Articles
An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method
Prajna Deshanta Ibnugraha;
Lukito Edi Nugroho;
Paulus Insap Santosa
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (835.108 KB)
|
DOI: 10.11591/eei.v7i3.847
Involvement of digital information in almost of enterprise sectors makes information having value that must be protected from information leakage. In order to obtain proper method for protecting sensitive information, enterprise must perform risk analysis of threat. However, enterprises often get limitation in measuring risk related information security threat. Therefore, this paper has goal to give approach for estimating risk by using information value. Techniques for measuring information value in this paper are text mining and Jaccard method. Text mining is used to recognize information pattern based on three classes namely high business impact, medium business impact and low business impact. Furthermore, information is given weight by Jaccard method. The weight represents risk levelof information leakage in enterprise quantitatively. Result of comparative analysis with existing method show that proposed method results more detailed output in estimating risk of information security threat.
An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method
Prajna Deshanta Ibnugraha;
Lukito Edi Nugroho;
Paulus Insap Santosa
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (835.108 KB)
|
DOI: 10.11591/eei.v7i3.847
Involvement of digital information in almost of enterprise sectors makes information having value that must be protected from information leakage. In order to obtain proper method for protecting sensitive information, enterprise must perform risk analysis of threat. However, enterprises often get limitation in measuring risk related information security threat. Therefore, this paper has goal to give approach for estimating risk by using information value. Techniques for measuring information value in this paper are text mining and Jaccard method. Text mining is used to recognize information pattern based on three classes namely high business impact, medium business impact and low business impact. Furthermore, information is given weight by Jaccard method. The weight represents risk levelof information leakage in enterprise quantitatively. Result of comparative analysis with existing method show that proposed method results more detailed output in estimating risk of information security threat.
An Approach for Risk Estimation in Information Security Using Text Mining and Jaccard Method
Prajna Deshanta Ibnugraha;
Lukito Edi Nugroho;
Paulus Insap Santosa
Bulletin of Electrical Engineering and Informatics Vol 7, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (835.108 KB)
|
DOI: 10.11591/eei.v7i3.847
Involvement of digital information in almost of enterprise sectors makes information having value that must be protected from information leakage. In order to obtain proper method for protecting sensitive information, enterprise must perform risk analysis of threat. However, enterprises often get limitation in measuring risk related information security threat. Therefore, this paper has goal to give approach for estimating risk by using information value. Techniques for measuring information value in this paper are text mining and Jaccard method. Text mining is used to recognize information pattern based on three classes namely high business impact, medium business impact and low business impact. Furthermore, information is given weight by Jaccard method. The weight represents risk levelof information leakage in enterprise quantitatively. Result of comparative analysis with existing method show that proposed method results more detailed output in estimating risk of information security threat.
Workshop Dan Pelatihan Pembuatan E-Katalog Sebagai Media Penjualan Online Dan Cloud Application Untuk Umkm Saat Wfh Covid-19
Arry Widodo;
Candra Wijayangka;
R. Nurafni Rubiyanti;
Ade Irma Susanty;
Anita Silvianita;
Romat Saragih;
Gita Indah Hapsari;
Prajna Deshanta Ibnugraha;
Mia Rosmiati
Charity : Jurnal Pengabdian Masyarakat Vol 5 No 1 (2022): Charity-Jurnal Pengabdian Masyarakat
Publisher : PPM Universitas Telkom
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.25124/charity.v5i1.2991
Tujuan dari pengabdian masyarakat ini adalah untuk memberikan pengetahuan kepada pelaku bisnis terutama UMKM (Usaha Mikro Kecil dan Menengah) dalam meningkatkan bisnis yang mereka jalani. Setiap perusahaan yang profesional harus memiliki strategi penjualan, terutama di tengah wabah Covid-19. Strategi ini dibutuhkan sebagai bentuk pertanggungjawaban perusahaan dan untuk mengukur kemampuan perusahaan untuk bertahan. Untuk itu, diperlukan strategi penjualan melalui E-Katalog pada media online, serta penggunaan cloud computing sebagai pusat pengelolaan data. Penggunaan teknologi ini harus mudah dipahami oleh pihak yang berkepentingan. Selain itu juga harus relevan artinya bisa digunakan oleh pelaku bisnis UMKM. E-Katalog tersebut juga harus andal, yaitu dapat digunakan terus-menerus sehingga dapat digunakan untuk meningkatkan penjualan, tidak hanya di tengah kondisi wabah. Hasil yang diharapkan adalah masyarakat sasar dapat membuat E-Katalog sederhana, sehingga mampu bertahan di tengah kondisi bisnis saat ini dan dapat meningkatkan kompetensi masyarakat di masa depan
PENGEMBANGAN WEBSITE SEBAGAI MEDIA PROMOSI UMKM MOTHER’S BLESSING
Prajna Deshanta Ibnugraha;
Periyadi Periyadi;
Devie Ryana Suchendra;
Moch Fahru Rizal;
Rini Handayani
Prosiding COSECANT : Community Service and Engagement Seminar Vol 1, No 2 (2021)
Publisher : Universitas telkom
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (254.786 KB)
|
DOI: 10.25124/cosecant.v1i2.17513
Mother’s Blessing merupakan Usaha Mikro, Kecil, dan Menengah yang bergerak dibidang perlengkapan outdoor. Produk mitra UMKM tersebut berupa topi, tas outdoor, perlengkapan lari, perlengkapan sepeda, dan sebagainya. Untuk saat ini promosi yang dilakukan untuk proses penjualan melalui media social seperti Instagram. Hal tersebut dirasa kurang profesional. Oleh karena itu perlu pemanfaatan website untuk menunjang kegiatan promosi secara online tersebut sehingga dapat meningkatkan kepercayaan calon pembeli terhadap kualitas produk dan badan usaha UMKM tersebut. Pengabdian masyarakat yang dilakukan adalah menjawab permasalahan tersebut. Integrasi antara landing page, layanan blogger dengan domain dilakukan untuk mebuat website media promosi yang efektif dan efisien. Pengembangan website dengan konten berupa profil badan usaha, jenis produk dan jangkauan pelanggan diharapkan mampu menjembatani kebutuhan promosi produk secara profesional melalui website tersebut.
Persebaran Layanan dan Infrastruktur Telekomunikasi Provinsi Papua
Prajna Deshanta Ibnugraha;
Tora Fahrudin
JURNAL INFOTEL Vol 6 No 1 (2014): May 2014
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20895/infotel.v6i1.14
Layanan dan infrastruktur telekomunikasi merupakan bagian penting dari kehidupan modern karena hampir di segala bidang membutuhkan hal tersebut seperti pendidikan, pemerintahan, ekonomi dan sebagainya. Oleh karena pentingnya sektor telekomunikasi di Indonesia sebagai negara kepulauan maka perlu evaluasi tentang penyebaran layanan dan infrastrukturnya selain dilihat dari sisi fungsional dan perkembangan teknologinya. Provinsi Papua adalah provinsi terbesar di Indonesia namun justru memiliki layanan telekomunikasi yang paling sedikit dan terbatas. Demikian pula untuk penyebaran layanan ke kabupaten maupun ke distrik (kecamatan) masih belum merata. Hal tersebut terbukti dari laporan hasil distribusi pita frekuensi yang hanya 1,5% untuk kawasan Maluku dan Papua serta kerapatan layanan tiap kabupaten yang ditunjukkan pada hasil penelitian ini.
Automatic temperature detector to mitigate the spread of COVID-19
Prajna Deshanta Ibnugraha;
Rini Handayani;
Khamla NonAlinsavath
JURNAL INFOTEL Vol 15 No 1 (2023): February 2023
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20895/infotel.v15i1.847
The COVID-19 causes wide impact in business operation. The enterprise must mitigate the risk of COVID-19 spread in its environment. The monitoring of body temperature for employees can be applied as a method to prevent COVID-19 spread. However, the monitoring system must consider several factors such as contactless system, accountable, and simple. The integration between IR temperature sensor and attendance system based on ESP32 is able to provide those need. The use of proximity, IR, and RFID sensor is affordable to detect body temperature properly within 10 cm. The proposed system provides notification if user gets fever or suspect of COVID-19 by detecting the body temperature. The accuracy of sensor is adequate. It is based on the comparison testing between proposed system with body thermometer where the testing is performed 30 times for each condition. In order to deduce the comparison result, this study uses analysis of variance method. The analysis produces F-critical (4,006) greater than F-value (0,022) where it means that the proposed system and body thermometer have similar testing result. It is shown good accuracy for the proposed system.
SIMULASI PEMBANGUNAN JARINGAN MOBILE DENGAN SRSLTE DAN OAI
Moch. Fahru Moch. Fahru Rizal;
Prajna Deshanta Ibnugraha;
Sandy Krisna Mukti;
Malik Abdul Aziz
Indonesia Journal on Computing (Indo-JC) Vol. 9 No. 1 (2024): April, 2024
Publisher : School of Computing, Telkom University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.34818/INDOJC.2024.9.1.923
Open Air Interface is a telecommunications infrastructure development platform that aims to create an open source 4G/5G telecommunications network. This technology can replace commercial 4G/5G network infrastructure and or interconnect with existing 4G/5G cellular networks. This study aims to create test-beds of 4G OAI and srsLTE in a limited non-commercial scope, using USRP B205-mini and B210 which runs 4G standard cellular services using a single-site scheme. The results of srsLTE and OAI integration have adequate performance in power of -32.6 dBm and a Power to Signal Ratio of 19.54 dB.
PELATIHAN SIMULATOR APLIKASI SMARTCLASS ROOM BERBASIS IoT UNTUK GURU- GURU SMK NASIONAL BANDUNG
ema, Ema;
Prajna Deshanta Ibnugraha;
Muhammad Ikhsan Sani;
Nina Hendrarini
JITER-PM (Jurnal Inovasi Terapan - Pengabdian Masyarakat) Vol. 2 No. 1 (2024): JITER-PM
Publisher : Politeknik Caltex Riau
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.35143/jiter-pm.v2i1.6265
Revitalization of vocational schools is the core of the mandate of Presidential Instruction No. 9/2016 on Revitalization of Vocational High Schools (SMK). Vocational Education is education that refers to the mastery of applied expertise in a particular field. Students will be equipped with theory and also the implementation of learning in the form of practice. The Ministry of Education and Culture adjusts and develops the vocational education curriculum and adjusts it to be demand-driven so that the business world and the industrial world (DUDI) are more actively involved in the vocational education process in SMK. This IoT-based Smart class Room Application Simulator abdimas program aims to provide insight and increase competence for SMK teachers so that they can work and implement this knowledge to their students. The results of this abdimas feedback are 60% agree and 40% strongly agree. This shows that this abdimas program has succeeded in providing benefits to SMK teachers.
IMPLEMENTASI DAN PERANCANGAN FAILOVER MENGGUNAKAN MODEL POOL PADA LAYANAN SMS BROADCAST
Wicaksono, Ryan;
Ibnugraha, Prajna Deshanta;
Hamdani, Budhi
TEKTRIKA Vol 9 No 2 (2024): TEKTRIKA Vol.9 No.2 2024
Publisher : Telkom University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.25124/tektrika.v9i2.8077
The need to use multiple modems or what could be called multimodems is growing. Pool modems have the same working system as individual modems, only in the modem pool there are several modems placed in one box with the same power source. The modem pool can be configured to be able to broadcast SMS, because it has 8 ports, failover services can be used to broadcast SMS. Failover itself is a service where when one piece of hardware cannot perform its proper function, it will be transferred to the next piece of hardware so that the system continues to run as it should. The results of the design and implementation of failover to broadcast SMS to 30 numbers obtained a delay time of 5979 seconds, so that the average value of SMS sending was 199.3 seconds/SMS.