Yunarso Anang | STIS jakarta (original) (raw)

Papers by Yunarso Anang

Research paper thumbnail of A proposal of hazard analysis method using structured system theoretical process analysis

SICE Journal of Control, Measurement, and System Integration, Apr 19, 2023

Research paper thumbnail of Analisis Kesuksesan Sistem Informasi dengan Pendekatan Model Kesuksesan Sistem Informasi DeLone & McLean

Prosiding Seminar Nasional Official Statistics, Nov 1, 2022

Research paper thumbnail of A Proposal of Hazard Analysis Method Using Structured System Theoretical Process Analysis

2022 61st Annual Conference of the Society of Instrument and Control Engineers (SICE)

Research paper thumbnail of A creation method of comprehensive cases and specifications for hardware and software combined test to detect undesirable events of an industrial product using HAZOP

SICE Journal of Control, Measurement, and System Integration

Research paper thumbnail of A Safety Analysis Method for Control Software in Coordination with FMEA and FTA

Information

In this study, we proposed a method to improve the safety level of control software (CSW) by mana... more In this study, we proposed a method to improve the safety level of control software (CSW) by managing the CSW’s design information and safety analysis results, and combining failure mode and effects analysis (FMEA) and fault tree analysis (FTA). Here, the CSW is developed using structured analysis and design methodology. In the upper stage of the CSW’s development process, as the input of the preliminary design information (data flow diagrams (DFDs) and control flow diagrams (CFDs)), the causes of undesirable events of the CSW are clarified by FMEA, and the countermeasures are reflected in the preliminary design information. In the lower stage of the CSW’s development process, as the inputs of the detailed design information (DFDs and CFDs in the lower level) and programs, the causes of the specific undesirable event are clarified by FTA, and the countermeasures are reflected in the detailed design specifications and programs. The processes are repeated until the impact of undesirab...

Research paper thumbnail of Development of Student's Dropout Early Warning System Using Analytical Hierarchy Process

Proceedings of The International Conference on Data Science and Official Statistics, 2022

As a higher education institution, Politeknik Statistika STIS also faces the same problems as uni... more As a higher education institution, Politeknik Statistika STIS also faces the same problems as universities in general, those are student failing to compare that year courses thus have to repeat those courses or student dropping out. To overcome this problem, this research proposes a Dropout Early Warning System (DEWS) that can provide early warnings for dropouts and repeat a class. With this system, it is hoped that it can help institutions to identify students who have the potential to drop out or repeat a class. The purpose of making this system is to help academic supervisors and decision makers from Polstat STIS in knowing the potential for student. The potential for students to drop out and repeat a class is measured by a potential score obtained from the results of an assessment of 5 criteria consisting of GPA scores, gender, economic factors, violation points, and record of repeating class. Prediction results are presented in three categories consisting of low potential, medi...

Research paper thumbnail of An Efficient Merging Method for Code Clones and Gapped Code Clones Using Software Metrics

A program fragment that is created by copying & pasting an existing program is called Code Clone ... more A program fragment that is created by copying & pasting an existing program is called Code Clone (CC). A program fragment that some instructions are added, deleted, and modified is called Gapped Code Clones (GCC). In general, many CCs and GCCs that exist in the program decrease readability and maintainability of the program. This study proposes an effective detection method of CCs and GCCs that are suitable for merging by calculating software metrics related to the complexity of the control flow, independent from other program portions, and non-dependency of programming language specification. Additionally, this study recommends the merging procedure of CCs and GCCs by calculating software metrics related to the program structure of CCs and GCCs. As a result of the application of the proposed method to the existing programs, it is confirmed that the adequate merging of CCs and GCCs is conducted.

Research paper thumbnail of A study of methodology for securing control software based FMEA-FTA coordination

2016 IEEE/SICE International Symposium on System Integration (SII), 2016

Many industrial products are controlled by software. Errors in the control software make the prod... more Many industrial products are controlled by software. Errors in the control software make the products and users danger. To avoid this situation, it is necessary that in expected behaviors and operations do not make the products unsafe state. This paper proposes a method that the control software makes safe by conducting "Failure Mode and Effects Analysis (FMEA)" and "Fault Tree Analysis (FTA)" repeatedly. The outline of the proposed method is as follows. In the upper phase, risks of control software are analyzed by using FMEA exhaustively, and the measures are reflected to the specifications. In the lower phase, risks that cannot be taken the measures are clarified, and the measures are reflected to the specifications and software. FMEA and FTA are conducted repeatedly, until the control software does not contain risk.

Research paper thumbnail of A method of program refactoring based on code clone detection and impact analysis

2016 55th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), 2016

This paper proposes a method that aggregates similar portions in a program into one common portio... more This paper proposes a method that aggregates similar portions in a program into one common portion and redesigns current program structure to appropriate program structure. When a new function is added to an existing program, the function tends to be developed by copying & pasting a portion in the program and modifying its portion. As a result, it becomes to exist many similar portions in the program. In the case that error modifications or changes occurs in the similar portion, appropriate modifications are required to the all similar portions. It would be considered that the quality and efficiency of those tasks are decreased. So that, this paper proposes a method that detect similar portions with minor modifications and a method that aggregates those similar portions to one appropriate common portion with well-defined program structure. As a result, current program becomes to be refined to the program that can accommodate future modification or changes properly.

Research paper thumbnail of A Proposal of Refactoring Method for Existing Program Using Code Clone Detection and Impact Analysis Method

This paper proposes a method that redesigns a program with an inappropriate structure into a prog... more This paper proposes a method that redesigns a program with an inappropriate structure into a program with appropriate structure. When a program has been using for a long period, many functional additions and modifications to the program have occurred. Those are realized by copying & pasting a part of the program and modifying it. As a result, the program becomes to have inappropriate structure and to contain many similar portions. Those similar parts make future maintenances of the program difficult. So, this paper proposes a method that clarifies similar portions in the program and integrates all similar parts into a common portion by using Code Clone detecting method. Furthermore, this paper proposes a method that the current program structure translates into the appropriate program structure by using a refactoring method when integrating code clones. Consequently, the program becomes to be able to adjust functional additions and modifications in the future. Additionally, the prog...

Research paper thumbnail of Applying Layering Concept to the Software Requirements Analysis and Architectural Design

Considering software architecture concurrently and iteratively with software requirements, has be... more Considering software architecture concurrently and iteratively with software requirements, has been illustrated as a way to increase productivity and stakeholder satisfaction in the twin peaks model software development process. Because this model exposed only the tip of the iceberg, and lacks of concrete definitions and techniques, an approach of utilizing this model in the real world has been proposed by applying the concept of the product development process based on Quality Function Deployment. In this paper, we will go further of giving more detail about how to define the requirements along with software architecture. In order to provide a method to define a robust software architecture but to be adaptable to the presence of changing requirements, we apply layering concept to the software requirements analysis and architectural design.

Research paper thumbnail of A Comprehensive Creation Method of Hardware and Software Combined Test Specifications for Industrial Product Controlled by Software using HAZOP

2021 60th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), 2021

This paper proposes a comprehensive creation method of hardware and software combined test (HSCT)... more This paper proposes a comprehensive creation method of hardware and software combined test (HSCT) specifications for industrial products controlled by software using Hazard and Operability Study (HAZOP) which is a method for analyzing undesirable events. To develop an industrial product that behaves adequately, it is necessary to conduct the HSCT in addition to the hardware and software unit test. The HSCT investigates troubles that cannot be tested at the whole industrial product level. But the coverage is insufficient because the HSCT items are created by the engineer manually. The proposed method creates test items using HAZOP to improve the coverage. Following countermeasures are conducted; (1) The information, such as the equipment name, the parameter name, the type, and send to/ receive from, etc., is added to the HAZOP's parameter. (2) The information that is necessary to create test items is dealt with formally by defining the format of parameter, guide-word, and program...

Research paper thumbnail of Kajian Penerapan Teknologi Internet of Things Untuk Penghematan Energi

Revolusi industri 4.0 mengarah ke era digitalisasi dan menjalani semuanya serba digital. Industri... more Revolusi industri 4.0 mengarah ke era digitalisasi dan menjalani semuanya serba digital. Industri 4.0 sebagai produksi dari Cyber-Physical System (CPS) yang terintegrasi dan berkorelasi dengan algoritma, Big Data, hingga Internet of Things (IoT). CPS ialah suatu integrasi antara suatu perhitungan atau komputasi dengan proses fisik dari sistem. Salah satu penerapan CPS adalah IoT yang saling terhubung dengan proses fisik melalui jaringan Internet. IoT berkaitan dengan sistem pintar, seperti smart home, smart office, dan sebagainya sesuai di mana teknologi IoT tersebut diterapkan. Smart home atau smart office merupakan contoh di mana rumah atau gedung perkantoran yang sudah memanfaatkan teknologi IoT sehingga pengoperasian bangunan tersebut menjadi mudah dan saling terintegrasi antar proses fisiknya. BPS salah satu lembaga non-kementerian yang memiliki gedung perkantorannya guna melaksanakan tugas pemerintahannya. Dalam penelitian ini dilakukan kajian penerapan IoT pada Pusdiklat BPS ...

Research paper thumbnail of A Hazard Analysis Method for Embedded Control Software with STPA

Trends in Computer Science and Information Technology, 2020

Recently, industrial products, such as cars, medical apparatuses, and aerospace apparatuses, are ... more Recently, industrial products, such as cars, medical apparatuses, and aerospace apparatuses, are developed as the systems that are combined the hardware and software, and their confi guration of the apparatuses and controls become complex. As a result, unintended accidents occur when using the industrial products. Those accidents occur when hazards that are occurred by interactions between hardware and software when using an apparatus and some negative conditions that cause the accident are satisfi ed. This accident model is called as Systems-Theoretic Accident Model and Process (STAMP) model. Additionally, based on the STAMP model, the safety analysis method that clarifi es hazards and hazard scenarios is called STAMP based Process Analysis (STPA) [1]. This paper proposes a method that clarifi es the hazards and proposes safety countermeasures after completing the development of the functional specifi cations for Embedded Control Software (ECSW). In the proposed method, STPA is conducted by inputting the ECSW system specifi cations that are consisted use-case diagrams and class diagrams that are written in Unifi ed Modeling Language (UML). As a result of conducting STPA, hazards are clarifi ed, and hazard scenarios are developed. Sequence diagrams corresponding to the hazard-scenarios are developed and the Hazard Causal Factors (HCFs) are clarifi ed. In this case, the reasons of the HCFs are the execution of methods and/or the non-execution of methods in the class. Based on the STAMP model, the safety analysis method that clarifi es the hazards and the hazard scenarios is called a System-Theoretic Process Analysis (STPA). The organization of this paper is explained below. Section 2 describes the related works. Section 3 describes the outline of the proposed method. Section 4 describes the applications and evaluations of the proposed method. And section 5 describes future works.

Research paper thumbnail of A Proposal of Fault Tree Analysis for Embedded Control Software

Information, 2020

There are many industrial products in our life, and the actions of those products are controlled ... more There are many industrial products in our life, and the actions of those products are controlled by embedded control software (ECSW). Recently, many troubles have been caused by ECSW. To avoid those troubles, it is necessary to clarify the causes of the troubles and take countermeasures. However, the results of those tasks depend on the skills of the analyst. This paper proposes an analytic method that clarifies the causes of troubles by applying fault tree analysis (FTA) to the ECSW. The characteristics of the proposed method are as follows: Preparation of fault tree templates (FTTs) corresponding to instructions of the ECSW, and definition of the FT development rules by combining FTTs according to the back-tracing of the instruction execution process. By complying with the proposed method strictly, when an analyst who has studied computer science and safety engineering for 2–3 years conducts FTA, the analyst can obtain an appropriate result of FTA. This indicates that the safety l...

Research paper thumbnail of A proposal of system for device capability assessment in bring your own device (BYOD) environment of computer assisted personal interviewing

Communication in Science and Technology, 2018

Statistics Indonesia, known in Indonesia as Badan Pusat Statistik (BPS), has conducted a series o... more Statistics Indonesia, known in Indonesia as Badan Pusat Statistik (BPS), has conducted a series of trials to utilize Computer-Assisted Personal Interview (CAPI) in a census or survey. However, CAPI costs a lot of money to procure and maintain the device. Bring Your Own Device (BYOD) principle offers cost opportunity to device management. In the practice of BYOD in BPS, a device that has good performance is required, because some devices aren't capable of running CAPI properly. Yet, in BPS there is no standard value to qualify mobile devices to be used in census or survey. Therefore, it is necessary to review what kind of device is suitable for using CAPI. This study utilized CAPI used in a student's field study as a case study reference. Initially, researchers develop benchmark applications as a tool for feasibility. Furthermore, developed application is tested on a certain base device to calculate the scores to be used as the standard values.

Research paper thumbnail of An Improvement of Computer Based Test System Based on TCExam for Usage with A Large Number of Concurrent Users

Emitter International Journal of Engineering Technology, Apr 7, 2022

Computer-based test or assessment has been used widely, especially in the current COVID-19 pandem... more Computer-based test or assessment has been used widely, especially in the current COVID-19 pandemic, where many schools are conducting distance learning as well as distance examination. The need for a computer or software system to support education is inevitable. A range of solutions, from the free/open source software systems to the paid/proprietary ones have been publicly available. Still, an organization with limited resources prefers to find free or low-budget, while yet demanding reliable solutions. We have reported the use of the computer-based test in a new student recruitment test which is held country-wide. We developed the system based on TCExam, a free and open source computer-based test software, and successfully fulfilled the requirements, but with some tweaks. We found that the TCExam has a performance degradation when used by a large number of examinees concurrently, especially during specific phases during the test. This paper reports the result of our investigation to address the problem and suggests some modifications to the base codes as well as a recommendation of the hardware configuration. We evaluated the modified system in a simulated environment. We successfully achieved up to 56% performance gain using the modified system.

Research paper thumbnail of Implementation of Computer-Based Test in a Countrywide New Student Recruitment Process

2019 4th International Conference on Information Technology (InCIT), 2019

Research paper thumbnail of Information System Development of Master’s and Doctoral Study Task Recommendation Using Fuzzy AHP

Proceedings of The International Conference on Data Science and Official Statistics, 2022

In improving quality of employees through education, Statistics Indonesia is assisted by Educatio... more In improving quality of employees through education, Statistics Indonesia is assisted by Education and Training Centre, one of them through the Study Task program at Master's and Doctoral degrees. Due to the decrease of registrant as candidate participants of this program and to facilitate employees proposed, information system for providing recommendations Study Task program is needed. This research aims to provide recommendations to employees who are highly, moderately or not recommended being able to continue education with Study Task program using an information system. Decision-making in system is Fuzzy Analytic Hierarchy Process (Fuzzy AHP) method with assessment criteria, sub-criteria and their weights can be changed by certain actors. The system was built using the Framework for the Application of Systems Thinking (FAST) method. The system was evaluated by Black Box Testing with the results of all functions running well and System Usability Scale with results of 80.71 wh...

Research paper thumbnail of An Improvement Method for Program Structure Using Code Clone Detection, Impact Analysis, and Refactoring Formats

SICE Journal of Control, Measurement, and System Integration

This paper proposes a method that aggregates similar portions (code clones) in the developed prog... more This paper proposes a method that aggregates similar portions (code clones) in the developed program and redesigns the current program structure to an adequate program structure. The procedure of the proposed method is the following: Code clones are detected, and their characteristics are extracted, the design methods that code clones are aggregated are proposed, the program is modified, and the affected portions in the program are clarified and retested. Furthermore, a tool that supports the proposed method is created. As a result of applying the proposed method and the tool, it is found that 45% CCs are aggregated and 13% instructions of the program are deleted. Additionally, it is found that an adequate program structure is realized by using the proposed method and the tool.

Research paper thumbnail of A proposal of hazard analysis method using structured system theoretical process analysis

SICE Journal of Control, Measurement, and System Integration, Apr 19, 2023

Research paper thumbnail of Analisis Kesuksesan Sistem Informasi dengan Pendekatan Model Kesuksesan Sistem Informasi DeLone & McLean

Prosiding Seminar Nasional Official Statistics, Nov 1, 2022

Research paper thumbnail of A Proposal of Hazard Analysis Method Using Structured System Theoretical Process Analysis

2022 61st Annual Conference of the Society of Instrument and Control Engineers (SICE)

Research paper thumbnail of A creation method of comprehensive cases and specifications for hardware and software combined test to detect undesirable events of an industrial product using HAZOP

SICE Journal of Control, Measurement, and System Integration

Research paper thumbnail of A Safety Analysis Method for Control Software in Coordination with FMEA and FTA

Information

In this study, we proposed a method to improve the safety level of control software (CSW) by mana... more In this study, we proposed a method to improve the safety level of control software (CSW) by managing the CSW’s design information and safety analysis results, and combining failure mode and effects analysis (FMEA) and fault tree analysis (FTA). Here, the CSW is developed using structured analysis and design methodology. In the upper stage of the CSW’s development process, as the input of the preliminary design information (data flow diagrams (DFDs) and control flow diagrams (CFDs)), the causes of undesirable events of the CSW are clarified by FMEA, and the countermeasures are reflected in the preliminary design information. In the lower stage of the CSW’s development process, as the inputs of the detailed design information (DFDs and CFDs in the lower level) and programs, the causes of the specific undesirable event are clarified by FTA, and the countermeasures are reflected in the detailed design specifications and programs. The processes are repeated until the impact of undesirab...

Research paper thumbnail of Development of Student's Dropout Early Warning System Using Analytical Hierarchy Process

Proceedings of The International Conference on Data Science and Official Statistics, 2022

As a higher education institution, Politeknik Statistika STIS also faces the same problems as uni... more As a higher education institution, Politeknik Statistika STIS also faces the same problems as universities in general, those are student failing to compare that year courses thus have to repeat those courses or student dropping out. To overcome this problem, this research proposes a Dropout Early Warning System (DEWS) that can provide early warnings for dropouts and repeat a class. With this system, it is hoped that it can help institutions to identify students who have the potential to drop out or repeat a class. The purpose of making this system is to help academic supervisors and decision makers from Polstat STIS in knowing the potential for student. The potential for students to drop out and repeat a class is measured by a potential score obtained from the results of an assessment of 5 criteria consisting of GPA scores, gender, economic factors, violation points, and record of repeating class. Prediction results are presented in three categories consisting of low potential, medi...

Research paper thumbnail of An Efficient Merging Method for Code Clones and Gapped Code Clones Using Software Metrics

A program fragment that is created by copying & pasting an existing program is called Code Clone ... more A program fragment that is created by copying & pasting an existing program is called Code Clone (CC). A program fragment that some instructions are added, deleted, and modified is called Gapped Code Clones (GCC). In general, many CCs and GCCs that exist in the program decrease readability and maintainability of the program. This study proposes an effective detection method of CCs and GCCs that are suitable for merging by calculating software metrics related to the complexity of the control flow, independent from other program portions, and non-dependency of programming language specification. Additionally, this study recommends the merging procedure of CCs and GCCs by calculating software metrics related to the program structure of CCs and GCCs. As a result of the application of the proposed method to the existing programs, it is confirmed that the adequate merging of CCs and GCCs is conducted.

Research paper thumbnail of A study of methodology for securing control software based FMEA-FTA coordination

2016 IEEE/SICE International Symposium on System Integration (SII), 2016

Many industrial products are controlled by software. Errors in the control software make the prod... more Many industrial products are controlled by software. Errors in the control software make the products and users danger. To avoid this situation, it is necessary that in expected behaviors and operations do not make the products unsafe state. This paper proposes a method that the control software makes safe by conducting "Failure Mode and Effects Analysis (FMEA)" and "Fault Tree Analysis (FTA)" repeatedly. The outline of the proposed method is as follows. In the upper phase, risks of control software are analyzed by using FMEA exhaustively, and the measures are reflected to the specifications. In the lower phase, risks that cannot be taken the measures are clarified, and the measures are reflected to the specifications and software. FMEA and FTA are conducted repeatedly, until the control software does not contain risk.

Research paper thumbnail of A method of program refactoring based on code clone detection and impact analysis

2016 55th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), 2016

This paper proposes a method that aggregates similar portions in a program into one common portio... more This paper proposes a method that aggregates similar portions in a program into one common portion and redesigns current program structure to appropriate program structure. When a new function is added to an existing program, the function tends to be developed by copying & pasting a portion in the program and modifying its portion. As a result, it becomes to exist many similar portions in the program. In the case that error modifications or changes occurs in the similar portion, appropriate modifications are required to the all similar portions. It would be considered that the quality and efficiency of those tasks are decreased. So that, this paper proposes a method that detect similar portions with minor modifications and a method that aggregates those similar portions to one appropriate common portion with well-defined program structure. As a result, current program becomes to be refined to the program that can accommodate future modification or changes properly.

Research paper thumbnail of A Proposal of Refactoring Method for Existing Program Using Code Clone Detection and Impact Analysis Method

This paper proposes a method that redesigns a program with an inappropriate structure into a prog... more This paper proposes a method that redesigns a program with an inappropriate structure into a program with appropriate structure. When a program has been using for a long period, many functional additions and modifications to the program have occurred. Those are realized by copying & pasting a part of the program and modifying it. As a result, the program becomes to have inappropriate structure and to contain many similar portions. Those similar parts make future maintenances of the program difficult. So, this paper proposes a method that clarifies similar portions in the program and integrates all similar parts into a common portion by using Code Clone detecting method. Furthermore, this paper proposes a method that the current program structure translates into the appropriate program structure by using a refactoring method when integrating code clones. Consequently, the program becomes to be able to adjust functional additions and modifications in the future. Additionally, the prog...

Research paper thumbnail of Applying Layering Concept to the Software Requirements Analysis and Architectural Design

Considering software architecture concurrently and iteratively with software requirements, has be... more Considering software architecture concurrently and iteratively with software requirements, has been illustrated as a way to increase productivity and stakeholder satisfaction in the twin peaks model software development process. Because this model exposed only the tip of the iceberg, and lacks of concrete definitions and techniques, an approach of utilizing this model in the real world has been proposed by applying the concept of the product development process based on Quality Function Deployment. In this paper, we will go further of giving more detail about how to define the requirements along with software architecture. In order to provide a method to define a robust software architecture but to be adaptable to the presence of changing requirements, we apply layering concept to the software requirements analysis and architectural design.

Research paper thumbnail of A Comprehensive Creation Method of Hardware and Software Combined Test Specifications for Industrial Product Controlled by Software using HAZOP

2021 60th Annual Conference of the Society of Instrument and Control Engineers of Japan (SICE), 2021

This paper proposes a comprehensive creation method of hardware and software combined test (HSCT)... more This paper proposes a comprehensive creation method of hardware and software combined test (HSCT) specifications for industrial products controlled by software using Hazard and Operability Study (HAZOP) which is a method for analyzing undesirable events. To develop an industrial product that behaves adequately, it is necessary to conduct the HSCT in addition to the hardware and software unit test. The HSCT investigates troubles that cannot be tested at the whole industrial product level. But the coverage is insufficient because the HSCT items are created by the engineer manually. The proposed method creates test items using HAZOP to improve the coverage. Following countermeasures are conducted; (1) The information, such as the equipment name, the parameter name, the type, and send to/ receive from, etc., is added to the HAZOP's parameter. (2) The information that is necessary to create test items is dealt with formally by defining the format of parameter, guide-word, and program...

Research paper thumbnail of Kajian Penerapan Teknologi Internet of Things Untuk Penghematan Energi

Revolusi industri 4.0 mengarah ke era digitalisasi dan menjalani semuanya serba digital. Industri... more Revolusi industri 4.0 mengarah ke era digitalisasi dan menjalani semuanya serba digital. Industri 4.0 sebagai produksi dari Cyber-Physical System (CPS) yang terintegrasi dan berkorelasi dengan algoritma, Big Data, hingga Internet of Things (IoT). CPS ialah suatu integrasi antara suatu perhitungan atau komputasi dengan proses fisik dari sistem. Salah satu penerapan CPS adalah IoT yang saling terhubung dengan proses fisik melalui jaringan Internet. IoT berkaitan dengan sistem pintar, seperti smart home, smart office, dan sebagainya sesuai di mana teknologi IoT tersebut diterapkan. Smart home atau smart office merupakan contoh di mana rumah atau gedung perkantoran yang sudah memanfaatkan teknologi IoT sehingga pengoperasian bangunan tersebut menjadi mudah dan saling terintegrasi antar proses fisiknya. BPS salah satu lembaga non-kementerian yang memiliki gedung perkantorannya guna melaksanakan tugas pemerintahannya. Dalam penelitian ini dilakukan kajian penerapan IoT pada Pusdiklat BPS ...

Research paper thumbnail of A Hazard Analysis Method for Embedded Control Software with STPA

Trends in Computer Science and Information Technology, 2020

Recently, industrial products, such as cars, medical apparatuses, and aerospace apparatuses, are ... more Recently, industrial products, such as cars, medical apparatuses, and aerospace apparatuses, are developed as the systems that are combined the hardware and software, and their confi guration of the apparatuses and controls become complex. As a result, unintended accidents occur when using the industrial products. Those accidents occur when hazards that are occurred by interactions between hardware and software when using an apparatus and some negative conditions that cause the accident are satisfi ed. This accident model is called as Systems-Theoretic Accident Model and Process (STAMP) model. Additionally, based on the STAMP model, the safety analysis method that clarifi es hazards and hazard scenarios is called STAMP based Process Analysis (STPA) [1]. This paper proposes a method that clarifi es the hazards and proposes safety countermeasures after completing the development of the functional specifi cations for Embedded Control Software (ECSW). In the proposed method, STPA is conducted by inputting the ECSW system specifi cations that are consisted use-case diagrams and class diagrams that are written in Unifi ed Modeling Language (UML). As a result of conducting STPA, hazards are clarifi ed, and hazard scenarios are developed. Sequence diagrams corresponding to the hazard-scenarios are developed and the Hazard Causal Factors (HCFs) are clarifi ed. In this case, the reasons of the HCFs are the execution of methods and/or the non-execution of methods in the class. Based on the STAMP model, the safety analysis method that clarifi es the hazards and the hazard scenarios is called a System-Theoretic Process Analysis (STPA). The organization of this paper is explained below. Section 2 describes the related works. Section 3 describes the outline of the proposed method. Section 4 describes the applications and evaluations of the proposed method. And section 5 describes future works.

Research paper thumbnail of A Proposal of Fault Tree Analysis for Embedded Control Software

Information, 2020

There are many industrial products in our life, and the actions of those products are controlled ... more There are many industrial products in our life, and the actions of those products are controlled by embedded control software (ECSW). Recently, many troubles have been caused by ECSW. To avoid those troubles, it is necessary to clarify the causes of the troubles and take countermeasures. However, the results of those tasks depend on the skills of the analyst. This paper proposes an analytic method that clarifies the causes of troubles by applying fault tree analysis (FTA) to the ECSW. The characteristics of the proposed method are as follows: Preparation of fault tree templates (FTTs) corresponding to instructions of the ECSW, and definition of the FT development rules by combining FTTs according to the back-tracing of the instruction execution process. By complying with the proposed method strictly, when an analyst who has studied computer science and safety engineering for 2–3 years conducts FTA, the analyst can obtain an appropriate result of FTA. This indicates that the safety l...

Research paper thumbnail of A proposal of system for device capability assessment in bring your own device (BYOD) environment of computer assisted personal interviewing

Communication in Science and Technology, 2018

Statistics Indonesia, known in Indonesia as Badan Pusat Statistik (BPS), has conducted a series o... more Statistics Indonesia, known in Indonesia as Badan Pusat Statistik (BPS), has conducted a series of trials to utilize Computer-Assisted Personal Interview (CAPI) in a census or survey. However, CAPI costs a lot of money to procure and maintain the device. Bring Your Own Device (BYOD) principle offers cost opportunity to device management. In the practice of BYOD in BPS, a device that has good performance is required, because some devices aren't capable of running CAPI properly. Yet, in BPS there is no standard value to qualify mobile devices to be used in census or survey. Therefore, it is necessary to review what kind of device is suitable for using CAPI. This study utilized CAPI used in a student's field study as a case study reference. Initially, researchers develop benchmark applications as a tool for feasibility. Furthermore, developed application is tested on a certain base device to calculate the scores to be used as the standard values.

Research paper thumbnail of An Improvement of Computer Based Test System Based on TCExam for Usage with A Large Number of Concurrent Users

Emitter International Journal of Engineering Technology, Apr 7, 2022

Computer-based test or assessment has been used widely, especially in the current COVID-19 pandem... more Computer-based test or assessment has been used widely, especially in the current COVID-19 pandemic, where many schools are conducting distance learning as well as distance examination. The need for a computer or software system to support education is inevitable. A range of solutions, from the free/open source software systems to the paid/proprietary ones have been publicly available. Still, an organization with limited resources prefers to find free or low-budget, while yet demanding reliable solutions. We have reported the use of the computer-based test in a new student recruitment test which is held country-wide. We developed the system based on TCExam, a free and open source computer-based test software, and successfully fulfilled the requirements, but with some tweaks. We found that the TCExam has a performance degradation when used by a large number of examinees concurrently, especially during specific phases during the test. This paper reports the result of our investigation to address the problem and suggests some modifications to the base codes as well as a recommendation of the hardware configuration. We evaluated the modified system in a simulated environment. We successfully achieved up to 56% performance gain using the modified system.

Research paper thumbnail of Implementation of Computer-Based Test in a Countrywide New Student Recruitment Process

2019 4th International Conference on Information Technology (InCIT), 2019

Research paper thumbnail of Information System Development of Master’s and Doctoral Study Task Recommendation Using Fuzzy AHP

Proceedings of The International Conference on Data Science and Official Statistics, 2022

In improving quality of employees through education, Statistics Indonesia is assisted by Educatio... more In improving quality of employees through education, Statistics Indonesia is assisted by Education and Training Centre, one of them through the Study Task program at Master's and Doctoral degrees. Due to the decrease of registrant as candidate participants of this program and to facilitate employees proposed, information system for providing recommendations Study Task program is needed. This research aims to provide recommendations to employees who are highly, moderately or not recommended being able to continue education with Study Task program using an information system. Decision-making in system is Fuzzy Analytic Hierarchy Process (Fuzzy AHP) method with assessment criteria, sub-criteria and their weights can be changed by certain actors. The system was built using the Framework for the Application of Systems Thinking (FAST) method. The system was evaluated by Black Box Testing with the results of all functions running well and System Usability Scale with results of 80.71 wh...

Research paper thumbnail of An Improvement Method for Program Structure Using Code Clone Detection, Impact Analysis, and Refactoring Formats

SICE Journal of Control, Measurement, and System Integration

This paper proposes a method that aggregates similar portions (code clones) in the developed prog... more This paper proposes a method that aggregates similar portions (code clones) in the developed program and redesigns the current program structure to an adequate program structure. The procedure of the proposed method is the following: Code clones are detected, and their characteristics are extracted, the design methods that code clones are aggregated are proposed, the program is modified, and the affected portions in the program are clarified and retested. Furthermore, a tool that supports the proposed method is created. As a result of applying the proposed method and the tool, it is found that 45% CCs are aggregated and 13% instructions of the program are deleted. Additionally, it is found that an adequate program structure is realized by using the proposed method and the tool.