Bandung, Indonesia
Bandung, Indonesia
SEARCH FILTERS
Time filter
Source Type

News Article | May 12, 2017
Site: en.prnasia.com

JAKARTA, Indonesia, May 12, 2017 /PRNewswire/ -- Xirka Silicon Technology today unveiled the launch of Chipset SCard XCT136, the first local Indonesian smart card, providing multi-function purposes for student identity cards. To track student attendance, it works by using computerized fingerprint scanners to ensure a secure environment. It also offers a cashless transaction option, so all transactions related to university activities can be done by swiping the card. Supported by Indonesian Ministry of Research, Technology, and Higher Education together with Indonesian Ministry of Communication and Informatics, the chipset currently targets educational institutions, such as University of Indonesia, Bandung Institute of Technology, Hasanuddin University, and Telkom University, and is widely applied to electronic student identity cards. "The digital economy has a tremendous potential in advancing the Indonesian economy. This sector will contribute up to 11% of economic development in 2020. If accomplished, in 2030 Indonesia will occupy the 8th position in the world economy. Therefore, it needs greater innovation to face global competitiveness and this chipset development is the answer," said Rudiantara, Minister of Communication and Information Technology of the Republic of Indonesia at the launch ceremony of Chipset SCard XCT 136 on May 12th 2017. Through Industrial Technology Development Program and Technology Innovation Program, Ministry of Research, Technology, and Higher Education of the Republic of Indonesia initiated the product development, involving students from state universities in Indonesia. By participating in the development process, the students are given the opportunity to showcase their ability to create and innovate, among their peers. According to research from MARS Indonesia, in 2016, state universities in Indonesia had a total of 507,000 new students. "Therefore, to answer market needs, Xirka Silicon Technology will provide up to 1 million units of Chipset SCard XCT136 per year for those universities," said Sylvia W. Sumarlin, President Director of PT Xirka Silicon Technology. Research and production of each component of the chipset are carried out domestically in Bandung, West Java, ensuring security against data breaches and fraud from cybercriminals. The exclusive production of chipset components in Indonesia has been successful so far in preventing other countries from gaining access or gathering information about the design and architecture of these detailed components. "It ensures data confidentiality, since no other regions will have any access to its design without Xirka's permission," added Sylvia. Xirka Silicon Technology started producing chipsets in 2007 and entered into the wider APAC regional market by partnering with Siltera-Malaysia, Singapore, Taiwan, and Japan. They won the first prize at Asia Pacific ICT Alliance Award 2008 (APICTA) for the development of WiMAX baseband chipset. In 2016, Xirka Silicon Technology completed development of its local smart card protocol, which includes Key Management System, Card Management System, and Smart Card Operating System allowing for support of multi-application features. According to Sylvia, the chipset provides several blocks of data storage memory. "Each offers different functions, such as application ID, payment, and loyalty card. Early next year, Xirka plans to launch Near-Field Communication (NFC) chipsets, which is commonly used for electronic ticket and mobile payment." Together, Xirka Silicon Technology and Microelectronics Center Bandung Institute of Technology worked to optimize security and data storage by strengthening technologies in all support systems, including card reader portable, virtual Secure Access Module (SAM), secure network, and card database. In security optimization, Chipset SCard XCT136 utilizes security engine DES and 3DES, adding 136 Kbyte to the chipsets to support more extensive data saving. Xirka Silicon Technology is a fabless company that focuses on the development of WiMAX baseband chipsets.  Established in May, 2007, it delivers a System-on-Chip (SoC) for Broadband Wireless Access (BWA) to fulfill businesses needs, supporting everybody's dynamic lifestyle which very often requires immediate attention and action. To provide assurance, our SoC uses IEEE 802.16d-2004 standard for nomadic WiMAX and IEEE 802.16e-2005 for mobile WiMAX. Continuing its commitment as a design company, since 2011 Xirka has developed SIM cards and proceeded with smart card products and derivatives such as access cards, ID cards and secured cards for banking by utilizing Near Field Communication (NFC) and RFID technologies. A lot of IT equipment will benefit from Xirka's chipset, such as, modem cards, computers, notebooks, mobile gadgets, CPE modems, etc. Xirka also recognizes the need of our clients to have a reliable chipset at an affordable price, therefore we have built our research and design center and developed products with clients' concerns on our mind.


This paper presents a performance of Neural Network Autoregressive with Exogenous Input (NNARX) model structure and evaluates the training data that provides robust model on fresh data set, using neural network type of back-propagation known as multilayer perceptron (MPP). The plant under test is a heat exchanger process control training system called QAD Model BDT 921. A real input-output data has been collected and will be used to identify the plant. The model was estimated by prediction error method with Levenberg-Marquardt algorithm for training neural networks. It is expected that the training data covering the full operating condition will be the optimum training data. The model was validated by residual analysis and model fit. It will be presented and concluded. The simulation results show that the identification is able to identify plant's good model. This identification can be used to design the plant controller and improve its performance. © 2017 Author(s).


Kusuma P.D.,Telkom University
Journal of Theoretical and Applied Information Technology | Year: 2017

Batik is one of famous cultural heritage in Indonesia. One effort to preserve batik is by exploring new patterns. One of popular pattern is floral pattern. In this research, fibrous root model is proposed and is combined with the traditional batik pattern. This model is developed by combining root growth model based on L-system and random walk. In this research, the fibrous root model has been implemented into computer based batik pattern generation with some alternatives: single direction, random direction, and radial direction. Based on the test, split ratio has positive correlation with the average number of segments. Die ratio has negative correlation with the number of segments. The maximum deviation angle makes the root growth wider. The number of seeds and the number of iterations have positive correlation with the number of segments. The increasing of the number of seeds makes the complexity grows linearly. The increasing of the number of iterations makes the complexity grows logarithmically. © 2005 – ongoing JATIT & LLS.


Kusuma P.D.,Telkom University
Journal of Theoretical and Applied Information Technology | Year: 2017

There are many traditional decorative patterns in Indonesia. Some of them are regular pattern. The advantage of regular one is its simplicity and easiness to be built by iterative algorithm. The disadvantage is it is monotonous. So, stochastic method can be implemented into regular pattern to add uncertainty. In this paper, the uncertainty was added by implementing combination of deterministic and stochastic approach into the regular pattern. The deterministic part is represented by modified interaction forces method. The stochastic part is represented by random walk method. This model also implemented multi agent approach by using two types of agent: starting point determinant and walker. In this paper, walker still walks until it cannot walk anymore. There are two parameters that are tested, the travelled nodes and the occupied cells ratio. In this research, by using interaction force as movement model, the occupied cell ratio is above 50 percents. © 2005 – ongoing JATIT & LLS.


Anwar K.,Telkom University
2016 International Symposium on Electronics and Smart Devices, ISESD 2016 | Year: 2017

One of the most important solutions for spectrum shortage, expected by 2020, is wireless networks with super density, which is also expected to provide significant economic impacts. This paper proposes decoding scheme with practical analysis for massive number of users in super-dense wireless networks involving two multiway relays (SD-MWMR). The practicality is viewed from the point of finite-length analysis, where the frame length is set very short to guarantee low latency networks, e.g., below 1 milisecond as suggested by 5G requirement. Due to the nature of finite block length, the probability of appearing stopping sets is high. This paper derives the probability of stopping sets (with regular and irregular degree distributions) in SD-MWMR to predict the theoretical performances. Extrinsic information transfer (EXIT) charts are also used to confirm the decoding behavior of SD-MWMR networks. The results confirm that the theoretical analysis and simulation results match each other indicating that two relays can detect more users or devices and at the same time reduce significantly the error-floor due to less occurrence probability of stopping sets in practice with finite-length setting. © 2016 IEEE.


Jadied E.,Telkom University
Proceedings - APMediaCast 2016 | Year: 2017

Swap file has potentially interesting and rich source of digital evidences. Password, cryptographic key, private data and sensitive data can be found in the swap file. With a simple technique such as string matching, digital evidences can be easily found and identified. There is minimal research on swap file anti-forensics. We found that most of swap file anti-forensics techniques are still vulnerable to live acquisition. So, we propose 2 swap file anti-forensic technique: inject live swap file and fake swap file. Inject live swap file is created by injecting(flooding) fake data to live swap file using a custom script. Fake swap is created by manipulate swap file header then filling swap file with fake artefacts of our choosing. We perform this technique before user begins his/her usual activities. We able to implement Inject live swap file technique but with disadvantage of private and sensitive data leak. Making fake swap file is relatively easy and without data leak. Although these two approaches do not solve the problem of live acquisition, it could confuse, mislead and wasting examiner's time. © 2016 IEEE.


Tarwidi D.,Telkom University
AIP Conference Proceedings | Year: 2016

Cryosurgery is a technique to eradicate abnormal biological tissues by freezing. The objective of cryosurgery is to maximize cryoinjury of tumor tissues while at the same time minimizing cryoinjury to the surrounding healthy tissues. The location and number of cryoprobes are important factors to obtain optimal cryosurgery in complex-shaped tumors. This paper presents multiprobe cryosurgery simulation with optimal cryoprobes location in target region. Bubble packing method is used to obtain optimal cryoprobes layout. We consider mathematical model of freezing by bioheat transfer equation in solid (frozen tissue), liquid (unfrozen tissue), and mushy region. This model is referred to as Stefan problem where the location of moving solid-mushy or mushy-liquid interface is not known and it is as part of the solution. We reformulate the bioheat equations into single enthalpy (energy) equation which can resolve the moving boundary between two phases. The first-order of Godunov method is adopted to obtain numerical solution of the phase change problem. This method is easily applied since we only solve one governing equation regardless the moving interface between two phases. For demonstration purposes, multiprobe cryosurgery for lung cancer case with complex geometry is simulated and interpreted. The numerical simulation for three to ten cryoprobes configuration shows that the nine cryoprobes layout has the smallest total defect in this case. The numerical results provide an important information for cryosurgeon before conducting effective cryosurgery protocol. © 2016 AIP Publishing LLC.


Ciptasari R.W.,Telkom University
Proceedings of SPIE - The International Society for Optical Engineering | Year: 2016

A common form of manipulation is to combine parts of the image fragment into another different image either to remove or blend the objects. Inspired by this situation, we propose a single authentication technique for detecting traces of weighted average splining technique. In this paper, we assume that image composite could be created by joining two images so that the edge between them is imperceptible. The weighted average technique is constructed from overlapped images so that it is possible to compute the gray level value of points within a transition zone. This approach works on the assumption that although splining process leaves the transition zone smoothly. They may, nevertheless, alter the underlying statistics of an image. In other words, it introduces specific correlation into the image. The proposed idea dealing with identifying these correlations is to generate an original model of both weighting function, left and right functions, as references to their synthetic models. The overall process of the authentication is divided into two main stages, which are pixel predictive coding and weighting function estimation. In the former stage, the set of intensity pairs {Il,Ir} is computed by exploiting pixel extrapolation technique. The least-squares estimation method is then employed to yield the weighted coefficients. We show the efficacy of the proposed scheme on revealing the splining artifacts. We believe that this is the first work that exposes the image splining artifact as evidence of digital tampering. © 2016 SPIE.


Wijaya D.R.,Telkom University
Journal of Theoretical and Applied Information Technology | Year: 2014

Since a few years ago Indonesian government began to perform the application of the concept of the internet of things (IoT). Application of the IoT by the Indonesian government aims to provide ease in identification of people or objects and their attributes so it can be used as reference data in their policy or implement some rules. Some programs have been implemented such as e-KTP (e-ID Card) program, subsidized fuel control system using Radio Frequency Identification (RFID) technology, and electronic ticketing system for electric railways. Start from 2011, Indonesia Government has been implementing RFID technology for e-Identification. This program is called e-KTP which aims to realize single ID and establish complete and accurate demographic database. Indonesian e-KTP card store demographic data consisting of biographical data, signature, photograph, biometrics, and other data related to aspects of data security and card management. e-KTP refers to the standard ISO/IEC 14443A/B that works at a frequency 13,56 MHz. However, utilization of the e-KTP card is still not optimal because its utilization is not much different from the conventional ID card. This study will be discussed regarding the design and implementation of e-KTP middleware. This middleware architecture can be adopted by government or private agencies to improve their services by conduct the data collecting of customer transactions by linking the e-KTP card with the enterprise database with the specific rules. Thus the Indonesian people have truly single ID that can be used for many purposes such as for health care system, attendance management system, electronic payment system, and so on. © 2005 - 2014 JATIT & LLS. All rights reserved.


Nugroho H.,Telkom University
Journal of Theoretical and Applied Information Technology | Year: 2014

Effective governance in an organization does not happen by coincidence. The success of implementing effective governance in an organization associated with the right pattern or fit for the organization so that they can be a complement or supplement of organization's strategic focus. Information technology (IT) governance is not a static concept but rather processes inherent in the organization. Decentralized organizations such as a university need a regular review to renew the IT governance structure to take account of changing business and technological environment. However, the mechanism IT governance in an organization will depend on the characteristics and needs of the organization. ISO/IEC 38500 help the people at the highest levels in the organization to understand and fulfill their legal obligations, regulations and ethics in relation to the use of IT in their organizations by providing key principles. COBIT 5 framework provides guidance how IT governance should be built by taking into account the area of enterprise governance and management of governance areas that both have their roles within the scope of IT governance. Conceptual model of IT governance is built based on the main principles that should exist in the process of governance with COBIT 5 framework guide as a reference how the governance of IT must be organized with attention to area governance and management areas, each rendered in a particular domain so that it will be a guide for higher education for developing IT blueprint that not only seen as supporting the IT aspects of academic and non-academic activities but look at the overall aspects of the scope of university governance. © 2005 - 2014 JATIT & LLS. All rights reserved.

Loading Telkom University collaborators
Loading Telkom University collaborators