cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Proceeding of the Electrical Engineering Computer Science and Informatics
ISSN : 2407439X     EISSN : -     DOI : -
Proceeding of the Electrical Engineering Computer Science and Informatics publishes papers of the "International Conference on Electrical Engineering Computer Science and Informatics (EECSI)" Series in high technical standard. The Proceeding is aimed to bring researchers, academicians, scientists, students, engineers and practitioners together to participate and present their latest research finding, developments and applications related to the various aspects of electrical, electronics, power electronics, instrumentation, control, computer & telecommunication engineering, signal processing, soft computing, computer science and informatics.
Arjuna Subject : -
Articles 140 Documents
Search results for , issue "Vol 4: EECSI 2017" : 140 Documents clear
Shape Defect Detection for Product Quality Inspection and Monitoring System Norhashimah Mohd Saad; Nor Nabilah Syazana Abdul Rahman; Abdul Rahim Abdullah; Farhan Abdul Wahab
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (448.25 KB) | DOI: 10.11591/eecsi.v4.1031

Abstract

This paper presents an automated computer vision system of shape defect detection for product quality inspection and monitoring system. Soft drink bottle is used as a tested product for the proposed system. The analysis framework includes data collection, pre-processing, morphological operation, feature extraction, and classification. Morphological operation technique is used to segment the image of the bottle via erosion and dilation process. Through this technique, the defect in the bottle structure is described from the feature set such as area, perimeter, major axis length and extend. Then, the bottle is classified either it is pass or rejects from the estimated parameters using Naive Bayes classifier. The results have proven that the proposed system can be applied to differentiate bottle according to shape with 100% accuracy using 100 samples. 
A Comparison of Cloud Execution Mechanisms: Fog, Edge and Clone Cloud Computing Tina Francis; Dr. Muthiya Madhiajagan
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (279.615 KB) | DOI: 10.11591/eecsi.v4.1032

Abstract

Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to  users  and  organizations. Cloud  computing  also  became  an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies gave a new area of computing called mobile cloud computing. This  combined technology is  used to augment the resources existing in smart devices. In recent times Fog computing, Edge computing and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail. This paper also addresses the differences in these technologies and how each of them are effective to organizations and developers.Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing  also became an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies gave a new area of computing called mobile cloud computing. This  combined technology is  used to augment the resources existing in smart devices. In recent times Fog computing, Edge computing and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail. This paper also addresses the differences in these technologies and how each of them are effective to organizations and developers.Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to  users  and  organizations. Cloud  computing  also  became  an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies gave a new area of computing called mobile cloud computing. This  combined technology is  used to augment the resources existing in smart devices. In recent times Fog computing, Edge computing and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail. This paper also addresses the differences in these technologies and how each of them are effective to organizations and developers.
Scalability Measurement of Business Process Model Using Business Processes Similarity and Complexity Muhammad Ainul Yaqin; Riyanarto Sarno; Abd. Charis Fauzan
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (391.574 KB) | DOI: 10.11591/eecsi.v4.1033

Abstract

The scalability of business process model shows the ability of a system to handle the amount of provided   business   process   activity.   In   business process management, scalability is used to compare the size of a business process model to other business process models. This research focused on measuring the scalability of business process models. Every business  processes  were  modeled  using  Petri  Net. Petri Net was used as a business process model because of its simple model notation so it can be analyzed mathematically. The scalability of business processes had been done by comparing the similarity of some business processes and their scales. The similarity measurement method proposed were based on  structural  and  behavioral  using  Jaccard coefficient, whereas the number of elements of the business process model and control flow complexity were used to measure its scale. Then, the scale value (0..1) and the similarity of the business process model was calculated by the specified formula. The result is a scalability value where the greater the value of the scalability, then the growth potential of the business process is also greater.
Recommendation System on Knowledge Management System via OAI-PMH Nyoman Karna; Iping Supriana; Nur Maulidevi
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (242.486 KB) | DOI: 10.11591/eecsi.v4.1034

Abstract

Knowledge Management System (KMS) might be a transformation from Library Management System (LMS). This transformation is possible when we add several knowledge processes from KMS not available in LMS. When a KMS is a transformation from a LMS, functionalities derived from librarian system will be also available in KMS. One of this functionality is recommendation system, where patron may receive related and recommended reading, usually based on subject similarity between knowledge documents. However, recommendation is delivered from system directly to patron. There is no recommendation from one system directly to another. This research proposes a communication model to provide recommendation from one KMS to another using LMS interoperability language, OAI-PMH. Although there is no real implementation, authors  hope  that  this  model  may  become  a basic reference for a better one. The novelty of this research is how to accommodate recommendation system between KMSs if the interaction is via knowledge sharing protocol, which in this research is OAI-PMH.
Analysis of the Indonesian Vowel /e/ For Lip Synchronization Animation Anung Rachman; Risanuri Hidayat; Hanung Adi Nugroho
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (780.062 KB) | DOI: 10.11591/eecsi.v4.1035

Abstract

Currently, voice recognition technology is widely used to produce lip sync animation. Vowels take the most dominant roles for lip sync animation as it always exists in every syllable. Therefore, it is necessary to select appropriate vowel traits for the system to be accurate. In general, there are five vowels of Indonesian language, namely /a/ /i/ /u/ /e/ and /o/. However, there are two vowels that contain several different tones: /o/ that are pronounced /o/ and /O/, and /e/ that are pronounced /e/, /ǝ/, and /ɛ/. The difference in tone can affect the accuracy of voice recognition on the lip sync animation system if it is not specified further. In this paper, the characteristic values of vowel /e/, /ǝ/, and /ɛ/ are compared and analyzed to find the significance of the difference. The sought characteristic values are the frequency of the formant (F1, F2, and F3) through the Praat software used to extract the features. Comparison is done using a statistical test of t-test. The results show that the three vowel tones /e/ have significant differences for all of F1 and most of F2
Smartphone for Next Generation Attendance System and Human Resources Payroll System Benfano Soewito; Fergyanto E. Gunawan; Manik Hapsara
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (378.9 KB) | DOI: 10.11591/eecsi.v4.1036

Abstract

A wide variety  of current attendance system can be found easily in the market, but there are still some deficiencies in the attendance system;  how the company  will control  employees are  outside  the office building  and  how employees can take  ad- vantage of the attendance system to view a variety of information needed.  The  modern  attendance system must  integrated with a human  resources management and payroll  system. Others  issues with  current  attendance system,  beside  could  not  control  the staff  who  work  outside  the  office are  conventional  attendance system that  spends  a lot of paper  and  a long process  due to be entered  manually  into  the  system  for  processing  payroll,  while the  electronic  attendance system  with  limited  device can  cause queues  at  the  time  employee entry  and  exit the  office building. In  this  work,  we introduce online  attendance system on mobile devices and  is integrated with the payroll  system. It is a system created  to overcome some of the limitations  that occur in manual or electronic attendance system which is often conventionally used today. We utilized Global Positioning System (GPS), microphone, and fingerprint scanner  that available on a smartphone or others mobile  devices. We developed  our application base  on  android platform   because  the  android is the  most  platforms   that  have been using in the most mobile devices. Using our proposed methodology, the employee can do attendance using their  mobile devices and the do not need to be in queue and the employee who work outside the office also can do the attendance. Our  research showed that our proposed methodology can used for the next generation  absence  system.
Enhancing Online Business Marketing to Expand Market Shares through IT Governance Sandy Kosasi; Vedyanto Vedyanto; I Dewa Ayu Eka Yuliani
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (367.967 KB) | DOI: 10.11591/eecsi.v4.1037

Abstract

Online business marketing applied to expand market shares is inextricably connected with availability and reliability of IT governance. This model of marketing covers activities and transactions with a digital mechanism. This research included the sample of 30 MSME (Micro, Small, and Medium Enterprises) businesses of traditional and finished clothes originated in Pontianak City. Stratified sampling technique was applied. In addition, questionnaires with each process divided based upon the levels  were  in  use.  These  levels  were  served  by  using Guttman Scales. The aims of this research were to cognize gap values of maturity levels and propose a recent model of IT governance to reach expected maturity levels. Results show that the lowest values of maturity levels are at PO8 (2.336) and DS5 (2.560). Therefore, redefinition of information architectures, IT resources, quality management, estimation and management of IT risks, system improvement of IT infrastructure management, IT investment strategies, and communication are of great importance. A recommended model shows that PO8 is related to input control objectives PO1, PO10 and ME1 as well as output control objectives AI1, AI2, AI3, AI5, DS2, PO10, AI1, AI2, AI3, AI7, ALL, PO4, and AI6. Meanwhile, DS5 is associated with input control objectives PO2, PO3, PO9, AI2, and DS1 as well as output control objectives DS8, DS7, ME1, AI6, PO9, and DS11.
Anti-Cheating Presence System Based on 3WPCA- Dual Vision Face Recognition Edy Winarno; Wiwien Hadikurniawati; Imam Husni Al Amin; Muji Sukur
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (606.206 KB) | DOI: 10.11591/eecsi.v4.1038

Abstract

To prevent counterfeit face image on face presence system, we can use dual vision camera in face recognition system. Dual vision camera is used to produce detectable face images from two positions of the left lens and the right lens. Image retrieval at the two corners of the left lens and the right lens can produce a merged face image database of left lens face image and right lens face image. The use of two sides of the face angle taking is used to avoid falsification of facial data such as the use of a face photo of a person or an image similar to a person's face. This research uses a dual-vision face recognition method on its preprocessing and uses 3WPCA (Three Level Wavelet Decomposition - Principal Component Analysis) as its feature extraction model. In dual-vision face recognition, we use half-join method to combine a half of the left image and a half of the right image into an image that is ready to be extracted using 3WPCA. This research can produce a presence system based on good face recognition and can be used to anticipate falsification of face data with recognition accuracy up to 98%.
Development and Evaluation of Android Based Notification System to Determine Patient's Medicine for Pharmaceutical Clinic Imam Riadi; Sri Winiarti; Herman Yuliansyah
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (521.944 KB) | DOI: 10.11591/eecsi.v4.1039

Abstract

The development of science in the field of health clinical pharmacy grows rapidly in recent years. Based on the data from information was obtained that needs to  be  done a reparation a learning process in clinical pharmacy to produce them who as requested by users pharmaceutical graduates. According to the results of the information there is a problem that in  conducting the  process  of  determining the  pharmacys drug it can be made a mistake, especially in patients who have complications disease. The process of checking conducted repeatedly to make sure a medicine that is concocted in accordance with a list of the acts of treat a patient, while patient data not yet integrated into a system that could help them in analysis and determine a drug that in accordance. Notification system that developed using android platform this, the hope can become the tools in the form of a system that can give notification to the farmasis easily accessible at any time through gadgets. Based on the results of testing with the methods alpha test can be concluded the number of feasibility this system reached 88.75%. Thus  notification  system  in  the  determination  of   medicine patients rule based as a medium learn students pharmaceutical clinic worthy to used.
Sketch Plus Colorization Deep Convolutional Neural Networks for Photos Generation from Sketches Vinnia Kemala Putri; Mohamad Ivan Fanany
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4979.984 KB) | DOI: 10.11591/eecsi.v4.1040

Abstract

In this paper, we introduce a method to generate photos from sketches using Deep Convolutional Neural Networks (DCNN). This research proposes a method by combining a network to invert sketches into photos (sketch inversion net) with a network to predict color given grayscale images (colorization net). By using this method, the quality of generated photos is expected to be more similar to the actual photos. We first artificially constructed uncontrolled conditions for the dataset. The dataset, which consists of hand-drawn sketches and their corresponding photos, were pre-processed using several data augmentation techniques to train the models in addressing the issues of rotation, scaling, shape, noise, and positioning. Validation was measured using two types of similarity measurements: pixel- difference based and human visual system (HVS) which mimics human perception in evaluating the quality of an image. The pixel- difference based metric consists of Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR) while the HVS consists of Universal Image Quality Index (UIQI) and Structural Similarity (SSIM). Our method gives the best quality of generated photos for all measures (844.04 for MSE, 19.06 for PSNR, 0.47 for UIQI, and 0.66 for SSIM).

Page 7 of 14 | Total Record : 140