Claim Missing Document
Check
Articles

Found 39 Documents
Search

Perancangan Manajemen Risiko Keamanan Sistem Informasi Manajemen Sumber Daya dan Perangkat Pos dan Informatika (SIMS) Menggunakan Metode NIST 800-30 Muhammad Salmon Hardani; Kalamullah Ramli
JURIKOM (Jurnal Riset Komputer) Vol 9, No 3 (2022): Juni 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/jurikom.v9i3.4181

Abstract

The development of an information system used in a government institution becomes very important if the system is part of storing data that is a state asset. SIMS contains data on frequency spectrum users who already have permits and contribute to Non-Tax State Revenue (PNBP). SIMS consists of public service applications and non-public service applications. In this study, an evaluation of SIMS risk management was developed using the NIST 800-30 framework. This research begins with risk identification, risk mitigation and evaluation of existing risks then provides recommendations for the control needed for SIMS.The results of the documentation of the information security risk assessment stages on SIMS using the NIST 800-30 method, it is necessary to take risk control and risk mitigation actions
ANALISIS DISTRIBUSI PROBABILITAS DAN KENDALI OPTIMAL PERSIMPANGAN = PROBABILITY DISTRIBUTION ANALYSIS AND OPTIMAL CONTROL INTERSECTION Mulyadi Sinung Harjono; Wimpie A.N Aspar; Abdul Halim; Kalamullah Ramli
Majalah Ilmiah Pengkajian Industri Vol. 9 No. 1 (2015): Majalah Ilmiah Pengkajian Industri
Publisher : BRIN

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29122/mipi.v9i1.92

Abstract

Abstract Research traffic dynamics modeling requires the enumeration of traffic flow data on many road network nodes. Information enumeration traffic flows are applied to the analysis model of the road network control or control the intersection area, either as a standalone junction (isolated) and the coordinative intersection. Classification of types and traffic conditions used for this control is determined by ITS transportation management policy or government. Estimation and prediction of traffic conditions in real terms are based on information obtained by traffic counting. Counting of traffic flows is aimed to determine the probability distribution function (pdf) traffic flow for the intersection of two segments, namely Jalan Kyai Haji Wahid Hasyim - Jalan Mohammad Husni Thamrin and Jalan Kebun Sirih - Jalan Mohammad Husni Thamrin, Jakarta, Indonesia. Signalized intersection is composed of roads with 12 lanes and 4 lanes with traffic signs and fixtures actuated traffic control system using historical data. Based on the evolution of the combined token, it was obtained fundamental equation for the evolution of the token. Based on the modeling, the needs of departure vehicle for red light violators and breakthrough yellow light, it would require further development to SimHPN. Modeling and simulation of hybrid Petri nets on this research are aimed to perform optimal control system for traffic flow, the number of vehicles at intersections, in order to obtain optimal current flow in the study area. Abstrak Penelitian pemodelan dinamika lalu-lintas memerlukan data pencacahan arus lalu-lintas (traffic counting) pada banyak simpul jaringan jalan. Informasi pencacahan arus lalu-lintas tersebut dipergunakan untuk analisa model pengendalian jaringan jalan ataupun pengendalian area persimpangan, baik sebagai persimpangan mandiri (isolated) maupun persimpangan koordinatif. Penggolongan jenis dan kondisi lalu-lintas yang dipergunakan untuk pengendalian ini ditentukan oleh kebijakan manajemen transportasi ITS ataupun pemerintah. Estimasi dan prediksi kondisi lalu-lintas secara riil diperoleh berdasarkan informasi hasil pencacahan arus lalu-lintas. Pencacahan arus lalulintas bertujuan untuk menentukan fungsi distribusi probabilitas (pdf) arus lalulintas untuk dua ruas persimpangan, yaitu Jalan Kyai Haji Wahid Hasyim - Jalan Mohammad Husni Thamrin dan Jalan Kebon Sirih - Jalan Mohammad Husni Thamrin, Jakarta Indonesia. Persimpangan bersinyal ini tersusun atas ruas jalan dengan 12 lajur dan 4 lajur dengan rambu lalu-lintas dan perlengkapan actuated traffic control system menggunakan data historical. Berdasarkan evolusi token gabungan diperoleh persamaan fundamental untuk evolusi token. Berdasarkan kebutuhan pemodelan keberangkatan kendaraan untuk pelanggar lampu merah dan penerobos lampu kuning, maka diperlukan pengembangan lebih lanjut terhadap SimHPN. Pemodelan dan simulasi dengan hybrid Petri nets pada penelitian ditujukan untuk melakukan sistem kendali optimal terhadap arus lalulintas, jumlah kendaraan di persimpangan, sehingga diperoleh aliran arus optimal pada area penelitian.
A Real-time Application Framework for Web-Based Speech Recognition Using HTTP/2 and SSE Kalamullah Ramli; Asril Jarin; Suryadi Suryadi
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i3.pp1230-1238

Abstract

The performance of network-based speech recognition application is mainly determined by the availability of all speech data received on the server and also the realtimeness in delivering the recognition results from the server. On the basis of full-duplex speech recognition application this paper proposes a real-time application framework for web speech recognition using HTTP/2 protocol and Sender-Sent Events (SSE). A number of experiments were performed to compare the latency of both the application using HTTP/2 plus SSE and the full-duplex application using WebSocket. The results showed that the proposed framework offers better alternative for a web-based speech recognition than the framework using WebSocket.
Packet Delay Distribution Model for Investigating Delay of Network Speech Recognition Asril Jarin; Suryadi Suryadi; Kalamullah Ramli
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 1: January 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i1.pp11-18

Abstract

Unlike multimedia streaming applications that require a smooth playback at the client, application of network speech recognition (NSR) that recognizes speech signal in a sentence-by-sentence manner might tolerate an acceptable delay. The acceptable delay is a user-defined time in which the entire sentence data should be received by the server. We proposed a calculation method to investigate the acceptable delay of network speech recognition that employs a speech segmenter to send speech signal sentence-by-sentence over TCP channel to the server. The calculation multiplies the mean packet delay of TCP flow at steady-state with the number of created packets. For validation we implemented a MATLAB program and solved it using 2500 Indonesian speech sentences. The results were then compared with the results of our previous model that used a transient analysis method. It was found that this calculation method is not appropriate due to the transient behavior of the streaming sentences.
Integrating Passenger and Modulo as Learning Tools for Collaborative Engineering Education Ramli, Kalamullah; Schwarz, Frank; Werner, Stefan; Shamsuddin, A Halim; Hunger, Axel
Makara Journal of Technology Vol. 6, No. 1
Publisher : UI Scholars Hub

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The University of Indonesia (UI), Gerhard Mercator University (GMU), the Universiti Kebangsaan Malaysia (UKM) have agreed to cooperate as partners to develop a joint bachelor (3+1) and masters (1+1) degree, and collaborate in the research fi elds of multimedia- and internet-based learning and application level active networks. This paper describes the introduction of the Offshore Project and the extending of information technology applications to the partner institutions in this international cooperation which would very much enhance the operations of the new initiative in engineering education, which could provide students in far distance with more fl exible learning environment.
The Development of Cybersecurity Information Sharing Framework for National Critical Information Infrastructure in Indonesia Farouq Aferudin; Kalamullah Ramli
Budapest International Research and Critics Institute-Journal (BIRCI-Journal) Vol 5, No 3 (2022): Budapest International Research and Critics Institute August
Publisher : Budapest International Research and Critics University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33258/birci.v5i3.6297

Abstract

The increase of cyber attacks in the Critical Information Infrastructure (CII) requires every organization to collaborate through Cybersecurity Information Sharing (CIS). To support the implementation of the CIS, governance support is needed in the form of a framework that can be used as a reference. This study focuses on developing a CIS framework for the CII sector in Indonesia which consists of three main outputs, namely the proposed ecosystem, the proposed framework and the recommendations for the implementation of the framework. The proposed framework is based on standards including ISO/IEC 27032, NIST SP 800-150 and ENISA ISAC in a Box, based on best practices for implementing CIS and best practices for implementation in other countries including the United States, Australia, United Kingdom, Singapore and Canada. To validate, the expert judgment method was used to obtain suggestions for improvement. The expert judgment method was also carried out quantitatively to measure interrater reliability between experts using Fleiss Kappa Statistics. The measurement results show a kappa value of 0.938, which means that the proposed framework implementation recommendation gets an agreement from the experts at the almost perfect agreement level.
Hypertension prediction using machine learning algorithm among Indonesian adults Rico Kurniawan; Budi Utomo; Kemal N. Siregar; Kalamullah Ramli; Besral Besral; Ruddy J. Suhatril; Okky Assetya Pratiwi
IAES International Journal of Artificial Intelligence (IJ-AI) Vol 12, No 2: June 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijai.v12.i2.pp776-784

Abstract

Early risk prediction and appropriate treatment are believed to be able to delay the occurrence of hypertension and attendant conditions. Many hypertension prediction models have been developed across the world, but they cannot be generalized directly to all populations, including for Indonesian population. This study aimed to develop and validate a hypertension risk-prediction model using machine learning (ML). The modifiable risk factors are used as the predictor, while the target variable on the algorithm is hypertension status. This study compared several machine-learning algorithms such as decision tree, random forest, gradient boosting, and logistic regression to develop a hypertension prediction model. Several parameters, including the area under the receiver operator characteristic curve (AUC), classification accuracy (CA), F1 score, precision, and recall were used to evaluate the models. Most of the predictors used in this study were significantly correlated with hypertension. Logistic regression algorithm showed better parameter values, with AUC 0.829, CA 89.6%, recall 0.896, precision 0.878, and F1 score 0.877. ML offers the ability to develop a quick prediction model for hypertension screening using non-invasive factors. From this study, we estimate that 89.6% of people with elevated blood pressure obtained on home blood pressure measurement will show clinical hypertension.
Secure Cybersecurity Information Sharing for Sectoral Organizations Using Ethereum Blockchain and IPFS Tony Haryanto; Kalamullah Ramli
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 7 No 3 (2023): Juni 2023
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v7i3.4956

Abstract

The COVID-19 pandemic has resulted in increased cross-sector cyber-attacks. Passive and reactive cybersecurity techniques relying solely on technology are insufficient to combat sophisticated attacks, necessitating proactive and collaborative security measures to minimize attacks. Cybersecurity Information Sharing (CIS) enhances security via proactive and collaborative cybersecurity information exchange, but its implementation via cloud services faces threats from man in the middle (MITM) and distributed denial of service (DDoS) attacks, as well as a vulnerability in cloud storage involving centralized data control. These threats and vulnerabilities result in a lack of user confidence in the confidentiality, integrity, and availability of information. This paper proposes Secure Cybersecurity Information Sharing (SCIS) to secure Cybersecurity Information in sectoral organizations using the private interplanetary file system (IPFS) network and the private Ethereum Blockchain network. Private Ethereum Blockchain enables secure and transparent transaction logging, while Private IPFS network provides decentralized storage, addressing vulnerabilities in centralized storage systems. The outcomes of the tests reveal that the suggested SCIS system offers cybersecurity information availability, confidentiality, and integrity. SCIS provides a high level of security to protect cybersecurity information exchanged between sectoral organizations using the Private Ethereum Blockchain network and the Private IPFS network so that organizations can safely share and utilize information.
Towards Improving 5G Quality of Experience: Fuzzy as a Mathematical Model to Migrate Virtual Machine Server in The Defined Time Frame Taufik Hidayat; Kalamullah Ramli; R. Deiny Mardian; Rahutomo Mahardiko
Journal of Applied Engineering and Technological Science (JAETS) Vol. 4 No. 2 (2023): Journal of Applied Engineering and Technological Science (JAETS)
Publisher : Yayasan Riset dan Pengembangan Intelektual (YRPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37385/jaets.v4i2.1646

Abstract

The industry and government have recently acknowledged and used virtual machines (VM) to promote their businesses. During the process of VM, some problems might occur. The issues, such as a heavy load of memory, a large load of CPU, a massive load of a disk, a high load of network and time-defined migration, might interrupt the business processes. This paper identifies the migration process among hosts for VM to overcome the problem within the defined time frame of migration. The introduction of VMs migration in a timely manner is to detect a problem earlier. There are workload parameters, such as network, CPU, disk and memory as our parameters. To overcome the issue, we have to follow the Model named Fuzzy rule. The rule follows the basic of tree model for decision-making. The application of the fuzzy Model for the study is to determine VMs allocation from busy VMs to vacant VMs for balancing purposes. The result of the study showed that the use of the fuzzy Model to forecast VMs migration based on the defined rule had 2 positive impacts. The positive impacts are (1) Time frame live migration of VMs can reduce workload by 80 %. This aims to reduce failures in performing a live migration of VMs to increase data center performance. (2) In testing, the fuzzy Model can provide results with an accuracy of 90 %, so this model can perform a live migration of VMs precisely in determining the execution time. Next, the workload could be balanced among VMs. This research could be used further to improve 5G Quality of Experience (QoE) shortly.
INFORMATION SECURITY RISK MANAGEMENT DESIGN OF SUPERVISION MANAGEMENT INFORMATION SYSTEM AT XYZ MINISTRY USING NIST SP 800-30 Ricko Dwi Pambudi; Kalamullah Ramli
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.3.978

Abstract

SIMWAS is an information system at the XYZ Ministry that is used to manage supervisory activities and follow up on supervisory results. SIMWAS is an important asset that contains all internal control business processes, but in practice, SIMWAS information security risks have not been managed properly. To overcome these problems, information security risk management is needed at SIMWAS. This study aims to design and analyze SIMWAS information security risk management using the NIST SP 800-30 framework. NIST SP 800-30 focuses on a particular infrastructure and its boundaries. Since the purpose is to perform a technical risk analysis of the core IT infrastructure, it is highly prescriptive. It has nine primary steps to conduct risk assessment. The NIST SP 800-30 framework is used to design and analyze SIMWAS information security risks by identifying threats, vulnerabilities, impacts, likelihoods, and recommendations for controls. SIMWAS information security risk assessment is carried out by analyzing data obtained from the results of interviews, observations, and document reviews. The results of this study show that SIMWAS information security has four low-level risks, eight moderate-level risks, and five high-level risks. Very low and low risk levels are acceptable according to the risk appetite of the business owner, but moderate, high, and very high-risk levels require risk avoidance, risk transfer and risk reduction. The XYZ Ministry need to carry out residual risk analysis and cost-benefit analysis from implementing controls in each risk scenarios.