cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Proceeding of the Electrical Engineering Computer Science and Informatics
ISSN : 2407439X     EISSN : -     DOI : -
Proceeding of the Electrical Engineering Computer Science and Informatics publishes papers of the "International Conference on Electrical Engineering Computer Science and Informatics (EECSI)" Series in high technical standard. The Proceeding is aimed to bring researchers, academicians, scientists, students, engineers and practitioners together to participate and present their latest research finding, developments and applications related to the various aspects of electrical, electronics, power electronics, instrumentation, control, computer & telecommunication engineering, signal processing, soft computing, computer science and informatics.
Arjuna Subject : -
Articles 649 Documents
A Survey of the Latest IT Trends of Cloud Software-As-A-Service Sandy Kosasi; Alexander Harsono; I Dewa Ayu Eka Yuliani
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1609.047 KB) | DOI: 10.11591/eecsi.v1.325

Abstract

Software-as-a-service (SaaS) is an increasingly popular IT model and has become an IT trends. Yet, research on this topic is still rare in Indonesia. The purpose of this paper is to examine the latest IT trends of Cloud SaaS system using surveys and interviews as a research method to obtain data from 130 companies. Data was analyzed using descriptive statistics approach to measure the IT trends. Findings showed the willingness to consider traditional on-premise systems steadily decreased, whereas over the same time frame, the willingness to consider Cloud SaaS systems steadily increased. This study provides managers and academia with a critical insight into the latest IT trends Cloud computing and SaaS and contributes toward IT solutions.
Modelling Data Mining Dynamic Code Attributes With Scheme Definition Technique Evasaria M Sipayung; Cut Fiarni; Randy Tanudjaja
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (599.753 KB) | DOI: 10.11591/eecsi.v1.333

Abstract

Data mining is a technique used in differentdisciplines to search for significant relationships among variablesin large data sets. One of the important steps on data mining isdata preparation. On these step, we need to transform complexdata with more than one attributes into representative format fordata mining algorithm. In this study, we concentrated on thedesigning a proposed system to fetch attributes from a complexdata such as product ID. Then the proposed system willdetermine the basic price of each product based on hiddenrelationships among the attributes of data. These researchesconclude that the proposed system accuracy of precision rate is98.7% and recall rate are 70.27%.
Populating 3D Cities: A True Challenge Daniel Thalmann
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (861.346 KB) | DOI: 10.11591/eecsi.v1.334

Abstract

In this paper, we describe how we can model crowds in real-time using dynamic meshes, static meshes andimpostors. Techniques to introduce variety in crowds including colors, shapes, textures, individualanimation, individualized path-planning, simple and complex accessories are explained. We also present ahybrid architecture to handle the path planning of thousands of pedestrians in real time, while ensuringdynamic collision avoidance. Several behavioral aspects are presented as gaze control, group behaviour, aswell as the specific technique of crowd patches.
Performance Evaluation of Centralized In-Network Caching and Content Visibility in Information Centric Network over SDN/OpenFlow Chanthan Hel; Chaiyachet Saivichit
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (935.984 KB) | DOI: 10.11591/eecsi.v1.335

Abstract

Performance is the main issue that we must consider as the key point in order to design Information Centric Network architecture (ICN). Cooperative in-network caching and ability of network’s nodes to see the contents in network will improve performance of ICN. In centralized network, the controller plays very important role in order to enable ICN nodes to do cooperative caching. Also, it has ability to see contents partially or globally according to our configuration. This paper aims to observe and compare the performance of ICN when we apply different levels of cooperative in-network caching and content visibility based on centralized control by using SDN/OpenFlow concept. We will evaluate performance of ICN by using three mechanisms; firstly, non-cooperative in-network caching with individual visibility; secondly, path cooperative in-network caching with path content visibility; and finally, global cooperative in-network caching with global content visibility. Our emulation result shows that global cooperative in-network caching with global content visibility mechanism gives better performance for ICN in terms of average number of hops to reach the content and number of requests hit server.
Assistive Social Robots for People with Special needs Nadia Magnenat-Thalmann; Zhijun Zhang
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1843.088 KB) | DOI: 10.11591/eecsi.v1.336

Abstract

An increasing number of elderly people leads todemand for social robots to support health care and independentlife. An overview of various potential applications of social robotsis provided in this paper. In addition, the latest research progressin our institute is presented, i.e., multi-party interaction, gesturerecognition, affective computing, and attention capture. All theresearch and applications demonstrate that social robots are goodassistive robots for people with special needs.
Classification Denial of Service (DOS) Attack using Artificial Neural Network Learning Vector Quantization (LVQ) Reza Firsandaya Malik; Verlly Puspita
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1040.388 KB) | DOI: 10.11591/eecsi.v1.337

Abstract

Network security is an important aspect in computer network defense. There are many threats find vulnerabilities and exploits for launching attacks. Threats that purpose to prevent users get the service of the system is Denial of Service (DoS). One of software application that can detect intrusion on is an Intrusion Detection System (IDS). IDS is a defense system to detect suspicious activity on the network. IDS has ability to categorize the various types of attack and not attack. In this research, Learning Vector Quantization (LVQ) neural network is used to classify the type of attacks. LVQ is a method to study the competitive supervised layer. If two input vectors approximately equal, then the competitive layers will put both the input vector into the same class. The results show IDS able to classify PING and UDP Floods are 100%.
Adjusting ICT Capacity Planning by Minimizing Cyber Crime Effects in Urban Area: A System Dynamics Approach Feldiansyah Bin Bakri Nasution; Nor Erne Nazira Bazin
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (912.714 KB) | DOI: 10.11591/eecsi.v1.338

Abstract

In ICT capacity planning process, many organizations or institutions ignore unconsciously other components except statistical data of bandwidth utilization of ICT products. On this occasion, the ICT capacity planning process is analyzed by using system dynamics that considers some factors or components which are combinations between technical and non technical aspects such as: business, education, ICT infrastructure, ICT usage and cyber crime. Simulation of interrelationship between the components is conducted to understand the behavior of the system. System dynamics gives us input on correction of the statistical data by minimizing cyber crime effects. In this paper, it is also introduced the System Breakdown Structure (SBS), a technique to breakdown a big and complex system into smaller and manageable components. The objective of this SBS is to make system dynamics more expandable in hierarchy way in analyzing a system.
Analysis of Security and Performance Service in Service Oriented Architecture (SOA) and Data Integration Erick Fernando; Hetty Rohayani. AH; Pandapotan Siagian; Derist Touriano
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (841.418 KB) | DOI: 10.11591/eecsi.v1.339

Abstract

Nowdays, the use of web services in the world of education is very much particular services and information provided in the form of the transaction until the payment - the payment and security in a system that is built in the form of a website. This system does not yet have a system that is integrated with each other and the security that is necessary to develop a system that leads towards it. Services provided requires an integrated system of all related system, the Service Oriented Architecture (SOA) to be used as an efficient solution for integrating distributed applications. In SOA-based environment that focuses on quality of service called WSARCH (Web Services Architecture). With this paper can then propose a system that uses a Service Oriented Architecture (SOA) with Web Services Architecture to resolve accurately than techniques that have a lower negative impact in terms of service performance and security.
Risk Analysis of the Implementation of IPv6 Neighbor Discovery in Public Network Supriyanto .; Iznan Hasbullah; Rajakumar Murugesan; Azlan Osman
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1042.189 KB) | DOI: 10.11591/eecsi.v1.340

Abstract

Internet is ubiquitous, and in recent times its growth has been exponential. This rapid growth caused the depletion of the current Internet Protocol version 4 (IPv4) address, prompting IETF with the design of the new Internet Protocol version 6 (IPv6) in the 1990’s. IPv6 is the next generation of the Internet Protocol designed with much larger address space and additional functions to ease its use for the users. One of the new functions is address auto configuration of new host’s via Neighbor Discovery Protocol (NDP). However, the implementation of NDP is not without risk in terms of security. This paper analyzes the risk of NDP implementation in public network. The result shows a number of risks that appear on the implementation of NDP over a Public Network. Neighbors cannot be trusted 100%. One of them could be an attacker who may exploit the NDP message to get their own benefit. In addition the number of insiders increases time to time.
High Load Diminution by Regulating Timers in SIP Servers Ahmadreza Montazerolghaem; Seyed-Amin Hosseini-Seno; Mohammad Hossein Yaghmaee; Rahmat Budiarto
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 1: EECSI 2014
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1356.693 KB) | DOI: 10.11591/eecsi.v1.341

Abstract

To start voice, image, instant messaging, and generally multimedia communication, session communication must begin between two participants. SIP (session initiation protocol) that is an application layer control induces management and terminates this kind of sessions. As far as the independence of SIP from transport layer protocols is concerned, SIP messages can be transferred on a variety of transport layer protocols including TCP or UDP. Mechanism of Retransmission that is embedded in SIP could compensate for the missing packet loss, in case of need. This mechanism is applied when SIP messages are transmitted on an unreliable transmission layer protocol like UDP. Also, while facing SIP proxy with overload, it could cause excessive filling of proxy queue, postpone increase of other contacts, and add to the amount of the proxy overload. In the present work, while using UDP as transport layer protocol, invite retransmission timer (T1) was appropriately regulated and SIP functionality was improved. Therefore, by proposing an adaptive timer of invite message retransmission, attempts were made to improve the time of session initiation and consequently improve the performance. Performance of the proposed SIP was implemented and evaluated by SIPP software in a real network environment and its accuracy and performance were demonstrated.

Page 1 of 65 | Total Record : 649