Claim Missing Document
Check
Articles

Found 49 Documents
Search
Journal : EMITTER International Journal of Engineering Technology

Classification of Radical Web Content in Indonesia using Web Content Mining and k-Nearest Neighbor Algorithm Muh Subhan; Amang Sudarsono; Ali Ridho Barakbah
EMITTER International Journal of Engineering Technology Vol 5 No 2 (2017)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v5i2.214

Abstract

Radical content in procedural meaning is content which have provoke the violence, spread the hatred and anti nationalism. Radical definition for each country is different, especially in Indonesia. Radical content is more identical with provocation issue, ethnic and religious hatred that is called SARA in Indonesian languange. SARA content is very difficult to detect due to the large number, unstructure system and many noise can be caused multiple interpretations. This problem can threat the unity and harmony of the religion. According to this condition, it is required a system that can distinguish the radical content or not. In this system, we propose text mining approach using DF threshold and Human Brain as the feature extraction. The system is divided into several steps, those are collecting data which is including at preprocessing part, text mining, selection features, classification for grouping the data with class label, simillarity calculation of data training, and visualization to the radical content or non radical content. The experimental result show that using combination from 10-cross validation and k-Nearest Neighbor (kNN) as the classification methods achieve 66.37% accuracy performance with 7 k value of kNN method[1].
Trusted Data Transmission Using Data Scrambling Security Method with Asymmetric Key Algorithm for Synchronization Nihayatus Sa'adah; I Gede Puja Astawa; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 6 No 2 (2018)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (804.766 KB) | DOI: 10.24003/emitter.v6i2.267

Abstract

Security is a major concern of the internet world because the development of the Internet requires the security of data transmission. The security method helps us to store valuable information and send it over an insecure network so that it can not be read by anyone except the intended recipient. Security algorithm uses data randomization method. This method of data information randomization has a low computation time with a large number of bits when compared to other encryption algorithms. In general, the encryption algorithm is used to encrypt data information, but in this research the encryption algorithm is used for synchronization between the sender and the intended recipient. Number of bits on asymmetric key algorithm for synchronization are the 64-bits, 512-bits and 1024-bits. We will prove that security methods can secure data sent with low computational time with large number of bits. In the result will be shown the value of computing time with variable number of bits sent. When data are sent by 50 bytes, encryption time required 2 ms using 1024 bits for synchronization technique asymmetric key algorithm. 
Medical Health Record Protection Using Ciphertext-Policy Attribute-Based Encryption and Elliptic Curve Digital Signature Algorithm Novi Aryani Fitri; M. Udin Harun Al Rasyid; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 7 No 1 (2019)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (999.468 KB) | DOI: 10.24003/emitter.v7i1.356

Abstract

Information on medical record is very sensitive data due to the number of confidential information about a patient's condition. Therefore, a secure and reliable storage mechanism is needed so that the data remains original without any changes during it was stored in the data center. The user must go through an authentication process to ensure that not an attacker and verify to ensure the authenticity and accuracy of the data received. In this research, we proposed a solution to secure medical data using the Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and Elliptic Curve Digital Signature Algorithm (ECDSA) methods. Our system can secure data centers from illegal access because the uploaded data has patient control over access rights based on attributes that have been embedded during the data encryption process. Encrypted data was added to the digital signature to pass the authentication process before being sent to the data center. The results of our experiments serve efficient system security and secure with low overhead. We compare the proposed system performance with the same CP-ABE method but don’t add user revocation to this system and for our computing times are shorter than the previous time for 0.06 seconds and 0.1 seconds to verify the signature. The total time in the system that we propose requires 0.6 seconds.
Medical Image Encryption Using Modified Identity Based Encryption Dian Neipa Purnamasari; Amang Sudarsono; Prima Kristalina
EMITTER International Journal of Engineering Technology Vol 7 No 2 (2019)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v7i2.405

Abstract

The development of technology and communication also affects the level of security needed for digital image transmission. It is known that digital images now have important meanings in both communication and video conference. In this paper, we propose a security method for medical encryption in the form of images. The proposed method is implemented in the modified Identity-Based Encryption scheme. The encryption algorithm used is Elliptic Curve Cryptography (ECC) to generate key pairs and the Advanced Encryption Standard (AES) to generate symmetric keys and encrypt process. This method has been tested based on computation time, histogram analysis and statistical analysis. The results of the test were obtained that the proposed method was resistant to multiple attacks despite having slower computing time. The proposed compute time error percentage is 1.69% for key generator stages and 0.07% for total compute time at the encrypt-decrypt stage.
Secure Data Travelling User using Hybrid Cryptosystem with User Privacy Protection Anindya Dwi Putri Islamidina; Amang Sudarsono; Titon Dutono
EMITTER International Journal of Engineering Technology Vol 8 No 1 (2020)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v8i1.486

Abstract

Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size and easy to carry anywhere. For this reason, an Android-based smartphone application that is able to send GPS data to all travelling members is proposed. In order to secure data transmission, cryptography and group signature to ensure that only traveling members could find out the location are applied. We use hybrid cryptography, which is a combination of symmetric cryptography using AES and asymmetric cryptography using IB-mRSA. We also add group signature as verification that members are in the same traveling group. The test result showed that the proposed method is safer than the comparison method because the symmetric key is encrypted before the key is distributed, so the attacker can not know the key. The total processing time needed to send data until member get data is 2.01 s.
Higher Rate Secret Key Formation (HRKF) based on Physical Layer for Securing Vehicle-to-Vehicle Communication Inka Trisna Dewi; Amang Sudarsono; Prima Kristalina; Mike Yuliana
EMITTER International Journal of Engineering Technology Vol 8 No 1 (2020)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v8i1.493

Abstract

One effort to secure vehicle-to-vehicle (V2V) communication is to use a symmetrical cryptographic scheme that requires the distribution of shared secret keys. To reduce attacks on key distribution, physical layer-based key formation schemes that utilize the characteristics of wireless channels have been implemented. However, existing schemes still produce a low bit formation rate (BFR) even though they can reach a low bit error rate (BER). Note that V2V communication requires a scheme with high BFR in order to fulfill its main goal of improving road safety. In this research, we propose a higher rate secret key formation (HRKF) scheme using received signal strength (RSS) as a source of random information. The focus of this research is to produce keys with high BFR without compromising BER. To reduce bit mismatch, we propose a polynomial regression method that can increase channel reciprocity. We also propose a fixed threshold quantization (FTQ) method to maintain the number of bits so that the BFR increases. The test results show that the HRKF scheme can increase BFR from 40% up to 100% compared to existing research schemes. To ensure the key cannot be guessed by the attacker, the HRKF scheme succeeds in producing a key that meets the randomness of the NIST test.
SDN-Based Network Intrusion Detection as DDoS defense system for Virtualization Environment Saifudin Usman; Idris Winarno; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 9 No 2 (2021)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v9i2.616

Abstract

Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusions. We design and deploy DDoS attack defense systems in virtualization environments based on Software-defined Networking (SDN) by combining signature-based Network Intrusion Detection Systems (NIDS) and sampled flow (sFlow). These techniques are practically tested and evaluated on the Proxmox production Virtualization Environment testbed, adding High Availability capabilities to the Controller. The evaluation results show that it promptly detects several types of DDoS attacks and mitigates their negative impact on network performance. Moreover, it also shows good results on Quality of Service (QoS) parameters such as average packet loss about 0 %, average latency about 0.8 ms, and average bitrate about 860 Mbit/s.
Secure Real-time Data Transmission for Drone Delivery Services using Forward Prediction Scheduling SCTP Febby Ronaldo; Amang Sudarsono; Dadet Pramadihanto
EMITTER International Journal of Engineering Technology Vol 10 No 1 (2022)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v10i1.690

Abstract

Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time. However, because the data transmission process occurs in a wireless network, data will be sent over a channel that is more unstable and vulnerable to attack. Thus, this research, purposes a Forward Prediction Scheduling-based Stream Control Transmission Protocol (FPS-SCTP) scheme that is implemented on drone data transmission system. This scheme supports piggybacking, multi-streaming, and Late Messages Filter (LMF) which will improve the real-time transmission process in IEEE 802.11 wireless network. Meanwhile, on the cybersecurity aspect, this scheme provides the embedded option feature to enable the encryption mechanism using AES and the digital signatures mechanism using ECDSA. The results show that the FPS-SCTP scheme has better network performance than the default SCTP, and provides full security services with low computation time. This research contributes to providing a communication protocol scheme that is suitable for use on the internet of drones’ environment, both in real-time and reliable security levels.
Performance Analysis of MIMO-OFDM System Using Predistortion Neural Network with Convolutional Coding Addition to Reduce SDR-Based HPA Nonlinearity Gulo, Melki Mario; Astawa, I Gede Puja; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 11 No 1 (2023)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v11i1.791

Abstract

In recent years, the development of communication technology has advanced at an accelerated rate. Communication technologies such as 4G, 5G, Wi-Fi 5 (802.11ac), and Wi-Fi 6 (802.11ax) are extensively used today due to their excellent system quality and extremely high data transfer rates. Some of these technologies incorporate MIMO-OFDM into their protocol. MIMO-OFDM is widely used in modern communication systems due to its benefits, which include high data rates, spectral efficiency, and fading resistance. Despite these benefits, MIMO-OFDM has disadvantages, with the use of a nonlinear HPA being one of them. Nonlinear HPA causes in-band and out-of-band distortions in MIMO-OFDM signals. Utilizing predistortion (PD) is one way of solving this issue. PD is a technique that uses the inverse distortion of the HPA to compensate for the nonlinear characteristics of the HPA. To enhance the quality of MIMO-OFDM systems that the use of HPA has degraded, the convolutional coding (CC) method can be combined with the help of PD. Convolutional coding is a type of channel coding that can be used for error detection and correction. This study will evaluate a combined technique of PD neural networks (PDNN) and CC on the MIMO-OFDM system using Software Defined Radio (SDR) devices. The evaluation of this system led to the use of a technique that combines PDNN and CC to improve SNR and minimise BER on MIMO-OFDM systems that HPA on SDR devices has degraded. In addition, at code rates 1/2, 2/3, and 3/4, using PDNN reduces the SNR value required to achieve BER equal to 0 by 12.037%, 37.8%, and 4.10% when compared to Digital Predistortion (DPD).
Co-Authors Abd. Rasyid Syamsuri Adam Surya Putra Adam Surya Putra Afifah Dwi Ramadhani agostinho marques ximenes Ahmad Zainudin Ali Ridho Barakbah Anang Budikarso Anang Budikarso, Anang Anang Siswanto Anang Siswanto Anang Siswanto, Anang Anindya Dwi Putri Islamidina Ari Wijayanti Ari Wijayanti Aries Pratiarso Aries Pratiarso Aries Pratiarso, Aries Astin, Novita Bambang Sumantri Bayu Dwiyan Satria Bih Hwang Lee Bima Sena Bayu Dewantara Choirun Nisa Dadet Pramadihanto Darmawan, Zakha Maisat Eka Dewi, Florista Dewi, Ni Made Lintang Asvini Dian Neipa Purnamasari Donny Farhan Eko Prayitno Farel Juliansyah Farhan, Donny Febby Ronaldo Fitri, Novi Aryani Florista Dewi Gulo, Melki Mario Gunawan, M. Wisnu Hadi, Mochammad Zen Samsono Haniah Mahmudah Hari Wahyuningrat S. Hary Oktavianto Haryadi Amran Hasan Basri Hasan Basri Hendy Briantoro Heru Iswanto Heru Iswanto, Heru Hidayah, Nuril Hudhajanto, Rizky Pratama I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Aswara Ida Anisah Idris Winarno Indah Yulia Prafitaning Tiyas Indah Yulia Prafitaning Tiyas, Indah Yulia Prafitaning Inka Trisna Dewi Ismed Jauhar Ismed Jauhar, Ismed Juliansyah, Farel Kevin Prima Pambudi Kevin Prima Pambudi, Kevin Prima Lordan Kimbal, Heaven Louis Nashih Uluwan Arif M Udin Harun Al Rasyid, M Udin Harun M. Cahyo Kriswantoro Mahardhika, Yesta Medya Mahmudah, Haniah Mala Nurilmala Mike Yuliana Mochammad Zen Samsono Hadi Mohamad Ridwan Muh Subhan Muh. Alfan Taufiqurrahman Muhammad Taufiq Sumadi Nanang Syahroni Ni Made Lintang Asvini Dewi Nihayatus Sa'adah Nihayatus Sa'adah Ningsih, Norma Novita Astin Nur Nur Adi Siswandari Nurul Fahmi Nurul Fahmi Nurul Fahmi Priambodo, Naufal Ammar Prima Kristalina Putra, Adam Surya Qoirul Setiawan Qoirul Setiawan, Qoirul R Rizki Rachmadi R. Gaguk Pratama Yudha Rafina Destiarti Ainul Rahardita Widyatra Ramadhani, Afifah Dwi Reni Soelistijorini Renovita Edelani Rini Satiti Rizky Pratama Hudhajanto Rokhmat Albasyih Samsul Huda Samsul Huda Santoso, Tribudi Saputro, Anton Cahyo Satiti, Rini Sa’adah, Nihayatus Soelistijorini, Reni Sritrusta Sukaridhoto Subhan, Muh Syahroni, Nanang Taufiqurrahman, Muh. Alfan Titon Dutono Tri Budi Santoso Tri Budi Santoso Tri Harsono TRI SUSANTI Tri Susanti Tribudi Santoso Vivien Arief Wardhany Wahjoe Tjatur Sesulihatien Wahyuningrat S., Hari Winarmo, Idris Ximenes, Agostinho Marques Yoedy Moegiharto, Yoedy Yoga Yuniadi Yudha, R. Gaguk Pratama Yuliana, Mike