Proceeding of the Electrical Engineering Computer Science and Informatics
Proceeding of the Electrical Engineering Computer Science and Informatics publishes papers of the "International Conference on Electrical Engineering Computer Science and Informatics (EECSI)" Series in high technical standard. The Proceeding is aimed to bring researchers, academicians, scientists, students, engineers and practitioners together to participate and present their latest research finding, developments and applications related to the various aspects of electrical, electronics, power electronics, instrumentation, control, computer & telecommunication engineering, signal processing, soft computing, computer science and informatics.
Articles
85 Documents
Search results for
, issue
"Vol 6: EECSI 2019"
:
85 Documents
clear
Comparison of PIC and SIC with Lattice Reduction cancellation schemes for V-BLAST MIMO system
Evgeny Goncharov
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eecsi.v6.1995
This paper discusses the design of the MIMO signal demodulation algorithm built according to the V-BLAST scheme. Several algorithms such as the maximum likelihood algorithm and QR-M algorithm, Minimum of Mean Square Error (MMSE), Successive Interference Cancellation (SIC) with MMSE (SICMMSE), Parallel Interference Cancellation (PIC) with MMSE (PIC-MMSE), Lattice Reduction MMSE (LR-MMSE), as well as modifications of SIC-LR-MMSE, PIC-LR-MMSE are considered. It is shown that the SIC-LR-MMSE and PIC-LR-MMSE algorithms, presented in this paper, having a linear computational complexity depending on the number of antennas and modulation order, provides good performance close to potentially achievable (MLA), which makes its practical use possible. The presented algorithm can be used to improve performance of CDN (Content Delivery Networks) or CMS (Content Management Systems) to transmit content in different distributed content delivery systems.
PID Controller Design for Mobile Robot Using Bat Algorithm with Mutation (BAM)
Dwi Pebranti;
Luhur Bayuaji;
Yogesvaran Arumgam;
Indra Riyanto;
Muhammad Syafrullah;
Nurnajmin Qasrina Ann Ayop
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eecsi.v6.1996
By definition, a mobile robot is a type of robotthat has capability to move in a certain kind of environmentand generally used to accomplish certain tasks with somedegrees of freedom (DoF). Applications of mobile robots coverboth industrial and domestic area. It may help to reduce risk tohuman being and to the environment. Mobile robot is expectedto operate safely where it must stay away from hazards such asobstacles. Therefore, a controller needs to be designed to makethe system robust and adaptive. In this study, PID controller ischosen to control a mobile robot. PID is considered as simpleyet powerful controller for many kind of applications. Indesigning PID, user needs to set appropriate controller gain toachieve a desired performance of the control system, in termsof time response and its steady state error. Here, anoptimization algorithm called Bat Algorithm with Mutation(BAM) is proposed to optimize the value of PID controller gainfor mobile robot. This algorithm is compared with a wellknownoptimization algorithm, Particle Swarm Optimization(PSO). The result shows that BAM has better performancecompared to PSO in term of overshoot percentage and steadystate error. BAM gives 2.29% of overshoot and 2.94% ofsteady state error. Meanwhile, PSO gives 3.07% of overshootand 3.72% of steady state error.
Performance Analysis of Smartphone-based Mobile Wi-Fi Hotspots Operating in a Congested Environment
Osama F;
Abu-Sharkh Abu-Sharkh
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eecsi.v6.1997
In this work, we address the ubiquity of internet connections in smart cities by analyzing mobile Wi-Fi hotspots in terms of speed and energy efficiency in a congested Wi-Fi environment. We consider state-of-theart consumer smartphones in our work since they are the major devices in establishing mobile Wi-Fi hotspots nowadays. There are two main wireless connections in mobile Wi-Fi hotspots, the cellular connection and the Wi-Fi connection. It has been known that the speed of WiFi connections enormously supersedes the speed of cellular connections with the use of present technologies of each. In this work, we show that this well-known fact becomes controversial when establishing mobile Wi-Fi hotspots using smartphones in a nowadays typical congested Wi-Fi environment.
Efficient PID Controller based Hexapod Wall Following Robot
Hendril Satrian Purnama;
Tole Sutikno;
Nuryono Satya Widodo;
Srinivasan Alavandar
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eecsi.v6.1998
This paper presents a design of wall followingbehaviour for hexapod robot based on PID controller. PIDcontroller is proposed here because of its ability to controlmany cases of non-linear systems. In this case, we proposed aPID controller to improve the speed and stability of hexapodrobot movement while following the wall. In this paper, PIDcontroller is used to control the robot legs, by adjusting thevalue of swing angle during forward or backward movement tomaintain the distance between the robot and the wall. Theexperimental result was verified by implementing the proposedcontrol method into actual prototype of hexapod robot.
Robust PID Control Design in CPS-based Batch Distillation Column
Wirenda Sekar Ayu;
Pranoto Hidaya Rusmin;
Egi M. I. Hidayat
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eecsi.v6.1999
Interconnected system between computationand physical process (Cyber-Physical Systems) has been widelyused in industrial processes. In CPS-based industrial process,sensors, controllers, and actuators are connected into acommunication network. The communication network mayintroduce delay time uncertainties due to shared resources andload traffic in the network. Furthermore, the nonlinear timevaryingcharacteristic of batch distillation column may causesanother uncertainties to take into account in control systemdesign. Parameter model and delay process uncertainty isintroduced due to linearized system approximation thatunmodeled high-frequency dynamics. The dynamicuncertainty on both I/O channel are also introduced to thesystem uncertainty. In this paper, robust PI and PID controllerusing AMIGO method with appropriate weighting function isdesigned to guarantee robust stability spesification of batchdistillation column. The impact of system uncertainties toclosed-loop system performances such as peak overshoot andintegral error is investigated. MATLAB/Simulink simulationis used to validate the methods before its implementation inCPS-based batch distillation column. Based on simulation, theproposed robust PI/PID controller can guarantee robuststability of system compared to conventional PID controller.Furthermore, the robust PI/PID controller can improve closedloopsystem performances compared to conventional PID.
Spatial Diversity Impact in Mobile Quantisation Mapping for Cognitive Radio Networks
Arief Marwanto;
Sharifah Yusof;
M Satria
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eecsi.v6.2000
Mobile environment especially spatial diversity in spectrum exchange information in cognitive radio networks is an interesting topic for further investigation. Most of the cognitive radio researchers does not consider the spatial diversity of sensing nodes. However, the mobility of the SNs within PU’s coverage area is heavily influencing the detection performance on local observation of energy signals. The movement of the SNs creates spatial diversity in the observation of the PU’s signal. Due to the movement, spatial distance, velocity, Doppler Effect and geo-location information, the signals condition would fluctuate during the sensing process. Spatial diversity also reduces the average received signal strength and must be compensated by detection signal method which appropriate with the signal conditions. Therefore, it is need to find a comprehensive solution to overcome the effects of spatial diversity. Moreover, this research could give a clearly analysis in spectrum exchange information regarding detection performance for cognitive radio networks. Finally, the cooperation overhead due to spatial diversity effects in master node station could reduce and increased the detection performance of PU’s spectrum hole channels.
Design and Implementation of Web-based Church Information Systems (Case Study : HKBP Kebon Jeruk)
Armando Ondihon Kristoper Purba;
Supardi Supardi;
Ernawati Dewi;
Meilieta Anggriani Porrie;
Muhammad Syafrullah
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eecsi.v6.2001
HKBP Kebon Jeruk Church has a lot of data consisting of church data, Pastor data, Church server data, family data, marital data, baptismal data, and also about church agenda such as the schedule of activities Church, schedule of church service. The problem in HKBP Kebon Jeruk is that the Data is provided and managed manually, as well as difficulties in finding the necessary information. Therefore, the system needs to be built by the HKBP Kebon Jeruk Church to request church management data.The method used in the HKBP Kebon Jeruk system is the Extreme Programming method, and the analysis used is the PIECES analysis. The result of this research is to build the HKBP Kebon Jeruk system according to the needs of the user.
Analysis of User Readiness Level of E-Government Using Stope Framework
Windi Eka Yulia Retnani;
Ricky Freydinansa A. P;
Beny Prasetyo
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eecsi.v6.2002
The Village Information Administration System (VIAS) is one of the many IT service implemented by the Bondowoso district. The successful implementation of an IT service like VIAS can be seen from the extent to which the level of readiness of the user adopts the service. To determine the extent to which the user readiness level can be performed a measurement using the relevant method. STOPE Framework is one of the method that can be used to measure the extent to which the IT service user readiness and can provide recommendations based on the result of the evaluation. Measurement of user readiness in this study using STOPE Framework and determination of a 4 point scale based readiness level issued by the Centre for International Development/CID (Harvard Cyber Law). Data analysis result show VIAS user readiness level is at level 4(completely ready). This indicates that the VIAS user is ready to use the Village Information Administration System based on approach using STOPE Framework.
Lightweight Method for Detecting Fake Authentication Attack on Wi-Fi
Muhammad Yusuf Bambang Setiadji;
Ramadhan Ibrahim;
Amiruddin Amiruddin
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eecsi.v6.2003
Wireless networks, despite providing better access and flexibility, have vulnerabilities that are easier to realize compared to wired networks. Fake authentication attack can be taken by an attacker prior to carrying out a Man in the Middle attack to intercept the other party's communication. Such an attack is generally carried out in public places that provide free Wi-Fi access. Detection of fake authentication is necessary to maintain communication success. Several methods have been applied to detect fake authentication such as the use of Wireless Intrusion Detection System (WIDS) or certificates on Transport Layer Security (TLS). However, attackers can trick the use of WIDS or TLS. Moreover, the WIDS and TLS techniques require large costs and computations. In this study, a lightweight method based on the comparison of BSSID/MAC address for detecting fake authentication is proposed. The lightweight method is implemented by creating an application that runs on Android mobile phones, and Linux operating system. We compared the detection performance of the device with the proposed application and the one without the proposed application. It can be concluded that the proposed method using comparison of BSSID / MAC address is an effective way to detect fake authentication attacks on Wi-Fi networks.
Enhancing IPsec Performance in Mobile IPv6 Using Elliptic Curve Cryptography
Supriyanto Praptodiyono;
M. Iman Santoso;
Teguh Firmansyah;
Ali Abdurrazaq;
Iznan H. Hasbullah;
Azlan Osman
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.11591/eecsi.v6.2004
Internet has become indispensable to the modern society nowadays. Due to the dynamic nature of human activities, the evolving mobile technology has played a significant role and it is reflected in the exponential growth of the number of mobile users globally. However, the characteristic of the Internet as an open network made it vulnerable to various malicious activities. To secure communication at network layer, IETF recommended IPsec as a security feature. Mobile IPv6 as the successor of the current mobile technology, Mobile IPv4, also mandated the use of IPsec. However, since IPsec is a set of security algorithm, it has several well-known weaknesses such as bootstrapping issue when generating a security association as well as complex key exchange mechanism. It is a well-known fact that IPsec has a high overhead especially when implemented on Mobile IPv6 and used on limited energy devices such as mobile devices. This paper aims to enhance the IPsec performance by substituting the existing key exchange algorithm with a lightweight elliptic curve algorithm. The experiments managed to reduce the delay of IPsec in Mobile IPv6 by 67% less than the standard implementation.