Claim Missing Document
Check
Articles

Found 28 Documents
Search

Securing E-Mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices Teddy Mantoro; Andri Zakariya
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 10, No 4: December 2012
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v10i4.870

Abstract

One of the most popular internet services is electronic mail (e-mail). By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.
Advanced watermarking technique to improve medical images’ security Media Anugerah Ayu; Teddy Mantoro; I Made Alan Priyatna
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 5: October 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i5.13292

Abstract

Advances in imaging technology have made medical images become one of the important sources for information in supporting accurate diagnoses and treatment decisions by doctors for their patients. However, the vulnerability of medical images’ security is high. The images can be easily ‘attacked’, which altered their information that can lead to incorrect diagnoses or treatment. In order to make the images less vulnerable from outside attacks, this study proposes to secure them by advancing the watermarking using dual-layer fragile technique. It is expected that this dual-layer fragile watermarkingwill guarantee the integrity, authenticity, and confidentiality of patient’s and any other important information and also the pixel data of the medical images. The work in this study implements two LSBs of image where the role of the first LSB is as a tamper detector, and the second LSB is used to store patient’s and any other important information. Medical images of four deadliest diseases in Indonesia were used to test the proposed watermarking technique. Results from the conducted tests show that the proposed technique able to generate a watermarked image that has no noticeable changes compared to its original image, with PSNR value more than 44 dB and SSIM value of almost 1, where the tamper detector can correctly detect and localize any tampering on the watermarked image. Furthermore, the proposed technique has shown to have a higher level of security on medical images, compared to DICOM standard and standard watermarking method.
Augmented reality using features accelerated segment test for learning tajweed Adi Putra Andriyandi; Wahyudin Darmalaksana; Dian Sa’adillah Maylawati; Ferli Septi Irwansyah; Teddy Mantoro; Muhammad Ali Ramdhani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i1.14750

Abstract

Currently, education forms students to think creatively and critically, this can be supported by the multimedia technology for education, including Islamic religious education. Islam requires all of its Muslim to read the Qur'an. Tajweed is an important because it is related to the articulation of reading the Qur'an properly and correctly. This article discusses the application of augmented reality (AR) as one of the multimedia technologies that can be used as an interactive educational medium to help study the tajweed of Qur'an. The method used in this research is Features from accelerated segment test (FAST) corner detection. The testing result with 31 tajweed objects show that FAST is able to recognize all Tajweed objects and display their AR. Besides, based on a survey with questionnaires to several students, the result shows that 88.2% of students responded very well and judged that it was sufficient to help study the tajweed.
Crime index based on text mining on social media using multi classifier neural-net algorithm Teddy Mantoro; Muhammad Anton Permana; Media Anugerah Ayu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 20, No 3: June 2022
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v20i3.23321

Abstract

Everyday criminal issues appear on social media, even some crime news is often disturbing to the public but it gives a warning to the public to remain careful and alert to the surrounding environment. However, following large amounts of crime information on social media is not effective, especially for busy people. Therefore, there is a need to efficiently and effectively summarize information in a way that is meaningful and easy to see, attracts people’s attention, and can be used by law enforcement officials. The purpose of this study is to present the index crime based on social media by looking for patterns of crime. This study proposes the projected index crime based on crime trends by using text mining to classify tweet texts and post contents into 10 crime classes. The classification method uses the neural-net multi classifier algorithm which has several classifiers namely logistic regression, naïve bayes, support vector machine (SVM), and decision tree in parallel. In this approach, the classifier that provides the best accuracy will be the winning classifier and will be used in the next learning process. In this experiment, in using the multi classifier neural-net, the logistics regression classifier often provides the best accuracy.
Quality Translation Enhancement Using Sequence Knowledge and Pruning in Statistical Machine Translation Media A. Ayu; Teddy Mantoro; Jelita Asean
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.8687

Abstract

Machine translation has two important parts, a learning process which followed by a translation process. Unfortunately, most of the translation process requires complex operations and in-depth knowledge of the languages in order to give a good quality translation. This study proposes a better approach, which does not require in-depth knowledge of the linguistic properties of the languages, but it produces a good quality translation. This study evaluated 28 different parameters in IRSTLM language modeling, which resulting 270 millions experiments, and proposes a sequence evaluation mechanism based on a maximum evaluation of each parameter in producing a good quality translation based on NIST and BLEU. The parallel corpus and statistical machine learning for English and Bahasa Indonesia were used in this study. The pruning process, user interface, and the personalization of translation have a very important role in implementing of this machine translation. The result is quite promising. It shows that pruning process increases of the translation process time. The particular sequence knowledge/value parameter in translation process has a better performance than the other method using in-depth linguistic knowledge approaches. All these processes, including the process of parsing from a stand-alone mode to an online mode, are also discussed in detail.
Penyuluhan Manfaat Netiket pada Siswa-Siswi SMK Putra Mandiri Bangsa Wandy Wandy; Muhammad Agni Catur Bhakti; Media Anugerah Ayu; Teddy Mantoro; Muhamad Rausyan Fikri
Jurnal Pelayanan dan Pengabdian Masyarakat (Pamas) Vol 4, No 1 (2020): Jurnal Pelayanan dan Pengabdian Masyarakat (Pamas)
Publisher : Lembaga Penelitian dan Pengabdian Masyarakat (LPPM Universitas Respati Indonesia)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52643/pamas.v4i1.774

Abstract

Populasi Indonesia yang besar menjadi pasar pengguna Telepon Seluler yang besar pula, di mana sebagian besarnya terkoneksi dengan Internet. Tipe perangkat yang terkoneksi dengan Internet kian beragam dengan harga yang juga kian terjangkau. Koneksi Internet yang cepat juga semakin terjangkau oleh pengguna. Ragam aplikasi untuk dapat berkomunikasi, bersosialisasi, dan berinteraksi semakin membentuk masyarakat pengguna yang semakin bergantung dengan teknologi ini. Diperlukan cukup edukasi kepada masyarakat untuk menggunakan teknologi ini dengan bijaksana, khususnya pada area beretika di Internet, mengingat konten yang tersebar dan terserap melalui Internet juga semakin cepat.Kata Kunci: Netiket, Internet, Media Sosial, Pesan Instan, Pengabdian kepada Masyarakat
Securing E-mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices Teddy Mantoro; Andri Zakariya
Indonesian Journal of Electrical Engineering and Computer Science Vol 10, No 4: August 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One of the most popular internet services is electronic mail (e-mail). By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation. DOI: http://dx.doi.org/10.11591/telkomnika.v10i4.874
An automatic lexicon generation for indonesian news sentiment analysis: a case on governor elections in Indonesia Media A Ayu; Sony Surya Wijaya; Teddy Mantoro
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i3.pp1555-1561

Abstract

Sentiment analysis has been popularly used in analyzing data from the internet.  One of the techniques used is lexicon based sentiment analysis.  Generating lexicon is not an easy process, and lexicon in Bahasa Indonesia is rarely available.  This paper proposes an automatic lexicon generation in Bahasa Indonesia for sentiment analysis purpose.  Experiments were performed using the generated lexicon for doing sentiment analysis on Indonesian political news about the 2018 governor election in three provinces in Indonesia. The conducted experiments show promising results where it can predict the candidate’s rank, the election winner, and the percentage of votes for each candidate with better accuracy than the previous work which used manually generated lexicon.
Weighted inverse document frequency and vector space model for hadith search engine Septya Egho Pratama; Wahyudin Darmalaksana; Dian Sa'adillah Maylawati; Hamdan Sugilar; Teddy Mantoro; Muhammad Ali Ramdhani
Indonesian Journal of Electrical Engineering and Computer Science Vol 18, No 2: May 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v18.i2.pp1004-1014

Abstract

Hadith is the second source of Islamic law after Qur’an which make many types and references of hadith need to be studied. However, there are not many Muslims know about it and many even have difficulties in studying hadiths. This study aims to build a hadith search engine from reliable source by utilizing Information Retrieval techniques. The structured representation of the text that used is Bag of Word (1-term) with the Weighted Inverse Document Frequency (WIDF) method to calculate the frequency of occurrence of each term before being converted in vector form with the Vector Space Model (VSM). Based on the experiment results using 380 texts of hadith, the recall value of WIDF and VSM is 96%, while precision value is just around 35.46%. This is because the structured representation for text that used is bag of words (1-gram) that can not maintain the meaning of text well).
Indonesian news classification using convolutional neural network Muhammad Ali Ramdhani; Dian Sa’adillah Maylawati; Teddy Mantoro
Indonesian Journal of Electrical Engineering and Computer Science Vol 19, No 2: August 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v19.i2.pp1000-1009

Abstract

Every language has unique characteristics, structures, and grammar. Thus, different styles will have different processes and result in processed in natural language processing (NLP) research area. In the current NLP research area, data mining (DM) or machine learning (ML) technique is popular, especially for deep learning (DL) method. This research aims to classify text data in the Indonesian language using convolutional neural network (CNN) as one of the DL algorithms. The CNN algorithm used modified following the Indonesian language characteristics. Thereby, in the text pre-processing phase, stopword removal and stemming are particularly suitable for the Indonesian language. The experiment conducted using 472 Indonesian news text data from various sources with four categories: ‘hiburan’ (entertainment), ‘olahraga’ (sport), ‘tajuk utama’ (headline news), and ‘teknologi’ (technology). Based on the experiment and evaluation using 377 training data and 95 testing data, producing five models with ten epoch for each model, CNN has the best percentage of accuracy around 90,74% and loss value around 29,05% for 300 hidden layers in classifying the Indonesian News data.