cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota bandung,
Jawa barat
INDONESIA
IJoICT (International Journal on Information and Communication Technology)
Published by Universitas Telkom
ISSN : -     EISSN : 23565462     DOI : -
Core Subject : Science,
International Journal on Information and Communication Technology (IJoICT) is a peer-reviewed journal in the field of computing that published twice a year; scheduled in December and June.
Arjuna Subject : -
Articles 140 Documents
Image Spoofing Detection Using Local Binary Pattern and Local Binary Pattern Variance Indra Bayu Kusuma; Arida Kartika; Tjokorda Agung Budi W; Kurniawan Nur Ramadhani; Febryanti Sthevanie
International Journal on Information and Communication Technology (IJoICT) Vol. 4 No. 2 (2018): December 2018
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/IJOICT.2018.42.134

Abstract

Particularly in the field of biometric security using human face has been widely implemented in the real world. Currently the human face is one of the guidelines in the security system. Nowadays the challenge is how to detect data falsification; such an attack is called spoofing. Spoofing occurs when someone is trying to pretend to be someone else by falsifying the original data and then that person may gain illegal access and benefit him. For example one can falsify the face recognition system using photographs, video, masks or 3D models. In this paper image spoofing human face detection using texture analysis on input image is proposed. Texture analysis used in this paper is the Local Binary Pattern (LBP) and Local Binary Pattern Variance (LBPV). To classified input as original or spoof K-Nearest Neighbor (KNN) used. Experiment used 5761 spoofs and 3362 original from NUAA Imposter dataset. The experimental result yielded a best success rate of 87.22% in term of accuracy with configuration of the system using LBPV and histogram equalization with ratio 𝑅 = 7 and 𝑃 = 8.
Tone Classification Matches Kodàly Handsign with the K-Nearest Neighbor Method at Leap Motion Controller Muhammad Croassacipto; Muhammad Ichwan; Dina Budhi Utami
International Journal on Information and Communication Technology (IJoICT) Vol. 5 No. 2 (2019): December 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/IJOICT.2019.52.283

Abstract

Hands can produce a variety of poses in which each pose can have a meaning or purpose that can be used as a form of communication determined according to a general agreement or who communicate. Hand pose can be used as human interaction with the computer is faster, intuitive, and in line with the natural function of the human body called Handsign. One of them is Kodàly Handsign, made by a Hungarian composer named Zoltán Kodály, which is a concept in music education in Hungary. This hand sign is used in interactive angklung performances in determining the tone that will be played by the K-Nearest Neighbor (KNN) algorithm classification process based on hand poses. This classification process is performed on the extracted data from Leap Motion Controller, which takes Pitch, Roll, and Yaw values based on basic aircraft principle. The results of the research were conducted five times with the value of k periodically 1,3,5,7,9 with test data consisting pose of 874 Do', 702 Si, 913 La, 612 Sol, 661 Fa, 526 Mi, 891 Re, and 1004 Do punctuation on 21099 training data. The test results can recognize hand poses with the optimal k value k=1 with an accuracy level of 94.87%.
Basement Flood Control with Adaptive Neuro Fuzzy Inference System Using Ultrasonic Sensor Raden Muhamad Yuda Pradana Kusumah; Maman Abdurohman; Aji Gautama Putrada
International Journal on Information and Communication Technology (IJoICT) Vol. 5 No. 2 (2019): December 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/IJOICT.2019.52.482

Abstract

This paper proposes a basement flood management system based on Adaptive Neuro Fuzzy Inference System (ANFIS). Basement is one of the main parts of a building that has a high potential for flooding. Therefore, the existence of a flood control system in the basement can be a solution to this threat. Water level control is the key to solving the problem. Fuzzy Inference System (FIS) has proven to be a reliable method in the control system but this method has limitations, that is, it needs to have a basis or a reference when determining the fuzzy set. When there is no basis or reference, Adaptive Neuro FIS (ANFIS) can be a solution. The Neuron aspect in ANFIS determines fuzzy sets through training data. In terms of the Internet of Things (IoT), this system uses an ultrasonic sensor, Node Red IoT platform, and Matlab Server.  Then the water pump will turn on to control the water level when there is rainfall. By undergoing a comparative test with the FIS method, ANFIS provides a lower Root Mean Square Error (RMSE) and is recommended for use in basement flood management systems.
Study the Best PenTest Algorithm for Blind SQL Injection Attacks Aldebaran Bayu Nugroho; Satria Mandala
International Journal on Information and Communication Technology (IJoICT) Vol. 5 No. 2 (2019): December 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/IJOICT.2019.52.268

Abstract

There are several types of SQL injection attacks. One of the most popular SQL Injection Attacks is Blind SQL. This attack is performed by exploiting a gap in the database server when executing query words. If the server responds to an invalid query, the attacker will then reverse the engineering part of the SQL query, which is obtained from the error message of the server. The process of generating a blind SQL injection attack is complicated. As a result, a Pentester often requires a long time to penetrate the database server. This research provides solutions to the problems above by developing the automation of a blind SQL injection attack. The method used in this research is to generate keywords, such as the database name and table name so that the attacker can retrieve information about the user name and password. This research also compares several search algorithms, such as linear search, binary search, and interpolation search for generating the keywords of the attack. Automation of the Blind SQL Injection was successfully developed, and the performance of the keywords generation for each algorithm was also successfully measured, i.e., 1.7852 seconds for Binary Search, 1.789 seconds for interpolation and 1.902 seconds for Linear Search.
A Persuasive Technology for Managing Waste Disposal through Smart Trash Bin and Waste Disposal Tracker Oscar Karnalim; Oscar Wongso; Vincent Elbert Budiman; Felix Christian Jonathan; Bertha Alan Manuel; Marlina Marlina
International Journal on Information and Communication Technology (IJoICT) Vol. 6 No. 1 (2020): June 2020
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/IJOICT.2020.61.117

Abstract

Waste management issue is a relevant topic that had been focused on many persuasive technologies. This issue is not only related to getting disposed of waste in proper places but also reducing waste disposal volume. This paper proposes a persuasive system that aims both goals by providing a smart trash bin and waste disposal tracker. The smart trash bin is an IoT-featured trash bin whereas waste disposal tracker is a mobile application which can record user daily waste disposal volume statistic. Based on the evaluation, our proposed system has achieved both goals. Additionally, it also solves several impediments such as incapability of moral background to encourage people to dispose waste on the trash bin, boring and monotonous waste disposal activity, and discouragement for disposing waste due to full trash bin. In order to attract people, our system includes attractive mechanisms such as playful experience, reflective experience, and gamification. Playful experience is applied to a smart trash bin, whereas the other two are applied to the waste disposal tracker.
Increasing the Security of RFID-based Classroom Attendance System with Shamir Secret Share Aji Gautama Putrada; Maman Abdurohman
International Journal on Information and Communication Technology (IJoICT) Vol. 6 No. 1 (2020): June 2020
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/IJOICT.2020.61.480

Abstract

This paper proposes an attendance system for increasing the security based on Shamir Secret Share algorithm. The use of RFID devices for classroom attendance is still vulnerable to certain attacks. Students usually make use of existing loopholes for prohibited things, such as forged attendance. Shamir Secret Share is a security method based on the Secure Multiparty Computation (SMC) concept. The SMC guarantees not only the confidentiality of external attacks but also of each member in the secure system. In the attendance scenario using Shamir Secret Share, a student and a lecturer must do tapping at the same time; otherwise, the secret that opens the lock for attendance at that class will not be opened. To realize this system, this paper uses two RFID modules, each of which is connected to one nodeMCU microcontroller. Both systems are connected to a database where the Shamir Shared Secret calculation is performed. Some experiment has been implemented for proving the concept. The result shows that some scenarios of fraud in RFID based attendance can be prevented.
Prediction and Simulation Spatio-Temporal Support Vector Regression for Nonlinear Data Khalilur Rahman; Margaretha Ari Anggorowati; Agung Andiojaya
International Journal on Information and Communication Technology (IJoICT) Vol. 6 No. 1 (2020): June 2020
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/IJOICT.2020.61.477

Abstract

Spatio-temporal model forecasting method is a forecasting model that combines forecasting with a function of time and space.  This method is expected to be able to answer the challenge to produce more accurate and representative forecasting. Using the ability of method Support Vector Regression in dealing with data that is mostly patterned non-linear premises n adding a spatial element in the model of forecasting in the form of a model forecasting Spatio- Temporal. Some simulations have done with generating data that follows the Threshold Autoregressive model. The models are correlated into spatial points generated by several sampling methods. Simulation models are generated to comparing the accuracy between model Spatio-Temporal Support Vector Regression and model  ARIMA  based on  Mean  Error,  Mean Average Error, Root Mean Square Error, and Mean Average Percentage Error. Based on the evaluation results, it is shown that forecasting with the Spatio-Temporal Support Vector Regression model has better accuracy than forecasting ARIMA.
Design Recommendation Information Architecture of Hospital Website Using Bottom-Up Approach on Card Sorting Method Risqi Puspa Dewi; Mira Kania Sabariah; Veronikha Effendy
International Journal on Information and Communication Technology (IJoICT) Vol. 5 No. 2 (2019): December 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/IJOICT.2019.52.190

Abstract

One of the public facilities that use websites is the hospital. However, there are some shortcomings complained by users related to the hospital website, which is the lack of information, confusing view of the menu, etc. Therefore, we need the information architecture to manage related content and website structure. The build of information architecture is done by using a bottom-up approach in card sorting. There are five stages in the research, which the first stage is a strategy to equalize the goal in the development of the hospital website either from the point of view of the organization or company and the user's point of view of the hospital website. The second stage is a scope to find out what are the needs of the user in order to build the hospital website. The third stage is structure, which is the formation of the initial structure of information architecture by using a bottom-up approach to the card sorting method. The type of card sorting that is commonly used is the open card sorting. The fourth stage is the skeleton stage, which is used to make information architecture model design using wireframe and prototype. The fifth stage is the test using findability testing and usability testing. From the test, the design of information architecture is made to fulfill the desires and needs of users, as proven by the results of findability testing achieved 15.9 seconds, and the results of usability testing achieved 80.33. Hence, by the results of these tests, it can be concluded that the design of information architecture at the hospital website has a good value from findability testing and usability testing.
WhatsApp Chat Visualizer: A Visualization of WhatsApp Messenger’s Artifact Using the Timeline Method Hardiansyah Shidek; Niken Cahyani; Aulia Arif Wardana
International Journal on Information and Communication Technology (IJoICT) Vol. 6 No. 1 (2020): June 2020
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/IJOICT.2020.61.489

Abstract

WhatsApp is a medium that everyone can use to interact and to share information effectively and efficiently. However, it can be misused for criminal activities. Analyzing WhatsApp' artifacts is quite challenging as the suspect may have a lot of random conversational data to be considered. This makes it difficult for the trial process to obtain digital traces that can be identified in malicious activities such as knowing who was involved when the conversation was held and the timespan. Therefore, in this research, a social media investigation of WhatsApp was carried out by acquiring data from rooted Android devices that were used as target devices for forensic activities. A python-based application is developed to show the content of the conversation, and a web-based application is presented to visualize the data using the Timeline method. Experimental results in this research display important timeline information such as information about who was involved when and what time the conversation was carried out with the suspect.
Wrapper-Based Feature Selection Analysis For Semi-Supervised Anomaly Based Intrusion Detection System Andreas Jonathan Silaban; Satria Mandala; Erwid Jadied Mustofa
International Journal on Information and Communication Technology (IJoICT) Vol. 5 No. 2 (2019): December 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/IJOICT.2019.52.209

Abstract

Intrusion Detection System (IDS) plays as a role in detecting various types of attacks on computer networks. IDS identifies attacks based on a classification data network. The result of accuracy was weak in past research. To solve this problem, this research proposes using a wrapper feature selection method to improve accuracy detection. Wrapper-Feature selection works in the preprocessing stage to eliminate features. Then it will be clustering using a semi-supervised method. The semi-supervised method divided into two steps. There are supervised random forest and unsupervised using Kmeans. The results of each supervised and unsupervised will be ensembling using linear and logistic regression. The combination of wrapper and semi-supervised will get the maximum result.

Page 3 of 14 | Total Record : 140