cover
Contact Name
Agus Harjoko
Contact Email
ijccs.mipa@ugm.ac.id
Phone
+62274 555133
Journal Mail Official
ijccs.mipa@ugm.ac.id
Editorial Address
Gedung S1 Ruang 416 FMIPA UGM, Sekip Utara, Yogyakarta 55281
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
ISSN : 19781520     EISSN : 24607258     DOI : https://doi.org/10.22146/ijccs
Indonesian Journal of Computing and Cybernetics Systems (IJCCS), a two times annually provides a forum for the full range of scholarly study . IJCCS focuses on advanced computational intelligence, including the synergetic integration of neural networks, fuzzy logic and eveolutionary computation, so that more intelligent system can be built to industrial applications. The topics include but not limited to : fuzzy logic, neural network, genetic algorithm and evolutionary computation, hybrid systems, adaptation and learning systems, distributed intelligence systems, network systems, human interface, biologically inspired evolutionary system, artificial life and industrial applications. The paper published in this journal implies that the work described has not been, and will not be published elsewhere, except in abstract, as part of a lecture, review or academic thesis.
Articles 456 Documents
Utilizing Soft Computing for Determining Protein Deficiency Sri Hartati; Sri Nurdiati
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 1 (2011): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.1996

Abstract

Abstract— In recent years, the occurrence of protein shortage of children under 5 years old in many poor area has dramatically increased. Since this situation can cause serious problem to children like a delay in their growth, delay in their development and also disfigurement, disability, dependency, the early diagnose of protein shortage is vital. Many applications have been developed in performing disease detection such as an expert system for diagnosing diabetics and artificial neural network (ANN) applications for diagnosing breast cancer, acidosis diseases, and lung cancer. This paper is mainly focusing on the development of protein shortage disease diagnosing application using Backpropagation Neural Network (BPNN) technique. It covers two classes of protein shortage that are Heavy Protein Deficiency. On top of this, a BPNN model is constructed based on result analysis of the training and testing from the developed application. The model has been successfully tested using new data set. It shows that the BPNN is able to early diagnose heavy protein deficiency accurately. Keywords— Artificial Neural Network, Backpropagation Neural Network, Protein Deficiency.
Implementasi Protokol Diffie-Hellman Dan Algoritma RC4 Untuk Keamanan Pesan SMS Decky Hendarsyah; Retantyo Wardoyo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 1 (2011): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.1997

Abstract

Abstrack— SMS now becomes such a need for cellular phone users to communicate to other people. But the cellular phone users do not realize that the sent messages could be intercepted or changed by an unwanted party. Therefore it requires a security in sending an SMS message which is called cryptography. Given limited resources on cellular phone, then the implementation of symmetric cryptographic technique is suitable to meet the security needs of an SMS message. In symmetric cryptography, there is a symmetric key for encryption and decryption process. In order to secure exchange of symmetric keys in public channels is required of a protocol for key exchange.This research implements RC4 symmetric cryptography to encrypt and decrypt messages, while for key exchange is using Diffie-Hellman protocol. In this research, there are modifications to the Diffie-Hellman protocol that is the calculation of the public key and symmetric key to include cellular phone number as authentication. Whereas on a modified RC4 is the key where there is a combination with cellular phone number as authentication and key randomization, and then there are also modifications to the pseudorandom byte generator, encryption and decryption of the RC4 algorithm. The system is constructed using the Java programming language in the platform Micro Edition (J2ME) based MIDP 2.0 and CLDC 1.0.The research found that with the cellular phone number as authentication, key, encryption and decryption process automatically it is able to maintain confidentiality, data integrity, authentication and non-repudiation to the message. Keywords—  Diffie-Hellman, Key exchange, RC4, SMS Secure, Symmetric Cryptography.
Text Document Retrieval In English Using Keywords of Indonesian Dictionary Based Jati Sasongko Wibowo; Sri Hartati
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 1 (2011): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.1999

Abstract

Abstract— Cross language information regtrieval at the present moment is crucial to the amount of available information use the language variety. Mean while the user who have mastering another language is very less. So with the appointment system of cross language information retrieval is expected.Information retrieval applications on this system to search for text documents in English using keyword of Indonesian dictionary-based. This system was built by several stages starting from collection of documents data by using crawler, entering documents data into a corpus table, punctuation removal, tokenization of documents, stopword removal and term weighting.The ability of this system can add documents data, dictionaries data and stopword data. It is enable to retrieval text documents in English that contains keyword of Indonesian with dictionary-based. Results of documents retrieval was ranked based on the calculation of term weights. Able to see the contents of the document and open the original document. The development of this system can be used as a cross language information retrieval system on dictionary based.Keywords— retrieval information, dictionary based, cross language.
Design And Implementation of Document Similarity Search System For WEB-Based Medical Journal Management Mardi Siswo Utomo; Edi Winarko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 1 (2011): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2000

Abstract

Abstract— Document similarity can be used as a reference for other information searches similar. So as to reduce the time-re-appointment for information following a similar document. Document similarity search capability is usually implemented on the features 'related articles'.Similarity of documents can be measured with a cosine, with preprosesing conducted prior to the document that will be measured. The indexing process and the measurement takes a relatively long excecution time. Problems with a web-based application to conduct the process and measuring the similarity index is a limited execution time, so the processing index and similarity measure in web-based application needs its own programming techniques.Problems with a web-based application to conduct the process and measuring the similarity index is a limited execution time, so the processing index and similarity measure in web-based application needs its own programming techniques.The purpose of this research is to design and create a software that give capability for web-based database management system of medical journals in Indonesian language to find other documents similar to the current document in reading at the time.The results of this research is the mechanism autoreload javascript and session cookies and can break down the process and measurement index similaritas into several small sections, so the process can be performed on web-based applications and the number of relatively large documents.Results with the cosine similarity measure in the case of Indonesian-language medical journal “Media medika Indonesiana” has a fairly high accuracy of 90%. Keywords— document similarity, cosine measure, web-based application.
Aplikasi Mobile WEB Map Service Pada Mobile Device Dengan SVGT Sigit Priyanta; Ghulam Imanuddin; Suci Karunia Prilistya
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 1 (2011): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2001

Abstract

Abstract— Teknologi informasi geografi berkembang sangat pesat dalam beberapa dekade terakhir ini. Sekarang ini, WMS (Web Map Services) tidak hanya dapat menghasilkan gambar raster tetapi juga gambar vektor. Contohnya adalah SVGT (Scalable Vector Graphics Tiny) yang merupakan bagian dari SVG (Scalable Vector Graphics) yang digunakan pada piranti mobile device. Mahalnya biaya komunikasi antara handheld device dengan jaringan internet melalui GPRS (Global Pocket Radio System) menimbulkan sebuah masalah dalam penerapan aplikasi mobile mapping. Untuk mengeliminasi masalah tersebut, harus dibuat sebuah aplikasi mobile mapping yang dapat mentransfer data sekecil mungkin. Didalam penelitian ini, dicoba untuk dibuat sebuah server pemetaan yang memanfaatkan teknologi SVGT dan XML. Kedua format data tersebut digunakan untuk menghasilkan data sekecil mungkin agar dapat menghemat biaya komunikasi antara klien dan server. Pada akhirnya, aplikasi yang dibangun akan menjadi sebuah server yang memiliki klien berupa handheld / mobile device.Aplikasi ini dibangun dengan bahasa pemrograman PHP dan memanfaatkan database PostgreSQL beserta ekstensi PostGIS-nya pada sisi server dan J2ME (Java 2 Micro Edition) pada sisi mobile client. Aplikasi yang telah dibangun mampu untuk menampung peta jalan dari sebuah daerah, menampilkannya dalam format SVGT kepada klien, serta mencari rute terpendek antara dua buah jalan dengan menggunakan algoritma Floyd-Warshall. Mobile device sebagai client mempunyai beberapa fungsi utama, yaitu download map dengan format SVGT dari server, menyimpan map ke dalam record store, menampilkan map dan juga melakukan fungsi pan dan zoom terhadap map. Fungsi lainnya adalah searching atau mencari  titik tertentu pada map sesuai dengan permintaan user, request path ke server untuk mendapatkan jalur terpendek antara dua titik, dan set mark atau menyimpan titik-titik pada peta yang telah diberi tanda oleh user.Keywords— SVG, SVGT, Mobile Mapping, Web Map Services, J2ME, Java 2 Micro Editon.
Deteksi Steganografi Berbasis Least Significant Bit (LSB) Dengan Menggunakan Analisis Statistik Nur Rokhman; Juwita Maharanti
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 1 (2011): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2007

Abstract

Abstrak— Pada  penelitian  ini dicoba dideteksi penyisipan pesan pada sebuah citra yang dilakukan dengan  teknik Least Significant Bit. Deteksi dilakukan dengan teknik Chi-square attack. Pada teknik ini dibandingkan distribusi frekuensi yang diharapkan secara teori dengan beberapa distribusi sampel yang diamati pada stego-image.Pada penelitian ini dilakukan steganalisis terhadap 10 macam citra yang disisipi dengan sebuah pesan yang berukuran 1kb, 2 kb dan 5 kb. Dicobakan juga 2 penyisipan berbeda, yakni dengan program Stegano dan StegoGraphyBMP.Dari percobaan yang dilakukan pada sepuluh stego-image dengan panjang pesan 1kb, 2kb, dan 5kb, Chi-square attack berhasil 80% mendeteksi pesan yang disisipkan pada sebuah citra dengan program Stegano dan berhasil 70% mendeteksi pesan yang disisipkan pada sebuah citra dengan program StegoGraphyBMP. Disamping itu diperoleh hasil bahwa ukuran pesan tidak berpengaruh pada proses steganalisis. Keywords—  Steganalisis, Chi-square.
Detecting A Botnet By Reverse Engineering Oesman Hendra Kelana; Khabib Mustofa
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 1 (2011): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2008

Abstract

Abstract— Botnet malware is a malicious program. Botnet that infects computers, called bots, will be controlled by a botmaster to do various things such as: spamming, phishing, keylogging Distributed Denial of Service (DDoS) and other activities that are generally profitable to the owner of the bot (botmaster) or those who use botnet services. The problem is that many computers have been controlled by botnets without the knowledge of the computer owner.  There are many ways to examine botnets, for example by studying the traffic from the botnet network, studying how botnets communicate to each, studying how each robot receives orders to do something, and so forth. Of the many methods, the most frequently and commonly used is the reverse engineering, where researchers study how a botnet works by botnet debugging.In this study the author tries to understand or research botnets by taking a type of botnet, namely Agobot, using reverse engineering.  One of the result of the research is that malware program files in general and in particular botnet has a technique to obscure the way that research using reverse engineering.Another result also shows that the botnet Agobot runs on computers by using the Windows service, and by changing the Windows registry so that every time the computer starts, Agobot always actively works in the computer memory.Keywords— Malware, Bot, Botnet, Botmaster, Agobot, Spam, Distributed Denial of Services, Identity Theft, Computer Security, Reverse Engineering, Debug, Windows Service, the Registry.
WEB Services Implementation on The Report of Dengue Hemorrhagic Fever (DHF) At Health Office Karanganyar Ragil Saputra; Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 1 (2011): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2009

Abstract

Abstract— Dengue Hemorrhagic Fever (DHF) is one of the infectious diseases that frequently leads to Extraordinary Situation. The management of report is conducted by Health Community Center which subsequently gives report to Health Office. A problem arising from the report management is the fact that the report is conducted manually, therefore, the data is less valid and is not processed as quickly as possible. The quick and accurate data report system enables to lessen the risk of Dengue Hemorrhagic Fever. Due to this fact, it is undeniable necessary to provide an integrated inter-system of Dengue Fever report. This system includes an inter-system between one Health Community Center to another and to the system in Health Office. The integration of inter-system report is able to be conducted by the use of web service technology. Therefore, this research focuses on the development of Web Service based integrated system on the report of Dengue Fever. Data exchange is conducted in XML form by the application of SOAP and WSDL technologies. Library NuSOAP is necessary to provide class soapClient and soapServer. In other words, it functions as the listener whose functions are to receive and to respond at the access demand toward web service. The result is web service based report system which has dual functions since the system has functions to be either server or client.Keywords— web service, integration, SOAP, DHF.
Facial Expression Recognition By Using Fisherface Methode With Backpropagation Neural Network Zaenal Abidin; Agus Harjoko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 1 (2011): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2010

Abstract

Abstract— In daily lives, especially in interpersonal communication, face often used for expression. Facial expressions give information about the emotional state of the person. A facial expression is one of the behavioral characteristics. The components of a basic facial expression analysis system are face detection, face data extraction, and facial expression recognition. Fisherface method with backpropagation artificial neural network approach can be used for facial expression recognition. This method consists of two-stage process, namely PCA and LDA. PCA is used to reduce the dimension, while the LDA is used for features extraction of facial expressions. The system was tested with 2 databases namely JAFFE database and MUG database. The system correctly classified the expression with accuracy of 86.85%, and false positive 25 for image type I of JAFFE, for image type II of JAFFE 89.20% and false positive 15,  for type III of JAFFE 87.79%, and false positive for 16. The image of MUG are 98.09%, and false positive 5.Keywords— facial expression, fisherface method, PCA, LDA, backpropagation neural network.
Aplikasi Sistem Pendukung Keputusan Distribusi Air Bersih dengan Fuzzy Integer Transportation Aridhanyati Arifin; Sri Hartati
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 2 (2011): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2012

Abstract

Abstrak— Kebutuhan air bersih di kota-kota berkategori urban semakin lama semakin meningkat, sementara produktivitas air menurun disebabkan oleh berbagai alasan. Persoalan yang harus dipecahkan adalah bagaimana agar distribusi air ke tujuan berjalan secara simultan, yakni antara supply air dengan demand pelanggan ditengah minimnya anggaran biaya. Perlu dicari keputusan bagi perencanaan distribusi yang baik untuk mengalokasikan air, dari sejumlah sumber air  menuju sejumlah tujuan (kota). Oleh karena itu, diperlukan sistem terkomputerisasi yang memiliki kemampuan dalam memberikan dukungan untuk pengambilan keputusan, maka perlu dirancang suatu sistem pendukung keputusan (SPK) yang dapat membantu manajemen distribusi air bersih. SPK ini mengimplementasikan Fuzzy Integer Transportation  dengan nilai fuzzy supply, fuzzy demand dan fuzzy goal yang diekspresikan melalui bilangan fuzzy. Tabel transportasi dipakai untuk mempermudah pemodelan nilai supply dan demand yang ber-interval. Sebuah algoritma khusus digunakan agar dapat menghasilkan solusi integer yang optimal sehingga dapat meningkatkan efisiensi pencarian. Selain itu pemecahan masalah distribusi ini memakai pendekatan Vogel’s Approximation Method (VAM), memberikan solusi yang feasible bagi total biaya distribusi. Output sistem adalah total biaya distribusi dan jumlah air yang didistribusikan ke masing-masing tujuan.  Kata Kunci—       Sistem Pendukung Keputusan, Fuzzy Integer Transportation, VAM

Page 2 of 46 | Total Record : 456