Ichsan Taufik, Ichsan
Jurusan Teknik Informatika, Fakultas Sains dan Teknologi Universitas Islam Negeri Sunan Gunung Djati Bandung

Published : 6 Documents
Articles

Found 6 Documents
Search

CONCEALMENT OF FILES BLOCKED BY GMAIL WITH EOF-BASED IMAGE STEGANOGRAPHY Taufik, Ichsan; Syaripudin, Undang; M. Kaffah, Faiz; Giri Sobirin, Jaka; Ismail, Nanang; Gunawan, Teddy Surya
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 2: November 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i2.pp716-721

Abstract

Nowadays, due to security concern, not all the process of sending files via email runs smoothly. There are several types of file extensions that are blocked when sent via email. For examples, there are several file extensions blocked by Gmail. This paper discusses steganographic implementation using End of File (EOF) algorithm to insert special file into image cover file with JPG and PNG format so that files with these extensions can be sent via email. Before a special extension file is inserted into the cover file, a compression process should be conducted first to make the file size smaller. The proposed algorithm is implemented on Visual Basic.Net software. Based on the tests performed, the application can insert Gmail-blocked file system to the image cover file, without changing the physical bit of the image cover file or file system that inserted with 100% success rate. The stego-image file is also successfully sent via email without being blocked.
PERANCANGAN IT GOVERNANCE LAYANAN AKADEMIK MENGGUNAKAN FRAMEWORK INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY (ITIL) VERSI 3 (STUDI KASUS: UIN SGD BANDUNG) Taufik, Ichsan
JURNAL ISTEK Vol 5, No 1-2 (2011): ISTEK
Publisher : JURNAL ISTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The main activity in higher education in accordance with its main function is as education is academic service providers. This paper conducted a study of how the governance of information technology related to academic service to the organization UIN SGD Bandung, so that using information technology especially in terms of academic service which is a new service can help the organization in achieving its objectives. This paper refers to one of the governance framework for information technology that is ITIL (IT Infrastructure Library) version 3 which is the latest version of the ITIL framework is based on lifecycle. One of the cycles that exist in ITIL version 3 is the IT Service Operation which is the focus area of this paper. The procedure in this paper are: 1. Study of literature from a variety of relevant literature. 2. The collection of data and information through survey, observation, interview and collecting documents. 3. Data analysis. 4. Creating strategies and evaluate the application of IT Service Operation in UIN SGD Bandung. From the survey which was conducted with students, lecturers and employees of IT and Non IT regarding their response to conditions of readiness for implementing IT Service Operation in UIN SGD Bandung, so we found the conditions currently in the initial and repeatable stage where the condition is still necessary corrective steps which related to the implementation IT Service Operation. In this paper conducted an evaluation of strategy formulation and implementation of improvements to IT Service Operation in UIN SGD Bandung using frameworks IT Infrastructure Library (ITIL) version 3.
PENGUKURAN KESESUAIAN ANTARA BISNIS DENGAN TEKNOLOGI INFORMASI MENGGUNAKAN FRAMEWORK COBIT Taufik, Ichsan; Faroqi, Adam
JURNAL ISTEK Vol 6, No 1-2 (2012): ISTEK
Publisher : JURNAL ISTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Current information technology at PT XYZ is a valuable asset for the company to achieve business goals. Information Technology Division leaders intend to measure the extent of correspondence between the information technology and business that is owned. The method used in measuring the level of compliance is IT Governance COBIT framework. The result is to give recommendations for the strengthening of IT services in the PT XYZ to be more effective.
APLIKASI DIAGNOSA GANGGUAN KEPRIBADIAN 345 (Studi Kasus : Fakultas Psikologi Universitas Islam Negeri Sunan Gunung Djati Bandung) Taufik, Ichsan
JURNAL ISTEK Vol 8, No 2 (2014): ISTEK
Publisher : JURNAL ISTEK

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Aplikasi ini dibangun sebagai alat bantu dengan didasarkan pada kebutuhan seorang psikolog/psikiater maupun orang-orang yang berkerja di area psikologi abnormal dalam mendiagnosa klien yang menderita gangguan kepribadian secara lebih cepat dan efisien. Arsitektur dari sistem ini terdiri dari Knowledge Base, Inference Engine, User Interface, Knowledge Acquisition Facility. Knowledge Base memuat jenis gangguan kepribadian, simptom, dan kriteria tiap jenis gangguan kepribadian tersebut. Sedangkan inference engine diimplementasikan dengan metode forward chaining. Proses diagnosis aplikasi ini adalah melalui penginputan simptom (gejala) yang diderita klien oleh seorang psikolog ke dalam sistem, dan selanjutnya hasil diagnosa didapatkan melalui penelusuran aturan yang ada antara lain dengan perhitungan jumlah simptom yang memenuhi syarat minimal sebuah jenis gangguan kepribadian.
Klasifikasi Terjemahan Ayat Al-Quran Tentang Ilmu Sains Menggunakan Algoritma Decision Tree Berbasis Mobile Setiawati, Devi; Taufik, Ichsan; Jumadi, Jumadi; Zulfikar, Wildan Budiawan
JOIN (Jurnal Online Informatika) Vol 1, No 1 (2016)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v1i1.7

Abstract

The number of verses of the Quran contained in the Quran, encouraging people to look for a way to get the exact clause in a short time. The science is an important knowledge, as Muslims we are obliged to study it with the Al-Quran as a guide. So thats how we get the verse about the science of the Quran with a quick, efficient and practical with a mobile application. Decision tree is a predictive model using a tree or hierarchical structure, this method can support mobile applications to be created. Because based decision very complex and global in the Quran, can be transformed into more simple and specific. C4.5 algorithm is a decision tree induction algorithm and is suitable to perform the classification process. The results of the percentage of successful applications created by using a decision tree that is 75.73%. From these results is known that the algorithm C4.5 and decision tree reasonably is well used in the classification process.
IMPLEMENTASI FUZZY SEARCH UNTUK PENDETEKSI KATA ASING PADA DOKUMEN MICROSOFT WORD Taufik, Ichsan; Aishia, Izma Dewi; Jumadi, Jumadi
JURNAL TEKNIK INFORMATIKA Vol 10, No 1 (2017): Jurnal Teknik Informatika
Publisher : Prodi Teknik Informatika Universitas Islam Negeri Syarif Hidayatullah Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (737.378 KB) | DOI: 10.15408/jti.v10i1.6804

Abstract

ABSTRAK Pendeteksian kata-kata asing ini dimaksudkan untuk membantu dalam mengurangi kesalahan dalam penulisan karya ilmiah dan pernyataan tesis sebagai pengerjaan. Ada aturan dalam penulisan karya ilmiah bahwa dokumen harus memenuhi peraturan penulisan bahasa Indonesia yang baik dan salah satunya adalah penggunaan huruf miring dalam bahasa asing (bahasa Inggris). Oleh karena itu, dibuat sebuah aplikasi untuk membantu dalam pendeteksian kata-kata asing sehingga bisa memiringkan huruf-huruf yang tidak ada dalam tata kelola bahasa Indonesia. Dalam pembuatan aplikasi digunakan metode pencarian fuzzy untuk mendeteksi kata asing dengan menggunakan matriks jarak jauh levenshtein untuk menghitung jarak kemiripan sebuah kata. Pencarian fuzzy dilakukan dengan fuzzymatching yang mengembalikan daftar hasil berdasarkan variabel yang telah ditentukan. Pencarian fuzzy menggunakan matriks dengan levenshtein mewakili jarak untuk menghitung jarak kemiripan kata, sehingga akan menghasilkan kata yang memiliki huruf miring dan tidak berhuruf miring jika ada dalam tata bahasa Indonesia. Dari hasil pengujian, penggunaan algoritma pencarian fuzzy untuk mendeteksi kata-kata asing dalam sebuah dokumen kata dengan jumlah kata yang berbeda menghasilkan nilai akurasi rata-rata 89,6%. Hasil dari proses ini membuat aplikasi ini bisa membantu tatabahasa asing dalam penulisan karya ilmiah. ABSTRACT Detection of foreign words is intended to help in reducing errors in the writing of scientific papers and thesis statements as of workmanship. There are rules in writing scientific papers that document must meet the rules of Indonesian rule of good writing and really one of them is use of italics in the word foreign languages (English). Therefore, made an application to aid in the detection of foreign words so as to tilt the letters that do not exist in the governance of the Indonesian word. In the making of the application, the fuzzy search method used for detecting foreign word using levenshtein edit distance matrix to calculate the distance semblance of a word. Fuzzy search conducted with fuzzy matching which returns a list of results based on the variables that have been determined. A fuzzy search using a matrix with levenshtein represented distance to calculate the distance of the similarity of the word, so will produce a word that has italic style and not if there is in Indonesian grammar. From the test results, the use of fuzzy search algorithms to detect foreign words in a word document with a different number of words resulted in an average accuracy value of 89.6%. The results of this process makes this application can help foreign grammar in writing scientific papers.How to Cite : Taufik, I. Aishia,I.D. Jumadi.J. (2017). IMPLEMENTASI FUZZY SEARCH UNTUK PENDETEKSI KATA ASING PADA DOKUMEN MICROSOFT WORD. Jurnal Teknik Informatika, 10(1), 1-8. doi:10.15408/jti.v10i1.6804Permalink/DOI: http://dx.doi.org/10.15408/jti.v10i1.6804