Kridanto Surendro
Bandung Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kridanto Surendro.
Jurnal Informatika | 2007
Kridanto Surendro
The issues of security in mobile phone in recent days become crucial. Many privacy or secretly data is stored using unsecured protocol or sometimes without the security procedures at all. This will lead to great awareness about security in mobile phone. The effective ways to secure data are steganography and cryptography. The first one concentrate to data hiding in a certain media. In this paper, we present Chaotic Least Significant Bit Encoding (CLSBE) as a steganography method in our system design. The experiment results show that hidden messages in PNG form can be retrieved correctly. The implementation of system in emulator works well but depends on mobile phone features and environment.In computer graphics applications, to produce realistic images, a method that is often used is ray tracing. Ray tracing does not only model local illumination but also global illumination. Local illumination count ambient, diffuse and specular effects only, but global illumination also count mirroring and transparency. Local illumination count effects from the lamp(s) but global illumination count effects from other object(s) too. Objects that are usually modeled are primitive objects and mesh objects. The advantage of mesh modeling is various, interesting and real-like shape. Mesh contains many primitive objects like triangle or square (rare). A problem in mesh object modeling is long rendering time. It is because every ray must be checked with a lot of triangle of the mesh. Added by ray from other objects checking, the number of ray that traced will increase. It causes the increasing of rendering time. To solve this problem, in this research, new methods are developed to make the rendering process of mesh object faster. The new methods are angle comparison and distance comparison. These methods are used to reduce the number of ray checking. The rays predicted will not intersect with the mesh, are not checked weather the ray intersects the mesh. With angle comparison, if using small angle to compare, the rendering process will be fast. This method has disadvantage, if the shape of each triangle is big, some triangles will be corrupted. If the angle to compare is bigger, mesh corruption can be avoided but the rendering time will be longer than without comparison. With distance comparison, the rendering time is less than without comparison, and no triangle will be corrupted.Web index page is well known as page that arranges information by giving the title and short explanation about the information, where the complete information will be presented in other page. However since the amount of information become accumulate, the existence of a lot of index page exactly cause difficulty on getting information because it is possible to direct users into a mount of irrelevant information. Without a system which can help user navigation, the process of seeking the expected information is equal to a trial and error processing. In this paper, web index recommendation system is investigated which involved the activity of user on accessing the index page. This system will arrange the frequent term in index page and then implement Multi Instance Learning to give recommendation of the new index page automatically. The algorithm is citation kNN that will be adapted into fretCit kNN by implementing the minimal Hausdorff distance in measuring the distance. The experiments show that from the several test of users, the system give performance in average recommendation until 82,41% accuracy with 66,71% recall.
2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) | 2014
G. Soni Fajar Surya; Kridanto Surendro
The Higher Education (HE) is recognized as one of the pillars of community development. In the spirit of Tri Dharma, HE is required to give maximum contribution to peoples life. Nevertheless, sometimes these operations have impacts on big-funding requirements, so it is common for private HE with minimal funding tofind difficulties in the operation processes. The presence of cloud computing (CC) technology is a solution to support HE operations. The challenges faced by a HE nowadaysto adopt new technology such as CC will be related to the ITreadiness. Thus an eReadiness framework should be used to perform the measurement of IT readiness level, so the adoption process can run well. This paper discusses what enablers dimensions influence CC eReadiness in HE, and the HE eReadiness positions in West of Java. By using the enterprise enabler of IT governance COBIT 5, eReadiness framework will be designed with the goal to measure the readiness level based on maturity assessment model.
2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA) | 2014
Nadinastiti Muladi; Kridanto Surendro
Green IT is becoming an important concept for the organization, but unfortunately, not every organization is ready to apply green IT. Therefore, it is necessary to develop an easy-to-use but comprehensive self-assessment to evaluate organizational readiness to implement green IT. The Green IT implementation is also a form of business transformation. Thus, the development of the measurement will use four business transformational dimensions: Economy, Technology, Process, and People developed by Unhelkar. The assessment on this research is divided into two. First, there is a matrix to help managers determine whether the organization has used the right approach to implement green IT based on types of organization. Second, there are readiness factors consisting of strategy, technology, process, and human resources factors to determine how ready an organization is to implement green IT.
international conference on electrical engineering and informatics | 2011
Budi Nugroho; Kridanto Surendro
This study developed IT governance model that can be used to assess the delivery and support of information service in PDII-LIPI. The assessment is conducted through the control and performance indicators based on the COBIT 4.1 framework domain Delivery and Support (DS), adjusted for the condition of IT governance in PDII-LIPI. To examine aspects of policy implementation strategy also conducted an assessment of organizational culture through organizational culture assessment instrument (OCAI) based on the theory of competing values framework. By competing value framework can be mapped up the delivery and support of model maturity level so that it can measure how well the existing processes of information technology and evaluate the aspects that needed to be improved.
international conference on electrical engineering and informatics | 2011
Tien Fabrianti Kusumasari; Iping Supriana; Kridanto Surendro; Husni S. Sastramihardja
Software development is a series of processes activity involving more than one person, especially in medium to large software projects. Each activity of software development is carried out by various combination of different individual. Collaboration occurs in every phase of the process software development. The right team collaboration method is one of the important things in success software development. This research is focused to develop collaboration model of software development to meet time schedule, budget, scope, and software quality.
international conference on electrical engineering and informatics | 2009
Lovinta Happy Atrinawati; Kridanto Surendro
Some of knowledge management implementation projects result in failure. It happened because it is done only based on the theory and not considering the specific aspects of the organization. It is necessary to do assessment to find out, whether the organization is ready to implement knowledge management. Assessment carried out on a few factors that determine success in implementing knowledge management. From the assessment, we can obtain the organizations readiness level.
International Conference on ICT for Smart Society | 2013
Toni Kusnandar; Kridanto Surendro
Hospital services development continues to grow rapidly, giving a rise to competition of hospitals. To maintain the competitive level, a hospital must save its operational cost. Cloud computing service is promising the increase of service to all stakeholders including cost which changes Capital Expense (Ca-Pex) into Operational Expense (Op-Ex). This research is conducted to obtain adoption model of hospital information system based on cloud computing considering adopters characteristics and hospitals organizational culture. The approach to find adopters characteristics is by utilizing innovation adoption elements and organizational culture. Meanwhile, model designing is conducted by Structural Equation Modeling (SEM) to find out the relations between adopters characteristics with organizational culture. Through SEM we will be able to know the effect of hospital management against innovation diffusion element as well as against organizational culture. At the end, we also will be able to know how big is the influence of organizational culture against cloud computing adoption, so that the result of this research could become an input to set up strategies in adopting cloud computing at hospitals.
international conference on telecommunication systems services and applications | 2015
Sarifah Putri Raflesia; Kridanto Surendro
Gamified-Service is defined as a service desk which uses ITIL and gamification model to boost the motivation of service desk employees. Along the implementation of service desk, organizations find the challenge which is related to the human resource who deliver the service. Pressure at workplace and personal issues become trigger to decrease their productivity. According to this fact, standard service desk is not enough. We need persuasive approach to guarantee that employees are totally engaged. Moreover, we are challenged to ensure that good service desk is implemented, we need best practices of IT Service Management, it is Information Technology Infrastructure Library (ITIL). This research is focused on creating a framework to build, implement, and maintain good service desk with fully engaged employees.
Archive | 2015
Sandfreni; Nabila Rizky Oktadimi; Kridanto Surendro
Cloud computing gets increasingly established in higher education as an option for modelling the quality of services and education system. Requirement engineering is a process to formulate user system needs, manifested by identifying the stakeholders in cloud computing at university which are used in operational activities where such operations require services that allow network access from anywhere and anytime, e.g., networks, servers, storage, applications and services. The adoption of cloud computing in a university course is highly related to the readiness of the University. Using iStar hierarchy make a great combination for improving the quality of software. Design requirement engineering framework through iStar hierarchy approach in the implementation of requirements engineering.
international conference on information technology systems and innovation | 2014
Aradea; Iping Supriana Suwardi; Kridanto Surendro
Multi-agent system approach is now widely used as a solution to real-world problems, including problems in the organization model. The complexity of the organizational environment demands a model of knowledge management (KM) improvement that can create innovation and responsiveness process, this matter caused by rapid changes, so the knowledge will grow and improve continuously. Multi-agent system is seen as an approach that can achieve this goal, through its characteristics. This paper describes an overview of implementation of multi-agent system approach to KM models, including a review of several research contributions related to that domain. Assessment of any research results are discussed with systematically to compare each contribution of each researcher. At the end of this paper, we make conclusion and propose a preliminary study that needs further study, which is expected can give new idea and description for other researcher at this domain to invent a value of novelty on the future.