Mira Kartiwi
International Islamic University Malaysia

Published : 32 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 32 Documents
Search

On the Review and Setup of Security Audit using Kali Linux Teddy Surya Gunawan; Muhammad Kassim Lim; Nurul Fariza Zulkurnain; Mira Kartiwi
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 1: July 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i1.pp51-59

Abstract

The massive development of technology especially in computers, mobile devices, and networking has bring security issue forward as primarily concern. The computers and mobile devices connected to Internet are exposed to numerous threats and exploits. With the utilization of penetration testing, vulnerabilities of a system can be identified and simulated attack can be launched to determine how severe the vulnerabilities are. This paper reviewed some of the security concepts, including penetration testing, security analysis, and security audit. On the other hand, Kali Linux is the most popular penetration testing and security audit platform with advanced tools to detect any vulnerabilities uncovered in the target machine. For this purpose, Kali Linux setup and installation will be described in more details. Moreover, a method to install vulnerable server was also presented. Further research including simulated attacks to vulnerable server on both web and firewall system will be conducted.
Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks Teddy Surya Gunawan; Muhammad Kasim Lim; Mira Kartiwi; Noreha Abdul Malik; Nanang Ismail
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i2.pp729-737

Abstract

Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, and other mobile devices connected to Internet are exposed to various threats and exploits. Of the various attacks, SQL injection, cross site scripting, Wordpress, and WPA2 attack were the most popular security attacks and will be further investigated in this paper. Kali Linux provides a great platform and medium in learning various types of exploits and peneteration testing. All the simulated attack will be conducted using Kali Linux installed on virtual machine in a compuer with Intel Core i5 and 8 GB RAM, while the victim’s machine is the host computer which run Windows 10 version 1709. Results showed that the attacks launched both on web and firewall were conducted successfully.
Comparison of Entropy Coding mechanism on IEEE1857.2 Lossless Audio Compression Standard Fathiah Abdul Muin; Teddy Surya Gunawan; Mira Kartiwi; Elsheikh M.A. Elsheikh
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp176-183

Abstract

This paper has two objectives. First, we aim to review and analyze the performance of the IEEE 1857.2 standard, focusing is on the Golomb-Rice and Arithmetic entropy algorithms as well as the effect of the pre-processing block on these entropy blocks. The pre-processing block normalizes the error residue of the Linear Predictive encoder, which then is passed to Entropy block, where the selector chooses the entropy encoder to use. The second objective is to present results from experimenting different existing algorithms available to benchmark it’. The results are discussed, and comparisons are made to identify the effect on compression ratio and encoding speed of the lossless encoder. As well as this, comparison is made to analyze effects of enabling and disabling the pre-processing output to the Entropy Coding block. We concluded that pre-processing block works well to flatten the output at lower predictor order for all the sound types, but works best at improving the residual output for music sound type.
The User Satisfaction Perspectives of the Information System Projects A’ang Subiyakto Subiyakto; Abd. Rahman Ahlan Rahman Ahlan; Mira Kartiwi; Syopiansyah Jaya Putra; Yusuf Durachman
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v4.i1.pp215-223

Abstract

It is inevitable that information system (IS) has been the essential role in the management and academic functions of the higher education institutions (HEIs) in developing countries, like Indonesia. In this country, despite the IS project developments have been performed since 1980s, but its performances tended still low. The efforts have been performed for responding this issue, but the studies have been remained in limited number. Accordingly, this study was carried out to know what factors that influence the satisfactions, in respect of its significant effects towards the project performances. The internal stakeholders were the population, which was sampled using the purpose random sampling. The 52 (87%) paper based data and the 61 (9%) online ones were then used in the data analysis stage with the partial least squares-structural equation modeling (PLS-SEM) method. The results revealed that, besides the system and service qualities directly affected the endogenous variable, the institutional contexts also indirectly influenced the variable. The study remained limitations, but its findings may theoretically and practically contributes towards the user satisfaction measurement, especially from the perspectives of the Islamic HEIs in Indonesia.
On the Comparison of Line Spectral Frequencies and Mel-Frequency Cepstral Coefficients Using Feedforward Neural Network for Language Identification Teddy Surya Gunawan; Mira Kartiwi
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp168-175

Abstract

Of the many audio features available, this paper focuses on the comparison of two most popular features, i.e. line spectral frequencies (LSF) and Mel-Frequency Cepstral Coefficients. We trained a feedforward neural network with various hidden layers and number of hidden nodes to identify five different languages, i.e. Arabic, Chinese, English, Korean, and Malay. LSF, MFCC, and combination of both features were extracted as the feature vectors. Systematic experiments have been conducted to find the optimum parameters, i.e. sampling frequency, frame size, model order, and structure of neural network. The recognition rate per frame was converted to recognition rate per audio file using majority voting. On average, the recognition rate for LSF, MFCC, and combination of both features are 96%, 92%, and 96%, respectively. Therefore, LSF is the most suitable features to be utilized for language identification using feedforward neural network classifier.
Performance Evaluation of Multichannel Audio Compression Teddy Surya Gunawan; Mira Kartiwi
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v10.i1.pp146-153

Abstract

In recent years, multichannel audio systems are widely used in modern sound devices as it can provide more realistic and engaging experience to the listener. This paper focuses on the performance evaluation of three lossy, i.e. AAC, Ogg Vorbis, and Opus, and three lossless compression, i.e. FLAC, TrueAudio, and WavPack, for multichannel audio signals, including stereo, 5.1 and 7.1 channels. Experiments were conducted on the same three audio files but with different channel configurations. The performance of each encoder was evaluated based on its encoding time (averaged over 100 times), data reduction, and audio quality. Usually, there is always a trade-off between the three metrics. To simplify the evaluation, a new integrated performance metric was proposed that combines all the three performance metrics. Using the new measure, FLAC was found to be the best lossless compression, while Ogg Vorbis and Opus were found to be the best for lossy compression depends on the channel configuration. This result could be used in determining the proper audio format for multichannel audio systems.
Speech Enhancement based on Wiener Filter and Compressive Sensing Amart Sulong; Teddy Surya Gunawan; Othman O. Khalifa; Mira Kartiwi; Eliathamby Ambikairajah
Indonesian Journal of Electrical Engineering and Computer Science Vol 2, No 2: May 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v2.i2.pp367-379

Abstract

In the last few decades, many advanced technologies have been proposed, in which communications played a great role as well as telecommunications applications. The noise elimination in various environments became the most concerned as it greatly hindered the speech communication applications. The improvement of noisy speech interms of quality and intelligibility are taken into account without introducingany additional noise. Many speech enhancement algorithms have been proposed. Wiener filter is one of the classical algorithm that improve the noisy speech by reducing its noise components through selectively chosen Wiener gain. In this paper, compressive sensing method by randomize measurement matrix is combined with the Wiener filter to reduce the noisy speech signal to produce high signal to noise ratio. The PESQ is used to measure the quality of the proposed algorithm design. Experimental results showthe effectiveness of our proposed algorithm to enhance noisy signals corrupted by various noises compared to other traditional algorithms, in which high PESQ scores were achieved across various noises and different SNRs.
Development of Efficient Iris Identification Algorithm using Wavelet Packets for Smartphone Application Teddy Surya Gunawan; Nurul Shaieda Solihin; Malik Arman Morshidi; Mira Kartiwi
Indonesian Journal of Electrical Engineering and Computer Science Vol 8, No 2: November 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v8.i2.pp450-456

Abstract

Nowadays, iris recognition is widely used for personal identification and verification based on biometrical technology, especially in the smartphone arena. By having this iris recognition for identification and verification, the smartphone will be secured since every person have their own iris type. In this paper, we proposed an efficient iris recognition using Wavelet Packets and Hamming distance which has lightweight computational requirements while maintaining the accuracy. There are several steps needed in order to recognize the iris which are pre-processing the iris image consists of segmentation and normalization, extract the feature that available in the iris image and identify this image to see whether it match with the person or not. For comparison purposes, different types of wavelet bases will be compared, including symlets, discrete meyer, biorthogonals, daubechies, and coiflets. Performance of the proposed algorithm was tested on Chinese Academy of Sciences Institute of Automation (CASIA) iris image database. The optimum wavelet basis function obtained is symlet. Results showed that the accuracy of the proposed algorithm is 100% identification rate.
Performance evaluation of portable air quality measurement system using raspberry pi for remote monitoring Muhammad Farhan Mohd Pu’ad; Teddy Surya Gunawan; Mira Kartiwi; Zuriati Janin
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 2: February 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i2.pp564-574

Abstract

United Nations’ Sustainable Development Goals focuses on good health and well-being for all. Air pollution becomes a huge threat to delivering on the vision of a better world and related at least to Goal 3, 7, 11, and 13. In Malaysia, air pollution index were monitored on 68 locations. The Department of Environment monitors air quality using costly continuous air quality monitoring stations (CAQMs) installed at fixed locations of highly populated and industrial areas. The objective of this paper is to develop a portable air quality measurement system which can measure particulate matters (PM) smaller than 10 and 2.5 microns, and four hazardous gasses, including carbon monoxide, sulphur dioxide, ground level ozone and nitrogen dioxide, as well as humidity and temperature. Six sensors were used and validated using several rigorous experiments. The functionality of the system was evaluated by measuring sub-API readings in areas with low and high traffic volumes. Experimental results showed that the proposed system was highly responsive and able to detect the types and concentrations of air pollutants instantly. Furthermore, equipped with the mobile internet, geo-tagged GPS location and web server on Raspberry Pi, the developed portable system could be accessed remotely.
On the Use of Edge Features and Exponential Decaying Number of Nodes in the Hidden Layers for Handwritten Signature Recognition Teddy Surya Gunawan; Mira Kartiwi
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i2.pp722-728

Abstract

Handwritten signatures are playing an important role in finance, banking and education and more because it is considered the “seal of approval” and remains the most preferred means of authentication. In this paper, an offline handwritten signature authentication algorithm is proposed using the edge features and deep feedforward neural network (DFNN). The number of hidden layers in DFNN is configured to be at least one layer and more. In this paper, an exponential decaying number of nodes in the hidden layers was proposed to achieve better recognition rate with reasonable training time. Of the six edge algorithms evaluated, Roberts operator and Canny edge detectors were found to produce better recognition rate. Results showed that the proposed exponential decaying number of nodes in the hidden layers outperform other structure. However, more training data was required so that the proposed DFNN structure could have more efficient learning.