Claim Missing Document
Check
Articles

Found 11 Documents
Search

Comparison of Secret Splitting, Secret Sharing and Recursive Threshold Visual Cryptography for Security of Handwritten Images Sugianto Sugianto; Suharjito Suharjito; Nico Surantha
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.6632

Abstract

The secret sharing is a method to protect confidentiality and integrity of the secret messages by distributing the message shares into several recipients. The secret message could not be revealed unless the recipients exchange and collect shares to reconstruct the actual message. Even though the attacker obtain shares shadow during the share exchange, it would be impossible for the attacker to understand the correct share. There are few algorithms have been developed for secret sharing, e.g. secret splitting, Asmuth-Bloom secret sharing protocol, visual cryptography, etc. There is an unanswered question in this research about which method provides best level of security and efficiency in securing message. In this paper, we evaluate the performance of three methods, i.e. secret splitting, secret sharing, and recursive threshold visual cryptography for handwritten image security in terms of execution time and mean squared error (MSE) simulation. Simulation results show the secret splitting algorithm produces the shortest time of execution. On the other hand, the MSE simulation result that the three methods can reconstruct the original image very well.
Learning Management System Development with Application of Asynchronous Learning Method in STMIK IBBI Medan Marwa Halim; Suharjito Suharjito
CommIT (Communication and Information Technology) Journal Vol. 9 No. 2 (2015): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v9i2.1652

Abstract

This article will explain asynchronous learn- ing system using attractive discussion forums and video teaching materials features for user so that the devel- opment of both features will increase e-learning system usage by students and lecturers which can eventually im- prove the students’ absorption on the provided teaching materials, increase the active participation of students, improve self-learning ability, and to improve the quality of learning materials. The method used in this study by distributing questionnaires in online form to stakeholders users consisting of lecturers and students with the num- ber of respondents is 225 people and author use model ADDIE which focuses on Analysis, Design, Development, Implementation and Evaluation as development design. Results of this study is an application of web-based asynchronous learning which can be used by students and lecturers with the results of the application evaluation is based on a survey to students and lecturers. From this study, can be concluded that to support online learning with asynchronous method using the video learning feature in online lecture needs to be developed in order to support the science transformation process from lecturers to students. Attractive video teaching  materials  model for students has characteristics such as screen shots and presentation models.
Executive Information System Modelling to Monitor Indonesian Criminal Rate Josef Bernadi; Suharjito Suharjito
CommIT (Communication and Information Technology) Journal Vol. 10 No. 1 (2016): CommIT Journal
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v10i1.1663

Abstract

Similar to any other governments, Indonesia government has the role of protecting the security of its citizens via the established police unit. However, the executive unit is often unable to provide response in timely manner due to the huge data size. For the reason, an executive information system (EIS) is established in order to provide necessary information to leverage the decision making process. This work intends to establish and evaluate the executive information system and its support to facilitate the efforts to fight crimes in Indonesia territory. The EIS prototype is established and is evaluated on the basis of the six information system success factors where the required data are collected by means of questionnaire. The results suggest that the factors of system quality, information quality, easy-of-use, user satisfaction, and individual and organization impacts are very significant.
Developing IT Strategic Planning Using Mobile Enterprise Architecture In The Academic Process of Atma Jaya Makassar University Astrid Lestari Tungadi; Suharjito Suharjito
ComTech: Computer, Mathematics and Engineering Applications Vol. 8 No. 1 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i1.3775

Abstract

The purpose of this research was to examine the feasibility of the development of mobile enterprise strategic plan, analyze the academic process and the utilization of information technology (IT), and generate documentation IT strategic planning by implementing Mobile Enterprise Architecture in the academic process of Atma Jaya University in Makassar. Data were taken from distributing questionnaires to 297 respondents and conducting interviews to 18 respondents. Data were examined using SWOT analysis, the incorporation of academic scorecard analysis and IT balanced scorecard analysis, financial analysis, as well as analytic hierarchy process (AHP). SWOT analysis results indicate that case study is in a weak position, which possibly never take advantage of opportunities since the weakness of the stand or the power is not enough to work on it. In addition, the results of the performance analysis of the utilization of information technology using the Balanced Scorecard analysis show that the average performance is sufficient. The result of documentation of IT strategic planning was analyzed with financial analysis indicating the feasibility of implementation because it provides benefits for university of 141,32%. Furthermore, Analytic Hierarchy Process (AHP) to determine the priority of IT strategy proposals shows that the main priority is to develop portal for student and lecturer.
Cloud Computing Impelementation Using Model Roadmap for Cloud Computing Adoption (ROCCA) on IT Consultant Industry Panji Arief Perdana; Suharjito Suharjito
ComTech: Computer, Mathematics and Engineering Applications Vol. 8 No. 3 (2017): ComTech
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/comtech.v8i3.3887

Abstract

The purpose of this research was to build cloud computing referring to Roadmap for Cloud Computing Adoption (ROCCA) model so that the best strategy could be implemented in PT Matrica Consulting Service. The implementation of cloud computing had five stages modifications ROCCA adoption model. Those stages were analysis, design, adoption, migration, and management. Data were taken from distributing questionnaires and conducted interviews with R&D Manager and analyzed using SWOT analysis. The result is the implementation of cloud computing models, and implementation of private cloud and Software as a Service (SaaS) needs to be modified so it can be implemented properly. The implementation canincrease the performance PT Matrica Consulting Service based on the characteristics of the cloud which is flexible and secure to be accessed as long as it is connected to the Internet and maintained properly.
Outlier Detection in Inpatient Claims Using DBSCAN and K-Means Panca Oktavia Candra Sari; Suharjito Suharjito
JURNAL TEKNIK INFORMATIKA Vol 15, No 1 (2022): JURNAL TEKNIK INFORMATIKA
Publisher : Department of Informatics, Universitas Islam Negeri Syarif Hidayatullah

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15408/jti.v15i1.25682

Abstract

Health insurance helps people to obtain quality and affordable health services. The claim billing process is manually input code to the system, this can lack of errors and be suspected of being fraudulent. Claims suspected of fraud are traced manually to find incorrect inputs. The increasing volume of claims causes a decrease in the accuracy of tracing claims suspected of fraud and consumes time and energy. As an effort to prevent and reduce the occurrence of fraud, this study aims to determine the pattern of data on the occurrence of fraud based on the formation of data groupings. Data was prepared by combining claims for inpatient bills and patient bills from hospitals in 2020. Two methods were used in this study to form clusters, DBSCAN and KMeans. To find out the outliers in the cluster, Local Outlier Factor (LOF) was added. The results from experiments show that both methods can detect outlier data and distribute outlier data in the formed cluster. Variable that high effect becomes data outlier is the length of stay, claims code, and condition of patient when discharged from the hospital. Accuracy K-Means is 0.391, 0.003 higher than DBSCAN, which is 0.389.
Hybrid Disk Drive Configuration on Database Server Virtualization Ferdy Nirwansyah; Suharjito Suharjito
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 3: June 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i3.pp720-728

Abstract

SSD is a revolutionary new storage technologies. Enterprise storage system using full SSD is still very expensive, while HDD is still widely used. This study discusses hybrid configuration storage in virtualized server database with benchmark against four hybrid storage configuration for four databases, ORACLE, SQL Server, MySQL and PostgreSQL on Windows Server virtualization. Benchmark using TPC-C and TPC-H to get the best performance of four configurations were tested. The results of this study indicate HDD storage configurations as visual disk drive OS and SSD as visual disk drives database get better performance as OLTP and OLAP database server compared with SSD as visual disk drive OS and HDD as a visual disk drive database. Based on the data research TPC-C, OLTP get best performance at HDD storage configurations as visual disk drive OS and SSD as a visual disk drives database and temporary files.
Query Optimization Using Fuzzy Logic in Integrated Database Susana Susana; Suharjito Suharjito
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 3: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v4.i3.pp637-642

Abstract

Query optimization in integrated database can’t be separated from data processing method.  In order to have faster query response time, a method to optimize queries is required.  One of many methods that can be used for query optimization is using fuzzy logic with Tsukamoto inference system.  Value set on each variable is defined membership functions and Tsukamoto inference system used in determining these rules or the terms of query results, then apply it into query method or query line structure.  The application of fuzzy logic inference systems with Tsukamoto can accelerate query response time, and will have more significant difference when the amount of selected data is greater.
In-Car Air Quality Notification Using Internet of Things Platform Regi Fernando Najoan; Suharjito Suharjito
Engineering, MAthematics and Computer Science (EMACS) Journal Vol. 5 No. 2 (2023): EMACS
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/emacsjournal.v5i2.9950

Abstract

In the development of modern society, transportation is essential to support daily activities. With the existence of vehicles, the activities carried out by the community will be much easier. The car is a means of transportation that is often used by the community to carry out activities related to their respective goals. In-car air quality is very crucial for society because most people spend their time in cars. Often, the air in the car contains not only good air but also bad air for humans. The impact of poor air quality can make people sleepy, as well as cause respiratory problems and several other diseases that can even affect a driver's ability to make decisions. Therefore, there must be a real-time monitoring and notification system for air quality in the car. The purpose of this research is to be able to develop an air quality monitoring system for cars and provide notifications if the air quality worsens in real-time. In this study, researchers developed an air quality monitoring and notification system for cars using the NodeMCU ESP8266 microcontroller, sensors MQ-7, MQ-135, PMS5003, and the IoT platform, namely Blynk and ThingSpeak. The result of this research is a system that can detect, measure, and monitor air quality levels of carbon dioxide (CO), carbon monoxide (CO2), particulate matter (PM10), and particulate matter (PM2.5) via the internet in real-time. and displays air quality data on the dashboard, then provides notifications using the Blynk application if the air quality is low and getting worse.
Optimalisasi Ventilasi Ruang Kelas untuk Mencegah Penularan Covid-19 dengan Setting Experiment: Indonesia Komarudin Komarudin; Alfian Nasution; Yohanes Baptista Indra Kurniadri; Suharjito Suharjito
Industrika : Jurnal Ilmiah Teknik Industri Vol. 7 No. 2 (2023): Industrika: Jurnal Ilmiah Teknik Industri
Publisher : Fakultas Teknik Universitas Tulang Bawang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37090/indstrk.v7i2.910

Abstract

The spread of the SARS-CoV-2 virus has forced many schools to implement health protocols such as wearing masks, social distancing, and limiting the number of students in classrooms when face-to-face learning resumes as it did before the pandemic. This is due to the World Health Organization (WHO) and the Centers for Disease Control and Prevention (CDC) stating that Covid-19 can spread through the air (airborne). In addition to implementing health protocols, another important thing is to maintain classroom ventilation. By increasing the ventilation of outside air into the classroom, the risk of virus transmission can be reduced, and the indoor air quality can be improved. Introducing as much outside air as possible into the room is one important way to prevent the spread of Covid-19 because it can reduce the concentration of the virus in the room. ASHRAE (American Society of Heating, Refrigerating, and Air Conditioning Engineers) recommends a minimum of 6 ACH (Air Change per Hour) for classrooms. Research conducted on one middle school classroom in Tangerang Selatan, equipped with 2 AC units and 1 window, showed that the ASHRAE standard can be met by opening the window at least 50% during learning activities and turning on 1 AC unit with the fan setting at full speed to achieve an ACH greater than 6. If besides wanting to prevent the transmission of Covid-19, you also want to create comfort during the learning process, you can turn on both AC units with the fan setting at low to full speed. Keywords: Airborne, ASHRAE, Social distancing, US-CDC, WHO