首页 > 最新文献

2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)最新文献

英文 中文
The Decision Accuracy of Acquaintance List from Different Risk-cost Analysis 基于不同风险成本分析的熟人表决策精度
Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo
Consultation-based Collaborative Intrusion Detection Network (CIDN) aims to improve the detection accuracy of an Intrusion Detection System (IDS). Acquaintance management has become a vital process which responsible for the acquaintance selection in CIDN. In an acquaintance management algorithm, the trustworthiness of the IDS is estimated by the used of risk-cost analysis. However, the inaccurate estimation of the risk cost value has lead to a poor acquaintance list quality. As there is more than one risk-cost analysis, it is beneficial to analyze the used of different risk-cost analysis in an acquaintance management algorithm. We implement three different risk-cost analysis in four different environments of CIDN. The result shows that in the mix component of the DDoS attack, our proposed risk-cost analysis provide higher acquaintance detection accuracy.
基于协商的协同入侵检测网络(CIDN)旨在提高入侵检测系统的检测精度。熟人管理已成为CIDN中负责熟人选择的重要环节。在熟人管理算法中,利用风险成本分析来估计入侵检测系统的可信度。然而,由于风险成本值估计不准确,导致熟人列表质量较差。由于存在多种风险成本分析,分析不同风险成本分析在熟人管理算法中的应用是有益的。我们在四种不同的CIDN环境中实施了三种不同的风险成本分析。结果表明,在DDoS攻击的混合成分中,我们提出的风险成本分析提供了更高的熟人检测精度。
{"title":"The Decision Accuracy of Acquaintance List from Different Risk-cost Analysis","authors":"Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo","doi":"10.1109/TSSA.2018.8708840","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708840","url":null,"abstract":"Consultation-based Collaborative Intrusion Detection Network (CIDN) aims to improve the detection accuracy of an Intrusion Detection System (IDS). Acquaintance management has become a vital process which responsible for the acquaintance selection in CIDN. In an acquaintance management algorithm, the trustworthiness of the IDS is estimated by the used of risk-cost analysis. However, the inaccurate estimation of the risk cost value has lead to a poor acquaintance list quality. As there is more than one risk-cost analysis, it is beneficial to analyze the used of different risk-cost analysis in an acquaintance management algorithm. We implement three different risk-cost analysis in four different environments of CIDN. The result shows that in the mix component of the DDoS attack, our proposed risk-cost analysis provide higher acquaintance detection accuracy.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scrum Implementation for Online Transaction Processing (OLTP) in Hospital Management 医院管理中联机事务处理(OLTP)的Scrum实现
T. Setiadi, Syauqi Bima Premapasha
The majority of e-class hospitals in Indonesia still apply manual, non-computerized systems to conduct operational activities every day. This causes problems especially for hospital directors, because as a director requires a system that can evaluate the operations of the hospital. This problem was initiated due to the data of operational activities that are currently available are not well managed. This happens because there is no system for employees so that employees have difficulty managing data from each process.In this paper, we discuss Online Transaction Processing (OLTP) application development using the Scrum Framework. Scrum can address complex adaptive problems, by increasing productivity and creativity of all stakeholders involved. The test results with User Accepted Testing (UAT), Usability Testing and Scrum analysis based on the results of the development of the project show the OLTP system with the Scrum method has met the needs of the functional aspects and the development of the X hospital system
印度尼西亚的大多数e级医院仍然采用人工、非计算机化系统来开展日常业务活动。这给医院院长带来了问题,因为作为院长需要一个能够评估医院运作的系统。这一问题的产生是由于目前可获得的业务活动数据没有得到很好的管理。这是因为没有针对员工的系统,因此员工很难管理来自每个流程的数据。在本文中,我们讨论了使用Scrum框架的在线事务处理(OLTP)应用程序开发。Scrum可以通过提高所有涉众的生产力和创造力来解决复杂的适应性问题。基于项目开发结果,采用用户接受测试(UAT)、可用性测试(Usability Testing)和Scrum分析进行测试,结果表明采用Scrum方法的OLTP系统满足了X医院系统功能方面和开发的需求
{"title":"Scrum Implementation for Online Transaction Processing (OLTP) in Hospital Management","authors":"T. Setiadi, Syauqi Bima Premapasha","doi":"10.1109/TSSA.2018.8708797","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708797","url":null,"abstract":"The majority of e-class hospitals in Indonesia still apply manual, non-computerized systems to conduct operational activities every day. This causes problems especially for hospital directors, because as a director requires a system that can evaluate the operations of the hospital. This problem was initiated due to the data of operational activities that are currently available are not well managed. This happens because there is no system for employees so that employees have difficulty managing data from each process.In this paper, we discuss Online Transaction Processing (OLTP) application development using the Scrum Framework. Scrum can address complex adaptive problems, by increasing productivity and creativity of all stakeholders involved. The test results with User Accepted Testing (UAT), Usability Testing and Scrum analysis based on the results of the development of the project show the OLTP system with the Scrum method has met the needs of the functional aspects and the development of the X hospital system","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Assessment of IT Governance of Bakti Internet Access Program Based on the COBIT5 Framework : Case Study: Balai Latihan Kerja Kendari 基于COBIT5框架的Bakti互联网接入项目IT治理评估:案例研究:Balai Latihan Kerja Kendari
Raditya Muhammad, Ian Yosef Matheus Edward
The Universal Service Obligation (USO) program mandated by the Ministry of Communication and Information (KOMINFO) through the Badan Aksesibilitas Telekomunikasi dan Informatika (Bakti) is the foundation of the Internet Access Program for underdeveloped regions, frontier and outermost regions in Indonesia. The Internet Access Program aims to reduce the gap in understanding information and communication technology (ICT) between rural and urban areas. With the amount of technology investment costs managed in this program, it is necessary to standardize information technology governance in the implementation of this program, so the objectives can be realized. In this research, information technology governance system will be developed that refers to international standards COBIT 5. Case studies were carried out at one of the target locations of the Internet Access program at BLK Kendari with the assessment of the current capability level, gap analysis, risk analysis, and proposed recommendations. The proposed recommendations are expected to be able to help program management so that the goal of using information technology to form IT-based communities can be achieved.
通讯与资讯部(KOMINFO)透过Badan Aksesibilitas Telekomunikasi dan Informatika (Bakti)授权的普遍服务义务(USO)计划,是印尼欠发达地区、边境和最偏远地区互联网接入计划的基础。互联网接入计划旨在缩小农村和城市地区在了解信息通信技术(ICT)方面的差距。鉴于本方案所管理的技术投资成本数额,在本方案的实施过程中,有必要规范信息技术治理,使目标得以实现。本研究将参照国际标准COBIT 5开发信息技术治理体系。案例研究是在BLK Kendari的互联网接入项目的一个目标地点进行的,评估了当前的能力水平、差距分析、风险分析和建议。所提出的建议预计能够帮助项目管理,从而实现使用信息技术形成基于it的社区的目标。
{"title":"Assessment of IT Governance of Bakti Internet Access Program Based on the COBIT5 Framework : Case Study: Balai Latihan Kerja Kendari","authors":"Raditya Muhammad, Ian Yosef Matheus Edward","doi":"10.1109/TSSA.2018.8708833","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708833","url":null,"abstract":"The Universal Service Obligation (USO) program mandated by the Ministry of Communication and Information (KOMINFO) through the Badan Aksesibilitas Telekomunikasi dan Informatika (Bakti) is the foundation of the Internet Access Program for underdeveloped regions, frontier and outermost regions in Indonesia. The Internet Access Program aims to reduce the gap in understanding information and communication technology (ICT) between rural and urban areas. With the amount of technology investment costs managed in this program, it is necessary to standardize information technology governance in the implementation of this program, so the objectives can be realized. In this research, information technology governance system will be developed that refers to international standards COBIT 5. Case studies were carried out at one of the target locations of the Internet Access program at BLK Kendari with the assessment of the current capability level, gap analysis, risk analysis, and proposed recommendations. The proposed recommendations are expected to be able to help program management so that the goal of using information technology to form IT-based communities can be achieved.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116344271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Leveraging SDN for Handover in Distributed Mobility Management of 5G Network 利用SDN进行5G网络分布式移动管理中的切换
Rifqy Hakimi, Harashta Tatimma Larasati, Alvin Mustafa, Abdallah Abu-Arabiya
Distributed Mobility Management (DMM) is considered by many to be a suitable mobility management system for future 5G network. This approach implements flatter and more flexible architecture by distributing the data plane among the networks. Data traffic is not traversed to core but segregated locally, making it closer to the edge of the network. This can be achieved by implementing Software Defined Network (SDN) paradigm, i.e. separating control and data plane This paper surveys and analyzes numerous related work on DMM for 5G network particularly on handover protocol Those proposed solutions are in different in terms of architectures and procedures. Some of them can also be referring to quite similar concept under different nomenclature There are two proposed solutions for handover in DMM, SDN-based handover without tunneling and SDN-based handover with tunneling. The comparative analysis between those two are presented as well
分布式移动管理(DMM)被许多人认为是未来5G网络的合适移动管理系统。这种方法通过在网络之间分布数据平面来实现更扁平、更灵活的体系结构。数据流量不是遍历到核心,而是在本地隔离,使其更接近网络的边缘。这可以通过实施软件定义网络(SDN)范式,即分离控制平面和数据平面来实现。本文调查和分析了5G网络DMM的许多相关工作,特别是在切换协议方面,这些提出的解决方案在架构和过程方面有所不同。DMM中的切换有两种解决方案,一种是基于sdn的不带隧道切换,另一种是基于sdn的带隧道切换。并对两者进行了比较分析
{"title":"Leveraging SDN for Handover in Distributed Mobility Management of 5G Network","authors":"Rifqy Hakimi, Harashta Tatimma Larasati, Alvin Mustafa, Abdallah Abu-Arabiya","doi":"10.1109/TSSA.2018.8708820","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708820","url":null,"abstract":"Distributed Mobility Management (DMM) is considered by many to be a suitable mobility management system for future 5G network. This approach implements flatter and more flexible architecture by distributing the data plane among the networks. Data traffic is not traversed to core but segregated locally, making it closer to the edge of the network. This can be achieved by implementing Software Defined Network (SDN) paradigm, i.e. separating control and data plane This paper surveys and analyzes numerous related work on DMM for 5G network particularly on handover protocol Those proposed solutions are in different in terms of architectures and procedures. Some of them can also be referring to quite similar concept under different nomenclature There are two proposed solutions for handover in DMM, SDN-based handover without tunneling and SDN-based handover with tunneling. The comparative analysis between those two are presented as well","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114823415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ROI Based Post Image Quality Assessment Technique on Multiple Localized Filtering Method on Kinect Sensor 基于ROI的Kinect传感器多局部滤波后图像质量评价技术
Kholilatul Wardani, A. Kurniawan, E. Mulyana, Hendrawan
Region of Interest (ROI) Image Quality Assessment is an image quality assessment model based on Structural Similarity Index (SSI) used in the specific designated image region to be assessed. The output assessment value used by this image assessment model is 1 which means identical and -1 which means not identical. The assessment model of ROI Quality Assessment in this research is used to measure image quality on Kinect sensor capture result used in Mobile HD Robot after applying Multiple Localized Filtering Technique. The filter is applied to each capture sensor depth result on Kinect, aiming to eliminate structural noise which occurs in the Kinect sensor. Assessment is done by comparing the image quality before and after filter applied to certain regions. The Kinect sensor will be conditioned to capture a square black object measuring 10cm x 10cm perpendicular to a homogeneous background (white with RGB code 255,255,255). The results of Kinect sensor data will be taken through EWRF 3022 by visual basic 6.0 program periodically, 10 times each session with frequency 1 time per minute. The results of this trial show the same similar index (value 1: identical) in the luminance, contrast and structural section of the edge region or edge region of the specimen. The value indicates that the Multiple Localized Filtering Technique is applied to the noise generated by the Kinect sensor. Based on the ROI Image Quality Assessment model, there is no effect on the image quality generated by the sensor.
感兴趣区域(Region of Interest, ROI)图像质量评估是一种基于结构相似指数(Structural Similarity Index, SSI)的图像质量评估模型,用于特定的待评估图像区域。本图像评价模型使用的输出评价值为1,表示相同,-1表示不相同。本研究的ROI质量评估评估模型用于测量移动高清机器人使用的Kinect传感器捕获结果在应用多重局部滤波技术后的图像质量。该滤波器应用于Kinect上的每个捕获传感器深度结果,旨在消除Kinect传感器中出现的结构噪声。评估是通过比较应用于特定区域的滤波前后的图像质量来完成的。Kinect传感器将被设定为捕捉一个垂直于均匀背景(白色,RGB代码为255,255,255)的10cm x 10cm的方形黑色物体。用visual basic 6.0程序定期通过EWRF 3022采集Kinect传感器数据的结果,每次10次,频率每分钟1次。本试验结果在试样的边缘区域或边缘区域的亮度、对比度和结构截面上显示相同的相似指数(值1:相同)。该值表示对Kinect传感器产生的噪声应用多重局部滤波技术。基于ROI图像质量评估模型,不影响传感器生成的图像质量。
{"title":"ROI Based Post Image Quality Assessment Technique on Multiple Localized Filtering Method on Kinect Sensor","authors":"Kholilatul Wardani, A. Kurniawan, E. Mulyana, Hendrawan","doi":"10.1109/TSSA.2018.8708810","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708810","url":null,"abstract":"Region of Interest (ROI) Image Quality Assessment is an image quality assessment model based on Structural Similarity Index (SSI) used in the specific designated image region to be assessed. The output assessment value used by this image assessment model is 1 which means identical and -1 which means not identical. The assessment model of ROI Quality Assessment in this research is used to measure image quality on Kinect sensor capture result used in Mobile HD Robot after applying Multiple Localized Filtering Technique. The filter is applied to each capture sensor depth result on Kinect, aiming to eliminate structural noise which occurs in the Kinect sensor. Assessment is done by comparing the image quality before and after filter applied to certain regions. The Kinect sensor will be conditioned to capture a square black object measuring 10cm x 10cm perpendicular to a homogeneous background (white with RGB code 255,255,255). The results of Kinect sensor data will be taken through EWRF 3022 by visual basic 6.0 program periodically, 10 times each session with frequency 1 time per minute. The results of this trial show the same similar index (value 1: identical) in the luminance, contrast and structural section of the edge region or edge region of the specimen. The value indicates that the Multiple Localized Filtering Technique is applied to the noise generated by the Kinect sensor. Based on the ROI Image Quality Assessment model, there is no effect on the image quality generated by the sensor.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132265290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Book Data Content Similarity Detector With Cosine Similarity (Case study on digilib.uad.ac.id) 余弦相似度图书数据内容相似度检测器(以digilib. ad.ac.id为例)
Dewi Soyusiawaty, Yahya Zakaria
A library always tries to complete its book collection, yet visitors often find it difficult to search for an alternative book of an unfound book they search. Based on the questionnaire result, 83.3% respondents of library visitors take a long time in finding the exact data content of a book as an alternative of an unfound book. There are some books having similar title but the content is different. As a result, the visitors get it more difficult. For now digilib.uad.ac.id has not been able to give an alternative book when book searching done by visitors. The aim of this research is to ease the library visitors to find the exact reference book as an alternative book of an unfound book in the library by implementing Cosine Similarity method in detecting similarity.The research subject was the similarity detector system of the book data content in the library by using Cosine Similarity method. The data collection method was literature study, interview, and questionnaire. The system development phases included database design, interface design, flowchart design of book data content similarity and system evaluation with Blackbox Test, Alpha Test, and Accuracy Testing.This research developed a web-based application to detect book data content similarity by comparing the resume of a book that visitor searches with other books by using Cosine Similarity method based on the highest to the lowest score rank. System evaluation result with Blackbox test to librarians shows that the system runs well, the input can be received properly, and the output meets the expectation. On the Alpha Test evaluation, the system is also accepted by the users with 92.5% of respondent evaluation shows a highly positive response towards it. This application is reasonably used with the result of Accuracy Testing of system comparison of 82.14% relevant.
图书馆总是试图完成它的藏书,然而游客常常发现很难在他们找不到的书中找到另一本书。从问卷调查结果来看,83.3%的受访图书馆访客会花很长时间寻找一本书的确切数据内容,以替代找不到的书。有些书的标题相似,但内容不同。结果,游客们就更难了。目前,digilib. ad.ac.id还不能在访问者进行图书搜索时提供另一种图书。本研究的目的是通过实施余弦相似度方法来检测相似度,以方便图书馆访客在图书馆中找到准确的参考书作为未找到的书的替代书。本文的研究课题是基于余弦相似度法的图书馆图书数据内容相似度检测系统。资料收集方法为文献研究法、访谈法和问卷调查法。系统的开发阶段包括数据库设计、界面设计、图书数据内容相似度流程图设计,并通过Blackbox Test、Alpha Test和Accuracy Testing对系统进行评估。本研究开发了一个基于web的应用程序,通过将访问者搜索的书籍的简历与其他书籍进行比较,使用基于最高到最低分数排名的余弦相似度方法来检测图书数据内容相似度。通过对图书馆员的Blackbox测试,系统运行良好,输入可以正常接收,输出符合预期。在Alpha测试评价中,该系统也得到了用户的认可,92.5%的受访者评价对此表示高度肯定。该应用程序使用合理,系统比对精度测试结果为82.14%。
{"title":"Book Data Content Similarity Detector With Cosine Similarity (Case study on digilib.uad.ac.id)","authors":"Dewi Soyusiawaty, Yahya Zakaria","doi":"10.1109/TSSA.2018.8708758","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708758","url":null,"abstract":"A library always tries to complete its book collection, yet visitors often find it difficult to search for an alternative book of an unfound book they search. Based on the questionnaire result, 83.3% respondents of library visitors take a long time in finding the exact data content of a book as an alternative of an unfound book. There are some books having similar title but the content is different. As a result, the visitors get it more difficult. For now digilib.uad.ac.id has not been able to give an alternative book when book searching done by visitors. The aim of this research is to ease the library visitors to find the exact reference book as an alternative book of an unfound book in the library by implementing Cosine Similarity method in detecting similarity.The research subject was the similarity detector system of the book data content in the library by using Cosine Similarity method. The data collection method was literature study, interview, and questionnaire. The system development phases included database design, interface design, flowchart design of book data content similarity and system evaluation with Blackbox Test, Alpha Test, and Accuracy Testing.This research developed a web-based application to detect book data content similarity by comparing the resume of a book that visitor searches with other books by using Cosine Similarity method based on the highest to the lowest score rank. System evaluation result with Blackbox test to librarians shows that the system runs well, the input can be received properly, and the output meets the expectation. On the Alpha Test evaluation, the system is also accepted by the users with 92.5% of respondent evaluation shows a highly positive response towards it. This application is reasonably used with the result of Accuracy Testing of system comparison of 82.14% relevant.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127561681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Forensic Analysis of Android-based Instant Messaging Application 基于android的即时通讯应用程序的取证分析
I. Riadi, Arizona Firdonsyah
The rapid development of Android technology has an impact on the increasing number of devices that use Android as operating system. Applications developed for the Android platform are also very diverse, including instant messaging applications. Short Message Service, Blackberry Messenger, Line, and WhatsApp are multi-platform instant messaging applications with lots of users, so the possibility of digital crime that occurs by digital crime perpetrators has also increased significantly. The process of investigating digital crime cases require digital evidence to solve it. The process of obtaining digital evidence requires a forensic investigation technique against the physical evidence that has been obtained using certain methods. This research focuses on forensic steps to obtain digital evidence from Instant Messaging application on Android smartphones and smartwatches using widely used mobile forensic software, namely, Andriller, Oxygen Forensic Suite, WhatsApp DB / Key Extractor, and Metasploit using a framework developed by the National Institute of Standard Technology (NIST). The results of this research are presented in the form of a comparison table of artifact extraction success rate from each tool. The conclusions obtained from this research are: forensic measures carried out based on the NIST Mobile Forensics framework can be applied to the digital evidence retrieval process Instant Messaging applications on smartphones and Android smartwatches with Oxygen Forensic Suite has the highest successful rate at 57.14% on BBM and WhatsApp artifact extraction and 42.85 on Smartwatch’s SMS and LINE Messenger artifact extraction. WhatsApp DB/ Key Extractor has the highest successful rate at 42.85 on Smartphone’s WhatsApp artifact extraction but has weakness in Smartwatch’s SMS, BBM, and LINE Messenger artifact extraction and Metasploit has the lowest success ratio.
随着Android技术的飞速发展,越来越多的设备使用Android作为操作系统。为Android平台开发的应用程序也非常多样化,包括即时消息应用程序。短消息服务,黑莓信使,Line, WhatsApp是多平台的即时通讯应用程序,拥有大量的用户,因此数字犯罪犯罪者发生数字犯罪的可能性也大大增加。调查数字犯罪案件的过程需要数字证据来解决。在获取数字证据的过程中,需要对使用一定方法获得的物证进行法医调查技术。本研究的重点是取证步骤,从Android智能手机和智能手表上的即时通讯应用程序中获取数字证据,使用广泛使用的移动取证软件,即Andriller, Oxygen forensic Suite, WhatsApp DB / Key Extractor和Metasploit,使用国家标准技术研究所(NIST)开发的框架。本研究的结果以每个工具的工件提取成功率比较表的形式呈现。本研究得出的结论是:基于NIST移动取证框架开展的取证措施可以应用于数字证据检索过程。在智能手机和Android智能手表上的即时通讯应用中,使用Oxygen forensic Suite的BBM和WhatsApp伪迹提取成功率最高,为57.14%,在智能手表的SMS和LINE Messenger伪迹提取成功率最高,为42.85。WhatsApp DB/ Key Extractor在智能手机的WhatsApp神器提取方面的成功率最高,为42.85,但在智能手表的SMS, BBM和LINE Messenger神器提取方面存在弱点,Metasploit的成功率最低。
{"title":"Forensic Analysis of Android-based Instant Messaging Application","authors":"I. Riadi, Arizona Firdonsyah","doi":"10.1109/TSSA.2018.8708798","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708798","url":null,"abstract":"The rapid development of Android technology has an impact on the increasing number of devices that use Android as operating system. Applications developed for the Android platform are also very diverse, including instant messaging applications. Short Message Service, Blackberry Messenger, Line, and WhatsApp are multi-platform instant messaging applications with lots of users, so the possibility of digital crime that occurs by digital crime perpetrators has also increased significantly. The process of investigating digital crime cases require digital evidence to solve it. The process of obtaining digital evidence requires a forensic investigation technique against the physical evidence that has been obtained using certain methods. This research focuses on forensic steps to obtain digital evidence from Instant Messaging application on Android smartphones and smartwatches using widely used mobile forensic software, namely, Andriller, Oxygen Forensic Suite, WhatsApp DB / Key Extractor, and Metasploit using a framework developed by the National Institute of Standard Technology (NIST). The results of this research are presented in the form of a comparison table of artifact extraction success rate from each tool. The conclusions obtained from this research are: forensic measures carried out based on the NIST Mobile Forensics framework can be applied to the digital evidence retrieval process Instant Messaging applications on smartphones and Android smartwatches with Oxygen Forensic Suite has the highest successful rate at 57.14% on BBM and WhatsApp artifact extraction and 42.85 on Smartwatch’s SMS and LINE Messenger artifact extraction. WhatsApp DB/ Key Extractor has the highest successful rate at 42.85 on Smartphone’s WhatsApp artifact extraction but has weakness in Smartwatch’s SMS, BBM, and LINE Messenger artifact extraction and Metasploit has the lowest success ratio.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121245632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SCOR and AHP Based Monitoring Dashboard to Measure Rice Sourcing Performance at Indonesian Bureau of Logistics 基于SCOR和AHP的监控仪表板测量印尼物流局大米采购绩效
Muhammad Fadil Novar, Ari Yanuar Ridwan, B. Santosa
Rice is one of nine main commodities in Indonesia and it has been the main food for Indonesian people for over decades. Indonesian Bureau of Logistics (Bulog) is a company under Indonesian Government which is responsible to manage the distribution of the Rice Commodity. Sourcing process of the Rice Commodity is the most crucial process in Bulog. In spite of the importance of the process, the sourcing process was not maintained using any system at all. For such an important organization, which manages important product, the sourcing process of rice commodity at Bulog should be measured and monitored. Supply chain processes, such as sourcing product, have to be measured and monitored in order to assure that the processes are well executed and to give aid for improvements. Hence, in this paper, Supply Chain Measurement System is designed based on the Supply Chain Operations Reference model and Analytical Hierarchy Process. Thereafter, a monitoring system that is capable to monitor each of the metrics in the system is designed in a web-based application. This research leads to seventeen metrics in total which are distributed into four performance attributes on the designed Supply Chain Measurement System. The most important performance attribute in rice sourcing process was Reliability with 0.593 in AHP weighting. The designed monitoring system was able to provide a compact summary and a brief insight into the condition of the monitored process to the executives of the organization.
大米是印尼九大商品之一,几十年来一直是印尼人民的主要食物。印尼物流局(Bulog)是印尼政府下属的一家公司,负责管理大米商品的分销。大米商品的采购过程是Bulog最关键的过程。尽管这个过程很重要,但是没有使用任何系统来维护采购过程。对于这样一个重要的组织,管理着重要的产品,应该对Bulog的大米商品采购过程进行测量和监控。供应链过程,如采购产品,必须进行测量和监控,以确保过程得到良好的执行,并为改进提供帮助。因此,本文设计了基于供应链运营参考模型和层次分析法的供应链度量系统。此后,在基于web的应用程序中设计了能够监视系统中每个指标的监视系统。研究结果表明,在设计的供应链度量系统中,共有17个度量指标被划分为4个绩效属性。在大米采购过程中,最重要的绩效属性是可靠性,AHP权重为0.593。所设计的监测系统能够向组织的执行人员提供一个简明的摘要和对监测过程的情况的简要了解。
{"title":"SCOR and AHP Based Monitoring Dashboard to Measure Rice Sourcing Performance at Indonesian Bureau of Logistics","authors":"Muhammad Fadil Novar, Ari Yanuar Ridwan, B. Santosa","doi":"10.1109/TSSA.2018.8708814","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708814","url":null,"abstract":"Rice is one of nine main commodities in Indonesia and it has been the main food for Indonesian people for over decades. Indonesian Bureau of Logistics (Bulog) is a company under Indonesian Government which is responsible to manage the distribution of the Rice Commodity. Sourcing process of the Rice Commodity is the most crucial process in Bulog. In spite of the importance of the process, the sourcing process was not maintained using any system at all. For such an important organization, which manages important product, the sourcing process of rice commodity at Bulog should be measured and monitored. Supply chain processes, such as sourcing product, have to be measured and monitored in order to assure that the processes are well executed and to give aid for improvements. Hence, in this paper, Supply Chain Measurement System is designed based on the Supply Chain Operations Reference model and Analytical Hierarchy Process. Thereafter, a monitoring system that is capable to monitor each of the metrics in the system is designed in a web-based application. This research leads to seventeen metrics in total which are distributed into four performance attributes on the designed Supply Chain Measurement System. The most important performance attribute in rice sourcing process was Reliability with 0.593 in AHP weighting. The designed monitoring system was able to provide a compact summary and a brief insight into the condition of the monitored process to the executives of the organization.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131578597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
E-Key Prototype Implementation Based on Short Message Service (SMS) Technology 基于短消息服务技术的电子密钥原型实现
L. Kamelia, Eki Ahmad Zaki Hamidi, Akhmad Jazuli Baskara
Smart home technology covers many systems in a house, such as lighting systems, electronic appliance control, garden maintenance systems, security systems and so on. The use of SMS (Short Message Service) technology on cellular phones has been widely applied in various researches in the fields of smart homes, smart agriculture and industry. The research aimed to implement the electronic key using a keypad, GSM module, limit switch and the Arduino Nano. Arduino Nano serves as a processor for the control of the door lock that will be ordered through the keypad and SMS gateway, the keypad used as a close command and the SMS gateway used as a remote command for the owner of the house or building to open or lock the door. There are several components as the actuator, i.e. solenoid, buzzer and SMS gateway. The solenoid has the function to lock or open the door automatically, the buzzer functions as an alarm, and the SMS gateway has a function to send the activity/status of the door. The warning system uses a buzzer that will light up for 30 seconds if the door is open (according to the limit switch detection) whereas there is no input from the SMS or keypad.
智能家居技术涵盖了房屋中的许多系统,如照明系统、电子电器控制、花园维护系统、安全系统等。手机短信技术在智能家居、智能农业、智能工业等领域的各种研究中得到了广泛的应用。该研究旨在使用键盘、GSM模块、限位开关和Arduino Nano来实现电子钥匙。Arduino Nano作为控制门锁的处理器,通过键盘和短信网关来命令门锁,键盘作为关闭命令,短信网关作为远程命令,用于房屋或建筑物的所有者打开或锁定门。执行器有几个部件,即电磁阀、蜂鸣器和短信网关。电磁阀具有自动锁门或开门功能,蜂鸣器具有报警功能,短信网关具有发送门的活动/状态功能。警报系统使用蜂鸣器,如果门打开(根据限位开关检测),而没有从SMS或键盘输入,则蜂鸣器将亮起30秒。
{"title":"E-Key Prototype Implementation Based on Short Message Service (SMS) Technology","authors":"L. Kamelia, Eki Ahmad Zaki Hamidi, Akhmad Jazuli Baskara","doi":"10.1109/TSSA.2018.8708768","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708768","url":null,"abstract":"Smart home technology covers many systems in a house, such as lighting systems, electronic appliance control, garden maintenance systems, security systems and so on. The use of SMS (Short Message Service) technology on cellular phones has been widely applied in various researches in the fields of smart homes, smart agriculture and industry. The research aimed to implement the electronic key using a keypad, GSM module, limit switch and the Arduino Nano. Arduino Nano serves as a processor for the control of the door lock that will be ordered through the keypad and SMS gateway, the keypad used as a close command and the SMS gateway used as a remote command for the owner of the house or building to open or lock the door. There are several components as the actuator, i.e. solenoid, buzzer and SMS gateway. The solenoid has the function to lock or open the door automatically, the buzzer functions as an alarm, and the SMS gateway has a function to send the activity/status of the door. The warning system uses a buzzer that will light up for 30 seconds if the door is open (according to the limit switch detection) whereas there is no input from the SMS or keypad.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126795389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and Study of Rectangular Patch Antenna Array for High Altitude Platform Station 高空台站矩形贴片天线阵的设计与研究
Ryan Fikri, M. A. Wibisono, Iskandar
In order to expand the telecommunication network to the rural area, a suitable antenna is required to be applied on the High Altitude Platform Station (HAPS). In this paper, design and study of rectangular patch antenna array is proposed, in case determining antenna parameters based on 5.18GHz working frequency. High gain patch array antenna is required to use on point to point communication, so the array method is chosen to get high gain. The parameters observed from the antenna such as gain, radiation pattern, return loss, bandwidth and Voltage Standing Wave Ratio (VSWR) are simulated by Microwave Office Software to get best result of design antenna. The simulation result shows that designed antenna has high gain and suitable for HAPS due to its small size and thickness.
为了将电信网络扩展到农村地区,需要在高空台站(HAPS)上应用合适的天线。本文提出了矩形贴片天线阵列的设计与研究,以确定基于5.18GHz工作频率的天线参数。点对点通信要求采用高增益的贴片阵列天线,因此选用阵列方式获得高增益。利用微波办公软件对天线观测到的增益、辐射方向图、回波损耗、带宽和驻波电压比等参数进行了仿真,得到了天线设计的最佳结果。仿真结果表明,所设计的天线体积小、厚度小,具有较高的增益,适用于HAPS。
{"title":"Design and Study of Rectangular Patch Antenna Array for High Altitude Platform Station","authors":"Ryan Fikri, M. A. Wibisono, Iskandar","doi":"10.1109/TSSA.2018.8708824","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708824","url":null,"abstract":"In order to expand the telecommunication network to the rural area, a suitable antenna is required to be applied on the High Altitude Platform Station (HAPS). In this paper, design and study of rectangular patch antenna array is proposed, in case determining antenna parameters based on 5.18GHz working frequency. High gain patch array antenna is required to use on point to point communication, so the array method is chosen to get high gain. The parameters observed from the antenna such as gain, radiation pattern, return loss, bandwidth and Voltage Standing Wave Ratio (VSWR) are simulated by Microwave Office Software to get best result of design antenna. The simulation result shows that designed antenna has high gain and suitable for HAPS due to its small size and thickness.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132933313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1