Claim Missing Document
Check
Articles

Found 7 Documents
Search
Journal : Indonesian Journal of Electrical Engineering and Computer Science

Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks Teddy Surya Gunawan; Muhammad Kasim Lim; Mira Kartiwi; Noreha Abdul Malik; Nanang Ismail
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i2.pp729-737

Abstract

Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, and other mobile devices connected to Internet are exposed to various threats and exploits. Of the various attacks, SQL injection, cross site scripting, Wordpress, and WPA2 attack were the most popular security attacks and will be further investigated in this paper. Kali Linux provides a great platform and medium in learning various types of exploits and peneteration testing. All the simulated attack will be conducted using Kali Linux installed on virtual machine in a compuer with Intel Core i5 and 8 GB RAM, while the victim’s machine is the host computer which run Windows 10 version 1709. Results showed that the attacks launched both on web and firewall were conducted successfully.
Artificial Neural Network Based Fast Edge Detection Algorithm for MRI Medical Images Teddy Surya Gunawan; Iza Zayana Yaacob; Mira Kartiwi; Nanang Ismail; Nor Farahidah Za'bah; Hasmah Mansor
Indonesian Journal of Electrical Engineering and Computer Science Vol 7, No 1: July 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v7.i1.pp123-130

Abstract

Currently, magnetic resonance imaging (MRI) has been utilized extensively to obtain high contrast medical image due to its safety which can be applied repetitively. Edges are represented as important contour features in the medical image since they are the boundaries where distinct intensity changes or discontinuities occur. Many traditional algorithms have been proposed to detect the edge, such as Canny, Sobel, Prewitt, Roberts, Zerocross, and Laplacian of Gaussian (LoG). Moreover, many researches have shown the potential of using Artificial Neural Network (ANN) for edge detection. Although many algorithms have been conducted on edge detection for medical images, however higher computational cost and subjective image quality could be further improved. Therefore, the objective of this paper is to develop a fast ANN based edge detection algorithm for MRI medical images. First, we developed features based on horizontal, vertical, and diagonal difference. Then, Canny edge detector will be used as the training output. Finally, optimized parameters will be obtained, including number of hidden layers and output threshold. Results showed that the proposed algorithm provided better image quality while it has faster processing time around three times time compared to other traditional algorithms, such as Sobel and Canny edge detector.
Development of Photo Forensics Algorithm by Detecting Photoshop Manipulation using Error Level Analysis Teddy Surya Gunawan; Siti Amalina Mohammad Hanafiah; Mira Kartiwi; Nanang Ismail; Nor Farahidah Za'bah; Anis Nurashikin Nordin
Indonesian Journal of Electrical Engineering and Computer Science Vol 7, No 1: July 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v7.i1.pp131-137

Abstract

Nowadays, image manipulation is common due to the availability of image processing software, such as Adobe Photoshop or GIMP. The original image captured by digital camera or smartphone normally is saved in the JPEG format due to its popularity. JPEG algorithm works on image grids, compressed independently, having size of 8x8 pixels. For unmodified image, all 8x8 grids should have a similar error level. For resaving operation, each block should degrade at approximately the same rate due to the introduction of similar amount of errors across the entire image. For modified image, the altered blocks should have higher error potential compred to the remaining part of the image. The objective of this paper is to develop a photo forensics algorithm which can detect any photo manipulation. The error level analysis (ELA) was further enhanced using vertical and horizontal histograms of ELA image to pinpoint the exact location of modification. Results showed that our proposed algorithm could identify successfully the modified image as well as showing the exact location of modifications.
Prototype Design of Smart Home System using Internet of Things Teddy Surya Gunawan; Intan Rahmithul Husna Yaldi; Mira Kartiwi; Nanang Ismail; Nor Farahidah Za'bah; Hasmah Mansor; Anis Nurashikin Nordin
Indonesian Journal of Electrical Engineering and Computer Science Vol 7, No 1: July 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v7.i1.pp107-115

Abstract

Smart home control system can be integrated into an existing home appliances to reduce the need for human intervention, increase security and energy efficiency. However, it is still an open problem due to difficulties such as network distance, signal interference, not user friendly, increased cost and power consumption. This paper reviews various topics on smart home technologies including control system, smart home network, smart home appliance and sensor technologies for smart home. In this research, the proposed prototype of home automation allows users to remotely switch on or off any household appliance based on Internet of Things (IoT) with the enhancement of solar charger. The smartphone and/or tablet replaces the manual use of personal computer without the need for high additional cost. This prototype uses four types of sensors i.e. PIR sensor, temperature sensor, ultrasonic sensor and smoke gas sensor for automatic environmental control and intrusion detection.
Implementation of Fuzzy Logic Control System on Rotary Car Parking System Prototype Nanang Ismail; Iim Nursalim; Hendri Maja Saputra; Teddy Surya Gunawan
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i2.pp706-715

Abstract

Rotary car parking system (RCPS) is one of the effective parking models used in the metropolitan area because the mechanical parking system is designed vertically to conserve the land usage. This paper discussed the implementation of fuzzy logic with the Sugeno Inference Model on the RCPS miniature control system. The research started with kinematics analysis and a mathematical model was derived to determine the slot position and optimal power requirements for each condition. Furthermore, the Fuzzy Inference model used was the Sugeno Model, taking into account two variables: distance and angle. These two variables were selected because in the designed miniature RCPS there will be rotational changes of rotation and rotation in turn. Variable distance was divided into four clusters, such as Zero, Near, Medium and Far. While the angle variables were divided into four clusters as well, such as Zero, Small, Medium, and Big. The test results on a miniature RCPS consisting of six parking slots showed that fuzzy based control provided better results when compared to conventional systems. Step response on the control system without fuzzy control showed the rise time value of 0.58 seconds, peak time of 0.85 seconds, settling time of 0.89, percentage overshoot of 0.20%, and steady state error of 4.14%. While the fuzzy control system provided the rise time value of 0.54 seconds, settling time of 0.83 seconds, steady state error of 2.32%, with no overshoot.
Concealment of Files Blocked by Gmail with EOF-Based Image Steganography Ichsan Taufik; Undang Syaripudin; Faiz M. Kaffah; Jaka Giri Sobirin; Nanang Ismail; Teddy Surya Gunawan
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i2.pp716-721

Abstract

Nowadays, due to security concern, not all the process of sending files via email runs smoothly. There are several types of file extensions that are blocked when sent via email. For examples, there are several file extensions blocked by Gmail. This paper discusses steganographic implementation using End of File (EOF) algorithm to insert special file into image cover file with JPG and PNG format so that files with these extensions can be sent via email. Before a special extension file is inserted into the cover file, a compression process should be conducted first to make the file size smaller. The proposed algorithm is implemented on Visual Basic.Net software. Based on the tests performed, the application can insert Gmail-blocked file system to the image cover file, without changing the physical bit of the image cover file or file system that inserted with 100% success rate. The stego-image file is also successfully sent via email without being blocked.
Deriving equivalent structure of elements for low density parity check codes construction Jenjen Ahmad Zaeni; Fandy Ali Muzhofi; Cecep Solehudin; Khoirul Anwar; Nanang Ismail
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 1: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i1.pp144-156

Abstract

This paper proposes a method to derive equivalent coding structures of elements to construct low density parity check (LDPC) codes. We propose stairs LDPC (SLDPC) codes to demonstrate the effectiveness of the proposed method, which is expected to be beneficial for short block-length transmissions, but providing high coding rate. The equivalent coding structures are both for transmitter and receiver to: (i) reduce the encoding and decoding computational complexity, and (ii) search possibility of finding new coding scheme and observe their performances. We evaluate the validity of the method by confirming the equality in performances of the SLDPC codes in terms of bit-error-rate (BER) followed by investigation on their performance gaps to the Shannon limit via a series of computer simulations. The results show that the SLDPC codes have the same BER performance with that of the low density generator matrix (LDGM) codes confirming the validity of the proposed equivalent matrix derivation. This result indicates that different graphs can provide the same performances, because their equivalent matrices are the same. This result is expected to open new insight for the designing simple channel coding for short block-length LDPC codes having high coding rate for future less power consumption applications.