cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Proceeding of the Electrical Engineering Computer Science and Informatics
ISSN : 2407439X     EISSN : -     DOI : -
Proceeding of the Electrical Engineering Computer Science and Informatics publishes papers of the "International Conference on Electrical Engineering Computer Science and Informatics (EECSI)" Series in high technical standard. The Proceeding is aimed to bring researchers, academicians, scientists, students, engineers and practitioners together to participate and present their latest research finding, developments and applications related to the various aspects of electrical, electronics, power electronics, instrumentation, control, computer & telecommunication engineering, signal processing, soft computing, computer science and informatics.
Arjuna Subject : -
Articles 52 Documents
Search results for , issue "Vol 3: EECSI 2016" : 52 Documents clear
Implementation of 128 bits Camellia Algorithm for Cryptography in Digital Image Bagus Satrio Waluyo Poetro
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 3: EECSI 2016
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (510.83 KB) | DOI: 10.11591/eecsi.v3.1143

Abstract

Nowadays information technology requires stronger cryptographic algorithms. Camellia algorithm is also known for its suitability in terms of the implementation of both software and hardware as well as a high level of safety. The digital image is an image f (x, y) which having the spatial coordinates, and brightness levels are discrete. Unlike text messages, the image data has special features such as high redundancy and a high correlation between pixels. This research conducted a cryptographic process of the digital image using the Camellia algorithm. Comparisons were made on three digital image format .bmp, .jpg, .png with 128 bits key block Camellia algorithm. Results shows that Camellia cryptographic algorithms in digital image can successfully produce encrypted images. In addition, the same algorithm can also reproduce the image when decryption process.
Cooperative Learning for Distributed In-Network Traffic Classification S.B. Joseph; H.R. Loo; I. Ismail; T. Andromeda; M.N. Marsono
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 3: EECSI 2016
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (861.052 KB) | DOI: 10.11591/eecsi.v3.1144

Abstract

Inspired by the concept of autonomic distributed/decentralized network management schemes, we consider the issue of information exchange among distributed network nodes to network performance and promote scalability for in-network monitoring. In this paper, we propose a cooperative  learning  algorithm  for  propagation and  synchronization of network information among autonomic distributed network nodes for online traffic classification. The results show that network nodes with sharing capability perform better with a higher average accuracy of 89.21% (sharing data) and 88.37% (sharing clusters) compared to 88.06% for nodes without cooperative learning capability. The overall performance indicates that cooperative learning is promising for distributed in-network traffic classification.
Organization Readiness and ERP Implementation in Albaha University K Alaqeel; M S Shakkah; R F Rahmat; A Alfageeh; R Budiarto
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 3: EECSI 2016
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (767.437 KB) | DOI: 10.11591/eecsi.v3.1145

Abstract

This work studies the correlation between the organizational readiness in Albaha University and the respective Critical Success Factors with regards to the Enterprise Resource Planning (ERP) implementation. The study also considers some suggestions to improve the ABU’s ERP systems and roadmap towards the self –development strategy and to reduce vendor-dependency. A survey regarding ERP to the end-users, experts and developers in Albaha University was conducted. The analysis of the results in this work confirmed with the results of an existing work. The four significance success factors: Project Management, Business Process Re-engineering, System Integration, and Training and Education are recommended to be adopted to assure the smooth adoption of ERP at Albaha University.
The Automation System Censor Speech for the Indonesian Rude Swear Words Based on Support Vector Machine and Pitch Analysis S N Endah; D M K Nugraheni; S Adhy; Sutikno Sutikno
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 3: EECSI 2016
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (547.982 KB) | DOI: 10.11591/eecsi.v3.1146

Abstract

According to Law No. 32 of 2002 and the Indonesian Broadcasting Commission Regulation No. 02/P/KPI/12/2009 & No. 03/P/KPI/12/2009, stated that broadcast programs should not scold with harsh words, not harass, insult or demean minorities and marginalized groups. However, there are no suitable tools to censor those words automatically. Therefore, researches to develop a system of intelligent software to censor the words automatically are needed. To conduct censor, the system must be able to recognize the words in question. This research proposes the classification of speech divide into two classes using Support Vector Machine (SVM), first class is set of rude words and the second class is set of properly words. The speech pitch values as an input in SVM, it used for the development of the system for the Indonesian rude swear word. The results of the experiment show that SVM is good for this system.
Formulation of Policy for Cyber Crime in Criminal Law Revision Concept of Bill Book of Criminal Law (A New Penal Code) Eko Soponyono; Brav Deva Bernadhi
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 3: EECSI 2016
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (753.162 KB) | DOI: 10.11591/eecsi.v3.1147

Abstract

Development of national legal systems is aimed to establish the public welfare and the protection of the public. Many attempts has been carried out to renew material criminal law and those efforts results in the formulation of the concept of the draft Law Book of the Law of Criminal Law in the form of concept criminal code draft. The basic ideas in drafting rules and regulation based on the values inside the idology of Pancasila are balance among various norm and rules in society. The design concept of the New Criminal Code Act is anticipatory and proactive to formulate provisions on Crime in Cyberspace and Crime on Information and Electronic Transactions. Several issues compiled in this paper are whether the policy in formulation of cyber crime is embodied in the provisions of the current legislation and what the policies formulation of cyber crime is in the concept of the bill book of law - criminal law recently?.
Noise Reduction in Breath Sound Files Using Wavelet Transform Based Filter M F Syahputra; S I G Situmeang; R F Rahmat; R Budiarto
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 3: EECSI 2016
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1120.453 KB) | DOI: 10.11591/eecsi.v3.1148

Abstract

The development of science and technology in the field of healthcare increasingly provides convenience in diagnosing respiratory system problem. Recording the breath sounds is one example of these developments. Breath sounds are recorded using a digital stethoscope, and then stored in a file with sound format. This breath sounds will be analyzed by health practitioners to diagnose the symptoms of disease or illness. However, the breath sounds is not free from interference signals. Therefore, noise filter or signal interference reduction system is required so that breath sounds component which contains information signal can be clarified. In this study, we designed a filter called a wavelet transform based filter. The filter that is designed in this study is using Daubechies wavelet with four wavelet transform coefficients. Based on the testing of the ten types of breath sounds data, the data is obtained in the largest SNRdB bronchial for 74.3685 decibels.
Fast Learning for Big Data Using Dynamic Function T Alwajeeh; A F Alharthi; R F Rahmat; R Budiarto
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 3: EECSI 2016
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (696.228 KB) | DOI: 10.11591/eecsi.v3.1149

Abstract

This paper discusses an approach for fast learning in big data. The proposed approach combines momentum factor and training rate, where the momentum is a dynamic function of the training rate in order to avoid overshoot weight to speed up training time of the back propagation neural network engine. The two factors are adjusted dinamically to assure the fast convergence of the training process. Experiments on 2-bit XOR parity problem were conducted using Matlab and a sigmoid function. Experiments results show that the proposed approach signifcantly performs better compare to the standard back propagation neural network in terms of training time. Both, the maximum training time and the minimum training time are significantly faster than the standard algorithm at error threshold of 10-5.
Lightweight UDP Pervasive Protocol in Smart Home Environment Based on Labview Wijaya Kurniawan; Mochammad Hannats Hanafi Ichsan; Sabriansyah Rizqika Akbar; Issa Arwani
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 3: EECSI 2016
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (912.702 KB) | DOI: 10.11591/eecsi.v3.1150

Abstract

TCP (Transmission Control Protocol) technology in a reliable environment was not a problem, but not in an environment where the entire Smart Home network connected locally. Currently employing pervasive protocols using TCP technology, when data transmission  is sent, it would be slower because they have to perform handshaking process in advance and could not broadcast the data. On smart home environment, it does not need large size and complex data transmission between monitoring site and monitoring center required in Smart home strain monitoring system. UDP (User Datagram Protocol) technology is quick and simple on data transmission process. UDP can broadcast messages because the UDP did not require handshaking and with more efficient memory usage. LabVIEW is a programming language software for processing and visualization of data in the field of data acquisition. This paper proposes to examine Pervasive UDP protocol implementations in smart home environment based on LabVIEW. UDP coded in LabVIEW and experiments were performed on a PC and can work properly.
Designing Business System Model Using System Modeling Approach to the Small and Medium Enterprises (SME) of Furniture in Indonesia Irwan Sukendar; Wiwiek Fatmawati; Imam Much Ibnu Subroto; Rizki Arigama
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 3: EECSI 2016
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (580.261 KB) | DOI: 10.11591/eecsi.v3.1151

Abstract

This paper studies the design of business system model with System Modeling Approach on small and medium enterprises (SMEs) of furniture. Methods used consists of five phases: phase of identification of business processes actual on SMEs of Furniture, phase of identification of deficiencies and improvement of business processes, phase of design algorithm and flowchart business processes, phase of analysis of the elements of the system, and phase of the design of data flow diagram (DFD), The results of the analysis of the elements of the system are: Products and quantities ordered product consumers and DP paid by consumers identified as elements of system inputs 1,2 and 3. The result of the calculation, payment slips and mail order (SO) are identified as elements of system output 1, 2 and 3. Acceptance of orders, stocks checking of raw materials at the warehouse, calculating raw material requirements, adequacy of raw materials, the price of the contract, and the due date, as well as the submission of the results of calculations to consumers were identified as elements of system components 1, 2, 3, and 4. Admin taking orders, Admin check stocks of raw materials at the warehouse, Admin making calculation, and Admin convey the results of calculations to consumers were identified as an element of interaction system 1, 2, 3, and 4. Consumers were identified as element of environmental systems. Moreover, the boundary between SMEs and consumers were identified as elements of the system boundary.
Joule-Thief Circuit Performance for Electricity Energy Saving of Emergency Lamps Eka Nuryanto Budisusila; Bustanul Arifin
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 3: EECSI 2016
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1050.272 KB) | DOI: 10.11591/eecsi.v3.1152

Abstract

The alternative energy such as battery as power source is required as energy source failures. The other need is outdoor lighting. The electrical power source is expected to be a power saving, optimum and has long life operating. The Joule-Thief circuit is one of solution method for energy saving by using raised electromagnetic force on cored coil when there is back-current. This circuit has a transistor operated as a switch to cut voltage and current flowing along the coils. The present of current causing magnetic induction and generates energy. Experimental prototype was designed by using battery 1.5V to activate Light Emitting Diode or LED as load. The LED was connected in parallel or serial circuit configuration. The result show that the joule-thief circuit able to supply LED circuits up to 40 LEDs.