Bandung, Indonesia
Bandung, Indonesia

Time filter

Source Type

News Article | May 12, 2017

JAKARTA, Indonesia, May 12, 2017 /PRNewswire/ -- Xirka Silicon Technology today unveiled the launch of Chipset SCard XCT136, the first local Indonesian smart card, providing multi-function purposes for student identity cards. To track student attendance, it works by using computerized fingerprint scanners to ensure a secure environment. It also offers a cashless transaction option, so all transactions related to university activities can be done by swiping the card. Supported by Indonesian Ministry of Research, Technology, and Higher Education together with Indonesian Ministry of Communication and Informatics, the chipset currently targets educational institutions, such as University of Indonesia, Bandung Institute of Technology, Hasanuddin University, and Telkom University, and is widely applied to electronic student identity cards. "The digital economy has a tremendous potential in advancing the Indonesian economy. This sector will contribute up to 11% of economic development in 2020. If accomplished, in 2030 Indonesia will occupy the 8th position in the world economy. Therefore, it needs greater innovation to face global competitiveness and this chipset development is the answer," said Rudiantara, Minister of Communication and Information Technology of the Republic of Indonesia at the launch ceremony of Chipset SCard XCT 136 on May 12th 2017. Through Industrial Technology Development Program and Technology Innovation Program, Ministry of Research, Technology, and Higher Education of the Republic of Indonesia initiated the product development, involving students from state universities in Indonesia. By participating in the development process, the students are given the opportunity to showcase their ability to create and innovate, among their peers. According to research from MARS Indonesia, in 2016, state universities in Indonesia had a total of 507,000 new students. "Therefore, to answer market needs, Xirka Silicon Technology will provide up to 1 million units of Chipset SCard XCT136 per year for those universities," said Sylvia W. Sumarlin, President Director of PT Xirka Silicon Technology. Research and production of each component of the chipset are carried out domestically in Bandung, West Java, ensuring security against data breaches and fraud from cybercriminals. The exclusive production of chipset components in Indonesia has been successful so far in preventing other countries from gaining access or gathering information about the design and architecture of these detailed components. "It ensures data confidentiality, since no other regions will have any access to its design without Xirka's permission," added Sylvia. Xirka Silicon Technology started producing chipsets in 2007 and entered into the wider APAC regional market by partnering with Siltera-Malaysia, Singapore, Taiwan, and Japan. They won the first prize at Asia Pacific ICT Alliance Award 2008 (APICTA) for the development of WiMAX baseband chipset. In 2016, Xirka Silicon Technology completed development of its local smart card protocol, which includes Key Management System, Card Management System, and Smart Card Operating System allowing for support of multi-application features. According to Sylvia, the chipset provides several blocks of data storage memory. "Each offers different functions, such as application ID, payment, and loyalty card. Early next year, Xirka plans to launch Near-Field Communication (NFC) chipsets, which is commonly used for electronic ticket and mobile payment." Together, Xirka Silicon Technology and Microelectronics Center Bandung Institute of Technology worked to optimize security and data storage by strengthening technologies in all support systems, including card reader portable, virtual Secure Access Module (SAM), secure network, and card database. In security optimization, Chipset SCard XCT136 utilizes security engine DES and 3DES, adding 136 Kbyte to the chipsets to support more extensive data saving. Xirka Silicon Technology is a fabless company that focuses on the development of WiMAX baseband chipsets.  Established in May, 2007, it delivers a System-on-Chip (SoC) for Broadband Wireless Access (BWA) to fulfill businesses needs, supporting everybody's dynamic lifestyle which very often requires immediate attention and action. To provide assurance, our SoC uses IEEE 802.16d-2004 standard for nomadic WiMAX and IEEE 802.16e-2005 for mobile WiMAX. Continuing its commitment as a design company, since 2011 Xirka has developed SIM cards and proceeded with smart card products and derivatives such as access cards, ID cards and secured cards for banking by utilizing Near Field Communication (NFC) and RFID technologies. A lot of IT equipment will benefit from Xirka's chipset, such as, modem cards, computers, notebooks, mobile gadgets, CPE modems, etc. Xirka also recognizes the need of our clients to have a reliable chipset at an affordable price, therefore we have built our research and design center and developed products with clients' concerns on our mind.

Saadah S.,Telkom University
2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015 | Year: 2015

Economic indicator in Indonesia are GDP (Gross Domestic Product), GNI (Gross National Income), inflation, export and import. These data had been chosen because economic that came from words 'ecos' and 'nomos' consist of value of life which are implemented in them. Based on that reason, it cannot be avoided that chaos and complex will emerge during measure the economic condition. In order to monitor Indonesia's economic, system that predict each of economic indicator had been developed. This concept tried to answer the chaos and complex in real-problem. System did not measure only one indicator independently, instead of involve all of indicators while predict it. So that, non-linear differential dynamic had been used to face this issued. Furthermore, system would predict as time series and optimized using genetic algorithm. By setting parameter probability mutation and probability cross over, this research got accuracy around 30%-80%. The range of accuracy proved that the system able enough to fit data in finding historical pattern even had to face with chaos and complex. Distribution data and non-linear differential equation are caused of chaos and complex respectively. Keywords-chaos and complex, economic condition, non-linear differential dynamic, time series, genetic algorithm. © 2015 IEEE.

Pangarso A.,Telkom University
Proceedings of 2014 2nd International Conference on Technology, Informatics, Management, Engineering and Environment, TIME-E 2014 | Year: 2015

Organization is a collection of people who are formally united and agreed to fulfill the same goals. The organization effectiveness using the competing values approach is divided into 4 quadrants. To fulfill goals the organization needs strategy. The merger strategy used to grow the organization externally. Strategies affecting the structure. The methods of this paper using literature review (secondary data). This paper describes the structure (complexity, formalization and centralization) of the new organization (merger) based on the competing values approach which in the entrepreneurial stage (first stage of the organization life cycle). The conclusion will be the basic hypotheses to be deeply investigated in the next research of contextual organization empirical study. © 2014 IEEE.

Wirayuda T.A.B.,Telkom University
Proceedings - 5th International Conference on Electrical Engineering and Informatics: Bridging the Knowledge between Academic, Industry, and Community, ICEEI 2015 | Year: 2015

Palm vein recognition is one of the biometric systems that recently explored. The location of palm-vein that inside the human body, give a special characteristic compare with other biometric modal. It expected to be robust, difficult to be duplicated, and are not affected by dryness and roughness of skin. Therefore palm vein has high security and needs to be studied more. In this paper we develop a recognition system consists of several processes; they are ROI detection using peak-valley detection and first CHVD rules, pre-processing using maximum curvature, feature extraction based-on minutiae, and feature matching using based-on weighted Euclidean score. The experimental result yielded a best success rate of 91.00% in term of accuracy with configuration of the system using adaptive histogram equalization, full minutiae feature and the group-voting matching (the threshold for point matching set at 0.10). In term of biometric performance we achieve Equal Error Rate at 9.94% with threshold 0.50380. Both of best performance achieve with only 42 average number of minutiae feature. © 2015 IEEE.

Ciptasari R.W.,Telkom University
Proceedings of SPIE - The International Society for Optical Engineering | Year: 2016

A common form of manipulation is to combine parts of the image fragment into another different image either to remove or blend the objects. Inspired by this situation, we propose a single authentication technique for detecting traces of weighted average splining technique. In this paper, we assume that image composite could be created by joining two images so that the edge between them is imperceptible. The weighted average technique is constructed from overlapped images so that it is possible to compute the gray level value of points within a transition zone. This approach works on the assumption that although splining process leaves the transition zone smoothly. They may, nevertheless, alter the underlying statistics of an image. In other words, it introduces specific correlation into the image. The proposed idea dealing with identifying these correlations is to generate an original model of both weighting function, left and right functions, as references to their synthetic models. The overall process of the authentication is divided into two main stages, which are pixel predictive coding and weighting function estimation. In the former stage, the set of intensity pairs {Il,Ir} is computed by exploiting pixel extrapolation technique. The least-squares estimation method is then employed to yield the weighted coefficients. We show the efficacy of the proposed scheme on revealing the splining artifacts. We believe that this is the first work that exposes the image splining artifact as evidence of digital tampering. © 2016 SPIE.

Nurjanah D.,Telkom University
CSEDU 2016 - Proceedings of the 8th International Conference on Computer Supported Education | Year: 2016

Classic challenges in adaptive learning systems are about performing adaptive navigation that recommends a topic or concept to be learned next and learning materials relevant to the topic. Both recommendations have to meet active learners' needs. As adaptive navigation problems have been solved using artificial intelligence techniques, learning material recommendation problems can be solved using recommender techniques that have been successfully applied to other problems. Until recently there have been a number of techniques that come with certain advantages and disadvantages. This paper proposes a new technique for recommending learning materials that combine content-based filtering and collaborative filtering based on the similarity between learners and learners' competence. It aims to diminish the drawback of classic collaborative filtering, which is based on the similarities between learners and does not consider learners' competence. It also diminishes problems arising from collaborative filtering based on good learners' competence, which potentially produces recommended objects that do not meet the learners' condition. The results of a recent experiment show that the proposed technique performs well, as indicated by the MAE score of 0.96 for a rating scale of 1 to 10. Copyright © 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.

Maharani W.,Telkom University | Gozali A.A.,Telkom University
Procedia Computer Science | Year: 2015

Social Network Analysis (SNA) has been applied in several case studies. SNA is applied to enhance the company's marketing strategy as well as small and medium businesses. This research proposes a collaborative model using content-based and user-based approach, with the centrality measurement methods. Content-based approach tends to focus on tweet content analysis of the existing nodes in a network, while the user-based approach focuses on the connections between users in the network twitter. The model will combine the advantages of collaborative content-based and user-based approach, to find the most influential people in a twitter network to make the dissemination of information more effectively and efficiently. © 2015 The Authors. Published by Elsevier B.V.

Gunawan P.H.,Telkom University
2016 4th International Conference on Information and Communication Technology, ICoICT 2016 | Year: 2016

This paper is devoted to study the parallel programming for scientific computing on the one-dimensional heat diffusion problem. The mathematical problem of the heat equation is defined in continuous and discrete form. The continuous form of heat equation is discretized and approached using explicit finite difference. This approach is a straightforward numerical scheme and easy to implement into parallel programming. In this paper, OpenMP platform is used as the shared memory parallel programming architecture. Some numerical simulations of one-dimensional heat diffusion problem are given. Two numerical examples with different initial conditions, smooth and discontinue, are presented in order to show that this parallel algorithm is well implemented. Both speedup and efficiency from each numerical examples are shown satisfied. By using 4 processors in the experiment with a smooth initial condition, the speedup and efficiency are shown quantitatively, 2 and 50%, as the number of grids increases up to 2000 points. © 2016 IEEE.

Wijaya D.R.,Telkom University
Journal of Theoretical and Applied Information Technology | Year: 2014

Since a few years ago Indonesian government began to perform the application of the concept of the internet of things (IoT). Application of the IoT by the Indonesian government aims to provide ease in identification of people or objects and their attributes so it can be used as reference data in their policy or implement some rules. Some programs have been implemented such as e-KTP (e-ID Card) program, subsidized fuel control system using Radio Frequency Identification (RFID) technology, and electronic ticketing system for electric railways. Start from 2011, Indonesia Government has been implementing RFID technology for e-Identification. This program is called e-KTP which aims to realize single ID and establish complete and accurate demographic database. Indonesian e-KTP card store demographic data consisting of biographical data, signature, photograph, biometrics, and other data related to aspects of data security and card management. e-KTP refers to the standard ISO/IEC 14443A/B that works at a frequency 13,56 MHz. However, utilization of the e-KTP card is still not optimal because its utilization is not much different from the conventional ID card. This study will be discussed regarding the design and implementation of e-KTP middleware. This middleware architecture can be adopted by government or private agencies to improve their services by conduct the data collecting of customer transactions by linking the e-KTP card with the enterprise database with the specific rules. Thus the Indonesian people have truly single ID that can be used for many purposes such as for health care system, attendance management system, electronic payment system, and so on. © 2005 - 2014 JATIT & LLS. All rights reserved.

Nugroho H.,Telkom University
Journal of Theoretical and Applied Information Technology | Year: 2014

Effective governance in an organization does not happen by coincidence. The success of implementing effective governance in an organization associated with the right pattern or fit for the organization so that they can be a complement or supplement of organization's strategic focus. Information technology (IT) governance is not a static concept but rather processes inherent in the organization. Decentralized organizations such as a university need a regular review to renew the IT governance structure to take account of changing business and technological environment. However, the mechanism IT governance in an organization will depend on the characteristics and needs of the organization. ISO/IEC 38500 help the people at the highest levels in the organization to understand and fulfill their legal obligations, regulations and ethics in relation to the use of IT in their organizations by providing key principles. COBIT 5 framework provides guidance how IT governance should be built by taking into account the area of enterprise governance and management of governance areas that both have their roles within the scope of IT governance. Conceptual model of IT governance is built based on the main principles that should exist in the process of governance with COBIT 5 framework guide as a reference how the governance of IT must be organized with attention to area governance and management areas, each rendered in a particular domain so that it will be a guide for higher education for developing IT blueprint that not only seen as supporting the IT aspects of academic and non-academic activities but look at the overall aspects of the scope of university governance. © 2005 - 2014 JATIT & LLS. All rights reserved.

Loading Telkom University collaborators
Loading Telkom University collaborators