Claim Missing Document
Check
Articles

Evaluasi Keamanan Akses Jaringan Komputer Nirkabel (Kasus : Kantor Pusat Fakultas Teknik Universitas Gadjah Mada) Ida Bagus Verry Hendrawan Manuaba; Risanuri Hidayat; Sri Suning Kusumawardani
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 1 No 1: Februari 2012
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (380.51 KB) | DOI: 10.22146/jnteti.v1i1.3

Abstract

The growth of current wireless networks has increased rapidly. The growth of information technology and telecommunications technology requires interoperability, joint regulation and various solutions to solve the increasingly complex problems, such as computer network security issues on wireless networks. An evaluation is needed to maintain and re-assess the stability of the network to remain adequate. This research resulted a model as a result of evaluation that can be used as a useful recommendations to improve the security of a wireless computer network access which affects the performance on the network at the Headquarters of Engineering Faculty of Gadjah Mada University.
Reduksi Peak to Average Power Ratio (PAPR) Menggunakan Teknik Clipping Muhammad Fitrah Sugita; Risanuri Hidayat; Sri Suning Kusumawardani
Jurnal Nasional Teknik Elektro dan Teknologi Informasi Vol 1 No 1: Februari 2012
Publisher : Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik, Universitas Gadjah Mada

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (390.398 KB) | DOI: 10.22146/jnteti.v1i1.9

Abstract

Frequency Division Multiplexing (OFDM) has aweakness that lies at the high power variation. Power variationis stated in peak-to-avarage power ratio (PAPR). PAPR is the ratio between the maximum and average power of OFDM signal at the certain time frame. High PAPR value will result in nonlinear distortion when operating on non linear devices such as high power amplifier (HPA). Therefore, it is necessary to find way to reduce PAPR value. In this paper, we used PAPR reduction simulation using clipping techniques. PAPR reduction is done by clipping of the output signal of IFFT block which has a PAPR value exceeds the clipping level clipping value is determined by the ratio of the test using the clipping ratio is 0.8 and 1.4. Clipping provides complimentary cumulative effect of improving the quality of the distribution function (CCDF) and decreased quality of Bit Error Rate (BER). Finally, the smaller the value of the clipping ratio CCDF quality improvement will be higher and the BER degradation will be even greater.
Ontology-Based Social Media Talks Topic Classification (Twitter Case) Fransisca Julia Kusuma Deviyanti; Sri Suning Kusumawardani; Paulus Insap Santosa
IJITEE (International Journal of Information Technology and Electrical Engineering) Vol 3, No 1 (2019): March 2019
Publisher : Department of Electrical Engineering and Information Technology,Faculty of Engineering UGM

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (984.569 KB) | DOI: 10.22146/ijitee.46534

Abstract

In the era of digital communication, the use of Twitter as a customer service has been widely encountered. Companies have started to develop strategies around effective use of Twitter, one of which was to identify problems that customers frequently complain about. Twitter, with its straightforward tweet characteristics, will certainly contain sentences with very specific and easily recognizable keywords. These characteristics can be used as a basis for classifying tweets into certain topics. With a help of ontology, classification with keywords can be done automatically. The purpose of this paper is to design an ontology used as a basis for classifying tweets into certain topics related to the 4G telecommunications network in Indonesia and to evaluate performance of proposed classifier model.
A Multi Criteria Decision Making to Support Major Selection of Senior High School Adhistya Erna Permanasari; Marsetyo Wisaksono; Sri Suning Kusumawardani
IJITEE (International Journal of Information Technology and Electrical Engineering) Vol 3, No 4 (2019): Desember 2019
Publisher : Department of Electrical Engineering and Information Technology,Faculty of Engineering UGM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijitee.54427

Abstract

Senior high school students need to select a specialization, such as Mathematics and Natural Sciences, Social Sciences, or Language and Culture. This selection process can be improved by using Multi Criteria Decision Making (MCDM) methods. When MCDM methods are implemented, AHP method has accuracy of 61%, whereas AHP-Fuzzy TOPSIS 1 and AHP-Fuzzy TOPSIS 2 have accuracy of 75%. This research implements tests and analyzes new MCDM method, which is Hybrid MCDM Model, in helping aforementioned specialization selection process. There are four basic steps in Hybrid MCDM Model: performing experimental design to obtain attributes' weight and criteria, evaluating MCDM with the three existing methods, performing RSM regression to derive mathematical model, and decision making. This research introduces data normalization to the mathematical model which results in better implementation of Hybrid MCDM Model in the senior high school students' specialization selection process. Hybrid MCDM Model in the senior high school student specialization selection has accuracy of 86%, which includes 11% accuracy improvements compared to other applied MCDM methods.
Efisiensi ISO 27001, ISO 9001, dan Standar LPSE pada Data Center dan e-Procurement Pemerintahan Faradina Harumi; Lukito Edi Nugroho; Sri Suning Kusumawardani
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 6 No. 1 (2021): Januari 2021
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (202.232 KB) | DOI: 10.14421/jiska.2021.61-06

Abstract

National government and regional government are developing public service by communication and information network. Provided public service must be reliable, trusted, and reachable. To fulfil that, there are standards that need to be implemented for example ISO 27001, ISO 9001, and LPSE Standard. The purpose of this paper is to create efficiency in implementing ISO 27001, ISO 9001, and LPSE Standard with the scope of data center infrastructure and e-procurement service (LPSE). This paper uses qualitative method. The data obtained from primary and secondary data through a case study from government that has successfully implemented those standards. The result of this paper is mapping that shows intersection of similarity and difference between ISO 27001:2013, ISO 9001:2015, dan LPSE Standard and efficiency of document requirement which previously 50 to 24 documents only.
ISO 27001 Sebagai Metode Alternatif Bagi Perancangan Tata Kelola Keamanan Informasi (Sebuah Usulan Untuk Diterapkan di Arsip Nasional RI) Dicky Rutanaji; Sri Suning Kusumawardani; Wing Wahyu Winarno
Retii Prosiding Seminar Nasional ReTII ke-12 2017
Publisher : Institut Teknologi Nasional Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Seri ISO/IEC 27001 merupakan standar yang sering digunakan untuk mengetahui kebutuhan untuk menerapkan keamanan sistem informasi. Dengan penerapan ISO/IEC 27001 dapat melindungi aspek-aspek dari keamanan informasi yaitu confidentiality, integrity dan availability. Adanya tata kelola data pemerintahan yang efisien, transparan, inovatif dan patisipatif dalam hal ini keamanan data dan informasi akan memiliki peran penting dalam mewujudkan penyelenggaraan pemerintahan yang baik dan bersih. Oleh karena itu kemampuan untuk menyediakan informasi secara cepat dan akurat merupakan hal yang esensial. Salah satu bentuk dukungan dan penyelenggaraan keamanan informasi adalah dengan adanya tata kelola keamanan informasi (Information Security Governance) bagi pemerintahan. Paper ini dimaksudkan untuk menunjukkan kelebihan ISO 27001 sebagai sebuah metode yang paling cocok (fit) untuk digunakan dalam perancangan tata kelola keamanan informasi arsip digital berbasis komputasi awan di lingkungan Arsip Nasional RI.Kata Kunci: tata kelola, keamanan informasi, ISO 27001, komputasi awan
Machine Learning Untuk Estimasi Posisi Objek Berbasis RSS Fingerprint Menggunakan IEEE 802.11g Pada Lantai 3 Gedung JTETI UGM Chairani Chairani; Widyawan Widyawan; Sri Suning Kusumawardani
JURNAL INFOTEL Vol 7 No 1 (2015): May 2015
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v7i1.23

Abstract

Penelitian ini membahas tentang estimasi posisi (localization) objek dalam gedung menggunakan jaringan wireless atau IEEE 802.11g dengan pendekatan Machine Learning. Metode pada pengukuran RSS menggunakan RSS-based fingerprint. Algoritma Machine Learning yang digunakan dalam memperkirakan lokasi dari pengukuran RSS-based menggunakan Naive Bayes. Localization dilakukan pada lantai 3 gedung Jurusan Teknik Elektro dan Teknologi Informasi (JTETI) dengan luas 1969,68 m2 dan memiliki 5 buah titik penempatan access point (AP). Untuk membentuk peta fingerprint digunakan dimensi 1 m x 1 m sehingga terbentuk grid sebanyak 1893 buah. Dengan menggunakan software Net Surveyor terkumpul data kekuatan sinyal yang diterima (RSS) dari jaringan wireless ke perangkat penerima (laptop) sebanyak 86.980 record. Hasil nilai rata-rata error jarak estimasi untuk localization seluruh ruangan di lantai 3 dengan menggunakan algoritma Naive Bayes pada fase offline tahap learning adalah 6,29 meter. Untuk fase online dan tahap post learning diperoleh rata-rata error jarak estimasi sebesar 7,82 meter.
A Literature Review of Knowledge Tracing for Student Modeling : Research Trends, Models, Datasets, and Challenges Am, Ebedia Hilda; Hidayah, Indriana; Kusumawardani, Sri Suning
Journal of Information Technology and Computer Science Vol. 6 No. 2: August 2021
Publisher : Faculty of Computer Science (FILKOM) Brawijaya University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (900.101 KB) | DOI: 10.25126/jitecs.202162344

Abstract

Modeling students' knowledge is a fundamental part of online learning platforms. Knowledge tracing is an application of student modeling which renowned for its ability to trace students' knowledge. Knowledge tracing ability can be used in online learning platforms for predicting learning performance and providing adaptive learning. Due to the wide uses of knowledge tracing in student modeling, this study aims to understand the state-of-the-art and future research of knowledge tracing. This study focused on reviewing 24 studies published between 2017 to the third quarter of 2021 in four digital databases. The selected studies have been filtered using inclusion and exclusion criteria. Several previous studies have shown that there are two approaches used in knowledge tracing, including probabilistic and deep learning. Bayesian Knowledge Tracing model is the most widely used in the probabilistic approach, while the Deep Knowledge Tracing model is the most popular model in the deep learning approach. Meanwhile, ASSISTments 2009–2010 is the most frequently tested dataset for probabilistic and deep learning approaches. In the future, additional studies are required to explore several models which have been developed previously. Therefore this study provides direction for future research of each existing approach.
Research Trend of Causal Machine Learning Method: A Literature Review Arti, Shindy; Hidayah, Indriana; Kusumawardani, Sri Suning
IJID (International Journal on Informatics for Development) Vol. 9 No. 2 (2020): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2020.09208

Abstract

Machine learning is commonly used to predict and implement  pattern recognition and the relationship between variables. Causal machine learning combines approaches for analyzing the causal impact of intervention on the result, asumming a considerably ambigous variables. The combination technique of causality and machine learning is adequate for predicting and understanding the cause and effect of the results. The aim of this study is a systematic review to identify which causal machine learning approaches are generally used. This paper focuses on what data characteristics are applied to causal machine learning research and how to assess the output of algorithms used in the context of causal machine learning research. The review paper analyzes 20 papers with various approaches. This study categorizes data characteristics based on the type of data, attribute value, and the data dimension. The Bayesian Network (BN) commonly used in the context of causality. Meanwhile, the propensity score is the most extensively used in causality research. The variable value will affect algorithm performance. This review can be as a guide in the selection of a causal machine learning system.
Accessibility Analysis of Learning Management System Websites Dwi Fithriyaningrum; Kusumawardani, Sri Suning; Wibirama, Sunu
IJID (International Journal on Informatics for Development) Vol. 11 No. 1 (2022): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2022.3485

Abstract

In the digital era, Learning Management System is widely used to spread information in higher education, particularly at the university level. There are, however, issues with the Learning Management System's accessibility for users with disabilities. This research aims to investigate the accessibility issues of learning management websites of 30 universities in Indonesia. The top 30 universities in Indonesia according to Webometrics 2022 are the basis for this study. Accessibility issues will be identified and examined using the Wave evaluation tool which is in accordance with the Web Content Accessibility Guidelines 2.1 used by ISO 40500. Web Content Accessibility Guideline 2.1 has principles that any web should follow: Perceivable, Operable, Understandable, and Robust. Based on the research findings, The low contrast ratio between text and background, the absence of text explanations in the images, the lack of descriptive text on the links, the absence of text labels on the form, and the absence of text description on the button were the most frequently encountered accessibility issues.