cover
Contact Name
Agus Harjoko
Contact Email
ijccs.mipa@ugm.ac.id
Phone
+62274 555133
Journal Mail Official
ijccs.mipa@ugm.ac.id
Editorial Address
Gedung S1 Ruang 416 FMIPA UGM, Sekip Utara, Yogyakarta 55281
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
ISSN : 19781520     EISSN : 24607258     DOI : https://doi.org/10.22146/ijccs
Indonesian Journal of Computing and Cybernetics Systems (IJCCS), a two times annually provides a forum for the full range of scholarly study . IJCCS focuses on advanced computational intelligence, including the synergetic integration of neural networks, fuzzy logic and eveolutionary computation, so that more intelligent system can be built to industrial applications. The topics include but not limited to : fuzzy logic, neural network, genetic algorithm and evolutionary computation, hybrid systems, adaptation and learning systems, distributed intelligence systems, network systems, human interface, biologically inspired evolutionary system, artificial life and industrial applications. The paper published in this journal implies that the work described has not been, and will not be published elsewhere, except in abstract, as part of a lecture, review or academic thesis.
Articles 466 Documents
Sistem Pendukung Keputusan Pemilihan Subkontrak Menggunakan Metode Entropy dan TOPSIS Jamila Jamila; Sri Hartati
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 2 (2011): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2013

Abstract

Abstract— Outsourcing is a part of production process of manufacturing industry which contribute for suitainability of a manufacture process. Choosing appropriate subcontractor which match spesification is not easy. In order to help company in determining credible subcontractors is needed a decision support system.Selection of decision support system for the production of subcontracting gloves uses Entropy and TOPSIS methods. Entropy method is used to give weight to the criteria. TOPSIS (Technique for Order Preference by Similarity to Ideal Solution) method is used to select the best subcontractors, where subcontracting was elected not only has the shortest distance from the positive ideal solution but it also has the longest distance from the negative ideal solution. Designing of systems use ERD and DFD for identifying the needs of users and systems, and as for guiding the software implementation. The results of this research are the establishment of an application used to select subcontractors based on established criteria. Test results on the application can provide decision input/suggestion, although the criteria used in making decision is different. Subcontract selection decision support system can be an alternative to choose subcontractors for the production of gloves in PT. Adi Satria Abadi Yogyakarta.Keywords— DSS, Decision Support  System,  Entropy, TOPSIS, Subcontract
Implementasi Metode Fuzzy TOPSIS untuk Seleksi Penerimaan Karyawan Sri Lestari; Widodo Priyodiprodjo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 2 (2011): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2014

Abstract

Abstract —An emerging institution would continue to need qualified workers to produce good performances.  Seeing the importance of high quality employees, the candidate selection process became an important part and should be performed promptly.  It is also important to have candidates with desirable criteria fit to the institution. Many proposed methods can be adapted to help employee selection process based on criteria.  This research propose an employee selection system based on Fuzzy Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method, because the proposed method capable to deal with multi dimensional problems in employees selection.  The system will produce ranks that can be used to help the hiring decision. This research also compares the results from TOPSIS method and WPM method.  The comparison result shows that both methods produce the same ranks for the chosen candidates.Keywords—  Fuzzy TOPSIS, WPM, Employee Selection.
Fuzzy AHP Non-Additive Pada Keputusan Pendirian Klinik Bersalin Daerah Awaluddin Awaluddin; Retantyo Wardoyo
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 2 (2011): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2015

Abstract

Abstrak— Tingginya jumlah kematian ibu dan anak menempatkan Indonesia di rangking teratas kawasan Asia Tenggara.Penelitian yang dilakukan untuk mengurangi jumlah angka kematian ibu dan anak yaitu penyedian sarana dalam hal ini klinik bersalin disuatu daerah, demi tercapainya Milenium Development Goals (MDGs) di tahun 2015.Pengumpulan data yang mendukung penelitian ini, yaitu melakukan  konsultasi dengan kepala Dinas Kesehatan Sulawesi Selatan sehingga dihasilkan kriteria-kriteria terbaik dalam pendirian klinik bersalin. Kriteria-kriteria tersebut disusun berdasarkan studi literatur, observasi, dan wawacara.Selanjutnya kriteria tersebut diberi penilaian perbandingan berpasangan dengan AHP untuk mencari bobot prior dengan skala penilaian antara 1 – 9, sedangkan untuk mencari bobot informasional dan upper excepted value menggunakan TFN (Triangular Fuzzy Number).Hasil yang didapat dengan menggunakan Fuzzy AHP non-additive dalam pendirian klinik bersalin menunjukkan bahwa kriteria prevalensi, penduduk, kesakitan, petugas, dan sarana merupakan kriteria utama dalam pendirian klinik besalin. Metode Fuzzy AHP non-additive didalam penilaian tingkat konsistensi dilakukan pada setiap level struktur hirarki dan mampu mengakomodir ketidak konsistenan dalam penilaian.Kata Kunci— AHP(Analitycal Hierarchy Process), non-additive, TFN (Triangular Fuzzy Number), upper excepted value.
Sistem Pendukung Keputusan Klinis dengan Memanfaatkan Jaringan Syaraf Tiruan Untuk Mendeteksi Stadium Penderita Kanker Paru-Paru Jenis Karsinoma Bukan Sel Kecil Rio Kurniawan; Sri Hartati
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 2 (2011): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2016

Abstract

Abstract-- Lung cancer is leading cause of death in the cancer group. In general, lung cancer has some symptoms, but at an early stage, symptoms are not perceived by the patient. As a result, when patients go to hospital, lung cancer has been diagnosed in middle or high stage. For early detection of lung cancer, necessary a decision support system based on computerized technology that can be utilized by doctor needed to detection lung cancer. The clinical decision support system will help to determine specific medical treatment. The clinical decision support system capable to know data input and produce output result by learning process. The learning process is  part of process in artificial neural network (ANN). Many methods used in ANN as Backpropagation (BP)learning algorithm. BP used to produce output result in decision support system. Keywords-- lung cancer, stage, clinical decision support systems, neural network, multilayer perceptron, backpropagation algorithm
Rancang Bangun Fault Tolerance pada Sistem Database untuk Aplikasi Point Of Sale Standy Oei; Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 2 (2011): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2017

Abstract

Abstract— A fault tolerant system is a system that has the ability to be able to continue its jobs properly although there is a fault in hardware or software of the system. A system that has a fault tolerant capability is usually critical or important system. For example is at Point Of Sale application. Point Of Sale Application has evolved from offline-based toward online-based. With an online-based, the existence of a central database server must be guaranteed free from failure.To get a central database server that is free from failure is impossible. Something that can be cultivated is to create a system that can tolerate a failure in the central database server. This is done with the help of a second central database server (slave), which is useful as a replication of the central database server (master). To ensure data from these two central database servers are the same, then used the concept of reading and writing "read one/write all". And to manage all the processes needed in implementing a fault tolerant application, we need the help from a coordinator.The result obtained in this research is a design of fault tolerant architecture that can be applied to various types of information system applications include Point Of Sale application. By using this fault tolerant architecture that has been built, Point Of Sale application can still run the transaction process even if there is a failure in accessing data in one central database server (master/slave). Keywords— fault tolerance, database system, point of sale application
Reversible Watermarking dengan Metode Modifikasi Histogram pada Difference Image Yustina Retno; Agus Harjoko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 2 (2011): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2018

Abstract

Abstract— Reversible watermarking schemes are widely used to maintain the authenticity of the digital image. This research will discuss a method on histogram modification of difference image in which the difference image is created from the difference value of adjacent pixels of the image grayscale.  Embedding process begins by dividing the host image and watermark into b blocks, followed by making a difference image of the host image block. From the difference image histogram, determine the peak value, and modify the histogram based on the peak value. Then, insert each block of the watermark to the difference image that has been modified and transform back into the grayscale image.Extraction and recovery process is the inverted version of the embedding stage. This process begins by dividing the watermarked image into b blocks, followed by making a difference image of each block. Then, extract the data and shift difference image histogram using a peak value. That difference image is transformed back into a grayscale image. Experimental results demonstrate that the average insertion capacity is 14% greater than Xue's with PSNR value over 48 dB for 4 x 4 pixels and 23 % greater with PSNR over 46 dB for 8 x 8 pixels. From the comparison of robustness to line and salt n’ pepper on the density of 0.05 noises is obtained that the watermark with ECC is more robust than a watermark without ECC. JPEG compression in lossless mode may be applied to the watermarked image. Multiple insertion of watermark can be done with the consequence that the more insertions will result in lower PSNR values.Keywords—difference image, histogram modification, reversible watermarking
Analisis Fitur Kalimat untuk Peringkas Teks Otomatis pada Bahasa Indonesia Badrus Zaman; Edi Winarko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 2 (2011): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2019

Abstract

Abstract— Automatic Text Summarization (ATS) is a technique to create a summary of the document automatically by using computer applications to produce the most important information from the original document. Features are required to perform weighting of sentences, including Log-TFISF (term frequency index sentence frequency), sentence location, sentence overlap, title overlap and sentence relative length. This research conducted an analysis of five features in order to determine the weights of each feature that will get the results of a coherent summary. The five features are implemented in automated text summarization system in Indonesian language that was developed using the method of relative importance of topics. Results from experiments show that sentence location feature has the highest F-Measures namely 0.46 and then consecutive sentence overlap, title overlap, sentence relative length and Log-TFISF, with a value of 0.42, 0.42, 0.35 and 0.32. Relative weights of feature extraction consecutive from the largest are sentence location, sentence overlap, title overlap, sentence relative length and Log-TFISF with a value of 0.25, 0.22, 0.22, 0.19 and 0.12. These relative weights are implemented on ATS, so we get accuracy of 70.62%. It is more accurate 2,86% than without relative weights which accuracy of 67,72%.. .Keywords— Automatic Text Summarization (ATS), Log-TFISF, sentence location, sentence overlap, title overlap, sentence relative length, bahasa Indonesia
A New Approach of Fuzzy-Wavelet Method’s Implementation in Time Series Analysis Seng Hansun; Subanar Subanar
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 2 (2011): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2020

Abstract

      Abstract— Recently, many soft computing methods have been used and implemented in time series analysis. One of the methods is fuzzy hybrid model which has been designed and developed to improve the accuracy of time series prediction.      Popoola has developed a fuzzy hybrid model which using wavelet transformation as a pre-processing tool, and commonly known as fuzzy-wavelet method. In this thesis, a new approach of fuzzy-wavelet method has been introduced. If in Popoola’s fuzzy-wavelet, a fuzzy inference system is built for each decomposition data, then on the new approach only two fuzzy inference systems will be needed. By that way, the computation needed in time series analysis can be pressed.      The research is continued by making new software that can be used to analyze any given time series data based on the forecasting method applied. As a comparison there are three forecasting methods implemented on the software, i.e. fuzzy conventional method, Popoola’s fuzzy-wavelet, and the new approach of fuzzy-wavelet method. The software can be used in short-term forecasting (single-step forecast) and long-term forecasting. There are some limitation to the software, i.e. maximum data can be predicted is 300, maximum interval can be built is 7, and maximum transformation level can be used is 10. Furthermore, the accuracy and robustness of the proposed method will be compared to the other forecasting methods, so that can give us a brief description about the accuracy and robustness of the proposed method. Keywords—  fuzzy, wavelet, time series, soft computing
Implementasi Sistem Pelacakan Kendaraan Bermotor Menggunakan Gps Dan Gprs Dengan Integrasi Googlemap Yazid Dul Muchlisin; Jazi Eko Istiyanto
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 5, No 2 (2011): July
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2021

Abstract

Abstract— Vehicle tracking system using GPS and GPRS integration googlemap provide information that is maximized with the technology of GPS (Global Positioning System) receiver which can indicate the position of the vehicle with the map and the ability of the appointment of direction and position coordinates (x, y or latitude, longitude) textually and visual at any location. Vehicle tracking system is built using equipment GIS (Geographic Information System) and dedicated to smartphones which support Global Positioning System (GPS), as well as portable computers, using General Packet Radio Service (GPRS) as a connection to the internet. The hardware used is a smartphone that supports GPS with supporting tools used are GoogleMaps, Notepad + +, NetBeans IDE 6.5.1, Mysql, Java (J2ME), PHP, JavaScript. The results of this system in the form of tracking system capable of monitoring the movement of vehicles on an ongoing position by utilizing GPS and GPRS as the sender of the wireless data and Internet connections.  Keywords— GIS, GPS, GPRS, googlemaps, J2ME,
Rancang Bangun Keamanan Web Service Dengan Metode Ws-Security Ari Muzakir; Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 6, No 1 (2012): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22146/ijccs.2035

Abstract

AbstrakWeb service menggunakan teknologi XML dalam melakukan pertukaran data. Umumnya penggunaan web service terjadi pertukaran data ataupun informasi penting yang perlu dijaga keamanannya. Bentuk pengamanan yang diterapkan pada web services adalah dengan penggunaan teknik kriptografi kunci-publik. Adapun serangan dapat berupa pengintaian, perusakan maupun pencurian data. Salah satu cara penyelesaian terbaik adalah dengan membuat data tersebut tidak dapat dibaca orang lain. Implementasi yang telah dilakukan dengan menggunakan library keamanan akan memberikan kemudahan dalam membangun keamanan web service karena dengan dukungan library XMLSEC sebagai library pendukung dan library class_wss yang telah dibangun mampu mengatasi masalah keamanan pada jalur transport khususnya untuk otentikasi, otorisasi, dan konfidensialitas pesan SOAP request. Model WS-Security dengan menggunakan XML Signature, XML Encryption, serta Security Token yang memanfaatkan algoritma kriptografi RSA dengan panjang kunci 1024 bit mampu memberikan perlindungan terhadap transmisi data antara client dan server web service. Pengujian yang dilakukan pada web service dengan menerapkan model library class_wss sebagai keamanan web service yang dibangun memberikan hasil yang baik, yaitu pesan SOAP request terenkripsi dan mampu didekripsi dengan baik serta dapat tertandatangani dan dicek keasliannya.Kata kunci— Keamanan Web Service, XML Signature, XML  Encryption, Security Token. Abstract Web service uses XML technology to exchange data in. Generally, the use of the web service exchanges data or important information that needs to be guarded security. Form of security is applied to web services is to use public-key cryptography techniques. The attack can be a reconnaissance, destruction or theft of data. One way the best solution is to create data that can not read anyone else, even if someone else managed to retrieve the data, he will not be able to read it.            The implementation was done by using the security library will provide facilities in developing a web security service for the library support XMLSEC as library supporters and library class_wss that have been built able to overcome the problem of security on the transport path, especially for authentication, authorization, and confidentiality request SOAP message. Model WS-Security using XML Signature, XML Encryption, and Security Token which utilizes the cryptographic algorithm RSA with 1024 bit key length to provide protection against transmission of data between client and server web service. Tests performed on the web service by implementing a security model class_wss library web service that is built to give good results, the SOAP request message is encrypted and decrypted with a good and able to sign and check their authenticity too.Keywords— Web Service Security, XML Signature, XML Encryption, Security Token

Page 3 of 47 | Total Record : 466