cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
PROCEEDING IC-ITECHS 2014
ISSN : -     EISSN : -     DOI : -
Core Subject : Science, Education,
Arjuna Subject : -
Articles 235 Documents
LIGHTING SYSTEM WITH HYBRID ENERGY SUPPLY FOR ENERGY EFFICIENCY AND SECURITY FEATURE OF THE BUILDING Safira Nur Hanifah, Renny Rakhmawati,
PROCEEDING IC-ITECHS 2014 PROCEEDING IC-ITECHS 2014
Publisher : PROCEEDING IC-ITECHS 2014

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Recently, many buildings’ outside corridors have less lighting system at night, becausetheir lamps mostly depend upon electrical energy from PLN (State Electrical Company). It affects the whole electrical power used. Due to this condition, we need to arrange the lamps’ light  to  reduce  electrical  power.  This  research  is  going  to  create  an  automatic  lighting efficiency system which is located outside of the building’s corridor; and it uses time setting with the application of RTC (Real Time Clock) to detect human motion with motion-sensor detector  (PIR).  The  primary  aim  of  this  research  is  to  manage  electrical  energy  more efficiently and to make a safety measure for the building itself. When PIR sensor detects any motion in safety-time-range that has been set before, it will send a short message to the central security system. It is supplied by hybrid system between solar cell and PLN electrical power. Though the use of the solar cell, an output voltage of 17-19 volt will be reduced through the buck converter to stabilize enough  while filling 12-volt the accumulator. The output electrical voltage derived from accumulator will be converted from 12 Vdc  to 12 Vac by an inverter; and then it will be increased to 220 Vac by step up voltage regulator to supply its lighting load. Otherwise, if the accumulator is not able to fulfill the supply, a microcontroller will force swith circuit to gain the lighting load another supply from PLN electrical power source. By implementing this management system, total energy within 10 hours (17.00-03.00 WIB) is 420Wh; and it reduces the energy for 105 Wh with 25% efficiency.
Functional Model of RFID-Based Students Attendance Management System In Higher Education Institution Setiabudi Sakaria, Koko Wahyu Prasetyo ,
PROCEEDING IC-ITECHS 2014 PROCEEDING IC-ITECHS 2014
Publisher : PROCEEDING IC-ITECHS 2014

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The need of developing  student attendance management system is driven due to the factthat the students’ attendance records are one of the most important factors of their academic achievement. The conventional practice of managing the student attendance manually by pens and papers is considered as challenging tasks for most of the higher education institutions. This paper will propose a system functional model to manage the student attendance in a more efficient way by utilizing the RFID tags technology. The RFID technology is an automated identification and data collection technology. The ability of RFID tags   to deliver accurate information in quicker way shall improve the efficiency to manage the students attendance data. The system model proposed in this paper will also consider the need of the academic administrative staff to have an integrated reporting function which are related to the student and the lecturer attendance records. The system functional models presented in this paper are developed in UML based on the approach of object-oriented system analysis and design.
Analisys Design Intrusion Prevention System (IPS) Based Suricata Kuswanto, Dwi
PROCEEDING IC-ITECHS 2014 PROCEEDING IC-ITECHS 2014
Publisher : PROCEEDING IC-ITECHS 2014

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Network security is a very important thing. Technological developments have an impacton the security of the computer network with the rise of attackers. It is very threatening the existence of data on storage media from the actions of people who are not responsible. To maintain confidentiality, originality and availability of these data, we need a system to detect the presence of intruders in computer networks that can run in real time. Intrusion Prevention System (IPS) is a method that can monitor the network and can provide a particular action on a computer network. IPS is the development of IDS, which is using Suricata IPS as intruder detection is connected with IPTables as a deterrent to intruders. IPS is equipped with a display guide user interfaces for easy admin to monitor the network from intrusion action to the server using open source (Linux Ubuntu 12.04 Precise Pangolin) at a operating system. Suricata create alerts when intrusions are detected on the network and stored in log files Suricata. At the same time WebAdmin can display the alert dialog that is accompanied by an alarm signal to instruct IPTables block IP addresses identified as an intruder, so the attacker access to the server   is   lost.   Hopefully   design   is   done   optimally   capable   of   detecting   attacks.
Conceptual Methodology For Requirement Engineering Based on GORE and BPM Imam M. Shofi, Ahmad Nurul Fajar ,
PROCEEDING IC-ITECHS 2014 PROCEEDING IC-ITECHS 2014
Publisher : PROCEEDING IC-ITECHS 2014

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The main measure of the success of a software system is the degree to which it meets itspurpose. Requirement Engineering (RE) is a process for discovering the purpose.Nowdays, the complexity of e-governemnt applications is grown significantly in the government environment.E-government applications should be developed based on regulations in order to achieve the goal model of government entitties. However, the goal model could not used directly  to  identify  the  features  of  applications.In  order  to  solve  this  problem,this  paper presents and proposed conceptual methodology for requirement engineering based on GORE and BPM Alignment.It can support the phase for  identify features of applications. In order to support this phase, we align goal model and business process model.This conceptual methodology consists of four methods, there are (1)Method for convert document regulations to goal model, (2).Method for convert goal model into business process model, (3).Method for convert business process model into feature model,and (4).Method for convert feature model to orthogonal variability model
BAUM-WELCH ALGORITHM IMPLEMENTATION FOR KNOWING DATA CHARACTERISTICS RELATED ATTACKS ON WEB SERVER LOG Cahyanto, Triawan Adi
PROCEEDING IC-ITECHS 2014 PROCEEDING IC-ITECHS 2014
Publisher : PROCEEDING IC-ITECHS 2014

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A web server log on the web server which contains all the activities of a web-basedapplication. Activity stored in the log contains request and response from a web server to a web-based application that user accessed. This activity is an important data and can be used to search for occurrence of attack if there are problems on a web-based application. This paper uses a dataset of web server logs to analyze data using dataset which is taken from the event forensics contest because the web server log dataset has a record of activity form attack on a web-based application. Baum-Welch algorithm is used to search a web server log data so that the characteristics of the data are considered as attacks can be classified according to the level of success based on the records stored in the log. The results of the analysis based on dataset used calculated that the amount of data related to the attack were identified as many as 1.120 incidents of a total 202.145 records of data in web server log file.
Penerapan Sistem Informasi Akutansi Pada Toko Panca Jaya Menggunakan Integrated System B.Bus, M.Com, Michael Andiranto T, Rinabi Tanamal,
PROCEEDING IC-ITECHS 2014 PROCEEDING IC-ITECHS 2014
Publisher : PROCEEDING IC-ITECHS 2014

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Accounting information system is a very important part for Panca Jaya store. PancaJaya store is a retail store, which using a manual system, so they may fine difficulties in stock checking, purchases, sales, and accounting. Currently there are many Accounting Information System which can facilitate the process of store operations with a computer system. Integrated system is one accounting information system software that has been used in a variety of stores. This software provides some basic modules needed for the store implementation. Because of that Integrated System, Panca Jaya performed in order to answer the needs of the store and assist in conducting stock checking, purchases , sales and accounting also in store.
Multiple And Single Haar Classifier For Face Recognition Subari, Go Frendi Gunawan,
PROCEEDING IC-ITECHS 2014 PROCEEDING IC-ITECHS 2014
Publisher : PROCEEDING IC-ITECHS 2014

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Haar-Classifier is a well-known tool for face detection in an image. Open-CV libraryalready provide a class for Haar-Classifier implementation. However, one significant problem in face detection is tilt-face-pose recognition. In this paper, we will discuss about two different solutions to overcome the problem. The solutions are written in Python which has a very simple  syntax.  The  first  solution  is  using  multiple  classifier.  Each  of  them  is  trained  to recognize face with different rotation-degrees. The second solution is using single classifier to recognize many face image which have been rotated by different angles.
3D Interaction in Augmented Reality Environment with Reprojection Improvement on Active and Passive Stereo Eko Budi Cahyono; Ilyas Nuryasin; Aminudin Aminudin
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1431.301 KB)

Abstract

This research proposes the three dimensional (3D) interaction on the augmented reality (AR) environment based on interposition. Interposition is captured from the intersection of reconstruction points. That points should be increased to generate accurate interposition. The optimal triangulation is used to increase the performance for reconstructing 3D. This method is applied to Logitech camera (passive stereo) and Kinect camera (active stereo) to analyze the result of reconstruction. Based on the calibration testing, optimal triangulation gives a significant deference accuration on both of Logitech and Kinect cameras. On the passive stereo, accurate interaction is generated by combining subpixel detection and the optimal triangulation algorithm, while on the active stereo, the accuration of depth image can be improved by just applying the optimal triangulation algorithm.
Traditional Exercises As a Practical Solution In Health Problems For Computer Users Laurentius Noer Andoyo; Jozua Ferjanus Palandi; Zusana Pudyastuti
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1415.527 KB)

Abstract

Of the total of 7.2 billion of world population, three billion of them are internet users. During 2013, the numbers of internet users in Indonesia have reached 74.75 million, including 31.7 million ‘Netizens’. The numbers of computer users are more than the number of internet users. These computer users are very susceptible to RSI (Repetitive Strain Injuries) which may be in the form of physical disorder, such as MSD (Musculoskeletal Disorders) or CVS (Computer Vision Syndromes), and various mental disorders. These disruptions are mainly due to people’s ignorance to ergonomic positions and incorrect attitude in using the computer for years. The biggest enemy of modern people is called ‘Disease of Civilization’, a disease caused by the changes in civilization due to the advancement of technology and bad life-style. Overcome the impact of modernization, people find the solution by “think backward” to old concept of the ancestors. Traditional exercise, which at first used for defense mechanism against the nature and enemies (animal and human), is now applied in the work life. Computer users can stay healthy by doing traditional exercises and self-massages. These two prevention efforts are cheap, practical, effective, and no big space required, yet they are very effective and powerful to maintain the health of computer users. In particular, the authors intend to invite computer users to cultivate “Safe and Healthy Computing’’ (‘‘Aman dan Sehat berKomputer’’ = ASK) by integrating exercises as a their life-style
Baum-Welch Algorithm Implementation For Knowing Data Characteristics Related Attacks on Web Server Log Triawan Adi Cahyanto
IC-ITECHS Vol 1 (2014): Prosiding IC-ITECHS 2014
Publisher : IC-ITECHS

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1633.697 KB)

Abstract

A web server log on the web server which contains all the activities of a web-based application. Activity stored in the log contains request and response from a web server to a web-based application that user accessed. This activity is an important data and can be used to search for occurrence of attack if there are problems on a web-based application. This paper uses a dataset of web server logs to analyze data using dataset which is taken from the event forensics contest because the web server log dataset has a record of activity form attack on a web-based application. Baum-Welch algorithm is used to search a web server log data so that the characteristics of the data are considered as attacks can be classified according to the level of success based on the records stored in the log. The results of the analysis based on dataset used calculated that the amount of data related to the attack were identified as many as 1.120 incidents of a total 202.145 records of data in web server log file.

Page 4 of 24 | Total Record : 235