Claim Missing Document
Check
Articles

Found 6 Documents
Search

IT Service Management System Measurement using ISO20000-1 and ISO15504-8: Developing a Solution-Mediated Process Assessment Tool to Enable Transparent and SMS Process Assessment Imam Asrowardi; Septafiansyah Dwi Putra; Eko Subyantoro; Norzaidi Haji Mohd Daud
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 5: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (663.074 KB) | DOI: 10.11591/ijece.v8i5.pp4023-4032

Abstract

Information technology is about not only hardware, software, communication infrastructure and communication infrastructure but also how to manage services. Information technology plays an increasingly important role in developing the structure and functions of public and private sectors. Service measurement plays an important role in IT service management (ITSM) that is one of the subfields of Services Computing science. ITSM is a big part of service science, a science field that combines computer science, operation research engineering, business strategy, management science, and organizational theory. Performance measurement from each of IT services is absolutely needed and is important in the continuous development of ITSM. These research provide good technical knowledge about the measuring ITSM with some requirements. In this paper we suggest the metrics in each service processes enables organizations to predict a direction for active process enhancement and to identify if the goal of process can achieve. This objective process metrics based on ISO/IEC 15504-8 and PRM ISO/IEC 20000-4 refinement. The output of this research, in the form of metrics and tools for any type organizational use.
Revealing AES Encryption Device Key on 328P Microcontrollers with Differential Power Analysis Septafiansyah Dwi Putra; Adang Suwandi Ahmad; Sarwono Sutikno; Yusuf Kurniawan; Arwin Datumaya Wahyudi Sumari
International Journal of Electrical and Computer Engineering (IJECE) Vol 8, No 6: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (838.471 KB) | DOI: 10.11591/ijece.v8i6.pp5144-5152

Abstract

This research demonstrates the revealing of an advanced encryption standard (AES) encryption device key. The encryption device is applied to an ATMEGA328P microcontroller. The said microcontroller is a device commonly used in internet of things (IoT). We measured power consumption when the encryption process is taking place. The message sent to the encryption device is randomly generated, but the key used has a fixed value. The novelty of this research is the creation of a systematic and optimal circuit in carrying the differential power analysis or difference of means (DPA/DoM) technique, so the technique can be applied in key revealing on a microcontroller device by using 500 traces in 120 seconds.
Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3 Septafiansyah Dwi Putra; Mario Yudhiprawira; Sarwono Sutikno; Yusuf Kurniawan; Adang Suwandi Ahmad
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.9384

Abstract

Cryptography is a science of creating a secret message and it is constantly developed. The development consists of attacking and defending the cryptography itself. Power analysis is one of many Side-Channel Analysis (SCA) attack techniques. Power analysis is an attacking technique that uses the information of a cryptographic hardware’s power consumption. Power analysis is carried on by utilizing side-channel information to a vulnerability in a cryptographic algorithm. Power analysis also uses a mathematical model to recover the secret key of the cryptographic device. This research uses design research methodology as a research framework started from research clarification to descriptive study. In this research, power analysis attack is implemented to three symmetrical cryptographic algorithms: DES (Data Encryption Standard), AES (Advanced Encryption Standard), and BC3 (Block Cipher 3). The attack has successfully recovered 100% of AES secret key by using 500 traces and 75% DES secret key by using 320 traces. The research concludes that the power analysis attack using Pearson Correlation Coefficient (PCC) method produces more optimal result compared to a difference of means method.
Effect of Light Spectrum LED Lettuce on IoT-Based Indoor Farming Moh. Haris Imron S Jaya; Septafiansyah Dwi Putra; Imam Sofi'i
Biotropika: Journal of Tropical Biology Vol. 11 No. 1 (2023)
Publisher : Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21776/ub.biotropika.2023.011.01.05

Abstract

Lettuce (Lactuca sativa L.) is an economically important crop worldwide and one of the most popular species grown in indoor farming. Lettuce's fast growth and cycle make a model plant to study the interaction between plants and light. Light's influence is one of the fundamental environmental factors for plant growth and development. Light-emitting diodes (LEDs) have higher light efficiency and wear efficacy, leading to a reduction in associated heating compared to other artificial lighting sources, such as fluorescent lamps or sodium vapor lamps. This research aimed to determine the morphological response of lettuce by giving an LED light spectrum with a single colour spectrum and IOT-based temperature and humidity monitoring.  This research used a students’ t-test with a level of 5% on the mean value of the white light spectrum with a yellow light on lettuce plants. Adding LED light spectrum produces a different response to the morphological parameters. LED spectrum affected the plant height variable, where the provision of a yellow LED light spectrum increased the plant height of lettuce.
Pengembangan Sistem Manajemen Keamanan Informasi (SMKI) Pada Pusat Data UPT Puskom Polinela Septafiansyah Dwi Putra; Imam Asrowardi; Eko Subyantoro
Jurnal Ilmiah ESAI Vol. 9 No. 2 (2015)
Publisher : Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/esai.v9i2.934

Abstract

In the implementation of ICT an educational institution, a data center is an ICT facility which is used as a placement, storage, and data and information processing. The ICT facilities are very risky at main business process when unmanaged appropriately. ISO27001 is an information security management system standard that can be used as a reference in designing a management of ICT facilities. This paper describes the design of an information security management system in a data center of State Polytechnics of Lampung (Polinela). This study begins by studying general description of the organization; defining the scope of the evaluation, and designing the tools. Expert judgment evaluation results show that the control of the recommended risk control is appropriate and can be applied to the locus of research.Key words : ISMS, security, information, management
Sistem Informasi Pajak Pph Pasal 21 Berbasis Sms Gateway Menggunakan Teknologi J2SE Imam Asrowardi; Halim Fathoni; Septafiansyah Dwi Putra
Jurnal Ilmiah ESAI Vol 4 No 3 (2010)
Publisher : Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/esai.v4i3.1346

Abstract

Sistem informasi pajak penghasilan yang masih berjalan masih menggunkan sistem yang manual yaitu dengan melalui telepon atau surat pos. Sehingga membutuhkan waktu yang cukup lama dan biaya yang tinggi untuk mengetahui besarnya pajak penghasilan suatu wajib pajak.  Untuk membantu menyelesaikan permasalahan tersebut,  maka dibuat sebuah program aplikasi yang dapat membantu permasalahan tersebut. Metode pelaksanaan yang digunakan dalam percobaan ini adalah studi kelayakan, desain basis data, pemrograman, pengujian, dan dokumentasi.  Berdasarkan pada hasil pengujian yang telah dilakukan yaitu pengujian dengan 12 sample yang diuji terdapat hanya satu kegagalan uji. Sehingga dapat dikatakan sistem ini dapat memenuhi kebutuhan wajib pajak dan layak untuk diimplementasikan.Keyword : sistem, pajak