cover
Contact Name
Agus Harjoko
Contact Email
ijccs.mipa@ugm.ac.id
Phone
+62274 555133
Journal Mail Official
ijccs.mipa@ugm.ac.id
Editorial Address
Gedung S1 Ruang 416 FMIPA UGM, Sekip Utara, Yogyakarta 55281
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
ISSN : 19781520     EISSN : 24607258     DOI : https://doi.org/10.22146/ijccs
Indonesian Journal of Computing and Cybernetics Systems (IJCCS), a two times annually provides a forum for the full range of scholarly study . IJCCS focuses on advanced computational intelligence, including the synergetic integration of neural networks, fuzzy logic and eveolutionary computation, so that more intelligent system can be built to industrial applications. The topics include but not limited to : fuzzy logic, neural network, genetic algorithm and evolutionary computation, hybrid systems, adaptation and learning systems, distributed intelligence systems, network systems, human interface, biologically inspired evolutionary system, artificial life and industrial applications. The paper published in this journal implies that the work described has not been, and will not be published elsewhere, except in abstract, as part of a lecture, review or academic thesis.
Articles 476 Documents
Perbandingan Kapasitas Pesan pada Steganografi DCT Sekuensial dan Steganografi DCT F5 dengan Penerapan Point Operation Image Enhancement Dian Hafidh Zulfikar; Agus Harjoko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.11187

Abstract

Steganographic  process on the DCT transform is generally done on the value of DCT quantization process results that have a value other than 0, this relates to the distribution of the diversity of pixels in the image. Applying point operation of image enhancement (POIE) in the form of histogram equalization, contrast stretching, brigthening and gamma correction on the image of the reservoir is associated with the image histogram . Test parameters used is the number of bits that can be accommodated message, PSNR and MSE value, and the value of DCT coefficients quantization results.    Based on test results that have to be got several conclusions that capacity steganographic message on DCT sequential greater than the DCT F5 steganography either before or after application of the application POIE, stego image quality on DCT steganography F5 better than the sequential DCT steganography well before the application POIE and after application of POIE, both F5 and steganography steganography DCT DCT sequential equally resistant to manipulation of stego image.
Transformasi Skema Basis Data Relasional Menjadi Model Data Berorientasi Dokumen pada MongoDB I Gede Winaya; Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.11188

Abstract

            MongoDB is a database that uses document-oriented data storage models. In fact, to  migrate from a relational database to NoSQL databases such as MongoDB is not an easy matter especially if the data are extremely complex. Based on the documentation that has been done by several global companies related to the use of MongoDB, it can be concluded that the process of migration from RDBMS to MongoDB require quite a long time. One process that takes quite a lot is transformation of relational database schema into a document-oriented data model on MongoDB.            This research discusses the development transformation system of relational database schema to the document oriented data model in MongoDB. The process of transformation is done by utilizing the structure and relationships between tables in the scheme as the main parameters of the modeling algorithm. In the process of the modeling documents, it necessary to adjustments the specifications of MongoDB document that formed document model can be implemented in MongoDB.            Document models are formed from transformation process can be a single document, embedded document, referenced document or combination of these. Document models are formed depending on the type, rules, and the value of the relationships cardinality between tables in the relational database schema.
Analisa Metode Handover Pada Jaringan WiMAX Murhaban Murhaban; Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.11189

Abstract

Handover method is used to keep the stabilization of connection. Its connected with the performance was caused the process canal traffic transfer automatically in mobile station (MS) that was used to communicate without cutting off the connection. The main factor of success in handover was quality of service to provide the difference level of service in arranging and giving the traffic priority in the network like voice over IP (VoIP) application or communication voice using internet network.             This research will analyse the achievement quality of service in the WiMax network standard 802.16e used hard handover and softhandover method with the VoIP application in mobile station.            Based on the testing that was carried out hard handover and soft handover method used  the application of voice over internet protocol in mobile station has obtained  value jitter 0.001 Ms – 0.31 ms, and delay 10.5 ms 39 ms this is proved that the influence of jitter and delay against handover with the VoIP application still in the tolerance stage that was permitted.  It is different with the output throughput 85 Bit/Sekon  - 550 Bit/Sekon that is too low and indicated that throughput is not sentitif against handover with the voice over  internet protocol application.
Pembentukan Temporal Association Rules Menggunakan Algoritma Apriori (Studi Kasus:Toko Batik Diyan Solo) Annisa Mauliani; Sri Hartati; Aina Musdholifah
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.11190

Abstract

In this study the adding of time aspect on association rules mining result was used. The aspect of time that was used in this study was date of transactions. The information that was resulted from time aspect adding in association rules mining was known as temporal association rules mining..            In this study, Apriori Algorithm was used for the forming of temporal association rules. This result which show Algorithm Apriori and Temporal Association Rules can be used to get more information about Temporal Association Rules. The Result of this examination can be used for decision support for manager. Because the result of Temporal Association Rules have explanation about event. So from the result of Temporal Association Rules can be knowing, the Temporal Association Rules happened at the time of event.In Ramadan Idul Fitri 2013 and Ramadan Idul Fitri 2014 with parameter assess minsup 10%, mintempsup 5, minconf 50%, resulting different Temporal Association Rules. In Ramadan Idul Fitri 2013, no resulting Temporal Association Rules. While is on Ramadan Idul Fitri 2014 resulting Temporal Association Rules with the biggest value of support 14%, that is {BLBP} à  {HPCK}.
Pemodelan dan Verifikasi Formal Pengaruh Mobility pattern Terhadap Handoff Latency pada Jaringan WiMAX I Nym Saputra Wahyu Wijaya; Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.11191

Abstract

           In order to decrease handoff latency and increase the successful of HHO conventional scheme, a development of handover scheme is done in standard protocol WiMAX IEEE 802.16e by adding mobility pattern. The superiority of handover scheme with mobility pattern can reduce handoff latency up to 50%, mean while the weakness of this scheme is a wrong act in determining target base station are often happen. Simulation can not showing the cause of that error. So, we do formal verification in to hard handover model with mobility pattern.            In this research, behaviour system is modeled with continuous-time Markov chain (CTMC). The model is foccused to aproximating the influence of mobility pattern in to handoff latency from WiMAX hard handover mechanism. In order to set up a series markov chain models handover system can follow steps, such as: represents the state space, give a number in all transitions, generate the rate transition matrix (infinitesimal generator).            Probabilistic model checking in the research are using quantitative properties and qualitative properties. Formal verification concerning properties has relation with handover in WiMAX network showing that 70% from mobile station which doing scanning with mobility pattern are success doing handover. 24% of them doing scanning conventional as a result of wrongness in act determining target base station, so handoff latency which is pictured will bigger than a system that is only use conventional scanning method.
Pemodelan dan Verifikasi Formal Protokol EE-OLSR dengan UPPAAL CORA Rachmat Wahid Saleh Insani; Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.11192

Abstract

Information and Communication Technology systems is a most important part of society.  These systems are becoming more and more complex and are massively encroaching on daily life via the Internet and all kinds of embedded systems. Communication protocols are one of the ICT systems used by Internet users. OLSR protocol is a wireless network communication protocol with proactive, and based on link-state algorithm. EE-OLSR protocol is a variant of OLSR that is able to prolong the network lifetime without losses of performance.Protocol verification process generally be done by simulation and testing. However, these processes unable to verify there are no subtle error or design flaw in protocol. Model Checking is an algorithmic method runs in fully automatic to verify a system. UPPAAL is a model checker tool to model, verify, and simulate a system in Timed Automata.UPPAAL CORA is model checker tool to verify EE-OLSR protocol modelled in Linearly Priced Timed Automata, if the protocol satisfy the energy efficient property formulated by formal specification language in Weighted Computation Tree Logic syntax. Model Checking Technique to verify the protocols results in the protocol is satisfy the energy efficient property only when the packet transmission traffic happens.
Pencarian Lowongan Pekerjaan Berbasis Agen Berdasarkan Profil Pencari Kerja dengan Pendekatan Semantic Web Service Teguh Susyanto; Khabib Mustofa
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.12734

Abstract

Currently, job searching service still has many weaknesses and often fails to provide relevant job information that matches the needs of job seekers. This is due to the searching method applied in the search engines still uses the syntax-based matching and the lack of integration among the job service providers. Therefore it’s difficult for the job seekers to get the desired information. To overcome these weaknesses, a prototype of a job vacancy searching by involving a web service as a job information provider is proposed.This thesis is aimed to create job search based on the personalization of job seeker by combining multi agent  and semantic web service approaches.The designing of the prototype used a multiagent technology whose capability was to call job service provider and run matching process of the job vacancy appropriate with the job seeker’s profile automatically. Algorithm of the service selection used service matching and Simple Additive Weighting. The similary between the job offer and the job seeker’s profile was calculated by using semantic algorithm. Based on the testing carried out to the respondents, it’s stated that this prototype has been able to give recommendation of job appropriate with the job seeker’s.
Komunikasi Data Berbasis Protokol UDP pada Sistem Ubiquitous Mobile Sensing Kualitas Sumber Air Yuning Widiarti Darsono; Adianto Adianto; Mirna Apriani
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 2 (2016): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.15491

Abstract

The need for monitoring, effective and efficient control and evaluation of water quality in regional waters Surabaya become a demand for population growth, climate change and variability in the current era of urbanization. The traditional method is done by collecting water samples, test and analyze water in the laboratory has been relatively expensive and do not have the ability to capture real-time data, analysis and information delivery fast in making decisions. On the other hand, the rapid spread in the use of mobile phones in developing countries has increased mobile data management applications. A variety of mobile applications has also increased in recent years. This is because mobile phones cheap, easy to use and can transmit multiple types of information including images and GPS data remotely. In this paper, the author describes a data communication system of  water quality resources based on UDP protocol. This system is called ubiquitous mobile sensing consisting of microcontroller Arduino, water quality sensors, and Android smartphones. It has the ability to detect temperature, dissolved oxygen (DO), pH and electrical conductivity (EC) in real time. By using this monitoring system, the data result is expected more accurate, faster and cheaper.
Case-Based Reasoning untuk Diagnosis Penyakit Jantung Eka Wahyudi; Sri Hartati
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 11, No 1 (2017): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.15523

Abstract

Case Based Reasoning (CBR) is a computer system that used for reasoning old knowledge to solve new problems. It works by looking at the closest old case to the new case. This research attempts to establish a system of CBR  for diagnosing heart disease. The diagnosis process  is done by inserting new cases containing symptoms into the system, then  the similarity value calculation between cases  uses the nearest neighbor method similarity, minkowski distance similarity and euclidean distance similarity.            Case taken is the case with the highest similarity value. If a case does not succeed in the diagnosis or threshold <0.80, the case will be revised by experts. Revised successful cases are stored to add the systemknowledge. Method with the best diagnostic result accuracy will be used in building the CBR system for heart disease diagnosis.            The test results using medical records data validated by expert indicate that the system is able to recognize diseases heart using nearest neighbor similarity method, minskowski distance similarity and euclidean distance similarity correctly respectively of 100%. Using nearest neighbor get accuracy of 86.21%, minkowski 100%, and euclidean 94.83%
Penerapan SOA menggunakan Enterprise Service Bus pada Proses Pengecekan Status Perizinan Pemerintah Kabupaten Sleman Kabul Kurniawan; Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 2 (2016): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.15525

Abstract

The Implementation of web services using point-to-point method considered to be irrelevant weather the number of services are growing up rapidly and more complex. In the other hand, the differences of web service implementation standard is also being a serious problem when the integration and communication among web services are needed.One way that can be applied to provide management information system integration among others is the implementation of Enterprise Service Bus (ESB). ESB is an infrastructure that can be the solution of n-to-n integration complexity problem. ESB concept strongly supports the implementation of Service Oriented Architecture (SOA).This research will discuss about the implementation of ESB in government area, especially in Sleman, sub-district of Daerah Istimewa Yogyakarta local government, Indonesia. Some of ESB functionality such as Routing and Transformation  are applied to solve the  integration problem between Government to Public (G2P) in case of checking lisence process at Badan Penanaman Modal dan Izin Terpadu (BMPT) Sleman Sub-Distric. The results show that the ESB can be used as the mediator of information integration in case of checking lisence process. Beside that, the results of performance testing shows that the average execution time (AET) for service operations reach up  to 0,085 seconds. Furthermore, the system has an average amount of execution  about 11.99 times and produces  data about 15746.86 bytes or equivalent to 15.38 KB per second. These results indicate that the execution time is considered to be small enaugh so that the services will not interfere the process of the transactions.