Yunarso Anang | STIS jakarta (original) (raw)
Papers by Yunarso Anang
SICE Journal of Control, Measurement, and System Integration, Apr 19, 2023
Prosiding Seminar Nasional Official Statistics, Nov 1, 2022
2022 61st Annual Conference of the Society of Instrument and Control Engineers (SICE)
SICE Journal of Control, Measurement, and System Integration
Information
In this study, we proposed a method to improve the safety level of control software (CSW) by mana... more In this study, we proposed a method to improve the safety level of control software (CSW) by managing the CSW’s design information and safety analysis results, and combining failure mode and effects analysis (FMEA) and fault tree analysis (FTA). Here, the CSW is developed using structured analysis and design methodology. In the upper stage of the CSW’s development process, as the input of the preliminary design information (data flow diagrams (DFDs) and control flow diagrams (CFDs)), the causes of undesirable events of the CSW are clarified by FMEA, and the countermeasures are reflected in the preliminary design information. In the lower stage of the CSW’s development process, as the inputs of the detailed design information (DFDs and CFDs in the lower level) and programs, the causes of the specific undesirable event are clarified by FTA, and the countermeasures are reflected in the detailed design specifications and programs. The processes are repeated until the impact of undesirab...
Proceedings of The International Conference on Data Science and Official Statistics, 2022
As a higher education institution, Politeknik Statistika STIS also faces the same problems as uni... more As a higher education institution, Politeknik Statistika STIS also faces the same problems as universities in general, those are student failing to compare that year courses thus have to repeat those courses or student dropping out. To overcome this problem, this research proposes a Dropout Early Warning System (DEWS) that can provide early warnings for dropouts and repeat a class. With this system, it is hoped that it can help institutions to identify students who have the potential to drop out or repeat a class. The purpose of making this system is to help academic supervisors and decision makers from Polstat STIS in knowing the potential for student. The potential for students to drop out and repeat a class is measured by a potential score obtained from the results of an assessment of 5 criteria consisting of GPA scores, gender, economic factors, violation points, and record of repeating class. Prediction results are presented in three categories consisting of low potential, medi...
A program fragment that is created by copying & pasting an existing program is called Code Clone ... more A program fragment that is created by copying & pasting an existing program is called Code Clone (CC). A program fragment that some instructions are added, deleted, and modified is called Gapped Code Clones (GCC). In general, many CCs and GCCs that exist in the program decrease readability and maintainability of the program. This study proposes an effective detection method of CCs and GCCs that are suitable for merging by calculating software metrics related to the complexity of the control flow, independent from other program portions, and non-dependency of programming language specification. Additionally, this study recommends the merging procedure of CCs and GCCs by calculating software metrics related to the program structure of CCs and GCCs. As a result of the application of the proposed method to the existing programs, it is confirmed that the adequate merging of CCs and GCCs is conducted.
2016 IEEE/SICE International Symposium on System Integration (SII), 2016
Many industrial products are controlled by software. Errors in the control software make the prod... more Many industrial products are controlled by software. Errors in the control software make the products and users danger. To avoid this situation, it is necessary that in expected behaviors and operations do not make the products unsafe state. This paper proposes a method that the control software makes safe by conducting "Failure Mode and Effects Analysis (FMEA)" and "Fault Tree Analysis (FTA)" repeatedly. The outline of the proposed method is as follows. In the upper phase, risks of control software are analyzed by using FMEA exhaustively, and the measures are reflected to the specifications. In the lower phase, risks that cannot be taken the measures are clarified, and the measures are reflected to the specifications and software. FMEA and FTA are conducted repeatedly, until the control software does not contain risk.
2016 55th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), 2016
This paper proposes a method that aggregates similar portions in a program into one common portio... more This paper proposes a method that aggregates similar portions in a program into one common portion and redesigns current program structure to appropriate program structure. When a new function is added to an existing program, the function tends to be developed by copying & pasting a portion in the program and modifying its portion. As a result, it becomes to exist many similar portions in the program. In the case that error modifications or changes occurs in the similar portion, appropriate modifications are required to the all similar portions. It would be considered that the quality and efficiency of those tasks are decreased. So that, this paper proposes a method that detect similar portions with minor modifications and a method that aggregates those similar portions to one appropriate common portion with well-defined program structure. As a result, current program becomes to be refined to the program that can accommodate future modification or changes properly.
This paper proposes a method that redesigns a program with an inappropriate structure into a prog... more This paper proposes a method that redesigns a program with an inappropriate structure into a program with appropriate structure. When a program has been using for a long period, many functional additions and modifications to the program have occurred. Those are realized by copying & pasting a part of the program and modifying it. As a result, the program becomes to have inappropriate structure and to contain many similar portions. Those similar parts make future maintenances of the program difficult. So, this paper proposes a method that clarifies similar portions in the program and integrates all similar parts into a common portion by using Code Clone detecting method. Furthermore, this paper proposes a method that the current program structure translates into the appropriate program structure by using a refactoring method when integrating code clones. Consequently, the program becomes to be able to adjust functional additions and modifications in the future. Additionally, the prog...
Considering software architecture concurrently and iteratively with software requirements, has be... more Considering software architecture concurrently and iteratively with software requirements, has been illustrated as a way to increase productivity and stakeholder satisfaction in the twin peaks model software development process. Because this model exposed only the tip of the iceberg, and lacks of concrete definitions and techniques, an approach of utilizing this model in the real world has been proposed by applying the concept of the product development process based on Quality Function Deployment. In this paper, we will go further of giving more detail about how to define the requirements along with software architecture. In order to provide a method to define a robust software architecture but to be adaptable to the presence of changing requirements, we apply layering concept to the software requirements analysis and architectural design.
2021 60th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), 2021
This paper proposes a comprehensive creation method of hardware and software combined test (HSCT)... more This paper proposes a comprehensive creation method of hardware and software combined test (HSCT) specifications for industrial products controlled by software using Hazard and Operability Study (HAZOP) which is a method for analyzing undesirable events. To develop an industrial product that behaves adequately, it is necessary to conduct the HSCT in addition to the hardware and software unit test. The HSCT investigates troubles that cannot be tested at the whole industrial product level. But the coverage is insufficient because the HSCT items are created by the engineer manually. The proposed method creates test items using HAZOP to improve the coverage. Following countermeasures are conducted; (1) The information, such as the equipment name, the parameter name, the type, and send to/ receive from, etc., is added to the HAZOP's parameter. (2) The information that is necessary to create test items is dealt with formally by defining the format of parameter, guide-word, and program...
Revolusi industri 4.0 mengarah ke era digitalisasi dan menjalani semuanya serba digital. Industri... more Revolusi industri 4.0 mengarah ke era digitalisasi dan menjalani semuanya serba digital. Industri 4.0 sebagai produksi dari Cyber-Physical System (CPS) yang terintegrasi dan berkorelasi dengan algoritma, Big Data, hingga Internet of Things (IoT). CPS ialah suatu integrasi antara suatu perhitungan atau komputasi dengan proses fisik dari sistem. Salah satu penerapan CPS adalah IoT yang saling terhubung dengan proses fisik melalui jaringan Internet. IoT berkaitan dengan sistem pintar, seperti smart home, smart office, dan sebagainya sesuai di mana teknologi IoT tersebut diterapkan. Smart home atau smart office merupakan contoh di mana rumah atau gedung perkantoran yang sudah memanfaatkan teknologi IoT sehingga pengoperasian bangunan tersebut menjadi mudah dan saling terintegrasi antar proses fisiknya. BPS salah satu lembaga non-kementerian yang memiliki gedung perkantorannya guna melaksanakan tugas pemerintahannya. Dalam penelitian ini dilakukan kajian penerapan IoT pada Pusdiklat BPS ...
Trends in Computer Science and Information Technology, 2020
Recently, industrial products, such as cars, medical apparatuses, and aerospace apparatuses, are ... more Recently, industrial products, such as cars, medical apparatuses, and aerospace apparatuses, are developed as the systems that are combined the hardware and software, and their confi guration of the apparatuses and controls become complex. As a result, unintended accidents occur when using the industrial products. Those accidents occur when hazards that are occurred by interactions between hardware and software when using an apparatus and some negative conditions that cause the accident are satisfi ed. This accident model is called as Systems-Theoretic Accident Model and Process (STAMP) model. Additionally, based on the STAMP model, the safety analysis method that clarifi es hazards and hazard scenarios is called STAMP based Process Analysis (STPA) [1]. This paper proposes a method that clarifi es the hazards and proposes safety countermeasures after completing the development of the functional specifi cations for Embedded Control Software (ECSW). In the proposed method, STPA is conducted by inputting the ECSW system specifi cations that are consisted use-case diagrams and class diagrams that are written in Unifi ed Modeling Language (UML). As a result of conducting STPA, hazards are clarifi ed, and hazard scenarios are developed. Sequence diagrams corresponding to the hazard-scenarios are developed and the Hazard Causal Factors (HCFs) are clarifi ed. In this case, the reasons of the HCFs are the execution of methods and/or the non-execution of methods in the class. Based on the STAMP model, the safety analysis method that clarifi es the hazards and the hazard scenarios is called a System-Theoretic Process Analysis (STPA). The organization of this paper is explained below. Section 2 describes the related works. Section 3 describes the outline of the proposed method. Section 4 describes the applications and evaluations of the proposed method. And section 5 describes future works.
Information, 2020
There are many industrial products in our life, and the actions of those products are controlled ... more There are many industrial products in our life, and the actions of those products are controlled by embedded control software (ECSW). Recently, many troubles have been caused by ECSW. To avoid those troubles, it is necessary to clarify the causes of the troubles and take countermeasures. However, the results of those tasks depend on the skills of the analyst. This paper proposes an analytic method that clarifies the causes of troubles by applying fault tree analysis (FTA) to the ECSW. The characteristics of the proposed method are as follows: Preparation of fault tree templates (FTTs) corresponding to instructions of the ECSW, and definition of the FT development rules by combining FTTs according to the back-tracing of the instruction execution process. By complying with the proposed method strictly, when an analyst who has studied computer science and safety engineering for 2–3 years conducts FTA, the analyst can obtain an appropriate result of FTA. This indicates that the safety l...
Communication in Science and Technology, 2018
Statistics Indonesia, known in Indonesia as Badan Pusat Statistik (BPS), has conducted a series o... more Statistics Indonesia, known in Indonesia as Badan Pusat Statistik (BPS), has conducted a series of trials to utilize Computer-Assisted Personal Interview (CAPI) in a census or survey. However, CAPI costs a lot of money to procure and maintain the device. Bring Your Own Device (BYOD) principle offers cost opportunity to device management. In the practice of BYOD in BPS, a device that has good performance is required, because some devices aren't capable of running CAPI properly. Yet, in BPS there is no standard value to qualify mobile devices to be used in census or survey. Therefore, it is necessary to review what kind of device is suitable for using CAPI. This study utilized CAPI used in a student's field study as a case study reference. Initially, researchers develop benchmark applications as a tool for feasibility. Furthermore, developed application is tested on a certain base device to calculate the scores to be used as the standard values.
Emitter International Journal of Engineering Technology, Apr 7, 2022
Computer-based test or assessment has been used widely, especially in the current COVID-19 pandem... more Computer-based test or assessment has been used widely, especially in the current COVID-19 pandemic, where many schools are conducting distance learning as well as distance examination. The need for a computer or software system to support education is inevitable. A range of solutions, from the free/open source software systems to the paid/proprietary ones have been publicly available. Still, an organization with limited resources prefers to find free or low-budget, while yet demanding reliable solutions. We have reported the use of the computer-based test in a new student recruitment test which is held country-wide. We developed the system based on TCExam, a free and open source computer-based test software, and successfully fulfilled the requirements, but with some tweaks. We found that the TCExam has a performance degradation when used by a large number of examinees concurrently, especially during specific phases during the test. This paper reports the result of our investigation to address the problem and suggests some modifications to the base codes as well as a recommendation of the hardware configuration. We evaluated the modified system in a simulated environment. We successfully achieved up to 56% performance gain using the modified system.
2019 4th International Conference on Information Technology (InCIT), 2019
Proceedings of The International Conference on Data Science and Official Statistics, 2022
In improving quality of employees through education, Statistics Indonesia is assisted by Educatio... more In improving quality of employees through education, Statistics Indonesia is assisted by Education and Training Centre, one of them through the Study Task program at Master's and Doctoral degrees. Due to the decrease of registrant as candidate participants of this program and to facilitate employees proposed, information system for providing recommendations Study Task program is needed. This research aims to provide recommendations to employees who are highly, moderately or not recommended being able to continue education with Study Task program using an information system. Decision-making in system is Fuzzy Analytic Hierarchy Process (Fuzzy AHP) method with assessment criteria, sub-criteria and their weights can be changed by certain actors. The system was built using the Framework for the Application of Systems Thinking (FAST) method. The system was evaluated by Black Box Testing with the results of all functions running well and System Usability Scale with results of 80.71 wh...
SICE Journal of Control, Measurement, and System Integration
This paper proposes a method that aggregates similar portions (code clones) in the developed prog... more This paper proposes a method that aggregates similar portions (code clones) in the developed program and redesigns the current program structure to an adequate program structure. The procedure of the proposed method is the following: Code clones are detected, and their characteristics are extracted, the design methods that code clones are aggregated are proposed, the program is modified, and the affected portions in the program are clarified and retested. Furthermore, a tool that supports the proposed method is created. As a result of applying the proposed method and the tool, it is found that 45% CCs are aggregated and 13% instructions of the program are deleted. Additionally, it is found that an adequate program structure is realized by using the proposed method and the tool.
SICE Journal of Control, Measurement, and System Integration, Apr 19, 2023
Prosiding Seminar Nasional Official Statistics, Nov 1, 2022
2022 61st Annual Conference of the Society of Instrument and Control Engineers (SICE)
SICE Journal of Control, Measurement, and System Integration
Information
In this study, we proposed a method to improve the safety level of control software (CSW) by mana... more In this study, we proposed a method to improve the safety level of control software (CSW) by managing the CSW’s design information and safety analysis results, and combining failure mode and effects analysis (FMEA) and fault tree analysis (FTA). Here, the CSW is developed using structured analysis and design methodology. In the upper stage of the CSW’s development process, as the input of the preliminary design information (data flow diagrams (DFDs) and control flow diagrams (CFDs)), the causes of undesirable events of the CSW are clarified by FMEA, and the countermeasures are reflected in the preliminary design information. In the lower stage of the CSW’s development process, as the inputs of the detailed design information (DFDs and CFDs in the lower level) and programs, the causes of the specific undesirable event are clarified by FTA, and the countermeasures are reflected in the detailed design specifications and programs. The processes are repeated until the impact of undesirab...
Proceedings of The International Conference on Data Science and Official Statistics, 2022
As a higher education institution, Politeknik Statistika STIS also faces the same problems as uni... more As a higher education institution, Politeknik Statistika STIS also faces the same problems as universities in general, those are student failing to compare that year courses thus have to repeat those courses or student dropping out. To overcome this problem, this research proposes a Dropout Early Warning System (DEWS) that can provide early warnings for dropouts and repeat a class. With this system, it is hoped that it can help institutions to identify students who have the potential to drop out or repeat a class. The purpose of making this system is to help academic supervisors and decision makers from Polstat STIS in knowing the potential for student. The potential for students to drop out and repeat a class is measured by a potential score obtained from the results of an assessment of 5 criteria consisting of GPA scores, gender, economic factors, violation points, and record of repeating class. Prediction results are presented in three categories consisting of low potential, medi...
A program fragment that is created by copying & pasting an existing program is called Code Clone ... more A program fragment that is created by copying & pasting an existing program is called Code Clone (CC). A program fragment that some instructions are added, deleted, and modified is called Gapped Code Clones (GCC). In general, many CCs and GCCs that exist in the program decrease readability and maintainability of the program. This study proposes an effective detection method of CCs and GCCs that are suitable for merging by calculating software metrics related to the complexity of the control flow, independent from other program portions, and non-dependency of programming language specification. Additionally, this study recommends the merging procedure of CCs and GCCs by calculating software metrics related to the program structure of CCs and GCCs. As a result of the application of the proposed method to the existing programs, it is confirmed that the adequate merging of CCs and GCCs is conducted.
2016 IEEE/SICE International Symposium on System Integration (SII), 2016
Many industrial products are controlled by software. Errors in the control software make the prod... more Many industrial products are controlled by software. Errors in the control software make the products and users danger. To avoid this situation, it is necessary that in expected behaviors and operations do not make the products unsafe state. This paper proposes a method that the control software makes safe by conducting "Failure Mode and Effects Analysis (FMEA)" and "Fault Tree Analysis (FTA)" repeatedly. The outline of the proposed method is as follows. In the upper phase, risks of control software are analyzed by using FMEA exhaustively, and the measures are reflected to the specifications. In the lower phase, risks that cannot be taken the measures are clarified, and the measures are reflected to the specifications and software. FMEA and FTA are conducted repeatedly, until the control software does not contain risk.
2016 55th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), 2016
This paper proposes a method that aggregates similar portions in a program into one common portio... more This paper proposes a method that aggregates similar portions in a program into one common portion and redesigns current program structure to appropriate program structure. When a new function is added to an existing program, the function tends to be developed by copying & pasting a portion in the program and modifying its portion. As a result, it becomes to exist many similar portions in the program. In the case that error modifications or changes occurs in the similar portion, appropriate modifications are required to the all similar portions. It would be considered that the quality and efficiency of those tasks are decreased. So that, this paper proposes a method that detect similar portions with minor modifications and a method that aggregates those similar portions to one appropriate common portion with well-defined program structure. As a result, current program becomes to be refined to the program that can accommodate future modification or changes properly.
This paper proposes a method that redesigns a program with an inappropriate structure into a prog... more This paper proposes a method that redesigns a program with an inappropriate structure into a program with appropriate structure. When a program has been using for a long period, many functional additions and modifications to the program have occurred. Those are realized by copying & pasting a part of the program and modifying it. As a result, the program becomes to have inappropriate structure and to contain many similar portions. Those similar parts make future maintenances of the program difficult. So, this paper proposes a method that clarifies similar portions in the program and integrates all similar parts into a common portion by using Code Clone detecting method. Furthermore, this paper proposes a method that the current program structure translates into the appropriate program structure by using a refactoring method when integrating code clones. Consequently, the program becomes to be able to adjust functional additions and modifications in the future. Additionally, the prog...
Considering software architecture concurrently and iteratively with software requirements, has be... more Considering software architecture concurrently and iteratively with software requirements, has been illustrated as a way to increase productivity and stakeholder satisfaction in the twin peaks model software development process. Because this model exposed only the tip of the iceberg, and lacks of concrete definitions and techniques, an approach of utilizing this model in the real world has been proposed by applying the concept of the product development process based on Quality Function Deployment. In this paper, we will go further of giving more detail about how to define the requirements along with software architecture. In order to provide a method to define a robust software architecture but to be adaptable to the presence of changing requirements, we apply layering concept to the software requirements analysis and architectural design.
2021 60th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), 2021
This paper proposes a comprehensive creation method of hardware and software combined test (HSCT)... more This paper proposes a comprehensive creation method of hardware and software combined test (HSCT) specifications for industrial products controlled by software using Hazard and Operability Study (HAZOP) which is a method for analyzing undesirable events. To develop an industrial product that behaves adequately, it is necessary to conduct the HSCT in addition to the hardware and software unit test. The HSCT investigates troubles that cannot be tested at the whole industrial product level. But the coverage is insufficient because the HSCT items are created by the engineer manually. The proposed method creates test items using HAZOP to improve the coverage. Following countermeasures are conducted; (1) The information, such as the equipment name, the parameter name, the type, and send to/ receive from, etc., is added to the HAZOP's parameter. (2) The information that is necessary to create test items is dealt with formally by defining the format of parameter, guide-word, and program...
Revolusi industri 4.0 mengarah ke era digitalisasi dan menjalani semuanya serba digital. Industri... more Revolusi industri 4.0 mengarah ke era digitalisasi dan menjalani semuanya serba digital. Industri 4.0 sebagai produksi dari Cyber-Physical System (CPS) yang terintegrasi dan berkorelasi dengan algoritma, Big Data, hingga Internet of Things (IoT). CPS ialah suatu integrasi antara suatu perhitungan atau komputasi dengan proses fisik dari sistem. Salah satu penerapan CPS adalah IoT yang saling terhubung dengan proses fisik melalui jaringan Internet. IoT berkaitan dengan sistem pintar, seperti smart home, smart office, dan sebagainya sesuai di mana teknologi IoT tersebut diterapkan. Smart home atau smart office merupakan contoh di mana rumah atau gedung perkantoran yang sudah memanfaatkan teknologi IoT sehingga pengoperasian bangunan tersebut menjadi mudah dan saling terintegrasi antar proses fisiknya. BPS salah satu lembaga non-kementerian yang memiliki gedung perkantorannya guna melaksanakan tugas pemerintahannya. Dalam penelitian ini dilakukan kajian penerapan IoT pada Pusdiklat BPS ...
Trends in Computer Science and Information Technology, 2020
Recently, industrial products, such as cars, medical apparatuses, and aerospace apparatuses, are ... more Recently, industrial products, such as cars, medical apparatuses, and aerospace apparatuses, are developed as the systems that are combined the hardware and software, and their confi guration of the apparatuses and controls become complex. As a result, unintended accidents occur when using the industrial products. Those accidents occur when hazards that are occurred by interactions between hardware and software when using an apparatus and some negative conditions that cause the accident are satisfi ed. This accident model is called as Systems-Theoretic Accident Model and Process (STAMP) model. Additionally, based on the STAMP model, the safety analysis method that clarifi es hazards and hazard scenarios is called STAMP based Process Analysis (STPA) [1]. This paper proposes a method that clarifi es the hazards and proposes safety countermeasures after completing the development of the functional specifi cations for Embedded Control Software (ECSW). In the proposed method, STPA is conducted by inputting the ECSW system specifi cations that are consisted use-case diagrams and class diagrams that are written in Unifi ed Modeling Language (UML). As a result of conducting STPA, hazards are clarifi ed, and hazard scenarios are developed. Sequence diagrams corresponding to the hazard-scenarios are developed and the Hazard Causal Factors (HCFs) are clarifi ed. In this case, the reasons of the HCFs are the execution of methods and/or the non-execution of methods in the class. Based on the STAMP model, the safety analysis method that clarifi es the hazards and the hazard scenarios is called a System-Theoretic Process Analysis (STPA). The organization of this paper is explained below. Section 2 describes the related works. Section 3 describes the outline of the proposed method. Section 4 describes the applications and evaluations of the proposed method. And section 5 describes future works.
Information, 2020
There are many industrial products in our life, and the actions of those products are controlled ... more There are many industrial products in our life, and the actions of those products are controlled by embedded control software (ECSW). Recently, many troubles have been caused by ECSW. To avoid those troubles, it is necessary to clarify the causes of the troubles and take countermeasures. However, the results of those tasks depend on the skills of the analyst. This paper proposes an analytic method that clarifies the causes of troubles by applying fault tree analysis (FTA) to the ECSW. The characteristics of the proposed method are as follows: Preparation of fault tree templates (FTTs) corresponding to instructions of the ECSW, and definition of the FT development rules by combining FTTs according to the back-tracing of the instruction execution process. By complying with the proposed method strictly, when an analyst who has studied computer science and safety engineering for 2–3 years conducts FTA, the analyst can obtain an appropriate result of FTA. This indicates that the safety l...
Communication in Science and Technology, 2018
Statistics Indonesia, known in Indonesia as Badan Pusat Statistik (BPS), has conducted a series o... more Statistics Indonesia, known in Indonesia as Badan Pusat Statistik (BPS), has conducted a series of trials to utilize Computer-Assisted Personal Interview (CAPI) in a census or survey. However, CAPI costs a lot of money to procure and maintain the device. Bring Your Own Device (BYOD) principle offers cost opportunity to device management. In the practice of BYOD in BPS, a device that has good performance is required, because some devices aren't capable of running CAPI properly. Yet, in BPS there is no standard value to qualify mobile devices to be used in census or survey. Therefore, it is necessary to review what kind of device is suitable for using CAPI. This study utilized CAPI used in a student's field study as a case study reference. Initially, researchers develop benchmark applications as a tool for feasibility. Furthermore, developed application is tested on a certain base device to calculate the scores to be used as the standard values.
Emitter International Journal of Engineering Technology, Apr 7, 2022
Computer-based test or assessment has been used widely, especially in the current COVID-19 pandem... more Computer-based test or assessment has been used widely, especially in the current COVID-19 pandemic, where many schools are conducting distance learning as well as distance examination. The need for a computer or software system to support education is inevitable. A range of solutions, from the free/open source software systems to the paid/proprietary ones have been publicly available. Still, an organization with limited resources prefers to find free or low-budget, while yet demanding reliable solutions. We have reported the use of the computer-based test in a new student recruitment test which is held country-wide. We developed the system based on TCExam, a free and open source computer-based test software, and successfully fulfilled the requirements, but with some tweaks. We found that the TCExam has a performance degradation when used by a large number of examinees concurrently, especially during specific phases during the test. This paper reports the result of our investigation to address the problem and suggests some modifications to the base codes as well as a recommendation of the hardware configuration. We evaluated the modified system in a simulated environment. We successfully achieved up to 56% performance gain using the modified system.
2019 4th International Conference on Information Technology (InCIT), 2019
Proceedings of The International Conference on Data Science and Official Statistics, 2022
In improving quality of employees through education, Statistics Indonesia is assisted by Educatio... more In improving quality of employees through education, Statistics Indonesia is assisted by Education and Training Centre, one of them through the Study Task program at Master's and Doctoral degrees. Due to the decrease of registrant as candidate participants of this program and to facilitate employees proposed, information system for providing recommendations Study Task program is needed. This research aims to provide recommendations to employees who are highly, moderately or not recommended being able to continue education with Study Task program using an information system. Decision-making in system is Fuzzy Analytic Hierarchy Process (Fuzzy AHP) method with assessment criteria, sub-criteria and their weights can be changed by certain actors. The system was built using the Framework for the Application of Systems Thinking (FAST) method. The system was evaluated by Black Box Testing with the results of all functions running well and System Usability Scale with results of 80.71 wh...
SICE Journal of Control, Measurement, and System Integration
This paper proposes a method that aggregates similar portions (code clones) in the developed prog... more This paper proposes a method that aggregates similar portions (code clones) in the developed program and redesigns the current program structure to an adequate program structure. The procedure of the proposed method is the following: Code clones are detected, and their characteristics are extracted, the design methods that code clones are aggregated are proposed, the program is modified, and the affected portions in the program are clarified and retested. Furthermore, a tool that supports the proposed method is created. As a result of applying the proposed method and the tool, it is found that 45% CCs are aggregated and 13% instructions of the program are deleted. Additionally, it is found that an adequate program structure is realized by using the proposed method and the tool.