IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
Indonesian Journal of Computing and Cybernetics Systems (IJCCS), a two times annually provides a forum for the full range of scholarly study . IJCCS focuses on advanced computational intelligence, including the synergetic integration of neural networks, fuzzy logic and eveolutionary computation, so that more intelligent system can be built to industrial applications. The topics include but not limited to : fuzzy logic, neural network, genetic algorithm and evolutionary computation, hybrid systems, adaptation and learning systems, distributed intelligence systems, network systems, human interface, biologically inspired evolutionary system, artificial life and industrial applications. The paper published in this journal implies that the work described has not been, and will not be published elsewhere, except in abstract, as part of a lecture, review or academic thesis.
Articles
366 Documents
Pengembangan Data Warehouse Menggunakan Pendekatan Data-Driven untuk Membantu Pengelolaan SDM
Mujiono Mujiono;
Aina Musdholifah
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.22146/ijccs.11184
The basis of bureaucratic reform is the reform of human resources management. One supporting factor is the development of an employee database. To support the management of human resources required including data warehouse and business intelligent tools. The data warehouse is an integrated concept of reliable data storage to provide support to all the needs of the data analysis. In this study developed a data warehouse using the data-driven approach to the source data comes from SIMPEG, SAPK and electronic presence. Data warehouses are designed using the nine steps methodology and unified modeling language (UML) notation. Extract transform load (ETL) is done by using Pentaho Data Integration by applying transformation maps. Furthermore, to help human resource management, the system is built to perform online analytical processing (OLAP) to facilitate web-based information. In this study generated BI application development framework with Model-View-Controller (MVC) architecture and OLAP operations are built using the dynamic query generation, PivotTable, and HighChart to present information about PNS, CPNS, Retirement, Kenpa and Presence
Peningkatan Kinerja Siakad Menggunakan Metode Load Balancing dan Fault Tolerance Di Jaringan Kampus Universitas Halu Oleo
Alimuddin Alimuddin;
Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.22146/ijccs.11185
The application of academic information system (siakad) a web-based college is essential to improve the academic services. Siakad the application has many obstacles, especially in dealing with a high amount of access that caused the overload. Moreover in case of hardware or software failure caused siakad inaccessible. The solution of this problem is the use of many existing servers where the load is distributed in the respective server. Need a method of distributing the load evenly in the respective server load balancing is the method by round robin algorithm so high siakad scalability. As for dealing with the failure of a server need fault tolerance for the availability siakad be high. This research is to develop methods of load balancing and fault tolerance using software linux virtual server and some additional programs such as ipvsadm and heartbeat that has the ability to increase scalability and availability siakad. The results showed that with load balancing to minimize the response time to 5,7%, increase throughput by 37% or 1,6 times and maximize resource utilization or utilization of 1,6 times increased, and avoid overload. While high availability is obtained from the server's ability to perform failover or move another server in the event of failure. Thus implementing load balancing and fault tolerance can improve the service performance of siakad and avoid mistakes.
Sistem Pencarian Informasi Berbasis Ontologi untuk Jalur Pendakian Gunung Menggunakan Query Bahasa Alami dengan Penyajian Peta Interaktif
Fadhila Tangguh Admojo;
Edi Winarko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.22146/ijccs.11186
Mountain climbing path information has been widely available on the internet. However, to get information that suits the needs of climbers take time to browse and compare all the available information. The diversity of the search results content actually confuse the climbers. This research aims to provide a solution to the problems faced by climbers, by developing an information retrieval system for mountain climbing path using semantic technology (ontology) based approach . The system is developed by using two knowledge base (ontology), ontology Bahasa represents linguistic knowledge and ontology Mountaineering represents mountaineering knowledge. The system is designed to process and understand natural language input form. The process of understanding the natural language based on syntactic and semantic analysis using the rules of Indonesian grammar. The results of the research that has been conducted shows that the system is able to understand natural language input and is capable of detecting input that is not in accordance with the rules of Indonesian grammar both syntactically and semantically. The system is also able to use a thesaurus of words in the search process. Quantitative test results show that the system is able to understand 69% of inputs are taken at random from the respondents.
Perbandingan Kapasitas Pesan pada Steganografi DCT Sekuensial dan Steganografi DCT F5 dengan Penerapan Point Operation Image Enhancement
Dian Hafidh Zulfikar;
Agus Harjoko
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.22146/ijccs.11187
Steganographic process on the DCT transform is generally done on the value of DCT quantization process results that have a value other than 0, this relates to the distribution of the diversity of pixels in the image. Applying point operation of image enhancement (POIE) in the form of histogram equalization, contrast stretching, brigthening and gamma correction on the image of the reservoir is associated with the image histogram . Test parameters used is the number of bits that can be accommodated message, PSNR and MSE value, and the value of DCT coefficients quantization results. Based on test results that have to be got several conclusions that capacity steganographic message on DCT sequential greater than the DCT F5 steganography either before or after application of the application POIE, stego image quality on DCT steganography F5 better than the sequential DCT steganography well before the application POIE and after application of POIE, both F5 and steganography steganography DCT DCT sequential equally resistant to manipulation of stego image.
Transformasi Skema Basis Data Relasional Menjadi Model Data Berorientasi Dokumen pada MongoDB
I Gede Winaya;
Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.22146/ijccs.11188
MongoDB is a database that uses document-oriented data storage models. In fact, to migrate from a relational database to NoSQL databases such as MongoDB is not an easy matter especially if the data are extremely complex. Based on the documentation that has been done by several global companies related to the use of MongoDB, it can be concluded that the process of migration from RDBMS to MongoDB require quite a long time. One process that takes quite a lot is transformation of relational database schema into a document-oriented data model on MongoDB. This research discusses the development transformation system of relational database schema to the document oriented data model in MongoDB. The process of transformation is done by utilizing the structure and relationships between tables in the scheme as the main parameters of the modeling algorithm. In the process of the modeling documents, it necessary to adjustments the specifications of MongoDB document that formed document model can be implemented in MongoDB. Document models are formed from transformation process can be a single document, embedded document, referenced document or combination of these. Document models are formed depending on the type, rules, and the value of the relationships cardinality between tables in the relational database schema.
Analisa Metode Handover Pada Jaringan WiMAX
Murhaban Murhaban;
Ahmad Ashari
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.22146/ijccs.11189
Handover method is used to keep the stabilization of connection. Its connected with the performance was caused the process canal traffic transfer automatically in mobile station (MS) that was used to communicate without cutting off the connection. The main factor of success in handover was quality of service to provide the difference level of service in arranging and giving the traffic priority in the network like voice over IP (VoIP) application or communication voice using internet network. This research will analyse the achievement quality of service in the WiMax network standard 802.16e used hard handover and softhandover method with the VoIP application in mobile station. Based on the testing that was carried out hard handover and soft handover method used the application of voice over internet protocol in mobile station has obtained value jitter 0.001 Ms – 0.31 ms, and delay 10.5 ms 39 ms this is proved that the influence of jitter and delay against handover with the VoIP application still in the tolerance stage that was permitted. It is different with the output throughput 85 Bit/Sekon - 550 Bit/Sekon that is too low and indicated that throughput is not sentitif against handover with the voice over internet protocol application.
Pembentukan Temporal Association Rules Menggunakan Algoritma Apriori (Studi Kasus:Toko Batik Diyan Solo)
Annisa Mauliani;
Sri Hartati;
Aina Musdholifah
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.22146/ijccs.11190
In this study the adding of time aspect on association rules mining result was used. The aspect of time that was used in this study was date of transactions. The information that was resulted from time aspect adding in association rules mining was known as temporal association rules mining.. In this study, Apriori Algorithm was used for the forming of temporal association rules. This result which show Algorithm Apriori and Temporal Association Rules can be used to get more information about Temporal Association Rules. The Result of this examination can be used for decision support for manager. Because the result of Temporal Association Rules have explanation about event. So from the result of Temporal Association Rules can be knowing, the Temporal Association Rules happened at the time of event.In Ramadan Idul Fitri 2013 and Ramadan Idul Fitri 2014 with parameter assess minsup 10%, mintempsup 5, minconf 50%, resulting different Temporal Association Rules. In Ramadan Idul Fitri 2013, no resulting Temporal Association Rules. While is on Ramadan Idul Fitri 2014 resulting Temporal Association Rules with the biggest value of support 14%, that is {BLBP} à {HPCK}.
Pemodelan dan Verifikasi Formal Pengaruh Mobility pattern Terhadap Handoff Latency pada Jaringan WiMAX
I Nym Saputra Wahyu Wijaya;
Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.22146/ijccs.11191
In order to decrease handoff latency and increase the successful of HHO conventional scheme, a development of handover scheme is done in standard protocol WiMAX IEEE 802.16e by adding mobility pattern. The superiority of handover scheme with mobility pattern can reduce handoff latency up to 50%, mean while the weakness of this scheme is a wrong act in determining target base station are often happen. Simulation can not showing the cause of that error. So, we do formal verification in to hard handover model with mobility pattern. In this research, behaviour system is modeled with continuous-time Markov chain (CTMC). The model is foccused to aproximating the influence of mobility pattern in to handoff latency from WiMAX hard handover mechanism. In order to set up a series markov chain models handover system can follow steps, such as: represents the state space, give a number in all transitions, generate the rate transition matrix (infinitesimal generator). Probabilistic model checking in the research are using quantitative properties and qualitative properties. Formal verification concerning properties has relation with handover in WiMAX network showing that 70% from mobile station which doing scanning with mobility pattern are success doing handover. 24% of them doing scanning conventional as a result of wrongness in act determining target base station, so handoff latency which is pictured will bigger than a system that is only use conventional scanning method.
Pemodelan dan Verifikasi Formal Protokol EE-OLSR dengan UPPAAL CORA
Rachmat Wahid Saleh Insani;
Reza Pulungan
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.22146/ijccs.11192
Information and Communication Technology systems is a most important part of society. These systems are becoming more and more complex and are massively encroaching on daily life via the Internet and all kinds of embedded systems. Communication protocols are one of the ICT systems used by Internet users. OLSR protocol is a wireless network communication protocol with proactive, and based on link-state algorithm. EE-OLSR protocol is a variant of OLSR that is able to prolong the network lifetime without losses of performance.Protocol verification process generally be done by simulation and testing. However, these processes unable to verify there are no subtle error or design flaw in protocol. Model Checking is an algorithmic method runs in fully automatic to verify a system. UPPAAL is a model checker tool to model, verify, and simulate a system in Timed Automata.UPPAAL CORA is model checker tool to verify EE-OLSR protocol modelled in Linearly Priced Timed Automata, if the protocol satisfy the energy efficient property formulated by formal specification language in Weighted Computation Tree Logic syntax. Model Checking Technique to verify the protocols results in the protocol is satisfy the energy efficient property only when the packet transmission traffic happens.
Pencarian Lowongan Pekerjaan Berbasis Agen Berdasarkan Profil Pencari Kerja dengan Pendekatan Semantic Web Service
Teguh Susyanto;
Khabib Mustofa
IJCCS (Indonesian Journal of Computing and Cybernetics Systems) Vol 10, No 1 (2016): January
Publisher : IndoCEISS in colaboration with Universitas Gadjah Mada, Indonesia.
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.22146/ijccs.12734
Currently, job searching service still has many weaknesses and often fails to provide relevant job information that matches the needs of job seekers. This is due to the searching method applied in the search engines still uses the syntax-based matching and the lack of integration among the job service providers. Therefore it’s difficult for the job seekers to get the desired information. To overcome these weaknesses, a prototype of a job vacancy searching by involving a web service as a job information provider is proposed.This thesis is aimed to create job search based on the personalization of job seeker by combining multi agent and semantic web service approaches.The designing of the prototype used a multiagent technology whose capability was to call job service provider and run matching process of the job vacancy appropriate with the job seeker’s profile automatically. Algorithm of the service selection used service matching and Simple Additive Weighting. The similary between the job offer and the job seeker’s profile was calculated by using semantic algorithm. Based on the testing carried out to the respondents, it’s stated that this prototype has been able to give recommendation of job appropriate with the job seeker’s.