cover
Contact Name
Goegoes Dwi Nusantoro
Contact Email
goegoesdn@ub.ac.id
Phone
-
Journal Mail Official
jurnaleeccis@ub.ac.id
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Jurnal EECCIS
Published by Universitas Brawijaya
ISSN : 19783345     EISSN : 24608122     DOI : -
Core Subject : Engineering,
EECCIS is a scientific journal published every six month by electrical Department faculty of Engineering Brawijaya University. The Journal itself is specialized, i.e. the topics of articles cover electrical power, electronics, control, telecommunication, informatics and system engineering. The languages used in this journal are Bahasa Indonesia and English.
Arjuna Subject : -
Articles 19 Documents
Search results for , issue "Vol 8, No 2 (2014)" : 19 Documents clear
DSS Menggunakan Metode Group Technology untuk Pelayanan Teknis PT. PLN Rayon Ngunut Budi Artono; M. Aziz Muslim
Jurnal EECCIS Vol 8, No 2 (2014)
Publisher : Fakultas Teknik, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (271.004 KB)

Abstract

Pelayanan teknis adalah satu produk PT. Perusahaan Listrik Negara (PLN) Persero dalam rangka peningkatan pelayanan kepada pelanggan. Pelayanan teknis untuk gangguan berfungsi optimal apabila setiap pengaduan dan keluhan pelanggan mampu terselesaikan baik dengan response time dan waktu pemulihan yang singkat. Untuk itu dikembangkan sistem DSS agar gangguan pelanggan dapat ditindaklanjuti secara cepat dan tepat oleh petugas pelaksana teknis PLN, serta memberikan gambaran kepada manager dalam bentuk dashboard guna memudahkan pengambilan keputusan. Pada penelitian ini untuk pengelompokkan jenis gangguan, gejala gangguan, tools, proses penanganan gangguan dan variabel lain yang menunjang dalam proses penanganan gangguan digunakan Metode Group Techonology (GT). Proses analisis yang digunakan adalah Classification and Coding dan Hybrid Code atau Mixed. Decision Support System (DSS) dikembangkan berbasis website agar bisa diakses melalui internet. Dengan metode ini response time dan waktu pemulihan dapat ditingkatkan hingga 75 %. Hasil validasi yang dilakukan pada sistem menunjukkan rata - rata tingkat keberhasilan sebesar 99%.Kata Kunci— Decision Support System, Group Technology, Pelayanan Teknis PT.PLN Rayon Ngunut, Web-based
Implementasi Kombinasi Feature Extraction untuk Content Based Image Retrieval Windana, Fredy; Sarosa, Moechammad; Santoso, Purnomo Budi
Jurnal EECCIS Vol 8, No 2 (2014)
Publisher : Fakultas Teknik, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (631.335 KB)

Abstract

In this research, the CBIR method used several combination of feature extraction methods, such as a combination between LCH (HSV) and DC Coefficient, a combination between 2 nd Order Statistic GLCM Sub Block and DC Coefficient, and a combination between LCH (HSV), 2 nd Order Statistic GLCM Sub Block and DC Coefficient. Sample image experiment test was used from CorelDB dataset. The result from the research showed performance component value of Non Interpolating Average Precision method performed by the combination of LCH (HSV) and DC Coefficient performance rate was about 23%. While the variance of the combination of 2 nd order statistic GLCM sub block and coefficient DC and the combination of LCH (HSV), 2 nd order statistic GLCM sub block and coefficient DC showed performance rate was about 12%.Keywords – CBIR, LCH, GLCM, DC Coefficient
Implementasi Kripto-Steganografi Salsa20 dan BPCS untuk Pengamanan Data Citra Digital Paulus Lucky Tirma Irawan; D.J. Djoko H. Santjojo; M. Sarosa
Jurnal EECCIS Vol 8, No 2 (2014)
Publisher : Fakultas Teknik, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (606.808 KB)

Abstract

In this research, cryptography of SALSA20 stream cipher technique combined with BPCS steganography technique was used to enhance the security layer in mobile communication. SALSA20 technique has been proven as one of the best stream cipher algorithm candidate according to eSTREAM portfolio report in 2012. The combination of SALSA cryptography and BPCS steganography technique can provide more security layer of digital image data as the research objective. The results from this research showed that combination of SALSA20 and BPCS technique need average time of 19.400s for the encryption and 21.900s for decryption process. The average memory (RAM) usage of these two technique is about 23.354 MB/s for the encryption process and 36.057 MB/s for the decryption. The analysis of component MSE and PSNR show a good result with value of 16.21259 dB for the MSE component and +44.08686 dB for the PSNR, with color contrast intensity distribution of the output image nearly identical to the original cover image.Keywords—BPCS, Cryptography, SALSA20, Steganography.
MPPT Menggunakan Metode Hibrid JST dan Algoritma Genetika Untuk Sistem Photovoltaic Gunawan Wibisono; Sholeh Hadi Pramono; Muhammad Aziz Muslim
Jurnal EECCIS Vol 8, No 2 (2014)
Publisher : Fakultas Teknik, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (239.773 KB)

Abstract

Maximum Power Point Tracking is a method to track power point of an energy source in order to generate maximum power. One of the MPPT method for photovoltaic system is fractional open voltage MPPT. In this paper the fractional open voltage MPPT is modified by using artificial neural network trained using genetic algorithm. Artificial neural networks are successfully trained by using genetic algorithm. The best mean squared error (MSE) value obtained is 0.000453. The network tested using test data, yielding average error = 0.00949509 and MSE = 0.00012814. The neural network-based MPPT can improve the fractional open voltage MPPT by 4.79%.Index Terms---Genetic Algorithm, MPPT, Neural Network, Photovoltaic
Modifikasi ACO untuk Penentuan Rute Terpendek ke Kabupaten/Kota di Jawa Ahmad Jufri; Sunaryo Sunaryo; Purnomo Budi Santoso
Jurnal EECCIS Vol 8, No 2 (2014)
Publisher : Fakultas Teknik, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (280.028 KB)

Abstract

This research focused on modification ACO algorithm. The purpose of this research was to obtain better performance by modifying the algorithm of Ant Colony Optimization (ACO), particularly in terms of computational speed while maintaining the quality of the solution. Modifications made in this research is the calculation of the probability of the next city to be visit, the ant trail intensity calculations, and modification number of ants to follow the size of the problem. From the results of this research it can be concluded that by modifying the probability of the next city to be visit and the intensity of the ant trail can maintain the quality of the resulting solution with a percentage of 99.8% while the number of ants that used 35% of the size of the problem. In terms of memory usage, modification ACO algorithm is more efficient than the original ACO algorithm with an average of 7%. In addition, the time required to generate the shortest path on average three times faster than the original ACO.Keywords – ACO, ACO Modified, Shortest Path
Optimasi Injeksi Photovoltaic Distributed Generations (PVDG) Menggunakan Metode Algoritma Genetika Muammar Zainuddin; Hadi Suyono; Harry Soekotjo Dachlan
Jurnal EECCIS Vol 8, No 2 (2014)
Publisher : Fakultas Teknik, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (594.344 KB)

Abstract

The best solution of the problem of electrical energy crisis in Indonesia, with the utilization of renewable energy sources that are environmentally friendly, economical, sustainable, and technically easily to implemented. The model system proposed in this paper is the Photovoltaic Distributed Generation (PVDG). This paper discuss modeling PVDG by searching injection placement and size us Genetic Algorithm. Optimization is done with the concept of the four scenarios increase the value of the injection. The scenario used was an increase in injection rate + 10%, + 20% + 30% and + 40% from the initial source of generation. The obtained results show the system ideal conditions is contained in the scenario-4. The results found that 8 locations with a variety of sizing power. PVDG scenario-4 modeling results show the ability of the system to minimize power loss from 13,15% to 1,30% and the highest voltage drop -25% to -8,5% of nominal voltage.Index Terms—Photovoltaic, Distributed Generations, PVDG, Genetic Algorithm.
Jaringan Saraf Tiruan Backpropagation untuk Pengenalan Wajah Metode Ekstraksi Fitur Berbasis Histogram Sigit Kusmaryanto
Jurnal EECCIS Vol 8, No 2 (2014)
Publisher : Fakultas Teknik, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (559.944 KB)

Abstract

One common weakness in pattern recognition for face recognition is imperative that accurate input pattern to the pattern identified . This causes the input is often not recognized or not identified so as to be in the input repeatedly . The application of face recognition using Artificial Neural Network (ANN) backpropagation with MATLAB 7.0 is expected to overcome the weakness of pattern recognition systems for face recognition . Histogram -based feature extraction methods used in this study to obtain identification characteristics of the face image and a neural network input data . Face image data using pixel size variations . Trained in facial image pixel size variations 640 x 480 pixels and 600 x 800 pixels with two of distance making on face: average( 2-5m ) , close( < 2m ) . The results obtained from ANN test using 18 images with frontal face : resulting number of units in the hidden layer 6 , the number of input unit 255 , the number of output unit 10 , the maximum epoch 2500, 0001 and learning the target error rate = 0.9 with a percentage of 95 % of face recognitionKeyword - Backpropagation , Face Recognition Feature Extraction , Histogram .
Analisis Implementasi Load Balancing dengan Metode Source Hash Scheduling pada Protocol SSL Setyawan, Raden Arief
Jurnal EECCIS Vol 8, No 2 (2014)
Publisher : Jurusan Teknik Elektro, Fakultas Teknik, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (18.463 KB)

Abstract

The Course programming period give the highest load for academic server (SIAM) of UB. More than 65000 student will access the system concurrently. There for, the load balancing mechanism is required to improve system capacity and prevent the access failure SIAM using SSL mechanism to provide protection for academik data transaction. SSL do the handshaking process to maintain the connectivity of the web browser. In addition, the client and the server will establish a session recording mechanism to keep the identity of a connection to prevent repeat login. This study tried to implement a source-hash scheduling mechanism on the load balancing system. This mechanism subjected to prevent the termination of a session connection which has been formed. The results shows that the source hash scheduling has increased the capacity of the system to handle as many as 9.02594 million requests from 65 087 different IP within 1 day. And provide total data throughput of 169 537 010 395 Bytes (169 GB) in a single day getIndex Terms—Load Balancing, Source Hash Scheduling
Analisis Implementasi Load Balancing dengan Metode Source Hash Scheduling pada Procol SSL Raden Arief Setyawan
Jurnal EECCIS Vol 8, No 2 (2014)
Publisher : Fakultas Teknik, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (483.195 KB)

Abstract

The Course programming period give the highest load for academic server (SIAM) of UB. More than 65000 student will access the system concurrently. There for, the load balancing mechanism is required to improve system capacity and prevent the access failure SIAM using SSL mechanism to provide protection for academik data transaction. SSL do the handshaking process to maintain the connectivity of the web browser. In addition, the client and the server will establish a session recording mechanism to keep the identity of a connection to prevent repeat login. This study tried to implement a source-hash scheduling mechanism on the load balancing system. This mechanism subjected to prevent the termination of a session connection which has been formed. The results shows that the source hash scheduling has increased the capacity of the system to handle as many as 9.02594 million requests from 65 087 different IP within 1 day. And provide total data throughput of 169 537 010 395 Bytes (169 GB) in a single day getIndex Terms—Load Balancing, Source Hash Scheduling

Page 2 of 2 | Total Record : 19