arif ridho lubis - Academia.edu (original) (raw)

Papers by arif ridho lubis

Research paper thumbnail of The Effect of E-Commerce Towards Sales Growth on Social Media among Students in Indonesia

2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)

Research paper thumbnail of Stream Control Transportation Protocol (SCTP) towards MANET Routing: Comparison of DSR and AODV

2019 International Conference on Sustainable Engineering and Creative Computing (ICSECC), 2019

This research wants to compare the performance of Stream Control Transportation Protocol (SCTP) w... more This research wants to compare the performance of Stream Control Transportation Protocol (SCTP) with two difference mechanism, which are Ad-hoc on Demand Distance Vector (AODV) and Dynamic Source Routing protocol (DSR) by using Network Simulator (NS-2). Specifically, it measures the behavior of SCTP in terms of throughput and smoothness by having assumption that routing protocol in MANET (Mobile Ad-hoc Network) can bring significant effect in SCTP in the overall performance. Actually, IETF (Internet Engineering Task Force), has issued a new protocol called SCTP, which in this study, the interaction of SCTP is investigated through the examination of traffic flows through a number of network topologies. This performance analysis is over MANET Routing Protocol that enables the process of analysis of several performance metrics. The simulation use topology with 16 nodes that is consisting of metric 4×4 of SCTP transport layer for both routing protocol of AODV and DSR. At last, this rese...

Research paper thumbnail of A Framework of Utilizing Big Data of Social Media to Find Out the Habits of Users Using Keyword

Optimal search in search engines is very urgent, especially search performs on social media searc... more Optimal search in search engines is very urgent, especially search performs on social media search engine. Very big data in social media have not been not used as many as expected, making the existed data are only limited to the data themselves. However, using keywords on social media search engines could only produces incomplete and inaccurate data thereby the search results only have limited usage. This paper contains a framework using keywords in social media search engines that aims to gain users' habits by utilizing social media data. The framework offered is in the form of steps to optimize the search engines, so that the optimal social media search engine could be used as an entry point to find the desired data on specific social media user. The step is initialized by analyzing existing posts to get more specific and accurate data from social media users. The social media system then could use those specific keywords to identify the identity of a specific user in the info...

Research paper thumbnail of Information Security Awareness (ISA) towards the Intention to Comply and Demographic Factors: Statistical Correspondence Analysis

Evidence from the literature and observation conducted from various practice in managing project ... more Evidence from the literature and observation conducted from various practice in managing project or developing product within the organization suggested that human factors in term of control and direction can be the greatest threats to the organization to ensure the high quality of information security. Therefore, fewer research was conducted towards assessing the level of end-user awareness in a practical way to extract the relationship of demographic factor with user compliance in order to understand the working mechanism. Thus, this study prepares a literature review with the PRISMA model to implement a systematic process in an integrated manner in order to reveal representative information on the subject. Subsequently, a correspondence analysis (CA) was conducted to discover the hidden meaning of the relevant demographic factors that might affect the intention to comply with the organization's policy to protect confidential, sensitive and confidential information. One intere...

Research paper thumbnail of Optimization of MSE Accuracy Value Measurement Applying False Alarm Rate in Forecasting on Fuzzy Time Series based on Percentage Change

Time series is a method of forecasting in which it is carried out on the previous data to obtain ... more Time series is a method of forecasting in which it is carried out on the previous data to obtain future data. This study conducted forecasting on the price of gold, in which the process is divided into two patterns. In the first pattern, forecasting used change-based time series with the world economic instability such as the Covid-19 pandemic, and the second pattern is that using time series based on changes with the stability of the world economy. In forecasting, the test level is measuring forecasting accuracy. It can be done by MSE, which is still so easy that optimization is carried out in measuring accuracy by modifying MSE using a false alarm rate in the form of a formula to find the difference. The first pattern process went well and got an accuracy value calculated with the MSE of 0.0538, and the modified MSE measurement technique used the False Alarm Rate of 0.0119. In the second pattern, it also went well and got an MSE value of 0.1508, and the modified MSE measurement te...

Research paper thumbnail of Automatic Switch Prototype without Touch Assistance Wireless Fidelity (Wi-Fi) Signal

802.11 WLAN Standard is a wireless local area network signal, known as Wireless Fidelity (WiFi). ... more 802.11 WLAN Standard is a wireless local area network signal, known as Wireless Fidelity (WiFi). One of the parameters contained in the WiFi signal is SSID. SSID or Service Set Identifier is the name used to identify a WiFi network. In this study utilizing SSID to control electrical devices, namely lights. The way this works is that the receiver will turn on the light if it detects an SSID polmed. The receiver unit is consists of Arduino Board, Relay and ESP8266. transmitter unit is an SSID-generating device, like a smart phone with has the hotspot feature activated and is the same as the SSID name with the receiving unit. Furthermore, the sensitivity of the receiver unit is set to find out at distance the lamp starts to turn on. The transmitter unit is shifted according to the experiment and the receiver unit stays in place. From the experimental results it was found that if sensitivity 1: RSL> -90 dBm, the lamp starts to light at a distance of 20 m, if sensitivity 2: RSL> -7...

Research paper thumbnail of Disruptive Innovation Service Oriented Framework: A Case Study of Transportation in Indonesia

Proceedings of the 7th International Conference on Multidisciplinary Research

Research paper thumbnail of Database Management Optimization Using PostgreSQL Replication Database in Database System

Research paper thumbnail of Development of Web Stock Opname Application With SAP Business One Using Scrum Method

2019 International Conference of Computer Science and Information Technology (ICoSNIKOM)

SME Company (Small and Medium Enterprises) is a small-scale business unit, which require to have ... more SME Company (Small and Medium Enterprises) is a small-scale business unit, which require to have inventory function as an important asset in the company to ensure the availability of goods and stock within the warehouse process. Thus, an inventory management process calls Stock opname that is carried out to conduct calculation and computation have been established. Previously, majority activity process have been carried out manually in which the employees check and record the available items through reporting them to the managers without using any kind of software whatsoever, only a piece of document that have no integration with other business processes. Therefore, the data that is not processed in the real-time might be different at certain period and unmatched with the real situation can lead to the wrong decision making. Thus, the application should be developed, which in this case utilizing the web application to be integrated with SAP Business One to solve existing problems within the company to provide accurate and real-time inventory information management. It also has objective to maintain updated information with other department, unit or even business modules within the SME companies.

Research paper thumbnail of The effect of the TF-IDF algorithm in times series in forecasting word on social media

Indonesian Journal of Electrical Engineering and Computer Science

Forecasting is one of the main topics in data mining or machine learning in which forecasting, a ... more Forecasting is one of the main topics in data mining or machine learning in which forecasting, a group of data used, has a label class or target. Thus, many algorithms for solving forecasting problems are categorized as supervised learning with the aim of conducting training. In this case, the things that were supervised were the label or target data playing a role as a 'supervisor' who supervise the training process in achieving a certain level of accuracy or precision. Time series is a method that is generally used to forecast based on time and can forecast words in social media. In this study had conducted the word forecasting on twitter with 1734 tweets which were interpreted as weighted documents using the TF-IDF algorithm with a frequency that often comes out in tweets so the TF-IDF value is getting smaller and vice versa. After getting the word weight value of the tweets, a time series forecast was performed with the test data of 1734 tweets that the results referred ...

Research paper thumbnail of Measurement of Detection Rate Accuracy in Forecasting Crude Palm Oil Production using Fuzzy Time Series

2021 2nd International Conference on Innovative and Creative Information Technology (ICITech)

Research paper thumbnail of Detection of HOG Features on Tuberculosis X-Ray Results Using SVM and KNN

2021 2nd International Conference on Innovative and Creative Information Technology (ICITech)

Research paper thumbnail of Customer Satisfaction Assessment Coffee Roaster Restaurant using SERVQUAL: Utilization of Customer Relationship Management (CRM) Application

2021 4th International Conference on Data Storage and Data Engineering

Several cities have been recognized to be tourism destination due to the popularity in the culina... more Several cities have been recognized to be tourism destination due to the popularity in the culinary, which provides diverse choice in every corner such as food stalls, cafes, food festival restaurant and much more. The market potential is very huge, which the competition run in the tight way in term of provides variability, exclusivity, durability and other offered to increase customer satisfaction. The strategy emphasizes the importance of customer service to generate responsible customer experience leading to the increase customer retention. Thus, this study wants to explore the customer satisfaction to verify the influence of customer expectation, loyalty program, shared stories and service marketing through the questionnaire survey. The assessment will generate the important factors that can influence the degree of satisfaction in the culinary industry through the utilization of customer relationship management (CRM) as the front desk application.

Research paper thumbnail of A Case Study of Universities Dormitory Residence Management System (DRMS) in Indonesia

2018 6th International Conference on Cyber and IT Service Management (CITSM)

This study explores the problems and challenges faced by several universities in Indonesia to all... more This study explores the problems and challenges faced by several universities in Indonesia to allow, commonly, the first year students to enroll in dormitory either online or offline. It is reasonable for prospective students to have expectation that university provide suitable facilities in term of accommodation and logistics considering that a large number of student come from different cities in various provinces. The development of Dormitory Residential Management System (DRMS) should accommodate the process of enrollment, payment and booking from student online and support the staff to control and manage integrated program or activities based on determined schedule. Besides that, the system also allow monitoring process for reporting purpose and notify or confirm certain activities or allocation process. This study investigates several systems used by respected universities to identify the level of satisfaction of students. Interestingly, there are many evidences showed bottom level of satisfaction from student towards the services offered by university for DRMS.

Research paper thumbnail of Business Process Re-Engineering: Strategies for Health Management Services in Puskesmas

Proceedings of Sixth International Congress on Information and Communication Technology

Research paper thumbnail of Model of Business Intelligence Applied the Principle of Cooperative Society in the Business Forums

2021 10th International Conference on Software and Computer Applications

Business forums are activities between individuals and organizations that carry out the transacti... more Business forums are activities between individuals and organizations that carry out the transactions on online media or within applications, which spread across countries. Along with the development of information technology towards business intelligence (BI), the business processes carried out in the business forum are modeled specifically in order to create an effort and attempt to follow the indicator and criteria from the industrial revolution 4.0. In this paper, a model is designed to combine three type of principles, namely the business forum, BI and the cooperative principle. Actually, cooperatives have been long abandoned since the existence of conventional and Islamic banking concept but it has kinship principle to divide the profits based on the size of the contribution given. Meanwhile, BI model is designed to obtain a formula from the cooperative principle, namely the residual income from operations where the transaction process is successfully implemented through the application to allocate a portion of the profits to the members based on the specified percent.

Research paper thumbnail of Dealing with Voters' Privacy Preferences and Readiness in Electronic Voting

Indonesian Journal of Electrical Engineering and Computer Science, 2018

Various countries have been encouraged to adopt electronic voting because it can reduce operation... more Various countries have been encouraged to adopt electronic voting because it can reduce operational cost and time spent for tabulation process. In the current research, it has been mentioned several problem arised in term of technical aspects, voters' trust, machine vulnerabilities and privacy right in which experts argued the election system have been compromised. In short term, the certain faction will try to exploit the system weaknesses for their own benefit, while in the long term, it can create public distrust to the government, which decrease the voters turn out, break the participation willingness and downgrade the quality of voting. Thus, the government should deal with previous issues in the election before adopting electronic approach while at the same time align with voters' expectation to provide better election in serve citizen through comprehensive analysis. This study provide initial step to analyse the readiness of electronic voting from the social perspecti...

Research paper thumbnail of Wireless Service at Public University: A Survey of Users Perception on Security Aspects

ICOIACT 2018, 2018

There is an important growth in the application to detect and protect network from the intrusion ... more There is an important growth in the application to detect and protect network from the intrusion and unauthorized party as well as create access control among users around the world through this decade. Contextually, the majority of users expected an integrated platform to address the challenges posed by cyber security while also enabling secure access to campus network. Not surprisingly, the large majority of enterprises also have implemented some form of protection mechanism to provide end-to-end security such as firewall, authentication or antivirus, which at some extent it is difficult to design, configure, manage, maintain and monitor. Therefore, many security breaches are occurred because of the misconfiguration resulted the vulnerabilities to be exploited by hackers or caused by compatibility issues between products used in the campus network to reduce budget. Arguably, many security aspects can be strengthen through the improvement of human resource strategy to handle the campus network. This study want to investigate the user perception on security aspect of Wi-Fi performance in Universiti Utara Malaysia to provide some insights on the indicators to be considered by the network administrator.

Research paper thumbnail of Analysis of Project Integration on Smart Parking System in Telkom University

2018 6th International Conference on Cyber and IT Service Management (CITSM)

The parking process is common attempt to eliminate traffic in the road by providing certain spot ... more The parking process is common attempt to eliminate traffic in the road by providing certain spot for vehicle to stay for certain time. Considering the increase of amount of population, large parking area horizontally or vertically is not necessary proper solution because it requires enormous expenses to acquire vacant land or to construct high-rise building. Therefore, smart parking system is one solution to provide information on the availability of vacant parking locations efficiently and conduct identification and transaction process quickly. Telkom University has been adopted this system by using physical card with RFID built-in for handling, convenience and security purposes since October 2014. Even though, it deliver an easy way for verification and validation but some problem occurred that raise several complaints from student and staff. This study has objective to explore the challenges and to addresses the issues faced by smart parking system, which has been implemented in subsequent years. By identifying the solution, it can improve the quality of the system for greater purpose in the future.

Research paper thumbnail of Mapping of TOGAF ADM and TMForum Frameworx in the Telecommunication Industry

Proceedings of Sixth International Congress on Information and Communication Technology

Research paper thumbnail of The Effect of E-Commerce Towards Sales Growth on Social Media among Students in Indonesia

2021 8th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI)

Research paper thumbnail of Stream Control Transportation Protocol (SCTP) towards MANET Routing: Comparison of DSR and AODV

2019 International Conference on Sustainable Engineering and Creative Computing (ICSECC), 2019

This research wants to compare the performance of Stream Control Transportation Protocol (SCTP) w... more This research wants to compare the performance of Stream Control Transportation Protocol (SCTP) with two difference mechanism, which are Ad-hoc on Demand Distance Vector (AODV) and Dynamic Source Routing protocol (DSR) by using Network Simulator (NS-2). Specifically, it measures the behavior of SCTP in terms of throughput and smoothness by having assumption that routing protocol in MANET (Mobile Ad-hoc Network) can bring significant effect in SCTP in the overall performance. Actually, IETF (Internet Engineering Task Force), has issued a new protocol called SCTP, which in this study, the interaction of SCTP is investigated through the examination of traffic flows through a number of network topologies. This performance analysis is over MANET Routing Protocol that enables the process of analysis of several performance metrics. The simulation use topology with 16 nodes that is consisting of metric 4×4 of SCTP transport layer for both routing protocol of AODV and DSR. At last, this rese...

Research paper thumbnail of A Framework of Utilizing Big Data of Social Media to Find Out the Habits of Users Using Keyword

Optimal search in search engines is very urgent, especially search performs on social media searc... more Optimal search in search engines is very urgent, especially search performs on social media search engine. Very big data in social media have not been not used as many as expected, making the existed data are only limited to the data themselves. However, using keywords on social media search engines could only produces incomplete and inaccurate data thereby the search results only have limited usage. This paper contains a framework using keywords in social media search engines that aims to gain users' habits by utilizing social media data. The framework offered is in the form of steps to optimize the search engines, so that the optimal social media search engine could be used as an entry point to find the desired data on specific social media user. The step is initialized by analyzing existing posts to get more specific and accurate data from social media users. The social media system then could use those specific keywords to identify the identity of a specific user in the info...

Research paper thumbnail of Information Security Awareness (ISA) towards the Intention to Comply and Demographic Factors: Statistical Correspondence Analysis

Evidence from the literature and observation conducted from various practice in managing project ... more Evidence from the literature and observation conducted from various practice in managing project or developing product within the organization suggested that human factors in term of control and direction can be the greatest threats to the organization to ensure the high quality of information security. Therefore, fewer research was conducted towards assessing the level of end-user awareness in a practical way to extract the relationship of demographic factor with user compliance in order to understand the working mechanism. Thus, this study prepares a literature review with the PRISMA model to implement a systematic process in an integrated manner in order to reveal representative information on the subject. Subsequently, a correspondence analysis (CA) was conducted to discover the hidden meaning of the relevant demographic factors that might affect the intention to comply with the organization's policy to protect confidential, sensitive and confidential information. One intere...

Research paper thumbnail of Optimization of MSE Accuracy Value Measurement Applying False Alarm Rate in Forecasting on Fuzzy Time Series based on Percentage Change

Time series is a method of forecasting in which it is carried out on the previous data to obtain ... more Time series is a method of forecasting in which it is carried out on the previous data to obtain future data. This study conducted forecasting on the price of gold, in which the process is divided into two patterns. In the first pattern, forecasting used change-based time series with the world economic instability such as the Covid-19 pandemic, and the second pattern is that using time series based on changes with the stability of the world economy. In forecasting, the test level is measuring forecasting accuracy. It can be done by MSE, which is still so easy that optimization is carried out in measuring accuracy by modifying MSE using a false alarm rate in the form of a formula to find the difference. The first pattern process went well and got an accuracy value calculated with the MSE of 0.0538, and the modified MSE measurement technique used the False Alarm Rate of 0.0119. In the second pattern, it also went well and got an MSE value of 0.1508, and the modified MSE measurement te...

Research paper thumbnail of Automatic Switch Prototype without Touch Assistance Wireless Fidelity (Wi-Fi) Signal

802.11 WLAN Standard is a wireless local area network signal, known as Wireless Fidelity (WiFi). ... more 802.11 WLAN Standard is a wireless local area network signal, known as Wireless Fidelity (WiFi). One of the parameters contained in the WiFi signal is SSID. SSID or Service Set Identifier is the name used to identify a WiFi network. In this study utilizing SSID to control electrical devices, namely lights. The way this works is that the receiver will turn on the light if it detects an SSID polmed. The receiver unit is consists of Arduino Board, Relay and ESP8266. transmitter unit is an SSID-generating device, like a smart phone with has the hotspot feature activated and is the same as the SSID name with the receiving unit. Furthermore, the sensitivity of the receiver unit is set to find out at distance the lamp starts to turn on. The transmitter unit is shifted according to the experiment and the receiver unit stays in place. From the experimental results it was found that if sensitivity 1: RSL> -90 dBm, the lamp starts to light at a distance of 20 m, if sensitivity 2: RSL> -7...

Research paper thumbnail of Disruptive Innovation Service Oriented Framework: A Case Study of Transportation in Indonesia

Proceedings of the 7th International Conference on Multidisciplinary Research

Research paper thumbnail of Database Management Optimization Using PostgreSQL Replication Database in Database System

Research paper thumbnail of Development of Web Stock Opname Application With SAP Business One Using Scrum Method

2019 International Conference of Computer Science and Information Technology (ICoSNIKOM)

SME Company (Small and Medium Enterprises) is a small-scale business unit, which require to have ... more SME Company (Small and Medium Enterprises) is a small-scale business unit, which require to have inventory function as an important asset in the company to ensure the availability of goods and stock within the warehouse process. Thus, an inventory management process calls Stock opname that is carried out to conduct calculation and computation have been established. Previously, majority activity process have been carried out manually in which the employees check and record the available items through reporting them to the managers without using any kind of software whatsoever, only a piece of document that have no integration with other business processes. Therefore, the data that is not processed in the real-time might be different at certain period and unmatched with the real situation can lead to the wrong decision making. Thus, the application should be developed, which in this case utilizing the web application to be integrated with SAP Business One to solve existing problems within the company to provide accurate and real-time inventory information management. It also has objective to maintain updated information with other department, unit or even business modules within the SME companies.

Research paper thumbnail of The effect of the TF-IDF algorithm in times series in forecasting word on social media

Indonesian Journal of Electrical Engineering and Computer Science

Forecasting is one of the main topics in data mining or machine learning in which forecasting, a ... more Forecasting is one of the main topics in data mining or machine learning in which forecasting, a group of data used, has a label class or target. Thus, many algorithms for solving forecasting problems are categorized as supervised learning with the aim of conducting training. In this case, the things that were supervised were the label or target data playing a role as a 'supervisor' who supervise the training process in achieving a certain level of accuracy or precision. Time series is a method that is generally used to forecast based on time and can forecast words in social media. In this study had conducted the word forecasting on twitter with 1734 tweets which were interpreted as weighted documents using the TF-IDF algorithm with a frequency that often comes out in tweets so the TF-IDF value is getting smaller and vice versa. After getting the word weight value of the tweets, a time series forecast was performed with the test data of 1734 tweets that the results referred ...

Research paper thumbnail of Measurement of Detection Rate Accuracy in Forecasting Crude Palm Oil Production using Fuzzy Time Series

2021 2nd International Conference on Innovative and Creative Information Technology (ICITech)

Research paper thumbnail of Detection of HOG Features on Tuberculosis X-Ray Results Using SVM and KNN

2021 2nd International Conference on Innovative and Creative Information Technology (ICITech)

Research paper thumbnail of Customer Satisfaction Assessment Coffee Roaster Restaurant using SERVQUAL: Utilization of Customer Relationship Management (CRM) Application

2021 4th International Conference on Data Storage and Data Engineering

Several cities have been recognized to be tourism destination due to the popularity in the culina... more Several cities have been recognized to be tourism destination due to the popularity in the culinary, which provides diverse choice in every corner such as food stalls, cafes, food festival restaurant and much more. The market potential is very huge, which the competition run in the tight way in term of provides variability, exclusivity, durability and other offered to increase customer satisfaction. The strategy emphasizes the importance of customer service to generate responsible customer experience leading to the increase customer retention. Thus, this study wants to explore the customer satisfaction to verify the influence of customer expectation, loyalty program, shared stories and service marketing through the questionnaire survey. The assessment will generate the important factors that can influence the degree of satisfaction in the culinary industry through the utilization of customer relationship management (CRM) as the front desk application.

Research paper thumbnail of A Case Study of Universities Dormitory Residence Management System (DRMS) in Indonesia

2018 6th International Conference on Cyber and IT Service Management (CITSM)

This study explores the problems and challenges faced by several universities in Indonesia to all... more This study explores the problems and challenges faced by several universities in Indonesia to allow, commonly, the first year students to enroll in dormitory either online or offline. It is reasonable for prospective students to have expectation that university provide suitable facilities in term of accommodation and logistics considering that a large number of student come from different cities in various provinces. The development of Dormitory Residential Management System (DRMS) should accommodate the process of enrollment, payment and booking from student online and support the staff to control and manage integrated program or activities based on determined schedule. Besides that, the system also allow monitoring process for reporting purpose and notify or confirm certain activities or allocation process. This study investigates several systems used by respected universities to identify the level of satisfaction of students. Interestingly, there are many evidences showed bottom level of satisfaction from student towards the services offered by university for DRMS.

Research paper thumbnail of Business Process Re-Engineering: Strategies for Health Management Services in Puskesmas

Proceedings of Sixth International Congress on Information and Communication Technology

Research paper thumbnail of Model of Business Intelligence Applied the Principle of Cooperative Society in the Business Forums

2021 10th International Conference on Software and Computer Applications

Business forums are activities between individuals and organizations that carry out the transacti... more Business forums are activities between individuals and organizations that carry out the transactions on online media or within applications, which spread across countries. Along with the development of information technology towards business intelligence (BI), the business processes carried out in the business forum are modeled specifically in order to create an effort and attempt to follow the indicator and criteria from the industrial revolution 4.0. In this paper, a model is designed to combine three type of principles, namely the business forum, BI and the cooperative principle. Actually, cooperatives have been long abandoned since the existence of conventional and Islamic banking concept but it has kinship principle to divide the profits based on the size of the contribution given. Meanwhile, BI model is designed to obtain a formula from the cooperative principle, namely the residual income from operations where the transaction process is successfully implemented through the application to allocate a portion of the profits to the members based on the specified percent.

Research paper thumbnail of Dealing with Voters' Privacy Preferences and Readiness in Electronic Voting

Indonesian Journal of Electrical Engineering and Computer Science, 2018

Various countries have been encouraged to adopt electronic voting because it can reduce operation... more Various countries have been encouraged to adopt electronic voting because it can reduce operational cost and time spent for tabulation process. In the current research, it has been mentioned several problem arised in term of technical aspects, voters' trust, machine vulnerabilities and privacy right in which experts argued the election system have been compromised. In short term, the certain faction will try to exploit the system weaknesses for their own benefit, while in the long term, it can create public distrust to the government, which decrease the voters turn out, break the participation willingness and downgrade the quality of voting. Thus, the government should deal with previous issues in the election before adopting electronic approach while at the same time align with voters' expectation to provide better election in serve citizen through comprehensive analysis. This study provide initial step to analyse the readiness of electronic voting from the social perspecti...

Research paper thumbnail of Wireless Service at Public University: A Survey of Users Perception on Security Aspects

ICOIACT 2018, 2018

There is an important growth in the application to detect and protect network from the intrusion ... more There is an important growth in the application to detect and protect network from the intrusion and unauthorized party as well as create access control among users around the world through this decade. Contextually, the majority of users expected an integrated platform to address the challenges posed by cyber security while also enabling secure access to campus network. Not surprisingly, the large majority of enterprises also have implemented some form of protection mechanism to provide end-to-end security such as firewall, authentication or antivirus, which at some extent it is difficult to design, configure, manage, maintain and monitor. Therefore, many security breaches are occurred because of the misconfiguration resulted the vulnerabilities to be exploited by hackers or caused by compatibility issues between products used in the campus network to reduce budget. Arguably, many security aspects can be strengthen through the improvement of human resource strategy to handle the campus network. This study want to investigate the user perception on security aspect of Wi-Fi performance in Universiti Utara Malaysia to provide some insights on the indicators to be considered by the network administrator.

Research paper thumbnail of Analysis of Project Integration on Smart Parking System in Telkom University

2018 6th International Conference on Cyber and IT Service Management (CITSM)

The parking process is common attempt to eliminate traffic in the road by providing certain spot ... more The parking process is common attempt to eliminate traffic in the road by providing certain spot for vehicle to stay for certain time. Considering the increase of amount of population, large parking area horizontally or vertically is not necessary proper solution because it requires enormous expenses to acquire vacant land or to construct high-rise building. Therefore, smart parking system is one solution to provide information on the availability of vacant parking locations efficiently and conduct identification and transaction process quickly. Telkom University has been adopted this system by using physical card with RFID built-in for handling, convenience and security purposes since October 2014. Even though, it deliver an easy way for verification and validation but some problem occurred that raise several complaints from student and staff. This study has objective to explore the challenges and to addresses the issues faced by smart parking system, which has been implemented in subsequent years. By identifying the solution, it can improve the quality of the system for greater purpose in the future.

Research paper thumbnail of Mapping of TOGAF ADM and TMForum Frameworx in the Telecommunication Industry

Proceedings of Sixth International Congress on Information and Communication Technology