Claim Missing Document
Check
Articles

Found 8 Documents
Search

Comparison of cloud computing providers for development of big data and internet of things application Muhammad Fajrul Falah; Yohanes Yohanie Fridelin Panduman; Sritrusta Sukaridhoto; Arther Wilem Cornelius Tirie; M. Cahyo Kriswantoro; Bayu Dwiyan Satria; Saifudin Usman
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 3: June 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i3.pp1723-1730

Abstract

The improved technology of big data and the internet of things (IoT) increases the number of developments in the application of smart city and Industry 4.0. Thus, the need for high-performance cloud computing is increasing. However, the increase in cloud computing service providers causes difficulties in determining the chosen service provider. Therefore, the purpose of this study is to make comparisons to determine the criteria for selecting cloud computing services following the system architecture and services needed to develop IoT and big data applications. We have analyzed several parameters such as technology specifications, model services, data center location, big data service, internet of things, microservices architecture, cloud computing management, and machine learning. We use these parameters to compare several cloud computing service providers. The results present that the parameters able to use as a reference for choosing cloud computing for the implementation of IoT and big data technology.
Smart Technology of CO2 Monitoring as Prevention of Acute Respiratory Infection Disease Using Artificial Intelligence Algorithm Muhammad Shodiq; Agus Priyono; M. Cahyo Kriswantoro3
Computer Science and Information Technology Vol 5 No 3 (2024): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v5i3.7709

Abstract

Air pollution is a serious environmental problem that can affect human health because it contains toxic gases, one of which is carbon dioxide (CO2). This toxic gas can cause Acute Respiratory Infection (ARI). ARI is an acute infection of the respiratory tract that can cause death. One effort to prevent ARI is to monitor CO2 gas as a trigger for ARI. This study develops intelligent technology for monitoring CO2 concentration using a rule-based artificial intelligence algorithm by utilizing Internet of Things technology integrated with telegrams to provide warnings. Rule-based systems are part of artificial intelligence that have advantages and limitations that need to be considered before deciding whether it is the right technique to use in solving existing problems. This study uses daily data taken by CO2 gas sensors from 07.00 - 16.15 WIB with a data collection range of 15 minutes with a total of 38 data samples taken. The results of the study show that this rule-based algorithm is able to classify CO2 concentrations according to the rules that have been made. In addition, from the data taken, 42% are in the safe category, 50% are in the alert category and 8% are in the danger category, each of which has an effect on health. The system that was built can also send danger notifications via telegram
Manajemen Bandwidth Pada Jaringan Pemerintah Kota Surabaya Menggunakan Metode Queue Tree Kriswantoro, M. Cahyo; Ayatullah, Ahmad Hafidh
Applied Information Technology and Computer Science (AICOMS) Vol 2 No 2 (2023)
Publisher : Pengelola Jurnal Politeknik Negeri Ketapang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58466/aicoms.v2i2.1252

Abstract

To obtain maximum access speed with limited bandwidth resources, bandwidth requires good regulation to maintain data transfer in a computer network so that data queues do not accumulate due to overloaded access requests in the network, hence the need for Bandwidth Management in a computer network. . Bandwidth Management functions to regulate network bandwidth so that each network user gets equal bandwidth. The Surabaya City Government is an agency that uses computer networks to integrate all existing data. Everything is connected into one unit centered at the Surabaya City Dinkominfo Secretariat Office. In this network there is a Fiber Optic network and an external Fiber Optic network. What will be implemented in this research is on an external fiber optic network. The problem currently being faced is the need for good network management so that the performance of the network being built is in accordance with the devices that have been prepared. The method used is Queue Tree from the MikroTik router. The result of implementing Bandwidth Management is that the network quality using the Queue Tree method is more optimal, because the bandwidth will be divided according to the rules applied to bandwidth management so that clients get bandwidth according to the rules.
ANALISIS KEAMANAN SIBER KAMPUS MENGGUNAKAN FRAMEWORK COBIT 2019 PADA DOMAIN DELIVERY, SERVICE AND SUPPORT (DSS) handoyo, eko; Kriswantoro, M Cahyo; Anugrah, Bayu
Jurnal Informatika Vol 9, No 2 (2025): JIKA (Jurnal Informatika)
Publisher : University of Muhammadiyah Tangerang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31000/jika.v9i2.12845

Abstract

PerkPerkembangan teknonogi informasi saat ini maju dengan pesat Keamanan informasi bertujuan agar informasi yang dimiliki terjamin kerahasiaannya (confidentiality), keutuhannya (integrity) dan ketersediaannya (availability). Banyaknya ancaman keamanan informasi yang berdampak besar pada institusi perlu dilakukanan penilaian resiko keamanan siber. Kampus yang menjadi salah satu penimplementasian siber dalam ruang lingkup pendidikan dengan banyaknya data dan informasi yang perlu dipasikan keamananya. Fremwork COBIT 2019 merupakan kerangka kerja untuk mengarahkan organisasi pada aktivitas keamanan siber dan asesemen keamanan. Fokus keamanan siber ini terdapat pada domain (DSS). Maturity level memilki tingkat penilaian yang baik, dan diharpkan bisa memberikan rekomendasi terkait temuan pada proses audit. Penelitian ini bertujuan membantu memberikan analisis penilaian keamannan yang tepat digunakan dalam perbaikan cybersecurity kampus. Objek penelitian ini berada pada layanan siber di kampus, dimulai dengan penggumpulan data terkait dengan layanan siber kampus sampai dengan pemberian rekomendasi. Hasil dari penelitian ini domain DSS nilai ketercapaian 3,50 menunjukkan maturity level pada defined. Level ini berarti dinyatakan institusi telah menjalankan proses yang sudah didefinisikan dan semua tim paham bagaimana proses seharusnya berjalan.
ANALISIS SENTIMEN PENILAIAN MASYARAKAT TERHADAP PELAYANAN RUMAH SAKIT MUHAMMADIYAH LAMONGAN MENGGUNAKAN TF-IDF DAN NAIVE BAYES Ayatullah, Ahmad Hafidh; Kriswantoro, M. Cahyo; Zakka, Mutsna Sa Yu; Al'Insani, Adam Rizky
Jurnal Informatika Medis Vol. 2 No. 1 (2024): Jurnal Informatika Medis (J-INFORMED)
Publisher : Program Studi Informatika Medis Universitas Muhammadiyah Muara Bungo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52060/im.v2i1.2198

Abstract

Rumah sakit merupakan penyelenggara layanan kesehatan yang tidak bisa diremehkan. Evaluasi terhadap kualitas pelayanan rumah sakit menjadi titik fokus dalam upaya memahami tingkat kepuasan masyarakat terhadap layanan kesehatan yang mereka terima. Ulasan Google Maps memberikan gambaran nyata dari persepsi masyarakat terhadap kualitas pelayanan yang diberikan oleh rumah sakit. Penelitian ini menggunakan dataset dari ulasan google maps Rumah Sakit Muhammadiyah Lamongan sebagai objek penelitian. Penulis menggunakan TF-IDF dan Naive Bayes serta teknik Cross Validation untuk mengelompokkan penilaian berdasarkan sentimen positif dan negatif, sekaligus memudahkan identifikasi aspek-aspek yang relevan. Aspek yang diteliti pada penelitian ini meliputi penanganan pasien, ketersediaan fasilitas, keefektifan administrasi, dan transparansi biaya. Peneliti juga menerapkan analisis Root Cause untuk memfasilitasi penggunaan hasil penelitian dalam mengidentifikasi serta memberikan solusi atas permasalahan yang terkait. Hasil pengujian menggunakan Cross Validation dengan fold k-2 menunjukkan tingkat akurasi sebesar 85,91%, dengan tingkat precision mencapai 86,64%, recall sebesar 85,91%, dan F1-Score sebesar 86,19%, Pengujian pada 20% data uji menghasilkan tingkat akurasi mencapai 80%. Untuk itu penerapan metode Naïve Bayes Classifier dan TF-IDF untuk mengklasifikasikan ulasan pelanggan dapat berhasil diimplementasikan menggunakan library Scikit-learn di Python.
Secure Authentication in Vehicular Networks: Integrating Zero-Knowledge Protocols with RSS Key Generation Kriswantoro, M. Cahyo; Handoyo, Eko; Sa Yu Zakka, Mutsna
Inform : Jurnal Ilmiah Bidang Teknologi Informasi dan Komunikasi Vol. 10 No. 2 (2025): In Press: July, 2025
Publisher : Universitas Dr. Soetomo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25139/inform.v10i2.9488

Abstract

Zero Knowledge Authentication protocol is a cryptographic method used to identify users through interactive communications without exposing confidential. The identification scheme is an example of a real-world application of the Zero-Knowledge protocol, which provides a mechanism for actors in possession of a secret key to verify their identity using the corresponding public key. Several prominent identification schemes have been proposed in the literature, including the Feige-Fiat-Shamir (FFS), Guillou-Quisquater (GQ), and Schnorr protocols. In conjunction with these schemes, mechanisms for key generation and key updates have been developed to enhance privacy in zero-knowledge cloud-based file storage systems. To ensure data integrity within cloud environments, the Shacham-Waters auditing protocol has been employed. The FFS identification scheme, in particular, utilizes a public-private key pair in a parallel verification structure. To improve computational efficiency, this scheme has been enhanced by incorporating parallel constructions. Researchers utilize the Zero-Knowledge Authentication Feige-Fiat-Shamir protocol by combining the key generator obtained from Received Signal Strength (RSS) in vehicle communications, thereby replacing the channel in the Feige-Fiat-Shamir protocol with the key generator derived from RSS. The existing combination combines stages 1 and 4 in FFS. The change is that the channel sent is replaced with a key generator obtained from the RSS key generator. The results of this study are expected to serve as a reference for the implementation of vehicle communication technology, which is anticipated to experience rapid growth in the future.
Recommendation Implementation of a Digital Book Recommendation System Using Item-Based Collaborative Filtering in a University Library Application.: Item-Based Collaborative Filtering, recommendation system, digital library, Pearson correlation, MAE. Mutsna, Mutsna; Mufti Ari Bianto; M. Cahyo Kriswantoro
Computer Science and Information Technology Vol 6 No 2 (2025): Jurnal Computer Science and Information Technology (CoSciTech)
Publisher : Universitas Muhammadiyah Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37859/coscitech.v6i2.10011

Abstract

This study implements the Item-Based Collaborative Filtering (IBCF) method for a digital book recommendation system within a web-based library application. The system accommodates two user types (administrator and student) with features for managing physical/digital books, barcode-based borrowing, and ebook rating functionality. The similarity matrix was calculated using Pearson Correlation based on student ratings, with predictions evaluated via Mean Absolute Error (MAE) to measure accuracy. Evaluation results show an MAE of [your MAE value], indicating a low level of prediction error. Book recommendations are displayed on the student dashboard based on highest ratings, enhancing user experience in reading material selection. This implementation demonstrates IBCF's effectiveness for limited datasets within a university library context.
Performance Enhancement of RSS-Based Secret Key Generation using Lightweight Minimal Bit Syndrome Reconciliation Method for IoT Devices Nisa, Choirun; M. Cahyo Kriswantoro
Telekontran : Jurnal Ilmiah Telekomunikasi, Kendali dan Elektronika Terapan Vol. 13 No. 2 (2025): TELEKONTRAN vol 13 no 2 Oktober 2025
Publisher : Program Studi Teknik Elektro, Fakultas Teknik dan Ilmu Komputer, Universitas Komputer Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34010/telekontran.v13i2.17658

Abstract

Secure communication in Internet of Things (IoT) devices can be improved through physical-layer secret key generation. In secret key generation, an information reconciliation process is required to match the bit sequences between the two communicating devices. However, this process often involves complex statistical computations that increase system overhead and require the transmission of bits over an insecure public channel. Therefore, this research presents a lightweight reconciliation algorithm based on minimal bit syndrome to reduce overhead and improve key security. The proposed method processes quantized Received Signal Strength (RSS)  values into 8-bit block syndrome-based reconciliation mechanism and only the 8-bit syndromes from mismatched block are transmitted over the public channel. System testing was conducted under both static and dynamic scenarios in an indoor area using Raspberry Pi nodes. The results show that the proposed scheme demonstrates an improvement in the Key Generation Rate (KGR) by 2.2% and reduces the processing time by 11.6% in dynamic scenario and 8.3% in the static scenario. Also, the proposed scheme reduce the quantization and reconciliation time by 50% compared to previous research. Furthermore, the proposed method maintained a Key Disagreement Rate (KDR) of 0% across all block size and successfully passed the NIST randomness and complexity test, with all test parameters achieving p-values above 0.01. These result indicate that the proposed scheme improve the performance of existing secret key generation methods and it is suitable for implementation in IoT devices.