Claim Missing Document
Check
Articles

Found 4 Documents
Search

A Sense-based Registration Process for TDMA in IEEE 802.11 Network Rizal Fathoni Aji; Heru Suhartanto; Setiadi Yazid
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (368.744 KB) | DOI: 10.11591/ijece.v8i1.pp355-359

Abstract

TDMA implementation offer better fairness and throughput in IEEE 802.11. To implement TDMA, new registration process is needed, because current registration mechanism can disrupt TDMA process. This paper proposes a sense-based TDMA registration process using service slot and random timer. Simulation result shows, by using our mechanism, we can reduce the number of unused timeslot, and for 10 new nodes, each node only need 7 ms to complete the registration process.
Measurement of information technology governance capability level: a case study of PT Bank BBS Punto Widharto; Zaldy Suhatman; Rizal Fathoni Aji
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 20, No 2: April 2022
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v20i2.21668

Abstract

The very close involvement of technology in the banking industry makes almost all banking activities and products currently dependent on information technology (IT). PT BPRS Bhakti Sumekar (PT BBS Bank) is one of the banks that realizes the importance of IT in the digital era and has included IT as part of the company's strategic plan. The company states that compliance with regulations, best practices, and standards is key to a successful IT implementation. In this study, the measurement of the capability level of corporate IT governance was conducted to determine what IT priorities were based on the company's strategic objectives and what recommendations could be given based on best practices to improve IT services in support of the company's strategic goals. The framework to be used is control objective for information and related technology (COBIT); the most widely used framework suitable for service-oriented organizations. The results of research using COBIT 2019 show how IT governance is needed by the company and what should be prioritized. The measurement results found that there is still a gap between management's expectations and the current level of capability and provide recommendations on what companies need to improve performance in order to meet expectations.
Perbandingan Performa Kinerja Node.js, PHP, dan Python dalam Aplikasi REST Anugerah Christian Rompis; Rizal Fathoni Aji
CogITo Smart Journal Vol 4, No 1 (2018): CogITo Smart Journal
Publisher : Fakultas Ilmu Komputer, Universitas Klabat

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (588.775 KB) | DOI: 10.31154/cogito.v4i1.92.171-187

Abstract

Dengan berkembangnya jumlah aplikasi yang terhubung ke Internet, baik desktop maupun mobile, kebutuhan akan aplikasi server yang mampu menyediakan performa yang baik semakin meningkat. Salah satu cara mengoptimalkan performa server adalah dengan memakai bahasa pemrograman yang tepat. Dalam penelitian ini, tiga bahasa pemrograman yang terkait erat dengan web yakni Node.js, PHP, dan Python dibandingkan performanya dengan cara mengukur kecepatan respon serta konsumsi sumber daya komputasi. Dari penelitian ini didapati bahwa Node.js memiliki durasi respon yang paling cepat, sedangkan PHP adalah bahasa pemrograman yang memiliki performa umum yang paling baik.
Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover Aldiansah Prayogi; Rizal Fathoni Aji
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 7 No 4 (2023): August 2023
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v7i4.5025

Abstract

The Covid-19 pandemic has kept almost everyone at home and forced them to perform online activities using their mobile gadgets. Penetration of the Internet and mobile use is increased as lockdowns or restrictions on meeting face to face are getting used to. This has become a new market for cyber criminals to carry out their actions, such as spreading Social Engineering, sending Phishing, doing Account Takeover, and ending in theft of money in Financial Mobile Applications. Application protection with OTP SMS and Magic Link SMS still has vulnerabilities, with several examples of cases that have occurred. For this reason, this problem was raised to find a solution using the Mobile Network Infrastructure. The method used is to compare the congruence between the phone numbers registered in the application and the phone numbers used. Every time a user signs in or signs up, the Financial Mobile Application will perform Mobile Network Verification to cellular operators via API. Verification is carried out by utilizing the header enrichment in the background of the application process that was installed on the user's smartphone or tablet to the Mobile Network Verification Server. The Financial Mobile Applications can then determine whether the user is using a valid or invalid telephone number. Therefore, the target account cannot be taken over because the cyber criminal's mobile device does not have the phone number attached to the victim’s mobile device. This proof is carried out with four test case scenarios with the sign-up and sign-in processes on the same phone number and different phone numbers between devices and applications. It is hoped that this kind of protection model can reduce losses experienced by users of Financial Mobile Applications due to Account Takeover.