Claim Missing Document
Check
Articles

Found 16 Documents
Search

Android Based Thesis Mentoring System Using Google Firebase Engel, Mychael Maoeretz
ComTech: Computer, Mathematics and Engineering Applications Vol 9, No 2 (2018): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v9i2.4992

Abstract

This research aimed to build a platform to carry out the thesis mentoring process which was periodic, real-time, systemized, and well-integrated in Ciputra University in Surabaya. The researcher used Google Firebase technology provided by Google and built it on an Android-based platform. The method used was the Systems Development Life Cycle (SDLC) model. It was divided into six stages of the process: requirement analysis, system design, implementation, system testing, system deployment, and system maintenance. Data collection methods used were observation and interviews conducted to the final project coordinator in the study program. The results show that system has six main features including progress overview of thesis, chat room, guidance schedule, guidance book, important date, and announcement. Moreover, the thesis mentoring system is easy to use and consists of easyto-understand menus. After going through the process of analysis, this system is very helpful in scheduling guidance, monitoring the progress of student thesis work, and managing announcement and important date.
DETECTION OF CYBER MALWARE ATTACK BASED ON NETWORK TRAFFIC FEATURES USING NEURAL NETWORK Engel, Ventje Jeremias Lewi; Joshua, Evan; Engel, Mychael Maoeretz
Khazanah Informatika Vol. 6 No. 1 April 2020
Publisher : Universitas Muhammadiyah Surakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v6i1.8869

Abstract

Various techniques have been developed to detect cyber malware attacks, such as behavior based method which utilizes the analysis of permissions and system calls made by a process. However, this technique cannot handle the types of malware that continue to evolve. Therefore, an analysis of other suspicious activities ? namely network traffic or network traffic ? need to be conducted. Network traffic acts as a medium for sending information used by malware developers to communicate with malware infecting a victim's device. Malware analyzed in this study is divided into 3 classes, namely adware, general malware, and benign. The malware classification implements 79 features extracted from network traffic flow and an analysis of these features using a Neural Network that matches the characteristics of a time-series feature. The total flow of network traffic used is 442,240 data. The results showed that 15 main features selected based on literature studies resulted in F-measure 0.6404 with hidden neurons 12, learning rate 0.1, and epoch 300. As a comparison, the researchers chose 12 features based on the nature of the malware possessed, with the F-measure score of 0.666 with hidden neurons 12, learning rate 0.05, and epoch 300. This study found the importance of data normalization technique to ensure that no feature was far more dominant than other features. It was concluded that the analysis of network traffic features using Neural Network can be used to detect cyber malware attacks and more features does not imply better detection performance, but real-time malware detection is required for network traffic on IoT devices and smartphones.
WORKSHOP MEMBUAT WEBSITE BERBASIS PLATFORM WORDPRESS.COM Dinata, Yuwono Marta; Lestari, Caecilia Citra; Wonohadidjojo, Daniel Martomanggolo; Tjahjono, Laura Mahendratta; Engel, Mychael Maoeretz
Jurnal LeECOM (Leverage, Engagement, Empowerment of Community) Vol 2 No 2 (2020): Jurnal LeECOM
Publisher : Universitas Ciputra Surabaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37715/leecom.v2i2.1590

Abstract

Pelatihan workshop yang dilakukan oleh Fakultas Teknologi Informasi Program Studi Informatika Universitas Ciputra bertujuan untuk memperluas wawasan para fasilitator Yayasan Kaki Dian Emas (YKDE) dalam literasi digital. YKDE dipilih berdasarkan dari interview melalui WhatsApp messenger maupun menelpon langsung. Hal karena pelatihan ini dilakukan pada masa pandemic Covid-19. Pelatihan ini diperuntukkan untuk fasilitator YKDE yang tersebar di seluruh Indonesia. Kebutuhan media untuk berbagai cerita atau pengalaman menjadi hal yang penting. Melalui kegiatan ini, para fasilitator menjadi lebih terbuka wawasannya untuk menggunakan media website online. Setelah mengikuti kegiatan tersebut, mereka bisa langsung menerapkan dan membuat website untuk kepentingan berbagai informasi sehingga fasilitator di seluruh Indonesia bisa saling berbagi informasi secara real time.
Hybrid distributed application in banking transaction using remote method invocation Agus Cahyo Nugroho; Mychael Maoeretz Engel
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 5: October 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i5.8222

Abstract

Today banks have many branches in big cities of the world. System usually used  a central database in a particular city. Increased of database server performance due to number of users accessing this application should not degrade performance of application. To keep  database server performance optimally, application must distributed to the network. In distributed applications it takes a remote method call, that is why we are going to used Remote Method Invocation to develop this system. Based on results of analysis conducted, author can draw following conclusion of the application, which is once the client get a reference from the remote object then method of remote object is called like calling method from local object and methods that we have defined and implemented on remote object can we call or use both on desktop and web applications so we do not need to work twice. This approach makes more effective and efficient in application development, allows for better optimization, eliminates the need for processing of type information at run time and makes a light weight communication protocol possible. We have built a hybrid application, which supports both compile time and run time generation of marshallers in desktop and web application.
Cloud-computing based data integration for non-profit organization: web design and implementation Yuwono Marta Dinata; Mychael Maoeretz Engel; Tony Antonio
International Journal of Computer and Information System (IJCIS) Vol 2, No 4 (2021): IJCIS : Vol 2 - Issue 4 - 2021
Publisher : Institut Teknologi Bisnis AAS Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29040/ijcis.v2i4.46

Abstract

Data is a very important part of our lives nowadays, but it requires a neat and systematic acquisition. This good and systematics data acquisition also required by non-profit institutions. Non-profit institutions in Indonesia are found within various fields, including health, arts, natural environment, agriculture, etc. One of the most needed data recording is the Indonesian Red Cross (PMI). PMI is engaged in the humanitarian field and has branches throughout Indonesia, including the districts. Donor data logging is one of the problems faced by PMI. Each time a donor does a blood donation, they need to rewrite their personal data on a piece of paper. This data will then be recapitulated into a computer which sometimes takes time and is not being inputted in real time. This system requires a change that makes data able to be inputted in real time and be stored properly and neatly. The data can then be stored in the cloud as well and be accessed in real time. For non-profit organizations such as PMI, this allows inputting and data processing to become more efficient and flexible. In this study, the System Development Life Cycle (SDLC) method was used, while the website uses the CodeIgniter (CI) framework. In this research, a website application is produced with features that are in accordance with the expected needs.
Development of Cloud-Based Co-Parenting Strengthening System Mychael Maoeretz Engel; Jenny Lukito Setiawan; Lisa Indriati
JUITA : Jurnal Informatika JUITA Vol. 9 No. 2, November 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1951.798 KB) | DOI: 10.30595/juita.v9i2.11127

Abstract

Co-parenting emphasizes how couple manage their relationship in the parenting domains and carry out their role as parents. Based on research conducted by Feinberg and colleagues (2012), there are four overlapping domains of co-parenting: (1) child rearing agreement; (2) support/undermining partner’s parenting; (3) joint family management; and (4) division of labor. The interference of mobile-based technology is needed on the co-parenting relationship between the couple with reference to the four domains of co-parenting. The method used was the Systems Development Life Cycle (SDLC) model. It was divided into six stages of the process: requirement analysis, system design, implementation, system testing, system deployment, and system maintenance. In implementation, the system at an early stage has four main features: (1) child’s activity scheduling and reminder; (2) co-parenting’s education contents; (3) partner’s feedback; and (4) co-parenting’s assessment. The results that are proven by experts, agreed that educational content in the application is very necessary for more knowledge for parents, UI/UX design that is friendly and easy to understand by users, as well as the use of the latest reliable and flexible technology.
Detection of Cyber Malware Attack Based on Network Traffic Features Using Neural Network Ventje Jeremias Lewi Engel; Evan Joshua; Mychael Maoeretz Engel
Khazanah Informatika Vol. 6 No. 1 April 2020
Publisher : Department of Informatics, Universitas Muhammadiyah Surakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v6i1.8869

Abstract

Various techniques have been developed to detect cyber malware attacks, such as behavior based method which utilizes the analysis of permissions and system calls made by a process. However, this technique cannot handle the types of malware that continue to evolve. Therefore, an analysis of other suspicious activities – namely network traffic or network traffic – need to be conducted. Network traffic acts as a medium for sending information used by malware developers to communicate with malware infecting a victim's device. Malware analyzed in this study is divided into 3 classes, namely adware, general malware, and benign. The malware classification implements 79 features extracted from network traffic flow and an analysis of these features using a Neural Network that matches the characteristics of a time-series feature. The total flow of network traffic used is 442,240 data. The results showed that 15 main features selected based on literature studies resulted in F-measure 0.6404 with hidden neurons 12, learning rate 0.1, and epoch 300. As a comparison, the researchers chose 12 features based on the nature of the malware possessed, with the F-measure score of 0.666 with hidden neurons 12, learning rate 0.05, and epoch 300. This study found the importance of data normalization technique to ensure that no feature was far more dominant than other features. It was concluded that the analysis of network traffic features using Neural Network can be used to detect cyber malware attacks and more features does not imply better detection performance, but real-time malware detection is required for network traffic on IoT devices and smartphones.
Android Based Thesis Mentoring System Using Google Firebase Mychael Maoeretz Engel
ComTech: Computer, Mathematics and Engineering Applications Vol. 9 No. 2 (2018): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v9i2.4992

Abstract

This research aimed to build a platform to carry out the thesis mentoring process which was periodic, real-time, systemized, and well-integrated in Ciputra University in Surabaya. The researcher used Google Firebase technology provided by Google and built it on an Android-based platform. The method used was the Systems Development Life Cycle (SDLC) model. It was divided into six stages of the process: requirement analysis, system design, implementation, system testing, system deployment, and system maintenance. Data collection methods used were observation and interviews conducted to the final project coordinator in the study program. The results show that system has six main features including progress overview of thesis, chat room, guidance schedule, guidance book, important date, and announcement. Moreover, the thesis mentoring system is easy to use and consists of easyto-understand menus. After going through the process of analysis, this system is very helpful in scheduling guidance, monitoring the progress of student thesis work, and managing announcement and important date.
LIBRARY SELF SERVICE SYSTEM USING NFC AND 2FA GOOGLE AUTHENTICATOR Mychael Maoeretz Engel; Henry David Lie
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 3 (2022): JUTIF Volume 3, Number 3, June 2022
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jutif.2022.3.3.345

Abstract

The implementation of a self-service system is already used by many libraries, mainly on self-loan books. Self-service generally only uses RFID as a medium for identifying members and borrowed books, but using RFID alone as the head of the identification process may lead to many crimes such as using someone else's member card to borrow books, scam, and so on. This study aims to propose a new business process for self loan books from the library by combining NFC or RFID technology and 2FA (two-factor authentication) to minimize the crimes such as fraudulence, scams, and so on. The results showed that the system or prototype could work and function properly. The process of reading NFC tags and the use of 2F also runs quickly and safely.
Understanding the Issues of Coparenting in Indonesia Jenny Lukito Setiawan; Jessica Christina Widhigdo; Amanda Teonata; Lisa Indriati; Mychael Maoeretz Engel
Journal of Educational, Health and Community Psychology Vol 11 No 3 September 2022
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/jehcp.v11i3.24574

Abstract

Family plays an important role in children’s growth and development. The mechanism of co-parenting is empirically proven to have an impact in marital relationship and child development. However, the number of empirical studies on co-parenting in Indonesia is still very limited. The purpose of this study is to examine the issue of co-parenting among parents in Indonesia and to understand ways to develop effective co-parenting. This study uses a qualitative method approach. The data collection method used in this study is focused group discussion to 30 participants, including 15 fathers and 15 mothers. The study found that imbalances in the division of roles between partners and the difficulties in finding agreements are the biggest challenges for fathers and mothers. This study also found that there are four factors to implement an effective co-parenting, which are discussion, agreement in task division, giving appreciation, and good parenting references.