Articles
Analisis dan Implementasi Identity Based Encryption Boneh Franklin
Maman Abdurohman;
Misioner Eman T. B.;
Andrian Rakhmatsyah
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2006
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Identity-Based Encryption memberikan memberikan kemudahan pada kriptografi dengan menggunakan sembarang string sebagai kunci publik. Pada kriptografi kunci publik, biasanya enkripsi menggunakan kunci publik yang rumit dan sulit diingat. Identity-Based Encryption menggunakan kunci publik yang lebih mudah diingat. Kunci publik pada Identity-Based Encryption ini dapat berupa alamat email, nomor telepon, ataupun suatu kata. Dengan menggunakan metode ini, enkripsi dapat dilakukan sebelum mengetahui kunci privat dari pasangan kunci publik yang sesuai. Pada saat penerima menerima suatu pesan yang terenkripsi tersebut, penerima akan menghubungi Privat Key Generator untuk mendapatkan kunci privat dari kunci publik yang digunakan dan mendeteksi kunci privat dari kunci publik yang digunakan dan mendekripsi pesan yang telah terenkripsi tersebut dengan menggunakan kunci privat yang didapat tersebut.Identity Based Encryption yang dilakukan ini berdasarkan konsep yang dikenalkan oleh Boneh dan Franklin. Paper ini berisi perancangan dan implementasi Identity Based Encryption Boneh Franklin dan perhitungan waktu terhadap fungsi-fungsi hasil implementasi dengan menggunakan perhitungan waktu pada sistem operasi.Kata kunci: Identity Based Encryption, Kunci Publik, Kunci privat, Private Key Generator
Sistem Keamanan Rumah Sekunder Berbasis Multimedia Message Service (MMS)
Maman Abdurohman;
Johan NMP Simatupang;
Dade Nurjanah
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2006
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Pada Penelitian ini dibangun sebuah sistem keamanan berbasis MMS. Sistem yang dibangun mengintegrasikan layanan SMS dan MMS yang disediakan oleh operator seluler dengan komputer, kamera web dan sensor infra merah untuk menyediakan sebuah sistem keamanan yang efisien dan praktis. Efisien dalam kebutuhan kapasitas penyimpanan dan praktis dalam pengoperasian.Untuk pembangunan sistem digunakan tools bantuan seperti Now SMS/MMS Gateway untuk menerima dan mengirimkan SMS/MMS, Active Port Pro untuk pengontrolan sensor infra merah, dan ActiveX VideoGrabber untuk melakukan capture gambar dan dokumentasi video. Metode kuesioner digunakan untuk melakukan pengujian kualitatif terhadap kepraktisan dari sistem yang dibangun.Pengujian dilakukan dengan membandingkan ukuran rata-rata file dari sistem yang dibangun dengan ukuran file dari sistem CCTV secara umum. Diperoleh kesimpulan bahwa sistem yang dibangun dapat meminimalkan kebutuhan kapasitas penyimpanan. Hasil pengujian kualitatif menunjukkan bahwa 93% responden mengatakan sistem yang dibangun dapat mendukung sistem keamanan utama yang sudah ada dan 100% responden mengatakan sistem praktis dalam pengoperasian.Kata kunci: CCTV, SMS, MMS, GPRS
PERANCANGAN KANAL KOMUNIKASI PADA TRANSACTION LEVEL MODELING DALAM PERANCANGAN EMBEDDED SYSTEM
Maman Abdurohman;
Kuspriyanto .;
Sarwono Sutikno;
Arif Sasongko
Jurnal Ilmu Komputer dan Informasi Vol 3, No 1 (2010): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (752.625 KB)
|
DOI: 10.21609/jiki.v3i1.140
Pada embedded system terdapat dua bagian penting yaitu komponen komputasi (register) dan komponen komunikasi. Komponen komunikasi menjadi perhatian penting pada mekanisme pemodelan level transaksi (Transaction Level Modeling, TLM). Kanal komunikasi adalah komponen untuk transaksi antar register. Fokus pembahasan TLM adalah perancangan kanal yang dapat mengakomodasi untuk peningkatan level transaksi. Kanal (channel) adalah implementasi bus untuk komunikasi antar komponen pada embedded system. Hal ini adalah kunci penting untuk mencapai impelementasi TLM untuk meningkatkan efisiensi pemodelan. Pada paper ini diusulkan beberapa definisi rancangan kanal sebagai implementasi TLM untuk perancangan embedded system. Hasilnya menunjukan bahwa rancangan kanal dapat berjalan sebagai bus untuk transaksi pada TLM. Paper ini menggunakan SystemC sebagai bahasa pemodelan. On embedded systems, there are two important parts: computational components (registers) and communication components. Communication component becomes an important attention on the mechanism of transaction level modeling (TLM). Communication channel is a component for transactions between registers. The focus of TLM is the design of the channel that could accommodate for the increased level of transactions. Channel is the implementation of the bus for communication between components in embedded systems. This is an important key to achieve the implementation of TLM to improve the efficiency of modeling. This paper proposed a definition of the channel design as the implementation of TLM for embedded systems design. The result shows that the design of the channel can run as a bus for transactions on the TLM. This paper uses SystemC as modeling language.
PERANCANGAN ATURAN TRANSFORMASI UML – SYSTEMC DALAM PERANCANGAN EMBEDDED SYSTEM
Maman Abdurohman;
Kuspriyanto .;
Sarwono Sutikno;
Arif Sasongko
Jurnal Ilmu Komputer dan Informasi Vol 3, No 2 (2010): Jurnal Ilmu Komputer dan Informasi (Journal of Computer Science and Information)
Publisher : Faculty of Computer Science - Universitas Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1153.664 KB)
|
DOI: 10.21609/jiki.v3i2.146
Pemodelan adalah salah satu proses awal dalam pengembangan suatu aplikasi atau produk. Tahap ini dilakukan untuk meminimalkan kesalahan pada produk akhir. Salah satu metode pemodelan berorientasi objek yang banyak digunakan adalah pemodelan UML (Unified Modeling Language). Dalam UML suatu sistem dipandang sebagai kumpulan objek yang memiliki atribut dan method. SystemC adalah bahasa perancangan perangkat keras yang berbasis C++. SystemC merupakan sebuah library yang mendefinisikan tipe-tipe komponen perangkat keras. Dalam pemodelan bersama perangkat keras dan perangkat lunak, UML dan SystemC memiliki kemampuan yang sama. Pada paper ini dilakukan analisis proses transformasi dari pemodelan berorientasi objek dengan UML dan implementasi dengan menggunakan SystemC. Hasil penelitian menunjukan bahwa proses transformasi UML-SystemC dapat dilakukan karena keduanya memiliki nature yang sama sebagai lingkungan yang dapat merancang bersama hardware dan software. Perangkat yang digunakan untuk penelitian ini adalah Rational Rose dan SystemC. Modeling is one of the first process in the development of an application or product. This phase is done to minimize errors in the final product. One method in object-oriented modeling that is widely used is UML (Unified Modeling Language). In UML a system is seen as a collection of objects that have attributes and methods. SystemC is a hardware design language based on C++. SystemC is a library that defines the types of hardware components. In a joint modeling of hardware and software, UML and SystemC have similar capabilities. In this paper, researchers analyzed the transformation of object-oriented modeling with UML and the implementation by using SystemC. The results shows that the transformation process of UML-SystemC can be done because both have the same nature as the environment that can design both hardware and software. The device used for this study is the Rational Rose and SystemC.
Implementasi Algoritma Penjadwalan untuk pengelolaan Big Data dengan Hadoop
Sidik Prabowo;
Maman Abdurohman
Indonesia Journal on Computing (Indo-JC) Vol. 2 No. 2 (2017): September, 2017
Publisher : School of Computing, Telkom University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21108/INDOJC.2017.2.2.189
Paper ini mengusulkan skema scheduler hadoop pada penyelesaikan tipe job yang sesuai untuk peningkatan kinerja Hadoop. Kesesuaian jenis scheduler dan tipe job yang dikerjakan dapat meningkatkan throughput dan menurunkan waktu rata-rata penyelesaian job. Masalah utama pada eksekusi job adalah ketidaksesuaian antara scheduler dengan tipe job yang dikerjakan. Pada paper ini telah dilakukan pengujian terhadap beberapa algoritma scheduler Hadoop yaitu FIFO, Fair, SARS dan COSHH scheduler dengan beberapa jenis job yang ditangani dalam lingkungan hadoop. Jenis-jenis job yang diujikan adalah word count, random text writer dan grep. Pengujian dilakukan dua skenario, yaitu job homogen (satu jenis) dan heterogen (beberapa jenis job) dikerjakan bersama. Hasil pengujian menunjukan bahwa algoritma SARS cocok digunakan pada penyelesaian job yang sifatnya homogen. Sementara itu algoritma COSHH cocok digunakan pada penyelesaian job gabungan yang heterogen.
Improving Smart Lighting with Activity Recognition Using Hierarchical Hidden Markov Model
Nur Ghaniaviyanto Ramadhan;
Aji Gautama Putrada;
Maman Abdurohman
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 2 (2019): September, 2019
Publisher : School of Computing, Telkom University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.34818/INDOJC.2019.4.2.307
This paper has the aim of implementing the smart lighting systems that is able to analyze daily movement activities, analyze the performance of hierarchical hidden markov models as predictions and analyze the performance of smart lighting with activity analysis using hierarchical hidden markov models. The purpose is to answer the problems that occur, namely the smart lights only turn on if users are right under the lights so users need a smart light which is able to read the movement of people when approaching the lamp or not. Secondly, there are also smart lights, but when usersare under the lights, it only lights up for a few seconds which should light up if there is a person below or a radius around the lamp so that a smart light is needed when someone is underneath and the lights will die it is outside the radius around the lamp. The model used is the hierarchical hidden markov model which is an extension of the hidden markov model which can solve the problem of evaluation, conclusion and learning with the algorithm used is the viterbi algorithm. The result obtained using HHMM are accuracy of 93%, 92% recall and 86% precision.
Design of API Gateway as Middleware on Platform as a Service
Dita Oktaria;
Joel Andrew M. K. Ginting;
Maman Abdurohman;
Rahmat Yasirandi
Indonesia Journal on Computing (Indo-JC) Vol. 6 No. 3 (2021): December, 2021
Publisher : School of Computing, Telkom University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.34818/INDOJC.2021.6.3.597
The process of building a platform is a process that consists of various stages, there is a focus of work and requires different preparation, but until now there has been no awareness in utilizing data and information sources that have been available to be used as a basis for developing or creating a platform that is able to improve quality a system of integrity. For this reason, a Platform as a Service (PaaS) architecture was built which provides application development services to process data and information obtained from practicum activities during the lecture period based on cloud computing using the Service Oriented Architectural (SOA) method. The API gateway is used as middleware system. The results of the implementation and analysis carried out prove that the architecture using the API gateway as a built-in middleware can be considered to develop the Telkom University lab service system. Although there are adjustments to resources and needs, but the purpose of this architectural development has generally been realized. From the results of tests performed on a platform architecture that uses a gateway API, it produces RTT 2.081 seconds, 45 MB memory, and 8% CPU for each user in 100 users.
Increasing the Security of RFID-based Classroom Attendance System with Shamir Secret Share
Aji Gautama Putrada;
Maman Abdurohman
International Journal on Information and Communication Technology (IJoICT) Vol. 6 No. 1 (2020): June 2020
Publisher : School of Computing, Telkom University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21108/IJOICT.2020.61.480
This paper proposes an attendance system for increasing the security based on Shamir Secret Share algorithm. The use of RFID devices for classroom attendance is still vulnerable to certain attacks. Students usually make use of existing loopholes for prohibited things, such as forged attendance. Shamir Secret Share is a security method based on the Secure Multiparty Computation (SMC) concept. The SMC guarantees not only the confidentiality of external attacks but also of each member in the secure system. In the attendance scenario using Shamir Secret Share, a student and a lecturer must do tapping at the same time; otherwise, the secret that opens the lock for attendance at that class will not be opened. To realize this system, this paper uses two RFID modules, each of which is connected to one nodeMCU microcontroller. Both systems are connected to a database where the Shamir Shared Secret calculation is performed. Some experiment has been implemented for proving the concept. The result shows that some scenarios of fraud in RFID based attendance can be prevented.
Basement Flood Control with Adaptive Neuro Fuzzy Inference System Using Ultrasonic Sensor
Raden Muhamad Yuda Pradana Kusumah;
Maman Abdurohman;
Aji Gautama Putrada
International Journal on Information and Communication Technology (IJoICT) Vol. 5 No. 2 (2019): December 2019
Publisher : School of Computing, Telkom University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.21108/IJOICT.2019.52.482
This paper proposes a basement flood management system based on Adaptive Neuro Fuzzy Inference System (ANFIS). Basement is one of the main parts of a building that has a high potential for flooding. Therefore, the existence of a flood control system in the basement can be a solution to this threat. Water level control is the key to solving the problem. Fuzzy Inference System (FIS) has proven to be a reliable method in the control system but this method has limitations, that is, it needs to have a basis or a reference when determining the fuzzy set. When there is no basis or reference, Adaptive Neuro FIS (ANFIS) can be a solution. The Neuron aspect in ANFIS determines fuzzy sets through training data. In terms of the Internet of Things (IoT), this system uses an ultrasonic sensor, Node Red IoT platform, and Matlab Server. Then the water pump will turn on to control the water level when there is rainfall. By undergoing a comparative test with the FIS method, ANFIS provides a lower Root Mean Square Error (RMSE) and is recommended for use in basement flood management systems.
Sistem Pemantau Kelembapan Tanah Akurat dengan Protokol Zigbee IEEE 802.15.4 pada Platform M2M OpenMTC
Putu Agus Fredy;
Maman Abdurohman
Jurnal Teknologi dan Sistem Komputer Volume 6, Issue 4, Year 2018 (October 2018)
Publisher : Department of Computer Engineering, Engineering Faculty, Universitas Diponegoro
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1946.622 KB)
|
DOI: 10.14710/jtsiskom.6.4.2018.139-145
This paper presents a study on an accurate soil moisture monitoring system based on its humidity from 9 sensor nodes using wireless sensor network (WSN) and M2M platform. The system used IEEE 802.15.4 (Zigbee) protocol. The system was connected to the application via the OpenMTC M2M platform. This monitoring system can measure soil moisture accurately and provide soil water content status on the application. The system was effective in measuring soil moisture at a distance of 0-25 meters where there was a barrier between gateway and sensor, and at a distance of 0-50 meter in line of sight. The position of the sensors that are within 3 meters of each other and the depth of each sensor 3 cm can measure soil moisture properly.