Claim Missing Document
Check
Articles

A Hybrid Model Schema Matching Using Constraint-Based and Instance-Based Edhy Sutanta; Retantyo Wardoyo; Khabib Mustofa; Edi Winarko
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 3: June 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (238.058 KB) | DOI: 10.11591/ijece.v6i3.pp1048-1058

Abstract

Schema matching is an important process in the Enterprise Information Integration (EII) which is at the level of the back end to solve the problems due to the schematic heterogeneity. This paper is a summary of preliminary result work of the model development stage as part of research on the development of models and prototype of hybrid schema matching that combines two methods, namely constraint-based and instance-based. The discussion includes a general description of the proposed models and the development of models, start from requirement analysis, data type conversion, matching mechanism, database support, constraints and instance extraction, matching and compute the similarity, preliminary result, user verification, verified result, dataset for testing, as well as the performance measurement. Based on result experiment on 36 datasets of heterogeneous RDBMS, it obtained the highest P value is 100.00% while the lowest is 71.43%; The highest R value is 100.00% while the lowest is 75.00%; and F-Measure highest value is 100.00% while the lowest is 81.48%. Unsuccessful matching on the model still happens, including use of an id attribute with data type as autoincrement; using codes that are defined in the same way but different meanings; and if encountered in common instance with the same definition but different meaning.
Increasing the Detail and Realism in Web3D Distributed World Mursid Wahyu Hananto; Ahmad Ashari; Khabib Mustofa; Agus Harjoko
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 5: October 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i5.10113

Abstract

A complex and detailed Web3D world which represented the physical form of an institution is very difficult to be built. To simplify the work, raster images taken from the real structure were heavily utilized. However, this method has resulted in Web3D sites which were low on detail and having minimum level of realism. To overcome this deficiency, it is proposed to maximize the use of polygons. Experiment was done by re-developing the sample world with minimum use of raster images and applying polygons to 92% parts of the site. Site elements were also distributed to three servers to cope with bottleneck problem often occured when using only one server. The result was evaluated in a series of tests to see its viewing capabilities when displayed inside the web browser against various conditions, and it also evaluated in an acceptance test carried out by site users. The majority of testers felt immensely familiar with the details shown by the model as they were able to grab a more close-to-realistic experience like a real-world walk around inside the actual building complex. Problems that often occur whe using only one server ca also be reduced by using distributed world method.
STRATEGI PENGEMBANGAN WEB SERVICES UNTUK INTEGRASI ANTAR SISTEM APLIKASI DAN WEBSITE DALAM E-GOVERNMENT DI PEMKAB BANTUL YOGYAKARTA Edhy Sutanta; Khabib Mustofa
SISFOTENIKA Vol 2, No 2 (2012): SISFOTENIKA
Publisher : STMIK PONTIANAK

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (249.595 KB) | DOI: 10.30700/jst.v2i2.66

Abstract

Abstract: Bantul District Government has been developing e-Gov applications through the development of application systems 28 and 34 websites, and the two GIS-based applications. Application system is used for internal data processing needs, while the website and GIS-based application used to display the content information to the public. One application of ICT is an urgent problem to be addressed by the Bantul regency is how to integrate data between systems and between the existing website in order to provide accurate nd consistent information. This problem arises because each application system and website are still using the separately database, and the development of new systems are always developed a new database and repeat the data entry process from initial. This paper reveals how to utilize the potential national people database in the e-ktp systems and integration in 17 priority application systems and 21 existing website. Three strategies for integration between the proposed system is to utilize the population as a master database, web services development strategies, and web services modeling strategy. By using the national people database, then the system of existing applications and websites can be communicated with each other through the mechanism of data exchange services using web services. By using a single source of verified data, then the system of existing applications and websites will result in an accurate and consistent information. Keywords: Bantul regency, database, e-government, integration, web services.
Komunikasi Agen Pencarian Dokumen dengan Ontologi Muhammad Hasbi; Khabib Mustofa
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2013
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Komunikasi antar agen menggunakan ACL Message, sedangkan dalam implementasi konten yang dikomunikasikan agak komplek sehingga untuk mempermudah akses konten yang dikomunikasikan diperlukan mekanisme semantik bahasa yang dapat menyamakan persepsi antar dua agen yang sedang berkomunikasi. Makalah ini menyajikan implementasi komunikasi antar agen dalam mencari dokumen surat di suatu instansi. Metode komunikasi yang digunakan dengan ontologi yang berfungsi membakukan format konten pesan komunikasi yang dipertukarkan antar agen. Hasil dari makalah ini adalah konsep dasar komunikasi antar agen menggunakan CLOnto (Content Language Ontology) dalam pencarian surat disposisi.
Towards Formal Specification of PaperLess Office Systems Bambang Nurcahyo Prastowo; Jazi Eko Istiyanto; Ahmad Ashari; Khabib Mustofa
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2015
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract—The Center for Information and CommunicationTechnology Services of Gadjah Mada University runs a kind offormal office communication system called PLO (stands forPaperLess Office). Developed to serve ad hoc needs of the center,the system evolves for several years without properdocumentation. Several attempt store write the system failed dueto the lack of the documentations. Judging from the fact that it hasbeen serving the institution well for several years, the system canbe treated as a user requirement. A formal specification is writtenbased on it.Keywords—formal specification; paperless office; informationsystem
KAJIAN MODEL DAN PROTOTIPE SCHEMA MATCHING (Studi untuk Menemukan Peluang Pengembangan Model dan Prototipe Baru) Edhy Sutanta; Retantyo Wardoyo; Khabib Mustofa; Edi Winarko
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2015
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract—Schema matching is critical problem within manyapplications to integration of data / information, to achieveinteroperability, and other cases caused by schematic heterogeneity.Models and the schema matching methods evolved from manualway on a specific domain, leading to a new models and methodsthat are semi-automatic and more general, so it is able to effectivelydirect the user within generate a mapping among elements of twothe schema or ontologies better. This paper is a summary ofliterature review on research and publication on models, methods,and prototypes on schema matching within the last 25 years todescribe the progress of and research opportunities on a newmodels, methods, and prototypes.Keywords—model, hybrid model, prototipe, schema matching
Teaching descriptive statistics using R Dedi Rosadi; Khabib Mustofa; Iman Sanjaya; Hendra Perdana; Krisna Mutiara Wati
Proceedings of The Annual International Conference, Syiah Kuala University - Life Sciences & Engineering Chapter Vol 3, No 2 (2013): Engineering
Publisher : Syiah Kuala University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (84.797 KB)

Abstract

In this paper, we introduce the application of R for teaching statistics descriptive subject which is usually given in the undergraduate statistics course. As an illustration, we will consider the use of R for teaching the subject frequency distribution table, both using the R-CLI and R-GUI version. The R-GUIversion used here is a part of Rplugin.SPSS which is currently under our extensive development. Rplugin.SPSS is a R Commander Plugin, which is a reorganized and an extented version of the menu of Statistics in R-Commander, a SPSS-like version menu. It can be also considered as the extended version of Rplugin.Econometrics (Rosadi, 2010). Further details and further examples can be found in Rosadi (2011,2013).
Goal-Oriented Requirements Engineering: State of the Art and Research Trend Rosa Delima; Retantyo Wardoyo; Khabib Mustofa
JUITA : Jurnal Informatika JUITA Vol. 9 No. 1, May 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1062.134 KB) | DOI: 10.30595/juita.v9i1.9827

Abstract

The Goal-Oriented Requirements Engineering (GORE) is one approach that is widely used for the early stages of software development. This method continues to develop in the last three decades. In this paper, a literature study is conducted to determine the GORE state of the art. The study begins with a Systematic Literature Review (SLR) was conducted to determine the research trend in the last five years. This study reviewed 126 papers published from 2016 to 2020.  The research continues with the author's search for scientific articles about GORE. There are 26 authors who actively publish GORE research results. Twenty-six authors were grouped into seven groups based on their relation or co-authoring scientific articles. An in-depth study of each group resulted in a holistic mapping of GORE research.  Based on the analysis, it is known that most research focuses on improving GORE for an automated and reliable RE process, developing new models/frameworks/methods originating from GORE, and implementing GORE for the RE process. This paper contributes to a holistic mapping of the GORE approach. Through this study, it is known the various studies that are being carried out and research opportunities to increase automation in the entire RE process.
An extended approach of weight collective influence graph for detection influence actor Galih Hendro Martono; Azhari Azhari; Khabib Mustofa
International Journal of Advances in Intelligent Informatics Vol 8, No 1 (2022): March 2022
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26555/ijain.v8i1.800

Abstract

Over the last decade, numerous methods have been developed to detect the influential actors of hate speech in social networks, one of which is the Collective Influence (CI) method. However, this method is associated with unweighted datasets, which makes it inappropriate for social media, significantly using weight datasets. This study proposes a new CI method called the Weighted Collective Influence Graph (WCIG), which uses the weights and neighbor values to detect the influence of hate speech. A total of 49, 992 Indonesian tweets were and extracted from Indonesian Twitter accounts, from January 01 to January 22, 2021. The data collected are also used to compare the results of the proposed WCIG method to determine the influential actors in the dissemination of information. The experiment was carried out two times using parameters ∂=2 and ∂=4. The results showed that the usernames bernacleboy and zack_rockstar are influential actors in the dataset. Furthermore, the time needed to process WCIG calculations on HPC is 34-75 hours because the larger the parameter used, the greater the processing time.
Detecting A Botnet By Reverse Engineering Oesman Hendra Kelana; Khabib Mustofa
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 1 (2011): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2008

Abstract

Abstract— Botnet malware is a malicious program. Botnet that infects computers, called bots, will be controlled by a botmaster to do various things such as: spamming, phishing, keylogging Distributed Denial of Service (DDoS) and other activities that are generally profitable to the owner of the bot (botmaster) or those who use botnet services. The problem is that many computers have been controlled by botnets without the knowledge of the computer owner.  There are many ways to examine botnets, for example by studying the traffic from the botnet network, studying how botnets communicate to each, studying how each robot receives orders to do something, and so forth. Of the many methods, the most frequently and commonly used is the reverse engineering, where researchers study how a botnet works by botnet debugging.In this study the author tries to understand or research botnets by taking a type of botnet, namely Agobot, using reverse engineering.  One of the result of the research is that malware program files in general and in particular botnet has a technique to obscure the way that research using reverse engineering.Another result also shows that the botnet Agobot runs on computers by using the Windows service, and by changing the Windows registry so that every time the computer starts, Agobot always actively works in the computer memory.Keywords— Malware, Bot, Botnet, Botmaster, Agobot, Spam, Distributed Denial of Services, Identity Theft, Computer Security, Reverse Engineering, Debug, Windows Service, the Registry.