Bandung, Indonesia

Time filter

Source Type

Saadah S.,Telkom University
2015 IEEE 2nd International Conference on InformationScience and Security, ICISS 2015 | Year: 2015

Economic indicator in Indonesia are GDP (Gross Domestic Product), GNI (Gross National Income), inflation, export and import. These data had been chosen because economic that came from words 'ecos' and 'nomos' consist of value of life which are implemented in them. Based on that reason, it cannot be avoided that chaos and complex will emerge during measure the economic condition. In order to monitor Indonesia's economic, system that predict each of economic indicator had been developed. This concept tried to answer the chaos and complex in real-problem. System did not measure only one indicator independently, instead of involve all of indicators while predict it. So that, non-linear differential dynamic had been used to face this issued. Furthermore, system would predict as time series and optimized using genetic algorithm. By setting parameter probability mutation and probability cross over, this research got accuracy around 30%-80%. The range of accuracy proved that the system able enough to fit data in finding historical pattern even had to face with chaos and complex. Distribution data and non-linear differential equation are caused of chaos and complex respectively. Keywords-chaos and complex, economic condition, non-linear differential dynamic, time series, genetic algorithm. © 2015 IEEE.

Pangarso A.,Telkom University
Proceedings of 2014 2nd International Conference on Technology, Informatics, Management, Engineering and Environment, TIME-E 2014 | Year: 2015

Organization is a collection of people who are formally united and agreed to fulfill the same goals. The organization effectiveness using the competing values approach is divided into 4 quadrants. To fulfill goals the organization needs strategy. The merger strategy used to grow the organization externally. Strategies affecting the structure. The methods of this paper using literature review (secondary data). This paper describes the structure (complexity, formalization and centralization) of the new organization (merger) based on the competing values approach which in the entrepreneurial stage (first stage of the organization life cycle). The conclusion will be the basic hypotheses to be deeply investigated in the next research of contextual organization empirical study. © 2014 IEEE.

Wirayuda T.A.B.,Telkom University
Proceedings - 5th International Conference on Electrical Engineering and Informatics: Bridging the Knowledge between Academic, Industry, and Community, ICEEI 2015 | Year: 2015

Palm vein recognition is one of the biometric systems that recently explored. The location of palm-vein that inside the human body, give a special characteristic compare with other biometric modal. It expected to be robust, difficult to be duplicated, and are not affected by dryness and roughness of skin. Therefore palm vein has high security and needs to be studied more. In this paper we develop a recognition system consists of several processes; they are ROI detection using peak-valley detection and first CHVD rules, pre-processing using maximum curvature, feature extraction based-on minutiae, and feature matching using based-on weighted Euclidean score. The experimental result yielded a best success rate of 91.00% in term of accuracy with configuration of the system using adaptive histogram equalization, full minutiae feature and the group-voting matching (the threshold for point matching set at 0.10). In term of biometric performance we achieve Equal Error Rate at 9.94% with threshold 0.50380. Both of best performance achieve with only 42 average number of minutiae feature. © 2015 IEEE.

Ciptasari R.W.,Telkom University
Proceedings of SPIE - The International Society for Optical Engineering | Year: 2016

A common form of manipulation is to combine parts of the image fragment into another different image either to remove or blend the objects. Inspired by this situation, we propose a single authentication technique for detecting traces of weighted average splining technique. In this paper, we assume that image composite could be created by joining two images so that the edge between them is imperceptible. The weighted average technique is constructed from overlapped images so that it is possible to compute the gray level value of points within a transition zone. This approach works on the assumption that although splining process leaves the transition zone smoothly. They may, nevertheless, alter the underlying statistics of an image. In other words, it introduces specific correlation into the image. The proposed idea dealing with identifying these correlations is to generate an original model of both weighting function, left and right functions, as references to their synthetic models. The overall process of the authentication is divided into two main stages, which are pixel predictive coding and weighting function estimation. In the former stage, the set of intensity pairs {Il,Ir} is computed by exploiting pixel extrapolation technique. The least-squares estimation method is then employed to yield the weighted coefficients. We show the efficacy of the proposed scheme on revealing the splining artifacts. We believe that this is the first work that exposes the image splining artifact as evidence of digital tampering. © 2016 SPIE.

Jadied E.M.,Telkom University
2015 3rd International Conference on Information and Communication Technology, ICoICT 2015 | Year: 2015

One problem in biometric fingerprint technology is template protection. Template is an individual's digital reference extracted from biometric sample. The objective of template protection is to protect user biometric information. Basis idea of template protection is if an attacker able to get the template then the attacker will not be able to reverse template to obtain biometric information. Template protection also offer revocability for users. This research use modified Key Binding scheme and Random Triangle scheme to protect biometric template. The main advantage of our proposed design is alignment free. Performance of our Key Binding scheme is still very poor (EER = 30%). Nearest Neighbors Structure used for local matching in our Key Binding scheme still cannot replace alignment process. ECC and Hash module give a significant contribution to higher EER. Random Triangle Hashing (RTH) is successfully implemented with EER = 0.96%. This performance is better than the winner of FVC2004 (EER = 1.97%). We modified RTH in the transformation module (NNS) and evaluation score (Hamming distance). © 2015 IEEE.

Nurjanah D.,Telkom University
CSEDU 2016 - Proceedings of the 8th International Conference on Computer Supported Education | Year: 2016

Classic challenges in adaptive learning systems are about performing adaptive navigation that recommends a topic or concept to be learned next and learning materials relevant to the topic. Both recommendations have to meet active learners' needs. As adaptive navigation problems have been solved using artificial intelligence techniques, learning material recommendation problems can be solved using recommender techniques that have been successfully applied to other problems. Until recently there have been a number of techniques that come with certain advantages and disadvantages. This paper proposes a new technique for recommending learning materials that combine content-based filtering and collaborative filtering based on the similarity between learners and learners' competence. It aims to diminish the drawback of classic collaborative filtering, which is based on the similarities between learners and does not consider learners' competence. It also diminishes problems arising from collaborative filtering based on good learners' competence, which potentially produces recommended objects that do not meet the learners' condition. The results of a recent experiment show that the proposed technique performs well, as indicated by the MAE score of 0.96 for a rating scale of 1 to 10. Copyright © 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.

Maharani W.,Telkom University | Gozali A.A.,Telkom University
Procedia Computer Science | Year: 2015

Social Network Analysis (SNA) has been applied in several case studies. SNA is applied to enhance the company's marketing strategy as well as small and medium businesses. This research proposes a collaborative model using content-based and user-based approach, with the centrality measurement methods. Content-based approach tends to focus on tweet content analysis of the existing nodes in a network, while the user-based approach focuses on the connections between users in the network twitter. The model will combine the advantages of collaborative content-based and user-based approach, to find the most influential people in a twitter network to make the dissemination of information more effectively and efficiently. © 2015 The Authors. Published by Elsevier B.V.

Gunawan P.H.,Telkom University
2016 4th International Conference on Information and Communication Technology, ICoICT 2016 | Year: 2016

This paper is devoted to study the parallel programming for scientific computing on the one-dimensional heat diffusion problem. The mathematical problem of the heat equation is defined in continuous and discrete form. The continuous form of heat equation is discretized and approached using explicit finite difference. This approach is a straightforward numerical scheme and easy to implement into parallel programming. In this paper, OpenMP platform is used as the shared memory parallel programming architecture. Some numerical simulations of one-dimensional heat diffusion problem are given. Two numerical examples with different initial conditions, smooth and discontinue, are presented in order to show that this parallel algorithm is well implemented. Both speedup and efficiency from each numerical examples are shown satisfied. By using 4 processors in the experiment with a smooth initial condition, the speedup and efficiency are shown quantitatively, 2 and 50%, as the number of grids increases up to 2000 points. © 2016 IEEE.

Wijaya D.R.,Telkom University
Journal of Theoretical and Applied Information Technology | Year: 2014

Since a few years ago Indonesian government began to perform the application of the concept of the internet of things (IoT). Application of the IoT by the Indonesian government aims to provide ease in identification of people or objects and their attributes so it can be used as reference data in their policy or implement some rules. Some programs have been implemented such as e-KTP (e-ID Card) program, subsidized fuel control system using Radio Frequency Identification (RFID) technology, and electronic ticketing system for electric railways. Start from 2011, Indonesia Government has been implementing RFID technology for e-Identification. This program is called e-KTP which aims to realize single ID and establish complete and accurate demographic database. Indonesian e-KTP card store demographic data consisting of biographical data, signature, photograph, biometrics, and other data related to aspects of data security and card management. e-KTP refers to the standard ISO/IEC 14443A/B that works at a frequency 13,56 MHz. However, utilization of the e-KTP card is still not optimal because its utilization is not much different from the conventional ID card. This study will be discussed regarding the design and implementation of e-KTP middleware. This middleware architecture can be adopted by government or private agencies to improve their services by conduct the data collecting of customer transactions by linking the e-KTP card with the enterprise database with the specific rules. Thus the Indonesian people have truly single ID that can be used for many purposes such as for health care system, attendance management system, electronic payment system, and so on. © 2005 - 2014 JATIT & LLS. All rights reserved.

Nugroho H.,Telkom University
Journal of Theoretical and Applied Information Technology | Year: 2014

Effective governance in an organization does not happen by coincidence. The success of implementing effective governance in an organization associated with the right pattern or fit for the organization so that they can be a complement or supplement of organization's strategic focus. Information technology (IT) governance is not a static concept but rather processes inherent in the organization. Decentralized organizations such as a university need a regular review to renew the IT governance structure to take account of changing business and technological environment. However, the mechanism IT governance in an organization will depend on the characteristics and needs of the organization. ISO/IEC 38500 help the people at the highest levels in the organization to understand and fulfill their legal obligations, regulations and ethics in relation to the use of IT in their organizations by providing key principles. COBIT 5 framework provides guidance how IT governance should be built by taking into account the area of enterprise governance and management of governance areas that both have their roles within the scope of IT governance. Conceptual model of IT governance is built based on the main principles that should exist in the process of governance with COBIT 5 framework guide as a reference how the governance of IT must be organized with attention to area governance and management areas, each rendered in a particular domain so that it will be a guide for higher education for developing IT blueprint that not only seen as supporting the IT aspects of academic and non-academic activities but look at the overall aspects of the scope of university governance. © 2005 - 2014 JATIT & LLS. All rights reserved.

Loading Telkom University collaborators
Loading Telkom University collaborators