cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Proceeding of the Electrical Engineering Computer Science and Informatics
ISSN : 2407439X     EISSN : -     DOI : -
Proceeding of the Electrical Engineering Computer Science and Informatics publishes papers of the "International Conference on Electrical Engineering Computer Science and Informatics (EECSI)" Series in high technical standard. The Proceeding is aimed to bring researchers, academicians, scientists, students, engineers and practitioners together to participate and present their latest research finding, developments and applications related to the various aspects of electrical, electronics, power electronics, instrumentation, control, computer & telecommunication engineering, signal processing, soft computing, computer science and informatics.
Arjuna Subject : -
Articles 140 Documents
Search results for , issue "Vol 4: EECSI 2017" : 140 Documents clear
High Performance Direct Torque Control of Induction Motor Drives: Problems and Improvements Nik Rumzi Nik Idris; Tole Sutikno
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1306.853 KB) | DOI: 10.11591/eecsi.v4.970

Abstract

This paper presents some of the main problems, as well as their root causes, of Direct Torque Control (DTC) 3-phase induction motor drive. The high torque ripple in DTC drive due to the hysteresis controller inevitably becomes worst with the discrete implementation of the drive system. The hysteresis controller also causes variable switching frequency that depends on operating conditions, especially the speed. The simplification used in stator flux expression for voltage vectors selection in flux control results in a poor flux regulation at low speed. To overcome these problems, techniques that have been implemented at UTM- PROTON Future Drive Laboratory (UPFDL) are presented and described. Some experimental results obtained from the previous works are also presented and discussed. 
Towards Development of a Computerised System for Screening and Monitoring of Diabetic Retinopathy Hanung Adi Nugroho
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (122.642 KB) | DOI: 10.11591/eecsi.v4.971

Abstract

One of the complications of diabetes can lead to vision problems when it occurs in the retina which is known as diabetic retinopathy (DR). In practice, to diagnose and monitor DR severity, ophthalmologists observe the presence of several pathologies in colour retinal fundus images. However, this approach is tedious and time consuming, especially in the case of screening for early detection. Several techniques have been developed to achieve the final goal that is an automated DR screening system. This paper presents three kinds of approach towards the development of a computerised DR screening and monitoring system. The first approach is pathology-based methods. This approach detects and analyses several pathologies such as microaneurysms, haemorrhages, exudates and changes of retinal vessels. This approach achieves the performance results of more than 90% of accuracy, sensitivity and specificity for detection of the pathologies. The second approach is retinal structure-based methods. This approach detects optic disc, macula and foveal avascular zone (FAZ). The FAZ determination successfully achieves the accuracy of around 97%. DR severity has been proven to have strong correlation up to 0.912 with the enlargement of FAZ. The third approach is deep learning-based methods. This approach has achieved promising results with accuracy of more than 95% in screening and grading the severity of the DR. The third approach offers several advantages compared to the two previous ones in which this approach does not need to specifically detect the presence of pathologies nor the retinal structure to determine DR grade. However, this approach needs huge dataset to learn. The next development is to implement the deep learning based method into a low-cost embedded system.
Performance Analysis of Network Emulator Based on the Use Of Resources in Virtual Laboratory Yuri Ariyanto; Yan Watequlis Syaifudin; Budi Harijanto
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (776.333 KB) | DOI: 10.11591/eecsi.v4.972

Abstract

A network emulator is a software in its environment mimicking the functions and habits of the original network. Problems often encountered in doing research on computer networks is a problem of design and trial scenarios that require software and hardware enough to implement such a network  scenario  similar  to  a  real  scenario.  Using  virtual machine technology is expected to solve the problem. Netkit supports experiments with various network technologies and can support other technologies necessary for certain network experiments. This study uses a network emulator with netkit, where it is freely available and built based on Linux User Mode. Netkit  allows  users  to  experiment  with  complex   computer network scenarios that can be easily implemented using linux. The experimental research is done by making the design first. The design is used to implement the routing process, to connect 4 different network addresses. On the Netkit implementation of the design, it is implemented by creating a virtual routing lab based on   data   from   computer   network   topologies.   The   virtual laboratory implementation of this research routing is based on a network topology scenario. The results of these virtual routing lab experiments, the routing process runs well on the network based on predetermined test scenarios, with the occurrence of connections between different network addresses..In the end the virtual routing lab implementation works well, with performance analysis results from the netkit emulator on the use of computer resources showing Usage CPU usage of 0% and Memory Usage averaging 20942.8k test time for 12 minutes. The results of this trial is very helpful for administrators before the implementation on the real network
The Design a System of Retention and Control on Broiler Farms Based on the Flow of Data Ahmad Sanmorino; Isabella Isabella
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (274.804 KB) | DOI: 10.11591/eecsi.v4.973

Abstract

In this study, we tried to design a system of retention and control on broiler farms in Prabumulih based on the data flow between processes, external entity and data storage. The purpose of this study was to find the best design that can be immediately implemented in the form of information systems. The design submitted is expected to accelerate the process that occurs between entities connected. Minimizing the possibility of error, which in turn can increase the production of broiler when the harvest is done. 
Teaching and Learning Support for Computer Architecture and Organization Courses Design on Computer Engineering and Computer Science For Undergraduate: A Review Wijaya Kurniawan; Mochammad Hannats Hanafi Ichsan
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (547.632 KB) | DOI: 10.11591/eecsi.v4.974

Abstract

Understanding computer system hardware is basic for the undergraduate student which study in the computer area. System user always needs a faster, cheap and reliable process which is conducted by it computer system self. To fulfill that process is required how a computer works from their design and how they operate. That course is conducted by Computer Architecture and Organization (CAO) course. Two computer undergraduate  area  which  studies  CAO  is  Computer Engineering (CE) and Computer Science (CS). To support great learning at CAO both CE and CS needs to not just study which has a material course but they had to practically study computer architecture  and  design  by  the  simulator.  Why  simulator  is chosen, because to create computer such as CPU, RAM etc. needs big  systems that  can  manufacture them.  Nowadays too  much freely available simulator that can be downloaded and used anytime, but not all simulators meet study requirements and didn’t meet the CAO Learning Outcome. CS and CE have an international curriculum that given by ACM Computing Curricula. So this paper is discussed what kind of simulator that meets   Computing   Curricula   requirement   to   implement   at learning process which helps the instructor to choose simulator
A Generic Framework for Information Security Policy Development Wan Basri Wan Ismail; Setyawan Widyarto; Raja Ahmad Tariqi Raja Ahmad; Khatipah Abd Ghani
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (474.184 KB) | DOI: 10.11591/eecsi.v4.975

Abstract

Information security policies are not easy to create unless organizations explicitly recognize the various steps required in the development process of an information security policy, especially in institutions of higher education that use enormous amounts of IT. An improper development process or a copied security policy content from another organization might also fail to execute an effective job. The execution could be aimed at addressing an issue such as the non-compliance to applicable rules and regulations even if the replicated policy is properly developed, referenced, cited in laws or regulations and interpreted correctly. A generic framework was proposed to improve and establish the development process of security policies in institutions of higher education. The content analysis and cross-case analysis methods were used in this study in order to gain  a thorough understanding of the information security policy development process in institutions of higher education
WatsaQ: Repository of Al Hadith in Bahasa (Case Study: Hadith Bukhari) Atqia Aulia; Dewi Khairani; Rizal Broer Bahaweres; Nashrul Hakiem
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (329.557 KB) | DOI: 10.11591/eecsi.v4.976

Abstract

The Hadith is one of the two sources of Islamic law after the Qur'an. It is a fact that there are a number of false hadith, recognised by Muslim scholars since the end of the first century of Hijra, and even earlier. In addition to the breadth of false hadith circulating among the public at this  time,  it  is difficult to determine the source of authenticity and distinguish false  from genuine.  This  is  due  to  the  configuration of  the genuine documents which are revealed in Arabic. To that end, the  authors  have  built  a  repository  collection  of  hadith al- Bukhari in the Indonesian language. The hadith chosen have secured originality and standardisation has been applied that can assist users in learning the content of the hadith. The authors implemented a repository of translation in Bahasa of Bukhari Hadith using XML schema. To study the repository performance, we use a web presentation using PHP employing brute-force string match algorithms to display the search results based on keywords entered by the user. We analyse the results of our proposed repository implementation average searching time is faster by 0.85 milliseconds compared with the repository based on the unstructured one.
Implementation of K-Means Clustering Method to Distribution of High School Teachers Triyanna Widiyaningtyas; Martin Indra Wisnu Prabowo; M. Ardhika Mulya Pratama
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (352.911 KB) | DOI: 10.11591/eecsi.v4.977

Abstract

Currently, the government is still having difficulties in distributing teachers. The current problem is not just about less teachers, but also more teachers in some cities. The problem of unequal distribution of teachers then became dependent on local government. The distribution of teachers now can not be centralized because of the decentralization system implemented in Indonesia. Clustering in data mining is useful for finding distribution patterns within a dataset that is useful for data analysis processes. Using clustering, identifiable densely populated areas, overall distribution patterns and attractive associations between data attributes. The purpose of this research is to apply k-means clustering algorithm to analyze distribution of high school teachers in Indonesia. This research uses three steps, namely dataset selection, preprocessing data, and application of k-means clustering. Testing is done by using k cluster, that is k = 12. The cluster results are analyzed to classify clusters into 3 categories, namely less, enough, and more teachers. Testing results obtained data Sum of Squared Error (SSE) with percentage 87.15%. While the clustering results produce clusters 3 and 5 in the category of less teachers. Cluster 1 and 9 in the category of enough teachers. While cluster 2,4,6,7,8,10,11,12 in the category of more teachers. Based on the results obtained it can be concluded that the accuracy of the algorithm used with 12 clusters is very high. The results of this clustering analysis can also be used as a reference for the distribution of teachers to region with less teachers, so as to solve the issue of uneven distribution of teachers.
IoT Smart Device for e-Learning Content Sharing on Hybrid Cloud Environment Mohd. Yazid Idris; Deris Stiawan; Nik Mohd Habibullah; Abdul Hadi Fikri; Mohd Rozaini Abd Rahim; Massolehin Dasuki
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (697.409 KB) | DOI: 10.11591/eecsi.v4.978

Abstract

Centralized e-Learning technology has dominated the learning ecosystem that brings a lot of potential usage on media rich learning materials. However, the centralized architecture has their own constraint to support large number of users for accessing large size of learning contents. On the other hand, Content Delivery Network (CDN) solution which relies on distributed architecture provides an alternative solution to eliminate  bottleneck  access.  Although  CDN  is   an  effective solution, the implementation of technology is expensive and has less impact for student who lives in limited or non-existence internet access in geographical area. In this paper, we introduce an IoT smart device to provide e-Learning access for content sharing on hybrid cloud environment with distributed peer-to- peer communication solution for data synchronization and updates. The IoT smart device acts as an intermediate device between user and cloud services, and provides content sharing solution without fully depending on the cloud server.
Modeling IT Value based on Meta-Analysis Suhardi Suhardi; Novianto Budi Kurniawan; Aan Subrata; Jaka Sembiring
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (303.37 KB) | DOI: 10.11591/eecsi.v4.979

Abstract

Over the last two decades, research about IT value has been done. The main purpose of IT values research is to determine how IT investment gives impact and value to organization performance. Because of vital role and function of IT, the organization required to understand how IT could create business value. Therefore, an understanding of IT value is needed. Systematic literature review in meta-analysis is required to determine the relationship between IT resources, organization capabilities, organization core competencies, and organization performances. The research was conducted on 53 publications which generate the classification matrix components that have an impact on organization performance. Hypothesis testing results that organization has the best performance on financial, efficiency, and other performance through external capability and core competence. So, indirect effect model is better than direct effect model in explaining IT value.

Page 1 of 14 | Total Record : 140