Pub Date : 2018-05-01DOI: 10.1109/ICOICT.2018.8528783
Hafidh Fikri Rasyid, Kurniawan Nur Ramadhani, F. Sthevanie
One of the areas on the human body that has the most dominant racial trait is the face. This research build the classification system for Mongoloid and non-Mongoloid race based on the area in the periorbital area of facial image. We use Local Binary Pattern to extract texture features on periorbital facial area. To classify the LBP features, we use Support Vector Machine classifier. The accuracy obtained from the system is 99.38%.
{"title":"Mongoloid and Non-Mongoloid Race Classification from Face Image Using Local Binary Pattern Feature Extractions","authors":"Hafidh Fikri Rasyid, Kurniawan Nur Ramadhani, F. Sthevanie","doi":"10.1109/ICOICT.2018.8528783","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528783","url":null,"abstract":"One of the areas on the human body that has the most dominant racial trait is the face. This research build the classification system for Mongoloid and non-Mongoloid race based on the area in the periorbital area of facial image. We use Local Binary Pattern to extract texture features on periorbital facial area. To classify the LBP features, we use Support Vector Machine classifier. The accuracy obtained from the system is 99.38%.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123335585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/ICOICT.2018.8528785
R. Andreswari, I. Darmawan, Warih Puspitasari
The adoption process is conducted in society aiming to give the right of foster children to get parents who can guarantee the welfare of children's life in the future. In Indonesia, the adoption process is regulated by law binding both from the side of foster parents and children. In fact, there are still some instances of adoption that are carried out outside of the provisions of the law and cause violations that harm foster children. Based on these problems, it is necessary to build a system that accommodates the needs both psychologically and materially from the side of children and parents. The existence of a detection system to assess the suitability between the two is to reduce the risk of violence in foster children. To build the system, it needs an algorithm capable of formulating several related factors. In this case, CARTs algorithm is an algorithm capable of predicting an optimal match that supports successful adoption of foster children.
{"title":"A Preliminary Study on Detection System for Assessing Children and Foster Parents Suitability","authors":"R. Andreswari, I. Darmawan, Warih Puspitasari","doi":"10.1109/ICOICT.2018.8528785","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528785","url":null,"abstract":"The adoption process is conducted in society aiming to give the right of foster children to get parents who can guarantee the welfare of children's life in the future. In Indonesia, the adoption process is regulated by law binding both from the side of foster parents and children. In fact, there are still some instances of adoption that are carried out outside of the provisions of the law and cause violations that harm foster children. Based on these problems, it is necessary to build a system that accommodates the needs both psychologically and materially from the side of children and parents. The existence of a detection system to assess the suitability between the two is to reduce the risk of violence in foster children. To build the system, it needs an algorithm capable of formulating several related factors. In this case, CARTs algorithm is an algorithm capable of predicting an optimal match that supports successful adoption of foster children.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122647700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/ICOICT.2018.8528798
Irvan Budiawan, H. R. Pranoto, E. Hidayat, S. R. Arief
Nowadays network application system (internet) is widely used not only for information system but also for automation system. This technology brings new paradigm in managing manufacture that we know as industry 4.0 or Smart Manufacture System (SMS). One of the architecture of SMS is Cyber-Physical System (CPS). Applying CPS on automation system becomes a challenge because there are not standard for integrating this architecture yet. Existing automation system today uses pyramid architecture for integration system from field level (level 0) to business level (level 4). CPS-based automation can replace the pyramid architecture, where on the CPS-based automation each layer on pyramid architecture seems to be able to communicate directly using network from field level through business level. In this paper, CPS-based automation is proposed using MQTT protocol on mini batch distillation column to separate mix liquid between alcohol and water. To apply CPS-based automation, it necessary develops embedded systems that meet the three disciplines of communication, computer, and control. To implement CPS-based automation, MQTT protocol is used for communication system. Modification on sensors and actuators are necessary to connect physical and cyber system over MQTT protocol. Database system is also required for data acquisition in a form of historian data. In terms of controlling, a local automation system is built for system startup.
{"title":"Design and Implementation of Cyber-Physical System-Based Automation on Plant Chemical Process: Study Case Mini Batch Distillation Column","authors":"Irvan Budiawan, H. R. Pranoto, E. Hidayat, S. R. Arief","doi":"10.1109/ICOICT.2018.8528798","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528798","url":null,"abstract":"Nowadays network application system (internet) is widely used not only for information system but also for automation system. This technology brings new paradigm in managing manufacture that we know as industry 4.0 or Smart Manufacture System (SMS). One of the architecture of SMS is Cyber-Physical System (CPS). Applying CPS on automation system becomes a challenge because there are not standard for integrating this architecture yet. Existing automation system today uses pyramid architecture for integration system from field level (level 0) to business level (level 4). CPS-based automation can replace the pyramid architecture, where on the CPS-based automation each layer on pyramid architecture seems to be able to communicate directly using network from field level through business level. In this paper, CPS-based automation is proposed using MQTT protocol on mini batch distillation column to separate mix liquid between alcohol and water. To apply CPS-based automation, it necessary develops embedded systems that meet the three disciplines of communication, computer, and control. To implement CPS-based automation, MQTT protocol is used for communication system. Modification on sensors and actuators are necessary to connect physical and cyber system over MQTT protocol. Database system is also required for data acquisition in a form of historian data. In terms of controlling, a local automation system is built for system startup.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125007647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/ICOICT.2018.8528739
A. Sofwan, Fuad Ashabus Surur, M. Arfan, E. Handoyo, A.S. Yosua Alvin, M. Somantri, W.S. Enda
Vehicle traffic analysis is one of the features that are provided in a smart city application. A camera is used to capture vehicles that are moving through on the road. Background subtraction is applied in order to detect the moving object, i.e., Gaussian Mixture Model. The system is developed under the Internet of Things (IoT) architecture, which all devices are associated using Internet connection. The calculated value is transmitted into cloud and received at the virtual server. Data are saved to a database and are able to be accessed through a web interface. We observe the applied system provides a good performance in terms of average accuracy exceeds 95.64%.
{"title":"Implementation of Vehicle Traffic Analysis Using Background Subtraction in the Internet of Things (IoT) Architecture","authors":"A. Sofwan, Fuad Ashabus Surur, M. Arfan, E. Handoyo, A.S. Yosua Alvin, M. Somantri, W.S. Enda","doi":"10.1109/ICOICT.2018.8528739","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528739","url":null,"abstract":"Vehicle traffic analysis is one of the features that are provided in a smart city application. A camera is used to capture vehicles that are moving through on the road. Background subtraction is applied in order to detect the moving object, i.e., Gaussian Mixture Model. The system is developed under the Internet of Things (IoT) architecture, which all devices are associated using Internet connection. The calculated value is transmitted into cloud and received at the virtual server. Data are saved to a database and are able to be accessed through a web interface. We observe the applied system provides a good performance in terms of average accuracy exceeds 95.64%.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128608618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/ICOICT.2018.8528752
Laela Citra Asih, F. Sthevanie, Kurniawan Nur Ramadhani
This paper proposed a fire detection system using video captured from camera. We built the system using Speeded Up Robust Feature (SURF) feature extraction on three orthogonal plane to obtain the spatial and temporal features. We used Support Vector Machine (SVM) algorithm to classify the features as the fire or non-fire object. Using SURF threshold value 0, number of cluster 5 and gaussian SVM kernel, the system generated accuracy 81,25%.
{"title":"Visual Based Fire Detection System Using Speeded Up Robust Feature and Support Vector Machine","authors":"Laela Citra Asih, F. Sthevanie, Kurniawan Nur Ramadhani","doi":"10.1109/ICOICT.2018.8528752","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528752","url":null,"abstract":"This paper proposed a fire detection system using video captured from camera. We built the system using Speeded Up Robust Feature (SURF) feature extraction on three orthogonal plane to obtain the spatial and temporal features. We used Support Vector Machine (SVM) algorithm to classify the features as the fire or non-fire object. Using SURF threshold value 0, number of cluster 5 and gaussian SVM kernel, the system generated accuracy 81,25%.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127781114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/ICOICT.2018.8528787
Ridho Maulana Arifianto, Parman Sukarno, E. Jadied
This paper proposes an architecture of Secure Shell (SSH) honeypot using port knocking and Intrusion Detection System (IDS) to learn the information about attacks on SSH service and determine proper security mechanisms to deal with the attacks. Rapid development of information technology is directly proportional to the number of attacks, destruction, and data theft of a system. SSH service has become one of the popular targets from the whole vulnerabilities which is existed. Attacks on SSH service have various characteristics. Therefore, it is required to learn these characteristics by typically utilizing honeypots so that proper mechanisms can be applied in the real servers. Various attempts to learn the attacks and mitigate them have been proposed, however, attacks on SSH service are kept occurring. This research proposes a different and effective strategy to deal with the SSH service attack. This is done by combining port knocking and IDS to make the server keeps the service on a closed port and open it under user demand by sending predefined port sequence as an authentication process to control the access to the server. In doing so, it is evident that port knocking is effective in protecting SSH service. The number of login attempts obtained by using our proposed method is zero.
{"title":"An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System","authors":"Ridho Maulana Arifianto, Parman Sukarno, E. Jadied","doi":"10.1109/ICOICT.2018.8528787","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528787","url":null,"abstract":"This paper proposes an architecture of Secure Shell (SSH) honeypot using port knocking and Intrusion Detection System (IDS) to learn the information about attacks on SSH service and determine proper security mechanisms to deal with the attacks. Rapid development of information technology is directly proportional to the number of attacks, destruction, and data theft of a system. SSH service has become one of the popular targets from the whole vulnerabilities which is existed. Attacks on SSH service have various characteristics. Therefore, it is required to learn these characteristics by typically utilizing honeypots so that proper mechanisms can be applied in the real servers. Various attempts to learn the attacks and mitigate them have been proposed, however, attacks on SSH service are kept occurring. This research proposes a different and effective strategy to deal with the SSH service attack. This is done by combining port knocking and IDS to make the server keeps the service on a closed port and open it under user demand by sending predefined port sequence as an authentication process to control the access to the server. In doing so, it is evident that port knocking is effective in protecting SSH service. The number of login attempts obtained by using our proposed method is zero.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116329451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/ICOICT.2018.8528747
Ervira Wulandari, V. Effendy, Gede Agung Ary Wisudiawan
Children aged 10–12 years old are considered able to know and do first-aid. At those ages, children have been exposed to various learning medias. One of learning medias is game applications. Based on preliminary observations, by testing usability of existing game apps, User Interface is considered not good. Therefore, the users cannot use the application properly. This is caused by several factors. They are effectiveness, productivity, accessibility and universality. Applications that have low usability can be caused by the imperfection or insufficient of the application suitability with the needs of the user. In order to fit the user interface to the needs of the user, it is necessary to model the user interface of the first-aid application game using User Centered Design (UCD) method. Using UCD is used to generate a User Interface model that fits to the needs of the user. The modeling of the game application is formed in a prototype. After that, a test is conducted to the user to measure the usability of the game by using Quality in Use Integrated Measurement (QUIM). The results of usability testing is 81.05%.
10-12岁的儿童被认为能够知道和做急救。在这些年龄段,孩子们接触过各种各样的学习媒介。其中一种学习媒介便是游戏应用。根据初步观察,通过测试现有游戏应用的可用性,用户界面被认为不太好。用户将无法正常使用应用程序。这是由几个因素造成的。它们是有效性、生产力、可及性和普遍性。可用性较低的应用程序可能是由于应用程序与用户需求的不完美或不充分的适用性造成的。为了使用户界面符合用户需求,有必要采用以用户为中心的设计方法对急救应用游戏的用户界面进行建模。使用UCD可以生成适合用户需求的用户界面模型。游戏应用的建模是在原型中形成的。之后,对用户进行测试,使用Quality in Use Integrated Measurement (QUIM)来衡量游戏的可用性。可用性测试结果为81.05%。
{"title":"Modeling User Interface of First-Aid Application Game Using User Centered Design (UCD) Method","authors":"Ervira Wulandari, V. Effendy, Gede Agung Ary Wisudiawan","doi":"10.1109/ICOICT.2018.8528747","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528747","url":null,"abstract":"Children aged 10–12 years old are considered able to know and do first-aid. At those ages, children have been exposed to various learning medias. One of learning medias is game applications. Based on preliminary observations, by testing usability of existing game apps, User Interface is considered not good. Therefore, the users cannot use the application properly. This is caused by several factors. They are effectiveness, productivity, accessibility and universality. Applications that have low usability can be caused by the imperfection or insufficient of the application suitability with the needs of the user. In order to fit the user interface to the needs of the user, it is necessary to model the user interface of the first-aid application game using User Centered Design (UCD) method. Using UCD is used to generate a User Interface model that fits to the needs of the user. The modeling of the game application is formed in a prototype. After that, a test is conducted to the user to measure the usability of the game by using Quality in Use Integrated Measurement (QUIM). The results of usability testing is 81.05%.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125941282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/ICOICT.2018.8528750
W. Hidayat, Toufan D. Tambunan, Reza Budiawan
Wearable sensors found in popular wrist wearable device are both generating sales profit and constantly generating vast amount of data. Some of these wearable sensors are able to record physical activity and sleep trends, both are being mainly used to give insight to its users about their current and past health and well-being. We proposed a method of data preprocessing and machine learning using simple k-nearest neighbor classifier to furthermore empower the usage of such data to predict changes in one's sleep quality based on his or her current physical activity level. Our method were challenged to predict changes in five medically-approved sleep quality indicators, using data generated by commercially available consumer-grade wrist wearable device. The experiment result shows that the successful prediction of changes in sleep quality using wearable sensor generated data can be achieved by successfully selecting and sometimes combining the right input parameter(s). Each sleep quality indicators calls for different input parameter or combined parameters. By selecting and combining the right parameter(s), our method had successfully predict changes in both sleep duration and sleep efficiency with accuracy of 68% and 64%, respectively.
{"title":"Empowering Wearable Sensor Generated Data to Predict Changes in Individual's Sleep Quality","authors":"W. Hidayat, Toufan D. Tambunan, Reza Budiawan","doi":"10.1109/ICOICT.2018.8528750","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528750","url":null,"abstract":"Wearable sensors found in popular wrist wearable device are both generating sales profit and constantly generating vast amount of data. Some of these wearable sensors are able to record physical activity and sleep trends, both are being mainly used to give insight to its users about their current and past health and well-being. We proposed a method of data preprocessing and machine learning using simple k-nearest neighbor classifier to furthermore empower the usage of such data to predict changes in one's sleep quality based on his or her current physical activity level. Our method were challenged to predict changes in five medically-approved sleep quality indicators, using data generated by commercially available consumer-grade wrist wearable device. The experiment result shows that the successful prediction of changes in sleep quality using wearable sensor generated data can be achieved by successfully selecting and sometimes combining the right input parameter(s). Each sleep quality indicators calls for different input parameter or combined parameters. By selecting and combining the right parameter(s), our method had successfully predict changes in both sleep duration and sleep efficiency with accuracy of 68% and 64%, respectively.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130107492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/ICOICT.2018.8528766
Fajar Surya G Soni, Heru Nugroho
The adoption rate of cloud computing technology in Indonesia is still low. In fact, Indonesia is still considered in the early stages of adopting (early adopter). One of the requirements for a successful digital transformation program can be seen in the cloud adoption rate. Already many industries, businesses and government institutions that adopt cloud technology, but higher education are not optimal in utilizing it. Higher Education known the potential benefits of using cloud computing. This allows higher education to avoid providing excessive Information Technology (IT) infrastructure and reduce maintenance costs. With the development of technology and services in cloud computing, higher education must be ready and courageous in utilizing this technology. The previous research mentions that the factors that determine the adoption of IT in higher education are the Impact and Benefits of IT Products for Higher Education, Infrastructure Availability, Intercultural Competition, IT Knowledge Academic Civitas, Civitas Academic Participation, IT Leadership, Technology Trend, and the existence of Blue Print IT. Another study related to e-readiness of Cloud Computing Service states that the factors that greatly affect the process of readiness of cloud computing adoption in higher education are the availability of IT Infrastructure and good IT Planning. The problem arises when the concept of e-readiness is combined with the adoption of information technology in this case cloud computing. This paper will present the results of the evaluation of the e-readiness cloud computing adoption service model at higher education. The research method used is Design Science Research Method (DSRM) from Peffers with statistical data processing using SPSS software tools. The result of data processing shows that the measurement of e-readiness adoption of cloud computing service model in higher education is influenced by the availability and competence of IT staff, Infrastructure Availability, and the existence of good IT planning.
云计算技术在印尼的采用率仍然很低。事实上,印度尼西亚仍被认为处于采用(早期采用者)的早期阶段。成功的数字化转型计划的要求之一可以从云采用率中看出。已经有许多行业、企业和政府机构采用了云技术,但高等教育在利用它方面并不是最佳的。高等教育知道使用云计算的潜在好处。这使得高等教育可以避免提供过多的信息技术(IT)基础设施,并降低维护成本。随着云计算技术和服务的发展,高等教育必须做好利用云计算技术的准备和勇气。先前的研究提到,决定高等教育采用IT的因素是IT产品对高等教育的影响和效益、基础设施的可用性、跨文化竞争、IT知识学术文明、文明学术参与、IT领导、技术趋势和蓝图IT的存在。另一项与云计算服务的电子就绪度相关的研究表明,影响高等教育采用云计算准备过程的因素是IT基础设施的可用性和良好的IT规划。当电子准备的概念与信息技术(这里指云计算)的采用结合在一起时,问题就出现了。本文将介绍高等教育中电子就绪云计算采用服务模型的评估结果。研究方法采用Peffers的设计科学研究方法(Design Science research method, DSRM),使用SPSS软件工具对统计数据进行处理。数据处理的结果表明,高等教育采用云计算服务模式的电子准备程度受IT人员的可用性和能力、基础设施的可用性和良好的IT规划的存在的影响。
{"title":"An Evaluation of E-Readiness Cloud Computing Service Model Adoption on Indonesian Higher Education","authors":"Fajar Surya G Soni, Heru Nugroho","doi":"10.1109/ICOICT.2018.8528766","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528766","url":null,"abstract":"The adoption rate of cloud computing technology in Indonesia is still low. In fact, Indonesia is still considered in the early stages of adopting (early adopter). One of the requirements for a successful digital transformation program can be seen in the cloud adoption rate. Already many industries, businesses and government institutions that adopt cloud technology, but higher education are not optimal in utilizing it. Higher Education known the potential benefits of using cloud computing. This allows higher education to avoid providing excessive Information Technology (IT) infrastructure and reduce maintenance costs. With the development of technology and services in cloud computing, higher education must be ready and courageous in utilizing this technology. The previous research mentions that the factors that determine the adoption of IT in higher education are the Impact and Benefits of IT Products for Higher Education, Infrastructure Availability, Intercultural Competition, IT Knowledge Academic Civitas, Civitas Academic Participation, IT Leadership, Technology Trend, and the existence of Blue Print IT. Another study related to e-readiness of Cloud Computing Service states that the factors that greatly affect the process of readiness of cloud computing adoption in higher education are the availability of IT Infrastructure and good IT Planning. The problem arises when the concept of e-readiness is combined with the adoption of information technology in this case cloud computing. This paper will present the results of the evaluation of the e-readiness cloud computing adoption service model at higher education. The research method used is Design Science Research Method (DSRM) from Peffers with statistical data processing using SPSS software tools. The result of data processing shows that the measurement of e-readiness adoption of cloud computing service model in higher education is influenced by the availability and competence of IT staff, Infrastructure Availability, and the existence of good IT planning.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122439568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-01DOI: 10.1109/ICOICT.2018.8528809
Anggie Nastiti, A. Rakhmatsyah, M. A. Nugroho
In Telkom University, the topology used does not have backup link for campus internal network in case of link failure because the topology is still based on interVLAN where each switch only has one path to switch core. Data packets cannot be delivered from source to destination if there is a link failure on the path. Based on the problem, it is proposed a new architecture which is Software Defined Network (SDN) that can overcome the link failure by configuring the controller in order to move to alternative links that have been provided with OpenFlow. This architecture separates the control plane and data plane, so it is centralized and programmable. To look for alternative links when a link failure occurs, the shortest path algorithm is Dijkstra and Bellman-Ford algorithms. The test parameters performed in this research are functionality to determine whether the two algorithms can determine the path or not, and convergence time to find out how long it takes to form the path from source to destination. Scenario of the test is done before and after the link failure occurs by using Ryu as controller and Mininet as emulator. Based on the results of the tests conducted, it was found that Dijkstra and Bellman-Ford algorithm can be applied well on link failure emulation in accordance with the scenario and topology used in the test. In addition to convergence time parameters obtained that Dijkstra algorithm is superior compared to Bellman-Ford algorithm. The difference gained in both scenarios has a value that is not so great the difference.
{"title":"Link Failure Emulation with Dijkstra and Bellman-Ford Algorithm in Software Defined Network Architecture (Case Study: Telkom University Topology)","authors":"Anggie Nastiti, A. Rakhmatsyah, M. A. Nugroho","doi":"10.1109/ICOICT.2018.8528809","DOIUrl":"https://doi.org/10.1109/ICOICT.2018.8528809","url":null,"abstract":"In Telkom University, the topology used does not have backup link for campus internal network in case of link failure because the topology is still based on interVLAN where each switch only has one path to switch core. Data packets cannot be delivered from source to destination if there is a link failure on the path. Based on the problem, it is proposed a new architecture which is Software Defined Network (SDN) that can overcome the link failure by configuring the controller in order to move to alternative links that have been provided with OpenFlow. This architecture separates the control plane and data plane, so it is centralized and programmable. To look for alternative links when a link failure occurs, the shortest path algorithm is Dijkstra and Bellman-Ford algorithms. The test parameters performed in this research are functionality to determine whether the two algorithms can determine the path or not, and convergence time to find out how long it takes to form the path from source to destination. Scenario of the test is done before and after the link failure occurs by using Ryu as controller and Mininet as emulator. Based on the results of the tests conducted, it was found that Dijkstra and Bellman-Ford algorithm can be applied well on link failure emulation in accordance with the scenario and topology used in the test. In addition to convergence time parameters obtained that Dijkstra algorithm is superior compared to Bellman-Ford algorithm. The difference gained in both scenarios has a value that is not so great the difference.","PeriodicalId":266335,"journal":{"name":"2018 6th International Conference on Information and Communication Technology (ICoICT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126338165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}