Claim Missing Document
Check
Articles

Prototipe Laboratorium Bahasa Berbasis Komputer Menggunakan Model Arsitektur Three-Tier Dian Palupi Rini; Deris Stiawan; Endang Lestari
Generic Vol 4 No 2 (2009): Vol 4, No 2 (2009)
Publisher : Fakultas Ilmu Komputer, Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Laboratorium bahasa adalah sebuah ruang yang berisi perangkat keras dan perangkat lunak yang berfungsi sebagai tempat para siswa untuk melatih dan menguji kemampuan bahasanya. Prototipe laboratorium bahasa berbasis komputer adalah sebuah perangkat lunak yang mengadopsi fungsi dari sebagian atau keseluruhan sebuah laboratorium bahasa. Three-Tier adalah arsitektur client-server dimana masing-masing user interface, functional process logic (business rules), data storage dan data access dikembangkan dan disusun sebagai modul-modul yang berdiri sendiri. "three-tier" atau "threelayer", adalah bagian dari multitier architectures. Sistem threetier yang diterapkan pada prototipe laboratorium bahasa berbasis komputer memberi kemudahan pada pengelolaan aplikasi perangkat lunak yang berada pada layer logik dan pengelolaan data pada layer data, karena perubahan yang terjadi pada layer logic dan layer data tidak akan memberi pengaruh pada layer presentasi.
Implementation of Facial Landmarks Detection Method for Face Follower Mobile Robot Ahmad Zarkasi; Fachrudin Abdau; Agung Juli Anda; Siti Nurmaini; Deris Stiawan; Bhakti Yudho Suprapto; Huda Ubaya; Rizki Kurniati
Generic Vol 14 No 1 (2022): Vol 14, No 1 (2022)
Publisher : Fakultas Ilmu Komputer, Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper presents a new technique for facesrecognition based on auto-extracted facial marks. Our landmarks are those related to the outer corner of the nose. With extracted landmarks, a triplet of areas and their associated geometric invariance are formed. Where later the points on the outer corners of the eyes and nose will be connected with lines that will form a triangle. Later the line length will be calculated using the Euclidean Distance formula so that the area value of the triangle can be obtained. Then the data obtained will be trained using the Support Vector Machine algorithm so that they can recognize faces. And later the system will be implanted into a mobile robot with raspberry.
Performance Comparison of Feature Face Detection Algorithm on The Embedded Platform Ahmad Zarkasi; Siti Nurmaini; Deris Stiawan; Bhakti Yudho Suprapto; Huda Ubaya; Rizki Kurniati
Computer Engineering and Applications Journal Vol 11 No 2 (2022)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (405.575 KB) | DOI: 10.18495/comengapp.v11i2.405

Abstract

The intensity of light will greatly affect every process carried out in image processing, especially facial images. It is important to analyze how the performance of each face detection method when tested at several lighting levels. In face detection, various methods can be used and have been tested. The FLP method automates the identification of the location of facial points. The Fisherface method reduces the dimensions obtained from PCA calculations. The LBPH method converts the texture of a face image into a binary value, while the WNNs method uses RAM to process image data, using the WiSARD architecture. This study proposes a technique for testing the effect of light on the performance of face detection methods, on an embedded platform. The highest accuracy was achieved by the LBPH and WNNs methods with an accuracy value of 98% at a lighting level of 400 lx. Meanwhile, at the lowest lighting level of 175 lx, all methods have a fairly good level of accuracy, which is between 75% to 83%.
Phishing detection system using machine learning classifiers Nur Sholihah Zaini; Deris Stiawan; Mohd Faizal Ab Razak; Ahmad Firdaus; Wan Isni Sofiah Wan Din; Shahreen Kasim; Tole Sutikno
Indonesian Journal of Electrical Engineering and Computer Science Vol 17, No 3: March 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v17.i3.pp1165-1171

Abstract

The increasing development of the Internet, more and more applications are put into websites can be directly accessed through the network. This development has attracted an attacker with phishing websites to compromise computer systems. Several solutions have been proposed to detect a phishing attack. However, there still room for improvement to tackle this phishing threat. This paper aims to investigate and evaluate the effectiveness of machine learning approach in the classification of phishing attack. This paper applied a heuristic approach with machine learning classifier to identify phishing attacks noted in the web site applications. The study compares with five classifiers to find the best machine learning classifiers in detecting phishing attacks. In identifying the phishing attacks, it demonstrates that random forest is able to achieve high detection accuracy with true positive rate value of 94.79% using website features. The results indicate that random forest is effective classifiers for detecting phishing attacks.
The trend malware source of IoT network Susanto Susanto; M. Agus Syamsul Arifin; Deris Stiawan; Mohd. Yazid Idris; Rahmat Budiarto
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i1.pp450-459

Abstract

Malware may disrupt the internet of thing (IoT) system/network when it resides in the network, or even harm the network operation. Therefore, malware detection in the IoT system/network becomes an important issue. Research works related to the development of IoT malware detection have been carried out with various methods and algorithms to increase detection accuracy. The majority of papers on malware literature studies discuss mobile networks, and very few consider malware on IoT networks. This paper attempts to identify problems and issues in IoT malware detection presents an analysis of each step in the malware detection as well as provides alternative taxonomy of literature related to IoT malware detection. The focuses of the discussions include malware repository dataset, feature extraction methods, the detection method itself, and the output of each conducted research. Furthermore, a comparison of malware classification approaches accuracy used by researchers in detecting malware in IoT is presented.
The trends of supervisory control and data acquisition security challenges in heterogeneous networks M. Agus Syamsul Arifin; Susanto Susanto; Deris Stiawan; Mohd Yazid Idris; Rahmat Budiarto
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 2: May 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i2.pp874-883

Abstract

Supervisory control and data acquisition (SCADA) has an important role in communication between devices in strategic industries such as power plant grid/network. Besides, the SCADA system is now open to any external heterogeneous networks to facilitate monitoring of industrial equipment, but this causes a new vulnerability in the SCADA network system. Any disruption on the SCADA system will give rise to a dangerous impact on industrial devices. Therefore, deep research and development of reliable intrusion detection system (IDS) for SCADA system/network is required. Via a thorough literature review, this paper firstly discusses current security issues of SCADA system and look closely benchmark dataset and SCADA security holes, followed by SCADA traffic anomaly recognition using artificial intelligence techniques and visual traffic monitoring system. Then, touches on the encryption technique suitable for the SCADA network. In the end, this paper gives the trend of SCADA IDS in the future and provides a proposed model to generate a reliable IDS, this model is proposed based on the investigation of previous researches. This paper focuses on SCADA systems that use IEC 60870-5-104 (IEC 104) protocol and distributed network protocol version 3 (DNP3) protocol as many SCADA systems use these two protocols.
Designing consensus algorithm for collaborative signature-based intrusion detection system Eko Arip Winanto; Mohd Yazid Idris; Deris Stiawan; Mohammad Sulkhan Nurfatih
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i1.pp485-496

Abstract

Signature-based collaborative intrusion detection system (CIDS) is highly depends on the reliability of nodes to provide IDS attack signatures. Each node in the network is responsible to provide new attack signature to be shared with other node. There are two problems exist in CIDS highlighted in this paper, first is to provide data consistency and second is to maintain trust among the nodes while sharing the attack signatures. Recently, researcher find that blockchain has a great potential to solve those problems. Consensus algorithm in blockchain is able to increase trusts among the node and allows data to be inserted from a single source of truth. In this paper, we are investigating three blockchain consensus algorithms: proof of work (PoW), proof of stake (PoS), and hybrid PoW-PoS chain-based consensus algorithm which are possibly to be implemented in CIDS. Finally, we design an extension of hybrid PoW-PoS chain-based consensus algorithm to fulfill the requirement. This extension we name it as proof of attack signature (PoAS).
Robot movement controller based on dynamic facial pattern recognition Siti Nurmaini; Ahmad Zarkasi; Deris Stiawan; Bhakti Yudho Suprapto; Sri Desy Siswanti; Huda Ubaya
Indonesian Journal of Electrical Engineering and Computer Science Vol 22, No 2: May 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v22.i2.pp733-743

Abstract

In terms of movement, mobile robots are equipped with various navigation techniques. One of the navigation techniques used is facial pattern recognition. But Mobile robot hardware usually uses embedded platforms which have limited resources. In this study, a new navigation technique is proposed by combining a face detection system with a ram-based artificial neural network. This technique will divide the face detection area into five frame areas, namely top, bottom, right, left, and neutral. In this technique, the face detection area is divided into five frame areas, namely top, bottom, right, left, and neutral. The value of each detection area will be grouped into the ram discriminator. Then a training and testing process will be carried out to determine which detection value is closest to the true value, which value will be compared with the output value in the output pattern so that the winning discriminator is obtained which is used as the navigation value. In testing 63 face samples for the Upper and Lower frame areas, resulting in an accuracy rate of 95%, then for the Right and Left frame areas, the resulting accuracy rate is 93%. In the process of testing the ram-based neural network algorithm pattern, the efficiency of memory capacity in ram, the discriminator is 50%, assuming a 16-bit input pattern to 8 bits. While the execution time of the input vector until the winner of the class is under milliseconds (ms).
Cyberattacks and data breaches in Indonesia by Bjorka: hacker or data collector? Tole Sutikno; Deris Stiawan
Bulletin of Electrical Engineering and Informatics Vol 11, No 6: December 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v11i6.4854

Abstract

Recently, the public has been shocked by the mysterious figure of Hacker Bjorka. Bjorka hacked Indonesian officials. Bjorka leaks Indonesia's General Election Commission (KPU) data. This raises a significant red flag concerning Bjorka's ability to "disrupt" circumstances that are harmful to a large number of individuals, including his alleged action of leaking the personal data of influential state officials. Expert Putra Aji Adhari says Bjorka isn't a hacker. Aji Putra stated that Bjorka is a team. He, who has been invited to communicate with NASA, is sure Bjorka is still in Indonesia. Putra told Bjorka's hacking steps. Ardi Sutedja declared Bjorka isn't a person, his pattern mirrored a hacking group's. Sutedja knew Bjorka was Indonesian. Domestic targets, attacks, and mastery are evidences. On the other hand, Wiryana, as a hacker's handler, said that Bjorka is not a real hacker but rather a data collector. Ismail Fahmi says that a hacker like Bjorka uses a VPN to get to a server without leaving any traces. Bjorka might have come from Indonesia. One sign is that Bjorka's use of English is similar to how most Indonesians talk.
Weightless Neural Networks Face Recognition Learning Process for Binary Facial Pattern Ahmad Zarkasi; Siti Nurmaini; Deris Stiawan; Bhakti Yudho Suprapto
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 10, No 4: December 2022
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v10i4.3957

Abstract

The facial recognition process is normally used to verify and identify individuals, especially during the process of analyzing facial biometrics. The face detection algorithm automatically determines the presence or absence of a face. It is, however, theoretically difficult to analyze the face of a system with limited resources due to the complex pattern of a face. This implies an embedded platform scheme which is a combination of several learning methods supporting each other is required. Therefore, this research proposed the combination of the Haar Cascade method for the face detection process and the WNNs method for the learning process. The WNNs face recognition Algorithm (WNNs-FRA) uses facial data at the binary level and for binary recognition. Moreover, the sample face data in the binary were compared with the primary face data obtained from a particular camera or image. The parameters tested in this research include detection distance, detection coordinates, detection degree, memory requirement analysis, and the learning process. It is also important to note that the RAM node has 300 addresses divided into three face positions while the RAM discriminator has three addresses with codes (00), (10), and (10). Meanwhile, the largest amount of facial ROI data was found to be 900 pixels while the lowest is 400 pixels. The total RAM requirements were in the range of 32,768 bytes and 128 bytes and the execution time for each face position was predicted to be 33.3% which is an optimization because it is 66.67% faster than the entire learning process
Co-Authors Abd Rahim, Mohd Rozaini Abdiansah, Abdiansah Abdul Hadi Fikri Abdul Hanan Abdullah Abdul Harris Adi Hermansyah, Adi Adi Sutrisman Aditya Putra Perdana Prasetyo Aditya Putra Perdana Prasetyo Adji Pratomo Agung Juli Anda Agus Eko Minarno Ahmad Fali Oklilas Ahmad Firdaus Ahmad Ghiffari Ahmad Heryanto Ahmad Heryanto Ahmad Heryanto Ahmad Heryanto, Ahmad Ahmad Zarkasi Ahmad Zarkasi Albertus Edward Mintaria Ali Bardadi Ali Firdaus Alshaflut, Ahmed Anto Saputra, Iwan Pahendra Bedine Kerim Bedine Kerim Bhakti Yudho Suprapto Bhakti Yudho Suprapto Bhakti Yudho Suprapto Bin Idris, Mohd Yazid Cahyani, Nyimas Sabilina Darmawijoyo, Darmawijoyo Dasuki, Massolehin Dedy Hermanto Desak Putu Dewi Kasih Dewi Bunga Dian Palupi Rini Dwi Budi Santoso Edi Surya Negara Eko Arip Winanto Endang Lestari Ruskan Ermatita - Erwin, Erwin Fachrudin Abdau Fakhrurroja, Hanif Ferdiansyah Ferdiansyah Fikri, Abdul Hadi Firdaus Firdaus Firdaus, Firdaus Firnando, Rici Firsandaya Malik, Reza Gonewaje gonewaje Habibullah, Nik Mohd Hadipurnawan Satria Harris, Abdul Huda Ubaya Huda Ubaya Huda Ubaya I Gede Yusa Idris, Mohd. Yazid Idris, Mohd. Yazid Imam Much Ibnu Subroto Indradewa, Rhian Iswari, Rosada Dwi John Arthur Jupin Juli Rejito Kemahyanto Exaudi Kurniabudi, Kurniabudi Latius Hermawan Lelyzar Siregar Lina Handayani M. Miftakul Amin M. Ridwan Zalbina Majzoob K. Omer Makmum Raharjo Mardhiyah, Sayang Ajeng Marisya Pratiwi Marita, Raini Massolehin Dasuki Mehdi Dadkhah Meilinda Meilinda Meilinda, Meilinda Mintaria, Albertus Edward Mohamed S. Adrees Mohamed Shenify Mohammad Davarpanah Jazi Mohammed Y. Alzahrani Mohd Arfian Ismail Mohd Azam Osman Mohd Faizal Ab Razak Mohd Rozaini Abd Rahim Mohd Saberi Mohamad Mohd Yazid bin Idris Mohd Yazid Bin Idris Mohd Yazid Idris Mohd Yazid Idris Mohd. Yazid Idris Mohd. Yazid Idris Mohd. Yazid Idris Muhammad Afif Muhammad Fahmi MUHAMMAD FAHMI Muhammad Fermi Pasha Muhammad Qurhanul Rizqie Muhammad Sulkhan Nurfatih Munawar A Riyadi Munawar Agus Riyadi Naufal Semendawai, Jaka Negara, Edi Surya Ni Ketut Supasti Dharmawan Nik Mohd Habibullah Nur Sholihah Zaini Nuzulastri, Sari Osama E. Sheta Osman, Mohd Azam Osvari Arsalan Pahendra, Iwan Permana, Dendi Renaldo Pertiwi, Hanna Prabowo, Christian Purnama, Benni Putra Perdana Prasetyo, Aditya Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Rahmat Budiarto Raja Zahilah Md Radzi Ramayanti, Indri Ramayanti, Indri Reza Firsandaya Malik Reza Maulana Riyadi, Munawar A Rizki Kurniati Rizma Adlia Syakurah Rizqie, Muhammad Qurhanul Rossi Passarella Samsuryadi Samsuryadi Saparudin Saparudin Saparudin, Saparudin Saputra, Muhammad Ajran Sari Sandra Sarmayanta Sembiring Sarmayanta Sembiring Sasut A Valianta Sasut Analar Valianta Semendawai, Jaka Naufal Shahreen Kasim Sharipuddin, Sharipuddin Sidabutar, Alex Onesimus Siti Hajar Othman Siti Nurmaini Sri Arttini Dwi Prasetyawati Sri Desy Siswanti Susanto Susanto Susanto Susanto Susanto, Susanto Sutarno Sutarno Syakurah, Rizma Adlia Syamsul Arifin, M. Agus Tasmi Salim tasmi salim Tole Sutikno Wan Isni Sofiah Wan Din Yaya Sudarya Triana Yazid Idris, Mohd. Yazid Idris, Mohd. Yesi Novaria Kunang Yoga Yuniadi Yudho Suprapto, Bhakti Yundari, Yundari Zulhipni Reno Saputra Els