cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Proceeding of the Electrical Engineering Computer Science and Informatics
ISSN : 2407439X     EISSN : -     DOI : -
Proceeding of the Electrical Engineering Computer Science and Informatics publishes papers of the "International Conference on Electrical Engineering Computer Science and Informatics (EECSI)" Series in high technical standard. The Proceeding is aimed to bring researchers, academicians, scientists, students, engineers and practitioners together to participate and present their latest research finding, developments and applications related to the various aspects of electrical, electronics, power electronics, instrumentation, control, computer & telecommunication engineering, signal processing, soft computing, computer science and informatics.
Arjuna Subject : -
Articles 144 Documents
Search results for , issue "Vol 5: EECSI 2018" : 144 Documents clear
FVEC feature and Machine Learning Approach for Indonesian Opinion Mining on YouTube Comments Aina Musdholifah; Ekki Rinaldi
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (646.057 KB) | DOI: 10.11591/eecsi.v5.1726

Abstract

Mining opinions from Indonesian comments from YouTube videos are required to extract interesting patterns and valuable information from consumer feedback. Opinions can consist of a combination of sentiments and topics from comments. The features considered in the mining of opinion become one of the important keys to getting a quality opinion. This paper proposes to utilize FVEC and TF-IDF features to represent the comments. In addition, two popular machine learning approaches in the field of opinion mining, i.e., SVM and CNN, are explored separately to extract opinions in Indonesian comments of YouTube videos. The experimental results show that the use of FVEC features on SVM and CNN achieves a very significant effect on the quality of opinions obtained, in term of accuracy.
Clustering human perception of environment impact using Rough Set Theory Ani Apriani; Iwan Riyadi Yanto; Septiana Fathurrohmah; Sri Haryatmi; D Danardono
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (268.63 KB) | DOI: 10.11591/eecsi.v5.1727

Abstract

Rough set is a set theory which is have been applied in the many areas. One of them is in data mining. The utilization of feature selection and clustering methods, that are a part of data mining application, could contribute for decision support. This paper investigates the application of rough set theory to select attribute and cluster environment impact. The Maximum Dependency Attribute (MDA) and fuzzy partition based on indiscernible relation are used to select the most important impact and cluster the object using the selected attributes, respectively. The data are collected from the field survey at identifying the environmental impact experienced by several communities in Yogyakarta, Indonesia. The results show that the water quality is the important attribute on physical and chemical aspects. Furthermore, on economic aspect, the highest attributes are immigration and employee absorption. Moreover, the number of cluster recommended is 9 based on the silhouette coefficient which is rising 0.9. This paper can be used to make recommendation to improve the quality of social environment.
E-Government Service Evaluation of Batu City Health Dept.using e-Govqual Approach and IPA Analysis Evi Wahyuni EDW; Dharma Pradana; Yasina Karina
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (276.524 KB) | DOI: 10.11591/eecsi.v5.1728

Abstract

E-Government is an application of government information system technology to support public service system and dissemination of information from government to society that used in every element of government. Batu City Health Office website (http://dinkes.batukota.go.id) is part of Batu City Government e-Government system that was built to support publication of government information to the public. According to observations, there was a decline in visitors from the number 150 visitors in October 2017 to 50 visitors in November 2017. While in December 2017 stable at the number 50 visitors. Based on the anomaly incident, there needs to be an evaluation of e-Government in Batu City Health Office by doing the assessment of website service quality from the user side. This evaluation uses e-Govqual and Heuristic Evaluation methods. Assessment of e-govqual attributes on performance values and interests in the IPA quadrant resulted in the conclusion that there are 24 attributes in A and C quadrants in the IPA quadrant that need to improve attribute quality. Suggestions based on quadrant A and C in the form of recommendation improvement in the form of recommendation mockup based on 10 principles of heuristic evaluation
Implementation of Obfuscation Technique on PHP Source Code Maskur Maskur; Zamah Sari; Ahmad Miftakh
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (449.924 KB) | DOI: 10.11591/eecsi.v5.1729

Abstract

Source code on web based applications can be altered easily. This occurred because the source code is not compiled into an executable file. Hence, it can be read and copied easily, or be changed without permission from the author. Obfuscation is a technique that commonly used to secure the source code in any websites based application. Obfuscation is a technique to randomize the source code that make the code harder to read but still runnable, but this make the running time increased and the application will run slower then it supposed to. This increased time caused by reverse obfuscation proses to bring back the source code into originally form before interpreted by web server. This studi intended to create an obfuscation technique that keeping the application run time performance as not obfuscated called Wanna Crypt. The methods to create this applications are (1) system design using UML, (2) implementation of the system, which is done by coding or writing scripts using PHP, HTML, JavaScript, CSS to build Wanna Crypt based website, (3) Blackbox and Whitebox testing to compare the execution time. From the tests, it can be concluded that web applications using Wanna Crypt provide a longer response time than web applications without using obfuscation.