cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Proceeding of the Electrical Engineering Computer Science and Informatics
ISSN : 2407439X     EISSN : -     DOI : -
Proceeding of the Electrical Engineering Computer Science and Informatics publishes papers of the "International Conference on Electrical Engineering Computer Science and Informatics (EECSI)" Series in high technical standard. The Proceeding is aimed to bring researchers, academicians, scientists, students, engineers and practitioners together to participate and present their latest research finding, developments and applications related to the various aspects of electrical, electronics, power electronics, instrumentation, control, computer & telecommunication engineering, signal processing, soft computing, computer science and informatics.
Arjuna Subject : -
Articles 85 Documents
Search results for , issue "Vol 6: EECSI 2019" : 85 Documents clear
Smart Performance Measurement Tool in Measuring The Readiness of Lean Higher Education Institution Okfalisa Okfalisa; Fitri Insani; Rahmad Abdillah; Wresni Anggraini; Toto Saktioto
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.1965

Abstract

The development of autonomy University drives management innovation to increase the alternative sources of income with the purpose of the efficiency improvement and productivity of the institution. One of a management model that leads to increase productivity through cost reduction is Lean service. The implementation of Lean Higher Education Institution (LHEI) requires total involvement of organization maneuver, including social culture, infrastructure, and leadership support. Therefore, the readiness of the institution in welcoming Lean concepts becomes significant. This article tried to develop a prototype of an intelligent performance measurement tool by analyzing the readiness indicators using the Analytical Hierarchy Process (AHP) method. This tool provided the classification of organizational readiness into five performances level. The measurement performed as a Decision Support System (DSS) to recommend University management level in making a decision and correcting action towards the optimal execution of Lean service. As a case study, this prototype system has been tested with Black Box and User Acceptance Test (UAT) in Indonesia Islamic Higher Education Institution. The finding reveals that the prototype system can be used as a performance measurement tool in measuring the readiness of Lean's service in Islamic Higher Education Institution.
Keystroke-Level Model to Evaluate Chatbot Interface for Reservation System Supriyanto Supriyanto; Adhi Prahara; Tri Susanto Saputro
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.1966

Abstract

The tour package reservation system is an important part of improving tourism services. Reservations must be able to meet the information needs of prospective customers and can serve the desired tour package bookings. A reservation system is usually a form that must be filled in sequence by prospective visitors. This paper discusses the evaluation of the application of the chatbot interface on the reservation system with the keystroke-level model. Changing the interaction design that previously did the task fills out the form into a conversation interaction. The aim is to increase the speed of the ordering process through the system. Prospective visitors do not need to fill in the form, they only need to have a conversation with the system while entering the order data. The evaluation results using the keystroke-level model show that the chatbot interface can increase the speed of the process by shortening steps.
Boosting E-Service Quality through IT Service Management of Online Stores Sandy Kosasi; Vedyanto Vedyanto; I Dewa Ayu Eka Yuliani
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.1967

Abstract

The intention of conducting such the research was to evaluate mediating roles of IT service management on information system success model and IT governance, further boosting E-service quality. A method combining convergent triangulation and an explanatory, follow-up design was implemented. The population engaged middle-up online stores that have marketed products online in five-year time in West Kalimantan. Questionnaires were completed by 99 out of 112 managers. Quantitative analysis was performed through SEMPLS. In-depth interviews and FGDs with 5 key informants, however, yielded data used for qualitative analysis. Results conclusively reveal that information system success model is insignificant for E-service quality despite direct, positive influences gained. In other words, the business success of online stores has no reliance on this type of model. The focus should be on IT governance reinforcing IT service management. The fact is supported by qualitative findings emphasizing that such the governance is eminently influenced by information system success model and it is requisite to actualize IT service management for progressed E-service quality.
The Quality of e-Village Budgeting Service : An Empirical Research in Banyuwangi, Indonesia Beny Prasetyo; Syaiful Bukhari; Dwiky Bagas Regio Perkasa
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.1968

Abstract

Electronic Village Budgeting (e-VB) is an information system of village budgeting owned by Banyuwangi District. But at the beginning of the implementation of e-VB, there were several errors and constraints experienced by users so that an evaluation is needed to measure the extent of the quality of e-VB services. To measure the quality of e-VB service, this research used 33 attributes from 6 dimensions of e-GovQual; ease of use, trust, functionality of the interaction environment, reliability, content and performance of information, and citizen support. While the Importance Performance Analysis (IPA) method is used to map the services performance based on the level of user importance. Respondents in this research were 44 respondents spread across 22 villages in Kabat and Licin subDistricts.  Based on the results of e-GovQual analysis was known that the quality of service performance is 3.16. This shows that the performance of the e-VB service is good according to the user's perception. However, based on the assessment of user importance of 3.45, it creates a gap value between performance and importance of -0.29, indicating that the quality of e-VB services is good, but has not fulfilled the user’s importance. Based on the results of the IPA quadrant analysis, it produces several attributes that need a special priority for improvement; providing informed consent, accessibility of site, and loading speed. The results of the research are expected to help the provider of e-VB to be able to provide services that are in accordance with the user’s importance.
Speaker and Speech Recognition Using Hierarchy Support Vector Machine and Backpropagation Asti F. Fadlilah; Esmeralda C. Djamal
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.1969

Abstract

Voice signal processing has been proposed to improve effectiveness and facilitate the public, such as Smart Home. This study aims a smart home simulation model to move doors, TVs, and lights from voice instructions. Sound signals are processed using Mel-frequency Cepstrum Coefficients (MFCC) to perform feature extraction. Then, the voice is recognized by the speaker using a hierarchy Support Vector Machine (SVM). So that unregistered speakers are not processed or are declared not having access rights. For the process of recognizing spoken words such as "Open the Door”,"Close the Door","Turn on the TV","Turn off the TV","Turn on the Lights" and "Turn Offthe Lights" are done using Backpropagation. The results showed that hierarchy SVM provided an accuracy of 71% compared to the single SVM of 45%.
Implementation of Role-Based Access Control on OAuth 2.0 as Authentication and Authorization Zehan Triartono; Ridha Muldina Negara; Sussi Sussi
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.1970

Abstract

As today’s technology transition from monolithic towards microservices architecture, the authentication and authorization system also becomes a new concern because of the difference between monolithic and microservices pattern. Monolithic mostly uses role-based access control while microservices uses scope with OAuth 2.0. With this in mind, there is a need for a model that can integrate OAuth 2.0 with role-based access control. With rolebased access control implemented on OAuth 2.0, we expect a simpler authorization process and a more secure authentication and authorization system for microservices backend architecture. This paper proposes a model to implement role-based access control on OAuth 2.0 using Laravel framework, we also test the performance of the system following by response time, data transferred and throughput. From the performance test, this approach has a good performance and can handle certain requests with simulated users even with limited resources.
Obtaining Reference's Topic Congruity in Indonesian Publications using Machine Learning Approach Sam F. Chaerul Haviana; Imam Much Ibnu Subroto
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.1971

Abstract

There are some criteria on how an article is categorized as a good article for publications. It could depend on some aspect like formatting and clarity, but mainly it depends on how the content of the article is constructed. The consistency of the topic that the article was written could show us how the authors construct the main idea in the article content. One indication that shows this consistency is congruity in the article’s topic and the topic of literature or reference cited in the document listed in the bibliography. This works attempting to automate the topic detection on the article’s references then obtain the congruity to the article title’s topic through metadata extraction and text classification. This is done by extracting metadata of an article file to obtain all possible reference title using GROBID than classify the topic using a supervised classification model. We found that some refinements in the whole approach should be considered in the next step of this work.
Privacy Control In Social Networks By Trust Aware Link Prediction Syam Prasad Dhannuri; Sanjay Kumar Sonbhadra; Sonali Agarwal; P. Nagabhushan; M. Syafrullah; Krisna Adiyarta
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.1972

Abstract

Social networks are exceedingly common in today’s society. A social network site is an online platform where people build social relations with others and share information. For the last two decades, rapid growth in the number of users and applications with these social networking sites, make the security as the most challenging issue. In this virtual environment, some greedy people intentionally perform illegal activities by accessing others’ private information. This paper proposes a novel approach to detect the illegal access of a particular’s information by using trustaware link prediction. The facebook dataset is used for experiments and the results justify the robustness andtrustworthiness of the proposed model.
Paraphrase Detection Using Manhattan's Recurrent Neural Networks and Long Short-Term Memory Achmad Aziz; Esmeralda Contessa Djamal; Ridwan Ilyas
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.1973

Abstract

Natural Language Processing (NLP) is a part of artificial intelligence that can extract sentence structures from natural language. Some discussions about NLP are widely used, such as Recurrent Neural Networks (RNN) and Long Short-Term Memory (LSTM) to summarize papers with many sentences in them. Siamese Similarity is a term that applies repetitive twin network architecture to machine learning for sentence similarity. This architecture is also called Manhattan LSTM, which can be applied to the case of detecting paraphrase sentences. The paraphrase sentence must be recognized by machine learning first. Word2vec is used to convert sentences to vectors so they can be recognized in machine learning. This research has developed paraphrase sentence detection using Siamese Similarity with word2vec embedding. The experimental results showed that the amount of training data is dominant to the new data compared to the number of times and the variation in training data. Obtained data accuracy, 800,000 pairs provide accuracy reaching 99% of training data and 82.4% of new data. These results are better than the accuracy of the new data, with half of the training data only yielding 64%. While the amount of training data did not effect on training data.
Securing IoT Network using Lightweight MultiFog (LMF) Blockchain Model Muhammad Yanuar Ary Saputro
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.1974

Abstract

Security is one of the most important issues in the Internet of Things (IoT). The Mirai botnet case in September 2016 revealed a serious vulnerability in IoT devices. Researchers try to mitigate the issues using several approaches. One of them uses Blockchain for the solution. At first, the integration of the Blockchain on IoT seems promising. However, there are problems in resource consumption and latency. Several solutions emerge to make Blockchain uses low resource consumption i.e., LSB and FogBus. Unfortunately, each solution has its weaknesses. FogBus has a weakness in integrity, whereas LSB has a weakness in its availability when an attack occurs on a broker. We introduce Lightweight Multi-Fog (LMF) Blockchain Model to increase availability in the LSB model. The main idea is increasing the integrity availability by splitting location based on Broadcast Domains while using Fog Computing on each Broadcast Domain. An attack in some Broadcast Domain cannot impact transactions and process in other Broadcast Domain and each Broadcast Domain have its separate transaction and process. LMF enhances the integrity and availability of the Light Blockchain Model. However, it still requires simulations in the future to get a better understanding of LMF performance, resource consumption, and latency