewarding module for loyalty system. © 2010 IEEE.


Djajadi A.,Swiss German University | Gunarman G.G.,Swiss German University
Communications in Computer and Information Science | Year: 2011

This paper is concerned with design of a hybrid billboard with scrolling printed images and remotely updatable light emitting diodes matrix display for advertisement purposes. The images showing the advertisements are printed on a backlit sheet that is rolled on both left and right ends of the sheet. Thus, rolling a sheet on one direction allows translational moves of the image that is being shown to the viewer. The system is combined with the LED matrix display that shows the message of the products that is currently being displayed in the rotating image part. This message could be modified wirelessly anytime in a very short time by using a user interface program that is operated from distance in the office of the advertisement company. © 2011 Springer-Verlag Berlin Heidelberg.


Sohail A.,University of Queensland | Turner M.S.,University of Queensland | Prabawati E.K.,Swiss German University | Coombes A.G.A.,University of Queensland | Bhandari B.,University of Queensland
International Journal of Food Microbiology | Year: 2012

This study investigated the effect of microencapsulation on the survival of Lactobacillus rhamnosus GG and Lactobacillus acidophilus NCFM and their acidification in orange juice at 25°C for nine days and at 4°C over thirty five days of storage. Alginate micro beads (10-40μm) containing the probiotics were produced by a novel dual aerosol method of alginate and CaCl 2 cross linking solution. Unencapsulated L. rhamnosus GG was found to have excellent survivability in orange juice at both temperatures. However unencapsulated L. acidophilus NCFM showed significant reduction in viability. Encapsulation of these two bacteria did not significantly enhance survivability but did reduce acidification at 25°C and 4°C. In agreement with this, encapsulation of L. rhamnosus GG also reduced acidification in pear and peach fruit-based foods at 25°C, however at 4°C difference in pH was insignificant between free and encapsulated cells. In conclusion, L. rhamnosus GG showed excellent survival in orange juice and microencapsulation has potential in reducing acidification and possible negative sensory effects of probiotics in orange juice and other fruit-based products. © 2012 Elsevier B.V.


Kevindra Darwis A.,Swiss German University | Lim C.,Swiss German University
ICACSIS 2011 - 2011 International Conference on Advanced Computer Science and Information Systems, Proceedings | Year: 2011

e-KTP (Indonesian: Kartu Tanda Penduduk Elektronik) was introduced by the Indonesian Interior Ministry to replace the existing identity card. With contactless smart card technology, e-KTP obligates every applicant to have their fingerprints scanned, verified, and saved in the central storage. Furthermore, the data of the fingerprint will be stored in the e-KTP smart card as well. Since it is a very sensitive data, thus, some security controls must be implemented. This project developed a system to address this issue. First, a mutual authentication program between smart card readers/terminals and e-KTP smart cards, before transaction begins. The process authenticates both sides and proves that they are authorized by employing cryptographic protocols, algorithms, and keys. Furthermore the project also developed encryption and decryption program to protect data during transmission. © 2011 Universitas Indonesia.

Loading Swiss German University collaborators
Loading Swiss German University collaborators