Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : TELKOMNIKA (Telecommunication Computing Electronics and Control)

Enhance interval width of crime forecasting with ARIMA model-fuzzy alpha cut Yaya Sudarya Triana; Astari Retnowardhani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.12233

Abstract

With qualified data or information a better decision can be made. The interval width of forecasting is one of data values to assist in the selection decision making process in regards to crime prevention. However, in time series forecasting, especially the use of ARIMA model, the amount of historical data available can affect forecasting result including interval width forecasting value. This study proposes a combination technique, in order to get get a better interval width crime forecasting value. The propose combination technique between ARIMA model and Fuzzy Alpha Cut are presented. The use of variation alpha values are used, they are 0.3, 0.5, and 0.7. The experimental results have shown the use of ARIMA-FAC with alpha=0.5 is appropriate. The overall results obtained have shown the interval width crime forecasting with ARIMA-FAC is better than interval width crime forecasting with 95% CI ARIMA model.
Usability of BLESS-implemented class room: a case study of mixtio Desita Mustikaningrum; Astari Retnowardhani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.8999

Abstract

Conventional learning system and e-learning have their own strengths and weaknesses. To combine both systems, blended learning is created. In Extention Program of Informatics Engineering Faculty at XYZ university most of the students already have jobs. As much 47.5 % of students who take this program have a job in daily office hours. Then, to facilitate the learning process the XYZ university develop learning management system (LMS) by Moodle. XYZ university want to make a learning process with blended learning concept. However, the Moodle sytem has limited function to adapt the blended learning system (BLS). In the aim to improve the class usability in BLS, then this study proposes to apply to Blended Learning System Structure (BLESS) into LMS design. BLESS is offered as a framework which matches to learning and uses a top-down approach. Then, the system design maed it “Mixtio”. At the end of this study, it can be seen the analysis result of the use of BLESS can improve system usability of LMS.
Security risk analysis of bring your own device system in manufacturing company at Tangerang Astari Retnowardhani; Raziv Herman Diputra; Yaya Sudarya Triana
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.10165

Abstract

Nowadays information system has become popular used for help effectiveness and efficiency operation on a company. Bring Your Own Device (BYOD) system is a growing trend in corporate environment, where employees could access the system from anywhere. BYOD system is system information development using some technology like a Virtual Private Networks (VPN) or using some application to make the client on outside network office can access to inside networks with remote system. The remote system has strength to help employees working anywhere and anytime, that could make some issue for a security thing. The security issue that can be happen is unauthorized access and lost some important of company information. XYZ company as a manufacturing company in Tangerang, Indonesia has been used BYOD system in their company. They want to improve the security of the system with do risk analysis, with the aim to protect the internal data. The risk analysis use Cybersecurity Framework NIST will assist organizations to understand the risk of BYOD system. The analysist results obtained by the use of cybersecurity analysis on BYOD system in XYZ company are found some improvement need to develop in terms of security system recommended. According to the stages of respond with the analysis using Cybersecurity NIST framework and ISO/IEC 27002:2013.