cover
Contact Name
Yuliah Qotimah
Contact Email
yuliah@lppm.itb.ac.id
Phone
+622286010080
Journal Mail Official
jictra@lppm.itb.ac.id
Editorial Address
LPPM - ITB Center for Research and Community Services (CRCS) Building Floor 6th Jl. Ganesha No. 10 Bandung 40132, Indonesia Telp. +62-22-86010080 Fax. +62-22-86010051
Location
Kota bandung,
Jawa barat
INDONESIA
Journal of ICT Research and Applications
ISSN : 23375787     EISSN : 23385499     DOI : https://doi.org/10.5614/itbj.ict.res.appl.
Core Subject : Science,
Journal of ICT Research and Applications welcomes full research articles in the area of Information and Communication Technology from the following subject areas: Information Theory, Signal Processing, Electronics, Computer Network, Telecommunication, Wireless & Mobile Computing, Internet Technology, Multimedia, Software Engineering, Computer Science, Information System and Knowledge Management.
Articles 7 Documents
Search results for , issue "Vol. 8 No. 3 (2015)" : 7 Documents clear
Owner’s Support, IT Sophistication and IT Adoption in Indonesian Manufacturing SMEs Singgih Saptadi; Iman Sudirman; T.M.A Ari Samadhi; Rajesri Govindaraju
Journal of ICT Research and Applications Vol. 8 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.8.3.6

Abstract

The importance of technology, especially information technology (IT), to businesses is widely accepted. But, different from large enterprises, small and medium enterprises (SMEs) with their limited resources adopted IT slowly. Literature on technology adoption suggests that organizational readiness is one of many factors that determine the adoption of technology. This paper relates IT adoption in Indonesian manufacturing SMEs with their IT readiness represented by owners support and IT sophistication they have. In this paper, the variety of IT adoption by SMEs was explored using business process approach. The support from SMEs owner represented by owner’s IT knowledge and resource allocation. IT sophistication included management level supported by IT, IT skill and IT innovativeness of SMEs staff. Three propositions were formulated and explored using data collected from 320 SMEs. Using cluster analysis, these SMEs were classified into five type of IT adoption based on three business focus (supplier, internal and customer): early adoption, internal focus adoption, customer focus adoption, internal-customer focus adoption and balanced adoption. The results suggests wider IT adoption requires greater support from the owner and higher IT sophistication.
Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider Sergey Igorevich Zhurin
Journal of ICT Research and Applications Vol. 8 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.8.3.5

Abstract

A range of international regulatory documents state the importance of counteracting insiders, especially cyber-insiders, in  critical facilities and simultaneously providing complex protection, which includes technical, administrative and information protection. In that case the insider, who is familiar with the protection or information system, will be able to find vulnerabilities and weak points in the protection of the information system or control system. One of the most important aspects of the preventive measures against insiders is personnel checks using different techniques, including interviews, social network analysis, and local area network analysis. In the case of having limited financial resources, it is necessary to choose a technique from a checklist rationally.
AIS Algorithm for Smart Antenna Application in WLAN Evizal Abdul Kadir; Siti Mariyam Shamsuddin; Tharek Abdul Rahman; Sharul Kamal Abdul Rahim; Eko Supriyanto; Sri Listia Rosa
Journal of ICT Research and Applications Vol. 8 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.8.3.1

Abstract

Increasing numbers of wireless local area networks (WLAN) replacing wired networks have an impact on wireless network systems, causing issues such as interference. The smart antenna system is a method to overcome interference issues in WLANs. This paper proposes an artificial immune system (AIS) for a switch beam smart antenna system. A directional antenna is introduced to aim the beam at the desired user. The antenna consists of 8 directional antennas, each of which covers 45 degrees, thus creating an omnidirectional configuration of which the beams cover 360 degrees. To control the beam switching, an inexpensive PIC 16F877 microchip was used. An AIS algorithm was implemented in the microcontroller, which uses the received radio signal strength of the mobile device as reference. This is compared for each of the eight beams, after which the AIS algorithm selects the strongest signal received by the system and the microcontroller will then lock to the desired beam. In the experiment a frequency of 2.4 GHz (ISM band) was used for transmitting and receiving. A test of the system was conducted in an outdoor environment. The results show that the switch beam smart antenna worked fine based on locating the mobile device.
Handwritten Javanese Character Recognition Using Several Artificial Neural Network Methods Gregorius Satia Budhi; Rudy Adipranata
Journal of ICT Research and Applications Vol. 8 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.8.3.2

Abstract

Javanese characters are traditional characters that are used to write the Javanese language. The Javanese language is a language used by many people on the island of Java, Indonesia. The use of Javanese characters is diminishing more and more because of the difficulty of studying the Javanese characters themselves. The Javanese character set consists of basic characters, numbers, complementary characters, and so on. In this research we have developed a system to recognize Javanese characters. Input for the system is a digital image containing several handwritten Javanese characters. Preprocessing and segmentation are performed on the input image to get each character. For each character, feature extraction is done using the ICZ-ZCZ method. The output from feature extraction will become input for an artificial neural network. We used several artificial neural networks, namely a bidirectional associative memory network, a counterpropagation network, an evolutionary network, a backpropagation network, and a backpropagation network combined with chi2. From the experimental results it can be seen that the combination of chi2 and backpropagation achieved better recognition accuracy than the other methods.
DIDS Using Cooperative Agents Based on Ant Colony Clustering Muhammad Nur Kholish Abdurrazaq; Bambang Riyanto Trilaksono; Budi Rahardjo
Journal of ICT Research and Applications Vol. 8 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.8.3.3

Abstract

Intrusion detection systems (IDS) play an important role in information security. Two major problems in the development of IDSs are the computational aspect and the architectural aspect. The computational or algorithmic problems include lacking ability of novel-attack detection and computation overload caused by large data traffic. The architectural problems are related to the communication between components of detection, including difficulties to overcome distributed and coordinated attacks because of the need of large amounts of distributed information and synchronization between detection components. This paper proposes a multi-agent architecture for a distributed intrusion detection system (DIDS) based on ant-colony clustering (ACC), for recognizing new and coordinated attacks, handling large data traffic, synchronization, co-operation between components without the presence of centralized computation, and good detection performance in real-time with immediate alarm notification. Feature selection based on principal component analysis (PCA) is used for dimensional reduction of NSL-KDD. Initial features are transformed to new features in smaller dimensions, where probing attacks (Ra-Probe) have a characteristic sign in their average value that is different from that of normal activity. Selection is based on the characteristics of these factors, resulting in a two-dimensional subset of the 75% data reduction.
Improving Intrusion Detection System Based on Snort Rules for Network Probe Attacks Detection with Association Rules Technique of Data Mining Nattawat Khamphakdee; Nunnapus Benjamas; Saiyan Saiyod
Journal of ICT Research and Applications Vol. 8 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.8.3.4

Abstract

The intrusion detection system (IDS) is an important network security tool for securing computer and network systems. It is able to detect and monitor network traffic data. Snort IDS is an open-source network security tool. It can search and match rules with network traffic data in order to detect attacks, and generate an alert. However, the Snort IDS  can detect only known attacks. Therefore, we have proposed a procedure for improving Snort IDS rules, based on the association rules data mining technique for detection of network probe attacks.  We employed the MIT-DARPA 1999 data set for the experimental evaluation. Since behavior pattern traffic data are both normal and abnormal, the abnormal behavior data is detected by way of the Snort IDS. The experimental results showed that the proposed Snort IDS rules, based on data mining detection of network probe attacks, proved more efficient than the original Snort IDS rules, as well as icmp.rules and icmp-info.rules of Snort IDS.  The suitable parameters for the proposed Snort IDS rules are defined as follows: Min_sup set to 10%, and Min_conf set to 100%, and through the application of eight variable attributes. As more suitable parameters are applied, higher accuracy is achieved.
Cover JICTRA Vol. 8 No. 3, 2015 Journal of ICT Research and Applications
Journal of ICT Research and Applications Vol. 8 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Page 1 of 1 | Total Record : 7