cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Proceeding of the Electrical Engineering Computer Science and Informatics
ISSN : 2407439X     EISSN : -     DOI : -
Proceeding of the Electrical Engineering Computer Science and Informatics publishes papers of the "International Conference on Electrical Engineering Computer Science and Informatics (EECSI)" Series in high technical standard. The Proceeding is aimed to bring researchers, academicians, scientists, students, engineers and practitioners together to participate and present their latest research finding, developments and applications related to the various aspects of electrical, electronics, power electronics, instrumentation, control, computer & telecommunication engineering, signal processing, soft computing, computer science and informatics.
Arjuna Subject : -
Articles 649 Documents
Methodology for Constructing Form Ontology U. Ungkawa; D. H. Widyantoro; B. Hendradjaya
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (491.743 KB) | DOI: 10.11591/eecsi.v4.1063

Abstract

Form ontology was built to complement the knowledge   base   of   XReformer   system,   a   system   to generate web forms design automatically with case-based reasoning  (CBR)  approach.  Case  base  is  used  to  store cases of form design while the ontology is used to define forms and its elements and the relationship between them as well as between the elements itself. The ontology acts as a small-scale knowledge base that can grow to become a big one. The existing ontology development methodologies were too complicated and mature and they were feasible to apply on a large scale ontology. Certainly, it was not efficient to build a small-scale ontology with these highly- discipline  methodologies.  In  this  paper,  we  propose  a simple ontology development methodology but covers all important aspects of the development of ontologies, as an alternative to the existing methodologies.
Attack Scenarios and Security Analysis of MQTT Communication Protocol in IoT System Syaiful Andy; Budi Rahardjo; Bagus Hanindhito
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (784.215 KB) | DOI: 10.11591/eecsi.v4.1064

Abstract

Various communication protocols are currently used in the Internet of Things (IoT) devices. One of the protocols that are already standardized by ISO is MQTT protocol (ISO / IEC 20922: 2016). Many IoT developers use this protocol because of its minimal bandwidth requirement and low memory consumption. Sometimes, IoT device sends confidential data that should only be accessed by authorized people or devices. Unfortunately, the MQTT protocol only provides authentication for the security mechanism which, by default, does not encrypt the data in transit thus data privacy, authentication, and data integrity become problems in MQTT implementation. This paper discusses several reasons on why there are many IoT system that does not implement adequate security mechanism. Next, it also demonstrates and analyzes how we can attack this protocol easily using several attack scenarios. Finally, after the vulnerabilities of this protocol have been examined, we can improve our security awareness especially in MQTT protocol and then implement security mechanism in our MQTT system to prevent such attack
Measurement of Partial Discharge Inside Metal Enclosed Power Apparatus using Internal Sensor Umar Khayam; Yushan Yushan
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (394.012 KB) | DOI: 10.11591/eecsi.v4.1065

Abstract

Partial discharge detection by detecting the released energy in form of electromagnetic wave during discharge using Ultra-High Frequency (UHF) antenna is one method to determine insulation system quality in high voltage system. UHF PD detection method has several advantages over conventional PD detection system such as IEC 60270 method. The advantages of UHF PD detection system are the capability to directly detect PD signal without firstly shut down, the installation system and their immunity from environmental noise. Nowadays most of electrical equipment are in form of metal enclosed model. This paper deals with measurement of PD occurrences inside metal enclosed equipment using internal sensor. The loop antenna is used for PD measurement. The experimental results show that the presence of metal box gives significant change on the PD signal detected by using loop antenna. Without metal box, the measurement sensitivity decreases because of the high level of background noise. The metal box acts as electromagnetic wave shielding and reduces the external noise. When the loop antenna placed inside metal box, the measurement sensitivity increases because of the low level of background noise inside metal box.
Revealing Daily Human Activity Pattern using Process Mining Approach Muhammad Rifqi Ma’arif
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (441.723 KB) | DOI: 10.11591/eecsi.v4.1066

Abstract

In  the  last  few  years,  with  the  emergence  of ambient assisted living, the study of human behavioral pattern took  a  wide  interest  from  research  communities  around  the world. In many literatures, pattern recognition was widely adopted approach to implements in human behavior study from computing perspective. Pattern recognition brings a promising results in terms of accuracy for modeling human behavior. But the problem with this approach is the complexity of knowledge representation  which  formulated  in  mathematical  model.  In turns, a correction by the experts is hardly conducted. In another hand, gathering a graphical insight is  not a trivial task. This paper  investigate the use of process mining technology to gives an alternative to such problems. Process mining is data-driven approach to infer a graphical representation of any kind of process. In terms of human behavior, process can be defined as sequences of activities performed by human on daily basis. From the conducted experiments process mining was shown a potential use to infer a human daily activity pattern in a graphical representation.
Software Defined Radio Design for OFDM Based Spectrum Exchange Information Using Arduino UNO and X-Bee Arief Marwanto; Sharifah Kamilah Syed Yusof; Muhammad Haikal Satria
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (487.037 KB) | DOI: 10.11591/eecsi.v4.1067

Abstract

A cost expenditure of software defined radio software has limiting the development of cognitive radio in third countries. Moreover, a complexity of signal processing library in a SDR platform has contributed to the hard implementation in real applications. In this works, the development of SDR platform with low cost expenditure is proposed. Arduino UNO and X Bee uses for the OFDM based spectrum exchange information. In a case of spectrum sensing scenario, the objective of the local spectrum sensing is to detect the PU’s signal detection. The performance of SN ability to sense the PU’s signal is crucial. It was shown that from the previous works as the detected power is quantized into information bit is simulated.  In  order  to  implemented  the  spectrum exchange  information during  sensing,  Arduino  UNO  and  X  Bee  is implemented to sense the presence of PU activity channels of wifi terminals based on the energy of the signals. The detected power (RSSI) of wifi terminals is exchanged into an OFDM subcarrier tone signal such as orthogonal sub-channel that being equally divided from the licensed band.   The results shows that using proposed software defined radio (SDR) based on Arduino and X Bee, the cognitive radio spectrum sensing is applied. The received power from the PU’s channels such as wifi networks can be detected as well. The system could received and exchanged into OFDM-based subcarrier information bits.
Design Unmanned Aerial Vehicle Integrated Camera Near Infra-red to Observe the Plant Health Rizki Wahyu Pratama; Ferry Hadary; Redi Ratiandi Yacoub
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (518.894 KB) | DOI: 10.11591/eecsi.v4.1068

Abstract

Plant health is an essential factor to reducethe number of import in a country. In this research, we usepaddy as an example to understand plant health. Ourresearch is motivated by our belief that technology mightaid in reducing chances of failed paddy harvest inIndonesia. To understand the plant health of paddy, wedesigned unmanned aerial vehicle (UAV) integrated pocketcameras to record near infra-red (NIR) light. Apart fromNIR light data, we obtained the normalized differencevegetation index (NDVI) values of paddy to observe theplant health based on the photosystem metabolism thatabsorb red light and blue light and reflects green l ight andNIR light. Based on the test results, the values of NDVI aregiven -0.819672, 0.395018, 0.346667, 0.032680, 0.705628 and0.302817. Based on values of NDVI, we conduct avalidation test with farmers to compare NDVI values wi thactual conditions on the ground. Based on the test, theobtained value of NDVI was in accordance with the actualconditions in the field.
Performance Rate for Implementation of Mobile Learning in Network Edy Budiman; Usfandi Haryaka; Jefferson Roosevelt Watulingas; Faza Alameka
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (916.641 KB) | DOI: 10.11591/eecsi.v4.1069

Abstract

This paper discusses the availability of mobile networks and develops mobile learning software. The measurement Approach is testing from the user experience side to some point where potential users are located. Data clustering is divided into six location of measurement points, with different time sessions; morning, daylight, afternoon, and evening. In each time session, the measurement process is done as much as 10 times test for each the card service packs from Internet Service Providers (ISPs). The measurement process is carried out continuously for 21 days (three weeks), this is done to ensure the availability of mobile networks in the location. The  results of measurement and application testing, have given conclusion and contribution, that in of the research explains that although performance levels such as download and upload speed, latency, jitter and packet loss metrics are appropriate, not necessarily the level of network availability is appropriate. Because each parameter is influenced by a certain factor. The average value of network availability measurement experienced an internet connection failure rate on one of ISP 84.046% or as many as 10 to 11 times failed to connect from 70 attempts for internet connection.
Single Frame Resection of Compact Digital Cameras for UAV Imagery Martinus Edwin Tjahjadi; Fourry Handoko
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1053.583 KB) | DOI: 10.11591/eecsi.v4.1070

Abstract

Recently, UAVs (Unmanned Aerial Vehicles) gaina wider acceptance from many disciplines. One major applicationis for monitoring and mapping. Flying beyond eye sightautonomously and collecting data over large areas are theirobvious advantages. To support a large scale urban city mapping,we have developed a UAV system which can carry a compactdigital camera as well as a navigational grade of a GlobalPositioning System (GPS) board mounted on the vehicle.Unfortunately, such a navigational system fails to providesufficient accuracy required to process images become a largescale map. Ubiquitous digital compact cameras, despite their lowcost benefits, are widely known to suffer instabilities in theirinternal lenses and electronics imaging system. Hence thesecameras are less suitable for mapping related purposes. However,this paper presents a photogrammetric technique to preciselydetermine intrinsic and extrinsic camera parameters ofphotographed images provided that sufficient numbers ofsurveyed control points are available. A rigorous Mathematicalmodel is derived to compute each image position with respect tothe imaging coordinate system as well as a location of theprincipal point of an image sensor and the focal length of thecamera. An iterative Gaussian-Newton least squares adjustmentmethod is utilized to compute those parameters. Finally, surveyeddata are processed and elaborated to justify the mathematicalmodels.
Integration Protocol Student Academic Information to Campus RFID Gate Pass System Hendra Gunawan; Evizal Abdul Kadir
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (623.669 KB) | DOI: 10.11591/eecsi.v4.1071

Abstract

Nowadays, security is a part that consent by many institution including academic for example in University campus, some  of  campus  have  been  implement  automatic  system  in campus area to control visitor to enter University also for   the staffs and students, but the system is in standalone with introduce new gate pass. Most of University has been use Information Technology (IT) in application for academic system such as student information, registration, results information, etc. In this paper discuss on integration of student information to gate pass system then do not require new card or pass for every student to enter campus area. Gate pass system is required information to match to database that who allow entering to campus, normally a new database is create for the system. In this case, University has student and staff database including lecturer, thus to be efficient the data in existing database can be use and integration using protocol that gate pass system give a command to database as request then verification of those data. Currently, student database stored in server room and the place far away from gate pass system, in order to make it transaction faster for visitor to enter then a mini database is setup onsite of gate system, but periodic updating is require or every new update in database. Results shows, database stored in student information system is more than 30,000 number of student and transaction time is less than 1 second and in average cycle time is 5.5 seconds for motorcycle lane and 7 seconds for car, that mean time for visitor to access gate pass system for entry campus is most reasonable.
Information Technology Governance Assessment in Universitas Atma Jaya Yogyakarta using COBIT 5 Framework Gabriella Sabatini; Djoko Budiyanto Setyohadi; Yohanes Sigit Purnomo W. P.
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (235.112 KB) | DOI: 10.11591/eecsi.v4.1072

Abstract

The use of Information Technology (IT) in education is a must now and it should bring benefits to education especially in the university level. Good information technology governance is required in the field of education from planning to implementation. This study aims to evaluate how effective and efficient the implementation of information technology governance at the Universitas Atma Jaya Yogyakarta as measured by COBIT 5 Framework.The method used is conducting a survey by distributing questionnaires to UAJY’s information system office employees and observing documents that are adjusted to the control objectives in the COBIT 5 Framework. This study uses four control objectives, namely APO (Align, Plan, and Organize), BAI (Build, Acquire, and Implement), and DSS (Monitor, Evaluate, Asses). The first stages of the study was data collection, second was analyzing maturity and gap level, third was analysing and problem finding in the implementation of IT governance and proposing recommendations, and fourth was conclusions and suggestions. The result of this research is that Universitas Atma Jaya Yogyakarta has applied the IT governance at level 3 (Established). It means that at this level the process has been built then implemented in accordance to the defined or predetermined process, and able to achieve the result of theprocess.