Claim Missing Document
Check
Articles

Found 9 Documents
Search

A Sense-based Registration Process for TDMA in IEEE 802.11 Network Rizal Fathoni Aji; Heru Suhartanto; Setiadi Yazid
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 1: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (368.744 KB) | DOI: 10.11591/ijece.v8i1.pp355-359

Abstract

TDMA implementation offer better fairness and throughput in IEEE 802.11. To implement TDMA, new registration process is needed, because current registration mechanism can disrupt TDMA process. This paper proposes a sense-based TDMA registration process using service slot and random timer. Simulation result shows, by using our mechanism, we can reduce the number of unused timeslot, and for 10 new nodes, each node only need 7 ms to complete the registration process.
Measurement of information technology governance capability level: a case study of PT Bank BBS Punto Widharto; Zaldy Suhatman; Rizal Fathoni Aji
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 20, No 2: April 2022
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v20i2.21668

Abstract

The very close involvement of technology in the banking industry makes almost all banking activities and products currently dependent on information technology (IT). PT BPRS Bhakti Sumekar (PT BBS Bank) is one of the banks that realizes the importance of IT in the digital era and has included IT as part of the company's strategic plan. The company states that compliance with regulations, best practices, and standards is key to a successful IT implementation. In this study, the measurement of the capability level of corporate IT governance was conducted to determine what IT priorities were based on the company's strategic objectives and what recommendations could be given based on best practices to improve IT services in support of the company's strategic goals. The framework to be used is control objective for information and related technology (COBIT); the most widely used framework suitable for service-oriented organizations. The results of research using COBIT 2019 show how IT governance is needed by the company and what should be prioritized. The measurement results found that there is still a gap between management's expectations and the current level of capability and provide recommendations on what companies need to improve performance in order to meet expectations.
Perbandingan Performa Kinerja Node.js, PHP, dan Python dalam Aplikasi REST Anugerah Christian Rompis; Rizal Fathoni Aji
CogITo Smart Journal Vol 4, No 1 (2018): CogITo Smart Journal
Publisher : Fakultas Ilmu Komputer, Universitas Klabat

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (588.775 KB) | DOI: 10.31154/cogito.v4i1.92.171-187

Abstract

Dengan berkembangnya jumlah aplikasi yang terhubung ke Internet, baik desktop maupun mobile, kebutuhan akan aplikasi server yang mampu menyediakan performa yang baik semakin meningkat. Salah satu cara mengoptimalkan performa server adalah dengan memakai bahasa pemrograman yang tepat. Dalam penelitian ini, tiga bahasa pemrograman yang terkait erat dengan web yakni Node.js, PHP, dan Python dibandingkan performanya dengan cara mengukur kecepatan respon serta konsumsi sumber daya komputasi. Dari penelitian ini didapati bahwa Node.js memiliki durasi respon yang paling cepat, sedangkan PHP adalah bahasa pemrograman yang memiliki performa umum yang paling baik.
Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover Aldiansah Prayogi; Rizal Fathoni Aji
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 7 No 4 (2023): August 2023
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v7i4.5025

Abstract

The Covid-19 pandemic has kept almost everyone at home and forced them to perform online activities using their mobile gadgets. Penetration of the Internet and mobile use is increased as lockdowns or restrictions on meeting face to face are getting used to. This has become a new market for cyber criminals to carry out their actions, such as spreading Social Engineering, sending Phishing, doing Account Takeover, and ending in theft of money in Financial Mobile Applications. Application protection with OTP SMS and Magic Link SMS still has vulnerabilities, with several examples of cases that have occurred. For this reason, this problem was raised to find a solution using the Mobile Network Infrastructure. The method used is to compare the congruence between the phone numbers registered in the application and the phone numbers used. Every time a user signs in or signs up, the Financial Mobile Application will perform Mobile Network Verification to cellular operators via API. Verification is carried out by utilizing the header enrichment in the background of the application process that was installed on the user's smartphone or tablet to the Mobile Network Verification Server. The Financial Mobile Applications can then determine whether the user is using a valid or invalid telephone number. Therefore, the target account cannot be taken over because the cyber criminal's mobile device does not have the phone number attached to the victim’s mobile device. This proof is carried out with four test case scenarios with the sign-up and sign-in processes on the same phone number and different phone numbers between devices and applications. It is hoped that this kind of protection model can reduce losses experienced by users of Financial Mobile Applications due to Account Takeover.
Design of GeoAi-Based Control Tower Dashboard Application Infrastructure at PT. XYZ Maulana Bobby Rakhman Siregar; Rizal Fathoni Aji
Sistemasi: Jurnal Sistem Informasi Vol 13, No 1 (2024): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v13i1.3466

Abstract

The increasing demand for technology and data necessitates the enhancement of infrastructure for the Control Tower Dashboard Geographic Information System (CTD GIS) application at PT XYZ. The current system operates within a Virtual Private Server (VPS) Cloud environment but faces challenges such as data loading delays and increasing demands for broader functionalities. To address these issues, a comprehensive future infrastructure recommendation is outlined, including upgrading ArcGIS Server, integrating with Portal for ArcGIS, implementing ArcGIS Datastore, utilizing NAS Storage, and incorporating Script & VGA Server. Through the proposed infrastructure changes, the CTD GIS application is poised to navigate the dynamics of data growth, providing geospatial insights to support better decision-making processes at PT XYZ.
Application of Blockchain for Tracking Government Funds: Case Studies on Distribution of Regional Transfer Funds Lutfi Hakim; Rizal Fathoni Aji
Sistemasi: Jurnal Sistem Informasi Vol 13, No 1 (2024): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v13i1.3481

Abstract

Tracking of Regional Transfer Funds from the Central Government to Regional Governments cannot be carried out optimally which causes the potential for fraud. The tracking in question is related to how long the funds have been sitting in the regional bank before being distributed, when should the funds be distributed, and whether the funds have been used to pay for a predetermined project. This research is a qualitative research through literature studies, observations and interviews which aims to analyze whether blockchain can be the right solution for the problem of tracking regional transfer funds. Based on an analysis using the Enterprise Blockchain Design Framework (EDBF), blockchain can be an alternative solution to this problem, especially if it is built with the characteristics of a Private/Consortium Permitted Blockchain using Hyperledger Fabric. There are five participants in the proposed design starting from government agencies and banking. The results of this design were verified by system developers at the Ministry of Finance, the results of this technology have the potential to be applied and overcome the problem of tracking regional transfer funds.
An Evaluation of DevOps Practices to Prevent Fraud: A Case Study of PT XYZ Adi Hartanto; Rizal Fathoni Aji
The Indonesian Journal of Computer Science Vol. 12 No. 6 (2023): Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v12i6.3600

Abstract

Fraudulent transactions caused mainly by high level bugs in PT XYZ’s production environment have caused significant financial losses for the company. Such issues were attributed to subpar DevOps practices in PT XYZ. Based on the given problem, this research evaluates DevOps practices in PT XYZ based on Bucena’s maturity model and proposes recommendations for improvement. This study collects data using interviews with four key figures in PT XYZ’s software development team and processed using the thematic analysis method in conjunction with magnitude coding. The results showed that PT XYZ’s primary weaknesses in implementing DevOps practices fall mostly within Technology and Process domains. From these findings, a roadmap is designed for a timeframe of 12 months, which consists of 9 primary objectives to fulfill to increase overall DevOps maturity level at PT XYZ up to the Defined level.
Evaluasi Evaluasi Implementasi Scrum dengan SMM dan AMM: Studi Kasus Perusahaan Telekomunikasi PT XYZ: Lintang Wisesa Atissalam; Rizal Fathoni Aji
The Indonesian Journal of Computer Science Vol. 13 No. 3 (2024): Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i3.3962

Abstract

PT XYZ is a telco company with more than 34.3 million users in Indonesia. PT XYZ adopted the Scrum framework in 3 projects of MyXYZ application development. The percentage of completion of each project in each sprint during the last year didn't reach 100%. This indicates there are problems in each sprint that could be slow down the release time of the newest feature and waste higher revenue potential. The Scrum Maturity Model is used to measure the maturity level of Scrum implementation. Data collection was carried out using the Scrum Assessment Questionnaire which consists of 70 questions. The questionnaires were given to 1 Scrum Master, 2 Product Owners and 4 Development Team members from each project. The data was then analyzed using the Agile Maturity Model key process area rating. As a result, Scrum implementation at PT XYZ is at level 3. Standardization and disciplined implementation of Scrum retrospectives are needed to be able to raise the maturity level to the next level.
Audit Keamanan Informasi Pemasok Pada Perusahaan Penyelenggara Sistem Pembayaran XYZ Farroh Sakinah Mulyadi; Rizal Fathoni Aji
The Indonesian Journal of Computer Science Vol. 13 No. 4 (2024): Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i4.4167

Abstract

The relationship between companies and suppliers is one of the manifestations of the company's resource strategy to remain productive and competitive. However, suppliers also create information security risks, such as cybersecurity threats and data protection. To ensure the security of the company's information assets, PT XYZ implements an information security management system based on ISO / IEC 27001: 2022 for all company information assets, both managed by internal and external parties (suppliers). Therefore, this research aims to measure suppliers' criticality level with an information technology asset risk management approach. The company will evaluate the critical suppliers's information security control implementation through systematic monitoring processes such as audits and due diligence. The results of this study indicate that two suppliers at PT XYZ with a high level of criticality need to be audited, and three suppliers with a medium level of criticality need to conduct due diligence.