Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Benhard Sitohang is active.

Publication


Featured researches published by Benhard Sitohang.


international conference on data and software engineering | 2014

A new scheme to hide the data integrity marker on vector maps using a feature-based fragile watermarking algorithm

Shelvie Nidya Neyman; Yudhy Haryanto Wijaya; Benhard Sitohang

For vector maps, obtaining precise locations to hide the data integrity marker with existing fragile watermarking algorithms is technically challenging. Using a fragile watermarking technique based on a LSB data insertion, a feature-based fragile watermarking algorithm that inserts watermark for each feature and detects the tampered features with high accuracy was proposed. In the proposed algorithm, the watermark calculation used the hash function for each feature as the data integrity marker, and generated new vertices on the feature to embed the watermarks. While the insertion watermark for each features ensures superior precision of location to verify the data integrity on the map, the proposed algorithm also maintains the original content the map. The invisibility test showed good results, demonstrated by RMSE values close to zero. This scheme produces a distortion watermarked map on a scale of 10-7-10-8 meter in the real world. This characteristic is influenced by the precision parameter and number of digit LSB insertion. The experimental results also shows that the proposed algorithm can detect attacks such as vertex/ feature modification, vertex/feature addition, and vertex/feature deletion. A consequence of the algorithm is an increasing in file size of the watermarked maps, but in a range less than 200%.


international conference on electrical engineering and informatics | 2009

Generic data model patterns using Fully Communication Oriented Information Modeling (FCO-IM)

Fazat Nur Azizah; Guido P. Bakema; Benhard Sitohang; Oerip S. Santoso

In the specific area of data modeling, data model patterns have been introduced and used to help creating highquality conceptual data models. Generic data model patterns, in particular, are expected to be more useful in helping to solve more data modeling problems in comparison to domain-specific patterns. A collection of generic patterns using Fully Communication Oriented Information Modeling (FCO-IM) as the modeling approach is described in this paper. They can generally be divided into two categories: (1) Patterns that are based on the identification of an object, consist of 5 patterns; (2) Patterns that are based on the relation between two objects, consist of 6 patterns. The generic patterns are needed to be documented in full details and then to be shared in wider audience to have comments and improvements.


international conference on data and software engineering | 2014

A new proposal for the integration of key performance indicators to requirements elicitation process originating from organization goals

Fransiskus Adikara; Bayu Hendradjaya; Benhard Sitohang

This paper proposes a new approach to integrate Key Performance Indicators (KPIs) in requirements elicitation process that are derived from organization goals. KPIs can then be used to control and reduce user requirements risk that caused by user interests. The proposal utilize goal oriented requirement engineering technique to elicit the requirements from organization. An information system project for a transportation company has been used as a study case to demonstrate this approach. The case study shows that the requirements can be elicited from the organization goals rather than from user requirements. KPIs have been able to control the emergence of user requirements that were caused by users interests.


international conference on computer control informatics and its applications | 2013

An improvement technique of fragile watermarking to assurance the data integrity on vector maps

Shelvie Nidya Neyman; Benhard Sitohang; Fransisca Cahyono

Vector map has properties more precise, easily stored, processed, and distributed when compared to maps in paper form. The problems that arise from the above conditions is how to develop appropriate methods to be able to ensure the authenticity of the map. The method applied is fragile watermarking using hash functions as watermark to be inserted. Any improvements made here is to present a better implementation technique and performance measurement. Invisibility, fidelity, robustness (fragility) and blind characteristics are fulfilled well by this technique. The invisibility degree on the watermarked map is shown by the scale of RSME distortion on 10-12 up to 10-13. The fidelity degree of the map will be maintain in shift range value of 10-7 meter (0.1 micrometer). For fragility testing, the results of the implementation is able to detect the authenticity of the map of manipulation in the form of shift changes, additions, and deletions map coordinates.


international conference on electrical engineering and informatics | 2011

Direct access in content-based Audio Information Retrieval: A state of the art and challenges

Hery Heryanto; Saiful Akbar; Benhard Sitohang

This paper surveys Audio Information Retrieval (AIR) using a literature review and classification of articles from 1994 to 2010 with a keyword index and article abstract in order to explore how AIR methodologies and applications have developed during this period. Based on the scope of many papers and journals of AIR, this paper surveys and classifies AIR problem domains into five domains: AIR framework, audio feature extraction, audio classification, audio/music similarity, and audio tools/applications with their applications for different research and problem domains. Based on the current state of the art, we discuss the major challenges for the future.


international conference on data and software engineering | 2016

Review of ontology matching with background knowledge

Inne Gartina Husein; Saiful Akbar; Benhard Sitohang; Fazat Nur Azizah

The ontology matching process with background knowledge is more suitable to match heterogeneous ontologies, since background knowledge is used as a mediator or a reference to identify relation between two concepts being matched. This method is called indirect matching and the system is called indirect matching system. This paper reviews the motivation that described the urgency of ontology matching, the various background knowledge and their strengths, also indirect matching process. At the end we provide the comparison of indirect matching system. Based on the comparison, mapping repair function were added to improve the quality of mapping. The purpose of this paper is to help in guiding new practitioners get a general idea on the ontology matching field and to determine possible research lines.


international conference on data and software engineering | 2016

Comparisons of diagnosis in mapping repair systems

Inne Gartina Husein; Benhard Sitohang; Saiful Akbar; Fazat Nur Azizah

Coherent mappings become very important things in improving the quality of alignments in ontology matching process. Mapping repairs will restore the incoherent condition into the coherent one by removing undesired correspondences. The ability to remove the undesired correspondences as minimal as possible is called minimal diagnosis. The purpose of this paper is to analyze and to compare minimal diagnosis in LogMap Repair, AML Repair, and ALCOMO. The results are comparisons of repair systems and diagnosis techniques. There are two quadrants (of four quadrants) that are matched to the goal of minimal diagnosis, namely quadrant 1 and quadrant 4. The open issues in this field will be exploring the characteristic of four quadrants and comparing them with diagnosis technique.


international conference on electrical engineering and informatics | 2015

Requirements refinements and analysis with case-based reasoning techniques to reuse the requirements

Fransiskus Adikara; Bayu Hendradjaya; Benhard Sitohang

This paper proposes an approach in Goal-Oriented Requirements refinement and analysis that adapt Case-Based Reasoning techniques. This approach is expected to help emphasizing the reuse of the high quality requirements that have been applied on previous system development process. The Attributed Goal-Oriented Requirements Analysis (AGORA) is simplified to analyze requirements proposed by Goal Tree Model Case-Based. An information system project for a transportation company has been used as a case study to demonstrate this approach. The case study helped demonstrated that the generated requirements using our approach are able to accomplish the company needs, rather than user requirements that are caused by the users interest in requirements engineering process.


international conference on move to meaningful internet systems | 2010

Information grammar for patterns (IG P ) for pattern language of data model patterns based on fully communication oriented information modeling (FCO-IM)

Fazat Nur Azizah; Guido P. Bakema; Benhard Sitohang; Oerip S. Santoso

The use of patterns in a design process, including data modeling, is an attempt to create a better solution to a problem. We propose the use of data model patterns, organized in a pattern language, and based on Fully Communication Oriented Information Modeling (FCO-IM) as the modeling approach, as a standard to produce high quality data models. We introduce the concept of Information Grammar for Pattern (IGP) which works as a kind of template to generate FCOIMs Information Grammar (IG). IGP is also used to define the relations among patterns. Based on how they are abstracted, we also define 3 types of IGP. The IGP provides the basic idea for the pattern language of data model patterns based on the relations among patterns.


Archive | 2016

Information System Design Based on the Result of Organization Goal-Oriented Requirements Engineering Process

Fransiskus Adikara; Patricia Dianita Wijaya; Bayu Hendradjaya; Benhard Sitohang

In the previous research[1, 2], the use of Key Performance Indicators (KPIs) was proposed as a controlling tool for IT goal, which extracted from organization goal. The goals are the analysis and refinement using Case Based Reasoning (CBR) methods to get more qualified system requirements. This paper aims to illustrate the use of the IT goals and KPIs in the requirement engineering process that produced a Goal Tree Model, which would subsequently be used in an information system design using the Unified Modeling Language (UML). Through requirement engineering process with KPIs as the system’s success parameter in achieving the goals derived from the organization goals, this paper seeks to demonstrate the improvement in the quality of the designed system. Also included in this research is how the results of the requirement engineering process produces a system that fulfill the KPIs without basing the system’s requirements on the user, to reduce the risk of the occurrence of user’s needs in the process of requirement elicitation. We have applied the proposed process to a development of an information system as a case study.

Collaboration


Dive into the Benhard Sitohang's collaboration.

Top Co-Authors

Avatar

Saiful Akbar

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Fazat Nur Azizah

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Bayu Hendradjaya

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Gede Indrawan

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Inne Gartina Husein

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Veronica S. Moertini

Parahyangan Catholic University

View shared research outputs
Top Co-Authors

Avatar

Guido P. Bakema

HAN University of Applied Sciences

View shared research outputs
Top Co-Authors

Avatar

Fransiskus Adikara

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Oerip S. Santoso

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hery Heryanto

Bandung Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge