Claim Missing Document
Check
Articles

Found 4 Documents
Search
Journal : TELKOMNIKA (Telecommunication Computing Electronics and Control)

Entity Annotation WordPress Plugin using TAGME Technology William Aprilius; Seng Hansun; Dennis Gunawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 1: March 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i1.4631

Abstract

The development of internet technology makes more information can be accessed. It makes information need to be organized in order to be easily managed. One solution can be used is by using the entity annotation approach which generates tags to represent that document. In this study, TAGME technology is implemented on a WordPress plugin, which is used to manage a blog. Moreover, information on Wikipedia ‘Bahasa Indonesia’ is processed to generate an anchor dictionary which is required by the technology that is implemented. This plugin performs entity annotation by giving tag suggestion for posts in a blog. Testing is carried out by measuring the precision, recall, and  of tag suggestions given by the plugin. The result shows that the plugin can give tag suggestions with precision 0.7638, recall 0.5508, and  0.59.
Wi-Fi password stealing program using USB rubber ducky Hansen Edrick Harianto; Dennis Gunawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.11775

Abstract

A minute is all it takes for a hacker to gain informations from your computer, such as Wi-Fi password. Due to the limited capability of people to remember a lot of complex and unique password, people tend to use the same password for most of their account. This paper aimed to implement Wi-Fi password stealing program in USB Rubber Ducky using USB Rubber Ducky Scripting, Visual Basic Script, Web Server, Command Prompt, and Ducky Toolkit to obtain clear text Wi-Fi password that ever connected to the computer. In the testing phase, the success rate of Wi-Fi password stealing program reached 94.28% with 87.87% obtained personal password is still categorized as guessable password and the password reuse rate reached 81.81%. Thus, Wi-Fi password stealing program can be very dangerous as most of the personal password was used in lots of account and still categorized as guessable.
Guillou-quisquater protocol for user authentication based on zero knowledge proof Kevin Kusnardi; Dennis Gunawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.11754

Abstract

Authentication is the act of confirming the validity of someone’s personal data. In the traditional authentication system, username and password are sent to the server for verification. However, this scheme is not secure, because the password can be sniffed. In addition, the server will keep the user’s password for the authentication. This makes the system vulnerable when the database server is hacked. Zero knowledge authentication allows server to authenticate user without knowing the user’s password. In this research, this scheme was implemented with Guillou-Quisquater protocol. Two login mechanisms were used: file-based certificate with key and local storage. Testing phase was carried out based on the Open Web Application Security Project (OWASP) penetration testing scheme. Furthermore, penetration testing was also performed by an expert based on Acunetix report. Three potential vulnerabilities were found and risk estimation was calculated. According to OWASP risk rating, these vulnerabilities were at the medium level.
Bershca: bringing chatbot into hotel industry in Indonesia Dennis Gunawan; Farica Perdana Putri; Hira Meidia
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 2: April 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i2.14841

Abstract

Adopting technology could give competitive advantage and positively impact the hotel’s profitability, thus hotels should keep up with the latest hotel technologies. An important part in the hotel services is the customer service. A problem with the human-to-human customer services today is a long time in answering customers query. On the other hand, nowadays customers need easy and effective services. Thus, a chatbot is required to answer consumers' issues automatically which leads to higher customer satisfaction and a growing profit. Because of the need and there is still an absence of chatbot for hotel industry in Indonesia, this study is conducted. The chatbot for hotel industry in Indonesia, named Bershca, has been successfully developed using artificial intelligence markup language (AIML) to construct the knowledge. Google Flutter is used for the system’s front-end, while Python is used for the back-end of the system. As a text-preprocessing method, Nazief-Adriani Algorithm is implemented in the system’s back-end. The system is evaluated using technology acceptance model (TAM). As a result, 85.7% of the respondents believe that using chatbot would enhance their job performance and 84.33% of the respondents believe that using the technology would be free of effort.