cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Proceeding of the Electrical Engineering Computer Science and Informatics
ISSN : 2407439X     EISSN : -     DOI : -
Proceeding of the Electrical Engineering Computer Science and Informatics publishes papers of the "International Conference on Electrical Engineering Computer Science and Informatics (EECSI)" Series in high technical standard. The Proceeding is aimed to bring researchers, academicians, scientists, students, engineers and practitioners together to participate and present their latest research finding, developments and applications related to the various aspects of electrical, electronics, power electronics, instrumentation, control, computer & telecommunication engineering, signal processing, soft computing, computer science and informatics.
Arjuna Subject : -
Articles 649 Documents
Design and Implementation of Web-based Church Information Systems (Case Study : HKBP Kebon Jeruk) Armando Ondihon Kristoper Purba; Supardi Supardi; Ernawati Dewi; Meilieta Anggriani Porrie; Muhammad Syafrullah
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.2001

Abstract

HKBP Kebon Jeruk Church has a lot of data consisting of church data, Pastor data, Church server data, family data, marital data, baptismal data, and also about church agenda such as the schedule of activities Church, schedule of church service. The problem in HKBP Kebon Jeruk is that the Data is provided and managed manually, as well as difficulties in finding the necessary information. Therefore, the system needs to be built by the HKBP Kebon Jeruk Church to request church management data.The method used in the HKBP Kebon Jeruk system is the Extreme Programming method, and the analysis used is the PIECES analysis. The result of this research is to build the HKBP Kebon Jeruk system according to the needs of the user.
Analysis of User Readiness Level of E-Government Using Stope Framework Windi Eka Yulia Retnani; Ricky Freydinansa A. P; Beny Prasetyo
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.2002

Abstract

The Village Information Administration System (VIAS) is one of the many IT service implemented by the Bondowoso district. The successful implementation of an IT service like VIAS can be seen from the extent to which the level of readiness of the user adopts the service. To determine the extent to which the user readiness level can be performed a measurement using the relevant method. STOPE Framework is one of the method that can be used to measure the extent to which the IT service user readiness and can provide recommendations based on the result of the evaluation. Measurement of user readiness in this study using STOPE Framework and determination of a 4 point scale based readiness level issued by the Centre for International Development/CID (Harvard Cyber Law). Data analysis result show VIAS user readiness level is at level 4(completely ready). This indicates that the VIAS user is ready to use the Village Information Administration System based on approach using STOPE Framework.
Lightweight Method for Detecting Fake Authentication Attack on Wi-Fi Muhammad Yusuf Bambang Setiadji; Ramadhan Ibrahim; Amiruddin Amiruddin
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.2003

Abstract

Wireless networks, despite providing better access and flexibility, have vulnerabilities that are easier to realize compared to wired networks. Fake authentication attack can be taken by an attacker prior to carrying out a Man in the Middle attack to intercept the other party's communication. Such an attack is generally carried out in public places that provide free Wi-Fi access. Detection of fake authentication is necessary to maintain communication success. Several methods have been applied to detect fake authentication such as the use of Wireless Intrusion Detection System (WIDS) or certificates on Transport Layer Security (TLS). However, attackers can trick the use of WIDS or TLS. Moreover, the WIDS and TLS techniques require large costs and computations. In this study, a lightweight method based on the comparison of BSSID/MAC address for detecting fake authentication is proposed. The lightweight method is implemented by creating an application that runs on Android mobile phones, and Linux operating system. We compared the detection performance of the device with the proposed application and the one without the proposed application. It can be concluded that the proposed method using comparison of BSSID / MAC address is an effective way to detect fake authentication attacks on Wi-Fi networks.
Enhancing IPsec Performance in Mobile IPv6 Using Elliptic Curve Cryptography Supriyanto Praptodiyono; M. Iman Santoso; Teguh Firmansyah; Ali Abdurrazaq; Iznan H. Hasbullah; Azlan Osman
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.2004

Abstract

Internet has become indispensable to the modern society nowadays. Due to the dynamic nature of human activities, the evolving mobile technology has played a significant role and it is reflected in the exponential growth of the number of mobile users globally. However, the characteristic of the Internet as an open network made it vulnerable to various malicious activities. To secure communication at network layer, IETF recommended IPsec as a security feature. Mobile IPv6 as the successor of the current mobile technology, Mobile IPv4, also mandated the use of IPsec. However, since IPsec is a set of security algorithm, it has several well-known weaknesses such as bootstrapping issue when generating a security association as well as complex key exchange mechanism. It is a well-known fact that IPsec has a high overhead especially when implemented on Mobile IPv6 and used on limited energy devices such as mobile devices. This paper aims to enhance the IPsec performance by substituting the existing key exchange algorithm with a lightweight elliptic curve algorithm. The experiments managed to reduce the delay of IPsec in Mobile IPv6 by 67% less than the standard implementation.
Applying MAC Address-Based Access Control for Securing Admin’s Login Page Bintang Maulana Prasetya Pagar Alam; Rycka Septiasari; Amiruddin Amiruddin
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.2005

Abstract

Authentication is a very important process for securing web applications. Username and password are two parameters commonly used for user authentication on the administrator’s login page. However, such the two authentication parameters can be easily breached so that they can become a vulnerability that adversary parties can use to conduct malicious activities. For example, the attackers can commit a crime such as data modification or theft or even more dangerous take over administrator services of a system. Therefore, it is necessary to improve the security mechanism by adding additional factor of authentication other than username and password. In this study, an improvement in authentication mechanisms was carried out by applying MAC Address-based access control as an additional authentication factor. In this method, Address Resolution Protocol (ARP) is used in mapping the users Internet Protocol (IP) address to their MAC address during validation process. The experimental results showed that the addition of the MAC address made the authentication process resistant to Dictionary Attack and Shoulder Surfing Attack.
Optimizing Design of Core-clad Width for Single Mode Fiber with Zero Dispersion Shift Toto Saktioto; Doni Basdyo; Yoli Zairmi; Romi Fadli Syahputra; Okfalisa Okfalisa; Wresni Anggraini; Syamsudhuha Syamsudhuha
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.2006

Abstract

Fiber optics have become a vital role in telecommunication technologies with many benefits, i.g. high speed transmission, non-electromagnetic interference and low energy consumption. An excellent single mode fiber (SMF) must provide a low attenuation and dispersion which occurs at same wavelength, i.e. 1550 nm. But, in silica based SMF, this property cannot be achieved in a bulk form. Meanwhile, the direct experiment is really not the best choice. Therefore, a simulation fiber design take a crucial role into account for obtaining zero dispersion shift. We design SMF geometry with zero dispersion by resizing the width of core and cladding. This design consists of inner and outer core-clad profile. We also provide several width boundaries for matching the lowest dispersion to the lowest attenuation in silica fiber-based. Moreover, the results shows that dispersion property of the design is suitable for long-haul optical communication systems.
E-Commerce Delivery Order System Based On ISO 9126 Model In Jeddah, Saudi Arabia Siswanto Siswanto; H. Riefky Sungkar
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.2007

Abstract

The limited mobility of Muslim women in the city of Jeddah who must be accompanied by their Muslim family or husband or with fellow Muslim female friends, if they want to leave the house to shop or entrepreneurship has become a culture in the country of Saudi Arabia. The research objective was to create a prototype e-commerce delivery order system for Muslim women in the city of Jeddah. The development of an ecommerce delivery order system uses a prototype method, and tests the quality of variables with the ISO 9126 model. The result of testing of the application variables for functionality, reliability, efficiency and user usability is 77.3%.
Deep Learning Approaches for Big Data Analysis Naomie Salim
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.2008

Abstract

Good representations of data eliminate irrelevant variability of the input data, while preserving the information that is useful for the ultimate task. Among the various ways for learning representation is using deep learning methods. Deep feature hierarchies are formed by stacking unsupervised modules on top of each other, forming multiple non-linear transformations to produce better representations. In this talk, we will first show how deep learning is used for bioactivity prediction of chemical compounds. Molecules are represented as several convolutional neural networks to predict their bioactivity. In addition, a new concept of merging multiple convolutional neural networks and an automatic learning features representation for the chemical compounds was proposed using the values within neurons of the last layer of the CNN architecture. We will also show how the concepts of deep learning is adapted into a deep belief network (DBN) to enhance the molecular similarity searching. The DBN achieves feature abstraction by reconstruction weight for each feature and minimizing the reconstruction error over the whole feature set. The DBN is later enhanced using data fusion to obtain a lower detection error probability and a higher reliability by using data from multiple distributed descriptors. Secondly, we will show how we used deep learning for stock market prediction. Here, we developed a Deep Long Short Term Memory Network model that is able to forecast the crude palm oil price movement with combined factors such as other commodities prices, weather and news sentiments and price movement of crude palm oil. We will also show how we combined stock markets price and financial news and deployed the Long Short Term Memory (LSTM), Recurrent Neural Network (RNN), and Word 2 Vector (Word2Vec) to project the stock prices for the following seven days. Finally, we will show how we exploited deep learning method for the opinion mining and later used it to extract the product's aspects from the user textual review for recommendation systems. Specifically, we employ a multichannel convolutional neural network (MCNN) for two different input layers, namely, word embedding layer and Part-of-speech (POS) tag embedding layer. We will show effectiveness of the proposed model in terms of both aspect extraction and rating prediction performance.
MAC for Internet of Things (IoT) Shekhar Verma
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.2009

Abstract

Internet of Things (IoT) networks are expected to consist of a large number of resource constrained devices that gather data by sensing their environment and communicate dynamically with access points or neighboring devices to communicate these small amount of location specific delay-sensitive data. A IoT MAC protocol must be able to support the high-intensity and short-lived demands of these IoT networks. The basic design questions to be addressed are, one, why endure a high-overhead and large-delay MAC protocol in IoT networks when only a few intermittent packets need to be sent and received? Two, how to ensure energy efficiency even when energy harvesting is available? Three, what kind of access technique should be employed; grant based or grant free? In this talk, we take a look at how existing wireless MAC protocols are being adapted to cater to the specific needs of IoT networks which is imperative to address the basic design questions. Recent research proposals for IoT MAC protocols that endeavor to address the needs shall also be examined for their efficacy and promise.
A Real-Time Visible Light Communication System on Chip Design for High Speed Wireless Communication Trio Adiono
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 6: EECSI 2019
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eecsi.v6.2010

Abstract

The increasing demand of wireless communication bandwidth due to advancement of IoT and smartphone technology, requires the new wireless communication technology that can provide high speed wireless communication. The Visible Light Communication (VLC) has been proven can provide multi gigabit wireless communication throughput using unlicensed visible light spectrum. Therefore, VLC is a promising technology to solve bandwidth limitation problem. In order to achieve high speed throughput, VLC signal processing has to be implemented using Application Specific Integrated Circuits (ASICs) technology. In this research, we develop a baseband processor architecture for VLC application. We use System on Chip (SoC) design approach to reduce design time and easy system integration to various applications. In order to increase spectrum efficiency, we utilize OFDM modulation scheme. Several OFDM processing blocks, such as synchronizer, FFT/IFFT, modulator, demodulator, are designed in the system. The real-time system performance is verified in FPGA based system prototyping. The design includes optical wireless front end module, baseband processing and network layer. The developed prototype shows a real-time performance for high speed internet access.